Cisco Prime Fulfillment Theory of Operations Guide 6.2
Index

Table Of Contents

A - B - C - D - E - F - H - I - L - M - O - P - R - S - T - V -

Index

A

AAL5 1-8

address space separation 3-8

ATMoMPLS 1-8

ATM over MPLS (ATMoMPLS) 1-8

audience ii-v

authenticating

LDP 3-14

routes 3-13

B

bandwidth pools 4-6

C

CBTS

Class-Based Tunnel Selection 4-8

cell relay

over MPLS 1-8

CEs

security of the PE-CE interface 3-13

Class-Based Tunnel Selection (CBTS) 4-8

concurrent use

overview 4-4, 6-7

with managed and unmanaged tunnels 4-4, 6-8

conformant/non-conformant tunnels

defining 4-3, 6-5

managing 4-4

overview 4-3, 6-4

Connectivity Protection (CSPF) Backup Tunnels 4-8

CSPF

Connectivity Protection Backup Tunnels 4-8

D

devices

suitable for TE Discovery 4-5

trusted devices 3-13

E

ERS

multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19

multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-16

Ethernet relay service (ERS or EVPL) 1-5

Ethernet wire service (EWS or EPL) 1-5

EWS

multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18

multipoint EWS (EP-LAN) for an MPLS-based provider core 1-16

extranets 3-2

F

frame relay over MPLS (FRoMPLS) 1-9

FRoMPLS 1-9

full mesh topologies 3-8

H

hub and spoke topologies 3-7

I

implementing, VRFs 3-4

intranets 3-2

ISC TEM

features 4-2, 6-4

L

L2VPN

service provisioning 1-5

terminology conventions 1-1

L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5

label spoofing 3-12

LDP authentication 3-14

links

provisioning regular PE-CE links 2-6, 5-3, A-1

locking mechanism 4-5

M

managed/unmanaged primary tunnels 4-2

managing

independent VRF objects 3-5

MDE

features 2-6, 5-3

MEF

mapping MEF terminologies to network technologies 1-3

terminology conventions 1-1

Metro Ethernet Forum (see MEF) 1-1

MPLS VPNs

concepts 3-1

security 3-8

multiple concurrent users 4-4, 6-7

multiple OSPF areas 4-5, 4-6

multipoint

ERS (EVP-LAN) for an Ethernet-based provider core 1-19

ERS (EVP-LAN) for an MPLS-based provider core 1-16

EWS (EP-LAN) for an Ethernet-based provider core 1-18

EWS (EP-LAN) for an MPLS-based provider core 1-16

O

objective ii-v

OSPF areas

example of network 4-6

multiple 4-5

overview

MDE 2-1, 5-1

P

PBTS

Policy-Based Tunnel Selection 4-9

PEs

security of the PE-CE interface 3-13

planning tools 4-7

point-to-point

Ethernet (EWS and ERS) (EPL and EVPL) 1-5

Policy-Based Tunnel Selection (PBTS) 4-9

prerequisite knowledge 5-2

providers

multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19

multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-16

multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18

multipoint EWS (EP-LAN) for an MPLS-based provider core 1-16

provisioning

regular PE-CE links 2-6, 5-3, A-1

R

reactive fault lifecycle 5-1

relay service, Ethernet 1-5

route distinguishers 3-5

route targets 3-5

communities 3-6

routing

authentication 3-13

separation 3-8, 3-9

routing protocols

securing 3-11

S

security

ensuring VPN isolation 3-16

hiding the MPLS core structure 3-9

label spoofing 3-12

LDP authentication 3-14

MP-BGP security features 3-14

MPLS VPNs 3-8

of the PE-CE interface 3-13

resistance to attacks 3-10

securing the MPLS core 3-12

securing the routing protocol 3-11

security through IP address resolution 3-15

separation of CE-PE links 3-13

trusted devices 3-13

service provisioning, for L2VPN 1-5

T

TE area identifier

TE Discovery 4-6

TE Discovery

devices suitable for 4-5

TE area identifier 4-6

terminology conventions

L2VPN 1-1

MEF 1-1, 1-3

TE tunnels

concurrent use with managed and unmanaged tunnels 4-4, 6-8

topologies

full mesh 3-8

hub and spoke 3-7

topology

for ATMoMPLS 1-8

for Ethernet-based VPLS 1-19

for FRoMPLS 1-9

for L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5

for MPLS-based VPLS 1-17

V

VPLS

for an Ethernet-based (L2) provider core 1-18

service provisioning 1-15

topology for Ethernet-based VPLS 1-19

topology for MPLS-based VPLS 1-17

VPNs 3-1

connectivity between VPNs 3-14

ensuring VPN isolation 3-16

VRF objects

independent VRF object management 3-5

VRFs

implementation of 3-4

VRF instance 3-5