Cisco IP Solution Center Traffic Engineering Management User Guide, 5.1
Traffic Engineering Management GUI
Downloads: This chapterpdf (PDF - 1.19MB) The complete bookPDF (PDF - 7.04MB) | Feedback

Traffic Engineering Management GUI

Table Of Contents

Traffic Engineering Management GUI

Accessing the TEM GUI

TE Providers

Create/Edit TE Provider

TE Topology

Topology Display

Repository

File

Map

Graph

Tunnels

Algorithms

View

Tools

TE Nodes

Display TE Nodes

View Node Details

TE Links

Display TE Links

View Link Details

Show Tunnels

Edit Interface

TE SRLGs

Create/Edit TE SRLG

TE Explicit Paths

Create/Edit Explicit Path

TE Protected Elements

Protection Management

Compute Backup

Audit Protection

Create Managed TE Tunnel

View Managed Primary Tunnel Details

Create TE Managed Primary Tunnel

Select Devices and Policy

Select TE Explicit Patht

Explicit Path Viewer

Import Tunnel

Edit TE SR (Primary or Backup)

Planning Tools

Movable Tunnel Selection Window

TE Primary Tunnel Computation SR - Changes Window

TE Primary Tunnel Computation Results - Report

Create Unmanaged TE Tunnel

Create TE Backup Tunnel

Create TE Backup Tunnel Window

Select TE Protected Interface

TE Traffic Admission

Select TE Tunnel for Admission

TE Traffic Admission SR

Adminstration

Monitoring

TE Task Logs

Task Log

TE Performance Reports


Traffic Engineering Management GUI


This appendix describes the Cisco IP Solution Center Traffic Management (TEM) GUI and provides an explanation of the various fields, buttons, and other GUI elements. For a detailed description of the process flows for the various TEM services, see the respective chapters and sections elsewhere in this user guide.

In this appendix, the different parts of the ISC GUI used by the TEM component are described:

Accessing the TEM GUI

TE Providers

TE Topology

TE Nodes

TE Links

TE SRLGs

TE Explicit Paths

TE Protected Elements

Create Managed TE Tunnel

Create Unmanaged TE Tunnel

Create TE Backup Tunnel

TE Traffic Admission

Adminstration

Monitoring

Accessing the TEM GUI

The Traffic Engineering Management GUI forms part of the general Cisco ISC GUI.

This section describes the GUI elements in the Traffic Engineering Management Services window.

To access the TEM GUI, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management. The Traffic Engineering Management Services window in Figure B-1 appears.

Figure B-1 Traffic Engineering Management Services

The main TEM window includes the following service elements:

Service Request Elements

TE Providers—Create and manage TE Providers.

TE Topology—View the TEM application through a topology interface.

TE Nodes—View TE nodes and node details.

TE Links—View TE links.

TE SRLGs—Create and manage Shared Link Risk Groups (SRLGs).

TE Explicit Paths—Create and manage TE explicit paths.

TE Protected Elements—Manage protection of network elements.

Service Request Forms

Create Managed TE Tunnel—Assign or manage TE resources on device interfaces.

Create Managed TE Tunnel—Create or edit SRs for managed TE tunnels.

Create Unmanaged TE Tunnel—Create or edit SRs for unmanaged TE tunnels.

Create TE Backup Tunnel—Create or edit SRs for TE backup tunnels.

TE Traffic Admission—Assign traffic to traffic-engineered tunnels.

TE Providers

This section describes the GUI elements in the TE Providers tool.

To create a TE Provider, see Creating a TE Provider, page 1-7.

To access the TE Providers window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Providers. The TE Providers window in Figure B-2 appears.

Figure B-2 TE Providers

The TE Providers window contains the following fields:

TE Provider—Name of TE provider.

Provider—Name of provider on which the TE provider is based.

System Lock Status—Indicates whether or not the system lock is activated (Locked or Unlocked).

The following actions can be performed:

Create—Create a TE provider.

Edit—Edit the TE provider details.

Delete—Delete a TE provider.

Manage Lock—Manage the system lock status (see Managing the Locking Mechanism, page 8-11).

Create/Edit TE Provider

To access the Create/Edit TE Provider window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Providers and click Create.

The Create/Edit TE Provider window in Figure B-3 appears.

Figure B-3 Create/Edit TE Provider

The Create/Edit TE Provider window contains the following fields:

TE Provider—Name of TE provider.

Provider—Name of provider on which the TE provider is based.

TE Area—OSPF area assigned to the TE provider. This can be any positive integer from 0 to 4294967295 or a dot notation address of the form x.x.x.x where x is a number between 0 and 255.

Default Primary RG Timeout—Default computation timeout for primary tunnels.

Backup RG Timeout—Computation timeout per element for backup tunnels (for each protected element, the timer is reset to zero before the TEM attempts to protect it).

FRR Protection Type—Fast Re-Route (FRR) protection type:

Sub Pool—Protect only sub pool primary tunnels.

Any Pool—Protect both sub pool and global pool primary tunnels.

For a definition of pool types, see Bandwidth Pools, page F-6.

Default Link Speed Factor—Default multiplication factor to be applied to the link speed in order to determine move affected tunnels. that needs to be protected. The link's bandwidth is multiplied by the link speed factor, then the RSVP bandwidth reserved for the link (sub pool or global pool depending on the FRR protection type) is subtracted, and the resulting bandwidth is then available to FRR backup tunnels.

Interpretation of the link speed factor:

> 1.0 (overbooking)—more backup bandwidth than the link has available.

< 1.0 (underbooking)—less backup bandwidth than the link has available.

Minimum Bandwidth Limit—Minimum bandwidth allowed for backup tunnels.

Max. Load Balancing Tunnel Count—This is the maximum number of backup tunnels needed to protect a flow through a protected element. Here, a flow is defined as follows:

There are two flows in a protected link, one in each of the directions that traffic can flow. For a node, the number of flows depends on the number of neighbouring nodes for a particular node. There is a flow for each neighbour pair. So a node with 3 neighbours, A, B, and C, has 6 flows through it - A->B, A->C, B->A,B->C, C->A, C->B.

Default Region for TE Devices—The default provider region is the one assigned by TE Discovery to a newly discovered device. If the device already exists in the ISC repository and has a region defined, TE Discovery keeps that setting. It is possible to change the region of a device after TE Discovery.

Customer for Primary Tunnels—Name of customer for primary TE tunnels.

For step-by-step instructions on how to create or edit TE providers, see Creating a TE Provider, page 1-7.

TE Topology

This section describes the various fields, buttons, and other GUI elements in the TE Topology GUI. For instructions on how to use the TE Topology tool, see Chapter 10, "TE Topology".

TEM includes a TE Topology tool that is accessed as a TE Topology Interface Applet that displays the TE topology through a Java applet within the browser.

For specific instructions on how to use the topology applet, see Using the TE Topology Interface Applet, page 10-2.


Note There are several ways to access the TE Topology tool, among others by using Inventory and Connection Manager > Topology Tool and Inventory and Connection Manager > Traffic Engineering Management > Topology Tool. In this section, it is assumed that the TE tools are accessed from the Traffic Engineering Management Services page.


Topology Display

To access the TE Topology tool, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Topology and select ISC-TEM Topology Interface Applet

The topology display appears immediately in a separate window. After the nodes have been arranged to your liking, you might end up with a topology display similar to the one in Figure B-4.

Figure B-4 Topology Display Window with User-Arranged Topology

The Topology Display window contains the following menus:

Repository—Discard or save the layout graph.

File—Gain access to the print functionality.

Map—Load or clear maps. Is used to associate a map with a view.

Graph—Access a range of tools to manage and manipulate graphs.

Tunnels—View or update the tunnel layout.

Algorithms—Randomize or optimize links and set spring settings.

View—Modify the zoom level in the current view.

Tools—Modify the magnetic grid settings and the layer visibility.

The menus in the Topology Display window are described in more detail below with definitions for individual entries.

The Topology Display window toolbar contains the elements shown in Table B-1.

Table B-1 Topology Display Toolbar Elements

Icon
Purpose 

Print this view.

Zoom the graph by a factor of 200%.

Zoom the graph by a factor of 100%.

Zoom the graph by a factor of 50%.

Toggle antialiasing on/off. When drawing a view, this creates smoother lines and a more pleasant appearance at the expense of performance.

Start/stop double buffering. This smoothes the lines when dragging elements.

Configure the magnetic grid in the current view.

Manage active layers in the current view.


For instructions on how to use the Topology Display, see Using the TE Topology Interface Applet, page 10-2.

Repository

The Repository menu serves to discard or save the layout graph.

The Repository menu contains the following elements:

Layout Graph—If a graph layout is already present, the layout is cleared. If not, the layout of the elements in the repository is drawn. If a layout has previously been saved, the saved layout is re-created. Otherwise, a random layout is generated.

Save Graph Layout—Save the current graph layout. Doing so ensures that whenever the graph layout is cleared with Layout Graph or the Topology Display applet is closed, the same layout is created when the applet is restarted.

File

The File menu provides access to the print functionality.

The File menu contains the following element:

Print—Print the current topology view.

Map

The Map menu serves to load or clear maps.

The Map menu contains the following elements:

Load—Opens the Map Chooser for selecting a topology map.

Clear—Clears the current topology map.

Load Map

When selecting Load from the Map menu, the Map Chooser window in Figure B-5 appears.

Figure B-5 Map Chooser

The Map Chooser window contains the following elements:

Look In—Change the location from where to load the map.

File Name—Specify the desired file name.

Files of Type—Select the file type of the files to be displayed.

Open—Open the selected directory or a topology map.

Cancel—Close the Map Chooser window.

File Dialog Commands—Serves to determine the desired directory and level of detail of data files.

The Map Chooser window navigation toolbar contains the elements shown in Table B-2.

Table B-2 Map Chooser Toolbar Elements 

Icon
Purpose

Move to the parent directory of the current directory.

Return to the home directory.

Create a new folder in the selected directory or, if none are selected, the current directory.

List the contents of the current directory.

Provide type, size, and date and time details about files and directories in the current directory.


Projection—Choose the projection in which a map is shown. A map projection is a projection which maps a sphere onto a plane. Typical projections are Mercator, Lambert, and Stereographic.

Longitude Range—Choose a geographical longitude range.

Latitude Range—Choose a geographical latitude range.

Graph

The Graph menu in Figure B-6 provides access to a range of tools to manage and manipulate graphs.

Figure B-6 Graph Menu

The Graph menu contains the following elements:

Clear Highlighting—Remove the highlighting of selected elements in the graph layout:

All elements—Highlighting of all network elements in the graph is cleared.

Nodes—Highlighting of all nodes in the graph is cleared.

Links—Highlighting of all links in the graph is cleared.

Primary Tunnels—Highlighting of all primary tunnels in the graph is cleared.

Backup Tunnels—Highlighting of all backup tunnels in the graph is cleared.

Unmanaged Tunnel Paths—Highlighting of all unmanaged tunnel paths in the graph is cleared.

Primary Tunnel Paths—Highlighting of all primary tunnel paths in the graph is cleared.

Backup Tunnel Paths—Highlighting of all backup tunnels paths in the graph is cleared.

Protected Elements—Highlighting of all protected elements in the graph is cleared.

Attributes—Opens the Graphics Attributes window in Figure B-7.

Figure B-7 Graphics Attributes Window

To understand the tools in the Graphics Attributes window, mouse over the various attributes. Choose the desired settings for line color, fill color and pattern, line thickness and style, arrow, and transparency.

Click Apply All to activate your selections or Close to quit the Graphics Attributes window.

Clear—As opposed to the Layout Graph item in the Repository menu, which also clears the current graph from the topology display, the Clear function in the Graph menu only clears the graph from the current view without re-creating it.

AntiAlias—Activate antialiasing to smooth lines in the layout.

BackingStore—Store graphics content when moved to the background and regenerate it when moved to the foreground. This helps avoid superfluous refreshing.

DoubleBuffer—Start/stop double buffering. Smoothes the lines when dragging elements.

Tunnels

The Tunnels menu in Figure B-8 is used to highlight TE tunnels in the network.

Figure B-8 Tunnels Menu

The Tunnels menu contains the following elements:

Layout—Use Layout the first time you want to highlight tunnels using the repository.

Unmanaged Tunnels—Highlight unmanaged tunnels only.

Primary Tunnels—Highlight primary tunnels only.

Backup Tunnels—Highlight backup tunnels only.


Note Selecting Layout repeatedly does not update the display.


Update—Use Update to update tunnels in the display with the last instance of the repository.

Unmanaged Tunnels—Update the highlighting of unmanaged tunnels.

Primary Tunnels—Update the highlighting of primary tunnels.

Backup Tunnels—Update the highlighting of backup tunnels.

Algorithms

In the Algorithms menu various algorithms can be used to enhance and otherwise alter the graph layout.

The Algorithms menu contains the following elements:

Spring—Applies the Spring algorithm to the current graph layout using the attribute settings in the Spring Settings window.

Randomize—Applies the Randomize algorithm to the nodes in the current topology layout.

Optimize Links—This feature is used to move overlapping links apart when multiple links are present between nodes using the Links Optimization algorithm.

Spring Settings—The spring settings are used to enhance the appearance of the topology display by setting attributes according to user preferences. When selecting Spring Settings, the Spring Settings window in Figure B-9 appears.

Figure B-9 Spring Settings

The Spring Settings window contains the following elements:

Propagate—Propagate the various settings in the Spring Settings window to all child layouts.

Specify layout size—Specify the layout size in pixels.

Horizonal / vertical alignment—Align the topology graph in the Topology Display.

Use objects' sizes—Use the objects' actual layout sizes without scaling.

Fix selected objects—Fix the location of selected objects in the Topology Display.

Automatic edge length—Allow the topology application to automatically assign an appropriate length to each link.

Edge length constant—If Automatic edge length is not selected, you can specify a fixed edge length here.

Repaint period—Sets the period (number of loops) used to repaint objects when the objects are being laid out in a graph.

Epsilon—The epsilon constant determines when the iterative process for the Spring algorithm should stop. The greater this constant, the faster the layout, but the more distant the final position from the optimal layout.

Automatic horizontal spacing—Let the topology application automatically determine the horizontal spacing between the devices in the graph.

Horizontal spacing—Specify a fixed horizontal spacing between the devices in the graph.

Vertical spacing—Specify a fixed vertical spacing between the devices in the graph.

After you have made your selections, you can do any of the following:

Apply—Save the Spring settings.

Reorder—Rerun the Spring algorithm to reorder the graph elements based on the Spring settings.

Close—Close the Spring Settings window without saving the selections.

View

The View menu in Figure B-10 allows zooming in the current view.

Figure B-10 View Menu

The View menu contains the following elements:

Zoom In—Increases the magnification level.

Zoom Normal—Resets the magnification level to the default setting.

Zoom Out—Decreases the magnification level.

Tools

The Tools menu allows you to modify the magnetic grid settings and the layer visibility. Different network elements are drawn in different layers. Individual layers can be turned on or off using the Layers menu.

The Tools menu contains the following elements:

Grid—Allows you to add a background grid to the graph based on the selections in the Magnetic Grid window.

Layers—Allows you to select the layers to be dispayed in the graph using the Layer Visibility window.

Grid

The Magnetic Grid window in Figure B-11 allows you to modify the magnetic grid settings. An activated grid appears under the graph layout in the Topology Display.

Figure B-11 Magnetic Grid

The Grid window contains the following elements:

Not activated—Tells the application not to place a magnetic grid in the Topology Display.

Activated but not visible—The network elements are not visible but still snaps to grid.

Activated and visible—Make the grid active and visible in the Topology Display.

Grid spacing—Set the spacing between the lines in the grid.

Grid color—Click the square to open the color palette to set the grid line color as described in Grid Color.

Display points—Display links using dotted lines.

Display lines—Display links using solid lines.

Click OK to apply the settings or click Cancel to cancel the operation and return to the Topology Display window.

Grid Color

The Grid Color window in Figure B-12 has three tabs:

Swatches—The Swatches palette (shown) provides color swatches for making rapid color choices.

HSB—The HSB palette in Figure B-13 is used to set hue, saturation, and brightness.

RGB—The RGB window in Figure B-14 is used to set the color intensity for red, green, and blue, respectively.

Figure B-12 Edit Grid Color - Swatches

Figure B-13 Edit Grid Color - HSB Settings

Figure B-14 Edit Grid Color - RGB Settings

Make the desired changes and click OK.

Click Reset to reapply the default settings.

Layers

The various network elements are organized into layers that can be turned on and off to display only the part of the TE network that you want to see.

Select Tools > Layers to access the Layer Visilibity window shown in Figure B-15.

Figure B-15 Layer Visibility

In the Layer Visibility window, specify which layers should be visible by checking the corresponding check boxes in the Visible column:

Map Lines—Select to display map lines.

Map Data—Select to display map data.

Nodes—Select to display TE nodes.

Links—Select to display TE links.

Unmanaged Tunnels—Select to display TE unmanaged tunnels.

Unmanaged Tunnel Paths—Select to display TE unmanaged tunnel paths.

Primary Tunnels—Select to display TE primary tunnels.

Primary Tunnel Paths—Select to display TE primary tunnel paths.

Computed Primary Tunnel Paths—Select to display paths for computed primary tunnels.

Backup Tunnels—Select to display TE backup tunnels.

Backup Tunnel Paths—Select to display TE backup tunnel paths.

Click Apply to apply the settings or click Close to cancel the changes and quit the Layer Visibility window.

TE Nodes

This section describes the GUI elements in the TE Nodes tool.

The nodes of the TE network can be viewed after running a TE Discovery task. For instructions on how to run a TE Discovery task, see Chapter 3, "TE Resource Management."

The TE Nodes tool gives access to both textual and visual information about the nodes discovered in the TE network.

To access the TE Nodes window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Nodes. The TE Nodes List window in Figure B-16 appears.

Figure B-16 TE Nodes List

The columns in the nodes list table provides the following information:

Device Name—Hostname for the device.

IGP ID—Interior Gateway Protocol (IGP) ID.

MPLS TE ID—TE ID assigned by the router.

Region—Name of the region.

Type—The device type. An UNKNOWN device type could signify a non-Cisco device.

OS—Router operating system (IOS or IOS_XR).

System Lock Status—Indicates whether or not the system lock is activated (Locked or Unlocked).

The following actions can be performed:

Close—Close the Topology Display, if open.

Display—Show the topology for one or more nodes in the TE network.

Details—Show configuration details for a selected node.

Find—You can search for particular devices by selecting the device type in the drop-down menu Show Devices with and specify matching criteria in the TE routers matching field.


Note Sorting on MPLS TE ID is not supported.


Display TE Nodes

The Topology Display can be invoked to highlight selected nodes.

Choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management. Click TE Nodes. Select one or more devices by checking the corresponding check boxes. Click the Display button. The Topology Display applet in Figure B-17 appears.

Figure B-17 TE Nodes Topology Display

Any nodes that were selected before the applet was started are highlighted in the display. Unknown devices are marked with a red question mark.

For a description of how to use the Topology Display features, see Topology Display.

View Node Details

To view the detailed information about a particular node, use the following steps, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Nodes.

Select a device by checking the corresponding check box. Click the Details button. The TE Node Details window in Figure B-18 appears.

Figure B-18 TE Node Details

The TE Node Details window contains the following fields:

Router Name—Hostname of the router.

IGP ID—The Interior Gateway Protocol (IGP) ID is the router ID.

MPLS TE lD—TE ID assigned by the router.

Interfaces—TE interfaces on the routers.

Topology Map Coordinates—Coordinates of the nodes in the Topology Display.

OS—Router operating system.

Click OK to close the TE Node Details window.

TE Links

This section describes the GUI elements in the TE Links tool.

The links of the TE network can be viewed after running a TE Discovery task. For instructions of how to run a TE Discovery task, see Chapter 3, "TE Resource Management."

The TE Links window gives access to both textual and visual information about the links discovered in the network.

To access the TE Links window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Links. The TE Links List window in Figure B-19 appears.

Figure B-19 TE Links List

The columns in the links list table provides the following information:

End Device A—Hostname on endpoint A of the link.

Type—Type of device for end device A.

Interface A—Interface name on endpoint A of the link.

End Device B—Hostname on endpoint B of the link.

Type—Type of device for end device B.

Interface B—Interface name on endpoint B of the link.

Label—IP addresses of the interfaces on the link.

Admin Status—Indicates whether the link is UP or DOWN.


Note This is local to TEM. It is not the network interface status.


The following actions can be performed:

Close—Close the Topology Display applet if open.

Display—Open the Topology Display applet to visualize one or more links in the TE network.

Details—Show link details.

Show Tunnels—Display only tunnels that meet the following criteria (see Figure B-20):

All—Show all tunnels.

Managed—Show managed tunnels.

Unmanaged—Show unmanaged tunnels.

All Primary—Show all primary tunnels.

Backup—Show backup tunnels.

For more information about the Show Tunnels feature, see Show Tunnels.

Figure B-20 Show Tunnels Options

Edit:

Interface A—Edit the resources associated with interface A on the link.

Interface B—Edit the resources associated with interface B on the link.

Delete—Delete one or more TE links.

Change Status:

Enable—Make a link active (UP in the Admin Status column).

Disable—Deactivate a link (DOWN in the Admin Status column).

Proceed with Changes (see Figure B-21): For verifying a resource change that might impact tunnel placement.

Tunnel Audit—If you disable an interface, Tunnel Audit checks if the status change affects existing managed tunnels.

Tunnel Repair—If Tunnel Audit reveals that Tunnel Placement is affected, Tunnel Repair can be used to move the tunnel away from the links to be disabled.

Figure B-21 TE Links List - Proceed with Changes

Cancel—Cancel the operation and return to the Traffic Engineering Management Services window.

Find—You can search for particular links by specifying a device type or a label in the drop-down menu Show TE Links with and specifying matching criteria in the Matching field.

Region—Filter the links displayed in the window by a specified region. The Clear button removes any region selection and returns the window to display all links in the provider regardless of region.

Display TE Links

The Topology Display can be invoked to highlight selected links.

Choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Links. Select one or more devices by checking the corresponding check boxes. Click the Display button. The Topology Display Applet in Figure B-4 appears.

Any selected links in the display are highlighted.

For a description of how to use the Topology Display features, see Using the TE Topology Interface Applet, page 10-2.

For an explanation of the GUI elements in the TE Topology Display applet, see Topology Display.

View Link Details

To view the detailed information about a particular link, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Links. Select a device by checking the corresponding check box. Click the Details button. The TE Objects Details window in Figure B-22 appears.

Figure B-22 TE Objects Details

The TE Links Details contains the following fields:

Link—IP addresses of Endpoint A and Endpoint B.

Endpoint A/Endpoint B:

Device—Hostname of the device.

Interface—Interface name.

TotalAllocated BW—The total amount of allocated bandwidth on the link by tunnel hold priority (bw[0]-bw[7]).

GlobalPool BW—The allocated Global Pool bandwidth on the link by tunnel hold priority (bw[0]-bw[7]).

SubPool BW—The allocated Sub Pool bandwidth on the link by tunnel hold priority (bw[0]-bw[7]).

GlobalUtil—Global Pool bandwidth utilization percentage.

SubpoolUtil—Sub Pool bandwidth utilization percentage.

Managed TotalAllocated BW—The total amount of allocated managed bandwidth (hold priority 0).

Managed Unallocated GlobalPool BW—The total amount of managed bandwidth (hold priority 0) not allocated in the Global Pool.

Managed Unallocated SubPool BW—The total amount of managed bandwidth (hold priority 0) not allocated in the Sub Pool.

Managed GlobalUtil (%)—Global Pool bandwidth utilization resulting from all managed tunnels passing through the link.

Managed SubpoolUtil (%)—Sub Pool bandwidth utilization resulting from all managed tunnels passing through the link.

Admin Status—Indicates whether the link is Up or Down.

Show Tunnels

This feature allows you to display which TE tunnels (primary and/or backup) pass through a particular TE Link and helps facilitate the tunnel planning and placement processes. In addition, you can see which tunnels are impacted when an interface (or link) in the TE network is shut down.

To view specific types of tunnels using the Show Tunnels button, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Links. Select the desired link in the TE Links List (Figure B-19) and click Show Tunnels and select the type of tunnel you want to list.

The Show TE Tunnel List window in Figure B-23 appears.

Figure B-23 Show TE Tunnel List

The TE Managed Primary Tunnels SR window contains the following elements:

The columns in the tunnel list provides the following information:

Tunnel ID—Unique tunnel identifier used within TEM.

T#—Tunnel number on the head router.

Head—Hostname of the head router.

Dest—Hostname of the destination router.

Tunnel Type—Type of tunnel (managed or unmanaged).

Deploy Status—Tunnel deployment status.

Policy—TE policy for the tunnel.

BW—Tunnel bandwidth. If the tunnel is auto-bw enabled, BW shows the higher of tunnel bandwidth and maximum automatic bandwidth.

BW Quota—Amount of bandwidth that this backup tunnel can protect. The router limits the LSPs that can use this backup tunnel so that the sum of the bandwidth of the LSPs does not exceed the specified amount of bandwidth. If there are multiple backup tunnels, the router will use the best-fit algorithm.

To view the tunnel details for a particular tunnel, select a tunnel in the Show TE Tunnel List window and click Detail.

Figure B-24 Show Tunnels - TE Objects Details

For an explanation of the various GUI elements, see View Managed Primary Tunnel Details.

Edit Interface

To edit information about a particular link, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Links. Select the desired link in the TE Links List (Figure B-19). Click Edit > Interface A or Edit > Interface B to edit one of the interfaces on the link.

The TE Resource Modification window in Figure B-25 appears.

Figure B-25 TE Resource Modification

The TE Resource Modification window contains the following fields:

Device/Interface—Name of device and interface.

Peer Device/Interface—Name of device and interface for the other endpoint of the link.

Description—Service request description.

Link Bandwidth—Total bandwidth of the link.

Max Global (BC0) Reservable—Maximum amount of bandwidth in kbps that can be reserved by TE Tunnels.

Max Sub Pool (BC1) Bandwidth—Maximum amount of bandwidth in kbps that can be reserved by sub pool TE Tunnels. The range is from 1 to the value of Max Global Reservable.

Attribute Bits—Links attributes to be compared to a tunnel's affinity bits during selection of a path. Valid values are from 0x0 to 0xFFFFFFFF, representing 32 attributes (bits) where the value of an attribute is 0 or 1.

TE Metric—Metric used to override the Interior Gateway Protocol (IGP) administrative weight (cost) of the link.

Propagation Delay—The time it takes for traffic to travel along a link from the head interface to the tail interface.

Max Delay Increase—Used in computations of FRR backup-tunnels to constrain the propagation delay of a backup-tunnel for the link. A max delay increase for a link might need to be set to loosen the delay constraint when generating backup tunnels, as it is difficult to find backup tunnel paths where there is no increase in the delay compared with the flow being protected.

Link Speed Factor—Multiplication factor corresponding to the amount (percentage) of link speed available for primary and backup traffic. This is typically set to 1.

The following actions can be performed:

Continue —Proceed to the confirmation page.

Cancel—Cancel the operation and return to the TE Links List window.

TE SRLGs

This section describes the GUI elements in the TE SRLGs tool. It is used to manage Shared Risk Link Groups (SRLGs) as part of TEM protection management.

To access the TE SRLGs window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE SRLGs. The TE SRLG List window in Figure B-29 appears.

Figure B-26 TE SRLG List

The TE SRLG List window lists SRLGs by name.

The following actions can be performed:

Close—Close the Topology Display.

Display—Open the Topology Display applet to visualize the SRLG.

Create—Create an SRLG.

Edit—Edit an SRLG.

Delete—Delete one or more SRLGs.

Show SRLG with—You can search for particular SRLGs by specifying matching criteria in the Matching field and clicking Find.

Create/Edit TE SRLG

This section describes the GUI elements in the TE SRLG Editor, which is used to both create and edit SRLGs.

The process of creating an SRLG is described in Create SRLG, page 6-3.

To access the TE SRLG Editor, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE SRLGs. In the TE SRLGs window, to create an SRLG click Create or to edit select an SRLG that you want to edit by checking the corresponding check box and clicking Edit.

In either case, the TE SRLG Editor window in Figure B-27 appears.

Figure B-27 TE SRLG Editor

The TE SRLG Editor window contains the following GUI elements:

Provider Name—Name of the TE provider.

SRLG Name—Unique name to identify the SRLG.

The columns in the TE SRLG Editor provide the following information:

Device From—Hostname of the TE device that the link originates from.

Label—IP addresses of the source and destination interfaces.

Device To—Hostname of the TE destination device.

The following actions can be performed:

Add Link—Add a link to the SRLG.

Remove Link—Remove selected links from the SRLG.

Save—Save the created or modified SRLG.

Cancel—Cancel the operation and return to the TE SRLG List window.

When clicking Add Link to associate a link with the SRLG, the links associated with the SRLG window in Figure B-28 appears. This table displays links that can be added to the SRLG.

Figure B-28 Links associated with SRLG

The columns in the TE SRLG Editor provide the following information:

From Device—Hostname of the TE device that the link originates from.

Link—IP addresses of the source and destination devices.

To Device—Hostname of the TE destination device.

The following actions can be performed:

Select—Add selected links to the SRLG.

Cancel—Cancel the operation and return to the TE SRLG Editor window.

Show Links with—You can search for particular links by specifying matching criteria in the Matching field and clicking Find.

TE Explicit Paths

This section describes the GUI elements in the TE Explicit Path tool.

TE explicit paths can be created after the execution of a TE Discovery task. For instructions on how to create an explicit path, see Create Explicit Path, page 4-3.

To access the TE Explicit Path List window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Explicit Paths. The TE Explicit Path List window in Figure B-29 appears.

Figure B-29 TE Explicit Path List

The columns in the TE Explicit Path list provides the following information:

Path Name—Name of the explicit path.

Head—Hostname of the head router.

Dest—Hostname of the destination router.

Head Region—Region to which the head router belongs.

Path Type—Three types of explicit paths are supported: Strict, Loose, and Exclude (defined in Create/Edit Explicit Path).

The following actions can be performed:

Create—Create an explicit path.

Edit—Edit an explicit path.

Delete—Delete an explicit path.

Find—You can search for particular links by selecting the search variable in the drop-down menu Show Paths with and specify matching criteria in the Matching field.

Create/Edit Explicit Path

This section describes the elements in the create and edit explicit path windows.

To create or edit an explicit path, see Create Explicit Path, page 4-3.

The New TE Explicit Path window appears when you select Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Explicit Paths to open the TE Explicit Path List window and click Create. The New TE Explicit Path window in Figure B-30 appears.

Figure B-30 New TE Explicit Path

The New TE Explicit Path window contains the following GUI elements:

Path Name—Name of explicit path.

Head Router—Name of the head router.

Path Type—Three types of explicit paths are supported:

STRICT—All strict hops are defined in the path.

LOOSE—Any loose hops (pure loose path or a combination of loose and strict hops) are defined in the path.

EXCLUDE—All exclude hops are defined in the path.

Links (table)—Lists the links added for the current path and contains the following information:

Device—Hostname of the TE device that the path originates from.

Outgoing Interface—Interface name of the outgoing interface from the originating device.

Outgoing IP—IP address of the outgoing interface.

Next Hop—Hostname of the next hop device.

Incoming Interface—Incoming interface name on the next hop device.

Incoming IP—Incoming interface IP address on the next hop device.

Provision Preference—Preference for provisioning the next-address subcommand of the ip explicit-path command. Choose between Outgoing Interface and Incoming Interface.

Outgoing Interface—Outgoing interface on the router.

Incoming Interface—Incoming interface on the router.

The following actions can be performed:

Add Link—Add a link to the explicit path.

Delete Link—Delete a link in the explicit path.

Save—Save all the explicit path data entered.

Cancel—Cancel the operation and return to the TE Explicit Path List window.

When clicking Add Link to add a blank line to the hop list table, the Select Next Hop window in Figure B-31 appears.

Figure B-31 Select Next Hop

The columns in the TE Explicit Path list provide the following information:

Outgoing Interface—Interface name of the outgoing interface from the originating device.

Outgoing IP—IP address of the outgoing interface.

Next Hop—Hostname of the next hop device.

Type—Device type.

Incoming Interface—Incoming interface name on the next hop device.

Incoming IP—Incoming interface IP address on the next hop device.

TE Protected Elements

This section describes the TE Protected Elements GUI.

For instructions on how to configure protected elements, see Configure Element Protection, page 6-5.

Protection Management

To access the TE Protection Management window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management. Click TE Protected Elements.

The TE Protection Management window in Figure B-32 appears.

Figure B-32 TE Protection Management

The columns in the TE Protection Management table provide the following information:

Element Name—Name of the network element to be protected.

Type—Network element type (node, link, or SRLG).

Protection Status—The protection status displayed is determined from the last time an audit was performed. The audit is performed either explicitly by the user or when the protection SR is deployed. The protection status is stated for each network element as either Protected, Not Fully Protected, or Unknown. Click on the column header, Protected, to sort elements according to protection status.

The following actions can be performed:

Close—Close topology.

Display—Open the Topology Display applet to visualize one or more protected elements.

Compute Backup—Automatically calculate the optimal backup tunnel for:

All Elements—all network elements listed, whether selected or not.

Selected Elements—all selected network elements.

Audit Protection—Perform a protection audit on:

All Elements—all network elements listed, whether selected or not.

Selected Elements—all selected network elements.

Add—Add a new protection element.

Delete—Delete a protection element.

Cancel—Cancel the operation and return to the Traffic Engineering Management Services window.

Find—You can search for particular elements by selecting the All, Node, Link, or SRLG in the Show drop-down menu and specify matching criteria in the Matching field.

Compute Backup

This section describes the Compute Backup GUI.

For instructions on how to run Compute Backup on all or selected elements, see Configure Element Protection, page 6-5.

To run Compute Backup, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Protected Elements. The TE Protection Management window in Figure B-32 appears.

In the TE Protection Management window, select one or more elements for which you want TEM to calculate a backup path.

Click Compute Backup and select one of the following:

All Elements

Selected Elements

The window in Figure B-33 appears.

Figure B-33 TE Protection Computation Results

The Element: table displays the outcome of the computation for each element in the protection computation. The status for each element is indicated by at least one row per element in the table. If the status is not valid, the table will contain one row per warning or violation.

The Element: table contains the following columns:

Element Name—Name of the network element to be protected.

Type—Network element type (node, link, or SRLG).

Report—Warning or violation associated with an element, if any, as reported by the computation engine.

Status—Computation status of the network element:

Valid Tunnels—The element is fully protected by backup tunnels.

InvalidTunnels—An Audit Protection detected that the element was not fully protected by the existing backup tunnels.

No Solution Exists—A Compute Backup has proven that it is not possible to fully protect the element.

The following actions can be performed:

Close—Close the Topology Display applet if open.

Display—Open the Topology Display applet to visualize one or more protected elements and their protection tunnel(s). The Topology Display is shown in Figure B-4.

Details—List backup tunnels and violations/warnings for the selected network element. The information is displayed in the Backup Tunnels: section and the Violation and Warning: section, if applicable, as shown in Figure B-34.

Violation and Warning: pane—Describes the selected violation/warning and any relevant details about the corresponding link or flow.

Figure B-34 TE Protection Computation Results with Backup Tunnels

The columns in the tunnel list provide the following information:

Op—SR operation on the tunnel. This can be either of the following:

ADD—Indicates a new tunnel calculated by the computation.

DELETE—Signifies that the computation found an existing backup tunnel that do not provide adequate protection on the element and, therefore, should be deleted.

<blank>—An existing backup tunnel is providing sufficient protection.

Tunnel ID—Unique tunnel identifier used within TEM.

Head—Hostname of the head router.

Dest—Hostname of the destination router.

T#—Tunnel number on the head router.

BW—move affected tunnels. the tunnel reserves on the links that it passes through.

Path—Tunnel path in the form of either a computed path or an existing path. Click to view the path.

Protection Type—Protection side-effect from activating the tunnel. There are three protection types:

Protection tunnels—Tunnels that can be activated to provide protection for a specified element.

Side-effect tunnels—Tunnels that are activated to protect a neighboring element, but which are also activated when a specified element fails.

Activated tunnels—Tunnels that are activated when a specified element fails, and which might or might not provide protection for the specified element or its neighbors.

Report—If it says yes in the Report field, the tunnel is associated with the selected violation/warning. A blank field indicates that no report was generated.

The following actions can be performed (buttons):

Accept Solution—Accept the proposed element protection solution and place the backup tunnels in the TE Protection SR window for further action.

Cancel—Discard the proposed element protection solution and return to the TE Protection Management window.

Find—You can search for particular elements by selecting the element type in the drop-down menu Show and specifying matching criteria in the with name matching field.

Audit Protection

This section describes the Audit Protection GUI.

For instructions on how to run Audit Protection on all or selected elements, see Configure Element Protection, page 6-5.

To run Audit Protection, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Protected Elements. The TE Protection Management window in Figure B-32 appears.

In the TE Protection Management window, select one or more elements for which you want TEM to perform an Audit Protection computation.

Click Audit Protection and select one of the following:

All Elements

Selected Elements

TEM reports FRR Audit Protection in progress and the same computation results window as for Compute Backup in Figure B-33 appears.

The GUI for the rest of the process is identical to that described for Compute Backup.

Create Managed TE Tunnel

In this section, the GUI used to create managed traffic engineering tunnels is explained. For step-by-step instructions on how to create a managed TE tunnel, see Chapter 4, "Basic Tunnel Management."

To access the Create Managed TE Tunnel window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > Create Managed TE Tunnel.

The TE Managed Primary Tunnels SR window in Figure B-35 appears.

Figure B-35 TE Managed Primary Tunnels SR

The TE Managed Primary Tunnels SR window contains the following elements:

The columns in the tunnel list provide the following information:

Op—SR operation on the tunnel. This can be one of the following:

ADD—Indicates a newly added tunnel.

MODIFY—Indicates a modified existing tunnel.

DELETE—Indicates an existing tunnel to be deleted.

ADMIT—Indicates an existing tunnel to be admitted by tunnel computation.

Tunnel ID—Unique tunnel identifier used within TEM.

T#—Tunnel number on the head router.

Head—Hostname of the head router.

Dest—Hostname of the destination router.

Policy—TE policy for the tunnel.

BW—The tunnel bandwidth. If the tunnel is auto-bw enabled, BW shows the higher of tunnel bandwidth and maximum automatic bandwidth.

AutoBW—Auto Bandwidth enabled if true, otherwise false.

Deploy Status—Tunnel deployment status.

Verified—Indicates whether tunnel verification was successful (succeed, failed, or unknown).

Allow Reroute—Specifies whether reroute is allowed (true or false). If reroute is not allowed, the tunnel cannot be set to movable, and hence cannot be rerouted by the operation (placement, grooming, or repair).

Head Region—The region to which the head router belongs.

Tail Region—The region to which the tail router belongs.

The following actions can be performed (buttons):

Close—Close the Topology Display applet if open.

Display—Open a Topology Display for the network and highlight the selected primary tunnel(s). Selected tunnels are marked in color with directional arrows.

Details—Open the TE Tunnel Details window, which provides type, status, LSP, and other information about the tunnel.

Admit—Admit selected tunnels not previously verified into the managed topology. This feature is used only for discovered tunnels that failed verification or for migrating unmanaged tunnels.

Create—Create a managed primary tunnel.

Edit—Edit a selected primary tunnel.

Delete—Delete selected primary tunnels.

Import—Import tunnel data from import XML file.

Placement Tools—These tools are available only when no change has been made to the tunnels. Apply the following functions against the current topology and tunnels:

Groom—Analyse the managed tunnels in the network and reroute them to reduce the maximum link utilization.

Tunnel Audit—Determine if changes to previously made SRLGs or backup tunnels have caused constraint violations in managed tunnels (this can occur when managed tunnels have FRR protection constraints).

Tunnel Repair—Repair any managed tunnel constraint violations revealed by Placement Tools > Tunnel Audit.

The Placement Tools GUI is described in Planning Tools.

Update Tunnel ID—Update Tunnel ID(s) directly in the repository without deploying the corresponding tunnel(s).

Proceed with Changes —For verifying changes in tunnels. When tunnels have been created, deleted, admitted, or their attributes altered, you can proceed with one of the following placement tools:

Tunnel Audit—Checks what constraint violations modifications to tunnels might cause.

Tunnel Placement—Admit new tunnels and modify tunnels already admitted into the network.

Tunnel Repair—Resolve inconsistencies caused by changes to bandwidth requirements or delay parameters of existing tunnels by moving as few existing tunnels as possible to accomodate the changes.

Save & Deploy—For committing tunnel changes that do not impact tunnel placement. There are two options for saving and deploying SR tunnels to the network:

SR Tunnels Only—Deploy all tunnel changes that does not impact tunnel placement, or if no changes were made to the SR, use this to redeploy the SR that was in Requested or Invalid state.

Force Deploy All Tunnels—Force deployment of all tunnels in this SR. This could be useful when previous provisioning of the SR has failed, so that it is necessary to force through the deployment of all tunnels in the SR.

Cancel—Cancel the operation and return to the Traffic Engineering Management Services window.

The tunnel SR search tool allows you to look for particular tunnels by selecting tunnel characteristics in the drop-down menu tunnels with and specify matching criteria in the Matching field:

Show:

Existing—Show existing tunnels already deployed in the TE network.

SR—Show tunnels not yet deployed in the TE network.

Tunnels with:

All—Show all managed tunnels under the current provider.

Tunnel Number—Tunnel number on the head router.

Head Device—Full or partial name of the tunnel head device.

Destination Device—Full or partial hostname of the tail device of the tunnel.

Head, Dest Devices—Exact hostname of the head and tail devices of the tunnel.

Deploy Status—Tunnel deployment status.

Policy Name—Name of the TE policy.

Matching/Equal—Specify matching criteria for your search. Wildcards are accepted. Matching changes to Equal if Head, Dest Device is selected in the drop-down menu. For Equal, the exact hostname of the head or tail device must be entered (wildcards not accepted).

Find—Click the Find button when the search criteria has been entered.

View Managed Primary Tunnel Details

This section describes the elements in the TE Managed Primary Tunnel Details window.

To view the details of a TE managed primary tunnel, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management. > Create Managed TE Tunnel. The TE Managed Primary Tunnels SR window in Figure B-35 appears.

To view the details of a particular managed primary tunnel, select the desired tunnel by first checking the corresponding check box and then clicking the Details button. When clicking Details, the TE Tunnel Details window in Figure B-36 appears.

Figure B-36 TE Tunnel Details

The TE Tunnel Details window contains the following elements:

Type—Managed or unmanaged.

Tunnel—Tunnel name, head and destination routers, and total bandwidth.

Status—The operational and administrative status of the TE tunnels as of the latest TE Discovery task.

State—Indicates whether the tunnel state is DEPLOYED or NOT DEPLOYED and whether it is Conformed or Not Conformed.

LSP configured—The LSP that the tunnel is configured to use as its lowest path option.

LSP in use—Actual LSP in the network as of the latest TE Discovery task.

AutoBW—Auto Bandwidth Enabled or Disabled.

Create TE Managed Primary Tunnel

This section describes the GUI elements in the Create TE Managed Primary Tunnel SR and Edit TE Managed Primary Tunnel windows. The create feature is here used as an example.

To create a TE Managed Primary Tunnel SR, see Chapter 4, "Basic Tunnel Management."

To access the Create TE Managed Primary Tunnel SR window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > Create Managed TE Tunnel. The TE Managed Primary Tunnels SR window appears. Click Create, to open the Create TE Managed Primary Tunnel window as shown Figure B-37.

Figure B-37 Create TE Managed Primary Tunnel

The Create TE Managed Primary Tunnel window contains the following elements:

Head Device—Head device for the tunnel.

Destination Device—Destination device for the tunnel.

Tunnel Policy—A set of rules established for a tunnel.

Tunnel Bandwidth—Total allocated bandwidth of the tunnel.

Description—Descriptive text to help identify the tunnel.

Tunnel Number—Tunnel number corresponding to the tunnel interface name.

Auto Gen—Check this box to generate the tunnel number automatically. Otherwise, enter a desired number.


Note If a manually entered tunnel number is too low, it could prevent deployment.



Note MPLS-TE tunnels can potentially interfere with multicast GRE tunnels. TEM creates new tunnels using auto-gen and this tunnel number might already be used by an MDT GRE tunnel. As a result, TEM uses high tunnel numbers to avoid any complications.


Tunnel ID—Unique tunnel identifier used within TEM.

Customer—Selected customer for the tunnel.

Auto BW—A way to configure a tunnel for automatic bandwidth adjustment and to control the manner in which the bandwidth for a tunnel is adjusted.

Enable—Check this box to enable automatic bandwidth.

Freq—Interval between bandwidth adjustments.

Min—Minimum automatic bandwidth, in kbps, for this tunnel.

Max—Maximum automatic bandwidth, in kbps, for this tunnel.

Path options:

Option #—Sequential number of available explicit paths.

Path Name—Name of the explicit path. In case of an existing path, the name is a URL that links to the Explicit Path Viewer.

System Path—ISC system generated explicit path. For managed tunnels, the first path has to be an explicit path. If a tunnel contains a system path, the planning function will generate an optimal path for the tunnel.

Dynamic Path—A dynamic path is provisioned by allowing the head router to find a path. The dynamic keyword is provisioned to the routers.

Path Type—Path option type, Explicit or Dynamic.

Lock Down—Disables reoptimization check on the tunnel, if checked, meaning the path cannot be changed.

The following actions can be performed:

Add—Add a path option. This opens the Select TE Explicit Path window in Figure B-40.

Delete—Delete a path option.

OK—Accept all changes and return to the TE Managed Primary Tunnels SR window.

Cancel—Cancel the operation and return to the TE Managed Primary Tunnels SR window.

Select Devices and Policy

To select a Head Device or a Tail Device in the Create TE Managed Primary Tunnel window (Figure B-37), click the corresponding Select button. Figure B-38 shows the TE Head Router window.

Figure B-38 Select Device for TE Head Router

The Select Device window contains the following elements:

Device Name—Hostname for the device.

IGP ID—Interior Gateway Protocol (IGP) ID.

MPLS TE ID—TE ID assigned by the router.

Admin Status—Indicates whether the router is UP or DOWN.

The following actions can be performed:

Select—Accept the selected device and return to the previous window.

Cancel—Cancel the operation and return to the previous window.

Find—You can search for particular devices by selecting the device type in the drop-down menu Show Devices with and specify matching criteria in the Matching field.

For a description of the GUI elements in the Select Device for TE Tail Router window, see the explanation for the Select Device for TE Head Router window.

Figure B-39 Select Managed TE Tunnel Policy

The Select Managed TE Tunnel Policy window contains the following elements:

Policy Name—Name of the TE policy.

Pool Type—Tunnel bandwidth pool type for this policy. For a definition of pool types, see Bandwidth Pools, page F-6.

SUB_POOL—Bandwidth will be reserved from Sub Pool.

GLOBAL—Bandwidth will be reserved from Global Pool.

Setup Priority—Priority used when signaling an LSP for the tunnel to determine, which of the existing tunnels can be preempted. Valid values are from 0 to 7, where a lower number indicates a higher priority. Therefore, an LSP with a setup priority of 0 can preempt any LSP with a non-0 hold priority.

Hold Priority—Priority associated with an LSP for the tunnel to determine if it should be preempted by other LSPs that are being signaled. Valid values are from 0 to 7, where a lower number indicates a higher priority.

Affinity—Attribute values required for links carrying the tunnel (bit values are either 0 or 1).

Affinity Mask—Attribute values to be checked. If a bit in the mask is 0, a link's attribute value of that bit is irrelevant. If a bit in the mask is 1, the link's attribute value and the tunnel's required affinity for that bit must match.

Delayed Constraint—True or false value. If true, the tunnel has a maximum delay that its path must not exceed.

FRR Protection—Used to enable an MPLS traffic engineering tunnel to use a backup tunnel in the event of a link failure if a backup tunnel exists.

None—No backup tunnel needed.

Best Effort—Use backup tunnel if available.

Link and SRLG—Specifies that primary tunnels should be routed only through links and SRLGs that are protected by FRR backup tunnels.

Link, SRLG and Node—Specifies that primary tunnels should be routed only through links, SRLGs and nodes that are protected by FRR backup tunnels.

MPLS IP Enabled—Specifies whether MPLS IP has been configured for the corresponding tunnel.

Select TE Explicit Patht

An explicit path is added to a tunnel by clicking Add in the tunnel editor. The Select TE Explicit Path window in Figure B-40 appears.

Figure B-40 Select TE Explicit Path

Path Type—Three types of explicit paths are supported:

STRICT—All strict hops are defined in the path.

LOOSE—Any loose hops (pure loose path or a combination of loose and strict hops) are defined in the path.

EXCLUDE—All exclude hops are defined in the path.

Two path types are available:

Explicit Path—A fixed path from a specific head to a specific destination device.

Dynamic Path—A path that is provisioned by allowing the head router to find the path. The dynamic IOS keyword is provisioned to the routers. This signifies that the router calculates a valid path.

Explicit Path Viewer

When creating a primary tunnel, the Path Options list by default suggests a System path and a Dynamic path. If an explicit path is added, this link will be selectable as shown in the Path Options section of the create window in Figure B-41. By clicking an explicit path link, a non-editable Explicit Path Viewer in Figure B-42 appears.

Figure B-41 Path Options

For an explanation of the various GUI elements, see Create Managed TE Tunnel.

Figure B-42 TE Explicit Path Viewer

For an explanation of the various GUI elements, see Create/Edit Explicit Path.

Import Tunnel

This section describes the GUI elements in the import tunnel feature.

For instructions on how to import TE tunnels, see the Import Primary Tunnel, page 5-8.

The tunnel import function is found under Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > Create Managed TE Tunnel, which opens the TE Managed Primary Tunnels SR window (see Figure B-49).

When you click Import to start the import process, the Select Import File window in Figure B-43 appears.


Note The Import button is only enabled when there are no uncommitted new, changed, or deleted tunnels in the service request.


Figure B-43 Select Import File

The Select Managed TE Tunnel Policy window contains the following elements:

File Name—Name of XML file.

Size—Size in kilobytes of XML file.

Last Modified—Date and time when the file was last modified.

The following actions can be performed:

Select—Accept the selected XML file(s) and start the tunnel import operation.

Cancel—Cancel the tunnel import operation and return to the TE Managed Primary Tunnels SR window.

Find—Specify the directory containing the XML import files and directories to import in the Look in field and click Find. This brings up the data import directory and the XML files contained are listed in the accompanying table.

Up—Choose the parent directory.

Import Error Status Window

When you click Select to start the import operation, the system parses the file, and if any error is detected, it will be reported in the Tunnel Import Error Status window shown in Figure B-44.

Figure B-44 Tunnel Import Error Status

The Tunnel Import Error Status window contains the following elements:

Import File—Directory containing XML import files and directories.

Last Modified—Date and time when the file was last modified.

Import Status—There are two possible Import Status values:

Failed—Critical errors are present and the import process cannot continue.

Partial Success—There are either non-critical errors or warnings or both in the file. In this case the error tunnel is reported and skipped and the warning tunnel is processed with certain defaults applied. There is no "Success" status because when there are no errors or warnings, the Tunnel Import Error Status window will not appear.

The following actions can be performed:

Continue—If the import operation is partially successful, click Continue to accept system treatment for errors/warnings and continue with the import operation.

Cancel—Cancel import operation and return to the previous window.

Edit TE SR (Primary or Backup)

The tunnels editor windows differ only very slightly from the create tunnel windows. All fields in the editor windows are found in the create windows for both primary managed, primary unmanaged, and backup tunnels (see Chapter 4, "Basic Tunnel Management").

The only difference from the create window is that the head and destination device and tunnel number fields are not editable and the Path Options table lists existing path options on the tunnel rather than the default System and Dynamic paths.

Planning Tools

This section describes the GUI elements in the sequence of windows used by the planning tools Tunnel Audit, Tunnel Placement, Tunnel Repair, and Grooming. Screenshots from Tunnel Repair has been used as an example but it covers the GUI elements for all four processes.

To use the planning tools, see Placement Tools, page 5-10

To access the Create TE Managed Primary Tunnel SR window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > Create Managed TE Tunnel. The TE Managed Primary Tunnels SR window in Figure B-49 appears.

There are two ways to activate the planning tools:

When one or more tunnels have been created or their attributes altered (see Create Primary Tunnel, page 5-2), Tunnel Audit, Tunnel Placement, and Tunnel Repair can be activated by selecting Proceed with Changes .

When no changes have taken place, Grooming, Tunnel Audit, and Tunnel Repair can be accessed by selecting Placement Tools.

As an example, assume that we run Tunnel Repair on a set of tunnels as described in Tunnel Repair, page 5-19.

Movable Tunnel Selection Window

When selecting Tunnel Repair from the Placement Tools button, the Movable Tunnel Selection window in Figure B-45 appears.

Figure B-45 Movable Tunnel Selection

The Movable Tunnel Selection window contains the following elements:

Computation Type—Indicates which tool is used for the computation (Placement, Repair, Grooming).

Maximum computation duration—The maximum amount of time allowed for the computation before timeout occurs.

Maximum number of tunnel moves—The maximum number of tunnels that can be moved during Tunnel Repair.

Number of reroutable tunnels selected as movable—Indicates how many reroutable tunnels among the ones shown in the tunnel list are movable.

Non-reroutable—Indicates how many tunnels among the ones shown in the tunnel list are not movable. This is set in the tunnel editor.

Find—You can search for particular tunnels by selecting the search variable in the drop-down menu Show tunnels with, specifying matching criteria, and clicking Find.

Show tunnels with options:

All—Show all managed tunnels under the current provider.

Tunnel Number—Tunnel number on the head router.

Head Device—Full or partial name of the tunnel head device.

Destination Device—Full or partial hostname of the tail device of the tunnel.

Head, Dest Devices—Exact hostname of the head and tail devices of the tunnel.

Deploy Status—Tunnel deployment status.

Policy Name—Name of the TE policy.

matching/equal—Specify matching criteria for your search. Wildcards are accepted. matching changes to equal if Head, Dest Device is selected in the drop-down menu. For equal, the exact hostname of the head or tail device must be entered (wildcards not accepted).

Movable—Indicates whether the tunnel is movable (yes, no or NA). This setting can is toggled by clicking Set Movable and Set Unmovable.

Allow Reroute—Specifies whether reroute is allowed (true or false). If reroute is not allowed, the tunnel cannot be set to movable.

Tunnel ID—Unique tunnel identifier used within TEM.

T#—Tunnel number on the head router.

Head—Hostname of the head router.

Dest—Hostname of the destination router.

Policy—TE policy for the tunnel.

BW—The tunnel bandwidth. If the tunnel is auto-bw enabled, BW shows the higher of tunnel bandwidth and maximum automatic bandwidth.

The following actions can be performed:

Set Movable—Set selected tunnel to movable.

Set Unmovable—Set selected tunnel to unmovable.

Back—Return to the previous window.

Proceed —Proceed to computation.

Cancel—Cancel the operation and return to the previous window.

TE Primary Tunnel Computation SR - Changes Window

Still using Tunnel Repair as an example, after selecting Proceed from the Movable Tunnel Selection window, the TE Primary Tunnel Computation Results - Changes window in Figure B-46 appears.

The figure shows the computation results window after clicking Detail to obtain detailed information about the tunnel and view the status of the change request.

Figure B-46 TE Primary Tunnel Computation Results - Tunnel Repair Changes (Details)

The TE Primary Tunnel Computation Results - Changes window contains the following elements:

Status section (top):

Computation Status—Indicates whether the computation succeeded or failed.

Tunnels:

unplaced—Number of unplaced tunnels out of the total.

moved—Number of tunnels that were moved.

Bandwidth - unplaced—Amount of tunnel bandwidth that was not placed out of the total bandwidth of all existing and new tunnels.

Global Util.—Global Pool bandwidth utilization percentage. For a description of the various utilization values, see TE Primary Tunnel Computation Results - Report under the quality report.

Sub Pool Util.—Sub Pool bandwidth utilization percentage. For a description of the various utilization values, see TE Primary Tunnel Computation Results - Report under the quality report.

Solution—Utilization for the generated solution.

Original—Utilizations for the original placement.

Changes section (left):

Changes—Number of changes achieved out of the total number of changes.

Achieved—Indicates whether a specific change is successful (Yes or No).

Origin—The originator of the change. Can be user (change by user) or compute (from a computation, e.g. rerouting of a tunnel).

Type—The type of change requested: Tunnel Add Change, Tunnel Modify Change, Tunnel Remove Change, or Element Modify Change.

Object ID—A tunnel or link ID.

Information section (right):

Change Type—The type of change requested: Tunnel Add Change, Tunnel Modify Change, Tunnel Remove Change, or Element Modify Change.

Achieved—Indicates whether a specific change is successful (Yes or No).

Description—Description of the computation attempt.

ID—Tunnel ID.

Head—Hostname of the head router.

Tail—Hostname of the destination router.

Policy—TE policy for the tunnel.

Bandwidth—Bandwidth used in computation.

Path—Tunnel path in the form of either a computed path or an existing path. Click to view the path.

Changed attribute table:

Changed Attributes—Lists the tunnel attributes that have changed.

New Value—New value of the attribute.

Achieved—Indicates whether a specific change is successful (Yes or No).

The following actions can be performed:

Close—Close the Topology Display applet if open.

Display—Invoke the Topology Display to view selected links and/or tunnels in the network. Selected links/tunnels are displayed with a unique color.

Detail—Open the detail panel in the right side of the Computation Result window to see the tunnel/link information.

Back—Return to the previous window.

View Report —View a list of generated reports. The Report window appears (see Figure B-47).

Save & Deploy—For committing all user originated and system computed changes. There are two options for saving and deploying tunnel SRs to the network:

Deploy Achieved Changes—Place all achieved changes in the deployment queue.

Force Deploy All Tunnels—Force deployment of all elements in the SR. This could be useful when previous provisioning of the SR has failed, so that it is necessary to force through the deployment of all tunnels in the SR.

Cancel—Cancel the operation and return to either the Links List, TE Managed Primary Tunnels SR, or the TE Resource Management SR window depending on the originating flow.

TE Primary Tunnel Computation Results - Report

To view the computation reports, click View Report . The TE Primary Tunnel Computation Results - Report window in Figure B-47 appears.

In this case, there is both a quality report and a violation report. In that case, a detail report such as the violation report in Figure B-48 will appear. Warning and violation reports have different fields and they are all described in Appendix D, "Warnings and Violations."

Select the desired report and click the Details button.

Figure B-47 TE Managed Primary Tunnels SR - Tunnel Repair Report (Details)

The TE Primary Tunnel Computation Results - Report window contains the following elements:

Status section (top): described above (Figure B-46).

Report section (left):

Report Type—There are three basic report types: a qualityReport (generated every time), warning reports, and violation reports.

Summary Info—Summary information about the findings of the report.

Information section (right):

Report Type—See description above.

Description—Specific information about the report.

Achievement—Success or failure of the computation attempt/solution (SUCCESS or CONSTRAINT_VIOLATIONS_REPORTED).

Solution—Indicates whether a solution was found (SOLUTION_FOUND, PARTIAL_SOLUTION_FOUND or NO_SOLUTION_FOUND).

Termination—Indicates whether the computation was completed:

COMPLETED—The computation completed processing before the time limit.

TIMED_OUT—The computation was not able to complete processing within the time limit. The solution presented is the best solution it was able to find in the time available.

Optimality—Indicates whether the computation was optimal:

OPTIMAL_FOR_ALL_CRITERIA—The solution generated has proven to be the best for all optimization criteria.

NO_OPTIMALITY_PROOF—The solution's optimality is unknown.

OPTIMAL_FOR_DEMAND_SELECTION—The solution generated has proven to be the best in terms of total bandwidth placed, but utilization optimality is unknown.

OPTIMAL_FOR_SUB_POOL_PATH_SELECTION—The solution generated has proven to be the best in terms of total bandwidth placed and maximum sub pool utilization, but has not proven to be optimal in terms of global pool utilization.

Tables:

Tunnel Placement—Tables that compares various tunnel placement attributes of the original configuration with the solution configuration.

Tunnels: Attributes of the original and computed tunnels.

Bandwidth: Attributes of the tunnel bandwidth.

%Placed—Percentage of tunnels that were successfully placed.

Placed—Number of tunnels that were successfully placed.

Unplaced—Number of tunnels that were not placed.

Total—Total number of tunnels.

Tunnels moved—Number of tunnels moved from their original paths.

TE-Metric Sum (Primary Tunnel Paths)—TE metric sum for the computed and the original paths.

Utilization—The table compares utilization measurements of the original configuration with the solution configuration

Global Pool—Comparison data for various Global Pool attributes.

Sub Pool—Comparison data for various Sub Pool attributes.

Median—Utilization of the link that is the middle link when all links are ordered by utilization.

Max. Modifiable—Utilization value for the most utilized link that has movable tunnels passing through it.

Mean—Average link utilization for the network as a whole.

Max.—Utilization value for the most utilized link in the topology.

The following actions can be performed:

Changes actions (buttons, left):

Detail—When a report is selected, the Detail button displays the contents of the report, which can contain warnings or violations, in the right window pane.


Note For a description of possible warnings and violations in TEM, see Appendix D, "Warnings and Violations."


View Result—Return to the Changes window.

Figure B-48 TE Managed Primary Tunnels SR - Violation Report (Details)

In Figure B-48, the top status section and the left Report section contain the same fields as in Figure B-47.

Create Unmanaged TE Tunnel

The only two differences between the managed and the unmanaged tunnel GUIs is that the path option table does not automatically populate the two System/Dynamic paths and that the Conformance status is only indicated for unmanaged primary tunnels (for an explanation of the conformance concept, see Conformant/Non-Conformant Tunnels, page F-2).

For a description of the rest of the GUI, see Create Managed TE Tunnel.

Create TE Backup Tunnel

To access the TE Protection SR window for managing backup tunnels, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > Create TE Backup Tunnel. The TE Protection SR window in Figure B-49 appears.

Figure B-49 TE Protection SR

The TE Protection SR window contains the following elements:

The columns in the tunnel list provides the following information:

Op—Current SR operation on the tunnel. This can be one of the following:

ADD—Indicates a newly added tunnel, either calculated by the system or entered by the user.

MODIFY—Indicates a modified existing tunnel.

DELETE—Indicates an existing tunnel to be deleted, either computed by the system or originated by the user.

Tunnel ID—Unique tunnel identifier used within TEM.

T#—Tunnel number on the head router.

Head—Hostname of the head router.

Dest—Hostname of the destination router.

BW Quota—Amount of bandwidth that this backup tunnel can protect. The router limits the LSPs that can use this backup tunnel so that the sum of the bandwidth of the LSPs does not exceed the specified amount of bandwidth. If there are multiple backup tunnels, the router will use the best-fit algorithm.

Deploy Status—Tunnel deployment status.

Conformance—Indicates whether the tunnel is found to be conformant when running discovery. A tunnel is non-conformant if it has a non-zero bandwidth reservation and a zero hold or setup priority. If a tunnel is entered through ISC TEM, it is always conformant. A connectivity protection tunnel is marked Conformant = true if it has zero tunnel bandwidth, unlimited backup bandwidth, and an 'exclude address' first path option. Otherwise, it is marked Conformant = false.

Backup Type—Can be either bandwidth protected backup tunnels (BW Protected) or CSPF-routed backup tunnels (CSPF). For more information about these types of backup tunnels, see Connectivity Protection (CSPF) Backup Tunnels, page F-7.

Head Region—The region to which the head router belongs.

Tail Region—The region to which the tail router belongs.

The following actions can be performed (buttons):

Close—Close the Topology Display applet if open.

Display—Open a Topology Display for the network and highlight the selected backup tunnel(s). The selected tunnel(s) is/are marked in color with directional arrows.

Details—Open the TE Tunnel Details window, which provides type, status, LSP, and other information about the tunnel.

Create—Create a backup tunnel.

Edit—Edit the selected backup tunnel.

Delete—Delete the selected backup tunnels.

Audit SR—Audit protection of protected elements using all existing backup tunnels and proposed changes in the SR.

Update Tunnel ID—Update Tunnel ID(s) directly in the repository without deploying the corresponding tunnel(s).

Save & Deploy—For committing resource changes in the SR. Two options for saving and deploying Backup Tunnel SRs to the network:

SR Tunnels Only—Deploy all tunnel changes in the SR, or if no changes were made to the SR, use this to redeploy the SR that was in Requested or Invalid state.

Force Deploy All Tunnels—Force deployment of all tunnels in this SR. This could be useful when previous provisioning of the SR has failed, so that it is necessary to force through the deployment of all tunnels in the SR.

Cancel—Cancel the operation and return to the Traffic Engineering Management Services window.

The tunnel SR search tool allows you to look for particular tunnels by selecting tunnel characteristics in the drop-down menu tunnels with and specify matching criteria in the Matching field:

Show:

Existing—Show existing tunnels already deployed in the network.

SR—Show tunnels not yet deployed in the network.

tunnels with:

All—Show all managed tunnels under the current provider.

Tunnel Number—Tunnel number on the head router.

Head Device—Full or partial name of the tunnel head device.

Destination Device—Full or partial hostname of the tail device of the tunnel.

Head, Dest Devices—Exact hostname of the head and tail devices of the tunnel.

Tunnel Status—Tunnel deployment status.

Conformance—Conformant or non-conformant tunnel.

matching/equal—Specify matching criteria for your search. Wildcards are accepted. matching changes to equal if Head, Dest Device is selected in the drop-down menu. For equal, the exact hostname of the head or tail device must be entered (wildcards not accepted).

Find—Click the Find button when the search criteria has been entered.

Create TE Backup Tunnel Window

From the TE Protection SR window, click Create to access the Create TE Backup Tunnel window shown in Figure B-50.

Figure B-50 Create TE Backup Tunnel

The Create TE Backup Tunnel window contains the following elements:

Head Device—Head device for the tunnel. For selecting devices, see Figure B-38.

Destination Device—Destination device for the tunnel. The selection window is very similar to the Head Device selection window.

Protected Interface(s)—Interface(s) on the head router that this backup tunnel protects.

Description—Descriptive text to help identify the tunnel.

Backup Bandwidth Limit—Bandwidth protected by the backup tunnel.

Any Pool BW—Bandwidth set aside for the protection of either the Sub Pool or the Global Pool.

Sub Pool (BC1) BW—Bandwidth set aside for the Sub Pool.

Global Pool (BC0) BW—Bandwidth set aside for the Global Pool.

For a definition of pool types, see Bandwidth Pools, page F-6.

Tunnel Number—Tunnel number corresponding to the tunnel interface name.

Auto Gen—Check this box to generate the tunnel number at provisioning time. Otherwise, enter a desired number.


Note If a manually entered tunnel number is too low, it could prevent deployment.


Tunnel ID—Unique tunnel identifier used within TEM.

Tunnel Bandwidth—Total allocated bandwidth of this backup tunnel (display only).

Tunnel Pool Type—Tunnel bandwidth pool type for this policy (display only). For a definition of pool types, see Bandwidth Pools, page F-6.

Global Pool (BC0)—Bandwidth will be reserved from Global Pool.

Sub Pool (BC1)—Bandwidth will be reserved from Sub Pool.

Setup Priority (0-7), Hold Priority (0-7), Affinity, Affinity Mask—All manually created backup tunnels should have setup and hold priorities of 0 and affinity value and mask of 0x0 for them to be able to protect an element. See definitions accompanying Figure B-39.

Path options:

Option #—Sequential number of available explicit paths.

Path Name—Name of the explicit path.

Path Type—Explicit path type (Explicit or Dynamic)

Lock Down—Disables reoptimization check on the tunnel, if checked.

The following actions can be performed (buttons):

Add—Add a path option. This opens the Select TE Explicit Path window in Figure B-40.

Delete—Delete a path option.

OK—Accept all changes and return to the TE Managed Primary Tunnels SR window.

Cancel—Cancel the operation and return to the TE Managed Primary Tunnels SR window.

Select TE Protected Interface

When clicking the Select button in the backup tunnel editor to select a TE protected interface, the window in Figure B-51 appears.

Figure B-51 Select TE Protected Interface

The Select TE Protected Interface window contains the following elements:

Interface Name—Name of the interface to be protected.

IPV4 IP Address—IPv4 address of the interface.

Next Hop—Name of the next hop device.

The following actions can be performed:

Select—Accept the selected interface and return to the previous window.

Cancel—Cancel the operation and return to the previous window.

TE Traffic Admission

This section describes the GUI elements in the TE Traffic Admission SR window.

To assign traffic to traffic-engineered tunnels, see Chapter 7, "Traffic Admission."

Select TE Tunnel for Admission

To access the TE Traffic Admission SR window, choose Service Inventory > Inventory and Connection Manager > Traffic Engineering Management > TE Traffic Admission.

Prior to reaching the main TE Traffic Admission SR window, a tunnel has to be selected as shown in Figure B-52.

Figure B-52 Select TE Tunnel for Admission

The TE Traffic Admission SR list contains the following columns:

Op Type—SR operation on the tunnel, can be either ADD, MODIFY, DELETE, or ADMIT.

Tunnel ID—Unique tunnel identifier used within TEM.

T#—Tunnel number on the head router.

Head—Hostname of the head router.

Dest—Hostname of the destination router.

Deploy Status—Can be Pending, Deployed, or Functional.

Type—Managed or unmanaged.

Policy—Tunnel policy.

TE Traffic Admission SR

After selecting a TE tunnel by selecting the corresponding radio button and clicking Select, the TE Traffic Admission SR window appears. In the case of an IOS device, the window in Figure B-53 appears.

Figure B-53 TE Traffic Admission SR (IOS Device)

In the case of an IOS XR device, the window in Figure B-54 appears.

Figure B-54 TE Traffic Admission SR (IOS XR Device)

The main TE Traffic Admission SR window contains the following fields:

Tunnel—Tunnel name.

Description—Service request description.

EXP [IOS devices only]—Class marking bits for CBTS.

Policy [IOS XR devices only]—Policy marking bits for PBTS.

Autoroute announce—Used to specify that the Interior Gateway Protocol (IGP) should use the tunnel (if the tunnel is up) in its enhanced shortest path first (SPF) calculation.

On—Autoroute announce is enabled.

Off—Autoroute announce is disabled.

Autoroute Metric—Used to specify the Multiprotocol Label Switching (MPLS) traffic engineering tunnel metric that the Interior Gateway Protocol (IGP) enhanced shortest path first (SPF) calculation uses.

Absolute—Absolute metric mode; you can enter a positive metric value.

Relative—Relative metric mode; you can enter a positive, negative, or zero value.

Static Routes—Lists any static routes that the tunnel uses.

Destination—Name of the static route for the tunnel destination.

Distance—Administrative distance (cost).


Note When performing TE Admission on an IOX device, the TE Traffic Admission window includes a PBTS policy class field.


The following actions can be performed:

Add—Add static route.

Edit—Edit selected static route.

Delete—Delete selected static routes.

Save SR—Save service request to the SR pool.

Cancel—Cancel the operation and return to the previous window.

Adminstration

The administrative features directly relevant to TEM are described in Chapter 8, "Administration". However, because most administrative features of ISC TEM are general to ISC, these are described in the Cisco IP Solution Center Infrastructure Reference, 5.1.

Monitoring

This section describes the GUI elements in the following windows:

TE Task Logs (see also TE Task Logs, page 9-1)

TE Performance Reports (see also TE Performance Reports, page 9-3).

TE Task Logs

The TE task logs are used to view the result of running one or more TE tasks as described in TE Task Logs, page 9-1.

To view the task log for a TE task, choose Monitoring > Tasks > Logs. The Task Logs window in Figure B-55 appears.

Figure B-55 Task Logs

The Task Logs window contains the following GUI elements:

Runtime Task Name—Automatically attributed task name specifying when the runtime task was created.

Action—Type of task, for example TE Discovery, TE Functional Audit, or TE Interface Performance.

Start Time—The date and time when the runtime task was started.

End Time —The date and time when the runtime task ended.

Status—Indicates the present status of the runtime task.


Note Specific instructions for how to view a task log for a TE Discovery task are found in the TE Discovery section Task Logs, page 2-9.


Task Log

To access the individual log associated with a given task, from the Task Logs window click the corresponding link in the Action field or select a check box and click View Log. The Task Log window in Figure B-56 appears.

Figure B-56 Task Log

How the log is structured depends on the type of task that was run. Here the Level column indicates the severety of the recorded event and the Component column states in which component of ISC the event occured.

The following actions can be performed:

Filter—Select the desired log level, optionally enter exact Component name, and click Find.

Return to Logs—Return to the Runtime Actions window.

To see the task SR associated with a particular task log, select the desired task log in the Task Logs window and click the Service Requests button. The Tasks SRs window in Figure B-57 appears.

Figure B-57 Task SRs

The Task SRs window contains the same GUI elements as the ones in the Service Requests window, namely the following:

Job ID—Job ID for the SR.

State—Indicates whether the tunnel state is DEPLOYED or NOT DEPLOYED and whether it is Conformed or Not Conformed.

Type—The type of service request, indicating which service issued the request. For a detailed description of the possible service types, see the Cisco IP Solution Center Infrastructure Reference, 5.1.

Operation Type—SR operation on the tunnel, can be either ADD, MODIFY, DELETE, or ADMIT. Applicable only to tunnels in the current SR.

Creator—ID for the user who created the SR.

Customer Name—Name of the customer to which the SR applies.

Policy Name—Name of the policy associated with the SR.

Description—SR description provided by the user.

TE Performance Reports

Performance reports are created when you run a TE Interface Performance task as described in Creating a TE Interface Performance Task, page 8-8.

To view a performance report, choose Monitoring > TE Performance Report. The TE Performance Report Table in Figure B-58 appears.

Figure B-58 TE Performance Report Table

The TE Performance Report Table window contains the following GUI elements:

Report table—The table shows a list of Interface Performance tasks:

Start Time—The date and time when the runtime task was started.

End Time—The date and time when the runtime task ended.

Device Name—Name of the device.

Interface Name—IP addresses of the interfaces on the link.

Octets In—Number of inbound octets of traffic.

Octets Out—Number of outbound octets of traffic.

Speed—Speed of the interface.

Util In—Interface utilization for inbound traffic.

Util Out—Interface utilization for outbound traffic.

Reconcile Data—When an Interface Performance task has been run multiple times on an interface, you can choose to reconcile the data according to the following criteria:

Peak—Select the highest interface utilization.

Valley—Select the lowest interface utilization.

Average—Select the average interface utilization.

First—Select the first occurrence of interface utilization.

You can perform the following actions:

Find—Filter out performance data according the criteria selected in the drop-down menu.

Cancel—Quit the report page.

Close—Close the Topology Display applet if open.

Display—Invoke the Topology Display to view selected links and/or tunnels in the network. Selected links/tunnels are displayed with a unique color.