
{"id":12789,"date":"2026-03-11T05:55:14","date_gmt":"2026-03-11T05:55:14","guid":{"rendered":"https:\/\/developer.rdkcentral.com\/documentation\/?page_id=12789"},"modified":"2026-03-11T05:58:49","modified_gmt":"2026-03-11T05:58:49","slug":"advanced-security","status":"publish","type":"page","link":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/","title":{"rendered":"Advanced Security"},"content":{"rendered":"\n<p>The Advanced Security component (CcspAdvSecurity) provides TR-181 parameter management interface for network security features on RDK-B devices. The component serves as the middleware interface for advanced security services, coordinating with the advanced security agent that implements device fingerprinting, safe browsing protection, network flow monitoring, and parental controls to deliver real-time threat detection and network protection capabilities.<\/p>\n\n\n\n<p>The component operates as a critical security layer in the RDK-B middleware stack, providing TR-181 parameter management for various security features while the advanced security agent handles actual threat detection and mitigation. The component enables management and configuration of device identification, malicious website blocking, network traffic analysis, and advanced parental control functionalities through a unified TR-181 interface.<\/p>\n\n\n\n<p>At the module level, the Advanced Security component implements a plugin-based architecture with separate DML modules providing TR-181 parameter support for Device Fingerprinting (network device identification and classification), Safe Browsing (malicious URL detection and blocking), Softflowd (network flow monitoring), and Advanced Parental Control (content filtering and access control). The actual implementation of these security features is performed by the advanced security agent. The component also provides WebConfig integration for remote configuration management and RFC (Remote Feature Control) support for enabling\/disabling security features dynamically.<\/p>\n\n\n\n<div class=\"wp-block-merpress-mermaidjs diagram-source-mermaid\"><pre class=\"mermaid\">graph LR\n    subgraph \"External Systems\"\n        RemoteMgmt[\"Remote Management\"]\n        LocalUI[\"Local Web UI\"]\n    end\n\n    subgraph \"RDK-B Platform\"\n        subgraph \"Remote Management Agents\"\n            ProtocolAgents[\"TR-069\/WebPA\/TR-369&lt;br\/>Protocol Agents\"]\n        end\n        \n        AdvSec[\"CcspAdvSecurity&lt;br\/>(Advanced Security)\"]\n        \n        subgraph \"RDK-B Core Components\"\n            PSM[\"PSM\"]\n            CR[\"Component Registry\"]\n            WebConfig[\"WebConfig\"]\n            DeviceMgr[\"Device Manager\"]\n        end\n        \n        SecurityAgent[\"Advanced Security Agent&lt;br\/>(Security Enforcement)\"]\n        \n        subgraph \"System Layer\"\n            Netfilter[\"Netfilter\/iptables\"]\n            Linux[\"Linux Kernel\"]\n        end\n    end\n\n    RemoteMgmt -->|TR-069\/WebPA| ProtocolAgents\n    LocalUI -->|HTTP\/HTTPS| ProtocolAgents\n    ProtocolAgents -->|IPC| AdvSec\n    \n    AdvSec -->|IPC| PSM\n    AdvSec -->|IPC| CR\n    AdvSec -->|IPC| WebConfig\n    AdvSec -->|IPC| DeviceMgr\n    AdvSec &lt;-->|IPC\/Sockets| SecurityAgent\n    \n    SecurityAgent &lt;-->|Policy| Netfilter\n    SecurityAgent &lt;-->|System Calls| Linux\n\n    classDef external fill:#fff3e0,stroke:#ef6c00,stroke-width:2px;\n    classDef advSec fill:#e3f2fd,stroke:#1976d2,stroke-width:3px;\n    classDef rdkbComponent fill:#e8f5e8,stroke:#2e7d32,stroke-width:2px;\n    classDef system fill:#fce4ec,stroke:#c2185b,stroke-width:2px;\n\n    class RemoteMgmt,LocalUI external;\n    class AdvSec advSec;\n    class ProtocolAgents,PSM,CR,WebConfig,DeviceMgr rdkbComponent;\n    class SecurityAgent,Netfilter,Linux system;<\/pre><\/div>\n\n\n\n<p><strong>Key Features &amp; Responsibilities<\/strong>:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Device Fingerprinting Interface<\/strong>: Provides TR-181 parameter interface to control network device identification and classification capabilities implemented by the advanced security agent<\/li>\n\n\n\n<li><strong>Safe Browsing Protection Interface<\/strong>: Provides TR-181 parameter interface to control malicious website detection and blocking functionality implemented by the advanced security agent<\/li>\n\n\n\n<li><strong>Network Flow Monitoring (Softflowd) Interface<\/strong>: Provides TR-181 parameter interface to enable\/disable network traffic analysis and flow monitoring capabilities implemented by the advanced security agent<\/li>\n\n\n\n<li><strong>Advanced Parental Controls Interface<\/strong>: Provides TR-181 parameter interface to control content filtering and access control features implemented by the advanced security agent<\/li>\n\n\n\n<li><strong>RFC Feature Management<\/strong>: Provides Remote Feature Control capabilities for dynamically enabling\/disabling security features through centralized configuration management without requiring device restarts<\/li>\n\n\n\n<li><strong>WebConfig Integration<\/strong>: Supports remote configuration management through WebConfig framework, enabling cloud-based security policy updates and configuration synchronization<\/li>\n\n\n\n<li><strong>TR-181 Data Model Interface<\/strong>: Implements comprehensive TR-181 parameter support for security feature management, providing standardized access to security configuration and status information<\/li>\n\n\n\n<li><strong>Security Agent Coordination<\/strong>: Coordinates with the advanced security agent for configuration changes, status monitoring, and feature control through IPC mechanisms<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-Design\">Design<\/h3>\n\n\n\n<p>The Advanced Security component follows a layered modular design that separates policy management from enforcement mechanisms. The core design principle centers around providing a standardized TR-181 interface for security feature configuration while the advanced security agent handles actual security processing and enforcement. This separation allows for flexible deployment while maintaining consistent management interfaces across various RDK-B device types.<\/p>\n\n\n\n<p>The component implements a plugin-based architecture where each security feature (Device Fingerprinting, Safe Browsing, Softflowd, Parental Controls) is handled by dedicated DML modules with well-defined TR-181 parameter interfaces. The design ensures loose coupling between components while providing centralized configuration management and event coordination. The architecture supports both synchronous parameter operations (get\/set) and asynchronous event-driven processing for real-time security responses.<\/p>\n\n\n\n<p>North-bound interactions are handled through R-Bus\/DBus messaging for integration with other RDK-B components, WebConfig framework for cloud-based configuration management, and direct TR-181 parameter access for management systems. South-bound interactions utilize IPC mechanisms (sockets, shared memory) for communication with the advanced security agent, system calls for kernel module management, and file-based configuration for persistent settings.<\/p>\n\n\n\n<p>IPC mechanisms are designed based on platform capabilities, with R-Busbeing the preferred method for component-to-component communication on newer platforms, while maintaining DBUS compatibility for legacy systems. The design includes fail-safe mechanisms ensuring that security features degrade gracefully when the advanced security agent is unavailable, and configuration changes are validated before commitment to prevent system instability.<\/p>\n\n\n\n<p>Data persistence is achieved through a combination of syscfg for persistent configuration storage, temporary files for runtime state management, and WebConfig framework for cloud-synchronized settings. The component manages configuration versioning and provides rollback capabilities for failed configuration updates.<\/p>\n\n\n\n<div class=\"wp-block-merpress-mermaidjs diagram-source-mermaid\"><pre class=\"mermaid\">graph LR\n    subgraph \"External Systems\"\n        SecurityAgent[\"Advanced Security Agent&lt;br\/>(Security Enforcement)\"]\n    end\n\n    subgraph \"CcspAdvSecurity\"\n        subgraph \"Core Engine\"\n            SSPMain[SSP Main Engine]\n            DMLHandler[DML Handler]\n            WebConfigInteg[WebConfig Handler]\n        end\n        \n        subgraph \"Security Features\"\n            Fingerprint[Device Fingerprinting]\n            SafeBrowsing[Safe Browsing]\n            Softflowd[Softflowd]\n            ParentalCtrl[Parental Controls]\n        end\n    end\n\n    subgraph \"RDK-B Components\"\n        PSM[(PSM Storage)]\n        CR[Component Registry]\n        WebConfig[WebConfig Framework]\n    end\n\n    SecurityAgent &lt;-->|IPC Sockets| Fingerprint\n    SecurityAgent &lt;-->|IPC Sockets| SafeBrowsing\n    SecurityAgent &lt;-->|IPC Sockets| Softflowd\n    SecurityAgent &lt;-->|IPC Sockets| ParentalCtrl\n    \n    SSPMain --> DMLHandler\n    DMLHandler --> Fingerprint\n    DMLHandler --> SafeBrowsing\n    DMLHandler --> Softflowd\n    DMLHandler --> ParentalCtrl\n    WebConfigInteg --> DMLHandler\n    \n    SSPMain -->|IPC| CR\n    DMLHandler -->|Config Storage| PSM\n    WebConfigInteg -->|Cloud Config| WebConfig\n\n    classDef external fill:#fff3e0,stroke:#ef6c00,stroke-width:2px;\n    classDef core fill:#e3f2fd,stroke:#1976d2,stroke-width:2px;\n    classDef features fill:#c8e6c9,stroke:#388e3c,stroke-width:2px;\n    classDef rdkbComp fill:#e8f5e8,stroke:#2e7d32,stroke-width:2px;\n\n    class SecurityAgent external;\n    class SSPMain,DMLHandler,WebConfigInteg core;\n    class Fingerprint,SafeBrowsing,Softflowd,ParentalCtrl features;\n    class PSM,CR,WebConfig rdkbComp;<\/pre><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-PrerequisitesandDependencies\">&nbsp;<strong>Prerequisites and Dependencies<\/strong><\/h3>\n\n\n\n<p><strong>Build-Time Flags and Configuration:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Configure Option<\/strong><\/td><td><strong>DISTRO Feature<\/strong><\/td><td><strong>Build Flag<\/strong><\/td><td><strong>Purpose<\/strong><\/td><td><strong>Default<\/strong><\/td><\/tr><tr><td><code>--enable-unitTestDockerSupport<\/code><\/td><td>N\/A<\/td><td><code>UNIT_TEST_DOCKER_SUPPORT<\/code><\/td><td>Enable Docker support for unit testing<\/td><td>Disabled<\/td><\/tr><tr><td><code>--with-ccsp-arch={arm,atom,pc,mips}<\/code><\/td><td>N\/A<\/td><td><code>CCSP_ARCH<\/code><\/td><td>Specify the CCSP board CPU platform<\/td><td>None (must be specified)<\/td><\/tr><tr><td><code>--enable-wifidcl<\/code><\/td><td>N\/A<\/td><td><code>WIFI_DATA_COLLECTION<\/code><\/td><td>Enable WiFi data collection for advanced security agent<\/td><td>Disabled<\/td><\/tr><tr><td><code>--enable-downloadmodule<\/code><\/td><td>N\/A<\/td><td><code>DOWNLOADMODULE<\/code><\/td><td>Enable downloadable module support<\/td><td>Disabled<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>RDK-B Platform and Integration Requirements<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>RDK-B Components<\/strong>: PSM (Persistent Storage Manager), Component Registry (CR), WebConfig Framework, Device Manager, System Info component<\/li>\n\n\n\n<li><strong>HAL Dependencies<\/strong>: Platform HAL for network interface management, minimum version supporting netfilter integration<\/li>\n\n\n\n<li><strong>Systemd Services<\/strong>: CcspCrSsp.service, CcspPsmSsp.service must be active before advanced security starts; network.target dependency for network availability<\/li>\n\n\n\n<li><strong>Hardware Requirements<\/strong>: Minimum 256MB RAM for agent operation, netfilter kernel support, network interface access capabilities<\/li>\n\n\n\n<li><strong>Message Bus<\/strong>: R-Busregistration for &#8220;eRT.com.cisco.spvtg.ccsp.advsecurity&#8221; namespace (newer platforms) or DBUS com.cisco.spvtg.ccsp.advsecurity (legacy platforms)<\/li>\n\n\n\n<li><strong>TR-181 Data Model<\/strong>: Device.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.* and Device.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.* parameter support<\/li>\n\n\n\n<li><strong>Configuration Files<\/strong>: \/usr\/ccsp\/advsec\/TR181-AdvSecurity.xml data model definition, \/tmp\/advsec\/ runtime configuration directories<\/li>\n\n\n\n<li><strong>Startup Order<\/strong>: Must initialize after PSM, CR, and WebConfig components; coordinates with advanced security agent after component initialization<\/li>\n<\/ul>\n\n\n\n<p><strong>Threading Model:<\/strong><\/p>\n\n\n\n<p>The Advanced Security component implements a lightweight multi-threaded architecture with event-driven processing for security feature management and agent coordination. Unlike components with extensive threading models, Advanced Security focuses on minimal threading while maintaining responsive parameter operations and agent communication.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Thread &amp; Function<\/strong><\/td><td><strong>Purpose<\/strong><\/td><td><strong>Cycle\/Timeout<\/strong><\/td><td><strong>Synchronization<\/strong><\/td><\/tr><tr><td><strong>Main Thread<\/strong><code><strong>main<\/strong>()<\/code>&nbsp;\/&nbsp;<code><strong>ssp_main<\/strong>()<\/code><\/td><td>Component initialization, TR-181 parameter processing, daemon lifecycle management<\/td><td>Event-driven message loop, signal handling, component registration, configuration loading<\/td><td>pthread signals for termination, SSP lifecycle callbacks<\/td><\/tr><tr><td><strong>Logger Thread<\/strong><code><strong>advsec_logger_th<\/strong>()<\/code><\/td><td>Device fingerprinting logging and periodic system monitoring<\/td><td>Configurable logging period (default 1440 minutes), health monitoring cycles<\/td><td><code>logMutex<\/code>&nbsp;mutex,&nbsp;<code>logCond<\/code>&nbsp;condition variable for timeout control<\/td><\/tr><tr><td><strong>Sysevent Handler Thread<\/strong><code><strong>advsec_sysevent_handler_th<\/strong>()<\/code><\/td><td>System event processing and bridge mode detection<\/td><td>Continuous event listening, 2-second polling intervals, event-driven responses<\/td><td>Event-based synchronization, sysevent file descriptor monitoring<\/td><\/tr><tr><td><strong>WebConfig Processing<\/strong>Integrated in main thread<\/td><td>Cloud configuration updates and synchronization<\/td><td>WebConfig framework callbacks, asynchronous processing<\/td><td>WebConfig framework internal synchronization<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-ComponentStateFlow\">&nbsp;Component State Flow<\/h3>\n\n\n\n<p><strong>Initialization to Active State<\/strong><\/p>\n\n\n\n<p>The Advanced Security component follows a structured initialization sequence ensuring proper dependency resolution and secure agent coordination. The component validates system prerequisites, loads configuration from persistent storage, establishes IPC connections, and coordinates with the advanced security agent lifecycle management before transitioning to active operational state.<\/p>\n\n\n\n<div class=\"wp-block-merpress-mermaidjs diagram-source-mermaid\"><pre class=\"mermaid\">sequenceDiagram\n    participant System\n    participant AdvSec as Advanced Security\n    participant PSM as PSM Storage\n    participant Agent as Advanced Security Agent\n\n    System->>AdvSec: Start Component\n    AdvSec->>AdvSec: Initialize Logging &amp; Resources\n    AdvSec->>PSM: Load Configuration\n    PSM-->>AdvSec: Configuration Data\n    AdvSec->>AdvSec: Register TR-181 Parameters\n    AdvSec->>System: Connect to R-Bus\/DBUS\n    System-->>AdvSec: IPC Established\n    AdvSec->>Agent: Coordinate with Agent\n    Agent-->>AdvSec: Agent Ready\n    AdvSec->>System: Initialization Complete\n    \n    loop Runtime\n        AdvSec->>AdvSec: Process TR-181 Requests\n        AdvSec->>Agent: Send Commands\n        Agent->>AdvSec: Status Updates\n    end<\/pre><\/div>\n\n\n\n<p><strong>Runtime State Changes and Context Switching<\/strong><\/p>\n\n\n\n<p>The component supports dynamic feature activation\/deactivation based on RFC (Remote Feature Control) settings and user configuration changes. State transitions occur when security features are enabled\/disabled, when the advanced security agent requires restart due to configuration changes, or when the system enters\/exits bridge mode.<\/p>\n\n\n\n<p><strong>State Change Triggers:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>RFC parameter changes requiring agent reconfiguration (triggers agent restart with new settings)<\/li>\n\n\n\n<li>Bridge mode activation\/deactivation (disables\/enables security features as network topology changes)<\/li>\n\n\n\n<li>Advanced security agent crashes or becomes unresponsive (triggers automatic restart procedures)<\/li>\n\n\n\n<li>WebConfig updates from cloud services (triggers validation and application of new security policies)<\/li>\n\n\n\n<li>Memory pressure conditions (triggers agent hibernation to preserve system resources)<\/li>\n<\/ul>\n\n\n\n<p><strong>Context Switching Scenarios:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Bridge Mode Context<\/strong>: Component disables all security features when device operates in bridge mode, preserving configuration for later restoration<\/li>\n\n\n\n<li><strong>Agent Recovery Context<\/strong>: When advanced security agent fails, component maintains TR-181 parameter access while attempting agent restart in background<\/li>\n\n\n\n<li><strong>Configuration Update Context<\/strong>: During WebConfig updates, component validates new configuration before committing changes and restarting affected services<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-CallFlow\">&nbsp;Call Flow<\/h3>\n\n\n\n<p><strong>Initialization Call Flow:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-merpress-mermaidjs diagram-source-mermaid\"><pre class=\"mermaid\">sequenceDiagram\n    participant Init as Initialization\n    participant AdvSec as CcspAdvSecurity\n    participant Deps as Dependencies\n\n    Init->>AdvSec: Start Component\n    AdvSec->>AdvSec: Load Configuration\n    AdvSec->>Deps: Register TR-181 &amp; Connect\n    Deps-->>AdvSec: Ready\n    AdvSec->>Deps: Coordinate with Agent\n    Deps-->>AdvSec: Agent Active\n    AdvSec->>Init: Component Active<\/pre><\/div>\n\n\n\n<p><strong>Request Processing Call Flow:<\/strong><\/p>\n\n\n\n<p>The most critical flow involves TR-181 parameter operations that trigger security feature configuration changes and agent interactions.<\/p>\n\n\n\n<div class=\"wp-block-merpress-mermaidjs diagram-source-mermaid\"><pre class=\"mermaid\">sequenceDiagram\n    participant Client as Management Client\n    participant AdvSec as Advanced Security\n    participant Agent as Advanced Security Agent\n\n    Client->>AdvSec: Set Parameter (SafeBrowsing.Enable)\n    AdvSec->>AdvSec: Validate Parameter\n    AdvSec->>Agent: Apply Configuration\n    Agent-->>AdvSec: Configuration Applied\n    AdvSec-->>Client: Success\n    \n    Agent->>AdvSec: Feature Status Update\n    AdvSec->>AdvSec: Update Internal State<\/pre><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"AdvancedSecurity-TR\u2011181DataModels\">TR\u2011181 Data Models<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-SupportedTR-181Parameters\">Supported TR-181 Parameters<\/h3>\n\n\n\n<p>The Advanced Security component implements vendor-specific TR-181 parameters under the Device.DeviceInfo.X_RDKCENTRAL-COM namespace, providing comprehensive management interfaces for advanced security features. The implementation follows BBF TR-181 specification guidelines for parameter structure, access controls, and data validation while extending functionality for RDK-B specific security requirements.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-ObjectHierarchy\"><br>Object Hierarchy<\/h3>\n\n\n\n<pre class=\"EnlighterJSRAW\" data-enlighter-language=\"generic\" data-enlighter-theme=\"\" data-enlighter-highlight=\"\" data-enlighter-linenumbers=\"\" data-enlighter-lineoffset=\"\" data-enlighter-title=\"\" data-enlighter-group=\"\">Device.\n\u2514\u2500\u2500 DeviceInfo.\n    \u251c\u2500\u2500 X_RDKCENTRAL-COM_DeviceFingerPrint.\n    \u2502   \u251c\u2500\u2500 Enable (boolean, R\/W)\n    \u2502   \u251c\u2500\u2500 LoggingPeriod (unsignedInt, R\/W)\n    \u2502   \u251c\u2500\u2500 EndpointURL (string, R\/W)\n    \u2502   \u2514\u2500\u2500 LogLevel (unsignedInt, R\/W)\n    \u251c\u2500\u2500 X_RDKCENTRAL-COM_AdvancedSecurity.\n    \u2502   \u251c\u2500\u2500 Data (string, W)\n    \u2502   \u251c\u2500\u2500 SafeBrowsing.\n    \u2502   \u2502   \u251c\u2500\u2500 Enable (boolean, R\/W)\n    \u2502   \u2502   \u251c\u2500\u2500 ConfigVersion (unsignedInt, R\/W)\n    \u2502   \u2502   \u251c\u2500\u2500 RouterIP (string, R)\n    \u2502   \u2502   \u251c\u2500\u2500 DNSServerIP (string, R)\n    \u2502   \u2502   \u251c\u2500\u2500 Blockpage (string, R)\n    \u2502   \u2502   \u251c\u2500\u2500 Warnpage (string, R)\n    \u2502   \u2502   \u251c\u2500\u2500 Cacheurl (string, R)\n    \u2502   \u2502   \u2514\u2500\u2500 OtmDedupFqdn (string, R)\n    \u2502   \u251c\u2500\u2500 Softflowd.\n    \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n    \u2502   \u2514\u2500\u2500 RabidFramework.\n    \u2502       \u251c\u2500\u2500 MacCacheSize (unsignedInt, R\/W)\n    \u2502       \u2514\u2500\u2500 DnsCacheSize (unsignedInt, R\/W)\n    \u2514\u2500\u2500 X_RDKCENTRAL-COM_RFC.\n        \u251c\u2500\u2500 Feature.\n        \u2502   \u251c\u2500\u2500 AdvancedParentalControl.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 PrivacyProtection.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 DeviceFingerPrintICMPv6.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 WSDiscoveryAnalysis.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 AdvancedSecurityOTM.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 AdvancedSecurityUserSpace.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 AdvancedSecurityCujoTracer.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 AdvancedSecurityCujoTelemetry.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 AdvancedSecurityWiFiDataCollection.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 AdvancedSecurityLevl.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u251c\u2500\u2500 AdvancedSecurityAgent.\n        \u2502   \u2502   \u2514\u2500\u2500 Enable (boolean, R\/W)\n        \u2502   \u2514\u2500\u2500 AdvancedSecuritySafeBrowsing.\n               \u2514\u2500\u2500 Enable (boolean, R\/W)\n<\/pre>\n\n\n\n<p><strong>Parameter Definitions<\/strong><\/p>\n\n\n\n<p><strong>Core Parameters:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Parameter<\/strong> <strong>Path<\/strong><\/td><td><strong>Data Type<\/strong><\/td><td><strong>Access<\/strong><\/td><td><strong>Default Value<\/strong><\/td><td><strong>Description<\/strong><\/td><td><strong>BBF Compliance<\/strong><\/td><\/tr><tr><td><code><strong>Device<\/strong>.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.Enable<\/code><\/td><td>boolean<\/td><td>R\/W<\/td><td><code>false<\/code><\/td><td>Enables or disables device fingerprinting functionality. When enabled, the system analyzes network traffic patterns to identify and classify connected devices automatically. Valid values: true (enabled), false (disabled).<\/td><td>TR-181 Issue 2<\/td><\/tr><tr><td><code><strong>Device<\/strong>.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.LoggingPeriod<\/code><\/td><td>unsignedInt<\/td><td>R\/W<\/td><td><code>1440<\/code><\/td><td>Specifies the logging period in minutes for device fingerprinting data collection. Range: 60-2880 minutes (1-48 hours). Controls frequency of fingerprinting data uploads to cloud services.<\/td><td>TR-181 Issue 2<\/td><\/tr><tr><td><code><strong>Device<\/strong>.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.EndpointURL<\/code><\/td><td>string<\/td><td>R\/W<\/td><td><code>\"\"<\/code><\/td><td>Defines the endpoint URL for device fingerprinting data uploads. Must be a valid HTTPS URL. Used for sending collected device classification data to cloud analytics services.<\/td><td>TR-181 Issue 2<\/td><\/tr><tr><td><code><strong>Device<\/strong>.DeviceInfo.X_RDKCENTRAL-COM_DeviceFingerPrint.LogLevel<\/code><\/td><td>unsignedInt<\/td><td>R\/W<\/td><td><code>3<\/code><\/td><td>Controls logging verbosity for device fingerprinting module. Valid values: 1 (Error), 2 (Warning), 3 (Info), 4 (Verbose). Higher values produce more detailed logging output.<\/td><td>TR-181 Issue 2<\/td><\/tr><tr><td><code><strong>Device<\/strong>.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.SafeBrowsing.Enable<\/code><\/td><td>boolean<\/td><td>R\/W<\/td><td><code>false<\/code><\/td><td>Enables or disables safe browsing protection. When enabled, system blocks access to malicious websites and provides warning pages for suspicious content. Requires active security agent.<\/td><td>TR-181 Issue 2<\/td><\/tr><tr><td><code><strong>Device<\/strong>.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity.Softflowd.Enable<\/code><\/td><td>boolean<\/td><td>R\/W<\/td><td><code>false<\/code><\/td><td>Enables or disables network flow monitoring via softflowd daemon. When enabled, collects network flow statistics for security analysis and anomaly detection.<\/td><td>TR-181 Issue 2<\/td><\/tr><tr><td><code><strong>Device<\/strong>.DeviceInfo.X_RDKCENTRAL-COM_RFC.Feature.AdvancedParentalControl.Enable<\/code><\/td><td>boolean<\/td><td>R\/W<\/td><td><code>false<\/code><\/td><td>RFC parameter controlling advanced parental control features. When enabled, allows content filtering and access restrictions based on device, time, and content category policies.<\/td><td>Custom Extension<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"AdvancedSecurity-InternalModules\">Internal Modules<\/h2>\n\n\n\n<p>The Advanced Security component consists of several specialized modules that handle different aspects of security functionality. Each module operates independently while sharing common infrastructure for configuration management and agent communication. The DML (Data Model Library) modules handle TR-181 parameter operations, while the SSP (Service Support Provider) module manages component lifecycle and IPC communications.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Module\/Class<\/strong><\/td><td><strong>Description<\/strong><\/td><td><strong>Key Files<\/strong><\/td><\/tr><tr><td>AdvSecurityDml<\/td><td>Core TR-181 parameter handling and security feature management. Implements all DML functions for device fingerprinting, safe browsing, and parental controls. Handles parameter validation, persistence, and agent coordination.<\/td><td><code>cosa_adv_security_dml.c<\/code>,&nbsp;<code><strong>cosa_adv_security_dml<\/strong>.h<\/code><\/td><\/tr><tr><td>AdvSecuritySsp<\/td><td>Service Support Provider for component lifecycle management. Handles process initialization, R-Bus\/DBUS registration, message bus interface, and component shutdown procedures.<\/td><td><code>ssp_main.c<\/code>,&nbsp;<code>ssp_messagebus_interface.c<\/code>,&nbsp;<code><strong>ssp_global<\/strong>.h<\/code><\/td><\/tr><tr><td>WebConfigModule<\/td><td>WebConfig framework integration for cloud-based configuration management. Handles remote configuration updates, version management, and configuration validation for security features.<\/td><td><code>cosa_adv_security_webconfig.c<\/code>,&nbsp;<code><strong>cosa_adv_security_webconfig<\/strong>.h<\/code><\/td><\/tr><tr><td>InternalHelpers<\/td><td>Utility functions for security operations including parameter validation, URL checking, security agent communication, and system state management.<\/td><td><code>cosa_adv_security_internal.c<\/code>,&nbsp;<code><strong>cosa_adv_security_internal<\/strong>.h<\/code>,&nbsp;<code>advsecurity_helpers.c<\/code><\/td><\/tr><tr><td>PluginMain<\/td><td>Plugin initialization and function registration interface. Registers all DML callback functions with the COSA framework and manages plugin lifecycle.<\/td><td><code>plugin_main.c<\/code>,&nbsp;<code><strong>plugin_main<\/strong>.h<\/code><\/td><\/tr><tr><td>AgentInterface<\/td><td>Interface module for communication with the advanced security agent. Handles command sending, status monitoring, and agent lifecycle management.<\/td><td><code>cujoagent_dcl_api.c<\/code>,&nbsp;<code><strong>cujoagent_dcl_api<\/strong>.h<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Component Interactions<\/strong><\/p>\n\n\n\n<p>The Advanced Security component maintains extensive interactions with both RDK-B middleware components and system-level services. It serves as a bridge between high-level security policy management and low-level security enforcement, coordinating with the advanced security agent while providing standardized TR-181 interfaces for management systems.<\/p>\n\n\n\n<p><strong>Interaction Matrix<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Target Component\/Layer<\/strong><\/td><td><strong>Interaction Purpose<\/strong><\/td><td><strong>Key APIs\/Endpoints<\/strong><\/td><\/tr><tr><td><strong>RDK-B Middleware Components<\/strong><\/td><td><\/td><td><\/td><\/tr><tr><td>PSM (Persistent Storage Manager)<\/td><td>Persistent parameter storage and retrieval, configuration backup\/restore<\/td><td><code>PSM_Set_Record_Value2()<\/code>,&nbsp;<code>PSM_Get_Record_Value2()<\/code><\/td><\/tr><tr><td>Component Registry (CR)<\/td><td>Component registration, namespace reservation, capability announcement<\/td><td><code>CcspBaseIf_registerCapabilities()<\/code>,&nbsp;<code>CcspBaseIf_unregisterComponent()<\/code><\/td><\/tr><tr><td>WebConfig Framework<\/td><td>Remote configuration management, cloud policy updates<\/td><td><code><strong>webconfig_subdoc_register<\/strong>()<\/code>,&nbsp;<code><strong>webconfig_apply_config<\/strong>()<\/code><\/td><\/tr><tr><td>Device Manager<\/td><td>Device information queries, TR-069 parameter forwarding<\/td><td>R-Busmethod calls:&nbsp;<code><strong>Device<\/strong>.DeviceInfo.*<\/code><\/td><\/tr><tr><td><strong>System &amp; HAL Layers<\/strong><\/td><td><\/td><td><\/td><\/tr><tr><td>Advanced Security Agent<\/td><td>Security enforcement, threat detection, policy application<\/td><td>IPC sockets:&nbsp;<code>\/var\/<strong>run<\/strong>\/cujo\/wifi.sock<\/code>&nbsp;or&nbsp;<code>\/tmp\/wifi.sock<\/code>, agent control commands<\/td><\/tr><tr><td>syscfg Configuration<\/td><td>Persistent configuration storage and system settings<\/td><td><code><strong>syscfg_get<\/strong>()<\/code>,&nbsp;<code><strong>syscfg_set<\/strong>()<\/code>,&nbsp;<code><strong>syscfg_commit<\/strong>()<\/code><\/td><\/tr><tr><td>systemd Services<\/td><td>Service lifecycle management, dependency control<\/td><td><code>systemctl&nbsp;<strong>start<\/strong>\/<strong>stop<\/strong>\/restart CcspAdvSecurity<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<p><strong>Events Published by Advanced Security Component:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Event Name<\/strong><\/td><td><strong>Event Topic\/Path<\/strong><\/td><td><strong>Trigger Condition<\/strong><\/td><td><strong>Subscriber Components<\/strong><\/td><\/tr><tr><td>Security Feature Status<\/td><td><code><strong>Device<\/strong>.DeviceInfo.X_RDKCENTRAL-COM_AdvancedSecurity<\/code><\/td><td>Feature enable\/disable state changes<\/td><td>WebUI, Device Manager, Telemetry<\/td><\/tr><tr><td>Agent Status Update<\/td><td><code><strong>eRT<\/strong>.com.cisco.spvtg.ccsp.advsecurity.agent.status<\/code><\/td><td>Security agent startup\/shutdown, health status changes<\/td><td>System Monitor, Telemetry Agent<\/td><\/tr><tr><td>Configuration Change<\/td><td><code><strong>eRT<\/strong>.com.cisco.spvtg.ccsp.advsecurity.config<\/code><\/td><td>TR-181 parameter modifications, RFC feature toggles<\/td><td>PSM, Configuration Management<\/td><\/tr><tr><td>Security Event<\/td><td><code><strong>eRT<\/strong>.com.cisco.spvtg.ccsp.advsecurity.security<\/code><\/td><td>Threat detection, policy violations<\/td><td>Logging, Telemetry, Notification Service<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-IPCFlowPatterns\">IPC Flow Patterns<\/h3>\n\n\n\n<p><strong>Primary IPC Flow &#8211; TR-181 Parameter Operation:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-merpress-mermaidjs diagram-source-mermaid\"><pre class=\"mermaid\">sequenceDiagram\n    participant Client as Management Client\n    participant AdvSec as Advanced Security\n    participant PSM as PSM Storage\n    participant Agent as Advanced Security Agent\n\n    Client->>AdvSec: SetParameterValues (R-Bus)\n    AdvSec->>AdvSec: Validate &amp; Access Control\n    AdvSec->>PSM: Store Parameter\n    PSM-->>AdvSec: Stored\n    AdvSec->>Agent: Apply Config (IPC Socket)\n    Agent-->>AdvSec: Applied\n    AdvSec-->>Client: Success<\/pre><\/div>\n\n\n\n<p><strong>Event Notification Flow:<\/strong><\/p>\n\n\n\n<div class=\"wp-block-merpress-mermaidjs diagram-source-mermaid\"><pre class=\"mermaid\">sequenceDiagram\n    participant Agent as Advanced Security Agent\n    participant AdvSec as Advanced Security\n    participant Subs as Subscribers\n\n    Agent->>AdvSec: Security Event (IPC)\n    AdvSec->>AdvSec: Process Event\n    AdvSec->>Subs: R-BusEvent Notification\n    Subs-->>AdvSec: Ack<\/pre><\/div>\n\n\n\n<p>Implementation Details<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-MajorHALAPIsIntegration\">Major HAL APIs Integration<\/h3>\n\n\n\n<p>The Advanced Security component primarily operates at the middleware layer and does not directly integrate with traditional HAL APIs. Instead, it relies on system-level interfaces and external security agents for hardware interaction. The component uses standard Linux system calls and library functions for network interface management and configuration access.<\/p>\n\n\n\n<p><strong>Core System APIs:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>System API<\/strong><\/td><td><strong>Purpose<\/strong><\/td><td><strong>Implementation File<\/strong><\/td><\/tr><tr><td><code>syscfg_get\/syscfg_set<\/code><\/td><td>Configuration parameter persistence and retrieval<\/td><td><code>cosa_adv_security_dml.c<\/code><\/td><\/tr><tr><td><code><strong>socket<\/strong>()<\/code>&nbsp;family<\/td><td>IPC communication with security agents<\/td><td><code>cosa_adv_security_internal.c<\/code><\/td><\/tr><tr><td><code>pthread_*<\/code><\/td><td>Multi-threading support for concurrent operations<\/td><td><code>ssp_main.c<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"AdvancedSecurity-KeyImplementationLogic\">Key Implementation Logic<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>State Machine Engine<\/strong>: The component implements a feature-based state machine where each security feature (Device Fingerprinting, Safe Browsing, Softflowd, Parental Controls) maintains independent state transitions based on configuration changes and agent status.\n<ul class=\"wp-block-list\">\n<li>Main implementation in&nbsp;<code>cosa_adv_security_dml.c<\/code>&nbsp;where DML handlers manage feature state transitions<\/li>\n\n\n\n<li>State transition handlers in&nbsp;<code>cosa_adv_security_internal.c<\/code>&nbsp;for coordinating between multiple security features<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Event Processing<\/strong>: Events are processed through the advanced security agent interface, which monitors network traffic and system events to detect security threats and policy violations.\n<ul class=\"wp-block-list\">\n<li>Advanced security agent communication through IPC sockets for real-time event processing<\/li>\n\n\n\n<li>Eventueue management using pthread condition variables for asynchronous processing<\/li>\n\n\n\n<li>Asynchronous event processing through dedicated worker threads for non-blocking operation<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Error Handling Strategy<\/strong>: Comprehensive error handling ensures system stability even when the advanced security agent fails or becomes unresponsive.\n<ul class=\"wp-block-list\">\n<li>Agent failure detection through periodic health checks and IPC timeout mechanisms<\/li>\n\n\n\n<li>Recovery mechanisms include automatic agent restart and graceful feature degradation<\/li>\n\n\n\n<li>Timeout handling and retry logic with exponential backoff for agent communication failures<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><strong>Logging &amp; Debugging<\/strong>: Multi-level logging system provides detailed information for troubleshooting security feature issues.\n<ul class=\"wp-block-list\">\n<li>Security feature state transition logging with configurable verbosity levels<\/li>\n\n\n\n<li>Agent communication tracing for debugging IPC interaction issues<\/li>\n\n\n\n<li>Debug hooks for runtime troubleshooting including memory usage monitoring and performance metrics<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><strong>Key Configuration Files<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Configuration File<\/strong><\/td><td><strong>Purpose<\/strong><\/td><td><strong>Override Mechanisms<\/strong><\/td><\/tr><tr><td><code>\/usr\/ccsp\/advsec\/TR181-AdvSecurity.xml<\/code><\/td><td>TR-181 data model definition and parameter registration<\/td><td>Version-controlled through build system, no runtime override<\/td><\/tr><tr><td><code>\/tmp\/advsec\/<\/code><\/td><td>Runtime configuration and state files directory<\/td><td>Managed by component logic, cleared on restart<\/td><\/tr><tr><td><code>\/tmp\/advsec_config_params\/<\/code><\/td><td>Device configuration parameters (MODEL, MANUFACTURER, FWVER, etc.)<\/td><td>Populated during initialization from device properties<\/td><\/tr><tr><td><code>\/tmp\/safebro.json<\/code><\/td><td>Safe browsing configuration file<\/td><td>Generated by start_adv_security.sh script<\/td><\/tr><tr><td><code>\/etc\/systemd\/system\/CcspAdvSecurity.service<\/code><\/td><td>systemd service definition<\/td><td>systemd override files in&nbsp;<code>\/etc\/systemd\/system\/CcspAdvSecurity.service.d\/<\/code><\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>The Advanced Security component (CcspAdvSecurity) provides TR-181 parameter management interface for network security features on [&hellip;]<\/p>\n","protected":false},"author":659,"featured_media":0,"parent":9575,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"class_list":["post-12789","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Advanced Security - RDK Documentation Portal | Documentation<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Advanced Security - RDK Documentation Portal | Documentation\" \/>\n<meta property=\"og:description\" content=\"The Advanced Security component (CcspAdvSecurity) provides TR-181 parameter management interface for network security features on [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/\" \/>\n<meta property=\"og:site_name\" content=\"RDK Documentation Portal | Documentation\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-11T05:58:49+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/\",\"url\":\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/\",\"name\":\"Advanced Security - RDK Documentation Portal | Documentation\",\"isPartOf\":{\"@id\":\"https:\/\/developer.rdkcentral.com\/documentation\/#website\"},\"datePublished\":\"2026-03-11T05:55:14+00:00\",\"dateModified\":\"2026-03-11T05:58:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/developer.rdkcentral.com\/documentation\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Documentation\",\"item\":\"https:\/\/developer.rdkcentral.com\/documentation\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"RDK Broadband\",\"item\":\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Components\",\"item\":\"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Advanced Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/developer.rdkcentral.com\/documentation\/#website\",\"url\":\"https:\/\/developer.rdkcentral.com\/documentation\/\",\"name\":\"RDK Documentation Portal | Documentation\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/developer.rdkcentral.com\/documentation\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Advanced Security - RDK Documentation Portal | Documentation","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/","og_locale":"en_US","og_type":"article","og_title":"Advanced Security - RDK Documentation Portal | Documentation","og_description":"The Advanced Security component (CcspAdvSecurity) provides TR-181 parameter management interface for network security features on [&hellip;]","og_url":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/","og_site_name":"RDK Documentation Portal | Documentation","article_modified_time":"2026-03-11T05:58:49+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/","url":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/","name":"Advanced Security - RDK Documentation Portal | Documentation","isPartOf":{"@id":"https:\/\/developer.rdkcentral.com\/documentation\/#website"},"datePublished":"2026-03-11T05:55:14+00:00","dateModified":"2026-03-11T05:58:49+00:00","breadcrumb":{"@id":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/advanced-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/developer.rdkcentral.com\/documentation\/"},{"@type":"ListItem","position":2,"name":"Documentation","item":"https:\/\/developer.rdkcentral.com\/documentation\/"},{"@type":"ListItem","position":3,"name":"RDK Broadband","item":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/"},{"@type":"ListItem","position":4,"name":"Components","item":"https:\/\/developer.rdkcentral.com\/documentation\/documentation\/rdk_broadband_documentation\/components\/"},{"@type":"ListItem","position":5,"name":"Advanced Security"}]},{"@type":"WebSite","@id":"https:\/\/developer.rdkcentral.com\/documentation\/#website","url":"https:\/\/developer.rdkcentral.com\/documentation\/","name":"RDK Documentation Portal | Documentation","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/developer.rdkcentral.com\/documentation\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/pages\/12789","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/users\/659"}],"replies":[{"embeddable":true,"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/comments?post=12789"}],"version-history":[{"count":2,"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/pages\/12789\/revisions"}],"predecessor-version":[{"id":12791,"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/pages\/12789\/revisions\/12791"}],"up":[{"embeddable":true,"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/pages\/9575"}],"wp:attachment":[{"href":"https:\/\/developer.rdkcentral.com\/documentation\/wp-json\/wp\/v2\/media?parent=12789"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}