Table Of Contents
A - B - C - D - E - F - H - I - L - M - O - P - R - S - T - V -
Index
A
AAL5 1-8
address space separation 3-8
ATMoMPLS 1-8
ATM over MPLS (ATMoMPLS) 1-8
audience ii-v
authenticating
LDP 3-14
routes 3-13
B
bandwidth pools 4-6
C
CBTS
Class-Based Tunnel Selection 4-8
cell relay
over MPLS 1-8
CEs
security of the PE-CE interface 3-13
Class-Based Tunnel Selection (CBTS) 4-8
concurrent use
overview 4-4, 6-7
with managed and unmanaged tunnels 4-4, 6-8
conformant/non-conformant tunnels
defining 4-3, 6-5
managing 4-4
overview 4-3, 6-4
Connectivity Protection (CSPF) Backup Tunnels 4-8
CSPF
Connectivity Protection Backup Tunnels 4-8
D
devices
suitable for TE Discovery 4-5
trusted devices 3-13
E
ERS
multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19
multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-16
Ethernet relay service (ERS or EVPL) 1-5
Ethernet wire service (EWS or EPL) 1-5
EWS
multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18
multipoint EWS (EP-LAN) for an MPLS-based provider core 1-16
extranets 3-2
F
frame relay over MPLS (FRoMPLS) 1-9
FRoMPLS 1-9
full mesh topologies 3-8
H
hub and spoke topologies 3-7
I
implementing, VRFs 3-4
intranets 3-2
ISC TEM
features 4-2, 6-4
L
L2VPN
service provisioning 1-5
terminology conventions 1-1
L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5
label spoofing 3-12
LDP authentication 3-14
links
provisioning regular PE-CE links 2-6, 5-3, A-1
locking mechanism 4-5
M
managed/unmanaged primary tunnels 4-2
managing
independent VRF objects 3-5
MDE
features 2-6, 5-3
MEF
mapping MEF terminologies to network technologies 1-3
terminology conventions 1-1
Metro Ethernet Forum (see MEF) 1-1
MPLS VPNs
concepts 3-1
security 3-8
multiple concurrent users 4-4, 6-7
multiple OSPF areas 4-5, 4-6
multipoint
ERS (EVP-LAN) for an Ethernet-based provider core 1-19
ERS (EVP-LAN) for an MPLS-based provider core 1-16
EWS (EP-LAN) for an Ethernet-based provider core 1-18
EWS (EP-LAN) for an MPLS-based provider core 1-16
O
objective ii-v
OSPF areas
example of network 4-6
multiple 4-5
overview
MDE 2-1, 5-1
P
PBTS
Policy-Based Tunnel Selection 4-9
PEs
security of the PE-CE interface 3-13
planning tools 4-7
point-to-point
Ethernet (EWS and ERS) (EPL and EVPL) 1-5
Policy-Based Tunnel Selection (PBTS) 4-9
prerequisite knowledge 5-2
providers
multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19
multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-16
multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18
multipoint EWS (EP-LAN) for an MPLS-based provider core 1-16
provisioning
regular PE-CE links 2-6, 5-3, A-1
R
reactive fault lifecycle 5-1
relay service, Ethernet 1-5
route distinguishers 3-5
route targets 3-5
communities 3-6
routing
authentication 3-13
separation 3-8, 3-9
routing protocols
securing 3-11
S
security
ensuring VPN isolation 3-16
hiding the MPLS core structure 3-9
label spoofing 3-12
LDP authentication 3-14
MP-BGP security features 3-14
MPLS VPNs 3-8
of the PE-CE interface 3-13
resistance to attacks 3-10
securing the MPLS core 3-12
securing the routing protocol 3-11
security through IP address resolution 3-15
separation of CE-PE links 3-13
trusted devices 3-13
service provisioning, for L2VPN 1-5
T
TE area identifier
TE Discovery 4-6
TE Discovery
devices suitable for 4-5
TE area identifier 4-6
terminology conventions
L2VPN 1-1
MEF 1-1, 1-3
TE tunnels
concurrent use with managed and unmanaged tunnels 4-4, 6-8
topologies
full mesh 3-8
hub and spoke 3-7
topology
for ATMoMPLS 1-8
for Ethernet-based VPLS 1-19
for FRoMPLS 1-9
for L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5
for MPLS-based VPLS 1-17
V
VPLS
for an Ethernet-based (L2) provider core 1-18
service provisioning 1-15
topology for Ethernet-based VPLS 1-19
topology for MPLS-based VPLS 1-17
VPNs 3-1
connectivity between VPNs 3-14
ensuring VPN isolation 3-16
VRF objects
independent VRF object management 3-5
VRFs
implementation of 3-4
VRF instance 3-5