Table Of Contents
A - B - C - D - E - F - H - I - L - M - N - O - P - R - S - V - W -
Index
A
AAL5 2-6
access domain
creating access domains 3-5
any transport over MPLS (AToM) 2-2
ATM
defining an ATM policy when CE is present 4-26
defining an ATM policy without a CE 4-28
ATMoMPLS
ATM over MPLS 2-6
topology for 2-7
ATM over MPLS (ATMoMPLS) 2-6
AToM
any transport over MPLS 2-2
audience, for guide xvii
audit
auditing Service requests 12-13
configuration audit 12-13
creating a task to perform a functional audit 12-17
functional audit 12-16
performing a functional audit 12-16
why a functional audit could fail 12-18
autodiscovery
using autodiscovery for L2 services 10-1
B
broken state 12-6
C
cell relay
over MPLS 2-6
closed state 12-6
configlet 12-10
configuration audit 12-13
customer
defining customers and their sites 3-4
customers
setting up 1-2
D
deploy
deploying a service request 12-1
deployed state 12-6
device
performing device settings to support ISC 3-1
devices
creating target devices and assigning roles (N-PE or U-PE) 3-2
setting up 1-2
documentation xviii
E
ERS
defining an Ethernet ERS policy when CE is present 4-4
defining an Ethernet ERS policy without a CE 4-8
Ethernet relay service 2-3
Ethernet relay service (ERS) 2-3
Ethernet wire service (EWS) 2-3
EWS
defining an Ethernet EWS policy when CE is present 4-12
defining an Ethernet EWS policy without a CE 4-17
Ethernet wire service 2-3
F
failed audit state 12-6
failed deploy state 12-6
frame relay
defining a frame relay policy when CE is present 4-22
defining a frame relay policy without a CE 4-24
over MPLS (FRoMPLS) 2-7
FRoMPLS
frame relay over MPLS 2-7
topology for 2-8
functional audit 12-16
creating a task to perform a functional audit 12-17
performing a functional audit 12-16
why a functional audit could fail 12-18
functional state 12-6
H
history
service request 12-9
I
invalid state 12-6
ISC
installing and configuring the network 1-1
setting up basic services 1-2
setting up ISC resources for L2VPN and VPLS services 1-3
setting up the ISC service 3-1
L
L2TPv3
ATM transport 2-11
creating an L2TPv3 policy 6-1
creating an L2TPv3 service request 7-2
creating an L2TPv3 service request with a CE 7-3
creating an L2TPv3 service request without a CE 7-8
defining a frame relay policy when CE is not present 6-7
defining a frame relay policy when CE is present 6-4
defining an ATM policy when CE is not present 6-14
defining an ATM policy when CE is present 6-11
defining an L2TPv3 policy 6-1
dynamic sessions 2-10
frame relay transport 2-10
introducing L2TPv3 service requests 7-1
layer 2 tunnel protocol version 3 2-8
managing an L2TPv3 service request 7-1
modifying the L2TPv3 service request 7-11
overview of 2-8
saving the L2TPv3 service request 7-13
sequencing 2-10
session cookie 2-10
session parameters 2-10
static sessions 2-10
L2VPN
checklist for defining policies and service requests 1-4
concepts 2-1
creating an EWS L2VPN service request with a CE 5-10
creating an EWS L2VPN service request without a CE 5-17
creating an L2VPN policy 4-1
creating an L2VPN service request 5-2
creating an L2VPN service request with a CE 5-3
creating an L2VPN service request without a CE 5-13
defining an L2VPN policy 4-1
generating L2 and VPLS reports 11-1
getting started with 1-1
introducing L2VPN service requests 5-1
managing an L2VPN service request 5-1
modifying the L2VPN service request 5-22
overview 1-1, 2-1
saving the L2VPN service request 5-27
service provisioning 2-2
services 2-1
topology for L2VPN Ethernet over MPLS (ERS and EWS) 2-3
verifying L2VPN or VPLS service requests 12-4
viewing L2VPN or VPLS service request details 12-7
layer 2 tunnel protocol version 3 (L2TPv3) 2-8
link
service request 12-8
loopback address
setting the L2TPv3 local switching loopback 3-3
setting the loopback address 3-2
setting the loopback addresses on N-PE devices 3-2
setting up on an N-PE 1-3
lost state 12-6
M
monitor
service request 12-11
multipoint ERS
for an Ethernet-based provider core 2-14
for an MPLS-based provider core 2-12
multipoint EWS
for an Ethernet-based provider core 2-13
for an MPLS-based provider core 2-12
N
network
configuring to support layer 2 services 1-2
NPC
creating a ring-only NPC 3-17
creating named physical circuits 3-11
creating NPC links through the autodiscovery process 3-19
creating NPCs through an NPC GUI editor 3-12
setting up NPCs in ISC 1-3
O
organization, of this guide xviii
P
pending state 12-7
point-to-point Ethernet (EWS and ERS) 2-2
preface xvii
provider
defining a service provider and its regions 3-3
providers
setting up 1-2
R
related documentation xviii
report
accessing L2 and VPLS reports 11-1
creating custom L2 and VPLS reports 11-11
generating L2 and VPLS reports 11-1
L2 EndtoEndWire report 11-3
L2 PE service report 11-6
L2 VPN report 11-6
overview 11-1
summary of L2 and VPLS reports 11-2
VPLS attachment circuit report 11-7
VPLS PE service report 11-9
VPLS VPN report 11-10
requested state 12-7
S
service request 12-1
auditing service requests 12-13
configlets 12-10
creating an L2TPv3 service request 7-2
deploying 12-1
failed service requests related to VLAN translation A-7
history 12-9
introducing L2TPv3 service requests 7-1
links 12-8
managing a VPLS service request 9-1
modifying the L2VPN service request 5-22
modifying the VPLS service request 9-12
monitoring 12-11
pre-deployment changes 12-1
saving the L2VPN service request 5-27
saving the VPLS service request 9-13
service deployment 12-2
service request states 12-5
verifying L2VPN or VPLS service requests 12-4
viewing L2VPN or VPLS service request details 12-7
state
broken 12-6
closed 12-6
deployed 12-6
failed audit 12-6
failed deploy 12-6
functional 12-6
invalid 12-6
lost 12-6
pending 12-7
requested 12-7
service request states 12-5
wait deploy 12-7
switch
configuring switches in VTP transparent mode 3-2
V
VC ID pool
creating a VC ID pool 3-9
virtual private LAN service (VPLS) 2-11
VLAN pool
creating VLAN pools 3-6
VLAN translation
1 to 1 VLAN translation A-4
2 to 1 VLAN translation A-4
creating a Policy A-2
creating a service request A-3
deleting a service request A-6
failed service requests due to unsupported hardware A-7
modifying a service request A-5
no VLAN translation A-3
overview A-1
platform-specific usage notes A-6
setting up VLAN translation A-2
VLAN translation on the 3750 A-6
VLAN translation on the 7600 A-6
VPLS
checklist for defining policies and service requests 1-4
choosing a VPLS policy 9-2
concepts 2-1
creating a VPLS policy 8-1
creating a VPLS service request with a CE 9-3
creating a VPLS service request without a CE 9-8
defining an Ethernet/ERS policy when CE is present 8-21
defining an Ethernet/ERS policy without a CE 8-25
defining an Ethernet/EWS policy when CE is present 8-29
defining an Ethernet/EWS policy without a CE 8-34
defining an MPLS/ERS policy when CE is present 8-3
defining an MPLS/ERS policy without a CE 8-8
defining an MPLS/EWS policy when CE is present 8-12
defining an MPLS/EWS policy without a CE 8-16
defining a VPLS policy 8-1
for an Ethernet-based (L2) provider core 2-13
generating L2 and VPLS reports 11-1
introducing VPLS service requests 9-1
managing a VPLS service request 9-1
modifying the VPLS service request 9-12
saving the VPLS service request 9-13
service provisioning 2-11
services 2-2
topology for Ethernet-based VPLS 2-14
topology for MPLS-based VPLS 2-12
verifying L2VPN or VPLS service requests 12-4
viewing L2VPN or VPLS service request details 12-7
VPN
defining VPNs 3-4
setting up VPNs in ISC 1-4
W
wait deploy state 12-7