cc/td/doc/product/rtrmgmt/isc/5_0_1
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Numerics - A - B - C - D - E - F - H - I - L - M - N - O - P - R - S - T - U - V -

Index

Numerics

6VPE

IPv6 and 6VPE support in MPLS VPN 4-1

overview 4-1

A

access domains

creating 2-12

management 12-11

access ports 12-11

addresses

address space and routing separation D-8

address space separation D-8

IP addresses 5-2

address pools, creating IPv4 address pools 2-16

audience, for guide xi

auditing

configuration audit 6-29

MPLS VPN service requests 4-10

performing a configuration audit 6-30

performing a functional audit 6-28

service requests 6-28

where to find a configuration audit 6-30

where to find a functional audit 6-29

why a configuration audit could fail 6-30

why a functional audit could fail 6-29

authentication D-13

autonomous systems

benefits 13-2

exchanging VPN routing information 13-4

overview 13-1

routing between autonomous systems 13-3

routing between subautonomous systems in a confederation 13-8

spanning multiple autonomous systems 13-1

using ISC to span multiple autonomous systems 13-9

using templates to support inter-autonomous system solutions 13-11

B

BGP

multipath load sharing and maximum path configuration 5-32

protocol 5-18

C

cable services

benefits of cable MPLS VPNs 10-1

cable MPLS VPN network 10-2

cable VPN configuration overview 10-4

cable VPN interfaces and subinterfaces 10-5

creating a cable subinterface service request 10-6

creating cable link service requests 10-10

creating the service requests 10-6

management VPN in the cable network 10-3

overview of MPLS VPN cable services 10-1

provisioning cable services 10-1

provisioning cable services in ISC 10-5

carrier supporting carrier (see CSC) 11-1

CERCs, creating 2-28

CE routing communities (see CERCs) D-6

CEs

defining a CE as an MCE 9-8

giving only default routes to CE 5-12

managed CE routers 9-2

specifying interface parameters 5-4

unmanaged CE routers 9-1

CLEs, adding a CLE to a service request 6-24

configlets

overview A-1

sample configlets A-1

viewing configlets generated by a service request 6-31

viewing configlets generated by the MPLS VPN service request 6-12

viewing configlets on IOS XR devices 6-32

VRF-related configlets 4-3

configuration audit 6-29

performing a configuration audit 6-30

where to find a configuration audit 6-30

why a configuration audit could fail 6-30

configuration files, editing 6-33

configurations, collecting 2-4

configuring, ETTH 12-12

copying, VRF objects 3-5

CPEs, creating 2-8

creating

access domains 2-12

cable link service requests 10-10

cable subinterface service requests 10-6

CERCs 2-28

CPEs 2-8

customers 2-8

custom reports 14-6

device groups 2-6

devices 2-2

IPv4 address pools 2-16

logical devices 2-3

MCE service requests 9-10

MPLS VPN PE-CE service requests 7-8

MPLS VPNs 2-22

multicast pools 2-16

multicast VPNs 2-25

MVRFCE PE-CE service policies 8-4

MVRFCE PE-CE service requests 8-7, 8-8

MVRFCE PE-noCE service requests 8-13

new VRF objects 3-2

PE-CE service policies 7-4

PE-CE service requests 7-8

PE-noCE service policies 7-6, 8-6

PE-noCE service requests 7-12

PEs 2-11

providers 2-10

regions 2-10

resource pools 2-15

route distinguisher pools 2-17

route target pools 2-18

site of origin pools 2-19

sites 2-8

unmanaged MVRFCEs 8-18

VC ID pools 2-20

VLAN pools 2-21

VPNs 2-22

CSC

backbone network with BGP/MPLS VPN service provider customer carrier 11-3

backbone network with ISP customer carrier 11-1

defining CSC service policies 11-5

IPv4 BGP label distribution 11-4

ISC configuration options 11-4

LDP/IGP 11-4

overview 11-1

provisioning 11-1, 11-5

service requests 11-5

support for 5-12

customers, creating 2-8

D

defining

CSC service policies 11-5

MPLS VPN service policies 5-2

VPN for the PE-CE link 7-3

VPNs 2-22

VRF and VPN information 5-29

VRF service requests 3-11

deleting

VRF objects 3-10

VRF service requests 3-14

deploying

service requests 6-25

VRF service requests 3-14

device groups, creating 2-6

devices

creating 2-2

creating logical devices 2-3

how ISC accesses network devices 6-5

setting up for IOS XR support 2-6

documentation xii

documentation, organization xi

E

editing

configuration files 6-33

multi-VRF edit mode 3-7

PEs 2-12

service policies 5-1

single-VRF edit mode 3-7

EIGRP, protocol 5-24

encapsulation

interface types and their corresponding encapsulations 5-6

Ethernet-to-the-home (see ETTH) 12-9

ETTH

configuring 12-12

implementation 12-11

overview 12-9

F

full mesh, configurations D-8

functional audit 6-28

performing a functional audit 6-28

where to find a functional audit 6-29

why a functional audit could fail 6-29

H

hub and spoke, configurations D-7

I

IGM, with MVR 12-11

independent VRF management 3-1

independent VRF management, overview of 3-1

inter-AS

10B hybrid model 13-11

creating templates for 13-12

RT-rewrite 13-12

interfaces

interface types and their corresponding encapsulations 5-6

intranets and extranets D-2

IOS

comparison of IOS and IOS XR 4-3

comparison of IOS and IOS XR device configlets 4-3

IOS XR

comparison of IOS and IOS XR 4-3

comparison of IOS and IOS XR device configlets 4-3

multicast routing on IOS XR devices 4-6

viewing configlets on IOS XR devices 6-32

IP addresses 5-2

resolution of D-15

specifying the IP address scheme 5-8

IPv4, routing information 6-13

IPv6 4-1

interface-related configlets 4-4

inventory and device management 4-7

IPv6 and 6VPE features not supported in ISC 5.0.1 4-10

IPv6 and 6VPE support in MPLS VPN 4-1

ISC and MPLS VPN updates to support IPv6 and 6VPE 4-7

overview 4-1

routing information 6-14

using EIGRP as the PE-CE routing protocol 4-5

using OSPF as the PE-CE routing protocol 4-4

using static as the PE-CE routing protocol 4-5

VPN creation and configuration 4-8

VPN provider edge router (6VPE) 4-2

VRF object support 4-8

ISC

overview of services 2-1

service activation 1-1

setting up services for 2-1

L

label spoofing D-12

LDP authentication D-13

links

adding PE-CE links to management VPNs 9-15

defining a VPN for the PE-CE link 7-3

MPLS VPN PE-CE link overview 7-1

MVRFCE PE-CE link overview 8-1

provisioning multi-VRFCE PE-CE links 8-1

provisioning regular PE-CE links 7-1

logs, monitoring task logs 2-5

loopback, using existing loopback interface number 5-10

M

management networks

advantages of 9-6

defining CE as MCE 9-8

implementation techniques 9-4

management CE (MCE) 9-5

management PE (MPE) 9-5

management VPN 9-5

out-of-band technique 9-7

overview 9-1

provisioning a management CE in ISC 9-8

subnets 9-3

maximum path, BGP multipath load sharing and maximum path configuration 5-32

MCEs

creating MCE service requests 9-10

defining a CE as an MCE 9-8

modifying

deployed VRF objects 3-9

non-deployed VRF objects 3-7

VRF service requests 3-14

monitoring

service requests 6-27

task logs 2-5

MP-BGP security features D-14

MPLS reports (see reports) 14-1

MPLS VPNs 4-9

concepts D-1

creating 2-22

getting started 1-1

overview of MPLS VPN cable services 10-1

policies 1-2

prerequisites 1-1

prerequisite tasks 7-2

reports 4-10

security D-8

service policies 5-1

service provisioning 4-8

service request auditing 4-10

service requests 1-2, 6-1

service requests (see also service requests) 4-9

topology example 6-6

multicast, creating multicast VPNs 2-25

multicast pools, creating 2-16

multicast routing, on IOS XR devices 4-6

multipath

BGP multipath load sharing and maximum path configuration 5-32

multi-VRF, creating a service request for 6-15

multi-VRFCEs (see MVRFCEs) 8-1

MVRFCEs

creating an unmanaged MVRFCE 8-18

creating MVRFCE PE-CE service policies 8-4

creating MVRFCE PE-CE service requests 8-7, 8-8

creating MVRFCE PE-noCE service requests 8-13

defining VPN for MVRFCE PE-CE links 8-3

MVRFCE PE-CE link overview 8-1

prerequisite tasks for 8-3

provisioning MVRFCE PE-CE links 8-1

N

networks

backbone networks with BGP/MPLS VPN service provider customer carrier 11-3

backbone networks with ISP customer carrier 11-1

full mesh D-8

hub and spoke D-7

label spoofing D-12

management network subnets 9-3

overview of the ISC management network 9-1

resistance to attacks D-10

topology 7-2, 8-2

NPC ring topology 12-1

configuring 12-5

creating ring of three PE-CLEs 12-2

overview 12-1

O

OSPF, protocol 5-21

out-of-band technique 9-7

P

PEs

creating 2-11

creating a PE-only service request 6-20

editing 2-12

specifying interface parameters 5-4

prerequisites, for MPLS VPN 7-2

protocols

BGP 5-18

EIGRP 5-24

for cable services 5-28

OSPF 5-21

RIP 5-14

setting static routing protocol Attributes (for IPv4 and IPv6) 6-13

static protocol chosen 5-12

providers, creating 2-10

provisioning

cable services 10-1

cable services in ISC 10-5

CSC 11-1

management CEs in ISC 9-8

management VPN 9-1

multiple devices 12-1

MVRFCE PE-CE links 8-1

regular PE-CE links 7-1

PVLAN (protected ports) 12-11

R

regions, creating 2-10

related documentation xii

reports

6VPE supported devices report 14-6

accessing MPLS reports 14-1

creating custom reports 14-6

generating MPLS reports 14-1

MPLS PE service report 14-3

MPLS service request report 14-4

MPLS service request report - 6VPE 14-5

MPLS VPNs 4-10

overview 14-1

running reports 14-2

residential service 12-15

policy for residential services over shared VLAN 12-16

resource pools 4-8

creating 2-15

overview 2-15

ring topology (see NPC ring topology) 12-1

RIP, protocol 5-14

route distinguisher pools, creating 2-17

route distinguishers D-5

routes

giving only default routes to CE 5-12

redistribution of IP routes 5-12

route target communities D-6

route target pools, creating 2-18

route targets D-5

routing

authentication D-13

IPv4 routing information 6-13

IPv6 routing information 6-14

separation D-9

routing protocols

securing D-10

specifying the routing protocol for a service 5-11

S

searching

for VRF objects in the ISC repository 3-7

for VRF service requests 3-15

security

address space and routing separation D-8

address space separation D-8

ensuring VPN isolation D-15

hiding the MPLS core structure D-9

IP address resolution D-15

label spoofing D-12

LDP authentication D-13

MP-BGP security features D-14

of MPLS VPNs D-8

PE-CE interface D-12

resistance to attacks D-10

routing authentication D-13

routing separation D-9

securing the MPLS core D-12

securing the routing protocol D-10

separation of CE-PE links D-13

trusted devices D-12

service activation of ISC 1-1

service policies 4-9

creating a PE-CE service policy 7-4

creating a PE-noCE service policy 7-6

creating MPLS VPN PE-CE service policies 7-3

creating MVRFCE PE-CE service policies 8-4

creating PE-noCE service policies 8-6

CSC 11-5

defining 5-2

editing 5-1

MPLS VPN 4-9

MPLS VPNs 5-1

overview 5-1

PE-CE service policy overview 7-3

service provisioning, MPLS VPN 4-8

service requests

adding a CLE to a service request 6-24

auditing 6-28

cable services 10-6

creating a cable subinterface service request 10-6

creating a multi-VRF service request 6-15

creating an MPLS VPN PE-CE service request 6-7

creating a PE-only service request 6-20

creating cable link service requests 10-10

creating MCE service requests 9-10

creating MPLS VPN PE-CE service requests 7-8

creating MVRFCE PE-CE service requests 8-7, 8-8

creating MVRFCE PE-noCE service requests 8-13

creating PE-CE service requests 7-8

creating PE-noCE service requests 7-12

CSC 11-5

decommissioning service requests with added templates 6-37

deploying 6-25

examples of creating MPLS VPN service requests 6-5

monitoring 6-27

MPLS VPNs 4-9, 6-1

overview 6-1

residential services 12-18

state transition paths for ISC service requests C-1

summary of states 6-3

transition states 6-1, C-1

user operations on 6-4

viewing configlets generated by a service request 6-31

viewing configlets generated by the MPLS VPN service request 6-12

services, enhancements for 6-5

setting up, devices for IOS XR support 2-6

site of origin pools, creating 2-19

sites, creating 2-8

specifying

IP address scheme 5-8

PE and CE interface parameters 5-4

routing protocol for a service 5-11

states, transitions of 6-1

static

static protocol 5-12

static, setting static routing protocol Attributes (for IPv4 and IPv6) 6-13

T

templates

creating inter-AS templates 13-12

decommissioning service requests with added templates 6-37

using templates to support inter-autonomous system solutions 13-11

viewing templates from the service requests window 6-35

topology

example of MPLS VPN topology 6-6

networks 8-2

network topology 7-2

transition states of service requests C-1

troubleshooting

common provisioning issues B-2

frequently asked questions B-5

general troubleshooting guidelines B-2

MPLS VPN and layer 2 VPN B-5

MPLS VPN provisioning workflow B-1

MPLS VPNs B-1

terms defined B-2

trusted devices D-12

U

unique route distinguisher, enabling for a VPN 2-27

V

VC ID pools, creating 2-20

VLAN pools, creating 2-21

VPN routing and forwarding tables (see also VRFs) D-3

VPNs

adding PE-CE links to management VPNs 9-15

benefits of cable MPLS VPNs 10-1

connectivity between VPNs D-13

creating 2-22

creating and configuring on IPv6 devices 4-8

defining 2-22

defining a VPN for the PE-CE link 7-3

defining VRF and VPN information 5-29

enabling a unique route distinguisher for a VPN 2-27

ensuring VPN isolation D-15

issues regarding access to VPNs 9-4

provisioning management VPN 9-1

troubleshooting B-1

VPN routing and forwarding tables D-3

VRFs

copying a VRF object 3-5

creating a new VRF object 3-2

decommissioning and deleting VRF service requests 3-14

defining VRF and VPN information 5-29

defining VRF service requests 3-11

deleting VRF objects 3-10

deleting VRF objects associated with VRF service requests 3-10

deploying VRF service requests 3-14

implementation D-4

independent VRF management 3-1

independent VRF object management D-5

migrating existing MPLS VPN service requests to the VRF object model 3-21

modifying deployed VRF objects 3-9

modifying non-deployed VRF objects 3-7

modifying VRF service requests 3-14

multi-VRF edit mode 3-7

overview of VRF service requests 3-11

relationship of VRF object and service requests and PE device 3-16

searching for MPLS VPN service requests by VRF object name 3-20

searching for VRF objects in the ISC repository 3-7

searching for VRF service requests by VRF object name 3-15

single-VRF edit mode 3-7

specifying VRF objects within MPLS VPN service policies 3-20

specifying VRF objects within MPLS VPN service requests 3-16

using a VRF object in an MPLS service request 3-19

using VRFs with MPLS VPN service requests and policies 3-16

viewing the configlet generated by a deployed VRF service request 3-15

VRF instance D-5

VRF object support for IPv6 4-8

VRF-related configlets 4-3

working with VRF objects 3-2

working with VRF service requests 3-11


hometocprevnextglossaryfeedbacksearchhelp

Posted: Mon Feb 18 15:01:57 PST 2008
All contents are Copyright © 1992--2008 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.