cc/td/doc/product/rtrmgmt/vpnsc/mpls/1_1
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

index

index

A


accounting data
collecting from NetFlow Collector devices     5-3
collection schedule, defining     5-4
and NetFlow Collector     5-1
NetFlow setup tasks     5-2
NFC device, configuring     5-3
reports available     5-5

Action report in task log     7-5

address-family command     B-2

allowAS-in option     4-7

all VPN service requests report     4-23

application type summary report     5-6

ATM
encapsulation information, specifying     4-9
link VRF to ATM interface     B-8

auditing
conn_solver.log file     7-13
customized audit     4-24
deployed test     7-10
existing service requests     4-29
new Repository location     7-13
new service requests     4-29
Repository error     7-14
routing test     7-10
run_ngs.log file     7-13
service request details report     4-17
unable to find request in audit list     7-11
using VPN routing information     4-29

audit reports
audit details report     4-17
generating     4-28

audit reports (continued)
and Java plug-in     4-15
viewing     4-14

autonomous system (AS) number     3-16
options in MPLS VPN Solution     4-7

B


backing up Repository     3-43

BGP     1-1
allowAS-in option     4-7
AS number     3-15, 3-16
community attribute     1-6
display VPN address information     B-12
neighbor activate command     B-8
neighbor AS-override option     4-7
RDs and RTs     1-10
route-target commnuities     1-10
security features     1-6

Border Gateway Protocol. See BGP

broken service, troubleshooting     7-12

C


CAR     1-14
configuration example     5-21
monitoring data with     5-18
polling a router's CAR MIB     5-21
rate-limiting functionality     5-19

CE     3-27
adding to site     3-27
CE to CE traffic report     5-6
default routes to     4-7

CE  (continued) 
editing information about     3-30
extra loopback address     4-10
managed CE considerations     6-2
managed or unmanaged     3-28
and MCE     6-5
not an SA Agent device option     3-28
regular SA Agent device     3-29
round trip delay report     5-18
and SA Agent     3-27
setting up for SLA collection     5-8
source CE for SLA probe     5-10, 5-14
staging guidelines     6-10
unmanaged CEs     6-1

CERC     4-3
full mesh     1-12
overview     1-10, 3-33
selecting for VPN     4-5

CE Routing Community. See CERC

Cisco Connection Online     xv

Cisco IP Manager
accessing routers     2-5
access to CEs and PEs     2-2
CE staging considerations     6-10
configlet download process     A-3
configuration files, managing     2-2
csm.properties file entries     A-3
defaults for username and password     2-4
and DIPMServer     A-1
domain hostname, assignment guidelines for     2-5
domain name case sensitivity     A-5
elements of     2-3
features     2-2
field length mapping table     A-5
Network Element Manager     7-9
in network management subnet     2-1
overview     2-2
pass-through username and password     2-5

Cisco IP Manager (continued)
password, changing in MPLS VPN Solution software     2-4
rollback for     2-2
synchronization with MPLS VPN Solution     A-1
username, changing in MPLS VPN Solution software     2-4

Cisco Service Management System     2-2

Class of Service profile. See CoS profile

clear ip route vrf command     B-3

CNGS server     7-8

Committed Access Rate. See CAR

communication failure error code, troubleshooting     7-7

configlets
download process     A-3
error reporting for     A-5
viewing configlet report     4-17

configuration files
collecting     4-25
config-change traps     5-25
Domain Name Server, setting up     4-24
filename restrictions     3-5
importing     3-4
live collection of     4-26
managing     2-2
setting up routers for collection     4-24
and SNMP     5-24
and traps     5-24
troubleshooting download operation     7-9
using TFTP to download files     2-8
valid file     3-5

congestion avoidance     1-16

congestion management     3-22

conn_solver process     7-13

CORBA generated exception     7-8

CoS     1-13, 3
CAR     1-14
congestion management     3-22
GTS     1-15

CoS  (continued)
IP precedence     1-14
out-of-contract bandwidth     1-14
painting     3-22
policing     3-22
profile     3-23
shaping     3-22
ToS parameter for SLAs     5-12
WFQ     1-16
WRED     1-16
and PE-CE link     4-12

CoS profile
assign to PE-CE link     4-12
in-contract bandwidth, valid input for     3-24

csm.properties file
and collecting configuration file data     5-24
customized router prompt     4-24
and DIPM Server name     A-1
DIPM Server mode setting     A-2
editing to use TFTP instead of Telnet     2-10
IP Manager entries     A-3

customer
information, defining     3-25
information, editing     3-30
round trip delay report     5-18
sites, defining     3-26
summary report     5-6
traffic volume report     5-6

customer edge router. See CE

customer sites, defining     3-27

customer summary report     5-6

D


debug ip bgp command     B-22

default routes to CE     4-7

deployed test     7-10

deploying service requests     4-13

Device Inventory Repository
IP addresses, populating to     5-10
SA Agent devices, verifying     5-9

DIPM Server     A-1
and csm.properties file     A-1
echo mode     A-2

DLCI, specifying     4-9

domain name
and fully domain-qualified hostname     2-5
for targets     3-5

Domain Name Server, setting up     4-24

domain naming convention     A-3
case sensitivity     A-5

E


echo mode     A-2

encapsulation information, specifying     4-9

exit-address-family command     B-4

export route map
defining name of     4-11
and management VPN     4-6

extranet multiple VPN     6-5, 6-7

extranets     1-5

F


Failed Deploy service, troubleshooting     7-8

field length mapping table     A-5

Frame Relay     4-9

full mesh topology     1-12
definition     1-11

functional service, troubleshooting     7-11

G


Generic Traffic Shaping. See GTS

GTS     1-15, 3-22

H


hostname
fully domain-qualified, specifying     2-5

hostname.dns domainname     A-4

hostnames, lowercase     A-5

HTTP report for SLAs     5-17

hub-and-spoke topology     1-12, 4-6
definition     1-11

I


import map command     B-5

import route map
defining name of     4-11

in-band connection     6-5

in-contract bandwidth     1-14
valid input for     3-24

interfaces
IP numbered     4-10
for PE-CE link     4-9
populating interface information to Repository     5-24
serial     4-9

intranets     1-5

invalid service, troubleshooting     7-7

IP addresses
address scheme for PE-CE link     4-10
automatically assigned     4-10
in Cisco IP Manager     A-4
entering target's address     3-10
exchange with neighbors     B-9
IP numbered with extra CE loopback     4-10
for NetFlow Collector device     3-13
and network security     1-6
numbered     4-10
populating to Device Inventory Repository     5-10
unnumbered     4-10
in VPNs     1-1

IP address pools

IP addresses (continued)
and automatically assigned addresses     4-10
on the PE-CE link     4-3
and regions     3-19

ip flow-cache entries command     5-2

ip flow-export destination commmand     5-2

ip flow-export version command     5-2

IP precedence     1-14
mapped to CoS     3-24
painting     3-22

ip route vrf command     B-5

ip vrf command     B-7

ip vrf forwarding command     B-7, B-8

J


Java plug-in     4-15

jitter report for SLAs     5-17

L


log files     7-13

M


managed CE
and CAR reports     5-20
considerations     6-2
defining     3-28
required for SA Agent device     3-29

Management CE. See MCE

Management PE. See MPE

management route map     6-6

management VPN     6-5
creating Customer for     3-36
and export route map     3-41, 4-11
export route map generated     4-6
joining     4-6

management VPN  (continued)
PE-CE links, provisioning     3-42
provisioning     3-36
topology     3-35, 6-6

maximum routes imported into VRF     4-12

MCE     3-27, 6-5
access lists     6-12
IP addresses for     3-41
selecting for service request     3-39
selecting router for     3-38
test for route to     7-12

modifying an existing service     4-18

mouse terminology     xiii

MPE     3-36, 6-5
IP addresses for     3-41
selecting for service request     3-39

MPLS VPNs     1-4
CERCs in     1-10
characteristics     1-4
default routes to CE     4-7
defining     3-32
extranet multiple VPN     6-5
extranets     1-5
implementation techniques     6-5
in-band connection     6-5
intranets     1-5
management VPN     6-5
out-of-band VPN     6-5
principal technologies     1-5
provisioning stages     4-3
route-target communities     1-10
routing protocols     4-6
and service requests     4-3
service requests, defining     4-4

MPLS VPN Solution
benefits     1-3
CE staging guidelines     6-10
customer information, defining     3-25

MPLS VPN Solution (continued)
customer sites, defining     3-26, 3-27
DIPM Server     A-1
domain name specification     2-5
field length mapping table     A-5
hostnames lowercase     A-5
management VPN, implementing     3-35
matching CIPM username or password     2-4
network management subnet     2-1, 6-4
overview     1-1
security features     1-6
shutting down     3-3
SNMP community strings, specifying     3-8
starting     3-1
synchronization with Cisco IP Manager     A-1
username     3-2
username and password, coordinating     2-5
VPN, defining     3-32
web browser     4-14

N


neighbor activate command     B-8

neighbor AS-override option     4-7

NetFlow Collector     5-1
adding devices to network     3-11
cache entries     5-2
configuring NFC device     5-3
data analyzer     1-18
enable PE interfaces     5-2
enabling NetFlow accounting     4-12
IP address, specifying     3-13
network setup tasks     5-2
nf.resources file     5-3
nfconfig.file     5-3
overview     1-17
password, specifying     3-12
policy routing     1-18
recommended for PEs     1-17

NetFlow Collector (continued)
username, specifying     3-12
version and port parameters on PEs     5-2
viewing NFC devices in network     3-13

network
adding targets to     3-11
definition     3-4
name for     3-5
naming convention     A-3, A-5
network packet drop report     5-18
network round trip delay report     5-18
traffic volume report     5-6
viewing devices by role     3-13

network layer reachability information. See NLRI

network management subnet     2-1, 6-4
access rules of type     6-11
extranet multiple VPN     6-7
management VPN technique     3-35, 6-6
out-of-band technique     6-9
security for     6-11
suppressing     6-11

network packet drop report     5-18

network round trip delay report     5-18

nf.resources file     5-3

nfconfig.file     5-3

NLRI     1-5

no SA Agent option     3-28

O


Orbix
shutting down     3-3
starting     3-2
username     3-2

out-of-band technique     6-5, 6-9

out-of-contract bandwidth     1-14

P


PAD. See Provider Administrative Domain

painting packets     3-22

pass-through username and password     2-5

passwords
Cisco IP Manager     2-4
masking in password field     4-27
for multiple targets     3-8
for single targets     3-9

PE
adding to a region     3-17
description of     1-3
enable interfaces for NetFlow     5-2
and MPE     3-36, 6-5
NetFlow, enabling on PE     5-2
network packet drop report     5-18
network round trip delay report     5-18
PE to PE traffic summary report     5-6
port parameter     5-2
as shadow SA Agent device     3-29
version parameter     5-2

PE-CE link
access list guidelines     6-11
CoS definition for     4-12
and dynamic routing     6-12
interfaces, defining     4-9
IP addressing scheme for     4-10
for management VPN     3-42
routing protocols for     4-6
static route provisioning     4-7
traffic volume report     5-6

pending service, troubleshooting     7-10

point-to-point address pool     4-10

policing     3-22

Provider Administrative Domain     3-15
adding region to     3-20
autonomous system number     3-16
Class of Service Profile     3-23

Provider Administrative Domain  (continued)
customer sites     3-26
deleting a region     3-21
information needed     3-15
IP address pools for     3-19
menu     3-23
assigning PEs to region     3-16
region, defining     3-16
VPN, defining     3-32

provisioning
main functions     7-3
operational flow     7-3
router model     7-3

Q


QoS     1-13
defined     3-21

Quality of Service. See QoS

R


RD
formats     B-10
in hub-and-spoke environments     1-12
rd command     B-9

redistributing routing protocols     4-8

regions     3-15
adding PEs to     3-17
adding to PAD     3-20
assigning PEs to     3-16
defining new one     3-16
deleting     3-21
IP address pools for     3-19

regular SA Agent option     3-29

Repository
backing up     3-43

Repository (continued)
error     7-14
log files     7-13
management tool     3-43
new location for     7-13
populating interface information to     5-24

requested service, troubleshooting     7-5

RIP     4-6
route provisioning     4-7

round trip delay report     5-18

route distinguisher. See RD

route map
export     4-11
import     4-11
import to VRF     B-7

route target. See RT

route-target communities     1-10, B-10
export and import communities     B-20

routing protocols
defining for VPN     4-6
redistribution     4-8

routing test     7-10, 7-12

RT     B-11
route-target command     B-10

rtr responder
enabling     5-8

run_ngs process     7-13

S


SA Agent     3-27
collecting data for SLAs     5-14
options for CE     3-28
and SLA statistics     5-7
source CE for probe, selecting     5-10, 5-14

security features     1-6

Service Assurance Agent. See SA Agent

service-level agreement. See SLAs

service requests
about     4-3
auditing     4-29
configlet report     4-17
customized deployment     4-23
defining     4-4
deploying     4-13
deployment status     4-16
details report     4-16
hub-and-spoke topology     4-6
modifying     4-18
states of     4-2, 7-1
unable to find request in audit list     7-11

shadow SA Agent option     3-29

shaping     3-22

show     B-21

show ip bgp vpnv4 command     B-12

show ip cache flow command     5-2

show ip cef vrf command     B-15

show ip protocols vrf command     B-17

show ip route-cache flow command     5-2

show ip route vrf command     B-17

show ip vrf command     B-19

show tag-switching forwarding vrf command     B-21

shutting down the product software     3-3

site information, editing     3-30

SLAs     5-7
collecting SA Agent data for     5-14
creating     5-10
customer round trip delay report     5-18
deleting     5-15
frequency parameter     5-12
HTTP report     5-17
jitter report     5-17
network packet drop report     5-18
network round trip delay report     5-18
populating IP addresses     5-9
SLA Definition report     5-18
SLA life parameter     5-12

SLAs (continued)
threshold parameter     5-12
timeout parameter     5-12
UDP Echo, enabling for SLA     5-9
viewing reports     5-17

SmartCollector     5-24

SNMP
community strings, specifying in MPLS VPN Solution     3-8
and configuration files     5-24
configuring the router for     4-25
retries and timeout settings     3-8
rtr responder, enabling     5-8
setting SNMP community strings on routers     5-7

static route provisioning     4-7
ip route vrf command     B-5

summary report for SLAs     5-17

T


TACACS     2-5

targets
adding     3-11
assigning as PE     3-17
definition     3-4
domain name specification for     3-5
editing target information     3-9
IP address information     3-10
multiple defined     3-6
passwords for     3-8, 3-9

task logs
accessing     7-3
Action report     7-5
browser     7-4
Task Log Summary table     7-5
troubleshooting     7-6

task scheduler malfunction     7-6

Telnet
retries and timeout settings     3-8
trace on     7-9

Terminal Access Control Access Control System. See TACACS

TFTP
directory     2-8
downloading configuration files with     2-8
enabling daemon     2-8
home directory, creating     2-9
server, setting up     2-8

traffic policing tool     1-14

traffic summary report     5-6

traffic volume report     5-6

traps
config-change traps     5-25
configuring     5-24
populating interface information to Repository     5-24
SmartCollector     5-24

Trivial File Transfer Protocol. See TFTP

troubleshooting
broken service     7-12
CNGS server     7-7, 7-8
communication failure error code     7-7
CORBA generated exception     7-8
debug ip bgp command     B-22
deployed test     7-10
downloading configuration files     7-9
Failed Deploy service     7-8
functional service     7-11
invalid service     7-7
no reports     7-13
pending service     7-10
requested service     7-5
routing test     7-10
task log     7-6
task scheduler malfunction     7-6
Telnet trace command     7-9
unable to find service request in audit list     7-11

troubleshooting (continued)
VPN routing information     7-12

type of service summary report     5-6

typographical conventions     xiv

U


unmanaged CEs     6-1
defining     3-28

unnumbered IP addresses     4-10

username
Cisco IP Manager     2-4
coordinating     2-5
MPLS VPN Solution     3-2
Orbix     3-2

V


Viewing devices by role     3-13

VPN
defining in product     3-32
display address information     B-12

vpnadm username     3-2

VPN Console
closing     3-3
starting     3-2
window elements     3-3

VPN route forwarding table. See VRF

VRF     1-4
associate with interface or subinterface     B-8
configuration commands     1-9, B-1
configure import route map for     B-5
elements of     1-7
export route map, defining name of     4-11
implementation considerations     1-9
importing route map to     B-7
import route map, defining name of     4-11
maximum routes imported     4-12

VRF (continued)
remove routes from     B-3
reroute packets     B-7
and route-target communities     1-10
route-target community for     B-10
security entries     6-11
static routes, establishing     B-5

W


Watchdog
closing     3-3
log file     3-2
starting     3-2

wdclient restart command     7-7

wdclient start command     7-6

web browser
audit reports, viewing     4-14
Repository management tool     3-43

Weighted Fair Queuing. See WFQ

Weighted Random Early Detection. See WRED

WFQ     1-16

WRED     1-16

X


xhost command     3-1



hometocprevnextglossaryfeedbacksearchhelp
Posted: Fri Apr 21 11:04:08 PDT 2000
Copyright 1989 - 2000©Cisco Systems Inc.