Hi,
Can someone post a config file for an ARRIS TM822? I'm familiar with the TM402, TM502 and TM602. They would allow me to use two config files. One for the modem and a mtamac.bin for the emta. Do the TM822s support that? It think it's called guip.
Thanks,
Eric
Yes, you can still use "GUPI" provisioning
The D2 and D3 CM config files are pretty much the same, except that SNMP is disabled by default in D3.
The D2 and D3 MTA config files are also pretty similar, but a couple of notable differences include :
* ppCfgMtaCallpFeatureSwitch values have been altered
* SNMP access to the D3 MTA is disabled by default. For SNMP access you will typically need to include "SNMP co-existence" MIBs in the MTA config file
Hi,
Would you happen to have that config file line to turn on the SNMP? I have a test TM822G online with the config file I have, but can't get the MTA up. It's stuck in DHCP DISCOVER then DHCP OFFER. I need to be able to SNMP walk the modem and access the webinterface via the cable interface so I can debug.
Thanks,
emkowale
How are you guys disabling the MTA part for users who don't have a phone service enabled?
With older Arris modems (40x/50x/60x) we used the following in CM config:
SnmpMibObject arrisMtaDevProvMethodIndicator.0 Integer 0; /* docsisOnly */
to disable MTA and
SnmpMibObject arrisMtaDevProvMethodIndicator.0 Integer 4; /* gupi */
to enable it.
But with newer 3.0 modems (800 series), the docsisOnly option doesn't work any more. The modem reads the config from TFTP and then just hangs like it doesn't understand that option at all.
Is there any other way to disable the MTA and stop the annoying DHCPDISCOVER messages?
gupi-mac(9) is no longer supported for docsis 3 Arris modems (SIP firmware) use 4 or 6 for provisioning method both options require sending the option boot-filename (option 67) and possibly the tftp server name to the MTA with the config name.
to add simple snmp v1/v2c SNMP access you can do this replacing public/private with your snmp community of choice
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.4.1 String "public" ;/*docsDevNmAccessCommunity*/
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.5.1 Integer 2; /* docsDevNmAccessControl read */
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.6.1 HexString 0x4000 ;/*docsDevNmAccessInterfaces*/
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.7.1 Integer 4; /* docsDevNmAccessStatus createAndGo */
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.4.2 String "private" ;/*docsDevNmAccessCommunity*/
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.5.2 Integer 3; /* docsDevNmAccessControl readWrite */
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.6.2 HexString 0x4000 ;/*docsDevNmAccessInterfaces*/
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.7.2 Integer 4; /* docsDevNmAccessStatus createAndGo */
Ah you are right, GUPI MAC (9) does look to be gone, and is probably a good thing as it was very insecure. (Well, it's certainly gone from the doco, but I haven't tested it recently to find out for sure. I had thought it was still available but I could well be mistaken.)
The GUPI Encrypted MAC MTA (10) method is still available though. Works well, we use it.
Perhaps check all your DHCP configs against this doco I wrote up a while ago
http://www.docsis.org/comment/3063#comment-3063
I wouldnt bother using SNMP to try and debug your MTA problems.
Quick check can be done by plugging PC into LAN port of Arris and browsing to 192.168.100.1 and then looking in the event log screen there
Detailed debugging can be done by activating telnet support and then telnet in to CM IP or LAN IP. Use PWOD to auth. Then you can use good command like "system -> buffer" and many others to get a good view at why the MTA is not happy.
Hi,
Here is a TM402g file I modified. The cisco ubr7246 is stuck in the init(o) state. It doesn't like the following config file. The modem is 200 miles away in a test head end or eles I would LAN to the modem. Can you see something I messed?
Main
{
NetworkAccess 1;
SnmpMibObject arrisCmDevWanIsolationState.0 Integer 3; /* off-InActiveMode-ButtonDisabled */
SnmpMibObject ifAdminStatus.1 Integer 1; /* up */
SnmpMibObject ifAdminStatus.5 Integer 2; /* down */
SwUpgradeServer 10.42.1.1;
SwUpgradeFilename "TS070563_092012_NA.MODEL_7_8.SIP.img";
SnmpMibObject arrisCmDevHttpWanAccess.0 Integer 3; /* advanced */
SnmpMibObject arrisCmDevHttpLanAccess.0 Integer 3; /* advanced */
MaxCPE 2;
MaxClassifiers 20;
GlobalPrivacyEnable 0;
MfgCVCData 0x308203a63082028ea00302010202106c0943ec39872d8fecda6c489e5e9030300d06092a864886f70d0101050500308197310b300906035504061302555331393037060355040a133044617461204f766572204361626c65205365727669636520496e746572666163652053706563696669636174696f6e7331153013060355040b130c4361626c65204d6f64656d73313630340603550403132d444f43534953204361626c65204d6f64656d20526f6f7420436572746966696361746520417574686f72697479301e170d3031303931323030303030305a170d3133303931313233353935395a306a310b300906035504061302555331223020060355;
MfgCVCData 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;
MfgCVCData 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;
MfgCVCData 0x0f4cf1bef41c9c58ef166582b5e7f1aa1afcd7badeb7b0097845c2d95ee89f66767f3bc080c2994e8c39ca9f22bcc22151ba9221b7ca87e81fdad3fcf48feb61c739ec751ac00afacd88ccc99d11ee6a96c5a591f625875ed7af60460e7330dee05ec183d1717af3f2702df0253fd1a49cbca6a654b37cb7846f91c11e3a83d1e68c28aa25a35d9849393b009b9a5328e5729017d35bb841d62f950007ba7d73e2fff4e14d0f3a49193805495714811b;
SnmpMibObject arrisMtaDevProvMethodIndicator.0 Integer 10; /* gupiEncryptedMacMta */
SnmpMibObject docsDevNmAccessCommunity.1 String "public" ;
SnmpMibObject docsDevNmAccessControl.1 Integer 2; /* read */
SnmpMibObject docsDevNmAccessInterfaces.1 HexString 0x4000 ;
SnmpMibObject docsDevNmAccessStatus.1 Integer 4; /* createAndGo */
SnmpMibObject docsDevNmAccessCommunity.2 String "private" ;
SnmpMibObject docsDevNmAccessControl.2 Integer 3; /* readWrite */
SnmpMibObject docsDevNmAccessInterfaces.2 HexString 0x4000 ;
SnmpMibObject docsDevNmAccessStatus.2 Integer 4; /* createAndGo */
SnmpMibObject ppCfgMtaCallpFeatureSwitch.0 Integer 98867 ;
SnmpMibObject docsDevSwAdminStatus.0 Integer 2; /* allowProvisioningUpgrade */
SnmpMibObject arrisCmDevSwAdminStatus.0 Integer 2; /* allowArrisProvisioningUpgrade */
BaselinePrivacy
{
AuthTimeout 10;
ReAuthTimeout 10;
AuthGraceTime 600;
OperTimeout 10;
ReKeyTimeout 10;
TEKGraceTime 600;
AuthRejectTimeout 60;
SAMapWaitTimeout 1;
SAMapMaxRetries 4;
}
UsServiceFlow
{
UsServiceFlowRef 1;
QosParamSetType 7;
TrafficPriority 0;
MinReservedRate 1000;
MinResPacketSize 64;
MaxConcatenatedBurst 1522;
SchedulingType 2;
IpTosOverwrite 0xfc00;
MaxRateSustained 64000;
RequestOrTxPolicy 0x00000080;
}
UsServiceFlow
{
UsServiceFlowRef 2;
QosParamSetType 7;
TrafficPriority 7;
MaxTrafficBurst 1522;
MinReservedRate 1000;
MinResPacketSize 64;
MaxConcatenatedBurst 1522;
SchedulingType 2;
RequestOrTxPolicy 0x00000088;
IpTosOverwrite 0xfc00;
}
UsServiceFlow
{
UsServiceFlowRef 3;
QosParamSetType 7;
TrafficPriority 4;
MaxRateSustained 1024000;
MaxConcatenatedBurst 1522;
SchedulingType 2;
RequestOrTxPolicy 0x00000080;
IpTosOverwrite 0xfc00;
}
DsServiceFlow
{
DsServiceFlowRef 101;
QosParamSetType 7;
TrafficPriority 0;
MaxRateSustained 128000;
}
DsServiceFlow
{
DsServiceFlowRef 102;
QosParamSetType 7;
TrafficPriority 7;
MaxTrafficBurst 1522;
MinReservedRate 4000;
MinResPacketSize 64;
MaxDsLatency 5000;
}
DsServiceFlow
{
DsServiceFlowRef 103;
QosParamSetType 7;
TrafficPriority 4;
MaxRateSustained 6144000;
}
UsPacketClass
{
ServiceFlowRef 3;
ClassifierRef 3;
RulePriority 200;
ActivationState 1;
IpPacketClassifier
{
SrcPortStart 1024;
SrcPortEnd 65535;
IpProto 256;
}
}
UsPacketClass
{
ServiceFlowRef 2;
ClassifierRef 2;
RulePriority 255;
ActivationState 1;
IpPacketClassifier
{
IpProto 17;
SrcPortStart 5060;
SrcPortEnd 5060;
}
}
DsPacketClass
{
ServiceFlowRef 102;
ClassifierRef 102;
RulePriority 255;
ActivationState 1;
IpPacketClassifier
{
IpProto 17;
DstPortStart 5060;
DstPortEnd 5060;
}
}
DsPacketClass
{
ServiceFlowRef 103;
ClassifierRef 103;
RulePriority 200;
ActivationState 1;
IpPacketClassifier
{
DstPortStart 80;
DstPortEnd 80;
IpProto 256;
}
}
SnmpMibObject docsDevFilterIpStatus.1 Integer 1; /* active */
SnmpMibObject docsDevFilterIpControl.1 Integer 1; /* discard */
SnmpMibObject docsDevFilterIpIfIndex.1 Integer 0 ;
SnmpMibObject docsDevFilterIpDirection.1 Integer 3; /* both */
SnmpMibObject docsDevFilterIpBroadcast.1 Integer 2; /* false */
SnmpMibObject docsDevFilterIpSaddr.1 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpSmask.1 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpDaddr.1 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpDmask.1 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpProtocol.1 Integer 6 ;
SnmpMibObject docsDevFilterIpSourcePortLow.1 Integer 0 ;
SnmpMibObject docsDevFilterIpSourcePortHigh.1 Integer 1024 ;
SnmpMibObject docsDevFilterIpDestPortLow.1 Integer 0 ;
SnmpMibObject docsDevFilterIpDestPortHigh.1 Integer 1024 ;
SnmpMibObject docsDevFilterIpStatus.2 Integer 1; /* active */
SnmpMibObject docsDevFilterIpControl.2 Integer 1; /* discard */
SnmpMibObject docsDevFilterIpIfIndex.2 Integer 0 ;
SnmpMibObject docsDevFilterIpDirection.2 Integer 3; /* both */
SnmpMibObject docsDevFilterIpBroadcast.2 Integer 2; /* false */
SnmpMibObject docsDevFilterIpSaddr.2 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpSmask.2 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpDaddr.2 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpDmask.2 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpProtocol.2 Integer 6 ;
SnmpMibObject docsDevFilterIpSourcePortLow.2 Integer 1900 ;
SnmpMibObject docsDevFilterIpSourcePortHigh.2 Integer 1900 ;
SnmpMibObject docsDevFilterIpDestPortLow.2 Integer 1900 ;
SnmpMibObject docsDevFilterIpDestPortHigh.2 Integer 1900 ;
SnmpMibObject docsDevFilterIpStatus.3 Integer 1; /* active */
SnmpMibObject docsDevFilterIpControl.3 Integer 1; /* discard */
SnmpMibObject docsDevFilterIpIfIndex.3 Integer 0 ;
SnmpMibObject docsDevFilterIpDirection.3 Integer 3; /* both */
SnmpMibObject docsDevFilterIpBroadcast.3 Integer 2; /* false */
SnmpMibObject docsDevFilterIpSaddr.3 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpSmask.3 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpDaddr.3 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpDmask.3 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpProtocol.3 Integer 6 ;
SnmpMibObject docsDevFilterIpSourcePortLow.3 Integer 2049 ;
SnmpMibObject docsDevFilterIpSourcePortHigh.3 Integer 2049 ;
SnmpMibObject docsDevFilterIpDestPortLow.3 Integer 2049 ;
SnmpMibObject docsDevFilterIpDestPortHigh.3 Integer 2049 ;
SnmpMibObject docsDevFilterIpStatus.4 Integer 1; /* active */
SnmpMibObject docsDevFilterIpControl.4 Integer 1; /* discard */
SnmpMibObject docsDevFilterIpIfIndex.4 Integer 0 ;
SnmpMibObject docsDevFilterIpDirection.4 Integer 3; /* both */
SnmpMibObject docsDevFilterIpBroadcast.4 Integer 2; /* false */
SnmpMibObject docsDevFilterIpSaddr.4 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpSmask.4 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpDaddr.4 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpDmask.4 IPAddress 0.0.0.0 ;
SnmpMibObject docsDevFilterIpProtocol.4 Integer 6 ;
SnmpMibObject docsDevFilterIpSourcePortLow.4 Integer 5297 ;
SnmpMibObject docsDevFilterIpSourcePortHigh.4 Integer 5297 ;
SnmpMibObject docsDevFilterIpDestPortLow.4 Integer 5297 ;
SnmpMibObject docsDevFilterIpDestPortHigh.4 Integer 5297 ;
/* CmMic aa0197c25617d6bccfa971b18ab8ff64; */
/* CmtsMic 25d856a6a089063d8152cf084187baf4; */
/*EndOfDataMkr*/
/* Pad */
}
Thanks,
emkowale
With such problems, I just go remark out most of the config until the modem boots, and then start adding parts back in to identify the one causing the problem
Some suggestions though :
* Arris D3 modems (unfortunately) do not yet support WAN isolation feature. So I would remove that MIB from the CM config file.
* Having BPI turned off looks suspicious
* I have ppCfgMtaCallpFeatureSwitch in my MTA config file not CM config file
OK, The modem is up and web and SNMP access are enabled. I can post the cm config file if anyone is interested. Now on to the MTA side. I understand that in DOCSIS 3 I can no longer use:
arrisMtaDevProvMethodIndicator.0 =9 (GUPI MAC MTA)
I need to use:
arrisMtaDevProvMethodIndicator.0 =10 (GUPI ENCRYPTED MAC MTA)
First of all, what does that ENCRYPTED thing look like? Do I need an SSL cert or something? Can I just change the 9 to a 10 and do nothing? I just want the bare minimum to get an mta to register to my Asterisk server.
I can't get the mta to accept this file:
Main
{
MtaConfigDelimiter 1;
SnmpMibObject pktcMtaDevEnabled.0 Integer 1; /* true */
SnmpMibObject ifAdminStatus.9 Integer 1; /* up */
SnmpMibObject ifAdminStatus.10 Integer 1; /* up */
SnmpMibObject sipCfgProxyAdr.0 String "10.0.0.1;5060" ;
SnmpMibObject sipCfgProxyType.0 Integer 0; /* ipv4 */
SnmpMibObject sipCfgRegistrarAdr.0 String "10.0.0.1;5060" ;
SnmpMibObject sipCfgRegistrarType.0 Integer 0; /* ipv4 */
SnmpMibObject sipCfgSipFeatureSwitch.0 HexString 0x04808000 ;
SnmpMibObject sipCfgProvisionedCodecArray.0 String "PCMU;PCMA" ;
SnmpMibObject sipCfgPacketizationRate.0 Integer 20; /* twentyMilliSeconds */
SnmpMibObject sipCfgPortUserName.9 String "1000004" ;
SnmpMibObject sipCfgPortDisplayName.9 String "Pavel Datsuk" ;
SnmpMibObject sipCfgPortLogin.9 String "1000004" ;
SnmpMibObject sipCfgPortPassword.9 String "sipura" ;
SnmpMibObject sipCfgPortUserName.10 String "1000004" ;
SnmpMibObject sipCfgPortDisplayName.10 String "Pavel Datsuk" ;
SnmpMibObject sipCfgPortLogin.10 String "1000004" ;
SnmpMibObject sipCfgPortPassword.10 String "sipura" ;
MtaConfigDelimiter 255;
}
What I need is the bare minimum to get this up. Once I have a working file, I can add as I need to.
Thanks
So how did you fix the CM? It's always nice to hear some feedback as to how the fault got fixed....
The two provisioning methods are similar but with the extra step is that the MTA file is encrypted.
To encrypt the MTA config, you need the encryption program, plus MTA certificate.
The encryption script we use is called upc_enc_v0.3.pl. I am not sure how we got this script. The script does have some notes at the top about who the author was, and through some googling I once did manage to track the person down. I asked him whether it was OK to redistribute the script and he said :
"this script was developed for purely internal testing reasons and we would not like to see it being publicly available. The main reason is not so much the script itself, but more the format of the encrypted configuration files, which can be easily extracted from the script. The configuration file format specification rights are with the cable device vendor and I would therefor not agree to disclose it via this script. Whoever wants to test their cable modems with the encrypted configuration files should approach the vendor for support. They would be allowed to share that information."
So based on this I guess you would need to ask Arris to supply a script/program that was capable of encrypting the MTA config file.
The MTA certificate is supplied by Arris when you buy the modem. If the customer has brought their own to your network you might be out of luck?)
The steps to generate the encrypted file are :
# compile the MTA file as usual
docsis -p configs/001dxxxxxxxx.config compiled/001dxxxxxxxx.bin
# encrypt the file, using the MTA certificate supplied by Arris
upc_enc_v0.3.pl -i compiled/001dxxxxxxxx.bin -o encrypted/001dxxxxxxxx.bin -c CERTS/00_1D_xx_xx_xx_xx_NP.crt
Below is my working cm config file. What I need to know is, can I use GUPI ENCRYPTED MTA MAC and just skip that upc_enc_v0.3.pl step and just not encrypt the file? How would the MTA even know how to decrypt that?
Main
{
NetworkAccess 1;
MaxCPE 2;
MaxClassifiers 20;
GlobalPrivacyEnable 0;
SnmpMibObject 1.3.6.1.4.1.4115.10.1.20.0 Integer 16384 ;
SwUpgradeFilename "TS070563_092012_NA.MODEL_7_8.SIP.img";
SwUpgradeServer 10.0.0.1;
SnmpMibObject enterprises.4115.1.3.3.1.2.3.6.0 Integer 10 ; /* Provisioning method indicator gupi encrypted mta */
SnmpMibObject arrisCmDoc30AccessHttpPwCtrl.0 Integer 0 ; /* arrisCmDoc30AccessHttpPwCtrl */
SnmpMibObject 1.3.6.1.4.1.4115.1.3.4.1.2.6.0 Integer 1 ; /* arrisCmDoc30AccessHttpWan */
/* IF THESE NEXT TWO LINES ARE ON, THEY WON'T LET THE HTTP WAN ACCESS 3.0 WORK. */
/* SnmpMibObject enterprises.4115.1.3.1.1.2.3.5.4.0 Integer 3 ; */ /* WAN access to GUI */
/* SnmpMibObject enterprises.4115.1.3.1.1.2.3.5.3.0 Integer 3 ; */ /* LAN access to GUI */
MfgCVCData 0x308203a63082028ea00302010202106c0943ec39872d8fecda6c489e5e9030300d06092a864886f70d0101050500308197310b300906035504061302555331393037060355040a133044617461204f766572204361626c65205365727669636520496e746572666163652053706563696669636174696f6e7331153013060355040b130c4361626c65204d6f64656d73313630340603550403132d444f43534953204361626c65204d6f64656d20526f6f7420436572746966696361746520417574686f72697479301e170d3031303931323030303030305a170d3133303931313233353935395a306a310b300906035504061302555331223020060355;
MfgCVCData 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;
MfgCVCData 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;
MfgCVCData 0x0f4cf1bef41c9c58ef166582b5e7f1aa1afcd7badeb7b0097845c2d95ee89f66767f3bc080c2994e8c39ca9f22bcc22151ba9221b7ca87e81fdad3fcf48feb61c739ec751ac00afacd88ccc99d11ee6a96c5a591f625875ed7af60460e7330dee05ec183d1717af3f2702df0253fd1a49cbca6a654b37cb7846f91c11e3a83d1e68c28aa25a35d9849393b009b9a5328e5729017d35bb841d62f950007ba7d73e2fff4e14d0f3a49193805495714811b;
ClassOfService
{
ClassID 1;
MaxRateDown 10000000;
MaxRateUp 10000000;
PriorityUp 1;
PrivacyEnable 0;
}
SnmpMibObject mib-2.69.1.3.3.0 Integer 2 ; /* allow provisioning generic */
SnmpMibObject enterprises.4115.1.3.1.1.4.2.0 Integer 2 ; /* allow provisioning Arris */
/* To enable SNMP access to the modem */
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.4.1 String "C7H5N3O6" ; /* docsDevNmAccessCommunity*/
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.5.1 Integer 2; /* docsDevNmAccessControl read */
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.6.1 HexString 0x4000 ; /* docsDevNmAccessInterfaces*/
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.7.1 Integer 4; /* docsDevNmAccessStatus createAndGo */
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.4.2 String "C11H17N2O2SNa" ; /* docsDevNmAccessCommunity*/
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.5.2 Integer 3; /* docsDevNmAccessControl readWrite */
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.6.2 HexString 0x4000 ; /* docsDevNmAccessInterfaces*/
SnmpMibObject 1.3.6.1.2.1.69.1.2.1.7.2 Integer 4; /* docsDevNmAccessStatus createAndGo */
}
provisioning method 10 gupi mac encrypted expects the config to be encrypted it will not accept an unencrypted one.
to do it simply set the provisioning method to 4 (gupi) and add the following lines to your dhcpd.conf file for the MTA
option tftp-server-name "ip of your tftp server";
# this sets the filename for the mta to download to the mac address of the mta.bin (exactly like gupi mac)
filename = concat (suffix (concat ("0", binary-to-ascii (16, 8, "", substring (hardware, 1, 1))),2), "", suffix (concat ("0", binary-to-ascii (16, 8, "", substring (hardware, 2, 1))),2), "", suffix (concat ("0", binary-to-ascii (16, 8, "", substring (hardware, 3, 1))),2), "", suffix (concat ("0", binary-to-ascii (16, 8, "", substring (hardware, 4, 1))),2), "", suffix (concat ("0", binary-to-ascii (16, 8, "", substring (hardware, 5, 1))),2), "", suffix (concat ("0", binary-to-ascii (16, 8, "", substring (hardware, 6, 1))),2),".bin");
next-server ip of your tftp server;