Table Of Contents
A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - R - S - T - U - V - W -
Index
A
access domain 1-14
ACLs
on the PE-CE link 1-31
role in MPLS security 1-30
address space separation 1-27
advertised routes 4-14
allowAS-in option 3-24
attacks, types of 1-29
audience, for guide xxv
autonomous system (AS) number
number of occurrences in AS path 3-24
autonomous systems, spanning 11-1
auto-pick route target values 3-7
B
backbone carrier
definition 9-1
BGP 1-13, 3-22
allowAS-in option 3-24
AS number for CE's network 3-24
community attribute 1-33
dampening 1-30
neighbor allowAS-in value 3-24
neighbor AS-override option 3-24
RDs and RTs 1-24
redistribute connected routes 3-23
redistributing protocols into BGP 3-24
route-target communities 1-25
security features 1-33
Border Gateway Protocol. See BGP
C
cable services
cable-CE, creating 8-6
CMTS 8-4
DOCSIS 8-4
maintenance subinterface, provisioning 8-6
MSO 8-4
primary IP address range 8-5
redistributing connected routes recommended 3-35
redistributing static routes 3-34
secondary IP address range 8-5
specifying no routing protocol 3-34
carrier supporting carrier. See CSC.
CE
BGP AS number for 3-24
cable-CE, creating 8-6
default routes to 3-17
description of 1-12
extra loopback address 3-14
managed CE considerations 7-2
and MCE 7-4, 7-7
OSPF process ID 3-27
routing context table 1-32
unmanaged CEs 7-1
CE present 3-10
CERC 3-37
auto-pick route target values 3-7
creating new CERC 3-6
full mesh 1-26
overview 1-25
route target values, entering 3-7
CERC not intialized C-5
closed state 4-2
CMTS 8-4
CNS 2100 Series Intelligence Engine
Wait Deployed state C-3
collection server 1-4, 1-12, 1-13, A-2, A-12
collection zones
assigning devices to A-14
defining A-13
devices assigned, list of A-15
confederation 11-8
configuration files
editing 4-35
security requirement 1-32
viewing 4-35
connected routes, redistributing 3-22, 3-25, 3-29, 3-33
crypto key generate rsa command A-4
CSC
creating a Service Request 9-5
defining a Service Policy 3-16, 3-17, 3-19, 3-23, 3-26, 3-30, 3-34, 9-5
definition 9-1
using MPLS 9-2
customer carrier
as a BGP/MPLS service provider 9-3
definition 9-1
D
dampening 1-30
Data Over Cable Service Interface Specifications. See DOCSIS
default information originate option 3-18
default routes 3-19
default routes to CE 3-17
denial-of-service attack 1-29
deployed state 4-2
deploying service requests 4-30
device access algorithm 4-4
Device Configuration Service (DCS) C-1
DOCSIS 8-4
documentation xxvi
document organization xxvi
download order for devices, specifying C-6
E
EBGP 3-23
edge device routers
access algorithm 4-4
SNMP, setting up A-4
editable attributes 3-8
EIGRP 3-29
metrics 3-31
encapsulations for each interface type 3-12
Ethernet-To-The-Home 10-9
export route map
defining name of 3-35
extranets 1-22
F
Failed Audit state C-3
failed audit state 4-3
failed deploy state 4-3
file descriptor limit, fixing problem with A-3
Frame Relay
IETF encapsulation 3-12
full mesh topology 1-26
definition 1-25
G
gateway of last resort 3-19
Generic Transport Library (GTL) C-1
H
hub-and-spoke topology 1-26
definition 1-25
hub route target 3-5
I
iBGP 3-23
IGP route label 11-6
import route map
defining name of 3-36
in-band connection 7-4
inter-autonomous systems
benefits 11-2
confederation 11-8
IGP route label 11-6
neighbor next-hop-self command 11-3
overview 11-1
redistribute connected command 11-5
redistribute connected subnets command 11-4
routing between AS's' 11-2
VPN route label 11-6
interfaces
cable maintenance subinterface, provisioning 8-6
encapsulations available 3-12
IP numbered 3-14
loopback, using existing number 3-15
subinterface numbers, how chosen by VPNSC 8-5
supported interfaces 3-11
Internet Service Provider. See ISP
intranets 1-22
intrusion attack 1-29
invalid state 4-3
Inventory and Connection Manager 3-2
IP address
keeping IP addresses on CE and PE intact C-6
IP addresses 3-8
automatically assigned 3-14
IP numbered with extra CE loopback 3-14
and network security 1-34
numbered 3-14
primary IP address range 8-5
secondary IP address range 8-5
unnumbered 3-14
VPN-IPv4 address 1-27, 3-36
in VPNs 1-13
IP address pools
and automatically assigned addresses 3-14
on the PE-CE link 3-8
and regions 3-15
IP Solution Center
collection server 1-12, A-2
device access algorithm 4-4
enabling TFTP A-8
network management subnet 1-12, A-2
processing server 1-12, A-2
servers, status of C-3
setting ISC workstation as TFTP server A-10
IP SolutionCenter
file descriptor limit A-3
ISP 8-5
secondary IP address range 8-5
J
jitter probes, enabling SA Agent for A-7
L
label spoofing 1-31
LDP authentication 1-32
login command A-4
login shell file A-3
loopback
extra loopback address on CE 3-14
interface number, using existing 3-15
and IP unnumbered addressing scheme 3-14
SR ID not included 3-16
loopback address missing C-6
lost state 4-3
M
managed CE
considerations 7-2
Management CE. See MCE
Management PE. See MPE
management route map 7-6
management VPN 1-12, 7-5, A-2
and export route map 3-36
and management route map 7-6
PE-CE links, provisioning 7-16
redistribute connected routes required 3-18
topology 7-5
maximum number of routes into VRF 3-36
MCE 7-4, 7-7
MPE 7-5
and shadow CE 7-5
MPLS services
provisioning workflow C-1
MPLS VPNs 1-20
address space separation 1-27
CERCs in 1-25
characteristics 1-21
connectivity between 1-32
default routes to CE 3-17
extranets 1-22
implementation techniques 7-4
in-band connection 7-4
intranets 1-22
management VPN 7-5
multiple VPNS merged into a single VPN 1-33
out-of-band VPN 7-5
principal technologies 1-21
route-target communities 1-25
routing protocols 3-16
routing separation 1-27
service requests, defining 4-6, 4-15, 4-24, 7-9, 8-6, 8-11
VRF forwarding table 1-32
MPLS VPN Solution
security requirements 1-27
MSO
domain 8-4
primary IP address range 8-5
multicast
data MDT size 3-4
data MDT threshold 3-4
enabling 3-4
multicast domain (MD) 3-4, 4-4
multicast VRF 3-4, 4-4
multiple VPNS merged into a single VPN 1-33
Multi-VRF CE
data path 1-19
description of 1-18
switches for A-2
switch supported for 1-18
unlike a CE 1-19
MVRFCE PE-CE Link
creating a Service Policy 2-48, 6-6
creating a Service Request 6-18
defining a VPN 2-45, 6-4
overview 6-1
MVRFCE PE-NoCE Link
creating a Service Policy 6-12
creating a Service Request 6-27
N
neighbor allowAS-in value 3-24
neighbor AS-override option 3-24
neighbor next-hop-self command 11-3
network layer reachability information. See NLRI
network management subnet 1-12, A-2
management VPN technique 7-5
out-of-band technique 7-7
NLRI 1-21
NPC
Ring Topology 10-2
O
OSPF 3-25
area number on PE 3-27
connected routes, redistributing 3-26
process ID on CE 3-27
process ID on PE 3-26
out-of-band technique 7-5, 7-7
out-of-memory error C-4
P
PE
description of 1-18
export route map 3-35
import route map 3-36
and MPE 7-5
OSPF area number 3-27
OSPF process ID 3-26
PE-CE Link
creating a Service Policy 5-5
creating a Service Request 5-14
defining a VPN 5-3
PE-CE link
for management VPN 7-16
routing protocols for 3-16
security considerations 1-31
static route for IP unnumbered scheme 3-14
static route provisioning 3-18
PE-CLE
Ring Topology 10-2
pending state 4-3
PE-NoCE Link
creating a Service Policy 5-10
creating a Service Request 5-21
point-to-point address pool 3-14
Policy
Name 3-10
policy
owner 3-10
POS interface 3-13
primary IP address range 8-5
processing server 1-4, 1-12, A-2
provisioning
cable maintenance subinterface 8-6
Provisioning.Service.mpls.saveDebugData property C-5
Provisioning driver (ProvDrv) C-1
R
RD
allocate new RD 3-36
description of 1-24
in hub-and-spoke environments 1-26
overwriting default RD value 3-36
role in routing separation 1-27
redistribute connected 3-22, 3-25, 3-29, 3-33
redistribute connected command 11-5
redistribute connected subnets command 11-4
redistribution of IP routes 3-16
redistribution of routing information 3-20
regions
IP address pools 3-15
related documentation xxvi
requested state 4-4
Ring Topology 10-1
configuring Ring Topology 10-4
NPC 10-2
PE-CLE 10-2
RIP
default route to CE 3-19
giving only default routes to CE 3-19
hop counts 3-20
metrics 3-20
redistributing connected routes 3-19
redistributing OSPF routes to a PE 3-22, 3-25, 3-29
redistributing static routes 3-19
route provisioning 3-19
route distinguisher 3-36
route distinguisher. See RD
route map
export 3-35
import 3-36
routers
access algorithm 4-4
redistribute connected 3-22, 3-25, 3-29, 3-33
redistribution 3-20
routing context table 1-32
SA Agent, enabling for jitter probes A-7
SSH, setting up A-3
VRF forwarding table 1-32
Routes to Reach Other Sites 4-14
route target. See RT
route-target communities 1-25
routing context table 1-32
routing protocols
defining for PE-CE link 3-16
redistribute connected 3-22, 3-25, 3-29, 3-33
redistribution 3-20
securing 1-29
routing separation 1-27
RT
description of 1-24
entering RT values in CERC definition 3-7
rtr responder, enabling A-7
S
SA Agent
enabling on edge devices for jitter probes A-7
secondary IP address range 8-5
Secure Shell. See SSH A-2
security considerations
address space and routing separation 1-27
connectivity between VPNs 1-32
denial-of-service attack 1-29
hiding the MPLS core structure 1-28
intrusion attack 1-29
label spoofing 1-31
PE-CE link 1-31
security level in SNMPv3 A-5
security model in SNMPv3 A-5
security requirements for MPLS VPNs 1-27
servers
status of C-3
wdclient status command C-3
multi-VRF CE
in service provider network 1-12
service module C-2
service operator 3-1, 3-7
service policy 3-1, 3-7
CERC membership 3-37
editable attributes 3-8
editor 3-8
entering values 3-8
interface attributes 3-10
VRF and VPN information 3-35
service requests
defining 4-6, 4-15, 4-24, 7-9, 8-6, 8-11
deploying 4-30
RD value, overwriting 3-36
service policy 3-1, 3-7
states 4-2
templates, enabling 3-36
VRF name, overwriting 3-36
shadow CE
and Management PE 7-5
site of origin 4-4
SNMP
rtr responder, enabling A-7
security level A-5
security model A-5
setting SNMP community strings on routers A-4
version 3 configuration A-5
SNMPv3
object characteristics A-6
spoke route target 3-5
SSH
generate crypto keys for A-4
setting up on routers A-3
state
closed 4-2
deployed 4-2
failed audit 4-3
failed deploy 4-3
invalid 4-3
lost 4-3
pending 4-3
requested 4-4
states of service requests 4-2
static route provisioning 3-18
created for IP unnumbered link 3-14
default information originate option 3-18
giving default routes to CE 3-18
redistributing connected routes 3-18, 3-23, 3-30, 3-33, 3-35
static routing protocols 4-12
subinterface numbers, how chosen by VPNSC 8-5
T
task does not execute C-3
templates
enabling for service policy 3-36
terminal server
Telnet sessions, setting appropriate number A-8
TFTP
setting ISC workstation as TFTP server A-10
using instead of Telnet A-8
time zones
supported A-8
troubleshooting
file descriptor limit, fixing problem with A-3
U
unmanaged CEs 7-1
unmanaged MVRFCE
overview 2-1
select management type 2-15
unnumbered IP addresses 3-14
V
VLAN
ID, automatically set by ISC 3-13
VLAN ID pool and access domain C-5
VPN
auto-pick route target values 3-7
route label 11-6
VPN-IPv4 address 1-27, 3-36, 11-11
VPN route forwarding table. See VRF
VPN route label 11-6
VPNs
creating 3-1
multicast routing 3-4
VRF 1-21
configuration commands 1-24
description 3-36
elements of 1-22
export route map, defining name of 3-35
implementation considerations 1-23
import route map, defining name of 3-36
maximum routes in 3-36
multicast VRF 3-4, 4-4
naming convention 1-22
overwriting VRF name 3-36
and route-target communities 1-25
and routing separation 1-27
subinterface associated with 8-5
VRF forwarding table 1-32
W
Wait Deployed state C-3
WAN interfaces
loopback, using existing loopback number 3-15
wdclient command C-3