Cisco IP Solution Center Traffic Engineering Management User Guide, 4.1
Index

Table Of Contents

A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - R - S - T - U - V - W - Z

Index

A

About This Guide     xi

administration

GUI     A-67

administrative features     9-1

admin status     A-25

affinity     9-4, A-48, A-63

affinity bits     A-28

affinity mask     9-4, A-48, A-63

algorithm

Randomize     11-10, A-12

Spring     11-10, A-12

using     11-10

antialiasing     11-9, A-11

Assign TE Resources

in GUI     A-40

attribute bits, resource modification     A-28

audience     xi

Audit SR

from TE Protection SR     7-11

auto-gen

creating multicast tunnels     A-46

Auto Refresh

discovery     3-8

autoroute announce     8-3, A-66

autoroute metric     8-3, A-66

B

backing store     11-9, A-11

backup tunnel

create     5-20, A-59

creation     5-2

deployment logs     10-1

field definitions     A-60, A-62

GUI     A-59

introduction     5-2

bandwidth

auto     1-4

calculating utilization     1-2, 9-11

global pool     A-25

guarantees     1-4, 1-5

limit     A-62

max global (BC0) reservable     A-28

max sub pool (BC1)     A-28

non-zero     1-4

pool type     9-4, A-48

sub pool     A-25

total allocated     A-25

Broken state     B-10

browsers

limitation on multiple     2-2

C

Cisco IOS

commands     B-3

Class-of-Service (CoS)     5-2, 8-1

closed state     B-10

Command Line Validation Tool

overview     6-9

commands

downloaded to device     B-6

concurrency

limitation     2-2

ConfigAudit log     10-1

configlet

viewing     B-5

configlets     9-17

managing service requests     B-5

conformant/non-conformant tunnels     1-4

Conformant tunnels

definition     1-4

conventions and terminology     xviii

coordinates

set     11-4

customer

select     2-9

D

Data persistence     1-3

decommissioning a service request     B-7

delay constraint     A-48

deploy

force deploy     5-24, A-43, A-56, A-61

tunnel     5-15, 5-17, 5-19, 5-26, 5-27, 7-11

deployed state     B-9, B-10

deployment

force deploy     8-5, A-30

queue     A-56, A-61

status, traffic admission     8-2

task logs     10-1

difference between managed and unmanaged     A-59

DirectedLink     C-1

documentation     xii

conventions and terminology     xviii

Document Type Definition

see DTD file     D-1

double buffer     11-9, A-11

downloaded commands     B-6

DTD file

contents     D-1

overview     D-1

using to import tunnels     6-9

E

edge length

automatic     A-13

constant     A-13

epsilon, algorithm constant     A-13

explicit path

accessing in GUI     A-30, A-33, A-35

create     A-34

edit     5-3, 5-5, A-34

editor     5-6

fields in GUI     A-33

select     5-4, 5-13, 5-23, A-49, A-64

viewer     5-14, A-50

F

failed audit state     B-10

failed deploy state     B-10

failed service request     B-9

features in ISC TM     1-2

FRR protection level     9-4, A-48

Functional state     B-10

G

grid

color     A-15

in Topology Display     A-14

spacing     A-15

GUI

accessing     A-1

administration     A-67

Assign TE Resources     A-40

backup tunnel     A-59

Create Managed TE Tunnel     A-41

Create Unmanaged TE Tunnel     A-59

field descriptions     A-1

layout graph     11-4

monitoring     A-67

overview     A-1

resource modification     A-28

Save Graph Layout     11-4

task runtime actions     3-7

TE Explicit Path     A-33

TE links     A-21

TE nodes     A-18

TE Providers     A-3

TE Topology     A-5

TE Traffic Admission     A-64

Traffic Management Services     A-1

H

hold priority     1-4, 5-2, 5-4, 9-4, A-48

I

import file

description     6-9

interface

calculating bandwidth utilization     1-2, 9-11

non-TE     5-4, 5-7

TE     5-7

invalid state     B-10

IOS-XR

limitation with non-POS interfaces     2-2

ISC TM

overview     1-1

prerequisites and limitations     2-2

J

JRE version

support     2-2

L

latitude range

topology map     A-10

license

install license keys     2-4

link

add     5-7

status     A-25

link speed factor

resource modification     A-29

logs

deployment log     5-16, 5-24, 6-7, 7-12, 8-5

TE Discovery, examples     3-8

longitude range

topology map     A-10

lost state     B-10

M

managed and unmanaged tunnels     1-3

manage lock

in GUI     A-3

map

add new     11-7

clear     11-8

load     11-5

projection     11-6

supported format     11-5

using     11-5

max delay increase

resource modification     A-28

monitoring

field descriptions     A-67

GUI     A-67

MPLS TE tunnels     1-1

multicast

creating tunnels with auto-gen     A-46

N

next hop

list     5-7

select     5-7

non-Cisco devices

support for     2-2

Non-conformant tunnels

definition     1-4

managing     1-5

Non-POS interfaces

limitation with IOS-XR     2-2

O

objective     xi, 2-2

optimize links     A-12

Topology Display     11-10

P

pathing constraints     5-2

pending state     B-9, B-10

performance reports

see TE Performance Reports     10-4

planning

concurrent     9-17

Planning tools

introduction     1-5

point-to-point links

ISC TEM support     2-2

policy

create     5-2

managed     5-2

overview     9-2

TE tunnel     5-13, 6-6

unmanaged     5-2

policy editor     9-3

preconfiguration process

     2-3

preferential treatment of traffic     8-2

primary tunnel

create     5-8, 5-11, 6-4, A-44, A-59

deployment logs     10-1

edit     A-52

GUI     A-41, A-59

introduction     5-1, 5-2, 6-1

managed     5-8, A-41, A-44

types of     5-8

unmanaged     5-8, A-59

view details     A-43

prioritization

path selection     5-2

projection

topology map     A-10

propagation delay

resource modification     A-28

protected interface     A-62

provision preference     5-8, A-34

purging a service request     B-9

R

Randomize algorithm     A-12

related documentation     xii

repaint period     A-13

repository

loading into topology GUI     A-7

populate     3-2

repository, ISC     B-1

requested state     B-11

resource management

GUI     4-1

modifying network resources     4-1

overview     4-1

resource modification

attribute bits     A-28

GUI     A-28

link speed factor     A-29

max delay increase     A-28

propagation delay     A-28

Resource Modification SR     A-30

TE Metric     A-28

role

admin     2-5

TERole     2-5

TEServiceOpRole     2-5

Role-Based Access Control (RBAC)     1-3

S

schedules     9-15

seed router

communicating via SSH     2-4

communicating via Telnet     2-4

Service auditing     1-3

service request

transition states     B-9

verifying     B-9

service request (SR)

history     9-17

state     5-15, 5-18, 5-20, 5-24, 5-26, 5-27, 6-7, 6-17, 6-22, 6-26, 6-30, 7-11, 8-5

service requests

configlets     B-5

decommissioning     B-7

history     B-3

operations     B-2

overview     B-1

purging     B-9

states     B-9

verifying     B-9

viewing details     B-3

Service state management     1-3

setup priority     1-4, 5-2, 5-4, 9-4, A-48, A-63

SLA

guarantees     1-1

violating with non-conformant tunnels     1-5

SNMP     1-2, 9-11

spacing

automatic     A-13

horizontal     A-13

vertical     A-13

Spring

settings in Topology Display     11-10

Spring algorithm     A-12

SSH

communicating with seed router     2-4

state

Broken     B-10

closed     B-10

deployed     B-10

failed audit     B-10

failed deploy     B-10

Functional     B-10

invalid     B-10

lost     B-10

pending     B-10

requested     B-11

Wait Deployed     B-11

states of service requests     B-10

static route

add     8-3

T

task

create     9-6

introduction     9-5

multiple instances     10-3

schedule     9-9, 9-10, 9-15, 9-16

summary     9-10

TE Discovery     9-5

TE Functional Audit     9-5

TE Interface Performance     9-5

types of TE tasks     9-5

task logs     B-9

accessing     A-67

deployment     10-1

field definitions     A-67

overview     3-7, 10-1

Task Manager

logs created from     10-2

task runtime actions

viewing logs     10-2

TE Discovery

create task     3-3, 9-5

overview     3-2

prerequisites     3-2

schedule task     3-5, 3-6

view task log     3-7

TE Explicit Path

see explicit path     A-33

TE Functional Audit task

create     9-6

TE Interface Performance

select tunnel     9-14

TE Interface Performance task

create     9-11

scheduling collection     9-13

TE Link

view details     A-23

TE Links

accessing     A-21

TE links

display     A-23

fields in GUI     A-21

view details     A-24

Telnet

communicating with seed router     2-4

TE Metric

resource modification     A-28

TE Nodes

accessing     A-18

TE nodes

display     A-19

fields in GUI     A-18

view details     A-20

TE Performance Reports

accessing     10-4, A-69

GUI     A-69

introduction     10-4

TE Policy Editor     5-3

see policy editor     9-3

TE provider

create     2-6, A-3

edit     A-3

select     3-4

TE Topology

accessing     11-2

GUI     A-5

overview     11-1

TE Topology Interface Applet     11-1

short desciption     A-5

Topology Applet

using     11-2

Topology Display

add/modify attributes     11-9

algorithms     A-12

applet     11-3

clear highlighting     11-9

clear map     A-8

display layers     A-17

draw elements from repository     A-7

GUI elements     A-5

load map     A-8

magnetic grid     A-14

manage and manipulate graphs     A-10

optimize links     11-10

print     A-8

Spring settings     11-10

tools     A-14

tunnels     A-11

view     A-14

zoom     A-14

traffic admission

accessing     A-64

field definitions     A-65

GUI     A-64

introduction     8-1

Traffic Admission SR

create     8-2

deploy     8-4

transition states     B-9

troubleshooting     B-9

tunnel

admission     8-1

backup     5-2

calculating bandwidth utilization     1-2, 9-11

create backup     5-20

create primary     5-8

deployment     A-61

policy     5-13, 6-6

primary     5-2

save & deploy     5-15, 5-17, 5-19, 5-24, 5-26, 5-27

zero priority unmanaged     1-4

tunnels

conformant     1-4

managed     1-3, 5-4

non-conformant     1-4

unmanaged     1-3

U

unmanaged tunnels

see managed and unmanaged tunnels     1-3

user

set up new     2-4

user roles

accessing     9-1

introduction     9-1

users     xi

V

verifying service requests     B-9

viewing QoS configlet     B-5

violations

introduction     C-1

messages     C-3

W

Wait Deployed state     B-11

warnings

introduction     C-1

messages     C-2

Z

zooming

Topology Display     A-14