Table Of Contents
A - B - C - D - E - F - G - H - I - J - L - M - N - O - P - R - S - T - U - V - W - Z
Index
A
About This Guide xi
administration
GUI A-67
administrative features 9-1
admin status A-25
affinity 9-4, A-48, A-63
affinity bits A-28
affinity mask 9-4, A-48, A-63
algorithm
Randomize 11-10, A-12
Spring 11-10, A-12
using 11-10
antialiasing 11-9, A-11
Assign TE Resources
in GUI A-40
attribute bits, resource modification A-28
audience xi
Audit SR
from TE Protection SR 7-11
auto-gen
creating multicast tunnels A-46
Auto Refresh
discovery 3-8
autoroute announce 8-3, A-66
autoroute metric 8-3, A-66
B
backing store 11-9, A-11
backup tunnel
create 5-20, A-59
creation 5-2
deployment logs 10-1
field definitions A-60, A-62
GUI A-59
introduction 5-2
bandwidth
auto 1-4
calculating utilization 1-2, 9-11
global pool A-25
guarantees 1-4, 1-5
limit A-62
max global (BC0) reservable A-28
max sub pool (BC1) A-28
non-zero 1-4
pool type 9-4, A-48
sub pool A-25
total allocated A-25
Broken state B-10
browsers
limitation on multiple 2-2
C
Cisco IOS
commands B-3
Class-of-Service (CoS) 5-2, 8-1
closed state B-10
Command Line Validation Tool
overview 6-9
commands
downloaded to device B-6
concurrency
limitation 2-2
ConfigAudit log 10-1
configlet
viewing B-5
configlets 9-17
managing service requests B-5
conformant/non-conformant tunnels 1-4
Conformant tunnels
definition 1-4
conventions and terminology xviii
coordinates
set 11-4
customer
select 2-9
D
Data persistence 1-3
decommissioning a service request B-7
delay constraint A-48
deploy
force deploy 5-24, A-43, A-56, A-61
tunnel 5-15, 5-17, 5-19, 5-26, 5-27, 7-11
deployed state B-9, B-10
deployment
force deploy 8-5, A-30
queue A-56, A-61
status, traffic admission 8-2
task logs 10-1
difference between managed and unmanaged A-59
DirectedLink C-1
documentation xii
conventions and terminology xviii
Document Type Definition
see DTD file D-1
double buffer 11-9, A-11
downloaded commands B-6
DTD file
contents D-1
overview D-1
using to import tunnels 6-9
E
edge length
automatic A-13
constant A-13
epsilon, algorithm constant A-13
explicit path
accessing in GUI A-30, A-33, A-35
create A-34
edit 5-3, 5-5, A-34
editor 5-6
fields in GUI A-33
select 5-4, 5-13, 5-23, A-49, A-64
viewer 5-14, A-50
F
failed audit state B-10
failed deploy state B-10
failed service request B-9
features in ISC TM 1-2
FRR protection level 9-4, A-48
Functional state B-10
G
grid
color A-15
in Topology Display A-14
spacing A-15
GUI
accessing A-1
administration A-67
Assign TE Resources A-40
backup tunnel A-59
Create Managed TE Tunnel A-41
Create Unmanaged TE Tunnel A-59
field descriptions A-1
layout graph 11-4
monitoring A-67
overview A-1
resource modification A-28
Save Graph Layout 11-4
task runtime actions 3-7
TE Explicit Path A-33
TE links A-21
TE nodes A-18
TE Providers A-3
TE Topology A-5
TE Traffic Admission A-64
Traffic Management Services A-1
H
hold priority 1-4, 5-2, 5-4, 9-4, A-48
I
import file
description 6-9
interface
calculating bandwidth utilization 1-2, 9-11
non-TE 5-4, 5-7
TE 5-7
invalid state B-10
IOS-XR
limitation with non-POS interfaces 2-2
ISC TM
overview 1-1
prerequisites and limitations 2-2
J
JRE version
support 2-2
L
latitude range
topology map A-10
license
install license keys 2-4
link
add 5-7
status A-25
link speed factor
resource modification A-29
logs
deployment log 5-16, 5-24, 6-7, 7-12, 8-5
TE Discovery, examples 3-8
longitude range
topology map A-10
lost state B-10
M
managed and unmanaged tunnels 1-3
manage lock
in GUI A-3
map
add new 11-7
clear 11-8
load 11-5
projection 11-6
supported format 11-5
using 11-5
max delay increase
resource modification A-28
monitoring
field descriptions A-67
GUI A-67
MPLS TE tunnels 1-1
multicast
creating tunnels with auto-gen A-46
N
next hop
list 5-7
select 5-7
non-Cisco devices
support for 2-2
Non-conformant tunnels
definition 1-4
managing 1-5
Non-POS interfaces
limitation with IOS-XR 2-2
O
objective xi, 2-2
optimize links A-12
Topology Display 11-10
P
pathing constraints 5-2
pending state B-9, B-10
performance reports
see TE Performance Reports 10-4
planning
concurrent 9-17
Planning tools
introduction 1-5
point-to-point links
ISC TEM support 2-2
policy
create 5-2
managed 5-2
overview 9-2
TE tunnel 5-13, 6-6
unmanaged 5-2
policy editor 9-3
preconfiguration process
2-3
preferential treatment of traffic 8-2
primary tunnel
create 5-8, 5-11, 6-4, A-44, A-59
deployment logs 10-1
edit A-52
GUI A-41, A-59
introduction 5-1, 5-2, 6-1
managed 5-8, A-41, A-44
types of 5-8
unmanaged 5-8, A-59
view details A-43
prioritization
path selection 5-2
projection
topology map A-10
propagation delay
resource modification A-28
protected interface A-62
provision preference 5-8, A-34
purging a service request B-9
R
Randomize algorithm A-12
related documentation xii
repaint period A-13
repository
loading into topology GUI A-7
populate 3-2
repository, ISC B-1
requested state B-11
resource management
GUI 4-1
modifying network resources 4-1
overview 4-1
resource modification
attribute bits A-28
GUI A-28
link speed factor A-29
max delay increase A-28
propagation delay A-28
Resource Modification SR A-30
TE Metric A-28
role
admin 2-5
TERole 2-5
TEServiceOpRole 2-5
Role-Based Access Control (RBAC) 1-3
S
schedules 9-15
seed router
communicating via SSH 2-4
communicating via Telnet 2-4
Service auditing 1-3
service request
transition states B-9
verifying B-9
service request (SR)
history 9-17
state 5-15, 5-18, 5-20, 5-24, 5-26, 5-27, 6-7, 6-17, 6-22, 6-26, 6-30, 7-11, 8-5
service requests
configlets B-5
decommissioning B-7
history B-3
operations B-2
overview B-1
purging B-9
states B-9
verifying B-9
viewing details B-3
Service state management 1-3
setup priority 1-4, 5-2, 5-4, 9-4, A-48, A-63
SLA
guarantees 1-1
violating with non-conformant tunnels 1-5
SNMP 1-2, 9-11
spacing
automatic A-13
horizontal A-13
vertical A-13
Spring
settings in Topology Display 11-10
Spring algorithm A-12
SSH
communicating with seed router 2-4
state
Broken B-10
closed B-10
deployed B-10
failed audit B-10
failed deploy B-10
Functional B-10
invalid B-10
lost B-10
pending B-10
requested B-11
Wait Deployed B-11
states of service requests B-10
static route
add 8-3
T
task
create 9-6
introduction 9-5
multiple instances 10-3
schedule 9-9, 9-10, 9-15, 9-16
summary 9-10
TE Discovery 9-5
TE Functional Audit 9-5
TE Interface Performance 9-5
types of TE tasks 9-5
task logs B-9
accessing A-67
deployment 10-1
field definitions A-67
overview 3-7, 10-1
Task Manager
logs created from 10-2
task runtime actions
viewing logs 10-2
TE Discovery
create task 3-3, 9-5
overview 3-2
prerequisites 3-2
schedule task 3-5, 3-6
view task log 3-7
TE Explicit Path
see explicit path A-33
TE Functional Audit task
create 9-6
TE Interface Performance
select tunnel 9-14
TE Interface Performance task
create 9-11
scheduling collection 9-13
TE Link
view details A-23
TE Links
accessing A-21
TE links
display A-23
fields in GUI A-21
view details A-24
Telnet
communicating with seed router 2-4
TE Metric
resource modification A-28
TE Nodes
accessing A-18
TE nodes
display A-19
fields in GUI A-18
view details A-20
TE Performance Reports
accessing 10-4, A-69
GUI A-69
introduction 10-4
TE Policy Editor 5-3
see policy editor 9-3
TE provider
create 2-6, A-3
edit A-3
select 3-4
TE Topology
accessing 11-2
GUI A-5
overview 11-1
TE Topology Interface Applet 11-1
short desciption A-5
Topology Applet
using 11-2
Topology Display
add/modify attributes 11-9
algorithms A-12
applet 11-3
clear highlighting 11-9
clear map A-8
display layers A-17
draw elements from repository A-7
GUI elements A-5
load map A-8
magnetic grid A-14
manage and manipulate graphs A-10
optimize links 11-10
print A-8
Spring settings 11-10
tools A-14
tunnels A-11
view A-14
zoom A-14
traffic admission
accessing A-64
field definitions A-65
GUI A-64
introduction 8-1
Traffic Admission SR
create 8-2
deploy 8-4
transition states B-9
troubleshooting B-9
tunnel
admission 8-1
backup 5-2
calculating bandwidth utilization 1-2, 9-11
create backup 5-20
create primary 5-8
deployment A-61
policy 5-13, 6-6
primary 5-2
save & deploy 5-15, 5-17, 5-19, 5-24, 5-26, 5-27
zero priority unmanaged 1-4
tunnels
conformant 1-4
managed 1-3, 5-4
non-conformant 1-4
unmanaged 1-3
U
unmanaged tunnels
see managed and unmanaged tunnels 1-3
user
set up new 2-4
user roles
accessing 9-1
introduction 9-1
users xi
V
verifying service requests B-9
viewing QoS configlet B-5
violations
introduction C-1
messages C-3
W
Wait Deployed state B-11
warnings
introduction C-1
messages C-2
Z
zooming
Topology Display A-14