Cisco IP Solution Center MPLS VPN User Guide, 4.1
Index

Table Of Contents

A - B - C - D - E - F - G - H - I - L - M - N - O - P - R - S - T - U - V - W -

Index

A

about IP addresses in Cisco ISC     5-7

access domain     A-14

Access Domain Management     12-11

accessing MPLS reports     14-1

Access Port     12-11

ACLs

on the PE-CE link     A-31

role in MPLS security     A-30

adding

CLE service request     6-33

PE-CE Links to the Management VPN     9-16

adding a new customer CPE     2-5

adding a new provider PE     2-12

address space and routing separation     A-27

address space separation     A-27

advertised routes     6-16

allowas-in option     5-23

API

approach     A-11

functionality supported     A-11

assigning IP address

automatically     5-13

attacks, types of     A-29

audience, for guide     xi

auditing service requests     6-37

autonomous system (AS) number

number of occurrences in as path     5-23

autonomous systems, spanning     13-1

auto-pick route target values     4-7

B

backbone carrier

definition     11-1

backbone network

with a customer carrier ISP     11-1

with customer carrier BGP/MPLS VPN service provider     11-3

benefits of cable MPLS VPNs     10-1

BGP     5-21, A-13

allowas-in option     5-23

as number for CE's network     5-22

community attribute     A-33

dampening     A-30

neighbor allowas-in value     5-22

neighbor AS-override option     5-23

RDs and RTs     A-24

redistribute connected routes     5-22

redistributing protocols into BGP     5-23

route-target communities     A-25

security features     A-33

BGP protocol chosen     5-21

Border Gateway Protocol. See BGP

broken state     6-2

business application     A-1

C

cable MPLS VPN network     10-2

cable services

cable-CE, creating     10-6

CMTS     10-4

DOCSIS     10-4

maintenance subinterface, provisioning     10-6

MSO     10-4

primary IP address range     10-5

redistributing connected routes recommended     5-33

redistributing static routes     5-33

secondary IP address range     10-5

specifying no routing protocol     5-33

cable VPN

configuration overview     10-4

interfaces and subinterfaces     10-5

carrier supporting

carrier overview     11-1

carrier supporting carrier. See CSC.

CE

BGP as number for     5-22

cable-CE, creating     10-6

default routes to     5-15

description of     A-12

extra loopback address     5-13

managed CE considerations     9-2

and MCE     9-4, 9-7

OSPF process ID     5-25

routing context table     A-32

unmanaged CEs     9-1

CE interface information     5-12

CE present     5-8

CERC     5-40

auto-pick route target values     4-7

creating     4-6

full mesh     A-26

overview     A-25

route target values, entering     4-7

CERC not intialized     C-5

CE Routing Communities     A-25

closed state     6-2

CMTS     10-4

CNS 2100 Series Intelligence Engine

wait deployed state     C-3

collect

configuration     2-8

collection server     A-4, A-12

common provisioning issues     C-2

confederation     13-8

configuration audit     6-38

how to perform     6-38

where to find     6-38

why it could fail     6-39

configuration files

editing     6-39

security requirement     A-32

viewing     6-39

Configuring ETTH     12-11

Configuring NPC Ring Topology     12-4

connected routes, redistributing     5-21, 5-24, 5-28, 5-32

connectivity between VPNs     A-32

creating

access domain     2-15, 2-17

cable link service request     10-11

cable subinterface service request     10-6

ce routing communities     4-6

CPE     2-11

customer     2-10

customer, site, and cpe     2-10

device     2-6

device group     2-14

IP address pool     3-2

IP multicast VPN     4-3

MCE Service Request     9-9

MPLS service policy for PE-to-CE link     5-7

MPLS VPN     4-1

MPLS VPN in ISC     5-1

MPLS VPN MVRFCE PE-CE Service Policies     8-6

MPLS VPN MVRFCE PE-CE Service Requests     8-18

MPLS VPN PE-CE Service Policies     7-5

MPLS VPN PE-CE Service Requests     7-14

multicast pool     3-4

multi-VRF service request     6-17

MVRFCE PE-CE Service Policy     8-6

MVRFCE PE-CE Service Request     8-18

MVRFCE PE-CE service request     6-17

MVRFCE PE-NoCE Service Request     8-27

PE-CE Service Policy     7-6

PE-CE Service Request     7-14

PE-CE service request     6-6

PE-NoCE Service Policy     7-10, 8-12

PE-NoCE Service Request     7-21

PE-only service request     6-26

provider and a PE     2-14

region for the PE     2-14

route distinguisher pool     3-6

route target pool     3-7

service policies     5-6

service requests     6-5, 10-6

site     2-10

site of origin pool     3-9

VC ID pool     3-11

VLAN pool     3-13

Creating a Ring of Three PE-CLE     12-2

creating custom reports     14-6

CSC

creating service request     11-5

defining a service policy     5-15, 5-16, 5-18, 5-22, 5-25, 5-29, 5-33

defining service policy     11-5

definition     11-1

using MPLS     11-2

CSC support     5-15

customer carrier

as BGP/MPLS service provider     11-3

definition     11-1

customer view     A-16

D

dampening     A-30

Data Over Cable Service Interface Specifications. See DOCSIS

default information originate option     5-17

default routes     5-18

default routes to CE     5-15

defining

CE as an MCE     9-8

CSC service policy     11-5

MVRFCE PE-CE service policy     5-34

Defining a VPN for the MVRFCE PE-CE Link     8-4

Defining a VPN for the PE-CE Link     7-3

defining the service policy VRF and VPN information     5-39

denial-of-service attack     A-29

deployed state     6-2

deploying service requests     6-33

device access algorithm     6-4

Device Configuration Service (DCS)     C-1

DOCSIS     10-4

documentation     xiii

document organization     xi

download order for devices, specifying     C-6

E

EBGP     5-21

edge device routers

access algorithm     6-4

editable attributes     5-6

editing

configuration files     6-39

PE with ISC GUI     2-15

EIGRP     5-28

metrics     5-30

protocol chosen     5-28

encapsulations for each interface type     5-10

ensuring VPN isolation     A-34

Ethernet-To-The-Home     12-9

ETTH Overview     12-9

exchanging VPN routing information     13-4

export route map

defining name of     5-39

extra CE loopback required     5-13

extranets     A-22

F

failed audit state     6-3, C-3

failed deploy state     6-3

frame relay

IETF encapsulation     5-11

frequently asked questions     C-5

full mesh considerations     A-26

full mesh topology     A-26

definition     A-25

functional audit     6-37

how to perform     6-37

where to find     6-37

why it could fail     6-38

functional state     6-3

G

gateway of last resort     5-18

general troubleshooting guidelines     C-2

Generic Transport Library (GTL)     C-1

getting started     1-1

creating CERCs     1-3

creating customer sites     1-2

creating PEs     1-2

creating provider     1-2

creating region     1-2

creating VPNs     1-3

customer information     1-2

devices     1-2

license     1-1

populating ISC     1-1

provider information     1-2

resource information     1-3

resource pools     1-3

route distinguisher pool     1-3

route target pool     1-3

giving only default routes to CE     5-15

H

hiding MPLS core structure     A-28

hub and spoke considerations     A-26

hub-and-spoke topology     A-26

definition     A-25

hub route target     5-5

I

IBGP     5-21

IGMP with MVR     12-11

IGP route label     13-6

implementation techniques     9-4

import route map

defining name of     5-39

in-band connection     9-4

Infrastructure Data     7-3, 8-3

inter-autonomous systems

benefits     13-2

confederation     13-8

IGP route label     13-6

neighbor next-hop-self command     13-3

overview     13-1

redistribute connected command     13-5

redistribute connected subnets command     13-4

routing between AS's'     13-2

VPN route label     13-6

interfaces

cable maintenance subinterface, provisioning     10-6

encapsulations available     5-10

IP numbered     5-13

loopback, using existing number     5-14

subinterface numbers, how chosen by VPNSC     10-5

supported interfaces     5-9

Internet Service Provider. See ISP

intranets     A-22

Intranets and Extranets     A-22

intrusion attack     A-29

invalid state     6-3

inventory and connection manager     5-2

IP address

keeping IP addresses on CE and PE intact     C-6

IP addresses     5-7

automatically assigned     5-13

IP numbered with extra CE loopback     5-13

and network security     A-34

numbered     5-13

primary IP address range     10-5

secondary IP address range     10-5

unnumbered     5-13

VPN-IPV4 address     5-40

VPN-IPv4 address     A-27

in VPNs     A-13

IP address pool     5-13

IP address pool, create a     3-2

IP address pools

and automatically assigned addresses     5-13

and regions     5-13

on the PE-CE link     5-7

IP numbering scheme     5-12

IP Solution Center

collection server     A-12

network management subnet     A-12

processing server     A-12

servers, status of     C-3

ip solution center

device access algorithm     6-4

IP Solution Center Overview     A-1

IPv4 BGP label distribution     11-4

ISC configuration options     11-4

ISC ETTH Implementation     12-11

ISP     10-5

secondary IP address range     10-5

issues regarding access to VPNs     9-4

L

label spoofing     A-30, A-31

LDP/IGP     11-4

LDP Authentication     A-32

LDP authentication     A-32

load balancing     A-5

loopback

extra loopback address on CE     5-13

interface number, using existing     5-14

and ip unnumbered addressing scheme     5-13

SR ID not included     5-14

loopback address missing     C-6

lost state     6-3

M

managed CE

considerations     9-2

Managed Customer Edge Routers     9-2

Management CE (MCE)     9-4

Management CE. See MCE

Management PE (MPE)     9-5

Management PE. See MPE

management route map     9-6

Management VPN     9-5

management VPN     9-5, A-12

and export route map     5-39

in cable network     10-4

and management route map     9-6

PE-CE links, provisioning     9-16

redistribute connected routes required     5-17

topology     9-5

maximum number of routes into VRF     5-40

MCE     9-4, 9-7

monitoring

task logs     2-10

monitoring service requests     6-35

MP-BGP Security Features     A-33

MPE     9-5

and shadow CE     9-5

MPLS PE service report     14-3

filter values     14-3

output values     14-3

MPLS reports

accessing     14-1

creating custom     14-6

overview     14-1

running     14-4

MPLS Service Activation     1-1

MPLS service activation     1-1

MPLS service request report     14-5

filter values     14-5

output filters     14-5

MPLS services

provisioning workflow     C-1

MPLS VPN     A-20

MPLS VPN MVRFCE PE-CE Link Overview     8-1

MPLS VPN PE-CE Link Overview     7-1

MPLS VPN Provisioning Workflow     C-1

MPLS VPNS

routing protocols     5-15

MPLS VPNs     A-20

address space separation     A-27

CERCs in     A-25

characteristics     A-21

connectivity between     A-32

default routes to CE     5-15

extranets     A-22

implementation techniques     9-4

in-band connection     9-4

intranets     A-22

management VPN     9-5

multiple VPNS merged into a single VPN     A-33

out-of-band VPN     9-5

principal technologies     A-21

route-target communities     A-25

routing separation     A-27

service requests, defining     6-26, 9-9, 10-6, 10-11

VRF forwarding table     A-32

MPLS VPN Security     A-27

MPLS VPN Solution

security requirements     A-27

MPLS VPN topology example     6-5

MSO

domain     10-4

primary IP address range     10-5

multicast

data MDT size     5-4

data MDT threshold     5-4

enabling     5-4

multicast domain (MD)     5-4, 6-4

multicast VRF     5-4, 6-4

multicast pool, create a     3-4

multiple VPNS merged into a single VPN     A-33

Multi-VPN routing and forwarding tables     2-1

multi-VRF

example     6-5

overview     6-17

Multi-VRF CE     A-18

data path     A-19

description of     A-18

switch supported for     A-18

unlike a CE     A-19

MVRF     2-1

MVRFCE CE Information     8-32

MVRFCE PE-CE

policy type     2-4

MVRFCE PE-CE Link

creating a Service Policy     8-6

creating a Service Request     8-18

defining a VPN     8-4

overview     8-1

MVRFCE PE-CE link

creating a service policy     5-34

MVRFCE PE-NoCE Link

creating a Service Policy     8-12

creating a Service Request     8-27

N

NBI Benefits     A-11

neighbor allowas-in value     5-22

neighbor AS-override option     5-23

neighbor next-hop-self command     13-3

network devices

how ISC accesses     6-4

network inventory     2-2

network layer reachability information. See NLRI

network management subnet     A-12

management VPN technique     9-5

out-of-band technique     9-7

Network Management Subnets     9-3

Network Topology     7-2, 8-2

NLRI     A-21

none chosen

cable services     5-33

North Bound Interface (NBI)     A-10

NPC

Ring Topology     12-2

NPC Ring Topology     12-1

O

OSPF     5-24

area number on PE     5-26

connected routes, redistributing     5-25

process ID on CE     5-25

process ID on PE     5-25

OSPF protocol chosen     5-24

Out-of-Band Technique     9-7

out-of-band technique     9-5, 9-7

out-of-memory error     C-4

overview

access domain     2-16

ISC customer     2-5

ISC management network     9-1

ISC provider     2-13

of MPLS VPN cable     10-1

resource pools     3-1

overview of service requests     6-1

P

PE

description of     A-18

export route map     5-39

import route map     5-39

and MPE     9-5

OSPF area number     5-26

OSPF process ID     5-25

PE-CE

example     6-5

PE-CE Interface     A-31

PE-CE Link

creating a Service Policy     7-5

creating a Service Request     7-14

defining a VPN     7-3

PE-CE link

for management VPN     9-16

routing protocols for     5-15

security considerations     A-31

static route for IP unnumbered scheme     5-13

static route provisioning     5-16

PE-CE Service Policy Overview     7-5

PE-CLE

Ring Topology     12-2

PE Information     7-18, 8-31

pe interface information     5-9

pending state     6-3

PE-NoCE Link

creating a Service Policy     7-10

creating a Service Request     7-21

PE-only

example     6-5

point-to-point address pool     5-13

policy

name     5-8

owner     5-8

Policy for Residential Services Over Shared VLAN     12-16

pos interface     5-11

Prerequisite Tasks     7-2, 8-3

primary IP address range     10-5

processing server     A-4, A-12

process overview     2-2

provider edge routers     A-18

Provider View     A-17

provisioning

cable maintenance subinterface     10-6

Provisioning.Service.mpls.saveDebugData property     C-5

provisioning a CSC service request     11-5

provisioning a management CE in ISC     9-7

provisioning cable services in ISC     10-6

Provisioning driver (ProvDrv)     C-1

PVLAN or Protected Port     12-11

R

RD

allocate new RD     5-40

description of     A-24

in hub-and-spoke environments     A-26

overwriting default RD value     5-40

role in routing separation     A-27

redistribute connected     5-21, 5-24, 5-28, 5-32

redistribute connected command     13-5

redistribute connected subnets command     13-4

redistribution of IP routes     5-15

redistribution of routing information     5-19

regions

ip address pools     5-13

related documentation     xiii

reports     14-1

requested state     6-3

Residential Service     12-15

resistance to attacks     A-28

resource pools     1-3, 3-1, A-15

Ring Topology     12-1

configuring Ring Topology     12-4

NPC     12-2

PE-CLE     12-2

Ring Topology Overview     12-1

RIP

default route to CE     5-18

giving only default routes to CE     5-18

hop counts     5-19

metrics     5-19

redistributing connected routes     5-18

redistributing OSPF routes to a PE     5-21, 5-24, 5-28

redistributing static routes     5-18

route provisioning     5-18

RIP protocol chosen     5-17

Role-Based Access Control (RBAC)     A-10

route distinguisher     5-40

route distinguisher. See RD

route distinguisher pool     1-3

route distinguisher pool, create a     3-6

route distinguishers and route targets     A-24

route map

export     5-39

import     5-39

routers

access algorithm     6-4

redistribute connected     5-21, 5-24, 5-28, 5-32

redistribution     5-19

routing context table     A-32

VRF forwarding table     A-32

routes to reach other sites     6-16

route target. See RT

route target communities     A-25

route-target communities     A-25

route target pool     1-3

route target pool, create a     3-7

routing

authentication     A-32

separation     A-27

routing between autonomous systems     13-2

routing between subautonomous systems in a confederation     13-8

routing context table     A-32

routing protocols

defining for PE-CE link     5-15

redistribute connected     5-21, 5-24, 5-28, 5-32

redistribution     5-19

securing     A-29

routing separation     A-27

RT

description of     A-24

entering RT values in CERC definition     4-7

S

secondary IP address range     10-5

securing

MPLS core     A-31

routing protocol     A-29

security considerations

address space and routing separation     A-27

connectivity between VPNs     A-32

denial-of-service attack     A-29

hiding the MPLS core structure     A-28

intrusion attack     A-29

label spoofing     A-31

PE-CE link     A-31

security requirements for MPLS VPNs     A-27

security through IP address resolution     A-34

separation of CE-PE Links     A-32

servers

status of     C-3

wdclient status command     C-3

multi-VRF CE

in service provider network     A-12

service audit     A-19

service enhancements     6-4

service module     C-2

service operator     5-6

service policy     2-4, 5-6

CERC membership     5-40

editable attributes     5-6

editor     5-6

entering values     5-6

interface attributes     5-8

overview     5-1

VRF and VPN information     5-39

service provider network     A-12

service request     2-4

states     6-2

transition states     6-1

service requests     12-17

defining     6-26, 9-9, 10-6, 10-11

deploying     6-33

RD value, overwriting     5-40

service policy     5-6

templates, enabling     5-40

VRF name, overwriting     5-40

shadow CE

and Management PE     9-5

site of origin     6-4

site of origin pool, create a     3-9

specifying

IP address scheme     5-12

PE and CE interface parameters     5-8

routing protocol for a service     5-15

spoke route target     5-5

state

broken     6-2

closed     6-2

deployed     6-2

failed audit     6-3

failed deploy     6-3

functional     6-3

invalid     6-3

lost     6-3

pending     6-3

requested     6-3

wait deployed     6-3

states of service requests     6-2

static protocol chosen     5-16

static route provisioning     5-16

created for IP unnumbered link     5-13

default information originate option     5-17

giving default routes to CE     5-16

redistributing connected routes     5-17, 5-22, 5-29, 5-32, 5-33

static routing protocols     6-14

subinterface numbers, how chosen by VPNSC     10-5

system

architecture     A-2

features     A-7

T

task does not execute     C-3

template manager     A-9

templates

enabling for service policy     5-40

terms defined     C-2

troubleshooting

IPsec Mapping into MPLS     C-6

MPLS VPN and Layer 2 VPN     C-4

trusted devices     A-31

U

UNI security information     5-11

unmanaged CEs     9-1

unmanaged customer edge routers     9-1

unmanaged MVRFCE

overview     2-1

select management type     2-12

unnumbered IP addresses     5-13

using existing loopback interface number     5-14

using ISC to span multiple autonomous systems     13-10

V

vc id pool, create a     3-11

VLAN

ID, automatically set by ISC     5-11

VLAN ID pool and access domain     C-5

vlan pool, create a     3-13

VPN

auto-pick route target values     4-7

route label     13-6

VPN-IPV4 address     5-40

VPN-IPv4 address     13-11, A-27

VPN Profile     A-16

VPN route forwarding table. See VRF

VPN route label     13-6

VPN Routing and Forwarding Tables     A-22

VPNs

creating     5-1

issues regarding access to     9-4

multicast routing     5-4

VRF     A-21

configuration commands     A-24

Description     5-40

elements of     A-22

export route map, defining name of     5-39

implementation     A-23

implementation considerations     A-23

import route map, defining name of     5-39

instance     A-24

maximum routes in     5-40

multicast VRF     5-4, 6-4

naming convention     A-22

overwriting VRF name     5-40

and route-target communities     A-25

and routing separation     A-27

subinterface associated with     10-5

VRF forwarding table     A-32

W

wait deployed state     6-3, C-3

wan interfaces

loopback, using existing loopback number     5-14

wdclient command     C-3