The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
A
AAL5 1-8
address space separation 2-8
ATMoMPLS 1-8
ATM over MPLS (ATMoMPLS) 1-8
audience v
authenticating
LDP 2-13
routes 2-13
B
bandwidth pools 4-6
C
CBTS
Class-Based Tunnel Selection 4-8
cell relay
over MPLS 1-8
CEs
security of the PE-CE interface 2-13
Class-Based Tunnel Selection (CBTS) 4-8
concurrent use
overview 4-4
with managed and unmanaged tunnels 4-4
conformant/non-conformant tunnels
defining 4-3
managing 4-3
overview 4-2
Connectivity Protection (CSPF) Backup Tunnels 4-8
CSPF
Connectivity Protection Backup Tunnels 4-8
D
devices
suitable for TE Discovery 4-5
trusted devices 2-12
E
ERS
multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19
multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-17
Ethernet relay service (ERS or EVPL) 1-5
Ethernet wire service (EWS or EPL) 1-5
EWS
multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18
multipoint EWS (EP-LAN) for an MPLS-based provider core 1-17
extranets 2-2
F
frame relay over MPLS (FRoMPLS) 1-9
FRoMPLS 1-9
full mesh topologies 2-8
H
hub and spoke topologies 2-8
I
implementing, VRFs 2-4
intranets 2-2
L
L2VPN
service provisioning 1-5
terminology conventions 1-1
L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5
label spoofing 2-12
LDP authentication 2-13
links
provisioning regular PE-CE links 3-1, 5-3
locking mechanism 4-4
M
managed/unmanaged primary tunnels 4-2
managing
independent VRF objects 2-5
MEF
mapping MEF terminologies to network technologies 1-3
terminology conventions 1-1
Metro Ethernet Forum (see MEF) 1-1
MPLS VPNs
concepts 2-1
security 2-8
multiple concurrent users 4-4
multipoint
ERS (EVP-LAN) for an Ethernet-based provider core 1-19
ERS (EVP-LAN) for an MPLS-based provider core 1-17
EWS (EP-LAN) for an Ethernet-based provider core 1-18
EWS (EP-LAN) for an MPLS-based provider core 1-17
O
objective v
organization v
OSPF areas
example of network 4-6
multiple 4-5
overview
Diagnostics 5-1
P
PBTS
Policy-Based Tunnel Selection 4-9
PEs
security of the PE-CE interface 2-13
planning tools 4-7
point-to-point
Ethernet (EWS and ERS) (EPL and EVPL) 1-5
Policy-Based Tunnel Selection (PBTS) 4-9
prerequisite knowledge 5-2
providers
multipoint ERS (EVP-LAN) for an Ethernet-based provider core 1-19
multipoint ERS (EVP-LAN) for an MPLS-based provider core 1-17
multipoint EWS (EP-LAN) for an Ethernet-based provider core 1-18
multipoint EWS (EP-LAN) for an MPLS-based provider core 1-17
provisioning
R
reactive fault lifecycle 5-1
relay service, Ethernet 1-5
route distinguishers 2-5
route targets 2-5
communities 2-6
routing
authentication 2-13
routing and forwarding tables 2-3
routing protocols
securing 2-10
S
security
ensuring VPN isolation 2-15
hiding the MPLS core structure 2-9
label spoofing 2-12
LDP authentication 2-13
MP-BGP security features 2-14
MPLS VPNs 2-8
of the PE-CE interface 2-13
resistance to attacks 2-10
securing the MPLS core 2-12
securing the routing protocol 2-10
security through IP address resolution 2-15
separation of CE-PE links 2-13
trusted devices 2-12
service provisioning, for L2VPN 1-5
T
TE area identifier
TE Discovery 4-5
TE Discovery
devices suitable for 4-5
TE area identifier 4-5
terminology conventions
L2VPN 1-1
TE tunnels
concurrent use with managed and unmanaged tunnels 4-4
topologies
full mesh 2-8
hub and spoke 2-8
topology
for ATMoMPLS 1-8
for Ethernet-based VPLS 1-19
for FRoMPLS 1-9
for L2VPN Ethernet over MPLS (ERS and EWS) (EPL and (EVPL) 1-5
for MPLS-based VPLS 1-17
V
VPLS
for an Ethernet-based (L2) provider core 1-18
service provisioning 1-16
topology for Ethernet-based VPLS 1-19
topology for MPLS-based VPLS 1-17
VPNs 2-1
connectivity between VPNs 2-14
ensuring VPN isolation 2-15
VPN routing and forwarding tables 2-3
VRF objects
independent VRF object management 2-5
VRFs
implementation of 2-4
VRF instance 2-5