Upload
others
View
1
Download
0
Embed Size (px)
Citation preview
Cisco VPN Solutions Center: MPLS SolutionDOC-7812189=
I N D E X
A
access list entries, named 3-24, A-31
accounting data
collecting from NetFlow Collector devices 5-5
collection schedule, defining 5-6
data query tool for 5-8
and NetFlow Collector 5-3
NetFlow setup tasks 5-3
NFC device, configuring 5-4
reports available 5-7
XML-based reports 5-8
ACLs
on the PE-CE link 1-11
role in MPLS security 1-10
action log for selected task 4-64
Action report for task logs 9-7
additive operators for templates B-4
address-family command C-2
address space separation 1-7
allowAS-in option 4-15
All VPN Service Requests report 4-34
application type summary report 5-7
area number for OSPF 4-14
array operators for templates B-5
ATM
encapsulation information, specifying 4-19
link VRF to ATM interface C-9
attacks, types of 1-9
auditing
customized audit 4-43
deployed test 9-10
generating an audit 4-32
auditing (continued)
new Repository location 9-12
routing test 9-10
unable to find request in audit list 9-11
audit reports
viewing 4-34
autonomous system (AS) number 2-52
options in VPNSC MPLS Solution 4-15
available values, specifying for variable 8-8
B
backing up Repository D-3
BGP 1-2
allowAS-in option 4-15
AS number 2-51, 2-52
AS number for CE’s network 4-15
community attribute 1-13
dampening 1-10
display VPN address information C-14
neighbor activate command C-10
neighbor AS-override option 4-15
RDs and RTs 1-17, 2-59
redistributing connected routes 4-14, 4-15
redistributing static routes 4-14, 4-15
route-target communities 1-18
security features 1-13
Border Gateway Protocol. See BGP
broken service, troubleshooting 9-11, 9-12
IN-1 Provisioning and Operations Guide
Index
C
cable services
cable-CE, creating 7-5
cable link, provisioning 7-18
Cisco uBR7200 router 7-2
CMTS 7-3
configuration file example A-30
configuring CE as unmanaged 3-5
DOCSIS 7-3
host helper address 7-23
maintenance helper address 7-14
maintenance interface on the PE 4-19
maintenance subinterface, provisioning 7-9
management VPN in cable network 7-3
modem helper address 7-23
MSO 7-3
no routing protocol, provisioning for 7-12, 7-21
overview 7-1
primary IP address range 7-4
protocol specification 4-17
redistributing connected routes recommended 7-12, 7-21
redistributing static routes 7-12, 7-21
secondary address 7-23
secondary IP address range 7-4
CAR 1-26
configuration example 5-29
data query tool for 5-32
MIB Reports 5-32
monitoring data with 5-28
polling a router’s CAR MIB 5-30
rate-limiting functionality 5-28
router interfaces, populating 5-30
XML-based reports 5-32
CE 3-4
adding to site 3-4
BGP AS number for 4-15
cable-CE, creating 7-5
CE to CE traffic report 5-8
CE (continued)
CE to CE traffic summary report 5-7
configured as hub A-2
customer packet drop report 5-25
data query tool for 5-8
default routes to 4-14
description of 1-2
editing information about 3-8
extra loopback address 4-21
interface number 4-19
managed CE considerations 6-2
managed or unmanaged, setting for 3-5
and MCE 6-4
not an SA Agent device option 3-6
OSPF area number 4-14
OSPF process ID 4-14
protocol encapsulation 4-19
regular SA Agent device 3-6
round trip delay report 5-25
routing context table 1-12
and SA Agent 3-4
setting up for SLA collection 5-14
source CE for SLA probe 5-16, 5-21
template, integrating with 4-25
unmanaged CEs 6-1
VLAN ID 4-20
CERC 4-6
adding CERC to VPN definition 3-17
full mesh 1-20
overview 1-18, 3-15
route target values, entering 3-18
selecting for VPN 4-9
CE Routing Community. See CERC
child graph 2-64, 3-22
Cisco uBR7200 router, and cable services 7-2
Class of Service profile. See CoS profile
clear ip route vrf command C-4
CMTS 7-3
Committed Access Rate. See CAR
IN-2Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
configlets
viewing configlet report 4-36
configuration files
cable network, example file for A-30
CE configured as member of extranet, example file for A-13
CEs configured as hubs, example file for A-2
collecting changed files only 5-36
config-change traps 5-37
Domain Name Server, setting up 2-13, 4-43
EBGP routing from PE to CE, example file for A-25
hub-and-spoke topology, example file for A-5
importing 2-25
importing updates from files 4-47
IP unnumbered, example file for A-27
management VPN, example file for A-10
modifying configurations with the Download Console 4-54
modifying from the VPN Console 4-51
named access list entries, example file for A-31
naming, convention for 2-25
naming convention 4-47
OSPF, example file for A-17
OSPF using unnumbered provisioning A-20
retrieving previous versions 4-51
security requirement 1-12
setting up routers for collection 2-13, 4-43
SmartCollector 5-36
and SNMP 5-36
static routing, example file for A-22
template configlet, placement in VPNSC configlet 4-27, 4-28
updating 4-45
updating from targets 4-45
valid file 2-26
congestion avoidance 1-28
congestion management 2-66
connected routes, redistributing 4-11
connection loss trap for SLA 5-11
CoS 1-25, GL-2
CAR 1-26
congestion management 2-66
GTS 1-28
in-contract bandwidth 1-27
IP precedence 1-26
out-of-contract bandwidth 1-27
painting 2-66
policing 2-66
profile 2-67
shaping 2-66
ToS parameter for SLAs 5-18
WFQ 1-28
WRED 1-28
and PE-CE link 4-25
CoS profile
assign to PE-CE link 4-25
in-contract bandwidth, valid input for 2-68
crypto key generate rsa 2-7
csm.properties file
closing service requests, enabling 4-40
and collecting configuration file data 5-36
customized router prompt 2-13, 4-43
IP address of TFTP server, specifying 2-12
LMI type, modifying 2-22
location of 2-11
RD value, overriding 4-23
templates, enabling 4-25, 8-2
TFTP, editing to use instead of Telnet 2-11
VRF name, overriding 4-23
customer
data query tool for 5-8
finding 3-8
information, defining 3-2
information, editing 3-7
menu 3-10
round trip delay report 5-25
sites, defining 3-2
summary report 5-7
IN-3Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
customer (continued)
topology, viewing 3-10
traffic volume report 5-8
customer edge router. See CE
customer packet drop report for SLAs 5-25
customer site, finding 3-3
customer sites, defining 3-4
customer summary report 5-7
D
dampening 1-10
data file for template 8-1
copying 8-19
deleting 8-20
Data Over Cable Service Interface Specifications. See DOCSIS
data query tools 5-1
debug ip bgp command C-25
default routes to CE 4-14
default value assigned to variable 8-8
denial-of-service attack 1-9
deployed test 9-10
deploying service requests 4-30
Device Inventory Repository
IP addresses, populating to 5-15
SA Agent devices, verifying 5-16
DLCI, specifying 4-19
DOCSIS 7-3
documentation
CD-ROM package xvi
feedback, submitting xv
ordering xvi
domain name
caution about specifying IP address and 2-26
for targets 2-25
Domain Name Server, setting up 2-13, 4-43
Download Console 4-51
modifying configurations with 4-54
downloading template configuration file 8-24
E
edge device routers
running commands from VPN Console 4-49
checking number of devices created 2-1
management interface on 2-33
modifying configurations with the Download Console 4-54
previous versions of configuration files 4-51
SNMP, setting up 2-8
encapsulation information, specifying 4-19
error report for task logs 4-65
ESS. See Event Subscription Service
Event Gateway Server 1-24
Event Subscription Service 1-24
Exec Command Console 4-49
using a command input file 4-50
exit-address-family command C-5
expired tasks, deleting 4-59
export route map
defining name of 4-22
and management VPN 4-9
extranet multiple VPN 6-5, 6-7
example configuration file A-13
extranets 1-6, 4-9
IP addresses unique in 2-57
F
Failed Deploy service, troubleshooting 9-9
file descriptor limit, fixing problem with 2-6
finding
customer 3-8
customer site 3-3
network 2-27
region 2-61
IN-4Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
finding (continued)
service provider 2-57
VPN 3-15
floating point variable 8-10
Frame Relay
encapsulation 4-19
LMI types, modifying 2-22
full mesh topology 1-20
definition 1-18
functional service, troubleshooting 9-11
G
Generic Traffic Shaping. See GTS
GTS 1-28, 2-66
H
host helper address 7-23
HTTP report for SLAs 5-25
hub-and-spoke topology 1-19, 4-9
definition 1-18
example configuration file for A-5
I
import map command C-6
import route map
defining name of 4-23
in-band connection 6-4
in-contract bandwidth 1-27
valid input for 2-68
inetd.conf file 2-12
integer variable 8-9
interfaces
cable interface, specifying 7-22
cable maintenance subinterface, provisioning 7-9
CE interface number 4-19
interfaces (continued)
data query tool for 5-34
IP numbered 4-21
loopback, using existing 4-22
maintenance subinterface for cable service 4-19
for PE-CE link 4-18
populating interface information to Repository 5-37
serial 4-19
shutting down PE interface 4-19
subinterface numbers, how chosen by VPNSC 7-4, 7-22
XML-based reports 5-34
Internet Service Provider. See ISP
intranets 1-6
intrusion attack 1-9
invalid service, troubleshooting 9-8
IOS commands
running from VPN Console 4-49
IP addresses
address scheme for PE-CE link 4-20
of advertised static routes 4-12
automatically assigned 4-22
caution about specifying both IP address and domain name 2-32
entering target’s address 2-32
exchange with neighbors C-10
host helper address 7-23
IP numbered with extra CE loopback 4-21
IPv4 address variable type 8-11
maintenance helper address 7-14
modem helper address 7-23
for NetFlow Collector device 2-49
and network security 1-14
numbered 4-21
populating to Device Inventory Repository 5-15
primary IP address range 7-4
secondary address 7-23
secondary IP address range 7-4
of static route to all sites in VPN 4-12
TFTP server, specifying 2-12
IN-5Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
IP addresses (continued)
unnumbered 4-21
VPN-IPv4 address 1-7
in VPNs 1-2
IP address pools
and automatically assigned addresses 4-22
on the PE-CE link 4-6
and regions 2-57
ip flow-cache entries command 5-3
ip flow-export destination command 5-3
ip flow-export version command 5-3
IP precedence 1-26
mapped to CoS 2-69
painting 2-66
ip route vrf command C-7
ip vrf command C-8
ip vrf forwarding command C-8, C-9
ISP 7-4
secondary IP address range 7-4
J
jitter report for SLAs 5-25
K
keywords, for templates B-4
L
label forwarding entries, displaying for VRF C-24
label spoofing 1-10
LDP authentication 1-12
license key, installing 2-4
lists, specifying in template variables 8-8
LMI type, modifying 2-22
logical operators for templates B-5
login command 2-8
login password, required for PEs and CEs 2-30
login shell file 2-6
loopback
extra loopback address on CE 4-21
interface number, using existing 4-22
and IP unnumbered addressing scheme 4-21
M
maintenance helper address 7-14
managed CE
and CAR reports 5-29
considerations 6-2
defining 3-5
required for SA Agent device 3-6
Management CE. See MCE
management interface
assigning to interface 2-33
Management PE. See MPE
management route map 6-6
management VPN 6-5
cable maintenance subinterface and 7-11, 7-20
in cable network 7-3
configuration file example A-10
creating Customer for 3-24
and export route map 3-30, 4-23
export route map generated 4-9
joining 4-9
and management route map 6-6
naming convention 3-31
PE-CE links, provisioning 3-31
provisioning 3-24
redistribute connected routes required 4-11
routing protocol for 3-28
topology 3-23, 6-5
maximum routes into VRF 4-23
MCE 3-4, 6-4
access lists 6-10
IP addresses for 3-30
IN-6Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
MCE (continued)
selecting for service request 3-27
selecting router for 3-26
test for route to 9-12
modem helper address 7-23
modifying an existing service 4-37
MPE 3-23, 6-5
IP addresses for 3-30
selecting for service request 3-27
MPLS VPNs 1-5
address space separation 1-7
CERCs in 1-18
characteristics 1-6
connectivity between 1-12
default routes to CE 4-14
defining 3-14
extranet multiple VPN 6-5
extranets 1-6
implementation techniques 6-4
in-band connection 6-4
intranets 1-6
management VPN 6-5
multiple VPNS merged into a single VPN 1-12
out-of-band VPN 6-5
principal technologies 1-6
provisioning stages 4-6
route-target communities 1-18
routing protocols 4-10
routing separation 1-7
and service requests 4-6
service requests, defining 4-7
transport method, default 2-29
VRF forwarding table 1-12
MPLS VPN Solution
benefits 1-4
customer information, defining 3-2
customer sites, defining 3-2, 3-4
data query tools 5-1
management VPN, implementing 3-23
MPLS VPN Solution (continued)
network management subnet 6-3
overview 1-1
security requirements 1-7
shutting down 2-5
SNMP community strings, specifying 2-30
starting 2-1
VPN, defining 3-14
MSO 7-1
domain 7-3
primary IP address range 7-4
Multiple Service Operator. See MSO
multiple VPNS merged into a single VPN 1-12
multiplicative operators for templates B-4
N
named access list entries 3-24
named access list entries, example file for A-31
neighbor activate command C-10
neighbor AS-override option 4-15
NetFlow Collector 5-3
adding devices to network 2-47
cache entries 5-3
configuring NFC device 5-4
data analyzer 1-30
enable PE interfaces 5-3
enabling NetFlow accounting 4-23, 7-16
hostname, specifying 2-47
IP address, specifying 2-49
network setup tasks 5-3
nf.resources file 5-4
nfconfig.file 5-4
overview 1-29
password, specifying 2-48
policy routing 1-30
recommended for PEs 1-29
setting role to NetFlow 2-47
SNMPv3 parameters, setting for 2-49
IN-7Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
NetFlow Collector (continued)
specifying collector devices in network 5-5
transport method, setting 2-48
username, specifying 2-48
version and port parameters on PEs 5-3
viewing NFC devices in network 2-50
network
adding targets to 2-36
definition 2-24
finding 2-27
modifying configuration files 4-51
name for 2-26
network packet drop report 5-25
network round trip delay report 5-26
traffic volume report 5-8
viewing devices by role 2-50
Network Layer Reachability Information 2-59
network layer reachability information. See NLRI
network management subnet 6-3
access rules of type 6-9
extranet multiple VPN 6-7
management VPN technique 3-23, 6-5
out-of-band technique 6-8
security for 6-9
suppressing 6-9
network packet drop report 5-25
network round trip delay report 5-26
new target
adding to network 2-36
management interface, specifying 2-37
terminal server, assigning access to 2-40
nf.resources file 5-4
nfconfig.file 5-4
NLRI 1-6, 2-59
no SA Agent option 3-6
O
one-dimensional variable, example B-6
Orbix
shutting down 2-5
starting 2-2
OSPF
area number on CE 4-14
area number on PE 4-14
configuration file example A-17
configuration file using unnumbered provisioning A-20
giving default routes to CE 4-14
process ID on CE 4-14
process ID on PE 4-14
redistributing connected routes 4-14
redistributing static routes 4-14
out-of-band technique 6-5, 6-8
out-of-contract bandwidth 1-27
P
PAD. See Provider Administrative Domain
painting packets 2-66
passwords
changing in VPNSC software 2-4
default for VPNSC software 2-4
maximum length of VPN Console password 2-4
for multiple targets 2-30
for routers 2-30
for single targets 2-32
updating router passwords 2-35
virtual terminal (login) password required 2-30
PE
adding to a region 2-54
advertised static routes, provisioning 4-12
Cisco uBR7200 series router 7-2
data query tool for 5-8
description of 1-4
enable interfaces for NetFlow 5-3
export route map 4-22
import route map 4-23
interface, shut down option 4-19
IN-8Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
PE (continued)
interface, specifying 4-19
maintenance interface for cable service 4-19
and MPE 3-23, 6-5
NetFlow, enabling on PE 5-3
network packet drop report 5-25
network round trip delay report 5-26
OSPF area number 4-14
OSPF process ID 4-14
PE to PE traffic summary report 5-7
port parameter 5-3
service requests, list of 2-64, 3-21
as shadow SA Agent device 3-6
template, integrating with 4-27
version parameter 5-3
VLAN ID 4-20
PE-CE link
access list guidelines 6-9
CoS definition for 4-25
and dynamic routing 6-10
EBGP routing from PE to CE, example configuration file for A-25
interfaces, defining 4-18
interfaces and encapsulation 4-19
IP addressing scheme for 4-20
LAN or WAN, specifying 4-19
for management VPN 3-31
removing a service 4-39
routing protocols for 4-10
security considerations 1-11
static route for IP unnumbered scheme 4-21
static route provisioning 4-10
traffic volume report 5-8
pending service, troubleshooting 9-10
performance monitoring
CAR MIB reports 5-32
data query tools 5-1
polling a router’s CAR MIB 5-30
point-to-point address pool 4-21
policing 2-66
primary IP address range 7-4
Provider Administrative Domain 2-51
adding region to 2-60
autonomous system number 2-52
Class of Service Profile 2-67
customer information 3-2
customer sites 3-2
deleting a region 2-61
information needed 2-51
IP address pools for 2-57
menu 2-67
menu for 2-54
assigning PEs to region 2-53
region, defining 2-52
topology, displaying 2-62
VPN, defining 3-14
provisioning
cable link 7-18
cable maintenance subinterface 7-9
main functions 9-5
provisioning driver 9-5
router model 9-5
Q
QoS 1-25
defined 2-65
Quality of Service. See QoS
R
RD
customizing value of 2-59
description of 1-17
formats C-11
in hub-and-spoke environments 1-19
overriding default RD value 4-23
IN-9Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
RD (continued)
rd command C-11
role in routing separation 1-8
RT
and NLRI 2-59
redistributing routing protocols 4-17
regions 2-51
adding PEs to 2-54
adding to PAD 2-60
assigning PEs to 2-53
defining new one 2-52
deleting 2-61
finding 2-61
IP address pools for 2-57
service requests, list of 2-64, 3-21
regular SA Agent option 3-6
relational operators for templates B-5
removing a service 4-39
removing closed service requests 4-41
rep.list file, modifying D-2
repeat counter variable for templates B-6
repeat statement for templates B-6
reports
accounting data 5-7
All VPN Service Requests 4-34
CAR MIB 5-32
CE to CE traffic summary 5-7
customer packet drop report for SLAs 5-25
customer round trip delay 5-25
error report, task logs 4-65
HTTP report for SLAs 5-25
jitter report for SLAs 5-25
network packet drop 5-25
network round trip delay report 5-26
service request configlets 4-37
service request details 4-36
SLA definition report 5-26
SLA summary 5-25
standard error (Stderr) 4-65
reports (continued)
standard output (Stdout) 4-65
Repository
backing up D-3
converting to v2.0 D-1
exporting to a flat file D-7
management tool D-3
new location for 9-12
populating interface information to 5-37
removing closed service requests 4-41
rep.list file, modifying D-2
restoring D-5
requested service, troubleshooting 9-7
restoring the Repository D-5
Right to Use document 2-4
RIP
giving only default routes to CE 4-16
redistributing connected routes 4-16
redistributing static routes 4-16
route provisioning 4-16
round trip delay report 5-25
route distinguisher. See RD
route map
export 4-22
import 4-23
import to VRF C-8
routers
CAR MIB, polling 5-30
Cisco uBR7200 router, and cable services 7-2
Cisco uBR7200 series router 7-2
interfaces, populating 5-30
manually adding to network 2-36
modifying configurations with the Download Console 4-54
names match target names 2-24
passwords 2-30, 2-37
previous versions of configuration files 4-51
routing context table 1-12
running commands from VPN Console 4-49
IN-10Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
routers (continued)
SA Agent, enabling 2-11
SSH, setting up 2-7
terminal server, assigning access to 2-34
transport method, specifying 2-36
updating changed passwords 2-35
viewing list of routers in the network 2-50
virtual terminal (login) password required 2-30
VRF forwarding table 1-12
route target. See RT
route-target communities 1-18, C-12
export and import communities C-23
routing context table 1-12
routing protocols
defining for PE-CE link 4-10
for management VPN 3-28
redistribution 4-17
securing 1-9
routing separation 1-7
routing test 9-10, 9-11
RT C-12
customizing value of 2-59
description of 1-17
entering RT values in CERC definition 3-18
route-target command C-12
rtr responder, enabling 5-14
S
SA Agent 3-4
collecting data for SLAs 5-21
data query tool for 5-11
enabling on edge devices 2-11
introduction 5-11
options for CE 3-6
and SLA statistics 5-10
SLA definition report 5-26
source CE for probe, selecting 5-16, 5-21
traps, types of 5-11
SA Agent (continued)
XML-based reports 5-11
scheduling
tasks 4-59
secondary address 7-23
secondary IP address range 7-4
Secure Shell. See SSH 2-6
security considerations
address space and routing separation 1-7
connectivity between VPNs 1-12
denial-of-service attack 1-9
hiding the MPLS core structure 1-8
intrusion attack 1-9
label spoofing 1-10
PE-CE link 1-11
security level in SNMPv3 2-9
security model in SNMPv3 2-9
security requirements for MPLS VPNs 1-7
Service Assurance Agent. See SA Agent
service-level agreement. See SLAs
service provider, finding 2-57
service requests
about 4-6
access list entries, named 3-24
All VPN Service Requests report 4-34
auditing 4-32
closing manually 4-40
configlet report 4-36
customized deployment 4-42
defining 4-7
deploying 4-30
deploying selected requests 4-30
deployment status 4-35
details report 4-36
hub-and-spoke topology 4-9
integrating with template 4-25
modifying 4-37
PE, list of 2-64, 3-21
region, list of 2-64, 3-21
IN-11Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
service requests (continued)
removing a service 4-39
removing closed services 4-41
states of 4-2, 9-1
unable to find request in audit list 9-11
shadow SA Agent option 3-6
shaping 2-66
show C-24
show ip bgp vpnv4 command C-14
show ip cache flow command 5-3
show ip cef vrf command C-17
show ip protocols vrf command C-19
show ip route-cache flow command 5-3
show ip route vrf command C-20
show ip vrf command C-22
show tag-switching forwarding vrf command C-24
shutting down the product 2-5
site
data query tool for 5-8
finding 3-3
site information, editing 3-8
SLAs 5-10
collecting SA Agent data for 5-21
connection loss trap 5-11
creating 5-16
customer packet drop report 5-25
customer round trip delay report 5-25
definitions, data query tool for 5-26
deleting 5-23
enable traps parameter 5-19
falling threshold parameter 5-19
frequency parameter 5-18
HTTP report 5-25
jitter report 5-25
keep history parameter 5-19
network packet drop report 5-25
network round trip delay report 5-26
numbered buckets parameter 5-19
populating IP addresses 5-15
SLAs (continued)
SLA definition report 5-26
SLA life parameter 5-18
SNMP security level, setting 5-20
summary report 5-25
threshold parameter 5-18
threshold trap 5-11
timeout parameter 5-18
timeout trap 5-11
UDP Echo, enabling for SLA 5-14
viewing reports 5-25
SmartCollector 5-36
SNMP
community strings, specifying in MPLS VPN Solution 2-30
and configuration files 5-36
configuring the router for 4-44
retries and timeout settings 2-31
rtr responder, enabling 5-14
security level 2-9
security model 2-9
setting community strings on a target 2-37
setting SNMP community strings on routers 2-8
SLA security level, setting 5-20
version 3 configuration 2-9
SNMPv3
object characteristics 2-10
parameters, setting for target 2-39
software license
checking number of devices 2-1
SSH
generate crypto keys for 2-7
setting up on routers 2-7
standard output and error reports 4-65
static route provisioning 4-10
advertised routes, specifying 4-12
configuration file example A-22
created for IP unnumbered link 4-21
giving default routes to CE 4-10
IN-12Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
static route provisioning (continued)
ip route vrf command C-7
redistributing connected routes 4-11
routes to all sites, specifying 4-12
subinterface numbers, how chosen by VPNSC 7-4, 7-22
subtemplate
creating variable for 8-12
summary report for SLAs 5-25
T
targets
adding 2-36
assigning as PE 2-53
definition 2-24
domain name specification for 2-25
editing target information 2-31
IP address information 2-32
manually adding to network 2-36
multiple defined 2-28
name corresponds to IOS host name 2-24
passwords for 2-30, 2-32
SNMPv3 parameters, setting 2-39
transport method, setting 2-36
task logs
accessing 4-60, 9-5
action log for 4-64
Action report 9-7
browser 9-6
deleting 4-66
standard output and error reports 4-65
troubleshooting 9-7
web page 9-8
tasks
action log for 4-64
creating new task 4-58
deleting 4-58
existing task names, list of 4-31
expired tasks, deleting 4-59
tasks (continued)
list of in Task Chooser 4-58
scheduling 4-59
status of 4-63
Task Chooser 4-58
task manager 4-57
task scheduler malfunction 9-7
Technical Assistance Center xvii
contacting xvii
Telnet
retries and timeout settings 2-31
Telnet Gateway Server
IP address of TFTP server, specifying 2-23
remote network, setting up 2-14
setting TGS host as TFTP server 2-12
SSH, setting up on routers 2-7
TFTP, using instead of Telnet 2-11
transport method, specifying 2-29
template manager
configuration file for 8-1
copying a template 8-22
creating a template 8-3
data file 8-1
deleting a template 8-22
keywords, entering 8-5
new folder, creating 8-3
new template, creating 8-4
template file 8-1
template home 8-3
variables, assigning 8-7
templates
additive operators B-4
appending or prepending template config file to VPNSC config file 4-27, 4-28
array operators B-5
available values, specifying for variable 8-8
configuration file, creating 8-20
constants B-4
copying 8-22
IN-13Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
templates (continued)
data files, copying 8-19
data files, deleting 8-20
deleting 8-22
downloading template configuration file 8-24
expressions B-4
integrating with service request 4-25
keywords B-4
logical operators B-5
multiplicative operators B-4
one-dimensional variable, example B-6
relational operators B-5
repeat counter variable B-6
repeat statement B-6
statements B-5
subtemplate variable type 8-12
tokens B-3
variables, assigning attributes 8-7
terminal server
defining as target 2-41
disassociating from a device 2-34
multiple devices, adding access to 2-46
setting role to Terminal Server 2-41
single device, adding access to 2-45
terminal servers
routers assigning port number to 2-34
viewing list of devices in the network 2-50
TFTP
inetd.conf file 2-12
IP address of TFTP server, specifying 2-12
setting local host as TFTP server 2-12
specifying as transport method for a specific router 2-29
using instead of Telnet 2-11
TGS. See Telnet Gateway Server
threshold trap for SLA 5-11
timeout trap for SLA 5-11
topology
child graph 2-64, 3-22
customer, viewing 3-10
topology (continued)
Provider Administrative Domain 2-62
service requests, list 2-64, 3-21
VPN 3-19
traffic policing tool 1-26
traffic summary report 5-7
traffic volume report 5-8
transport method
default for MPLS 2-29
specifying for target router 2-36
transport method, specifying 2-29
traps
config-change traps 5-37
populating interface information to Repository 5-37
SLA traps, enabling or disabling 5-19
troubleshooting
broken service 9-11
debug ip bgp command C-25
deployed test 9-10
Failed Deploy service 9-9
file descriptor limit, fixing problem with 2-6
functional service 9-11
invalid service 9-8
no reports 9-12
pending service 9-10
requested service 9-7
routing test 9-10
task log 9-7
task scheduler malfunction 9-7
unable to find service request in audit list 9-11
VPN routing information 9-11
type of service summary report 5-7
U
unmanaged CEs 6-1
defining 3-5
unnumbered IP addresses 4-21
IN-14Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
username
default for VPNSC software 2-4
V
variables
available values, specifying 8-8
default value assigned 8-8
dimension attribute 8-8
floating point 8-10
integer variable 8-9
IPv4 address 8-11
required or optional 8-8
template 8-12
in templates 8-7
type, specifying 8-7
Version Console 4-51
viewing devices by role 2-50
virtual terminal password, required for PEs and CEs 2-30
VPN
adding CERC to VPN 3-17
customer. See customer
defining in product 3-14
display address information C-14
finding 3-15
topology, displaying 3-19
VPN Console
Download Console 4-51
Exec Command Console 4-49
modifying configuration files 4-51
running IOS commands 4-49
Version Console 4-51
VPN Console, starting 2-2
VPN-IPv4 address 1-7
VPN provider, finding 2-57
VPN route forwarding table. See VRF
VPN Solutions Center
connectivity to remote TGS host 2-14
documentation feedback, submitting xv
VPN Solutions Center (continued)
Exec Command Console 4-49
file descriptor limit 2-6
IP address of TFTP server, specifying 2-12
license key, installing 2-4
Right to Use document 2-4
technical assistance, obtaining xvii
terminal servers 2-41
Version Console 4-51
VRF 1-5
CLI command to associate with interface or subinterface C-9
configuration commands 1-17, C-1
configure import route map for C-6
display set of defined VRFs C-22
elements of 1-15
export route map, defining name of 4-22
implementation considerations 1-16
importing route map to C-8
import route map, defining name of 4-23
label forwarding entries, displaying C-24
maximum routes in, setting 4-23
member of extranet A-13
naming convention 1-15
overriding VRF name 4-23
remove routes from C-4
reroute packets C-7
and route-target communities 1-18
route-target community for C-12
and routing separation 1-8
security entries 6-9
show ip vrf command C-22
static routes, establishing C-7
subinterface associated with 7-4
VRF forwarding table 1-12
IN-15Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=
Index
W
Watch Dog
graphical user interface 2-3
log file 2-3
starting 2-2
wdclient start command 9-7
wdgui command 2-3
web browser
Repository management tool D-3
Weighted Fair Queuing. See WFQ
Weighted Random Early Detection. See WRED
WFQ 1-28
WRED 1-28
X
xhost command 2-1
IN-16Cisco VPN Solutions Center: MPLS Solution Provisioning and Operations Guide
DOC-7812189=