Table of Contents
index
- accounting data
- collecting from NetFlow Collector devices 5-3
- collection schedule, defining 5-4
- and NetFlow Collector 5-1
- NetFlow setup tasks 5-2
- NFC device, configuring 5-3
- reports available 5-5
- Action report in task log 7-5
- address-family command B-2
- allowAS-in option 4-7
- all VPN service requests report 4-23
- application type summary report 5-6
- ATM
- encapsulation information, specifying 4-9
- link VRF to ATM interface B-8
- auditing
- conn_solver.log file 7-13
- customized audit 4-24
- deployed test 7-10
- existing service requests 4-29
- new Repository location 7-13
- new service requests 4-29
- Repository error 7-14
- routing test 7-10
- run_ngs.log file 7-13
- service request details report 4-17
- unable to find request in audit list 7-11
- using VPN routing information 4-29
- audit reports
- audit details report 4-17
- generating 4-28
- audit reports (continued)
- and Java plug-in 4-15
- viewing 4-14
- autonomous system (AS) number 3-16
- options in MPLS VPN Solution 4-7
- backing up Repository 3-43
- BGP 1-1
- allowAS-in option 4-7
- AS number 3-15, 3-16
- community attribute 1-6
- display VPN address information B-12
- neighbor activate command B-8
- neighbor AS-override option 4-7
- RDs and RTs 1-10
- route-target commnuities 1-10
- security features 1-6
- Border Gateway Protocol. See BGP
- broken service, troubleshooting 7-12
- CAR 1-14
- configuration example 5-21
- monitoring data with 5-18
- polling a router's CAR MIB 5-21
- rate-limiting functionality 5-19
- CE 3-27
- adding to site 3-27
- CE to CE traffic report 5-6
- default routes to 4-7
- CE (continued)
- editing information about 3-30
- extra loopback address 4-10
- managed CE considerations 6-2
- managed or unmanaged 3-28
- and MCE 6-5
- not an SA Agent device option 3-28
- regular SA Agent device 3-29
- round trip delay report 5-18
- and SA Agent 3-27
- setting up for SLA collection 5-8
- source CE for SLA probe 5-10, 5-14
- staging guidelines 6-10
- unmanaged CEs 6-1
- CERC 4-3
- full mesh 1-12
- overview 1-10, 3-33
- selecting for VPN 4-5
- CE Routing Community. See CERC
- Cisco Connection Online xv
- Cisco IP Manager
- accessing routers 2-5
- access to CEs and PEs 2-2
- CE staging considerations 6-10
- configlet download process A-3
- configuration files, managing 2-2
- csm.properties file entries A-3
- defaults for username and password 2-4
- and DIPMServer A-1
- domain hostname, assignment guidelines for 2-5
- domain name case sensitivity A-5
- elements of 2-3
- features 2-2
- field length mapping table A-5
- Network Element Manager 7-9
- in network management subnet 2-1
- overview 2-2
- pass-through username and password 2-5
- Cisco IP Manager (continued)
- password, changing in MPLS VPN Solution software 2-4
- rollback for 2-2
- synchronization with MPLS VPN Solution A-1
- username, changing in MPLS VPN Solution software 2-4
- Cisco Service Management System 2-2
- Class of Service profile. See CoS profile
- clear ip route vrf command B-3
- CNGS server 7-8
- Committed Access Rate. See CAR
- communication failure error code, troubleshooting 7-7
- configlets
- download process A-3
- error reporting for A-5
- viewing configlet report 4-17
- configuration files
- collecting 4-25
- config-change traps 5-25
- Domain Name Server, setting up 4-24
- filename restrictions 3-5
- importing 3-4
- live collection of 4-26
- managing 2-2
- setting up routers for collection 4-24
- and SNMP 5-24
- and traps 5-24
- troubleshooting download operation 7-9
- using TFTP to download files 2-8
- valid file 3-5
- congestion avoidance 1-16
- congestion management 3-22
- conn_solver process 7-13
- CORBA generated exception 7-8
- CoS 1-13, 3
- CAR 1-14
- congestion management 3-22
- GTS 1-15
- CoS (continued)
- IP precedence 1-14
- out-of-contract bandwidth 1-14
- painting 3-22
- policing 3-22
- profile 3-23
- shaping 3-22
- ToS parameter for SLAs 5-12
- WFQ 1-16
- WRED 1-16
- and PE-CE link 4-12
- CoS profile
- assign to PE-CE link 4-12
- in-contract bandwidth, valid input for 3-24
- csm.properties file
- and collecting configuration file data 5-24
- customized router prompt 4-24
- and DIPM Server name A-1
- DIPM Server mode setting A-2
- editing to use TFTP instead of Telnet 2-10
- IP Manager entries A-3
- customer
- information, defining 3-25
- information, editing 3-30
- round trip delay report 5-18
- sites, defining 3-26
- summary report 5-6
- traffic volume report 5-6
- customer edge router. See CE
- customer sites, defining 3-27
- customer summary report 5-6
- debug ip bgp command B-22
- default routes to CE 4-7
- deployed test 7-10
- deploying service requests 4-13
- Device Inventory Repository
- IP addresses, populating to 5-10
- SA Agent devices, verifying 5-9
- DIPM Server A-1
- and csm.properties file A-1
- echo mode A-2
- DLCI, specifying 4-9
- domain name
- and fully domain-qualified hostname 2-5
- for targets 3-5
- Domain Name Server, setting up 4-24
- domain naming convention A-3
- case sensitivity A-5
- echo mode A-2
- encapsulation information, specifying 4-9
- exit-address-family command B-4
- export route map
- defining name of 4-11
- and management VPN 4-6
- extranet multiple VPN 6-5, 6-7
- extranets 1-5
- Failed Deploy service, troubleshooting 7-8
- field length mapping table A-5
- Frame Relay 4-9
- full mesh topology 1-12
- definition 1-11
- functional service, troubleshooting 7-11
- Generic Traffic Shaping. See GTS
- GTS 1-15, 3-22
- hostname
- fully domain-qualified, specifying 2-5
- hostname.dns domainname A-4
- hostnames, lowercase A-5
- HTTP report for SLAs 5-17
- hub-and-spoke topology 1-12, 4-6
- definition 1-11
- import map command B-5
- import route map
- defining name of 4-11
- in-band connection 6-5
- in-contract bandwidth 1-14
- valid input for 3-24
- interfaces
- IP numbered 4-10
- for PE-CE link 4-9
- populating interface information to Repository 5-24
- serial 4-9
- intranets 1-5
- invalid service, troubleshooting 7-7
- IP addresses
- address scheme for PE-CE link 4-10
- automatically assigned 4-10
- in Cisco IP Manager A-4
- entering target's address 3-10
- exchange with neighbors B-9
- IP numbered with extra CE loopback 4-10
- for NetFlow Collector device 3-13
- and network security 1-6
- numbered 4-10
- populating to Device Inventory Repository 5-10
- unnumbered 4-10
- in VPNs 1-1
- IP address pools
- IP addresses (continued)
- and automatically assigned addresses 4-10
- on the PE-CE link 4-3
- and regions 3-19
- ip flow-cache entries command 5-2
- ip flow-export destination commmand 5-2
- ip flow-export version command 5-2
- IP precedence 1-14
- mapped to CoS 3-24
- painting 3-22
- ip route vrf command B-5
- ip vrf command B-7
- ip vrf forwarding command B-7, B-8
- Java plug-in 4-15
- jitter report for SLAs 5-17
- log files 7-13
- managed CE
- and CAR reports 5-20
- considerations 6-2
- defining 3-28
- required for SA Agent device 3-29
- Management CE. See MCE
- Management PE. See MPE
- management route map 6-6
- management VPN 6-5
- creating Customer for 3-36
- and export route map 3-41, 4-11
- export route map generated 4-6
- joining 4-6
- management VPN (continued)
- PE-CE links, provisioning 3-42
- provisioning 3-36
- topology 3-35, 6-6
- maximum routes imported into VRF 4-12
- MCE 3-27, 6-5
- access lists 6-12
- IP addresses for 3-41
- selecting for service request 3-39
- selecting router for 3-38
- test for route to 7-12
- modifying an existing service 4-18
- mouse terminology xiii
- MPE 3-36, 6-5
- IP addresses for 3-41
- selecting for service request 3-39
- MPLS VPNs 1-4
- CERCs in 1-10
- characteristics 1-4
- default routes to CE 4-7
- defining 3-32
- extranet multiple VPN 6-5
- extranets 1-5
- implementation techniques 6-5
- in-band connection 6-5
- intranets 1-5
- management VPN 6-5
- out-of-band VPN 6-5
- principal technologies 1-5
- provisioning stages 4-3
- route-target communities 1-10
- routing protocols 4-6
- and service requests 4-3
- service requests, defining 4-4
- MPLS VPN Solution
- benefits 1-3
- CE staging guidelines 6-10
- customer information, defining 3-25
- MPLS VPN Solution (continued)
- customer sites, defining 3-26, 3-27
- DIPM Server A-1
- domain name specification 2-5
- field length mapping table A-5
- hostnames lowercase A-5
- management VPN, implementing 3-35
- matching CIPM username or password 2-4
- network management subnet 2-1, 6-4
- overview 1-1
- security features 1-6
- shutting down 3-3
- SNMP community strings, specifying 3-8
- starting 3-1
- synchronization with Cisco IP Manager A-1
- username 3-2
- username and password, coordinating 2-5
- VPN, defining 3-32
- web browser 4-14
- neighbor activate command B-8
- neighbor AS-override option 4-7
- NetFlow Collector 5-1
- adding devices to network 3-11
- cache entries 5-2
- configuring NFC device 5-3
- data analyzer 1-18
- enable PE interfaces 5-2
- enabling NetFlow accounting 4-12
- IP address, specifying 3-13
- network setup tasks 5-2
- nf.resources file 5-3
- nfconfig.file 5-3
- overview 1-17
- password, specifying 3-12
- policy routing 1-18
- recommended for PEs 1-17
- NetFlow Collector (continued)
- username, specifying 3-12
- version and port parameters on PEs 5-2
- viewing NFC devices in network 3-13
- network
- adding targets to 3-11
- definition 3-4
- name for 3-5
- naming convention A-3, A-5
- network packet drop report 5-18
- network round trip delay report 5-18
- traffic volume report 5-6
- viewing devices by role 3-13
- network layer reachability information. See NLRI
- network management subnet 2-1, 6-4
- access rules of type 6-11
- extranet multiple VPN 6-7
- management VPN technique 3-35, 6-6
- out-of-band technique 6-9
- security for 6-11
- suppressing 6-11
- network packet drop report 5-18
- network round trip delay report 5-18
- nf.resources file 5-3
- nfconfig.file 5-3
- NLRI 1-5
- no SA Agent option 3-28
- Orbix
- shutting down 3-3
- starting 3-2
- username 3-2
- out-of-band technique 6-5, 6-9
- out-of-contract bandwidth 1-14
- PAD. See Provider Administrative Domain
- painting packets 3-22
- pass-through username and password 2-5
- passwords
- Cisco IP Manager 2-4
- masking in password field 4-27
- for multiple targets 3-8
- for single targets 3-9
- PE
- adding to a region 3-17
- description of 1-3
- enable interfaces for NetFlow 5-2
- and MPE 3-36, 6-5
- NetFlow, enabling on PE 5-2
- network packet drop report 5-18
- network round trip delay report 5-18
- PE to PE traffic summary report 5-6
- port parameter 5-2
- as shadow SA Agent device 3-29
- version parameter 5-2
- PE-CE link
- access list guidelines 6-11
- CoS definition for 4-12
- and dynamic routing 6-12
- interfaces, defining 4-9
- IP addressing scheme for 4-10
- for management VPN 3-42
- routing protocols for 4-6
- static route provisioning 4-7
- traffic volume report 5-6
- pending service, troubleshooting 7-10
- point-to-point address pool 4-10
- policing 3-22
- Provider Administrative Domain 3-15
- adding region to 3-20
- autonomous system number 3-16
- Class of Service Profile 3-23
- Provider Administrative Domain (continued)
- customer sites 3-26
- deleting a region 3-21
- information needed 3-15
- IP address pools for 3-19
- menu 3-23
- assigning PEs to region 3-16
- region, defining 3-16
- VPN, defining 3-32
- provisioning
- main functions 7-3
- operational flow 7-3
- router model 7-3
- QoS 1-13
- defined 3-21
- Quality of Service. See QoS
- RD
- formats B-10
- in hub-and-spoke environments 1-12
- rd command B-9
- redistributing routing protocols 4-8
- regions 3-15
- adding PEs to 3-17
- adding to PAD 3-20
- assigning PEs to 3-16
- defining new one 3-16
- deleting 3-21
- IP address pools for 3-19
- regular SA Agent option 3-29
- Repository
- backing up 3-43
- Repository (continued)
- error 7-14
- log files 7-13
- management tool 3-43
- new location for 7-13
- populating interface information to 5-24
- requested service, troubleshooting 7-5
- RIP 4-6
- route provisioning 4-7
- round trip delay report 5-18
- route distinguisher. See RD
- route map
- export 4-11
- import 4-11
- import to VRF B-7
- route target. See RT
- route-target communities 1-10, B-10
- export and import communities B-20
- routing protocols
- defining for VPN 4-6
- redistribution 4-8
- routing test 7-10, 7-12
- RT B-11
- route-target command B-10
- rtr responder
- enabling 5-8
- run_ngs process 7-13
- SA Agent 3-27
- collecting data for SLAs 5-14
- options for CE 3-28
- and SLA statistics 5-7
- source CE for probe, selecting 5-10, 5-14
- security features 1-6
- Service Assurance Agent. See SA Agent
- service-level agreement. See SLAs
- service requests
- about 4-3
- auditing 4-29
- configlet report 4-17
- customized deployment 4-23
- defining 4-4
- deploying 4-13
- deployment status 4-16
- details report 4-16
- hub-and-spoke topology 4-6
- modifying 4-18
- states of 4-2, 7-1
- unable to find request in audit list 7-11
- shadow SA Agent option 3-29
- shaping 3-22
- show B-21
- show ip bgp vpnv4 command B-12
- show ip cache flow command 5-2
- show ip cef vrf command B-15
- show ip protocols vrf command B-17
- show ip route-cache flow command 5-2
- show ip route vrf command B-17
- show ip vrf command B-19
- show tag-switching forwarding vrf command B-21
- shutting down the product software 3-3
- site information, editing 3-30
- SLAs 5-7
- collecting SA Agent data for 5-14
- creating 5-10
- customer round trip delay report 5-18
- deleting 5-15
- frequency parameter 5-12
- HTTP report 5-17
- jitter report 5-17
- network packet drop report 5-18
- network round trip delay report 5-18
- populating IP addresses 5-9
- SLA Definition report 5-18
- SLA life parameter 5-12
- SLAs (continued)
- threshold parameter 5-12
- timeout parameter 5-12
- UDP Echo, enabling for SLA 5-9
- viewing reports 5-17
- SmartCollector 5-24
- SNMP
- community strings, specifying in MPLS VPN Solution 3-8
- and configuration files 5-24
- configuring the router for 4-25
- retries and timeout settings 3-8
- rtr responder, enabling 5-8
- setting SNMP community strings on routers 5-7
- static route provisioning 4-7
- ip route vrf command B-5
- summary report for SLAs 5-17
- TACACS 2-5
- targets
- adding 3-11
- assigning as PE 3-17
- definition 3-4
- domain name specification for 3-5
- editing target information 3-9
- IP address information 3-10
- multiple defined 3-6
- passwords for 3-8, 3-9
- task logs
- accessing 7-3
- Action report 7-5
- browser 7-4
- Task Log Summary table 7-5
- troubleshooting 7-6
- task scheduler malfunction 7-6
- Telnet
- retries and timeout settings 3-8
- trace on 7-9
- Terminal Access Control Access Control System. See TACACS
- TFTP
- directory 2-8
- downloading configuration files with 2-8
- enabling daemon 2-8
- home directory, creating 2-9
- server, setting up 2-8
- traffic policing tool 1-14
- traffic summary report 5-6
- traffic volume report 5-6
- traps
- config-change traps 5-25
- configuring 5-24
- populating interface information to Repository 5-24
- SmartCollector 5-24
- Trivial File Transfer Protocol. See TFTP
- troubleshooting
- broken service 7-12
- CNGS server 7-7, 7-8
- communication failure error code 7-7
- CORBA generated exception 7-8
- debug ip bgp command B-22
- deployed test 7-10
- downloading configuration files 7-9
- Failed Deploy service 7-8
- functional service 7-11
- invalid service 7-7
- no reports 7-13
- pending service 7-10
- requested service 7-5
- routing test 7-10
- task log 7-6
- task scheduler malfunction 7-6
- Telnet trace command 7-9
- unable to find service request in audit list 7-11
- troubleshooting (continued)
- VPN routing information 7-12
- type of service summary report 5-6
- typographical conventions xiv
- unmanaged CEs 6-1
- defining 3-28
- unnumbered IP addresses 4-10
- username
- Cisco IP Manager 2-4
- coordinating 2-5
- MPLS VPN Solution 3-2
- Orbix 3-2
- Viewing devices by role 3-13
- VPN
- defining in product 3-32
- display address information B-12
- vpnadm username 3-2
- VPN Console
- closing 3-3
- starting 3-2
- window elements 3-3
- VPN route forwarding table. See VRF
- VRF 1-4
- associate with interface or subinterface B-8
- configuration commands 1-9, B-1
- configure import route map for B-5
- elements of 1-7
- export route map, defining name of 4-11
- implementation considerations 1-9
- importing route map to B-7
- import route map, defining name of 4-11
- maximum routes imported 4-12
- VRF (continued)
- remove routes from B-3
- reroute packets B-7
- and route-target communities 1-10
- route-target community for B-10
- security entries 6-11
- static routes, establishing B-5
- Watchdog
- closing 3-3
- log file 3-2
- starting 3-2
- wdclient restart command 7-7
- wdclient start command 7-6
- web browser
- audit reports, viewing 4-14
- Repository management tool 3-43
- Weighted Fair Queuing. See WFQ
- Weighted Random Early Detection. See WRED
- WFQ 1-16
- WRED 1-16
- xhost command 3-1







Posted: Fri Apr 21 11:04:08 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.