Cisco Prime Fulfillment Theory of Operations Guide 6.1
Index

Table Of Contents

A - B - C - D - E - F - H - I - L - M - O - P - R - S - T - V -

Index

A

AAL5 1-8

address space separation 2-8

ATMoMPLS 1-8

ATM over MPLS (ATMoMPLS) 1-8

audience v

authenticating

LDP 2-13

routes 2-13

B

bandwidth pools 4-6

C

CBTS

Class-Based Tunnel Selection 4-8

cell relay

over MPLS 1-8

CEs

security of the PE-CE interface 2-13

Class-Based Tunnel Selection (CBTS) 4-8

concurrent use

overview 4-4

with managed and unmanaged tunnels 4-4

conformant/non-conformant tunnels

defining 4-3

managing 4-3

overview 4-2

Connectivity Protection (CSPF) Backup Tunnels 4-8

CSPF

Connectivity Protection Backup Tunnels 4-8

D

devices

suitable for TE Discovery 4-5

trusted devices 2-12

E

ERS

multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19

multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-17

Ethernet relay service (ERS or EVPL) 1-5

Ethernet wire service (EWS or EPL) 1-5

EWS

multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18

multipoint EWS (EP-LAN) for an MPLS-based provider core 1-17

extranets 2-2

F

frame relay over MPLS (FRoMPLS) 1-9

FRoMPLS 1-9

full mesh topologies 2-8

H

hub and spoke topologies 2-8

I

implementing, VRFs 2-4

intranets 2-2

L

L2VPN

service provisioning 1-5

terminology conventions 1-1

L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5

label spoofing 2-12

LDP authentication 2-13

links

provisioning regular PE-CE links 3-1, 5-3

locking mechanism 4-4

M

managed/unmanaged primary tunnels 4-2

managing

independent VRF objects 2-5

MEF

mapping MEF terminologies to network technologies 1-3

terminology conventions 1-1

Metro Ethernet Forum (see MEF) 1-1

MPLS VPNs

concepts 2-1

security 2-8

multiple concurrent users 4-4

multiple OSPF areas 4-5, 4-6

multipoint

ERS (EVP-LAN) for an Ethernet-based provider core 1-19

ERS (EVP-LAN) for an MPLS-based provider core 1-17

EWS (EP-LAN) for an Ethernet-based provider core 1-18

EWS (EP-LAN) for an MPLS-based provider core 1-17

O

objective v

organization v

OSPF areas

example of network 4-6

multiple 4-5

overview

Diagnostics 5-1

P

PBTS

Policy-Based Tunnel Selection 4-9

PEs

security of the PE-CE interface 2-13

planning tools 4-7

point-to-point

Ethernet (EWS and ERS) (EPL and EVPL) 1-5

Policy-Based Tunnel Selection (PBTS) 4-9

prerequisite knowledge 5-2

providers

multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19

multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-17

multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18

multipoint EWS (EP-LAN) for an MPLS-based provider core 1-17

provisioning

regular PE-CE links 3-1, 5-3

R

reactive fault lifecycle 5-1

relay service, Ethernet 1-5

route distinguishers 2-5

route targets 2-5

communities 2-6

routing

authentication 2-13

separation 2-8, 2-9

routing and forwarding tables 2-3

routing protocols

securing 2-10

S

security

ensuring VPN isolation 2-15

hiding the MPLS core structure 2-9

label spoofing 2-12

LDP authentication 2-13

MP-BGP security features 2-14

MPLS VPNs 2-8

of the PE-CE interface 2-13

resistance to attacks 2-10

securing the MPLS core 2-12

securing the routing protocol 2-10

security through IP address resolution 2-15

separation of CE-PE links 2-13

trusted devices 2-12

service provisioning, for L2VPN 1-5

T

TE area identifier

TE Discovery 4-5

TE Discovery

devices suitable for 4-5

TE area identifier 4-5

terminology conventions

L2VPN 1-1

MEF 1-1, 1-3

TE tunnels

concurrent use with managed and unmanaged tunnels 4-4

topologies

full mesh 2-8

hub and spoke 2-8

topology

for ATMoMPLS 1-8

for Ethernet-based VPLS 1-19

for FRoMPLS 1-9

for L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5

for MPLS-based VPLS 1-17

V

VPLS

for an Ethernet-based (L2) provider core 1-18

service provisioning 1-16

topology for Ethernet-based VPLS 1-19

topology for MPLS-based VPLS 1-17

VPNs 2-1

connectivity between VPNs 2-14

ensuring VPN isolation 2-15

VPN routing and forwarding tables 2-3

VRF objects

independent VRF object management 2-5

VRFs

implementation of 2-4

VRF instance 2-5