cc/td/doc/product/rtrmgmt/vpnsc/mpls/1_2
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Setting Up the MPLS VPN Environment

Setting Up the MPLS VPN Environment

Cisco VPN Solutions Center: MPLS Solution is an MPLS VPN provisioning and auditing tool. The software focuses on the provider edge routers (PEs), customer edge routers (CEs), and the link between them. VPNSC: MPLS Solution software integrates with Cisco IP Manager for element management tasks such as downloading configlets to target routers. Additional features include Class of Service (CoS) provisioning, VPN-aware NetFlow accounting, and Service Level Agreement (SLA) monitoring.

The Cisco VPN Solutions Center (VPNSC) also provides external access to its provisioning, accounting, and SLA monitoring features through CORBA APIs.

Starting the VPN Solutions Center Software

Before you start the VPN Solutions Center software, complete these tasks:


Step 1   Log into the VPN Solutions Center (VPNSC) workstation under your own login name.

Step 2   To keep the startup operations conveniently organized, open three terminal windows—one window for the xhost process, one for the VPN Console and Watchdog, and a third window for Orbix.

Step 3   In the first terminal window, enter the following command:

xhost VPNSC_hostname

The VPNSC_hostname parameter is the name of the VPN Solutions Center workstation. This command configures your system so that the Orbix user (orbixadm) and the MPLS VPN user (vpnadm) can communicate with your client system.


Starting Orbix

Starting the VPN Solutions Center software requires that you first start the Orbix process and then start the Watchdog process and the VPN Console as described below. To start the Orbix software, follow these steps:


Step 1   Go to the terminal window for the Orbix software.

Step 2   Log in as the owner of the Orbix process (orbixadm).

su - orbixadm

When logged in, you are placed in the /opt/orbixadm directory.

Or if you are logging in remotely, enter this command:

rlogin VPNSC_hostname -l orbixadm

Step 3   Change directory to the directory where Orbix is installed.

cd orbix/Orbix3

You are now in the /opt/orbixadm/orbix/Orbix3 directory.

Step 4   Issue the following command to source the environment as required for your shell:

C-Shell: source setenvs.csh

K-Shell: . ./setenvs.sh

Step 5   Start the Orbix process in the background:

orbixd &


Starting the Watchdog and the VPN Console


Step 1   Go to the terminal window for the Watchdog and the VPN Console.

Step 2   Log in as the owner of the VPN Solutions Center software (vpnadm).

su - vpnadm

When logged in, you are placed in the /opt/vpnadm directory.

Or if you are logging in remotely, enter this command:

rlogin VPNSC_hostname -l vpnadm

Step 3   Go to the VPN Solutions Center installation directory.

cd vpn/

You should now be in the /opt/vpnadm/vpn directory.

Step 4   Issue the following command to source the environment as required for your shell.

C-Shell: source vpnenv.csh

K-Shell: . ./vpnenv.sh

Step 5   Set the display variable for the VPN Solutions Center workstation.

For the C shell:

setenv DISPLAY VPNSC_hostname:0.0

For the K shell:

export DISPLAY=VPNSC_hostname:0.0

Step 6   Start the application's WatchDog processes:

startwd

To stop the WatchDog process, issue the stopwd -y command.

The WatchDog log file is located at /opt/vpnadm/vpn/tmp/wdlog.

Step 7   If you would like to confirm that the servers are running, issue the following command:

wdclient status


Note   This command is recommended, but it is not a required command in the startup sequence.

If you would prefer to bring up the WatchDog graphical user interface, issue this command:

wdgui &

The WatchDog interface appears (see Figure 3-1):


Figure 3-1: The CSM WatchDog Interface


For a detailed description of the WatchDog graphical user interface, refer to the "wdgui Command" section in Chapter 2, "WatchDog Commands," of the Cisco VPN Solutions Center: MPLS Solution User Reference.

Step 8   Issue the following command to start the VPN Console:

vpnconsole &

The VPN Solutions Center Security dialog box appears (see Figure 3-2).


Figure 3-2: The VPN Solutions Center Security Dialog Box


Step 9   Enter a valid user name and password, then click OK.

The default username is admin. The default password is admin.


Note   You cannot change the admin username, but you can change the password for the admin user. Additionally, you can add new usernames and assign their associated passwords. For details, see "User Administration" in Chapter 10 of the Cisco VPN Solutions Center: MPLS Solution User Reference, Release 1.2.

The VPN Solutions Center VPN Console appears, as illustrated in Figure 3-3.


Figure 3-3: The VPN Console


Proceed to the "Setting Up the Network" section.


Shutting Down the VPN Solutions Center Software

This section assumes that the VPN Solutions Center software is running, and that the software user names—vpnadm and orbixadm—are active. It also assumes that Orbix is running as a background process. To shut down the VPN Solutions Center software, execute these commands:


Step 1   If the VPN Console is running, close it by choosing File > Exit.

Step 2   If the Watchdog user interface (wdgui) is running, close it by selecting the window, right-click, then choose Close from the menu.

Step 3   From the window where Watchdog was launched, close the Watchdog by issuing this command:

stopwd -y

Step 4   Log out (exit) from the vpnadm user.

Shutting down Orbix is optional. To shut down Orbix, follow these steps:

Step 5   From the terminal window from which you launched Orbix, shut down the Name Server:

killit NS

Step 6   Discover the process ID of orbixd:

ps -ef | grep orbixd

Step 7   Shut down the Orbix process by issuing this command:

kill orbixd_process_ID

Step 8   Log out (exit) from the orbixadm user.


Setting Up the Network

In this product, an MPLS VPN network is a unique group of targets; a target can be a member of only one network. Thus, an MPLS VPN network allows a provider to partition the working space into manageable segments that are unique and do not overlap other networks.

To use VPNSC: MPLS Solution to set up an MPLS VPN network requires the following tasks:

    1. Define the network elements.

  For procedures, see the next section, "Defining the Network Elements."

    2. Define the Provider Administrative Domain.

  See the "Defining Provider Administrative Domains" section.

    3. Create a VPN customer definition for each VPN customer.

  See the "Creating a VPN Customer Definition" section.

    4. Define a VPN.

  "Defining a New VPN in the VPNSC Software" section.

    5. If you are using a management VPN to manage your customers' VPNs, define a management VPN.

  See the "Implementing the Management VPN Technique" section.

Defining the Network Elements

Every device that the VPNSC: MPLS Solution software manages must be defined as a target. A target is any device from which the VPNSC: MPLS Solution software can collect information (a router or Netflow Collector). In most cases, these targets are Cisco routers that function either as a provider edge router (PE) or a customer edge router (CE).


Note   When you define target names in the VPN Solutions Center software, the target names you specify must match the actual IOS host names of the corresponding devices.


Note   The Simple Network Management Protocol (SNMP) must be configured on each PE router and CE router in the service provider network. To determine whether SNMP is enabled and set the SNMP community strings on a router, see the "Setting Up SNMP on the Routers in the Service Provider Network" section.

There are two methods for defining targets and organizing them into the appropriate networks (or target groups):

  A quick way to define the MPLS VPN networks and the targets in them is to import your router configuration files into the VPNSC: MPLS Solution software. This method lets you specify a directory of router configuration files and the network for these routers. The network and the targets in the network are created based on the imported configuration files.
  When employing this method, note that not all the necessary information is present after you import the files. You must then proceed to define the additional target information, such as the IP addresses, passwords, and so forth (described later in this document).
  You can define targets manually when you want to create, edit, or delete targets in a network. See the "Adding a New Router to the Network" section.

Importing Router Configuration Files

To import router configuration files, follow these steps:


Step 1   Create a directory of configuration files for a given set of devices and copy the appropriate configuration files into the directory.

Device names within each directory must be unique.

A typical set includes Provider and Customer edge routers (PEs and CEs).

Step 2   From the VPN Console menu, choose Setup > Create Targets From Router Configurations.

An informational window displays the following information:

This will create targets based on the router configuration files in a specified directory. A network will be created for the new targets.

You will be asked to enter the following information:

  The default convention for naming configuration files is device_name.domain_name.com. But adherence to this nomenclature is not required.
  Specifying the domain name is necessary only if a fully domain-qualified hostname is needed to resolve the IP address of the target (router). For details, see the "On Specifying the Fully Domain-Qualified Hostname" section.

Step 3   Click OK.

The Create Targets From Router Configurations dialog box appears (see Figure 3-4).


Figure 3-4: Creating Targets From Router Configuration Files


Step 4   Enter the directory path, network name, and (optionally) the domain name; then click OK.

  To browse for the directory path, click Select and choose the appropriate directory.
  The network name should reflect the customer's name and the provider's Region that the customer is assigned to. For a discussion of Regions, see the "Defining Provider Administrative Domains" section.

Caution It is important to understand that when you specify both the domain name of a device and the IP address of a device, the IP address overrides the specified domain name.

The VPNSC: MPLS Solution software imports the router configuration files from the indicated directory. For every valid configuration file, the VPNSC: MPLS Solution software creates a target, and defines the target's role as Cisco router. A valid configuration file is one in which the hostname statement is present in the file. If a configuration file does not contain the hostname statement, VPNSC: MPLS Solution software regards the file as invalid and does not import the configuration file into the Repository.

Under the Networks folder in the hierarchy pane, the product software adds the network name you specified.

Step 5   To display the window that lists the targets in a network, double-click the network name in the hierarchy pane. The product displays the Network window, as shown in Figure 3-5.


Figure 3-5: The Network Window



Finding a Specific Network

To find a specific network, follow these steps:


Step 1   From the VPN Console window, choose Find > Find Network.

The Find dialog box appears with the category Network already selected (see Figure 3-6).


Figure 3-6: Find Network Dialog Box


Step 2   In the Find What field, enter the name of the network you want to find.

Step 3   If you want the search to match the case of the network name you enter, check the Match Case check box.

Step 4   Choose the direction of the search by clicking the Up or Down radio button.

Step 5   When you have completed the search parameters, click Find Next.

The VPNSC software locates the indicated network and highlights it in the hierarchy pane, as shown in Figure 3-7.


Figure 3-7: Network Found in VPNSC Hierarchy Pane


Step 6   Close the Find window.


Completing the Target Information for Multiple Targets

Now that you have imported the router configuration files and assigned them to an MPLS VPN network (sp_network in our example), you have completed the initial phase required to define the targets. Now you must enter the rest of the information the product software requires to implement the targets.


Step 1   From the hierarchy pane, click the open-close icon for the Networks folder.

Step 2   Double-click the desired network from the list of networks.

As shown in Figure 3-5, the Network window appears in the data pane on the right, displaying the name of each router in the selected network, along with its domain name and role (in this case, Cisco Router).

At this point, you have the option to enter information for a single target (router) or multiple targets. If the targets share some characteristics, such as the same login or enable passwords, you can define those parameters once for multiple routers, then return to the Network window to edit individual targets for those parameters that are unique for each router. This is the procedure described in the following steps.

Step 3   Select the routers from the list for which you want to define the common parameters.

To select multiple targets from the list, hold down the Ctrl key while you click the desired targets.

Step 4   From the Network window, choose Actions > Edit Multiple > Edit General Parameters (as shown in Figure 3-8).


Figure 3-8: The Network Window's Action Menu


The General tab for the Edit Multiple Targets dialog box appears (see Figure 3-9).


Figure 3-9: Entering General Information for Multiple Targets


Step 5   In this dialog box, select the check boxes for the fields you want to apply to all the selected targets: Network, Domain, and Description.

Step 6   Choose the desired network name from the Network field drop-down list.

Step 7   Enter the domain name.


Caution When you specify both the domain name of the device and the IP address of a device, the IP address overrides the specified domain name.

Entering information in the Description field is optional (but recommended).

Step 8   Choose the Passwords tab (as shown in Figure 3-10).


Figure 3-10: Entering Passwords and SNMP Community Strings for Multiple Targets


Step 9   In the Passwords dialog box, click the check boxes for the fields you want to apply to all the selected targets (routers).

In this example, we have not specified a value for the Login User field, reserving that value for individual router configuration.

Step 10   Specify the information for the following fields, then click OK.

  The Login password is the virtual terminal password, which establishes password protection on incoming Telnet sessions.

Caution VPNSC: MPLS Solution requires that the PEs and managed CEs in the network have a virtual terminal (login) password. The data collection operation fails if VPNSC does not find the login password set on a router it is collecting data from.


Note   The SNMP community strings must be set on all the PEs and CEs in the service provider's network; the SNMP settings on the routers must match the settings configured here. For related information, see the "Setting Up SNMP on the Routers in the Service Provider Network" section.

  The recommended setting is three (3) retries.
  The recommended setting is 20 seconds.

When you click OK, you return to the Network window.


Completing the Target Information for Individual Targets

Now that you have defined the parameters that apply to all the selected targets, you can proceed to define the elements that must be defined for each target: user names and IP addresses.


Caution It is important to understand that when you specify both the domain name of the device and the IP address of a device, the IP address overrides the specified domain name.


Step 1   From the Network window, select the target you want to edit.

Step 2   Choose Actions > Edit Target.

The Edit Target dialog box appears (see Figure 3-11).


Figure 3-11: The Edit Target Dialog Box


Defining the Passwords and SNMP Community Strings for Individual Targets

Step 3   From the Edit Target dialog box, choose the Passwords tab (see Figure 3-12).


Figure 3-12: Editing a Target's Password and SNMP Strings Information


As you can see in Figure 3-12, the fields you defined for multiple targets are displayed in the pertinent fields.

Step 4   Enter the information in the fields you need to define for the selected target (router).


Caution VPNSC: MPLS Solution requires that the PEs and managed CEs in the network have a virtual terminal (login) password. The data collection operation fails if VPNSC does not find the login password set on a router it is collecting data from. If you have not yet set the login password on the router and in this dialog box, please do so now.

Entering a Target's IP Address Information


Caution When you specify both the domain name of a device and the IP address of a device, the IP address overrides the specified domain name.

Step 5   Choose the IP Addresses tab and click Add.

The Enter IP Address dialog box appears (see Figure 3-13).


Figure 3-13: Entering the IP Address


Step 6   Enter the IP address for the selected router, then click OK.

You return to the IP Addresses tab, where the IP address you entered is now displayed.


Updating Changed Router Passwords

If you change the passwords on any routers in the MPLS VPN network and you have already defined those passwords in the VPNSC: MPLS Solution software, you must update the password information so that they match.

To change the passwords defined for routers in the VPNSC software, follow these steps:


Step 1   From the hierarchy pane, click the open-close icon for the Networks folder.

Step 2   Double-click the desired network from the list of networks.

The Network window appears in the data pane on the right, displaying the name of each router in the selected network, along with its domain name and role (in this case, Cisco Router).

At this point, you have the option to change the passwords for a single target (router) or multiple targets. This procedure describes how to change the passwords for multiple routers at once.

Step 3   Select the routers from the list for which you want to change one or more passwords.

To select multiple targets from the list, hold down the Ctrl key while you click the desired targets.

Step 4   From the Network window, choose Actions > Edit Multiple > Edit Existing Passwords. The Edit Multiple Targets dialog box appears (see Figure 3-14).


Figure 3-14: Updating Router Passwords


Step 5   Check the checkboxes for the password(s) you want to change, then enter the new passwords.

Step 6   When the changes are complete, click OK.


Adding a New Router to the Network

In the event you need to add a new target (router) to an MPLS VPN network, follow these steps:


Step 1   In the VPN Console, open the Networks folder and select the pertinent network.

Step 2   Double-click the selected network.

The Network window appears, displaying the names of the devices in the selected network.

Step 3   From the Network window, choose Actions>New Target. The New Target dialog box appears (see Figure 3-15).


Figure 3-15: New Target Dialog Box for a Cisco Router


Step 4   Complete the fields in the General and Passwords dialog boxes as described in the "Completing the Target Information for Multiple Targets" section.

Step 5   Complete the fields for the IP Addresses as described in the "Completing the Target Information for Individual Targets" section.


Adding a NetFlow Collector Device to the Network

When you install NetFlow on the NetFlow Collector (NFC) device, configure a local username and password. The username and password is used by VPNSC: MPLS Solution software to communicate with the NFC.

In order to collect traffic statistics from NetFlow Collector devices, these devices must be configured as a target. To do so, follow these steps:


Step 1   Double-click the desired network from the Networks list.

The Network window appears, displaying the names of all the devices in the selected network.

Step 2   From the Network window, choose Actions > New Target. The New Target dialog box appears (see Figure 3-16).


Figure 3-16: New Target Dialog Box for NetFlow Collector Device


Step 3   In the Target Name field, enter the UNIX host name of the NetFlow Collector device (NFC).


Note   When you define target names in VPN Solutions Center software, it is important that the target names you specify match the actual IOS host names of the corresponding devices.

Step 4   Enter the domain name for the NFC device.


Caution It is important to understand that when you specify both the domain name of a device and the IP address of a device, the IP address overrides the specified domain name.

Step 5   Click the Role drop-down menu, then choose NetFlow.


Note   Entering a description in the Description pane is not required but recommended.

Step 6   Click the Passwords tab (see Figure 3-17).


Figure 3-17: Passwords Tab for NetFlow Collector Device


Step 7   Complete the Login User and Login Password fields as necessary.

VPNSC: MPLS Solution uses the username and Login password specified here to communicate with the NFC device. The Login password is a required password—this password must be set both on the router and in VPNSC.

Step 8   Complete the Retries and Timeout fields as necessary.

The recommended value for Retries is 4; the recommended value for Timeout is 20 seconds.

Step 9   Choose the IP Addresses tab and click Add.

The Add IP Address dialog box appears (see Figure 3-18).


Caution It is important to understand that when you specify both the domain name of the device and the IP address of the device, the IP address overrides the specified domain name.


Figure 3-18: Add the IP Address for the NetFlow Collector Device


Step 10   Enter the IP address for the selected NFC device, then click OK.

You return to the IP Addresses tab, where the IP address you entered is now displayed.

This completes the procedure for adding an NFC device to the network.


Viewing Devices in the Network by Their Role

You can view lists of the existing devices in a network by the role assigned to them as either Cisco routers or NetFlow Collector devices.

To view devices by their role, follow these steps:


Step 1   From the VPN Console hierarchy pane, select the desired network and double-click.

The Network window appears in the data pane. By default, all the routers in the selected network are listed in the Network window.

Step 2   From the Network window, choose View > Filter by Role.As shown in Figure 3-19, a submenu appears with two options: Cisco Router and NetFlow.


Figure 3-19: Network Window View Menu


  When you choose NetFlow, a screen like that shown in Figure 3-20 appears.

Figure 3-20: Viewing NetFlow Collector Devices in the Network



Defining Provider Administrative Domains

The VPNSC: MPLS Solution software allows you to define as many Regions within a Provider Administrative Domain (PAD) as you need. PADs are divided into Regions in much the same way that customers are divided into sites. A Region can be considered to be a group of provider edge routers (PEs) within a single BGP autonomous system. The primary objective for defining Regions is to allow a provider to employ unique IP address pools in large Regions, such as Europe, Asia Pacific, and so forth.

Note that a provider can also assign PEs to these Regions, thereby simplifying the PE selection process (for example, only presenting PEs in the European Region when adding service to a European customer edge router).


Tips Cisco recommends that providers create one Provider Administrative Domain and then define the Regions within the PAD.

Before you begin this procedure, have the following information at hand:

  There is generally one BGP AS number per Provider Administrative Domain.

To define a new Provider Administrative Domain, follow these steps:


Step 1   From the VPN Console menu, choose Setup>New Provider Administrative Domain.

The New Provider Administrative Domain dialog box appears (see Figure 3-21).


Figure 3-21: The New Provider Administrative Domain Dialog Box


Step 2   Enter the name of the PAD and the BGP Autonomous System (AS) number in the appropriate fields.

Each autonomous system is assigned a unique 16-bit number by the same central authority that assigns IP network numbers.

The contact information is optional, but it is a good idea to provide it.

The Regions pane on the dialog box shown in Figure 3-21 is where existing Region names are displayed. Regions must have a name, assigned PEs, and their corresponding IP address pools.

Defining a New Region in a PAD

A Region can be considered to be a group of provider edge routers (PEs) within a single BGP autonomous system.

Step 3   To begin defining a new Region, from the New Provider Administrative Domain dialog box, click Add.

The Region dialog box appears (see Figure 3-22).


Figure 3-22: Defining a New Region


Step 4   Enter the name of the Region.

The next step in creating a Region is to assign the provider edge routers that are in the Region.


Assigning the Provider Edge Routers to a Region

To assign the provider edge routers for the Region, follow these steps:


Step 1   From the New Region dialog box, click Add.

When you select the Add button from the Region dialog box, the Add Provider Edge Routers dialog box appears.

Step 2   From the dialog box's Network drop-down list, select the appropriate service provider network name (or a network that contains provider devices).

The names of the targets (routers) in the selected service provider network are displayed (see Figure 3-23).


Figure 3-23: Assigning Provider Edge Routers


Step 3   From the list of routers, select a router to be assigned as a PE, then click OK.

You return to the Region dialog box. The name of the router you selected is now displayed in the list of PE Routers.

Step 4   Repeat this procedure to add additional PEs to the Region as required.

When all the provider edge routers for a Region are assigned, the next task is to assign the IP address pool for the Region (see the "Defining the IP Address Pools for a Region" section).


Adding Provider Edge Routers to a Region

You can add only PEs that are not already assigned to a Region. To add PEs to a Region, follow these steps:


Step 1   In the VPN Console hierarchy pane, select the name of the Provider Administrative Domain (PAD), then right-click.
The PAD menu appears (see Figure 3-24).


Figure 3-24: The PAD Menu


Step 2   From the PAD menu, choose Open Provider A.D.

The Edit Provider Administrative Domain dialog box appears (see Figure 3-25).


Figure 3-25: Edit Provider Administrative Domain Dialog Box


Step 3   From the list of Regions, choose the Region to which the PE is to be added.

Step 4   Click Edit. The Region dialog box appears (see Figure 3-26).


Figure 3-26: The Region Dialog Box


Step 5   From the Region dialog box, click Add.


Figure 3-27: Selecting the PE to Be Added to the Region


Step 6   In the Add Provider Edge Routers dialog box, do the following:

You return to the Region dialog box, where you can see, as shown in Figure 3-28, that the selected router has been added to the list of PE Routers in the Region.


Figure 3-28: The PE Is Added to the Region


Step 7   To complete the operation, click OK. You return to the Edit Provider Administrative Domain dialog box.

Click OK again to return to the VPN Console.


Finding a Specific VPN Service Provider

To find a specific VPN service provider, follow these steps:


Step 1   From the VPN Console window, choose Find > Find VPN Provider.

The Find dialog box appears with the category VPN Provider already selected, as shown in Figure 3-29.


Figure 3-29: The Find VPN Provider Dialog Box


Step 2   In the Find What field, enter the name of the VPN Provider you want to find.

Step 3   If you want the search to match the case of the VPN Provider name you enter, check the Match Case check box.

Step 4   Choose the direction of the search by clicking the Up or Down radio button.

Step 5   When you have completed the search parameters, click Find Next.

The VPNSC software locates the indicated VPN Provider and highlights it in the hierarchy pane.


Defining the IP Address Pools for a Region

The VPNSC: MPLS Solution software uses IP address pools to automatically assign IP addresses to PEs and CEs. Each Region has an IP address pool to use for IP numbered addresses (point-to-point address pool) and a separate IP address pool for IP unnumbered address (loopback address pool).

Within a VPN or extranet, all IP addresses must be unique. Customer IP addresses must not overlap with the provider's IP addresses. Overlapping IP addresses are only possible when two devices cannot see each other—that is, when they are in isolated VPNs.


Caution Due to security and maintenance issues, Cisco does not recommend using customer IP addresses on the PE-CE link.


Step 1   From the Region dialog box, choose the IP Address Pools tab (see
Figure 3-30).


Figure 3-30: Defining a Region's IP Address Pool


From this dialog box, you can add IP address pool information for point-to-point (IP numbered) links or loopback (IP unnumbered) links.

Step 2   Choose which type of address pool you are defining and click Add. The New IP Address Pool dialog box appears (see Figure 3-31).


Figure 3-31: Entering a New IP Address Pool


Step 3   Enter the address for the IP address pool and click OK.

You return to the IP Address Pools dialog box, where the new IP address pool information is displayed.

Step 4   Click OK.

You return to the New Provider Administrative Domain dialog box, where the new Region name is displayed in the Regions field.


Customizing the Route Distinguisher and Route Target Values

MPLS-based VPNs employ BGP to communicate between PEs to facilitate customer routes. This is made possible through extensions to BGP that carry addresses other than IPv4 addresses. A notable extension is called the route distinguisher (RD).

The purpose of the route distinguisher (RD) is to make the prefix value unique across the network backbone. Prefixes should use the same RD if they are associated with the same set of route targets (RTs) and anything else that is used to select routing policy. The community of interest association is based on the route target (RT) extended community attributes distributed with the Network Layer Reachability Information (NLRI).The RD value must be a globally unique value to avoid conflict with other prefixes.

The MPLS label is part of a BGP routing update. The routing update also carries the addressing and reachability information. When the RD is unique across the MPLS VPN network, proper connectivity is established even if different customers use non-unique IP addresses.

For the RD, every CE that has the same overall role should use a VRF with the same name, same RD, and same RT values. The RDs and RTs are only for route exchange between the PEs running BGP. That is, for the PEs to do MPLS VPN work, they have to exchange routing information with more fields than usual for IPv4 routes; that extra information includes (but is not limited to) the RDs and RTs.

VPNSC: MPLS Solution software sets the route distinguisher and route target values, but you can assign your own values if you choose (as described in this section).

You can also override the default RD value set by the VPN Solutions Center software. For instructions, see the "Overriding the Default VRF Name and Route Distinguisher Values" section.


Note   You can change the RD and RT values with the VPNSC: MPLS Solution software for a given Provider Administrative Domain (PAD) only when creating a new PAD. You cannot edit the RD and RT values once they are initially set.

By default, the product software assigns the RD values as follows:

Each spoke uses its own RD value for proper hub and spoke connectivity between CEs; therefore, the VPNSC: MPLS Solution software implements a new RD for each spoke that is provisioned.

To assign the Route Distinguisher or Route Target values, follow these steps:


Step 1   From the New Provider Administrative Domain dialog box (see Figure 3-21), choose the Advanced tab.

The New PAD Advanced dialog box appears (see Figure 3-32), which allows you to alter the default Route Distinguisher and Route Target values.


Figure 3-32: Setting the Route Distinguisher and Route Target Values


Step 2   In the Start Route Distinguisher Values At <BGP AS#> field, enter the new Route Distinguisher value.

Step 3   In the Start Route Target Values At <BGP AS#> field, enter the new Route Target value.

Step 4   Click OK.


Adding a Region to an Existing Provider Administrative Domain

To add a Region to an existing Provider Administrative Domain, follow these steps:


Step 1   From the VPN Console hierarchy pane, click the open-close icon for the Provider Administrative Domain folder.

The list of Provider Administrative Domains is displayed.

Step 2   Select the desired Provider Administrative Domain and right-click. The PAD menu appears (see Figure 3-33).


Figure 3-33: Accessing the PAD Menu


Step 3   From the PAD menu, choose New Region. The Region dialog box appears, as shown in Figure 3-22.

Step 4   Complete the procedures as described in the previous sections, "Assigning the Provider Edge Routers to a Region" and "Defining the IP Address Pools for a Region."


Deleting a Region

Only a Region without any active service requests associated with that Region can be deleted.

To delete a Region from a Provider Administrative Domain, follow these steps:


Step 1   From the VPN Console hierarchy pane, click the open-close icon for the Provider Administrative Domain folder.

Step 2   Click the desired Provider Administrative Domain's open-close icon.

The list of Regions is displayed.

Step 3   Select the desired Region, then right-click.

Step 4   From the Regions menu, choose Delete Region.

A confirmation window appears with the message, "Are you sure you want to delete this Region?"

Step 5   Click Yes.

The Region is deleted and removed from the VPN Console display.


Finding a Specific Provider Region

To find a specific region, follow these steps:


Step 1   From the VPN Console window, choose Find > Find Provider Region.

The Find dialog box appears with the category Provider Region already selected, as shown in Figure 3-34).


Figure 3-34: Find Provider Region Dialog Box


Step 2   In the Find What field, enter the name of the Region you want to find.

Step 3   If you want the search to match the case of the Region name you enter, check the Match Case check box.

Step 4   Choose the direction of the search by clicking the Up or Down radio button.

Step 5   When you have completed the search parameters, click Find Next.

The VPNSC software locates the indicated Region and highlights it in the hierarchy pane.

Step 6   Close the Find dialog box.


Showing the Topology for a Provider Administrative Domain

This section provides an overview of main features for viewing the Provider Administrative Domains topology. This section does not describe all the topology features in detail. For details on each of the menus and options available from the Topology window, refer to "Topology" in Chapter 10 of the VPN Solutions Center: MPLS Solution User Reference.

To display the topology for a particular Provider Administrative Domain, follow these steps:


Step 1   In the hierarchy pane of the VPN Console, select the name of the Provider Administrative Domain, then right-click. The PAD menu appears (see
Figure 3-33).

Step 2   From the PAD menu, choose Show Topology.

The VPNSC software displays the current top-level topology for the selected Provider Administrative Domain (see Figure 3-35).


Figure 3-35: Top-Level Topology Display for the PAD


Step 3   Use the functions and features in the Topology windows to view various aspects of the PAD topology.


Viewing the List of Regions and PEs in Each Region

When you open the folders in the hierarchy pane, you can see the names of the PEs, the Regions, and the Service Provider with whom they are associated (see Figure 3-36).


Figure 3-36: Viewing the Elements in the PAD


Sorting the Regions and PEs


Step 1   You can sort the display of Regions and Provider Edge Router. To do so, select either the Regions or Provider Edge Routers folder and right-click. The Sort menu appears (see Figure 3-37).

Step 2   To sort the list in ascending order, choose Sort > Ascending; to sort the list in descending order, choose Sort > Descending.


Figure 3-37: The Topology Sort Menu



Retrieving Region and PE Details

You can view and retrieve various details concerning the Regions and PEs in a specific PAD.


Step 1   To do so, select the name of a Region or the name of a specific PE. The Node menu appears (see Figure 3-38).


Figure 3-38: Viewing Details with the Node Menu Options


The Node menu presents the following options:

  Choose List Service Requests to generate the VPN Service Requests Report that lists the service requests associated with the selected Region or PE.

Figure 3-39: The VPN Service Requests Report


  An element displayed with a + (plus) sign indicates that more information is available. The Navigation option offers two options: Go to Child Graph and Show Child Graph.
  The View As option provides two options: Icon and Details.
  Choosing the Edit Font option brings up the Choose Font dialog box. From this dialog box, you can choose the font type and size for the topology display.
  Choosing the Background Color option brings up the Choose Color dialog box. From this dialog box, you can choose the background color for the topology display.
  Choosing the Foreground Color option brings up the Choose Color dialog box. From this dialog box, you can choose the foreground color for the topology display.

Step 2   Choose the options you need from the Node menu.


About Class of Service with VPNSC: MPLS Solution Software

As part of their VPN services, service providers may wish to offer premium services defined by Service Level Agreements (SLAs) to expedite traffic from certain customers or applications. Quality of Service (QoS) and its implementation through Class of Service (CoS) mechanisms in IP networks gives devices the intelligence to preferentially handle traffic as dictated by network policy.

About QoS

Quality of Service (QoS) is typically used to describe a situation in which the network provides preferential treatment to certain types of traffic, but the term is not specific about exactly which mechanisms are used to provide these services.

QoS is not a device feature, it is an end-to-end system architecture. A robust QoS solution includes a variety of technologies that interoperate to deliver scalable, media-independent services throughout the network, with system-wide monitoring capabilities.

QoS is defined as those mechanisms that give network managers the ability to control the mix of bandwidth, delay, jitter, and packet loss in the network.

The actual deployment of QoS in a network requires a division of labor for greatest efficiency. Because QoS requires intensive processing, the Cisco model distributes CoS duties between edge and core devices. Edge devices, such as provider edge routers (PEs), do most of the processor-intensive work, performing application recognition to identify flows and classify packets according to unique customer policies. Edge devices also provide bandwidth management. Core devices expedite forwarding while enforcing CoS levels assigned at the edge.

About CoS

Class of Service (Cos) is distinguished by providing differentiated classes of service. Before you can provide a higher quality of service to a customer, application, or protocol, you must classify the traffic into classes, and then determine the way in which to handle the various traffic classes as traffic moves through the network.

When differentiation is performed, it is done to identify traffic by a unique criteria and classify incoming traffic into classes. Each of the traffic classes must be recognized by the classification mechanisms at the network ingress point, as well as farther along in the network topology.

CoS differentiation is usually performed as a method of identifying traffic as it enters the network or a method that ensures that traffic is classified appropriately so that it is forced to conform with the desired user-defined policy or service-level agreement (SLA).

VPNSC: MPLS Solution software provisions Class of Service on the ingress PE interfaces and the egress CE interfaces. VPNSC: MPLS Solution offers the following features for Class of Service (CoS) provisioning between a CE and a PE:

  Shaping is a method of mapping traffic into separate output queues to provide predictable network behavior. In MPLS VPNs, shaping is configured on either the CE's or PE's egress interfaces. For shaping, the product uses Generic Traffic Shaping (GTS) that includes an optional feature that handles Frame Relay Backward Explicit Congestion Notification (BECN) responses.
  Takes place into a PE from a CE and configured on the CE's or PE's egress interfaces. The product uses Committed Access Rate (CAR) for policing.
  Congestion management is a scheme that provides preferential treatment to certain classes of traffic when the network is congested. In the context of MPLS VPNs, congestion management is put in place to manage heavy traffic from a PE as it moves to a CE. The product employs both GTS and (D)WRED.
  GTS for congestion management is not a full-featured technique because it cannot preferentially queue and drop packets based on precedence. However, the ideal solution—Class-Based Weighted Fair Queueing—is not currently available.
  GTS still has the powerful property of protecting other customers' SLAs, which are supported on shared fabric between the PE and CE. That is, if one customer suddenly converges all his traffic towards one CE, GTS shapes this load so that the shared medium is not saturated, hence preventing failure on all SLAs in the vicinity.
  The other choice, Distributed Weighted Random Early Detection ((D)WRED) is simple to configure, although not particularly precise. (D)WRED is configured on the PE's egress interfaces.
  VPNSC: MPLS Solution over-specifies the inputs for congestion management, even though the current configuration uses only the bandwidth total.

All three techniques rely on existing IP precedence values in all packets. Policing may change these values, but the values to differentiate the service classes must have already been set before exiting from the CE. The setting of initial IP precedence values is called painting or marking.

Defining a Class of Service Profile

A Class of Service (CoS) profile represents a set of CoS configurations offered by a provider to its customer. Each CoS profile consists of a set of CoS classes that record information on how traffic shaping and policing are configured.

The VPNSC: MPLS Solution software requires that you create a Class of Service (CoS) Profile only if you want the product to provision CoS on the PE-CE link. You can add additional CoS profiles at any time. This procedure only defines the CoS Profile—until you invoke it when you activate a service request, the CoS Profile has no effect.

Class of Service Profiles are applied to the Provider Edge Router (PE), but the CoS definition is enforced across the PE-CE link on both the PE and CE.

To define a Class of Service Profile, follow these steps:


Step 1   From the VPN Console hierarchy pane, select the name of the pertinent Provider Administrative Domain, then right-click. The PAD menu appears (see
Figure 3-40).


Figure 3-40: The PAD Menu


The PAD menu lets you open (that is, edit) the current settings for the administrative domain, define a new Region, list the service requests active for this administrative domain, and view the current topology for that domain.

Step 2   Choose Open Provider A.D.

The Edit Provider Administrative Domain dialog box appears.

Step 3   Choose the Class of Service (CoS) Profiles tab, then click Add.

The New Class of Service Profile dialog box appears (see Figure 3-41).


Figure 3-41: Defining a Class of Service Profile


Step 4   Complete the Class of Service profile, then click OK.

Valid input for the in-contract bandwidth is a range from 8,000 to 2,000,000,000 (in bits per second).


The PE can rate limit traffic to the subscribed bandwidth and mark the traffic that is within the specified bandwidth as in-contract, and mark traffic above the specified bandwidth as out-of-contract.

Marking a packet as in-contract or out-of-contract is done by setting the first bit of the precedence bits in the IP header. The appropriate class is indicated by the remaining two precedence bits (see Table 3-1). Traffic that exceeds any class is marked as out-of-contract, and this traffic can be dropped or mapped to a lower class of service. The out-of-contract bandwidth is initially set to the in-contract bandwidth, but you can set this to the values appropriate for the customer.


Table 3-1: Mapping IP Precedence to Class of Service
IP Precedence Contract Status Class of Service

111

In-contract

Class 1

110

In-contract

Class 2

101

In-contract

Class 3

100

In-contract

Class 4

011

Out-of-contract

Class 1

010

Out-of-contract

Class 2

001

Out-of-contract

Class 3

000

Out-of-contract

Class 4

The customer can initially "paint" the packets that leave the customer edge router (the PE is the destination router), and VPNSC: MPLS Solution allows policing or repainting of packets that enter the provider edge router.

For more information, see the "Quality of Service and Class of Service" section.

Backing Up the Repository

Backing up the Repository is managed through the Repository Management tools, which you can access through any Web browser.

The Backup tool backs up the VPN Solutions Center Repository, which includes all the database files, collected raw datasets, generated baseline reports, logs, service objects, and configlets, to a local directory on the VPNSC: MPLS Solution machine. The backup options include Tar (which stands for "tape archiver" even though tape is rarely the backup medium these days) or Tar and compress.

To back up the Repository, follow these steps:


Step 1   From the VPN Console menu, choose File > Repository Administration.

The Cisco VPN Solutions Center Repository Management Tool window appears (see Figure 3-42).


Figure 3-42: VPN Solutions Center Repository Management Tool


Step 2   Click Backup.

The Database Backup dialog box appears (see Figure 3-43).


Figure 3-43: Repository Backup Options Dialog Box


Step 3   In the Source Directory field, enter the path name for the Repository you want to back up.

The Source Directory field is required. This field defaults to the directory of the currently used Repository. If you choose a different Repository to back up, in this field place the full path name to the directory of the Repository that you want to back up.

Step 4   In the Destination Directory field, enter the full path name to the directory where you want to copy the Repository files.

Step 5   Determine the method you want for Repository backup by choosing one of the following:

  Choose this option if you want to back up the Repository and leave everything as is and copy the files to the destination directory.
  Choose this option if you want to back up the Repository and copy it to a TAR file in the destination directory.
  Choose this option if you want to back up the Repository and copy it to a compressed TAR file in the destination directory.

Step 6   If you want to turn on the verbose option when backing up the database, check the Show Details check box. This option gives you detailed progress information.

Step 7   Once you have completed the fields, buttons, and boxes in the Database Backup dialog box, click Start Backup.


Note   Optional: To return the fields and other settings on the Database Backup dialog box to their default values, choose Reset.


Restoring the Repository

The Cisco VPNSC Repository Management Tool provides a way to restore a backup Repository into a working Repository. The tool automatically reconfigures the VPN Solutions Center software to use the restored Repository and restarts the VPNSC WatchDog servers so that they use the restored Repository.

To restore the Repository, follow these steps:


Step 1   From the VPN Console menu, choose File > Repository Administration.

As shown in Figure 3-42, the Cisco VPN Solutions Center Repository Management Tool page appears.

Step 2   Shut down the VPN Console by choosing File > Exit.

Shutting down the VPN Console prevents other processes from writing to the Repository during the restoration process.

Step 3   Choose Restore. The Database Restore dialog box appears (see Figure 3-44).


Figure 3-44: The Database Restore Dialog Box


Step 4   In the Source Directory/File field, enter the directory (or path to a filename) from which you are restoring the Repository.

Step 5   In the Destination Directory field, enter the drive and path to the directory where you want to restore the Repository.


Caution The destination directory for the restoration operation must be empty. If you restore a Repository over an existing Repository, valuable data may be lost and service requests may not function correctly.

Step 6   Set the Restore operation options if desired:

Step 7   When you have completed the fields, click Restore.

You receive the prompt, "Do you really want to continue?"

Step 8   To proceed with the Repository restoration operation, click OK.

The next page provides the following information:

The Database Restore Process has started!
The Database backup file is path/filename.
Restore to directory pathname.
The execution string is dbRestore source_path ~dest destination_path -c
Click here to look at the Status.

Step 9   To check the status of the Restore operation, choose the Status link.

The Cisco VPNSC Repository Management Tool displays the Status page.


Setting Up SNMP on the Routers in the Service Provider Network

The Simple Network Management Protocol (SNMP) must be configured on each PE router and CE router in the service provider network. To determine whether SNMP is enabled and set the SNMP community strings on a router, execute the following steps for each router.

Step
Command
Description or Task
1

> telnet routername

routername is the name of the router you are checking.

2

Router> enable

Router> enable-password

Enter enable mode and enter the enable password.

3

Router# show snmp

4

Check the output to see whether the following statement is present: SNMP agent not enabled

5

Router# configure terminal

Enter global configuration mode. You can also abbreviate the command to config t.

6

Router(config)# snmp-server community userstring RO

Set the community read-only string.

7

Router(config)# snmp-server community userstring RW

Set the community read-write string

8

Router(config)# Ctrl+Z

Return to privileged Exec mode.

9

Router# copy running startup

Save the configuration changes to NVRAM.


Tips The SNMP strings defined in the VPNSC: MPLS Solution target password database must agree with those set on each router in the service provider network. The procedure for setting the SNMP community strings in the VPNSC: MPLS Solution software is described in the "Completing the Target Information for Individual Targets" section.


hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Sep 20 14:57:03 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.