Cisco IP Solution Center L2VPN User Guide, 4.1
Index

Table Of Contents

A - B - C - D - E - F - H - I - L - M - N - O - P - R - S - V - W -

Index

A

AAL5     2-6

access domain

creating access domains     3-5

any transport over MPLS (AToM)     2-2

ATM

defining an ATM policy when CE is present     4-26

defining an ATM policy without a CE     4-28

ATMoMPLS

ATM over MPLS     2-6

topology for     2-7

ATM over MPLS (ATMoMPLS)     2-6

AToM

any transport over MPLS     2-2

audience, for guide     xvii

audit

auditing Service requests     12-13

configuration audit     12-13

creating a task to perform a functional audit     12-17

functional audit     12-16

performing a functional audit     12-16

why a functional audit could fail     12-18

autodiscovery

using autodiscovery for L2 services     10-1

B

broken state     12-6

C

cell relay

over MPLS     2-6

closed state     12-6

configlet     12-10

configuration audit     12-13

customer

defining customers and their sites     3-4

customers

setting up     1-2

D

deploy

deploying a service request     12-1

deployed state     12-6

device

performing device settings to support ISC     3-1

devices

creating target devices and assigning roles (N-PE or U-PE)     3-2

setting up     1-2

documentation     xviii

E

ERS

defining an Ethernet ERS policy when CE is present     4-4

defining an Ethernet ERS policy without a CE     4-8

Ethernet relay service     2-3

Ethernet relay service (ERS)     2-3

Ethernet wire service (EWS)     2-3

EWS

defining an Ethernet EWS policy when CE is present     4-12

defining an Ethernet EWS policy without a CE     4-17

Ethernet wire service     2-3

F

failed audit state     12-6

failed deploy state     12-6

frame relay

defining a frame relay policy when CE is present     4-22

defining a frame relay policy without a CE     4-24

over MPLS (FRoMPLS)     2-7

FRoMPLS

frame relay over MPLS     2-7

topology for     2-8

functional audit     12-16

creating a task to perform a functional audit     12-17

performing a functional audit     12-16

why a functional audit could fail     12-18

functional state     12-6

H

history

service request     12-9

I

invalid state     12-6

ISC

installing and configuring the network     1-1

setting up basic services     1-2

setting up ISC resources for L2VPN and VPLS services     1-3

setting up the ISC service     3-1

L

L2TPv3

ATM transport     2-11

creating an L2TPv3 policy     6-1

creating an L2TPv3 service request     7-2

creating an L2TPv3 service request with a CE     7-3

creating an L2TPv3 service request without a CE     7-8

defining a frame relay policy when CE is not present     6-7

defining a frame relay policy when CE is present     6-4

defining an ATM policy when CE is not present     6-14

defining an ATM policy when CE is present     6-11

defining an L2TPv3 policy     6-1

dynamic sessions     2-10

frame relay transport     2-10

introducing L2TPv3 service requests     7-1

layer 2 tunnel protocol version 3     2-8

managing an L2TPv3 service request     7-1

modifying the L2TPv3 service request     7-11

overview of     2-8

saving the L2TPv3 service request     7-13

sequencing     2-10

session cookie     2-10

session parameters     2-10

static sessions     2-10

L2VPN

checklist for defining policies and service requests     1-4

concepts     2-1

creating an EWS L2VPN service request with a CE     5-10

creating an EWS L2VPN service request without a CE     5-17

creating an L2VPN policy     4-1

creating an L2VPN service request     5-2

creating an L2VPN service request with a CE     5-3

creating an L2VPN service request without a CE     5-13

defining an L2VPN policy     4-1

generating L2 and VPLS reports     11-1

getting started with     1-1

introducing L2VPN service requests     5-1

managing an L2VPN service request     5-1

modifying the L2VPN service request     5-22

overview     1-1, 2-1

saving the L2VPN service request     5-27

service provisioning     2-2

services     2-1

topology for L2VPN Ethernet over MPLS (ERS and EWS)     2-3

verifying L2VPN or VPLS service requests     12-4

viewing L2VPN or VPLS service request details     12-7

layer 2 tunnel protocol version 3 (L2TPv3)     2-8

link

service request     12-8

loopback address

setting the L2TPv3 local switching loopback     3-3

setting the loopback address     3-2

setting the loopback addresses on N-PE devices     3-2

setting up on an N-PE     1-3

lost state     12-6

M

monitor

service request     12-11

multipoint ERS

for an Ethernet-based provider core     2-14

for an MPLS-based provider core     2-12

multipoint EWS

for an Ethernet-based provider core     2-13

for an MPLS-based provider core     2-12

N

network

configuring to support layer 2 services     1-2

NPC

creating a ring-only NPC     3-17

creating named physical circuits     3-11

creating NPC links through the autodiscovery process     3-19

creating NPCs through an NPC GUI editor     3-12

setting up NPCs in ISC     1-3

O

organization, of this guide     xviii

P

pending state     12-7

point-to-point Ethernet (EWS and ERS)     2-2

preface     xvii

provider

defining a service provider and its regions     3-3

providers

setting up     1-2

R

related documentation     xviii

report

accessing L2 and VPLS reports     11-1

creating custom L2 and VPLS reports     11-11

generating L2 and VPLS reports     11-1

L2 EndtoEndWire report     11-3

L2 PE service report     11-6

L2 VPN report     11-6

overview     11-1

summary of L2 and VPLS reports     11-2

VPLS attachment circuit report     11-7

VPLS PE service report     11-9

VPLS VPN report     11-10

requested state     12-7

S

service request     12-1

auditing service requests     12-13

configlets     12-10

creating an L2TPv3 service request     7-2

deploying     12-1

failed service requests related to VLAN translation     A-7

history     12-9

introducing L2TPv3 service requests     7-1

links     12-8

managing a VPLS service request     9-1

modifying the L2VPN service request     5-22

modifying the VPLS service request     9-12

monitoring     12-11

pre-deployment changes     12-1

saving the L2VPN service request     5-27

saving the VPLS service request     9-13

service deployment     12-2

service request states     12-5

verifying L2VPN or VPLS service requests     12-4

viewing L2VPN or VPLS service request details     12-7

state

broken     12-6

closed     12-6

deployed     12-6

failed audit     12-6

failed deploy     12-6

functional     12-6

invalid     12-6

lost     12-6

pending     12-7

requested     12-7

service request states     12-5

wait deploy     12-7

switch

configuring switches in VTP transparent mode     3-2

V

VC ID pool

creating a VC ID pool     3-9

virtual private LAN service (VPLS)     2-11

VLAN pool

creating VLAN pools     3-6

VLAN translation

1 to 1 VLAN translation     A-4

2 to 1 VLAN translation     A-4

creating a Policy     A-2

creating a service request     A-3

deleting a service request     A-6

failed service requests due to unsupported hardware     A-7

modifying a service request     A-5

no VLAN translation     A-3

overview     A-1

platform-specific usage notes     A-6

setting up VLAN translation     A-2

VLAN translation on the 3750     A-6

VLAN translation on the 7600     A-6

VPLS

checklist for defining policies and service requests     1-4

choosing a VPLS policy     9-2

concepts     2-1

creating a VPLS policy     8-1

creating a VPLS service request with a CE     9-3

creating a VPLS service request without a CE     9-8

defining an Ethernet/ERS policy when CE is present     8-21

defining an Ethernet/ERS policy without a CE     8-25

defining an Ethernet/EWS policy when CE is present     8-29

defining an Ethernet/EWS policy without a CE     8-34

defining an MPLS/ERS policy when CE is present     8-3

defining an MPLS/ERS policy without a CE     8-8

defining an MPLS/EWS policy when CE is present     8-12

defining an MPLS/EWS policy without a CE     8-16

defining a VPLS policy     8-1

for an Ethernet-based (L2) provider core     2-13

generating L2 and VPLS reports     11-1

introducing VPLS service requests     9-1

managing a VPLS service request     9-1

modifying the VPLS service request     9-12

saving the VPLS service request     9-13

service provisioning     2-11

services     2-2

topology for Ethernet-based VPLS     2-14

topology for MPLS-based VPLS     2-12

verifying L2VPN or VPLS service requests     12-4

viewing L2VPN or VPLS service request details     12-7

VPN

defining VPNs     3-4

setting up VPNs in ISC     1-4

W

wait deploy state     12-7