SlideShare a Scribd company logo
Crash course in TR-069 (CWMP)
TR-069 (also known as CWMP or CPE WAN Management Protocol) is an Internet protocol based on XML/SOAP. It enables remote and
safe con�guration of network devices.
What is TR-069 designed for?
TR-069 enables remote and safe con�guration of network devices called customer premises equipment (CPE). Con�guration is
managed by a central server called an auto-con�guration server (ACS).
How to connect a device to the ACS?
A proper connection between a device and the ACS requires few parameters to be con�gured on the device:
What does the communication between the device and the ACS look like?
The connection between the device and the ACS is not permanent. The device establishes the connection with the ACS only at
speci�c points in time. It usually lasts several seconds — just enough to exchange all necessary messages between CPE and the ACS.
This short exchange of messages is called a provisioning session.
ACS Auto-Con�guration Server — software that manages devices remotely. There are two AVSystem’s products that work as an
ACS: UMP and Cloud ACS.
CPE Customer Premises Equipment — any equipment used by customers which can be managed by the ACS (set-top boxes, VoIP-
phones but also modems, routers, gateways, and more). CPE is commonly called a device.
ACS URL: an Internet address of the ACS, which is accessible from the device.
Periodic Inform Interval: de�nes a frequency of communication with the ACS.
Username and password: veri�cation data is optional. It depends on the ACS requirements and an expected security level.
Products Solutions Company Learn Careers Contact Sign in
In this course you will learn about:
CRASH COURSE
What is TR-069 Protocol? What is CWMP? TR-069 Software https://www.avsystem.com/crashcourse/tr069/
1 of 4 12/16/22, 6:46 PM
The provisioning session is divided into a few phases:
Uni�ed Management Platform
Next-gen multiprotocol device management for telecoms
Discover now
When does the device start a session with the ACS?
The device contacts the ACS in the following situations:
The manufacturer of the device can add custom events that will also make the device connect to the ACS. It is worth noting that the
device can list a few reasons for session initialization at the same time.
Session initialization
The session is always initialized by the device that connects to the ACS.
Authentication
The ACS must verify a username and a password provided by the device to continue the session. By default the password is not
sent publicly because the HTTP Digest method is used. Additional security of the authentication can be achieved by using the
HTTPS protocol with mutual certi�cates veri�cation.
Device identi�cation
Devices are identi�ed on the basis of information sent during initialization of the provisioning session. Namely, a device's serial
number and manufacturer's unique identi�er that together constitute a main identi�er of the device in the ACS. A MAC address is
not used as the identi�er but it is saved by the ACS, making it easier to �nd the device in the ACS GUI later on.
Tasks execution on the device
When the device is identi�ed and its communication part ends, a key phase of the session starts — the ACS orders various tasks
on the device. These might include reading or saving parameters, performing diagnostics, rebooting or ordering �le transfers.
Session closure
When all planned tasks have been ordered, the device closes the session. Any further tasks need initialization of a new session.
The ACS URL is saved or changed on the device or the device is reset to factory settings (the device communicates it as
BOOTSTRAP).
A new periodic visit is to begin according to the value set in Periodic Inform Interval (the device communicates it as PERIODIC).
The device responds to the ACS request for immediate connection (the device communicates it as CONNECTION REQUEST).
A value of a parameter for which active noti�cation is enabled changes (the device communicates it as VALUE CHANGE).
The device is reset or is reconnected to the power supply (the device communicates it as BOOT).
During one of the previous sessions the ACS ordered the device to initiate the contact with ScheduleInform command (the device
communicates it as SCHEDULED).
The device wants to report execution of previously ordered download or upload methods (the device communicates it as
TRANSFER COMPLETE).
The device wants to con�rm a previously ordered diagnostic (the device communicates it as DIAGNOSTIC COMPLETE).
What is TR-069 Protocol? What is CWMP? TR-069 Software https://www.avsystem.com/crashcourse/tr069/
2 of 4 12/16/22, 6:46 PM
Cloud ACS
Cloud-based device management via TR-069 and TR-369
Discover now
Why should I be aware of reasons for session initialization?
Knowing why the device is connected to the system is useful for at least two reasons:
Can the ACS initialize a session with the device?
No, it cannot. The session can be started only by the device. However, the ACS can send a request to establish connection, that is
Connection Request, which makes the device contact the ACS if it is properly implemented. Connection Request is used when
changes in the con�guration require to be deployed immediately. Instead of waiting for the device to connect, the ACS can in advance
inform the device about a need of connecting to the server, and introduce changes when it happens.
Is TR-069 secure?
Yes, it is. TR-069 provides several mechanisms that guarantee robust security
Authentication
You can order the device to perform various tasks depending on a particular context, for example, when the device connects for
the �rst time.
You can analyze reasons for last visits and �nd out abnormalities regarding the device’s activities.
Device authentication uses username and password (by default HTTP Digest so the password is not sent publicly).
SSL/TLS certi�cates can be used to mutually verify ACS' and device's identities.
What is TR-069 Protocol? What is CWMP? TR-069 Software https://www.avsystem.com/crashcourse/tr069/
3 of 4 12/16/22, 6:46 PM
Communication
Other
What are the bene�ts of managing devices via TR-069?
Device authentication uses username and password (by default HTTP Digest so the password is not sent publicly).
A proper strict con�guration of the device's �rewall can improve the security (a range of IP addresses that perform Connection
Request should be limited to a safe pool).
It offers a greater control over devices’ settings in comparison to managing them using con�guration �les.
It shortens time needed for installing the devices at the customers’ premises thanks to sending the initial con�guration
automatically.
It reduces a number of engineers’ visits thanks to a possibility of performing crucial operations remotely. This includes changing
con�guration, turning services off/on and performing diagnosis.
It facilitates maintenance work such as upgrading a device's �rmware and backing up its con�guration. What is more, these long
lasting operations can be scheduled to take place off-peak hours.
It reduces failures thanks to network optimization settings for devices, for example by setting the best WiFi channels.
It automates the control of the network state through monitoring.
It collects data that can be used in business analysis, for example, detecting active users to whom additional offers can be made.
ul. Radzikowskiego 47d
31-315 Kraków, Poland
+48 12 619 47 00
Products
Coiote IoT DM
Anjay
UMP
Cloud ACS
BSAP
DHCP Server
Linkyfi
Learn from us
Blog
IoT Developer Zone
Resources
TR069 Crash Course
LwM2M Crash Course
Get to known us
About us
News
Customers
Careers
Contact us
Follow us online!
Privacy policy Cookie policy Copyright © 2022 AVSystem All rights reserved
What is TR-069 Protocol? What is CWMP? TR-069 Software https://www.avsystem.com/crashcourse/tr069/
4 of 4 12/16/22, 6:46 PM

More Related Content

Similar to {{7*7}}

Cloud video surveillance
Cloud video surveillanceCloud video surveillance
Cloud video surveillancePete Fernando
 
Comtrend Products Catalogue 2011.pdf
Comtrend Products Catalogue 2011.pdfComtrend Products Catalogue 2011.pdf
Comtrend Products Catalogue 2011.pdfComtrend Corporation
 
Air Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management SystemsAir Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management SystemsAgilaire LLC
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningAr Agarwal
 
WP7 & Azure
WP7 & AzureWP7 & Azure
WP7 & AzureSam Basu
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...TI Safe
 
Mobile Techologies
Mobile TechologiesMobile Techologies
Mobile TechologiesEMAINT
 
shivkumar pathak web based manufacturing presentation
shivkumar pathak   web based manufacturing presentationshivkumar pathak   web based manufacturing presentation
shivkumar pathak web based manufacturing presentationAkash Maurya
 
Op Manager7
Op Manager7Op Manager7
Op Manager7lfair
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesAmazon Web Services
 
Transcend Automation's Kepware OPC Products
Transcend Automation's Kepware OPC ProductsTranscend Automation's Kepware OPC Products
Transcend Automation's Kepware OPC ProductsBaiju P.S.
 
Building a chat app with windows azure mobile services
Building a chat app with windows azure mobile servicesBuilding a chat app with windows azure mobile services
Building a chat app with windows azure mobile servicesFlavius-Radu Demian
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure spherePushkar Saraf
 

Similar to {{7*7}} (20)

Cloud video surveillance
Cloud video surveillanceCloud video surveillance
Cloud video surveillance
 
Comtrend Products Catalogue 2011.pdf
Comtrend Products Catalogue 2011.pdfComtrend Products Catalogue 2011.pdf
Comtrend Products Catalogue 2011.pdf
 
Air Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management SystemsAir Quality Data Acquisition and Management Systems
Air Quality Data Acquisition and Management Systems
 
Nireeksha
NireekshaNireeksha
Nireeksha
 
Firewall vpn proxy
Firewall vpn proxyFirewall vpn proxy
Firewall vpn proxy
 
Distributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud ProvisioningDistributed Services Scheduling and Cloud Provisioning
Distributed Services Scheduling and Cloud Provisioning
 
WP7 & Azure
WP7 & AzureWP7 & Azure
WP7 & Azure
 
Network security
Network securityNetwork security
Network security
 
Scada pdf
Scada pdfScada pdf
Scada pdf
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Mobile Techologies
Mobile TechologiesMobile Techologies
Mobile Techologies
 
shivkumar pathak web based manufacturing presentation
shivkumar pathak   web based manufacturing presentationshivkumar pathak   web based manufacturing presentation
shivkumar pathak web based manufacturing presentation
 
Op Manager7
Op Manager7Op Manager7
Op Manager7
 
Start Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best PraticesStart Up Austin 2017: Security Crash Course and Best Pratices
Start Up Austin 2017: Security Crash Course and Best Pratices
 
IoT Meets Security
IoT Meets SecurityIoT Meets Security
IoT Meets Security
 
Transcend Automation's Kepware OPC Products
Transcend Automation's Kepware OPC ProductsTranscend Automation's Kepware OPC Products
Transcend Automation's Kepware OPC Products
 
Building a chat app with windows azure mobile services
Building a chat app with windows azure mobile servicesBuilding a chat app with windows azure mobile services
Building a chat app with windows azure mobile services
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
Io t security and azure sphere
Io t security and azure sphereIo t security and azure sphere
Io t security and azure sphere
 
TR-069_Overview.ppt
TR-069_Overview.pptTR-069_Overview.ppt
TR-069_Overview.ppt
 

Recently uploaded

indian folk dances and their significance
indian folk dances and their significanceindian folk dances and their significance
indian folk dances and their significanceksathish10
 
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理dsenv
 
Tackling Poverty in Nigeria, by growing Art-based SMEs
Tackling Poverty in Nigeria, by growing Art-based SMEsTackling Poverty in Nigeria, by growing Art-based SMEs
Tackling Poverty in Nigeria, by growing Art-based SMEsikennaaghanya
 
THE SYNERGY BETWEEN TRADITIONAL “ULI” BODY PAINTING SYMBOLS AND DIGITAL ART.
THE SYNERGY BETWEEN TRADITIONAL “ULI” BODY PAINTING SYMBOLS AND DIGITAL ART.THE SYNERGY BETWEEN TRADITIONAL “ULI” BODY PAINTING SYMBOLS AND DIGITAL ART.
THE SYNERGY BETWEEN TRADITIONAL “ULI” BODY PAINTING SYMBOLS AND DIGITAL ART.ikennaaghanya
 
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...rajpal6695
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单zvaywau
 
Hat in European paintings .ppsx
Hat    in    European    paintings .ppsxHat    in    European    paintings .ppsx
Hat in European paintings .ppsxguimera
 
Winning Shots from Siena International Photography Awards 2015
Winning Shots from Siena International Photography Awards 2015Winning Shots from Siena International Photography Awards 2015
Winning Shots from Siena International Photography Awards 2015rajeshkumar821445
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)SuryaKalyan3
 
LPU infrastructure.pdf uniinfrastructure
LPU infrastructure.pdf uniinfrastructureLPU infrastructure.pdf uniinfrastructure
LPU infrastructure.pdf uniinfrastructureankitaagnihotri0801
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaangelicafronda7
 
一比一原版NYU毕业证纽约大学毕业证成绩单如何办理
一比一原版NYU毕业证纽约大学毕业证成绩单如何办理一比一原版NYU毕业证纽约大学毕业证成绩单如何办理
一比一原版NYU毕业证纽约大学毕业证成绩单如何办理beduwt
 
The Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallThe Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallBBaez1
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSSandhya J.Nair
 
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives ProjectthGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives ProjectMarc Dusseiller Dusjagr
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理beduwt
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonClaireWilson398082
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main storiesluforfor
 
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.docjosegrimaldo17
 

Recently uploaded (20)

indian folk dances and their significance
indian folk dances and their significanceindian folk dances and their significance
indian folk dances and their significance
 
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
一比一原版IIT毕业证伊利诺伊理工大学毕业证成绩单如何办理
 
Tackling Poverty in Nigeria, by growing Art-based SMEs
Tackling Poverty in Nigeria, by growing Art-based SMEsTackling Poverty in Nigeria, by growing Art-based SMEs
Tackling Poverty in Nigeria, by growing Art-based SMEs
 
THE SYNERGY BETWEEN TRADITIONAL “ULI” BODY PAINTING SYMBOLS AND DIGITAL ART.
THE SYNERGY BETWEEN TRADITIONAL “ULI” BODY PAINTING SYMBOLS AND DIGITAL ART.THE SYNERGY BETWEEN TRADITIONAL “ULI” BODY PAINTING SYMBOLS AND DIGITAL ART.
THE SYNERGY BETWEEN TRADITIONAL “ULI” BODY PAINTING SYMBOLS AND DIGITAL ART.
 
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
Nagpur_❤️Call Girl Starting Price Rs 12K ( 7737669865 ) Free Home and Hotel D...
 
一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单一比一原版(DU毕业证)迪肯大学毕业证成绩单
一比一原版(DU毕业证)迪肯大学毕业证成绩单
 
Hat in European paintings .ppsx
Hat    in    European    paintings .ppsxHat    in    European    paintings .ppsx
Hat in European paintings .ppsx
 
Winning Shots from Siena International Photography Awards 2015
Winning Shots from Siena International Photography Awards 2015Winning Shots from Siena International Photography Awards 2015
Winning Shots from Siena International Photography Awards 2015
 
Sundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menangSundabet | Slot gacor dan terpercaya mudah menang
Sundabet | Slot gacor dan terpercaya mudah menang
 
Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)Memory Rental Store - The Chase (Storyboard)
Memory Rental Store - The Chase (Storyboard)
 
LPU infrastructure.pdf uniinfrastructure
LPU infrastructure.pdf uniinfrastructureLPU infrastructure.pdf uniinfrastructure
LPU infrastructure.pdf uniinfrastructure
 
acting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaaacting board rough title here lolaaaaaaa
acting board rough title here lolaaaaaaa
 
一比一原版NYU毕业证纽约大学毕业证成绩单如何办理
一比一原版NYU毕业证纽约大学毕业证成绩单如何办理一比一原版NYU毕业证纽约大学毕业证成绩单如何办理
一比一原版NYU毕业证纽约大学毕业证成绩单如何办理
 
The Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance LindallThe Legacy of Breton In A New Age by Master Terrance Lindall
The Legacy of Breton In A New Age by Master Terrance Lindall
 
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERSART FORMS OF KERALA: TRADITIONAL AND OTHERS
ART FORMS OF KERALA: TRADITIONAL AND OTHERS
 
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives ProjectthGAP - BAbyss in Moderno!!  Transgenic Human Germline Alternatives Project
thGAP - BAbyss in Moderno!! Transgenic Human Germline Alternatives Project
 
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
一比一原版UPenn毕业证宾夕法尼亚大学毕业证成绩单如何办理
 
Caffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire WilsonCaffeinated Pitch Bible- developed by Claire Wilson
Caffeinated Pitch Bible- developed by Claire Wilson
 
2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories2137ad - Characters that live in Merindol and are at the center of main stories
2137ad - Characters that live in Merindol and are at the center of main stories
 
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
2º CALIGRAFIAgggggggggggggggggggggggggggggggggggggg.doc
 

{{7*7}}

  • 1. Crash course in TR-069 (CWMP) TR-069 (also known as CWMP or CPE WAN Management Protocol) is an Internet protocol based on XML/SOAP. It enables remote and safe con�guration of network devices. What is TR-069 designed for? TR-069 enables remote and safe con�guration of network devices called customer premises equipment (CPE). Con�guration is managed by a central server called an auto-con�guration server (ACS). How to connect a device to the ACS? A proper connection between a device and the ACS requires few parameters to be con�gured on the device: What does the communication between the device and the ACS look like? The connection between the device and the ACS is not permanent. The device establishes the connection with the ACS only at speci�c points in time. It usually lasts several seconds — just enough to exchange all necessary messages between CPE and the ACS. This short exchange of messages is called a provisioning session. ACS Auto-Con�guration Server — software that manages devices remotely. There are two AVSystem’s products that work as an ACS: UMP and Cloud ACS. CPE Customer Premises Equipment — any equipment used by customers which can be managed by the ACS (set-top boxes, VoIP- phones but also modems, routers, gateways, and more). CPE is commonly called a device. ACS URL: an Internet address of the ACS, which is accessible from the device. Periodic Inform Interval: de�nes a frequency of communication with the ACS. Username and password: veri�cation data is optional. It depends on the ACS requirements and an expected security level. Products Solutions Company Learn Careers Contact Sign in In this course you will learn about: CRASH COURSE What is TR-069 Protocol? What is CWMP? TR-069 Software https://www.avsystem.com/crashcourse/tr069/ 1 of 4 12/16/22, 6:46 PM
  • 2. The provisioning session is divided into a few phases: Uni�ed Management Platform Next-gen multiprotocol device management for telecoms Discover now When does the device start a session with the ACS? The device contacts the ACS in the following situations: The manufacturer of the device can add custom events that will also make the device connect to the ACS. It is worth noting that the device can list a few reasons for session initialization at the same time. Session initialization The session is always initialized by the device that connects to the ACS. Authentication The ACS must verify a username and a password provided by the device to continue the session. By default the password is not sent publicly because the HTTP Digest method is used. Additional security of the authentication can be achieved by using the HTTPS protocol with mutual certi�cates veri�cation. Device identi�cation Devices are identi�ed on the basis of information sent during initialization of the provisioning session. Namely, a device's serial number and manufacturer's unique identi�er that together constitute a main identi�er of the device in the ACS. A MAC address is not used as the identi�er but it is saved by the ACS, making it easier to �nd the device in the ACS GUI later on. Tasks execution on the device When the device is identi�ed and its communication part ends, a key phase of the session starts — the ACS orders various tasks on the device. These might include reading or saving parameters, performing diagnostics, rebooting or ordering �le transfers. Session closure When all planned tasks have been ordered, the device closes the session. Any further tasks need initialization of a new session. The ACS URL is saved or changed on the device or the device is reset to factory settings (the device communicates it as BOOTSTRAP). A new periodic visit is to begin according to the value set in Periodic Inform Interval (the device communicates it as PERIODIC). The device responds to the ACS request for immediate connection (the device communicates it as CONNECTION REQUEST). A value of a parameter for which active noti�cation is enabled changes (the device communicates it as VALUE CHANGE). The device is reset or is reconnected to the power supply (the device communicates it as BOOT). During one of the previous sessions the ACS ordered the device to initiate the contact with ScheduleInform command (the device communicates it as SCHEDULED). The device wants to report execution of previously ordered download or upload methods (the device communicates it as TRANSFER COMPLETE). The device wants to con�rm a previously ordered diagnostic (the device communicates it as DIAGNOSTIC COMPLETE). What is TR-069 Protocol? What is CWMP? TR-069 Software https://www.avsystem.com/crashcourse/tr069/ 2 of 4 12/16/22, 6:46 PM
  • 3. Cloud ACS Cloud-based device management via TR-069 and TR-369 Discover now Why should I be aware of reasons for session initialization? Knowing why the device is connected to the system is useful for at least two reasons: Can the ACS initialize a session with the device? No, it cannot. The session can be started only by the device. However, the ACS can send a request to establish connection, that is Connection Request, which makes the device contact the ACS if it is properly implemented. Connection Request is used when changes in the con�guration require to be deployed immediately. Instead of waiting for the device to connect, the ACS can in advance inform the device about a need of connecting to the server, and introduce changes when it happens. Is TR-069 secure? Yes, it is. TR-069 provides several mechanisms that guarantee robust security Authentication You can order the device to perform various tasks depending on a particular context, for example, when the device connects for the �rst time. You can analyze reasons for last visits and �nd out abnormalities regarding the device’s activities. Device authentication uses username and password (by default HTTP Digest so the password is not sent publicly). SSL/TLS certi�cates can be used to mutually verify ACS' and device's identities. What is TR-069 Protocol? What is CWMP? TR-069 Software https://www.avsystem.com/crashcourse/tr069/ 3 of 4 12/16/22, 6:46 PM
  • 4. Communication Other What are the bene�ts of managing devices via TR-069? Device authentication uses username and password (by default HTTP Digest so the password is not sent publicly). A proper strict con�guration of the device's �rewall can improve the security (a range of IP addresses that perform Connection Request should be limited to a safe pool). It offers a greater control over devices’ settings in comparison to managing them using con�guration �les. It shortens time needed for installing the devices at the customers’ premises thanks to sending the initial con�guration automatically. It reduces a number of engineers’ visits thanks to a possibility of performing crucial operations remotely. This includes changing con�guration, turning services off/on and performing diagnosis. It facilitates maintenance work such as upgrading a device's �rmware and backing up its con�guration. What is more, these long lasting operations can be scheduled to take place off-peak hours. It reduces failures thanks to network optimization settings for devices, for example by setting the best WiFi channels. It automates the control of the network state through monitoring. It collects data that can be used in business analysis, for example, detecting active users to whom additional offers can be made. ul. Radzikowskiego 47d 31-315 Kraków, Poland +48 12 619 47 00 Products Coiote IoT DM Anjay UMP Cloud ACS BSAP DHCP Server Linkyfi Learn from us Blog IoT Developer Zone Resources TR069 Crash Course LwM2M Crash Course Get to known us About us News Customers Careers Contact us Follow us online! Privacy policy Cookie policy Copyright © 2022 AVSystem All rights reserved What is TR-069 Protocol? What is CWMP? TR-069 Software https://www.avsystem.com/crashcourse/tr069/ 4 of 4 12/16/22, 6:46 PM