|
|
Figure 7-1, "Provisioning Menu," provides a view of the Provisioning menu in the menu task bar.

The Provisioning menu includes the following options:
This section explains how to submit a new Service Request to add VPN service between a PE and a CE.
To add VPN service to a CE, implement the following steps:
![]() |
Note An alternative to selecting Provisioning > Add VPN Service to CE is to select Tools > Tasks and then in the Actions menu item select New Task > Add VPN Service to CE and click Ok. Both paths navigate to the same set of wizards. |

The next window to appear is an Introduction that explains what occurs when taking this path.
Step 2 Click Next in the Introduction window to continue.
Step 3 In Figure 7-3, "Add VPN Service to CE," use the drop down menu to select the Customer from which you want to select a CE.

Step 4 Use the drop-down menu to select the Site from which you want to select the CE.
Step 5 In the CE Routers area, highlight one CE router you want to select.
Step 6 Click Next to continue.
Step 7 In the resulting window, as shown in Figure 7-4, "Add VPN Service to CESelect PE," use the drop-down menu to select the Provider from which you want to select a PE.

Step 8 Use the drop-down menu to select the Region from which you want to select a PE.
Step 9 In the PE Routers area, highlight one PE router that you want to select.
Step 10 Click Next to continue.
Step 11 From the Select a VPN area in Figure 7-5, "Add VPN Service to CESelect VPN," select the VPN for which you want to become a member.

Step 12 Optionally click one of the following:
![]() |
Note Refer to the Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide for more information. |
Step 13 Click Next to continue.
Step 14 In the next window to appear, the layout depends on which of the following routing protocols is chosen:
With each routing protocol selected, certain choices are made available.
This section explains the navigation path when you select the Static routing protocol.

Step 2 Click Next.
Step 3 The next window to appear is shown in Figure 7-7, "Add VPN Service to CEStatic Type."

![]() |
Note If in Figure 7-6, "Add VPN Service to CESelect Static," you chose Give Only Default Routes to CE, the defaults will be chosen and the window that appears will not have the bottom area as shown in Figure 7-7. |
Step 4 In the top area in Figure 7-7, "Add VPN Service to CEStatic Type," click Add.
Step 5 In the resulting window, as shown in Figure 7-8, "Advertised Routes," you can enter all CE routes that you want advertised to other CEs in the same VPN. Enter the specific address in IP Address and click Add.
This populates the top area. Then you can choose to Modify or Delete entries in this top area.

Click Ok to continue.
Step 6 In the bottom area in Figure 7-7, "Add VPN Service to CEStatic Type," click Add.
Step 7 In the resulting window, as shown in Figure 7-9, "Routes to Reach All Sites," you can enter routes to reach all sites. Enter the specific address in IP Address and click Add.
This populates the bottom field. Then you can choose to Modify or Delete entries in this bottom field.

Step 8 Click Ok to continue.
Step 9 You will be returned to a window as in Figure 7-7, "Add VPN Service to CEStatic Type," and you will find the field populated.
Click Next to continue.
Step 10 Proceed to the "Steps After Choosing the Protocol" section.
This section explains the navigation path when you select the OSPF routing protocol.

Step 2 Click Next.
Step 3 The next window to appear is shown in Figure 7-11, "Add VPN Service to CERedistributed Protocols."
Click Add to add the routing protocol you want to redistribute into OSPF.

Step 4 In the resulting window, as shown in Figure 7-12, "Redistributed Protocols," select a redistributed protocol. Note: Only OSPF is not available for selection. This allows a CE using OSPF to learn its routing information by redistribution.

Step 5 Click Add to populate the lower area with the protocol you choose.
Step 6 Repeat Step 4 and Step 5 until you have populated the bottom area with all the redistributed protocols you want to use.
![]() |
Note Once information exists in the bottom area, you can highlight an item and click Delete to delete it. |
Step 7 Click Ok to continue.
Step 8 You will be returned to a window as in Figure 7-11, "Add VPN Service to CERedistributed Protocols," and you will find the area populated.
Click Next to continue.
Step 9 Proceed to the "Steps After Choosing the Protocol" section.
This section explains the navigation path when you select the BGP routing protocol.

Step 2 Click Next.
Step 3 The next window to appear is shown in Figure 7-14, "Add VPN Service to CEBGP Type."
Click Add to add the routing protocol you want to redistribute into BGP.

Step 4 In the resulting window, shown in Figure 7-15, "Redistributed Protocols," select a redistributed protocol. Note: Only BGP is not available for selection. This allows a CE using BGP to learn its routing information by redistribution.

Step 5 Click Add to populate the lower field with the protocol you choose.
Step 6 Repeat Step 4 and Step 5 until you have populated the bottom field with all the redistributed protocols you want to use.
![]() |
Note Once information exists in the bottom field, you can highlight an item and click Delete to delete it. |
Step 7 Click Ok to continue.
Step 8 You will be returned to a window as in Figure 7-14, "Add VPN Service to CEBGP Type," and you will find the field populated.
Click Next to continue.
Step 9 Proceed to the "Steps After Choosing the Protocol" section.
This section explains the navigation path when you select the RIP routing protocol.

Step 2 Click Next.
Step 3 The next window to appear is shown in Figure 7-17, "Add VPN Service to CERIP Type."
Click Add to add the routing protocol you want to redistribute into RIP.

Step 4 In the resulting window, shown in Figure 7-18, "Redistributed Protocols," select a redistributed protocol. Note: Only RIP is not available for selection. This allows a CE using RIP to learn its routing information by redistribution.

Step 5 Click Add to populate the lower field with the protocol you choose.
Step 6 Repeat Step 4 and Step 5 until you have populated the bottom field with all the redistributed protocols you want to use.
![]() |
Note Once information exists in the bottom field, you can highlight an item and click Delete to delete it. |
Step 7 Click Ok to continue.
Step 8 You will be returned to a window as in Figure 7-17, "Add VPN Service to CERIP Type," and you will find the field populated.
Click Next to continue.
Step 9 Proceed to the "Steps After Choosing the Protocol" section.
This section explains the navigation path when you select the None option (recommended for cable).

Step 2 Click Next.
Step 3 Proceed to the "Steps After Choosing the Protocol" section.
After choosing a routing protocol, in the resulting window, shown in Figure 7-20, "Add VPN Service to CESelect PE CE Interface," you select information about the type of interface.

Step 2 In the second area, do the following:
Step 3 In the final area, select the interface and encapsulation types for the CE from the Interface and Encapsulation drop-down menus, respectively. The Interface choices come from the configuration file and the Encapsulation choices are associated by the interface.
Step 4 Click Next to continue.
Step 5 The layout of the next window to appear depends on the interface and encapsulation you chose in Figure 7-20, "Add VPN Service to CESelect PE CE Interface." Figure 7-21, "Example of Add VPN Service to CESelect Encap Info," is an example of selecting encapsulation information.
Enter the following information for the associated encapsulation types:
For other encapsulation types, this window does not appear. Proceed to Step 6.

Step 6 In the next window, as shown in Figure 7-22, "Add VPN Service to CESelect IP Address," select an IP addressing scheme for the PE and CE.
Select one of the following:
Additionally, you can check the box to Use Automatically Assigned IP Address (only if you chose WAN in Figure 7-20, "Add VPN Service to CESelect PE CE Interface") or uncheck the box and enter IP address information for the following (the choices available depend on the address scheme you chose):

Step 7 Click Next to continue.
Step 8 In the resulting window, as shown in Figure 7-23, "Add VPN Service to CESelect VRF Parameters," enter the following information:
![]() |
Note The bottom part of this window with the WARNING and the ability to enter VRF Name and RD Value only appears when you have set the property netsys.srvc.VRFRDOverride.unix to true in the csm.properties file. This setting allows the manual modification of the VRF name and route distinguisher (RD). |

Step 9 Click Next to continue.
Step 10 In the next window, as shown in Figure 7-24, "Add VPN Service to CESelect CoS Profile," from the list, you can optionally highlight a Class of Service (CoS) profile to assign to the PE to CE link.

Step 11 Click Next to continue.
Step 12 The final window, as shown in Figure 7-25, "Add VPN Service to CEConfirm," provides a list of all the information for Add VPN Service to CE. Review this information. If information is inaccurate, be sure to continue to click < Back until you reach the window to update the invalid information. Then click Next until you exit.

If the information in this final window is accurate, click Next to complete this path.
The information in this section is only applicable if you chose the encapsulation type Frame Relay or Frame Relay IETF in Step 5 in the "Steps After Choosing the Protocol" section.
Local Management Interface (LMI) is a signalling standard between the router and the Frame Relay switch that provides a Frame Relay management mechanism. The LMI type must match the type used by the network. Changing the LMI type is a global change that affects all service requests (for related information, see the next section, "Applying a Mixed Set of LMI Types").
If a service provider or customer needs to modify the Frame Relay Local LMI types, they can do so by modifying the appropriate property in the csm.properties file. Changing the LMI type in this way applies the Frame Relay modification to the Customer Edge router (CE) only.
You can set the LMI type to any one of three values:
| LMI Value | Description |
|---|---|
ansi | Annex D defined by ANSI standard T1.617 |
cisco | LMI type defined jointly by Cisco and other companies. This is the default. |
q933a | ITU-T Q.933 Annex A |
To modify the LMI type in the csm.properties file, follow these steps:
Step 2 Go to the directory /<install_directory>/vpn/etc.
Step 3 Open the csm.properties file with a text editor.
Step 4 Find the following line in the csm.properties file:
netsys.watchdog.server.CVPIMServer.frameRelayLmiType = none
Step 5 Change the none value to the appropriate LMI type value. For example, to change the LMI type to cisco, you would edit the line as follows:
netsys.watchdog.server.CVPIMServer.frameRelayLmiType = cisco
Step 6 Save your changes and exit the file.
Step 7 Log out (exit) from the vpnadm user.
Changing the LMI type is a global change that affects all active service requests. To apply a mixed set of LMI types, do the following:
Step 2 In the VPN Console, deploy the service requests that are associated with the LMI value set in Step 1.
Step 3 Modify the csm.properties file again to set the desired LMI type for the next set of service requests.
Step 4 In the VPN Console, deploy the service requests that are associated with the LMI value set in Step 3.
This section explains how to set up a scheduled task that deploys Service Request(s) to the appropriate routers.
To deploy Service Requests, implement the following step:
![]() |
Note An alternative to selecting Provisioning > Deploy Service Requests is to select Tools > Tasks and then in the Actions menu item select New Task > Deploy Service Requests and click Ok. Both paths navigate to the same set of wizards. |

The next window to appear is an Introduction that explains what occurs when taking this path.
Step 2 Click Next in the Introduction window to continue.
The next window to appear is shown in Figure 7-27, "Deploy Service RequestsDeploy Which Requests."

Step 3 From the window in Figure 7-27, "Deploy Service RequestsDeploy Which Requests," choose which of the following you want to deploy:
Step 4 Click Next to continue.
If you selected Deploy selected service requests the next window to appear is as shown in Figure 7-28, "Deploy Service RequestsSelect Requests," and you should proceed to Step 5.
If you selected Deploy all new service requests, proceed to Step 7.

Step 5 From the window in Figure 7-28, "Deploy Service RequestsSelect Requests," choose one or more specific Service Request IDs.
Step 6 Click Next to continue.
Step 7 From the window in Figure 7-29, "Deploy Service RequestsSelect Audit Options," choose either of the following:

Step 8 Click Next to continue.
Step 9 In the next window, as shown in Figure 7-30, "Deploy Service RequestsSave," provide a unique Task Name.
![]() |
Note From the drop-down menu, you can view the last 30 existing task names for this specific task type. This can facilitate the creation of a unique task name and the adherence to the existing task naming conventions. From the drop-down list, you can highlight a similar task name to the one you want to create and then click on it. The name will appear in the Task Name field. Then you can edit the name to be a unique name. Otherwise, you can highlight Enter Name Here and enter a unique name in the Task Name field. |

Step 10 Click Next to continue.
Step 11 In the next window you can choose to schedule the task by selecting Yes and clicking Next. In this case, the next step is Step 12.
You can choose not to schedule the task by selecting No and clicking Next. In this case, the next step is Step 13.
Step 12 If you chose to schedule the task, in the next window, choose the scheduling directions and click Next. See Chapter 13, "Scheduling," for a detailed description of scheduling.
Step 13 If you did not schedule the task, you are informed that "The task manager is about to save the task." If you did schedule the task, you are informed that "The task manager is about to save and schedule the task." If you want to change your mind on the scheduling instructions, click Back and return to Step 11 or Step 12. When you are ready to save and schedule the task, click Next.
Step 14 You are informed that "All steps are done." Click Close to close the wizard.
This section explains how to view a deployment log.
To view the deployment log, implement the following step:

The window that appears is as shown in Figure 7-32, "Task Logs Information." This presently is the same information as when you navigate Tools > Task Logs. See the "Task Logs" section.

This section explains how to export configlets to a directory.
To export Service Request configlets, implement the following steps:
![]() |
Note An alternative to selecting Provisioning > Export Service Request Configlets is to select Tools > Tasks and then in the Actions menu item select New Task > Export Service Request Configlets and click Ok. Both paths navigate to the same set of wizards. |

The next window to appear is an Introduction that explains what occurs when taking this path.
Step 2 Click Next in the Introduction window to continue.

Step 3 From the window as shown in Figure 7-34, "Export Service Request ConfigletsSpecify Output Directory," in the field enter the output directory for the configlets.
Step 4 Click Next to continue.
Step 5 From the window as shown in Figure 7-35, "Export Service Request ConfigletsSpecify Type of Requests," select the button Specific requests or a button for one of the states: Pending; Invalid; Failed Deploy; Deployed; Broken; Functional; Lost; or Closed.

Step 6 From the window as shown in Figure 7-36, "Export Service Request ConfigletsSelect Specific Requests," select one or more Service Requests.

Step 7 Click Next to continue.
The resulting window indicates completion and the name of the directory where the configuration files for the CE and PE reside.
Step 8 Click Close.
This section explains how to get a report of all new Service Requests with the state of Requested.
To list all new Service Requests, implement the following step:

An example of a report that lists new service requests is provided in Figure 7-38, "Sample New VPN Service Requests Report."

For information within the List New Service Requests reports, first see the generic report fields and their explanations in Chapter 14, "Reports Overview." Additionally each report has a report-specific Results area and bottom task bar information, as shown in the following sections.
The columns of information are as follows:
The buttons are described from left to right as follows:
![]() |
Note The system does not automatically purge Service Requests that have been removed (Remove VPN Service). These Service Requests are just marked as closed. To purge these closed Service Requests and therefore free up disk space, refer to the "Purge Closed Requests from Database" section. |
The Service Request Detail Report contains the detailed information of a Service Request entered at creation time and/or at the process of Provisioning. An example of the Service Request Detail Report is shown in Figure 7-39, "Example of Service Request Detail Report."

The buttons on the bottom task bar are described from left to right as follows:
This section explains how to get a report of all Service Requests in the system.
To list all Service Requests, implement the following step:

An example of a report that lists all service requests is provided in Figure 7-41, "Sample All VPN Service Requests Report."

For information within the List All Service Requests reports, first see the generic report fields and their explanations in Chapter 14, "Reports Overview." Additionally each report has a report-specific Results area and bottom task bar information, as shown in the following sections.
The columns of information are as follows:
The buttons are described from left to right as follows:
![]() |
Note The system does not automatically purge Service Requests that have been removed (Remove VPN Service). These Service Requests are just marked as closed. To purge these closed Service Requests and therefore free up disk space, refer to the "Purge Closed Requests from Database" section. |
The Service Request Detail Report contains the detailed information of a Service Request entered at creation time and/or at the process of Provisioning. An example of the Service Request Detail Report is shown in Figure 7-42, "Example of Service Request Detail Report."

The buttons on the bottom task bar are described from left to right as follows:
This section explains how to purge all closed Service Requests from the database.
![]() |
Note This is a maintenance task to eliminate waste of disk space. This purges closed Service Requests to clean up the database |
To purge closed requests from the database, implement the following steps:
a. Navigate to Provisioning > List All New Service Requests or Provisioning > List All Service Requests.
b. Select one Service Request.
c. From the bottom task bar, use the Provisioning drop-down menu, and choose Remove VPN Service.
d. Deploy the Service Request (refer to the "Deploy Service Requests" section).
e. Once the deployed Service Request goes to the pending state, you must audit the Service Request in order to close it (refer to Chapter 8, "VPN Console: Auditing Menu").
Step 2 From the VPN Console window, choose Provisioning > Purge Closed Requests from Database, as shown in Figure 7-43, "Purge Closed Requests from Database."

Step 3 From the resulting window shown in Figure 7-44, "WarningPurging Service Requests," choose one of the following:

![]() |
Note Remove VPN Service is an option in the bottom task bar from Provisioning > List All New Service Requests or Provisioning > List All Service Requests. It is not available directly from the Provisioning menu task bar. |
![]()
![]()
![]()
![]()
![]()
![]()
![]()
Posted: Thu Sep 21 12:21:03 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.