Table Of Contents
A - B - C - D - E - F - H - I - L - M - O - P - R - S - T - V -
Index
A
AAL5 1-8
address space separation 2-8
ATMoMPLS 1-8
ATM over MPLS (ATMoMPLS) 1-8
audience v
authenticating
LDP 2-13
routes 2-13
B
bandwidth pools 4-6
C
CBTS
Class-Based Tunnel Selection 4-8
cell relay
over MPLS 1-8
CEs
security of the PE-CE interface 2-13
Class-Based Tunnel Selection (CBTS) 4-8
concurrent use
overview 4-4
with managed and unmanaged tunnels 4-4
conformant/non-conformant tunnels
defining 4-3
managing 4-3
overview 4-2
Connectivity Protection (CSPF) Backup Tunnels 4-8
CSPF
Connectivity Protection Backup Tunnels 4-8
D
devices
suitable for TE Discovery 4-5
trusted devices 2-12
E
ERS
multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19
multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-17
Ethernet relay service (ERS or EVPL) 1-5
Ethernet wire service (EWS or EPL) 1-5
EWS
multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18
multipoint EWS (EP-LAN) for an MPLS-based provider core 1-17
extranets 2-2
F
frame relay over MPLS (FRoMPLS) 1-9
FRoMPLS 1-9
full mesh topologies 2-8
H
hub and spoke topologies 2-8
I
implementing, VRFs 2-4
intranets 2-2
L
L2VPN
service provisioning 1-5
terminology conventions 1-1
L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5
label spoofing 2-12
LDP authentication 2-13
links
provisioning regular PE-CE links 3-1, 5-3
locking mechanism 4-4
M
managed/unmanaged primary tunnels 4-2
managing
independent VRF objects 2-5
MEF
mapping MEF terminologies to network technologies 1-3
terminology conventions 1-1
Metro Ethernet Forum (see MEF) 1-1
MPLS VPNs
concepts 2-1
security 2-8
multiple concurrent users 4-4
multiple OSPF areas 4-5, 4-6
multipoint
ERS (EVP-LAN) for an Ethernet-based provider core 1-19
ERS (EVP-LAN) for an MPLS-based provider core 1-17
EWS (EP-LAN) for an Ethernet-based provider core 1-18
EWS (EP-LAN) for an MPLS-based provider core 1-17
O
objective v
organization v
OSPF areas
example of network 4-6
multiple 4-5
overview
Diagnostics 5-1
P
PBTS
Policy-Based Tunnel Selection 4-9
PEs
security of the PE-CE interface 2-13
planning tools 4-7
point-to-point
Ethernet (EWS and ERS) (EPL and EVPL) 1-5
Policy-Based Tunnel Selection (PBTS) 4-9
prerequisite knowledge 5-2
providers
multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19
multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-17
multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18
multipoint EWS (EP-LAN) for an MPLS-based provider core 1-17
provisioning
regular PE-CE links 3-1, 5-3
R
reactive fault lifecycle 5-1
relay service, Ethernet 1-5
route distinguishers 2-5
route targets 2-5
communities 2-6
routing
authentication 2-13
separation 2-8, 2-9
routing and forwarding tables 2-3
routing protocols
securing 2-10
S
security
ensuring VPN isolation 2-15
hiding the MPLS core structure 2-9
label spoofing 2-12
LDP authentication 2-13
MP-BGP security features 2-14
MPLS VPNs 2-8
of the PE-CE interface 2-13
resistance to attacks 2-10
securing the MPLS core 2-12
securing the routing protocol 2-10
security through IP address resolution 2-15
separation of CE-PE links 2-13
trusted devices 2-12
service provisioning, for L2VPN 1-5
T
TE area identifier
TE Discovery 4-5
TE Discovery
devices suitable for 4-5
TE area identifier 4-5
terminology conventions
L2VPN 1-1
MEF 1-1, 1-3
TE tunnels
concurrent use with managed and unmanaged tunnels 4-4
topologies
full mesh 2-8
hub and spoke 2-8
topology
for ATMoMPLS 1-8
for Ethernet-based VPLS 1-19
for FRoMPLS 1-9
for L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5
for MPLS-based VPLS 1-17
V
VPLS
for an Ethernet-based (L2) provider core 1-18
service provisioning 1-16
topology for Ethernet-based VPLS 1-19
topology for MPLS-based VPLS 1-17
VPNs 2-1
connectivity between VPNs 2-14
ensuring VPN isolation 2-15
VPN routing and forwarding tables 2-3
VRF objects
independent VRF object management 2-5
VRFs
implementation of 2-4
VRF instance 2-5