|
Table Of Contents
Numerics - A - B - C - D - E - F - H - I - L - M - N - O - P - R - S - T - U - V -
Index
Numerics
6VPE
IPv6 and 6VPE support in MPLS VPN 4-1
overview 4-1
A
access domains
creating 2-12
management 12-11
access ports 12-11
addresses
address space and routing separation D-8
address space separation D-8
IP addresses 5-2
address pools, creating IPv4 address pools 2-16
audience, for guide xi
auditing
configuration audit 6-29
MPLS VPN service requests 4-10
performing a configuration audit 6-30
performing a functional audit 6-28
service requests 6-28
where to find a configuration audit 6-30
where to find a functional audit 6-29
why a configuration audit could fail 6-30
why a functional audit could fail 6-29
authentication D-13
autonomous systems
benefits 13-2
exchanging VPN routing information 13-4
overview 13-1
routing between autonomous systems 13-3
routing between subautonomous systems in a confederation 13-8
spanning multiple autonomous systems 13-1
using ISC to span multiple autonomous systems 13-9
using templates to support inter-autonomous system solutions 13-11
B
BGP
multipath load sharing and maximum path configuration 5-32
protocol 5-18
C
cable services
benefits of cable MPLS VPNs 10-1
cable MPLS VPN network 10-2
cable VPN configuration overview 10-4
cable VPN interfaces and subinterfaces 10-5
creating a cable subinterface service request 10-6
creating cable link service requests 10-10
creating the service requests 10-6
management VPN in the cable network 10-3
overview of MPLS VPN cable services 10-1
provisioning cable services 10-1
provisioning cable services in ISC 10-5
carrier supporting carrier (see CSC) 11-1
CERCs, creating 2-28
CE routing communities (see CERCs) D-6
CEs
defining a CE as an MCE 9-8
giving only default routes to CE 5-12
managed CE routers 9-2
specifying interface parameters 5-4
unmanaged CE routers 9-1
CLEs, adding a CLE to a service request 6-24
configlets
overview A-1
sample configlets A-1
viewing configlets generated by a service request 6-31
viewing configlets generated by the MPLS VPN service request 6-12
viewing configlets on IOS XR devices 6-32
VRF-related configlets 4-3
configuration audit 6-29
performing a configuration audit 6-30
where to find a configuration audit 6-30
why a configuration audit could fail 6-30
configuration files, editing 6-33
configurations, collecting 2-4
configuring, ETTH 12-12
copying, VRF objects 3-5
CPEs, creating 2-8
creating
access domains 2-12
cable link service requests 10-10
cable subinterface service requests 10-6
CERCs 2-28
CPEs 2-8
customers 2-8
custom reports 14-6
device groups 2-6
devices 2-2
IPv4 address pools 2-16
logical devices 2-3
MCE service requests 9-10
MPLS VPN PE-CE service requests 7-8
MPLS VPNs 2-22
multicast pools 2-16
multicast VPNs 2-25
MVRFCE PE-CE service policies 8-4
MVRFCE PE-CE service requests 8-7, 8-8
MVRFCE PE-noCE service requests 8-13
new VRF objects 3-2
PE-CE service policies 7-4
PE-CE service requests 7-8
PE-noCE service policies 7-6, 8-6
PE-noCE service requests 7-12
PEs 2-11
providers 2-10
regions 2-10
resource pools 2-15
route distinguisher pools 2-17
route target pools 2-18
site of origin pools 2-19
sites 2-8
unmanaged MVRFCEs 8-18
VC ID pools 2-20
VLAN pools 2-21
VPNs 2-22
CSC
backbone network with BGP/MPLS VPN service provider customer carrier 11-3
backbone network with ISP customer carrier 11-1
defining CSC service policies 11-5
IPv4 BGP label distribution 11-4
ISC configuration options 11-4
LDP/IGP 11-4
overview 11-1
service requests 11-5
support for 5-12
customers, creating 2-8
D
defining
CSC service policies 11-5
MPLS VPN service policies 5-2
VPN for the PE-CE link 7-3
VPNs 2-22
VRF and VPN information 5-29
VRF service requests 3-11
deleting
VRF objects 3-10
VRF service requests 3-14
deploying
service requests 6-25
VRF service requests 3-14
device groups, creating 2-6
devices
creating 2-2
creating logical devices 2-3
how ISC accesses network devices 6-5
setting up for IOS XR support 2-6
documentation xii
documentation, organization xi
E
editing
configuration files 6-33
multi-VRF edit mode 3-7
PEs 2-12
service policies 5-1
single-VRF edit mode 3-7
EIGRP, protocol 5-24
encapsulation
interface types and their corresponding encapsulations 5-6
Ethernet-to-the-home (see ETTH) 12-9
ETTH
configuring 12-12
implementation 12-11
overview 12-9
F
full mesh, configurations D-8
functional audit 6-28
performing a functional audit 6-28
where to find a functional audit 6-29
why a functional audit could fail 6-29
H
hub and spoke, configurations D-7
I
IGM, with MVR 12-11
independent VRF management 3-1
independent VRF management, overview of 3-1
inter-AS
10B hybrid model 13-11
creating templates for 13-12
RT-rewrite 13-12
interfaces
interface types and their corresponding encapsulations 5-6
intranets and extranets D-2
IOS
comparison of IOS and IOS XR 4-3
comparison of IOS and IOS XR device configlets 4-3
IOS XR
comparison of IOS and IOS XR 4-3
comparison of IOS and IOS XR device configlets 4-3
multicast routing on IOS XR devices 4-6
viewing configlets on IOS XR devices 6-32
IP addresses 5-2
resolution of D-15
specifying the IP address scheme 5-8
IPv4, routing information 6-13
IPv6 4-1
interface-related configlets 4-4
inventory and device management 4-7
IPv6 and 6VPE features not supported in ISC 5.0.1 4-10
IPv6 and 6VPE support in MPLS VPN 4-1
ISC and MPLS VPN updates to support IPv6 and 6VPE 4-7
overview 4-1
routing information 6-14
using EIGRP as the PE-CE routing protocol 4-5
using OSPF as the PE-CE routing protocol 4-4
using static as the PE-CE routing protocol 4-5
VPN creation and configuration 4-8
VPN provider edge router (6VPE) 4-2
VRF object support 4-8
ISC
overview of services 2-1
service activation 1-1
setting up services for 2-1
L
label spoofing D-12
LDP authentication D-13
links
adding PE-CE links to management VPNs 9-15
defining a VPN for the PE-CE link 7-3
MPLS VPN PE-CE link overview 7-1
MVRFCE PE-CE link overview 8-1
provisioning multi-VRFCE PE-CE links 8-1
provisioning regular PE-CE links 7-1
logs, monitoring task logs 2-5
loopback, using existing loopback interface number 5-10
M
management networks
advantages of 9-6
defining CE as MCE 9-8
implementation techniques 9-4
management CE (MCE) 9-5
management PE (MPE) 9-5
management VPN 9-5
out-of-band technique 9-7
overview 9-1
provisioning a management CE in ISC 9-8
subnets 9-3
maximum path, BGP multipath load sharing and maximum path configuration 5-32
MCEs
creating MCE service requests 9-10
defining a CE as an MCE 9-8
modifying
deployed VRF objects 3-9
non-deployed VRF objects 3-7
VRF service requests 3-14
monitoring
service requests 6-27
task logs 2-5
MP-BGP security features D-14
MPLS reports (see reports) 14-1
MPLS VPNs 4-9
concepts D-1
creating 2-22
getting started 1-1
overview of MPLS VPN cable services 10-1
policies 1-2
prerequisites 1-1
prerequisite tasks 7-2
reports 4-10
security D-8
service policies 5-1
service provisioning 4-8
service request auditing 4-10
service requests (see also service requests) 4-9
topology example 6-6
multicast, creating multicast VPNs 2-25
multicast pools, creating 2-16
multicast routing, on IOS XR devices 4-6
multipath
BGP multipath load sharing and maximum path configuration 5-32
multi-VRF, creating a service request for 6-15
multi-VRFCEs (see MVRFCEs) 8-1
MVRFCEs
creating an unmanaged MVRFCE 8-18
creating MVRFCE PE-CE service policies 8-4
creating MVRFCE PE-CE service requests 8-7, 8-8
creating MVRFCE PE-noCE service requests 8-13
defining VPN for MVRFCE PE-CE links 8-3
MVRFCE PE-CE link overview 8-1
prerequisite tasks for 8-3
provisioning MVRFCE PE-CE links 8-1
N
networks
backbone networks with BGP/MPLS VPN service provider customer carrier 11-3
backbone networks with ISP customer carrier 11-1
full mesh D-8
hub and spoke D-7
label spoofing D-12
management network subnets 9-3
overview of the ISC management network 9-1
resistance to attacks D-10
NPC ring topology 12-1
configuring 12-5
creating ring of three PE-CLEs 12-2
overview 12-1
O
OSPF, protocol 5-21
out-of-band technique 9-7
P
PEs
creating 2-11
creating a PE-only service request 6-20
editing 2-12
specifying interface parameters 5-4
prerequisites, for MPLS VPN 7-2
protocols
BGP 5-18
EIGRP 5-24
for cable services 5-28
OSPF 5-21
RIP 5-14
setting static routing protocol Attributes (for IPv4 and IPv6) 6-13
static protocol chosen 5-12
providers, creating 2-10
provisioning
cable services 10-1
cable services in ISC 10-5
CSC 11-1
management CEs in ISC 9-8
management VPN 9-1
multiple devices 12-1
MVRFCE PE-CE links 8-1
regular PE-CE links 7-1
PVLAN (protected ports) 12-11
R
regions, creating 2-10
related documentation xii
reports
6VPE supported devices report 14-6
accessing MPLS reports 14-1
creating custom reports 14-6
generating MPLS reports 14-1
MPLS PE service report 14-3
MPLS service request report 14-4
MPLS service request report - 6VPE 14-5
MPLS VPNs 4-10
overview 14-1
running reports 14-2
residential service 12-15
policy for residential services over shared VLAN 12-16
resource pools 4-8
creating 2-15
overview 2-15
ring topology (see NPC ring topology) 12-1
RIP, protocol 5-14
route distinguisher pools, creating 2-17
route distinguishers D-5
routes
giving only default routes to CE 5-12
redistribution of IP routes 5-12
route target communities D-6
route target pools, creating 2-18
route targets D-5
routing
authentication D-13
IPv4 routing information 6-13
IPv6 routing information 6-14
separation D-9
routing protocols
securing D-10
specifying the routing protocol for a service 5-11
S
searching
for VRF objects in the ISC repository 3-7
for VRF service requests 3-15
security
address space and routing separation D-8
address space separation D-8
ensuring VPN isolation D-15
hiding the MPLS core structure D-9
IP address resolution D-15
label spoofing D-12
LDP authentication D-13
MP-BGP security features D-14
of MPLS VPNs D-8
PE-CE interface D-12
resistance to attacks D-10
routing authentication D-13
routing separation D-9
securing the MPLS core D-12
securing the routing protocol D-10
separation of CE-PE links D-13
trusted devices D-12
service activation of ISC 1-1
service policies 4-9
creating a PE-CE service policy 7-4
creating a PE-noCE service policy 7-6
creating MPLS VPN PE-CE service policies 7-3
creating MVRFCE PE-CE service policies 8-4
creating PE-noCE service policies 8-6
CSC 11-5
defining 5-2
editing 5-1
MPLS VPN 4-9
MPLS VPNs 5-1
overview 5-1
PE-CE service policy overview 7-3
service provisioning, MPLS VPN 4-8
service requests
adding a CLE to a service request 6-24
auditing 6-28
cable services 10-6
creating a cable subinterface service request 10-6
creating a multi-VRF service request 6-15
creating an MPLS VPN PE-CE service request 6-7
creating a PE-only service request 6-20
creating cable link service requests 10-10
creating MCE service requests 9-10
creating MPLS VPN PE-CE service requests 7-8
creating MVRFCE PE-CE service requests 8-7, 8-8
creating MVRFCE PE-noCE service requests 8-13
creating PE-CE service requests 7-8
creating PE-noCE service requests 7-12
CSC 11-5
decommissioning service requests with added templates 6-37
deploying 6-25
examples of creating MPLS VPN service requests 6-5
monitoring 6-27
overview 6-1
residential services 12-18
state transition paths for ISC service requests C-1
summary of states 6-3
user operations on 6-4
viewing configlets generated by a service request 6-31
viewing configlets generated by the MPLS VPN service request 6-12
services, enhancements for 6-5
setting up, devices for IOS XR support 2-6
site of origin pools, creating 2-19
sites, creating 2-8
specifying
IP address scheme 5-8
PE and CE interface parameters 5-4
routing protocol for a service 5-11
states, transitions of 6-1
static
static protocol 5-12
static, setting static routing protocol Attributes (for IPv4 and IPv6) 6-13
T
templates
creating inter-AS templates 13-12
decommissioning service requests with added templates 6-37
using templates to support inter-autonomous system solutions 13-11
viewing templates from the service requests window 6-35
topology
example of MPLS VPN topology 6-6
networks 8-2
network topology 7-2
transition states of service requests C-1
troubleshooting
common provisioning issues B-2
frequently asked questions B-5
general troubleshooting guidelines B-2
MPLS VPN and layer 2 VPN B-5
MPLS VPN provisioning workflow B-1
MPLS VPNs B-1
terms defined B-2
trusted devices D-12
U
unique route distinguisher, enabling for a VPN 2-27
V
VC ID pools, creating 2-20
VLAN pools, creating 2-21
VPN routing and forwarding tables (see also VRFs) D-3
VPNs
adding PE-CE links to management VPNs 9-15
benefits of cable MPLS VPNs 10-1
connectivity between VPNs D-13
creating 2-22
creating and configuring on IPv6 devices 4-8
defining 2-22
defining a VPN for the PE-CE link 7-3
defining VRF and VPN information 5-29
enabling a unique route distinguisher for a VPN 2-27
ensuring VPN isolation D-15
issues regarding access to VPNs 9-4
provisioning management VPN 9-1
troubleshooting B-1
VPN routing and forwarding tables D-3
VRFs
copying a VRF object 3-5
creating a new VRF object 3-2
decommissioning and deleting VRF service requests 3-14
defining VRF and VPN information 5-29
defining VRF service requests 3-11
deleting VRF objects 3-10
deleting VRF objects associated with VRF service requests 3-10
deploying VRF service requests 3-14
implementation D-4
independent VRF management 3-1
independent VRF object management D-5
migrating existing MPLS VPN service requests to the VRF object model 3-21
modifying deployed VRF objects 3-9
modifying non-deployed VRF objects 3-7
modifying VRF service requests 3-14
multi-VRF edit mode 3-7
overview of VRF service requests 3-11
relationship of VRF object and service requests and PE device 3-16
searching for MPLS VPN service requests by VRF object name 3-20
searching for VRF objects in the ISC repository 3-7
searching for VRF service requests by VRF object name 3-15
single-VRF edit mode 3-7
specifying VRF objects within MPLS VPN service policies 3-20
specifying VRF objects within MPLS VPN service requests 3-16
using a VRF object in an MPLS service request 3-19
using VRFs with MPLS VPN service requests and policies 3-16
viewing the configlet generated by a deployed VRF service request 3-15
VRF instance D-5
VRF object support for IPv6 4-8
VRF-related configlets 4-3
working with VRF objects 3-2
working with VRF service requests 3-11
Posted: Mon Feb 18 15:01:57 PST 2008
All contents are Copyright © 1992--2008 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.