• FEC 129-based Pseudowire Service Discovery
  • Managing MPLS Networks

    The following topics describe how to view and manage aspects of Multiprotocol Label Switching (MPLS) services using the Vision client, including the MPLS service view, business configuration, and maps. The topics also describe the device inventory specific to MPLS VPNs, including routing entities, label switched entities (LSEs), BGP Neighbors, Multiprotocol BGP (MP-BGP), VRF instances, pseudowires, and TE tunnels. If you cannot perform an operation that is described in these topics, you may not have sufficient permissions; see Permissions for Managing MPLS Services.

    Viewing IPv6 Information (6VPE)

    Prime Network supports IPv6 for:

    • Gateways, clients, and units using IPv6.
    • Communications between VNEs and devices in IPv6 environments, whether the device management IP address is IPv4 or IPv6.
    • Polling and notification using the following protocols over IPv6:

    blank.gif SNMP v1, SNMPv2c, and SNMPv3

    blank.gif Telnet

    blank.gif SSHv2

    blank.gif ICMP

    blank.gif XML (for Cisco IOS XR devices)

    blank.gif HTTP (for Cisco UCS and VMware vCenter devices)

    • All reports with devices that use IPv6 addresses.
    • Fault management, including event processing and service alarm generation.

    Prime Network supports correlation and path tracing for:

    • 6PE and native IPv6 networks.
    • IPv6 BGP address families.
    • IPv6 GRE tunnels.

    IPv6 VPN over MPLS, also known as 6VPE, uses the existing MPLS IPv4 core infrastructure for IPv6 transport to enable IPv6 sites to communicate over an MPLS IPv4 core network using MPLS label switch paths (LSPs). 6VPE relies on MP-BGP extensions in the IPv4 network configuration on the PE router to exchange IPv6 reachability information. Edge routers are configured to be dual-stacks running both IPv4 and IPv6, and use the IPv4-mapped IPv6 address for IPv6 prefix reachability exchange.

    In 6VPE environments, Prime Network supports:

    • Modeling of OSPFv3 routes between PE and CE devices.
    • IPv6 addresses for BGP Neighbours for MP-BGP.
    • Correlation and path tracing.

    The Vision client displays IPv6 addresses when they are configured on PE and CE routers in the IP interface table. IPv6 addresses are:

    • Displayed in the Vision client map pane for IPv6 links.
    • Displayed in logical and physical inventory for routing and interface information, including IP, PPP, and High-Level Data Link Control (HDLC).
    • Used in Cisco PathTracer to trace paths and present path trace results.

    Table 17-1 describes where IPv6 information appears in logical and physical inventory.

     

    Table 17-1 IPv6 Information in Inventory

    Inventory Location
    Description
    Logical Inventory

    6rd Tunnels

    The Tunnel Edges table displays IPv6 addresses and the IPv6 prefixes that are used to translate IPv4 addresses to IPv6 addresses.

    For more information, see Viewing 6rd Tunnel Properties.

    Access Lists

    • The Type field displays IPv6 for IPv6 access lists.
    • If an IPv6 access list is configured, the Access List Properties window displays IPv6 addresses in the Source, Destination, Source Wildcard, and Destination Wildcard fields.

    Carrier Grade NAT

    Carrier Grade NAT service types include 6rd and XLAT.

    For more information, see Viewing Carrier Grade NAT Properties in Logical Inventory.

    GRE Tunnels

    The IP Address field supports IPv6 addresses.

    For more information, see Viewing MPLS Pseudowire Over GRE Properties.

    IS-IS

    IS-IS properties support:

    • IPv6 address families in the Metrics tab.
    • IPv6 addresses in the Neighbours tab and the IS-IS Neighbour Properties window.

    For more information, see Viewing IS-IS Properties.

    MPBGPs

    • IP address family identifiers indicate the BGP peer address family: IPv4, IPv6, Layer 2 VPN, VPNv4, or VPNv6.
    • MP-BGP BGP Neighbour entries display IPv6 addresses.

    For information, see Viewing MP-BGP Information.

    OSPFv3

    IPv6 addresses are displayed for OSPF Neighbour interface addresses, OSPF interface internet addresses, OSPF Neighbour properties window, and OSPF interface properties window.

    For more information, see Viewing OSPF Properties.

    Routing Entities

    • IPv6 addresses appear in the IP Interfaces tab, the IPv6 Routing tab, and the interface properties window.
    • IPv6 addresses are displayed in the NDP Table tab and the ARP Entry Properties window.
    • VRRP groups using IPv6 display IPv6 addresses in the IP Interfaces Properties window in the VRRP group tab.

    For more information, see Viewing Routing Entities.

    VRFs

    IPv6 addresses appear in the IPv6 tab, Sites tab, VRF Properties window, and IP Interface Properties window.

    For more information, see Viewing VRF Properties.

    Physical Inventory

    Port

    IPv6 addresses appear in the Subinterfaces tab and interface properties popup window.

    The IP addresses that appear depend on whether the interface has only IPv4 addresses, only IPv6 addresses, or both IPv4 and IPv6 addresses, as shown in Table 17-2 .

     

    Table 17-2 IP Addresses Displayed in the Interface Table and Properties Window

    Addresses
    Interface Table
    Properties Window

    IPv4 only

    Primary IPv4 address

    The primary IPv4 address and any secondary IPv4 addresses.

    IPv6 only

    Lowest IPv6 address

    All IPv6 addresses.

    IPv6 and IPv4

    Primary IPv4 address

    All IPv4 and IPv6 addresses.

    Note the following when working with IPv6 addresses:

    • MPLS label switching entries and Label Switching Entities (LSEs) do not display IPv6 addresses. However, the Neighbour Discovery Protocol (NDP) table does display IPv6 addresses.
    • Prime Network supports all the textual presentations of address prefixes. However, the Vision client displays both the IP address and the subnet prefix, for example:
    12AB::CD30:123:4567:89AB:CDEF, 12AB:0:0:CD30::/60
    note.gif

    Noteblank.gif Interfaces or subinterfaces that do not have IP addresses are not discovered and therefore are not shown in the Vision client.


    Figure 17-1 shows a port inventory view of a port with IPv4 and IPv6 addresses. In this example, one IPv4 address and multiple IPv6 addresses are provisioned on the interface.

    • The primary IPv4 address appears in the interface table and properties window. If secondary IPv4 addresses were provisioned on the interface, they would appear in the properties window.
    • IPv6 addresses provisioned on the interface appear in the properties window and Sub Interfaces tab.

    Figure 17-1 Port with IPv4 and IPv6 Addresses

     

    283677.tif

     

    Figure 17-2 shows a port with only IPv6 addresses provisioned. In this example, the lowest IPv6 address is shown in the subinterface table, and all IPv6 addresses are shown in the interface properties window.

    Figure 17-2 Port with IPv6 Addresses

     

    283678.tif

     

    Working with MPLS-TP Tunnels

    MPLS-Transport Profile (MPLS-TP) is considered to be the next generation transport for those using SONET/SDH TDM technologies as they migrate to packet-switching technology. Although still under definition by the IETF, MPLS-TP provides:

    • Predetermined and long-lived connections.
    • Emphasis on manageability and deterministic behavior.
    • Fast fault detection and recovery.
    • Inband OAM.

    MPLS-TP features include:

    • Manually provisioned MPLS-TP LSPs.
    • Reserved bandwidth for static MPLS-TP LSPs.
    • One-to-one path protection for MPLS-TP LSPs.
    • Working/Protected LSP switchover.
    • Continuity Check (CC), Proactive Continuity Verification (CV), and Remote Defect Indication (RDI) based on BFD.
    • New fault OAM functions resulting from the MPLS-TP standardization effort.

    Prime Network automatically discovers network MPLS-TP tunnels from end to end, including LSPs, tunnel endpoints, and bandwidth. Network LSPs contain LSP endpoints and midpoints and are identified as working or protected.

    Prime Network links the MPLS-TP tunnel components appropriately, provides a visual representation in Vision client maps, and displays the properties in logical inventory.

    Prime Network employs warm start technology when rebooting. That is, when rebooting, Prime Network compares existing MPLS-TP tunnel information to topology changes that occur while Prime Network is down and updates MPLS-TP tunnel accordingly when Prime Network returns to operation.

    The following options are available for working with MPLS-TP tunnels in the Vision client:

    Adding an MPLS-TP Tunnel

    Prime Network automatically discovers MPLS-TP tunnels, endpoints, and midpoints and enables you to add MPLP-TP tunnels to maps.

    To add an MPLS-TP tunnel to a map:


    Step 1blank.gif In the Vision client, display the map to which you want to add the MPLS-TP tunnel.

    Step 2blank.gif Do either of the following:

      • From the File menu, choose Add to Map > MPLS-TP Tunnel.
      • In the main toolbar, click Add to Map, then choose Add to Map > MPLS-TP Tunnel.

    The Add MPLS-TP Tunnel dialog box is displayed.

    Step 3blank.gif Do either of the following:

      • Choose a search category, enter a search string, then click Go to narrow search results to a range of MPLS-TP tunnels or a specific MPLS-TP tunnel. Search categories include:

    blank.gif Description

    blank.gif Name

    blank.gif System Name

      • Choose Show All to display all the MPLS-TP tunnels.

    Step 4blank.gif Select the MPLS-TP tunnel that you want to add to the map.

    Step 5blank.gif Click OK.

    The MPLS-TP tunnel is added to the map and to the navigation pane.

    In Figure 17-3:

      • The devices are on the left side of the map, and the MPLS-TP tunnel is displayed in a thumbnail on the right.
      • The devices are connected to each other and to the MPLS-TP tunnel via tunnels.
      • Physical links connect the devices to the Working and Protected LSPs.
      • A redundancy service badge is displayed next to the Protected LSP in the navigation and map panes.
      • In the thumbnail:

    blank.gif The tunnel endpoints are connected to each other via a tunnel.

    blank.gif A physical link connects the Working and Protected LSPs.

    blank.gif Business links connect the Working and Protected LSPs to each endpoint.

    Figure 17-3 MPLS-TP Tunnel in Vision Map

     

    285154.tif

    If an LSP is in lockout state, it is displayed with the lock badge (310419.tif).

    By expanding all aggregations in the MPLS-TP tunnel (see Figure 17-4), you can see components and links in the MPLS-TP tunnel, including:

      • MPLS-TP tunnel endpoints
      • LSP endpoints
      • LSP midpoints

    Figure 17-4 MPLS-TP Tunnel Expanded

     

    285153.tif

    If an LSP is configured for redundancy service, a redundancy service badge is applied to the secondary (backup) LSP in the navigation and map panes in the navigation and map panes.

    For more information about LSP redundancy service, see Viewing LSP Endpoint Redundancy Service Properties.


     

    Viewing MPLS-TP Tunnel Properties

    Prime Network discovers and displays MPLS-TP attributes in the MPLS-TP branch in logical inventory as described in this topic.

    Additional information about MPLS-TP tunnel properties are available in the following branches:

    To view MPLS-TP tunnel properties:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > MPLS-TP > MPLS-TP Global.

    The routing information is displayed as shown in Figure 17-5.

    Figure 17-5 MPLS-TP Tunnel Properties in Logical Inventory

     

    310767.tif

    Table 17-3 describes the information that is available for MPLS-TP tunnels. The information that is displayed depends on the configuration.

     

    Table 17-3 MPLS-TP Tunnel Properties in Logical Inventory

    Field
    Description

    Global ID

    Globally unique Attachment Interface Identifier (AII) for MPLS-TP derived from the Autonomous System Number (ASN) of the system hosting the PEs.

    Router ID

    MPLS-TP source node identifier for this element in the form of an IPv4 address.

    Protection Mode

    Whether the transmitting endpoint is in revertive or nonrevertive mode:

    • Revertive—If the protection mode is revertive and a failed path is restored, the traffic automatically returns, or reverts, to the original path.
    • Nonrevertive—If the protection mode is nonrevertive and a failed path is restored, the traffic does not return to the original path. That is, the traffic does not revert to the original path.

    Redundancy Mode

    Level of redundancy for the MPLS-TP tunnel: 1:1, 1+1, or 1:N.

    MPLS-TP Tunnel Endpoints Tab

    ID

    Tunnel endpoint identifier as a Tunnel-tp interface on the selected network element.

    Tunnel ID

    Unique tunnel identifier.

    Admin Status

    Administrative status of the tunnel: Up or Down.

    Oper Status

    Operational status of the tunnel: Up or Down.

    Bandwidth (kbps)

    Configured bandwidth (in Kb/s) for the tunnel.

    Description

    Tunnel description.

    TP Enabled Links Tab

    Link ID

    Identifier assigned to the MPLS-TP interface.

    Interface

    Hyperlink to the interface in physical inventory.

    Next Hop

    IP address of the next hop in the path.

    LSP End Points Tab

    LSP ID

    LSP identifier, derived from both endpoint identifiers and using the format src-node-ID :: src-tunnel-number :: dest-node-ID :: dest-tunnel-number where:

    • src-node-ID represents the identifier of the node originating the signal exchange.
    • src-tunnel-number represents source tunnel identifier.
    • dest-node-ID represents the identifier of the target node.
    • dest-tunnel-number represents the destination tunnel identifier.

    LSP Type

    Indicates whether the LSP is active (Working) or backup (Protect).

    In Label

    Incoming label identifier.

    Out Label

    Outgoing label identifier.

    Out Interface

    Outgoing interface hyperlinked to the relevant entry in physical inventory.

    Bandwidth (kbps)

    Bandwidth specification in Kb/s.

    Role (Oper Status)

    Role of the LSP endpoint (Active or Standby) with the operational status (UP or DOWN).

    LSP Mid Points Tab

    LSP ID

    LSP identifier, derived from both endpoint identifiers and using the format src-node-ID :: src-tunnel-number :: dest-node-ID :: dest-tunnel-number where:

    • src-node-ID represents the identifier of the node originating the signal exchange.
    • src-tunnel-number represents source tunnel identifier.
    • dest-node-ID represents the identifier of the target node.
    • dest-tunnel-number represents the destination tunnel identifier.

    LSP Type

    Indicates whether the LSP is active (Working) or backup (Protect).

    Forward In Label

    Incoming label identifier in the forward direction (source to destination).

    Forward Out Label

    Label selected by the next hop device in the forward direction.

    Reverse In Label

    Incoming label identifier in the reverse direction (destination to source).

    Reverse Out Label

    Label selected by the next hop device in the reverse direction.

    Forward Out Interface

    Outgoing interface in the forward direction, hyperlinked to its entry in physical inventory.

    Forward Bandwidth (kbps)

    Bandwidth specification in Kb/s for the forward direction.

    Reverse Out Link ID

    Link identifier assigned to the outgoing interface in the reverse direction.

    Reverse Out Interface

    Outgoing interface in the reverse direction, hyperlinked to its entry in physical inventory.

    Reverse Bandwidth

    Bandwidth specification in Kb/s for the reverse direction.

    Internal ID

    Identifier associated with the parent entity of the link. Using an internal identifier ensures that individual LSP links do not participate in multiple network LSPs.

    Step 3blank.gif To view additional MPLS-TP tunnel endpoint properties, double-click the required entry in the MPLS-TP Tunnel Endpoints table.

    The MPLS-TP Tunnel Properties window is displayed as shown in Figure 17-6.

    Figure 17-6 MPLS-TP Tunnel Properties Window

     

    310768.tif

    Table 17-4 describes the information available in the top portion of the MPLS-TP Tunnel Properties window. For information about the tabs that are displayed, see Table 17-3 .

     

    Table 17-4 MPLS-TP Tunnel Properties Window

    Field
    Description

    Tunnel ID

    Unique tunnel identifier.

    Peer Tunnel ID

    Unique identifier of peer tunnel.

    Bandwidth (kbps)

    Configured bandwidth (in Kb/s) for the tunnel.

    Admin Status

    Administrative status of the tunnel: Up or Down.

    Oper Status

    Operational status of the tunnel: Up or Down.

    Local Info

    MPLS-TP source node identifier for this element in the form of an IPv4 address.

    Peer Info

    MPLS-TP peer node identifier in the form of an IPv4 address.

    Global ID

    Globally unique Attachment Interface Identifier (AII) for MPLS-TP derived from the Autonomous System Number (ASN) of the system hosting the PEs.

    Peer Global ID

    Globally unique AII for the peer.

    Working LSP Number

    Number assigned to the working LSP. By default, the working LSP number is 0 and the protected LSP number is 1.

    Protect LSP Number

    Number assigned to the protected LSP. By default, the working LSP number is 0 and the protected LSP number is 1.

    BFD Template

    BFD template associated with this MPLS-TP tunnel.

    Working LSP BFD State

    Configured state of the working LSP BFD template: Up or Down.

    Protect LSP BFD State

    Configured state of the protected LSP BFD template: Up or Down.

    Working LSP Fault OAM

    Indicates that a fault has been detected on the working LSP.

    Protect LSP Fault OAM

    Indicates that a fault has been detected on the protected LSP.

    Tunnel Name

    Tunnel name.

    Adjacent

    Hyperlink to the adjacent endpoint in logical inventory.


     

    Viewing LSPs Configured on an Ethernet Link

    A single Ethernet link can support a number of LSPs. The Vision client enables you to view all LSPs on a single Ethernet link and to identify the source and destination labels.

    To view LSPs configured on an Ethernet link:


    Step 1blank.gif In the map view, right-click the required link and choose Properties.

    Step 2blank.gif In the link properties window, choose the required Ethernet link.

    The link properties window refreshes and displays the Labels button as shown in Figure 17-7.

    Figure 17-7 Link Properties Window with All Labels Button

     

    283334.tif

    Step 3blank.gif Click Labels.

    The All Labels window is displayed as shown in Figure 17-8 with the LSP sources and destinations.

    Figure 17-8 All Labels Table

     

    283231.tif

    Step 4blank.gif To identify a specific path, click an outgoing label in the Source table. The corresponding in label is selected in the Destination table.


     

    Viewing MPLS-TE and P2MP-MPLS-TE links in a map

    Using the link filter available in Prime Network, you can view only the MPLS-TE and P2MP-MPLS-TE links in a map.

    note.gif

    Noteblank.gif The MPLS Point-to-Multipoint Traffic Engineering (P2MP TE) feature enables you to forward Multiprotocol Label Switching (MPLS) traffic from one source to multiple destinations.


    To view the MPLS-TE and P2MP-MPLS-TE links in a map:


    Step 1blank.gif Open the required map.

    Step 2blank.gif Click the Link filter icon in the navigation menu.

    Step 3blank.gif In the Link Filter window, select the MPLS-TE and P2MP MPLS-TE check boxes.

    Step 4blank.gif Click OK. The map refreshes and displays only the MPLS-TE and P2MP MPLS-TE links.

    Step 5blank.gif Right-click on the link and choose the Properties option.

    Step 6blank.gif In the Link Properties window, the type of link is displayed in the Link Type field, which can be either MPLS-TE and P2MP MPLS-TE based on the link that you have selected. Additional details about the link such as the MPLS TE tunnel, operational status of the tunnel, TE tunnel type are displayed in the Label Switching section. For more information about the Link Properties window, see Viewing LSPs Configured on an Ethernet Link.


     

    Viewing LSP Endpoint Redundancy Service Properties

    If an LSP endpoint in an MPLS-TP tunnel is configured for redundancy service, a redundancy service badge is applied to the secondary (backup) LSP endpoint in the navigation and map panes in the Vision client. Additional redundancy service details are provided in the LSP endpoint properties window and the inventory window for the element on which the MPLS-TP tunnel is configured.

    To view LSP endpoint redundancy service properties:


    Step 1blank.gif To determine if an LSP endpoint on an MPLS-TP tunnel is configured for redundancy service, expand the required MPLS-TP tunnel in the navigation or map pane.

    If the LSP endpoint is configured for redundancy service, the redundancy service badge is displayed in the navigation and map panes as shown in Figure 17-9.

    Figure 17-9 LSP Endpoint with Redundancy Service Badge

     

    285150.tif

    Step 2blank.gif To view properties for the LSP endpoint, navigate to and right-click the required endpoint in the map or navigation pane, and choose Properties.

    The LSP endpoint properties window is displayed as shown in Figure 17-10.

    Figure 17-10 LSP Endpoint Properties Window

     

    283679.tif

    Table 17-5 describes the information displayed in the LSP Endpoint Properties window.

     

    Table 17-5 LSP Endpoint Properties Window

    Field
    Description

    LSP Type

    Indicates whether the LSP is active (Working) or backup (Protected).

    LSP ID

    LSP identifier, derived from both endpoint identifiers and using the format src-node-ID :: src-tunnel-number :: dest-node-ID :: dest-tunnel-number where:

    • src-node-ID represents the identifier of the node originating the signal exchange.
    • src-tunnel-number represents source tunnel identifier.
    • dest-node-ID represents the identifier of the target node.
    • dest-tunnel-number represents the destination tunnel identifier.

    In Label

    Incoming label identifier.

    Out Label

    Outgoing label identifier.

    Bandwidth (kbps)

    Bandwidth specification in Kb/s.

    Out Link ID

    Link identifier assigned to the outgoing interface.

    Out Interface

    Outgoing interface hyperlinked to the relevant entry in physical inventory.

    Role (Oper Status)

    Role of the LSP endpoint (Active or Standby) with the operational status (UP or DOWN)

    Step 3blank.gif To view LSP endpoint redundancy status in inventory, double-click the element on which the MPLS-TP tunnel is configured.

    Step 4blank.gif Choose Logical Inventory > MPLS-TP > MPLS-TP Global > LSP End Points.

    Step 5blank.gif The LSP End Points tab contains the following information related to LSP redundancy service (see Figure 17-11):

      • Whether the LSP endpoint is Working or Protected.
      • The LSP endpoint role, either Active or Standby.
      • The operational status of the LSP endpoint, either Up or Down.

    Figure 17-11 LSP End Points Tab in Logical Inventory

     

    310718.tif


     

    Applying an MPLS-TP Tunnel Overlay

    You can select and display an overlay of a specific MPLS-TP tunnel on top of the devices displayed in a map view. The overlay is a snapshot of the network that visualizes the flows between the sites and tunnel peers. When an MPLS-TP tunnel is selected in the map, the following elements are highlighted in the map:

    • Elements on which TP endpoints and LSPs are configured.
    • Links that carry TP traffic.

    All elements and links that are not part of the MPLS-TP tunnel are dimmed.

    To apply an MPLS-TP tunnel overlay:


    Step 1blank.gif In the Vision client, display the network map on which you want to apply an overlay.

    Step 2blank.gif From the main toolbar, click Choose Overlay Type and choose MPLS-TP tunnel.

    The Select MPLS-TP tunnel Overlay dialog box is displayed.

    Step 3blank.gif Do one of the following:

      • Choose a search category, enter a search string, then click Go to narrow the search results to a range of MPLS-TP tunnels or a specific MPLS-TP tunnel. Search categories include:

    blank.gif Description

    blank.gif Name

    blank.gif System Name

    The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” the Vision client displays VPNs “net” and “NET” in the names whether net appears at the beginning, middle, or at the end of the name: for example, Ethernet.

      • Choose Show All to display all MPLS-TP tunnels.

    Step 4blank.gif Select the MPLS-TP tunnel overlay you want to apply to the map.

    The elements and links used by the selected MPLS-TP tunnel are highlighted in the network map, and the MPLS-TP tunnel name is displayed in the window title bar as shown in Figure 17-12.

    Figure 17-12 MPLS-TP Tunnel Overlay

     

    285155.tif


     

    note.gif

    Noteblank.gif An overlay is a snapshot taken at a specific point in time and does not reflect changes that occur in the service. As a result, the information in an overlay can become stale. To update the overlay, click Refresh Overlay in the main toolbar.


    Viewing VPNs

    Figure 17-13 shows a VPN displayed in the Vision client map view. In this example, the VPN is selected in the navigation pane, so the VPN details, such as virtual routers and IP interfaces, are not shown in the map view.

    Figure 17-13 VPN in Vision Map

     

    285172.tif

     

    1

    VPN in the navigation tree

    4

    VPN in the map view

    2

    Sites

    5

    VPN links

    3

    Virtual routers

    Figure 17-14 shows a VPN with details, including virtual routers and sites, in the Vision client map view.

    Figure 17-14 VPN in Vision Map with VRFs and Sites

     

    285171.tif

     

    1

    Virtual routers

    2

    Sites

    The the Vision client navigation pane displays the VPN business elements in a tree-and-branch representation. Each business element is represented by an icon in a color that reflects the highest alarm severity. The icon might also have a management state badge or alarm. For more information about icon severity colors and badges, see Interpreting the Badges and Colors of an NE.

    Table 17-6 shows the VPN icons in the Vision client map view.

    The highest level of the navigation pane displays the root or map name. The branches display the VPN and aggregated business elements as well as their names. The Layer 3 VPN sub-branch displays the virtual routers and sites contained in the VPN along with the names of the business elements. In addition, CE devices can be displayed in the Layer 2 and Layer 3 VPN sub-branches. If you select an aggregated business element in the navigation pane, the map view displays the business elements contained within the aggregated business element.

    Table 17-6 VPN Icons in Vision Map

    Icon
    Description

     

    253433.tif

    Root (map name) or aggregation

     

    154941.tif

    VPN

     

    253442.tif

    Virtual router

     

    253440.tif

    Site

    The the Vision client map view displays the VPN business elements and aggregated business elements loaded in the map view, along with the names of the business elements. In addition, the map view displays the VPN topology (between the virtual routers in the VPNs) and the topology and associations between other business elements. After you select the root in the navigation pane, the map view displays all the VPNs.

    The Vision client presents tickets related to the map in the ticket area, which allows you to view and manage the VPN tickets.

    Viewing Additional VPN Properties

    The Vision client allows you to select any element in the navigation pane or map view and view additional underlying properties. To view additional properties for an object, either double-click it or right-click it and choose Properties. Table 17-7 shows the additional properties available for VPN entities.

     

    Table 17-7 Displaying Additional VPN Properties

    Object
    Option
    For Additional Information

    VPN

    • Double-click a VPN to view the participating VRFs, sites, and network elements in the navigation pane and map view.
    • Right-click a VPN and choose Properties to view the VPN Properties window.

    Viewing VPN Properties

    VRF

    Double-click a VRF to view the VRF properties window.

    Viewing VRF Properties

    Site

    Double-click a site to view the IP Interface Properties window

    Viewing Site Properties

    Link

    Double-click a link to view the link properties window. The properties are dependent on the link type.

    Viewing and Managing Links

    Managing VPNs

    The following topics describe:

    Creating a VPN

    You can change business configurations by manually creating VPNs. The VPNs that are manually created do not contain virtual routers and sites.

    To create a VPN:


    Step 1blank.gif In the Vision client navigation pane, select the map root.

    Step 2blank.gif From the File menu, choose Add to Map > VPN > New.

    Step 3blank.gif In the Create VPN dialog box, enter the following:

      • Name—A unique name for the new VPN.
    note.gif

    Noteblank.gif VPN business element names are case sensitive.


      • Icon—To use a custom icon for the VPN, click the button next to the Icon field and navigate to the icon file.
    note.gif

    Noteblank.gif If a path is not specified to an icon, the default VPN icon is used (for more information about icons, see Table 17-6).


      • Description—(Optional) An additional VPN description.

    Step 4blank.gif Click OK.

    The new VPN is added to the VPN list in the Add VPN dialog box.


     

    For more information about loading the newly created VPN in the service view map, see Adding a VPN to a Map.

    Adding a VPN to a Map

    You can add a VPN to a map view if the VPN was previously created by a user or discovered by Prime Network and are not currently displayed in the map.

    note.gif

    Noteblank.gif Adding a VPN affects other users if they are working with the same map.


    To add an existing VPN to a map:


    Step 1blank.gif In the Vision client, display the map to which you want to add the VPN.

    Step 2blank.gif Do either of the following:

      • From the File menu, choose Add to Map > VPN > Existing.
      • In the main toolbar, click Add to Map, then choose Add to Map > VPN > Existing.

    The Add VPN dialog box is displayed.

    Step 3blank.gif Do either of the following:

      • Choose a search category, enter a search string, then click Go to narrow search results to a range of VPNs or a specific VPN. Search categories include:

    blank.gif Description

    blank.gif Name

    The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” the Vision client displays VPNs “net” and “NET” in the names whether net appears at the beginning, middle, or at the end of the name.

      • Choose Show All to display all the VPNs.

    Step 4blank.gif Select the VPN that you want to add to the map.

    tip.gif

    Tip Press Shift or Ctrl to choose multiple adjoining or nonadjoining VPNs.


    Step 5blank.gif Click OK.

    The VPN is displayed in the navigation pane and the selected map or subnetwork in the Vision client window content pane. In addition, any tickets are displayed in the ticket area.

    When a VPN service is added to a map, then a new link is available between the ethernet flow point that represents the pseudowire headend port and the site in the VPN to which it is connected.

    If your network has a L3VPN connected to a pseudowire via a PWHe, then EVC will also include the L3VPN in the EVC that contains the pseudowire.


     

    Removing a VPN from a Map

    You can remove one or more VPNs from the current active map. This change does not affect other maps. Removing a VPN from a map does not remove it from the Prime Network database. The VPN will appear in the Add VPN dialog box, so you can add it back to the map at any time.

    When removing VPNs from maps, keep the following in mind:

    • Removing a VPN affects other users if they are working with the same map view.
    • This option does not change the business configuration or database.
    • You cannot remove virtual routers or sites from the map without removing the VPN.

    To remove a VPN, in the Vision client pane or map view, right-click the VPN and choose Remove from Map.

    The VPN is removed from the map view along with all VPN elements, such as connected CE devices. Remote VPNs (extranets) are not removed.

    note.gif

    Noteblank.gif If the routing information changes after an overlay is applied, the changes do not appear in the current overlay. Click Refresh Overlay to update the routing information.


    Moving a Virtual Router Between VPNs

    You can move a virtual router (including its sites) from one VPN to another after you create a VPN and add it to the service view map.

    note.gif

    Noteblank.gif Moving a virtual router moves all of its sites as well.


    To move a virtual router:


    Step 1blank.gif In the Vision client navigation pane or map, right-click the virtual router and choose Edit > Move selected.

    Step 2blank.gif Right-click the required VPN in the navigation pane or map to where you want to move the virtual router and choose Edit > Move here.

    caut.gif

    Caution blank.gif Moving a virtual router from one VPN to another affects all users who have the virtual router loaded in their service view map.

    The virtual router and its sites are displayed under the selected VPN in the navigation pane and in the map.


     

    Working with VPN Overlays

    The following topics describe:

    Applying VPN Overlays

    You can select and display an overlay of a specific VPN on top of the devices displayed in a map view. The overlay is a snapshot of the network that visualizes the flows between the sites and tunnel peers. When one network VPN is selected in the network map, the PE routers, MPLS routers, and physical links that carry the LSP used by the VPN are highlighted in the network map. All the devices and links that are not part of the VPN are dimmed.

    The VPN service overlay allows you to isolate the parts of a network that are being used by a particular service. This information can then be used for troubleshooting. For example, the overlay can highlight configuration or design problems when bottlenecks occur and all the site interlinks use the same link.

    To apply a VPN overlay:


    Step 1blank.gif In the Vision client, display the network map on which you want to apply an overlay.

    Step 2blank.gif From the main toolbar, click Choose Overlay Type and choose VPN.

    The Select VPN Overlay dialog box is displayed.

    Step 3blank.gif Do one of the following:

      • Choose a search category, enter a search string, then click Go to narrow the search results to a range of VPNs or a specific VPN. Search categories include:

    blank.gif Description

    blank.gif Name

    The search condition is “contains.” Search strings are case-insensitive. For example, if you choose the Name category and enter “net,” the Vision client displays VPNs “net” and “NET” in the names whether net appears at the beginning, middle, or at the end of the name: for example, Ethernet.

      • Choose Show All to display all the VPNs.

    Step 4blank.gif Select the VPN overlay that you want to apply to the map.

    The PE routers, MPLS routers, and physical links used by the selected VPN are highlighted in the network map. The VPN name is displayed in the title of the window.


     

    note.gif

    Noteblank.gif An overlay is a snapshot taken at a specific point in time and does not reflect changes that occur in the service. As a result, the information in an overlay can become stale. To update the overlay, click Refresh Overlay in the main toolbar.


    Managing a VPN Overlay Display in the Map View

    After a VPN overlay is applied to a map, you can manage its display by using the overlay tools in the main toolbar:

    • To display the overlay, click Show Overlay on the main toolbar.
    • To hide an active overlay, click Hide Overlay on the main toolbar.
    note.gif

    Noteblank.gif The Show Overlay button is a toggle. When clicked, the overlay is displayed. When clicked again, the overlay is hidden.


    • To remove the VPN overlay, choose Show Overlay Type > None.


     

    Displaying VPN Callouts in a VPN Overlay

    You can display or hide the callouts for VPN links displayed in a VPN overlay to show the details of the sites that are interlinked through the selected links. The callouts (see Figure 17-15) enable you to view the VPN traffic links for a specific link (either bidirectional or unidirectional).

    note.gif

    Noteblank.gif The link must be displayed in the VPN overlay and not dimmed for you to display the link callouts.


    Figure 17-15 Callouts Window

     

    180256.tif

     

    1

    Link details and direction. In this example, the link is from P-North to PE-West.

    3

    Details of sites using the link and interlinks. In this example, the site PE-West is linked to all sites on PE-South.

    2

    Details of the sites using the link and interlinks. In this example, the site PE-88 is linked to site PE-West.

    4

    Link details and the direction. In this example, the link is from PE-West to P-North.

    To display or hide the callouts:


    Step 1blank.gif In the Vision client window, display the map view with the VPN overlay.

    Step 2blank.gif Right-click the required link in the map view and choose Show Callouts.

    Step 3blank.gif To hide the callouts, right-click the link in the map view that is displaying the callouts and choose Hide Callouts.


     

    Monitoring MPLS Services

    The following topics provide details for viewing MPLS services and technologies:

    Viewing VPN Properties

    To view the properties of a VPN:


    Step 1blank.gif In the Vision client navigation pane or map view, do either of the following:

      • If the VPN icon is of the largest size, click the Properties button.
      • Right-click the VPN and choose Properties.

    The VPN Properties window displays the following information:

      • Name—Name of the VPN.
      • ID—Unique identifier assigned to the VPN.

    Step 2blank.gif Click Close to close the VPN Properties dialog box.


     

    Viewing Site Properties

    The Vision client enables you to view site properties, including the interfaces that are configured on the PE device. The displayed properties reflect the configuration that Prime Network automatically discovered for the device.

    To view site properties, in the Vision client navigation pane or map view, right-click the required site and choose Properties.

    Table 17-8 describes the information that is displayed in the Router IP Interface Properties window:

     

    Table 17-8 Router IP Interface Properties Window for Sites

    Field
    Description

    Name

    Name of the site, such as FastEthernet4/1.252.

    State

    Interface state, either Up or Down.

    IP Address

    IP address of the interface.

    Mask

    Network mask.

    Interface Description

    Description applied to the interface.

    Associated Entity

    Element and interface associated with the site, hyperlinked to its entry in physical inventory.

    Addresses Table

    Subnet

    IP address and subnet mask.

    Note If the site is an IPv6 VPN over MPLS with IPv6 addresses provisioned, the IPv6 addresses are displayed. For more information, see Viewing IPv6 Information (6VPE).

    Type

    Address type, such as Primary, Secondary, or IPv6 Unicast.


     

    Viewing VRF Properties

    The Vision client enables you to view VRF properties, including the VRF route distinguisher, import and export route targets, and any provisioned sites and VRF routes.

    To view VRF properties, do either of the following in map view:

    • Double-click the element configured for VRFs.
    • Expand the required VPN and double-click the virtual router.

    The VRF properties window is displayed as shown in Figure 17-16.

    Figure 17-16 VRF Properties

     

    320068.tif

     

    The VRF Properties window contains the VRF routing table for the device. The table is a collection of routes that are available or reachable to all the destinations or networks in the VRF. The forwarding table also contains MPLS encapsulation information.

    Table 17-9 describes the information displayed in the VRF Properties window.

    note.gif

    Noteblank.gif The VRF Properties window only displays properties and attributes that are provisioned in the VRF. You might not see all the fields and tabs described in Table 17-9.


     

    Table 17-9 VRF Properties

    Field
    Description

    Route Distinguisher

    Route distinguisher configured in the VRF.

    Name

    VRF name.

    Associate VNI

    The Associated VNI field in the content pane displays the VXLAN ID associated with the VRF. You can click the link to go to the corresponding VNI row in the VNI Details pane.

    Description

    Description of the VRF.

    IPv4 Tab

    Export Route Targets

    IPv4 export route targets contained by the VRF.

    Import Route Targets

    IPv4 import route targets contained by the VRF.

    Route Maps

    Route maps for the VRF.

    IPv6 Tab

    Export Route Targets

    IPv6 export route targets contained by the VRF.

    Import Route Targets

    IPv6 import route targets contained by the VRF.

    Route Maps

    Route maps for the VRF.

    Routing Tables

    Destination

    Destination of the specific network.

    Prefix Length

    Length of the network prefix in bits.

    Next Hop

    Next routing hop.

    Outgoing Interface

    Name of the outgoing interface; displayed if the Routing Protocol type is local.

    Type

    Route type: Direct (local), Indirect, or Static.

    Routing Protocol

    Routing protocol used to communicate with the other sites and VRFs: BGP or local.

    BGP Next Hop

    Border Gateway Protocol (BGP) next hop. This is the PE address from which to continue to get to a specific address. This field is empty when the routing entry goes to the CE.

    Bottom In Label

    Innermost label that is expected when MPLS traffic is received.

    Bottom Out Label

    Innermost label sent with MPLS traffic.

    Outer Label

    Outermost or top label in the stack used for MPLS traffic.

    MRoute_Table

    Source Address

    The source IP address from where the multicast information is sent.

    Group Address

    The group IP address of the multicast.

    Flags

    The flag information pertaining to the multicast.

    Up Time

    The amount of time the interface has been active.

    Protocol

    The protocol information, which can be 4 or 6.

    Sites Tab

    Name

    Site name.

    IP Address

    IP address of the interface.

    Mask

    Subnet mask.

    State

    State of the subinterface: Up or Down.

    Associated Entity

    Element and interface associated with the site, hyperlinked to its entry in physical inventory.

    Description

    Interface description.

    Input Access List

    Access list applied to the inbound traffic.

    Output Access List

    Access list applied to the outbound traffic.

    Rate Limits

    If a rate limit is configured on an IP interface, the limit is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface, meaning the access list is a rate limit access list. IP interface traffic is measured and includes the average rate, normal burst size, excess burst size, conform action, and exceed action.

    Note Double-clicking a row displays the properties of the IP interface. When a rate limit is configured on the IP interface, the Rate Limits tab is displayed. For more information about rate limits, see Viewing Rate Limit Information.

    Note The Input Access, Output Access, and Rate Limits parameters apply only to certain operating systems, such as Cisco IOS.

    IP Sec Map Name

    IP Security (IPsec) map name.

    Site Name

    Name of the business element to which the interface is attached.

    Viewing VRF Multicast Configuration details

    To view global multicast configuration details for a VRF:


    Step 1blank.gif Right-click on the required device and select Inventory.

    Step 2blank.gif In the Inventory window, choose Logical Inventory > VRFs > vrf (where vrf is the required VRF) > IPV4VRF Multicast Configuration or IPV6VRF Multicast Configuration. The route policies configured on the device are displayed in the content pane.

    Table 17-10 describes the information that is displayed in the Router IP Interface Properties window:

     

    Table 17-10 Global Multicast Configuration Details

    Field
    Description

    VPN ID

    The VPN ID configured for the VRF.

    RoutePolicy

    The name of the multicast route policy.

    BgpAD

    The BgpAd enabled on the device.

    MdtSourceif

    The Multicast Distribution Tree (MDT) source interface.

    MdtPartioned

    The MDT partitioned permission.

    NSF

    The non-stop forwarding (NSF) information configured for the VRF.

    MdtAddress

    The MDT address.

    MdtData

    The MDT data that can be handled.

    Address Family

    The address family, which can be IPV4 or IPV6.

    RP Address

    The rendezvous point (RP) address configured for the VRF.


     

    Viewing VRF Egress and Ingress Adjacents

    The Vision client enables you to view the exporting and importing Neighbours by displaying the VRF egress and ingress adjacents. In addition, you can view the connectivity between the VRFs for the route targets and view their properties. For example, if VRF A retrieved route target import X, you can view all VRFs that export X as a route target whether it is in the same or another VPN.

    To display the VRF egress and ingress adjacents, you can use either an element configured for VRFs or a virtual router:

    • To use an element configured for VRFs:

    a.blank.gif Double-click the element configured for VRFs.

    b.blank.gif In the Inventory window, choose Logical Inventory > VRFs > vrf where vrf is the required VRF.

    c.blank.gif Right-click the required VRF and choose Show VRF Egress Adjacents or Show VRF Ingress Adjacents.

    • To use a virtual router, right-click the required VRF in the navigation pane, and choose Show VRF Egress Adjacents or Show VRF Ingress Adjacents.

    Table 17-11 describes the information displayed in the Adjacents window.

     

    Table 17-11 VRF Adjacents Properties Window

    Field
    Description

    Name

    VRF name.

    Route Distinguisher

    Route distinguisher configured in the VRF.

    VRF V6 Table

    IPv6 route distinguisher if IPv6 is configured.

    Viewing Routing Entities

    To view routing entities:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity.

    The routing information is displayed as shown in Figure 17-17.

    Figure 17-17 Routing Entity Table

     

    320065.tif

     

    Table 17-12 describes the information that is displayed in the Routing Entity table.

     

    Table 17-12 Routing Entity Table

    Field
    Description

    Name

    Name of the routing entity.

    IP Interfaces Tab

    Name

    Site name.

    IP Address

    IP address of the interface.

    Mask

    Network mask.

    State

    State of the subinterface: Up or Down.

    Associated Entity

    Interface associated with the routing entity, hyperlinked to its location in physical inventory.

    Description

    Description of the interface.

    Input Access List

    If an input access list is assigned to an IP interface, the list is shown as an IP interface property, and a hyperlink highlights the related access list in the Access List table. When an access list is assigned to the inbound traffic on an IP interface, the actions assigned to the packet are performed.

    VRRP Group

    If a VRRP group is configured on an IP interface, the information is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface.

    Note Double-clicking a row displays the properties of the IP interface. When a VRRP group is configured on an IP interface, the VRRP Groups tab is displayed in the IP Interface Properties window. For more information, see Viewing VRRP Information.

    Output Access List

    If an output access list is assigned to an IP interface, the list is shown as an IP interface property, and a hyperlink highlights the related access list in the Access List table. When an access list is assigned to the outbound traffic on an IP interface, the actions assigned to the packet are performed.

    Rate Limits

    If a rate limit is configured on an IP interface, the limit is shown as an IP interface property. This option is checked when a rate limit is defined on the IP interface, meaning the access list is a rate limit access list. IP interface traffic is measured and includes the average rate, normal burst size, excess burst size, conform action, and exceed action.

    Note Double-clicking a row displays the properties of the IP interface. When a rate limit is configured on the IP interface, the Rate Limits tab is displayed. For more information, see Viewing Rate Limit Information.

    Note The Input Access, Output Access, and Rate Limits parameters apply only to certain operating systems, such as Cisco IOS.

    IP Sec Map Name

    IP Security (IPsec) crypto map name.

    Site Name

    Name of the business element to which the interface is attached.

    IPv4 and IPv6 Routing Table Tabs

    Destination

    Destination of the specific network.

    Outgoing If Name

    Name of the outgoing interface.

    Type

    Routing type: Direct, Indirect, Static, Other, Invalid, or Unknown.

    Next Hop

    IP address from which to continue to get to a specific address. This field is empty when the routing entry goes to a PE router.

    Prefix Length

    Length of the network prefix in bits.

    Route Protocol Type

    Routing protocol used to communicate with other routers.

    IPv4 and IPv6 Multicast Routing Tabs

    Source Address

    The source IP address from where the multicast information is sent.

    Group Address

    The group IP address of the multicast.

    Flags

    The flag information pertaining to the multicast.

    Up Time

    The amount of time the interface has been active.

    Protocol

    The protocol information, which can be 4 or 6.

    IPv4 and IPv6 BGP Label Routing Table Tabs

    Destination

    Destination of the specific network

    Prefix Length

    Length of the network prefix in bits

    Next Hop

    Next routing hop

    Incoming Label

    Incoming BGP label identifier

    Outgoing Interfaces

    Name of the outgoing interface

    Outgoing label

    Outgoing label for the network.

    Type

    Route type: Direct (local), Indirect, or Static

    Routing Protocol

    Routing protocol used to communicate with the other sites: BGP


     

    Viewing IPv4 Label in BGP Routes

    The labeled BGP IPv4 (RFC 3107) enables BGP to distribute MPLS label along the routes it advertises. The label mapping information for a particular route is added in the same BGP update message that is used to distribute the route itself. The label mapping information is carried as a part of the Network Layer Reachability Information (NLRI) in the multiprotocol extension attributes. Hence, the use of any other label distribution protocol is eliminated.

    The outer label again identifies the LSP and the inner label identifies the MPLS service. In this case, the RFC 3107 edge device replaces the outer label with two labels, generating a three-label stack.

    In Prime Network, the IPv4 BGP Label Routing table displays incoming and outgoing labels. Path tracer follows a service that relies on RFC 3107 and it reflects the BGP label in the MPLS label stack.

    RFC3107 is supported on the following device types: ASR9K, ASR901, ASR903, and ME3600/3800X.

    To view the BGP label information:


    Step 1blank.gif Double-click the required element in the Vision client.

    Step 2blank.gif Choose Logical Inventory > Routing Entities > Routing Entity.

    Step 3blank.gif In the IPv4 BGP Label Routing table, view the details of incoming and outgoing labels.

    Table 17-13 describes the information in the IPv4 BGP Label Routing Table tab.

    Table 17-13 IPv4 BGP Label Routing Table Properties

    Field
    Description

    Destination

    Destination of the specific network

    Prefix Length

    Length of the network prefix in bits

    Next Hop

    Next routing hop

    Incoming Label

    Incoming BGP label identifier

    Outgoing Interfaces

    Name of the outgoing interface

    Outgoing label

    Outgoing label for the network.

    Type

    Route type: Direct (local), Indirect, or Static

    Routing Protocol

    Routing protocol used to communicate with the other sites: BGP

    Viewing the ARP Table

    To view the ARP table:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity > ARP.

    Table 17-14 describes the information that is displayed in the ARP table.

     

    Table 17-14 ARP Table

    Field
    Description

    MAC

    Interface MAC address.

    Interface

    Interface name.

    IP Address

    Interface IP address.

    State

    Interface state:

    • Dynamic—The entry was learned by the device according to network traffic.
    • Static—The entry was learned by a local interface or from a user configuring a static route.
    • Other—The entry was learned by another method not explicitly defined.
    • Invalid—In SNMP, this type is used to remove an ARP entry from the table.


     

    Viewing the NDP Table

    Neighbor Discovery Protocol (NDP) is used with IPv6 to discover other nodes, determine the link layer addresses of other nodes, find available routers, and maintain reachability information about the paths to other active Neighbour nodes.

    NDP functionality includes:

    • Router discovery
    • Autoconfiguration of addresses (stateless address autoconfiguration [SLAAC])
    • IPv6 address resolution (replaces Address Resolution Protocol [ARP])
    • Neighbour reachability (neighbour unreachability detection [NUD])
    • Duplicate address detection (DAD)
    • Redirection

    To view the NDP table:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity > ARP Entity.

    Step 3blank.gif Click the NDP Table tab.

    Figure 17-18 shows an example of the NDP Table tab.

    Figure 17-18 NDP Table in Logical Inventory

     

    310522.tif

    Table 17-15 describes the information displayed for NDP.

     

    Table 17-15 NDP Table

    Field
    Description

    MAC

    Interface MAC address.

    Interface

    Interface name.

    IP Address

    Interface IPv6 address.

    Type

    Entry type:

    • ICMP (Incomplete)—Address resolution is being performed on the entry. A Neighbour solicitation (NS) message has been sent to the solicited-node multicast address of the target, but the corresponding Neighbour advertisement (NA) message has not yet been received.
    • REACH (Reachable)—Positive confirmation was received via an NA that the forward path to the Neighbour was functioning properly. While in REACH state, the device takes no special action as packets are sent.
    • STALE—Too much time has elapsed since the last positive confirmation was received that the forward path was functioning properly. While in STALE state, the device takes no action until a packet is sent.
    • DELAY—Too much time has elapsed since the last positive confirmation was received that the forward path was functioning properly. If no reachability confirmation is received within a specified amount of time, the device sends an NS message and changes the state to PROBE.
    • PROBE—A reachability confirmation is actively sought by resending Neighbour solicitation messages until a reachability confirmation is received.


     

    Viewing Rate Limit Information

    To view rate limit information:


    Step 1blank.gif Right-click the required element in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > Routing Entities > Routing Entity.

    Step 3blank.gif In the IP Interfaces tab, double-click the required interface to view the IP interface properties. If a rate limit is configured on the IP interface, the Rate Limits tab is displayed.

    note.gif

    Noteblank.gif Rate Limit information applies only to certain operating systems, such as Cisco IOS.


    Table 17-16 describes the information that is displayed in the Rate Limits tab of the IP Interface Properties dialog box.

     

    Table 17-16 Rate Limits Information

    Field
    Description

    Type

    Rate limit direction, either Input or Output.

    Max Burst

    Excess burst size in bytes.

    Normal Burst

    Normal burst size in bytes.

    Bit Per Second

    Average rate in bits per second.

    Conform Action

    Action that can be performed on the packet if it conforms to the specified rate limit (rule), for example, continue, drop, change a bit, or transmit.

    Exceed Action

    Action that can be performed on the packet if it exceeds the specified rate limit (rule), for example, continue, drop, change a bit, or transmit.

    Access List

    Hyperlink that highlights the related access list in the Access List table.


     

    Viewing VRRP Information

    Virtual Router Redundancy Protocol (VRRP) is a non-proprietary redundancy protocol that is designed to increase the availability of the static default gateway servicing hosts on the same subnet. This increased reliability is achieved by advertising a virtual router (a representation of master and backup routers acting as a group) as a default gateway to the hosts instead of one physical router. Two or more physical routers are then configured to stand for the virtual router, with only one doing the actual routing at any given time. If the current physical router that is routing the data on behalf of the virtual router fails, another physical router automatically replaces it. The physical router that forwards data on behalf of the virtual router is called the master router; physical routers standing by to take over for the master router if needed are called backup routers.

    To view VRRP information:


    Step 1blank.gif Double-click the required element in the Vision client.

    Step 2blank.gif In logical inventory, choose Logical Inventory > Routing Entities > Routing Entity.

    Step 3blank.gif In the IP Interfaces tab, double-click the required interface to view the IP interface properties. If VRRP is configured on the IP interface, the VRRP Groups tab is displayed.

    Figure 17-19 VRRP Properties in IP Interface Properties Window

     

    310667.tif

    Table 17-17 describes the information in the VRRP Groups tab.

     

    Table 17-17 VRRP Group Properties

    Field
    Description

    Group Number

    Number of the VRRP group associated with the interface.

    Priority

    Value that determines the role each VRRP router plays and what happens if the master virtual router fails.

    Values are 1 through 254, with lower numbers having priority over higher numbers.

    Master IP Address

    IP address of the VRRP group, taken from the physical Ethernet address of the master virtual router.

    Admin State

    Administrative status of the VRRP group: Up or Down.

    Operation State

    State of the VRRP group: Master or Backup.

    Preempt Mode

    Whether or not the router is to take over as the master virtual router for a VRRP group if it has a higher priority than the current master virtual router: Enabled or Disabled.

    Virtual IP Address

    IP address of the virtual router.

    Virtual MAC Address

    MAC address of the virtual router.

    Advertisement Interval

    Amount of time (in seconds) between successive advertisements by the master virtual router.


     

    Viewing Label Switched Entity Properties

    Logical inventory can display any or all of the following tabs for label switched entities, depending on the configuration:

    • Label Switching Table—Describes the MPLS label switching entries used for traversing MPLS core networks.
    • LDP Neighbours—Details all MPLS interface peers that use the Label Distribution Protocol (LDP). LDP enables Neighbouring provider (P) or PE routers acting as label switch routers (LSRs) in an MPLS-aware network to exchange label prefix binding information, which is required to forwarding traffic. The LSRs discover potential peers in the network with which they can establish LDP sessions in order to negotiate and exchange the labels (addresses) to be used for forwarding packets.

    Two LDP peer discovery types are supported:

    blank.gif Basic discovery—Used to discover directly connected LDP LSRs. An LSR sends hello messages to the all-routers-on-this-subnet multicast address, on interfaces for which LDP has been configured.

    blank.gif Extended discovery—Used between indirectly connected LDP LSRs. An LSR sends targeted hello messages to specific IP addresses. Targeted sessions are configured because the routers are not physically connected, and broadcasting would not reach the peers. The IP addresses of both peers are required for extended discovery.

    If two LSRs are connected with two separate interfaces, two LDP discoveries are performed.

    • MPLS Interfaces—Contains information on MPLS interfaces and whether traffic engineering tunnels are configured on an interface.
    • MPLS Label Range—Identifies whether MPLS uses static or dynamic routing, and the label range.
    • Traffic Engineering LSPs—Describes the MPLS traffic engineering Label Switched Paths (LSPs) provisioned on the switch entity. MPLS traffic engineering LSP, an extension to MPLS TE, provides flexibility when configuring LSP attributes for MPLS TE tunnels.
    • VRF Table—Describes MPLS paths that terminate locally at a VRF.

    To view information for label switched entities:


    Step 1blank.gif Double-click the required device in the Vision client.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > LSEs > Label Switching.

    Table 17-18 describes the information that is displayed for label switched entities.

     

    Table 17-18 Label Switching Properties in Logical Inventory

    Field
    Description

    Local LDP ID

    Local Label Distribution Protocol (LDP) identifier.

    LDP Process State

    State of the LDP process, such as Running, Down, or Unknown.

    MPLS Interfaces

    ID

    Identifier for MPLS interface, as a combination of IP address and interface name.

    Distribution Protocol Type

    Distribution protocol used: Null, LDP, TDP (Tag Distribution Protocol), RSVP, or TDP and LDP.

    MPLS TE Properties

    Whether or not traffic engineering (TE) properties are configured on the interface:

    • Checked—MPLS TE properties are configured on the interface.
    • Unchecked—MPLS TE properties are not configured on the interface.

    Discovery Protocols

    Discovery protocols used on the interface.

    Label Switching Table

    Incoming Label

    Incoming MPLS label identifier.

    Action

    Type of switching action: Null, Pop, Swap, Aggregate, Untagged, or Act. If an action is defined as Pop, an outgoing label is not required. If an action is defined as Untagged, an outgoing label is not present.

    Outgoing Label

    Outgoing label.

    Out Interface

    Name of the outgoing interface, displayed as a hyperlink to the port subinterface in physical inventory.

    IP Destination

    Destination IP address.

    Destination Mask

    Subnet mask of the destination.

    Next Hop

    IP address of the next hop in the path. The IP address is used for resolving the MAC address of the next MPLS interface that you want to reach.

    VRF Table

    Incoming Label

    Incoming VRF label identifier.

    Action

    Type of switching action: Null, Pop, Swap, Aggregate, Untagged, or Act.

    VRF

    VRF name, hyperlinked to its location in logical inventory.

    IP Destination

    Destination IP address.

    Destination Mask

    Subnet mask of the destination.

    Next Hop

    IP address of the next hop in the path. The IP address is used for resolving the MAC address of the next MPLS interface that you want to reach.

    Out Interface

    Name of the outgoing interface, displayed as a hyperlink to the port subinterface in physical inventory.

    Traffic Engineering LSPs

    LSP Name

    Label switched path (LSP) name.

    LSP Type

    Segment type: Head, Midpoint, or Tail.

    Source Address

    Source IP address.

    Destination Address

    Destination IP address.

    In Label

    Incoming label, if not a head segment.

    In Interface

    Incoming interface, if not a head segment.

    Out Interface

    Outgoing interface, if not a tail segment.

    Out Label

    Outgoing label, if not a tail segment.

    Average Bandwidth (Kbps)

    Current bandwidth (in Kb/s) used to automatically allocate the tunnel’s bandwidth.

    LSP ID

    LSP identifier.

    Burst (Kbps)

    Tunnel bandwidth burst rate, in Kb/s.

    Peak (Kbps)

    Tunnel bandwidth peak rate, in Kb/s.

    FRR TE Tunnel

    Fast Reroute (FRR) TE tunnel name, hyperlinked to the routing entity in logical inventory.

    FRR TE Tunnel State

    State of the FRR TE tunnel:

    • Active—A failure exists in the primary tunnel and the backup is in use.
    • Not Configured—The primary tunnel has no designated backup tunnel.
    • Ready—The primary tunnel is in working condition.
    MPLS Label Range

    MPLS Label Type

    Type of MPLS label: Dynamic or Static.

    Minimum Label Value

    Lowest acceptable MPLS label in the range.

    Maximum Label Value

    Highest acceptable MPLS label in the range.

    LDP Neighbours

    LDP ID

    Identifier of the LDP peer.

    Transport IP Address

    IP address advertised by the peer in the hello message or the hello source address.

    Session State

    Current state of the session: Transient, Initialized, Open Rec, Open Sent, or Operational.

    Protocol Type

    Protocol used by the peer to establish the session: LDP, TDP, or Unknown.

    Label Distribution Method

    Method of label distribution: Downstream, Downstream On Demand, Downstream Unsolicited, or Unknown.

    Session Keepalive Interval

    Length of time (in milliseconds) between keepalive messages.

    Session Hold Time

    The amount of time (in milliseconds) that an LDP session can be maintained with an LDP peer, without receiving LDP traffic or an LDP keepalive message from the peer.

    Discovery Sources

    Whether the peer has one or more di scovery sources:

    • Checked—Has one or more discovery sources.
    • Unchecked—Has no discovery sources.

    Note To see the discovery sources in the LDP Neighbor Properties window, double-click the row of the peer in the table.

    Step 3blank.gif Double-click an entry in any of the tables to view additional properties for that entry.

     

    Table 17-19 Additional Properties Available from Label Switching in Logical Inventory

    Double-click an entry in this tab...
    To display this window...

    Label Switching Table

    Label Switching Properties

    LDP Neighbors

    LDP Peer Properties

    MPLS Interfaces

    MPLS Link Information - MPLS Properties

    MPLS Label Range

    MPLS Label Range Properties

    Traffic Engineering LSPs

    Tunnel Properties

    VRF Table

    MPLS Aggregate Entry Properties


     

    Multicast Label Switching (mLADP)

    Multicast Label Distribution protocol (mLDP) provides extensions to the Label Distribution Protocol (LDP) for the setup of point-to-multipoint (P2MP) and multipoint-to-multipoint (MP2MP) Label Switched Paths (LSPs) in MPLS networks. A P2MP LSP allows traffic from a single root (or ingress) node to be delivered to a number of leaf (or egress) nodes.

    A MP2MP LSP allows traffic from multiple ingress nodes to be delivered to multiple egress nodes. Only a single copy of the packet will be sent on any link traversed by a multipoint LSP. Container is the holder of MPLS MLDP databases and neighbors instances for Multicast.

    Viewing MLDP Database Information

    To view the MLDP database information:


    Step 1blank.gif Double-click the required device in the Vision client.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > LSEs > Label Switching > Multicast Label Switching > Databases. The database information is displayed in the MLDP Databases content pane.

    Step 3blank.gif Select a database from the content pane, right-click and choose the Properties option. The MLDP Database Properties dialog box is displayed. You can click on the tabs to view more details.

    Table 17-20 describes the information that is displayed for MLDP Database Properties dialog box.

     

    Table 17-20 MLDP Database Properties Dialog Box

    Field
    Description

    LSM ID

    The unique ID assigned to a LSP.

    Tunnel Type

    The tunnel type.

    FEC Root

    The root IP address of the MDT.

    Opaque Value

    The stream information that uniquely identifies the tree to the root.

    To receive label switched multicast packets, the Egress Provider Edge (PE) indicates to the upstream router (the next hop closest to the root) which label it uses for the multicast source by applying the label mapping message.

    Is Root

    Indicates whether Forwarding Equivalence Class (FEC) is the root.

    Downstream Clients Tab

    Egress Interface Name

    The egress interface name.

    Associated Entity

    The entity associated with the LSP. Click this link to view the associated entity details.

    Uptime

    The amount of time from when the interface is active.

    Table ID

    The unique Table ID of the label through which the packet was received.

    Ingress State

    The status of the ingress interface, which can be Enabled or Disabled.

    PPMP State

    The status of the Point-to-Point Multipoint, which can be Enabled or Disabled.

    Local Label

    The label used to identify the label stack of the route within the local VPN network.


     

    Viewing the MLDP Neighbors Information

    To view information of MLDP neighbors:


    Step 1blank.gif Double-click the required device in the Vision client.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > LSEs > Label Switching > Multicast Label Switching > MLDP Neighbors. The MLDP peer information is displayed in the MLDP Peers content pane.

    Step 3blank.gif Select a peer id from the content pane, right-click and choose the Properties option. The Peer ID Properties dialog box is displayed.

    Table 17-21 describes the information that is displayed for Peer ID Properties dialog box.

     

    Table 17-21 Peer ID Properties Dialog Box

    Field
    Description

    Peer ID

    The IP address of the MLDP peer.

    Capabilities

    The capabilities supported by the LDP LSR.

    MLDP GR

    Indicates whether graceful restart is enabled for the LDP.

    Note LDP graceful restart provides a control plane mechanism to ensure high availability and allows detection and recovery from failure conditions while preserving Non Stop Forwarding (NSF) services.

    Path Count

    The number of LSP’s configured.

    Uptime

    The amount of time from when the peer id is working.

    Peer Paths tab

    IP Address

    The IP address of the MLDP peer.

    Interface Name

    The interface name.

    Associated Entity

    The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node.

    Protocol

    The protocol type used for communication.

    Peer Adjacent List

    IP Address

    The IP address of the MLDP peer.

    Interface Name

    The interface name.

    Associated Entity

    The link to the associated entity, which when clicked will highlight the associated Default routing entity record under the Routing Entity node.


     

    Viewing BGP Neighbor Service Alarm with VRF Name

    BGP neighbor loss VRF due to oper and BGP neighbor found service alarms are raised on the BGP links for any mis-configurations that shuts down physical interfaces or any other scenario that might break the BGP neighborship. If a BGP neighbor service alarm is configured with the VRF, the VRF name is displayed as part of the Location links for a BGP neighbor loss VRF due to oper and BGP neighbor found service alarms. For example, Figure 17-20 shows the BGP neighbor service alarms displayed with the VRF Name.

    Figure 17-20 Service Alarm with VRF Name

     

    417157.tif

     

    To view the VRF details, click the links available in the Location field. For example, the following figure 17-21, shows a link properties of a BGP Service alarm with VRF Name.

    Figure 17-21 Link Properties with VRF Information

     

    417158.tif

    Viewing MP-BGP Information

    The MP-BGP branch displays information about a router’s BGP neighbors and cross-connect VRFs.

    note.gif

    Noteblank.gif If there are multiple MP-BGP links between two devices, the Vision client displays each link in the content pane map view.


    To view MP-BGP information:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > MPBGPs > MPBGP.

    Table 17-22 describes the information that is displayed for MP-BGP.

     

    Table 17-22 MP-BGP Information in Logical Inventory

    Field
    Description

    Local AS

    Identifier of the autonomous system (AS) to which the router belongs.

    BGP Identifier

    BGP identifier, represented as an IP address.

    Cross VRFs Tab

    VRF Name

    Name of the VRF.

    Cross VRF Routing Entries

    Group of cross VRFs that share a single destination.

    BGP Neighbors Tab

    Peer AS

    Identifier of the AS to which the remote peer belongs.

    Peer State

    State of the remote peer: Active, Connect, Established, Open Confirm, Open Sent, or Null.

    Peer Address

    Remote peer IP address.

    AFI

    Address family identifier: IPv4, IPv6, L2VPN, VPNv4, or VPNv6.
    Address Type identifier: Unicast, Multicast, Labeled-unicast, Vpls, MDT, EVPN.

    AF Peer State

    Address family peer state: Established or Idle.

    Peer Up/Down Since

    Specifies a BGP Peer Up/Down time property.

    Note Use Poll Now to view the latest value.

    Peer BGP ID

    Identifier of the remote peer, represented as an IP address.

    Local BGP ID

    Local peer IP address.

    VRF Name

    Remote peer VRF name.

    BGP Neighbor Type

    Neighbor type: Null, Client, or Non Client.

    Hold Time (secs)

    Established hold time in seconds.

    Keepalive (secs)

    Established keepalive time in seconds.

    BGP Neighbor Entry

    BGP neighbor IP address.


     

    Viewing 6rd Tunnel Properties

    IPv6 rapid deployment (6rd) is a mechanism that allows stateless tunneling of IPv6 over IPv4. For information on the devices that support 6rd, refer to Cisco Prime Network 5.2 Supported VNEs.

    To view 6rd tunnel properties:


    Step 1blank.gif In the Vision client, double-click the required device.

    Step 2blank.gif In the Inventory window, choose Logical Inventory > 6rd Tunnels.

    The 6rd tunnel properties are displayed as shown in Figure 17-22.

    Figure 17-22 6rd Tunnel Properties in Logical Inventory

     

    310668.tif

    Table 17-23 describes the information displayed for 6rd tunnels.

     

    Table 17-23 6rd Tunnel Properties in Logical Inventory

    Field
    Description

    Tunnel Name

    6rd tunnel name.

    IPv6 Prefix

    IPv6 prefix used to translate the IPv4 address to an IPv6 address.

    Source Address

    Tunnel IPv4 source IP address.

    Tunnel SubMode

    Tunnel type:

    • 6rd—Static IPv6 interface.
    • 6to4—IPv6 address with the prefix embedding the tunnel source IPv4 address.
    • Auto-tunnel—IPv4-compatible IPv6 tunnel.
    • ISATAP—Overlay tunnel using an Intra-Site Automatic Tunnel Addressing Protocol (ISATAP) address.

    Prefix Length

    IPv4 prefix length used to derive the delegated IPv6 prefix.

    Suffix Length

    IPv4 suffix length used to derive the delegated IPv6 prefix.

    MTU

    Maximum transmission unit (MTU) configured on the 6rd IPv4 tunnel.


     

    Viewing BFD Session Properties

    Bidirectional Forwarding Detection (BFD) is used to detect communication failures between two elements, or endpoints, that are connected by a link, such as a virtual circuit, tunnel, or LSP. BFD establishes sessions between the two endpoints over the link. If more than one link exists, BFD establishes a session for each link.

    Prime Network supports BFD with the following protocols: BGP, IPv4 (static), IPv6 (static), IS-IS, LAG (Ether channel), MPLS TE, MPLS-TP, and OSPF.

    To view BFD session properties that are configured on an element:


    Step 1blank.gif In the Vision client, double-click the required device.

    Step 2blank.gif In the Inventory window, choose Logical Inventory > Bidirectional Forwarding Detection.

    The properties for BFD sessions are displayed as shown in Figure 17-23.

    Figure 17-23 BFD Session Properties

     

    310716.tif

    Table 17-24 describes the information displayed for BFD sessions.

     

    Table 17-24 BFD Session Properties

    Field
    Description

    Process

    Process name, such as Bidirectional Forwarding Detection.

    Process State

    Process state, such as Running.

    BFD Sessions Table

    Source IP

    Source IP address of the session.

    Destination IP

    Destination IP address of the session.

    State

    Session state, such as Up or Down.

    Interface

    Interface used for BFD communications, hyperlinked to the routing entity in logical inventory.

    Registered Protocols

    Routing protocol being monitored for communication failures, such as BGP or OSPF.

    For MPLS-TP BFD sessions, the information in Table 17-25 is displayed.

     

    Table 17-25 MPLS-TP BFD Session Properties in Logical Inventory

    Field
    Description

    Process

    Process name: Bidirectional Forwarding Detection.

    Process State

    Process state, such as Running.

    MPLS-TP BFD Sessions Table

    Interface

    Interface used for BFD communications, hyperlinked to the routing entity in logical inventory.

    LSP Type

    Type of LSP: Working or Protected.

    State

    Session state: Up or Down.

    Registered Protocols

    Routing protocol being monitored for communication failures: MPLS-TP.

    Step 3blank.gif To view additional properties, double-click the required entry in the Sessions table.

    Table 17-26 describes the information that is displayed in the Session Properties window.

    Table 17-26 Session Properties Window

    Field
    Description

    Source IP

    Source IP address of the session.

    Destination IP

    Destination IP address of the session.

    State

    Session state: Up or Down.

    Interface

    Hyperlink to the routing entity in logical inventory.

    Registered Protocols

    Routing protocol being monitored for communication failures.

    Offload Host

    BFD offload property: Software (applicable when configuring BFD on BVI interface).

    Displays BFD session hosted in software.

    Protocols Table

    Protocol

    Protocol used for this session.

    Interval

    Length of time (in milliseconds) to wait between packets that are sent to the neighbor.

    Multiplier

    Number of times a packet is missed before the neighbor is declared down.

    BFD Single-Hop Authentication

    The BFD Single-Hop Authentication feature enables authentication for single-hop Bidirectional Forwarding Detection (BFD) sessions between two directly connected devices. This feature supports Message Digest 5 (MD5) and Secure Hash Algorithm 1 (SHA-1) authentication types. The BFD templates can be configured only if the BFD sessions are enabled.

    BFD Templates Support

    BFD (Bidirectional Forwarding Detection Templates) are the new features added in CPT devices. Prime Network uses the below Telnet or CLI Command to get the BFD templates in existing CPT devices.

    Show running-config|section bfd-template

    Cerent Trap Support

    Cerent traps are alarms supported for CPT devices. There are 170 traps supported.There are various kinds of traps supported which are listed below:

    • Communications
    • Equipment
    • Environmental
    • Integrity Violation
    • Quality of Service

    The alarms can be categorized by their severity such as Critical, Major, Minor, Not Reported and Not Alarmed. Examples of each severity categories are as follows:

    • Critical- Equipment failure
    • Major- High Voltage, Battery Failure
    • Minor- Loss of frame, Loss of signal
    • Not Reported- Unqualified PPM Inserted
    • Not Alarmed- Transit Node Clock Traceable

    Change Settings in Cisco Transport Controller (CTC)

    Any configurations settings made in CPT should be done through CTC. To receive traps in a particular server, that server IP needs to be entered in the device through CTC. Most of the traps are on device dependencies.

    CMP Tool

    The default trap format can be used to send the alarms through CMP tool which can be generated in Prime Network. The default trap format is given as follows:

    <key name="trap"><key name=""><entry name="">sendtrap -V2 10.105.39.217 -ccellbus -r162 -o1.3.6.1.2.1.1.3.0 -mt1166470595 -o1.3.6.1.6.3.1.1.4.1.0 -md1.3.6.1.4.1.3607.6.10.30.0.1670 -o1.3.6.1.4.1.3607.6.10.100.10.20 -mo03/Nov/2001 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.80.1.1670 -mi50 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.20.1.1670 -mi50 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.60.1.1670 -mi1 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.30.1.1670 -mi0 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.40.1.1670 -mi1 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.50.1.1670 -mi0 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.100.1.1670 -md1.3.6.1.4.1.3607.6.10.30.0.2110 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.120.1.1670 -mi30 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.130.1.1670 -mi10 -o1.3.6.1.4.1.3607.6.10.20.30.20.1.140.1.1670 -mi10 -o1.3.6.1.6.3.18.1.3.0 -ma10.104.120.46</entry></key></key>

    Link and Port Parameters

    The link and port parameters are scripts which can be navigated from Device->Port->Interface-> right click Commands->Configuration->Scripts. The link and port parameters are supported for the following auto populated UI attributes:

    Ethernet Parameter Configuration

    • MTU
    • Link State
    • Expected Speed
    • Expected Duplex
    • Operating Flow Control
    • Carrier Delays
    • Auto Negotiation

    Port Parameter Configuration

    • Port Name
    • Admin State
    • AINS Soak
    • Reach
    • Wavelength

    L2 Parameter Configuration

    • CDP
    • DOTIX
    • DTP
    • LACP
    • PAGP
    • VTP
    • STP

    The following are the configuration scripts supported,

    • Add Loopback
    • Remove Loopback
    • Configure CDP
    • Configure Ethernet
    • Configure L2 Control Protocol
    • Configure Port Parameters
    • Show Ethernet Parameters
    • Show L2 Control Parameters
    • Show Port Parameters

    Viewing Configuration Scripts in Prime Network

    Add Loopback

    To view the Add Loopback script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Add Loopback

    Step 4blank.gif Select the value Loopback from the Attribute combo box.

    Step 5blank.gif Click on Execute Now button.

    Step 6blank.gif Verify if Loopback is successfully added.


     

    Remove Loopback

    To view the Remove Loopback script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Remove Loopback

    Step 4blank.gif Click on Execute Now button.

    Step 5blank.gif Verify if Loopback is successfully removed.


     

    Configure CDP

    To view the Configure CDP script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Configure CDP

    Step 4blank.gif Select the value CDP from the Attribute combo box.

    Step 5blank.gif Click on Execute Now button.

    Step 6blank.gif Verify if CDP is successfully configured.


     

    Configure Ethernet

    To view the Configure Ethernet script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Configure Ethernet

    Step 4blank.gif Select the value Admin Status from the Attribute combo box.

    Step 5blank.gif Click on Execute Now button.

    Step 6blank.gif Verify if Ethernet is successfully configured.


     

    Configure L2 Control Protocol

    To view the Configure L2 Control Protocol script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Configure L2 Control Protocol

    Step 4blank.gif Select the value STP from the Attribute combo box.

    Step 5blank.gif Click on Execute Now button.

    Step 6blank.gif Verify if L2 Control Protocol is successfully configured.


     

    Configure Port Parameters

    To view the Configure Port Parameters script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Configure Port Parameters

    Step 4blank.gif Select the value Reach from the Attribute combo box.

    Step 5blank.gif Click on Execute Now button.

    Step 6blank.gif Verify if Port Parameters are successfully added.


     

    Show Port Parameters

    To view the Show Port Parameters script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Show Port Parameters

    Step 4blank.gif Click on Execute Now button.

    Step 5blank.gif Verify if all Port Parameters are listed.


     

    Show Ethernet Parameters

    To view the Show Ethernet Parameters script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Show Ethernet Parameters

    Step 4blank.gif Click on Execute Now button.

    Step 5blank.gif Verify if Show Ethernet Parameters are listed.


     

    Show L2 Control Parameters

    To view the Show L2 Control Parameters script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Show L2 Control Parameters.

    Step 4blank.gif Click on Execute Now button.

    Step 5blank.gif Verify if all L2 Control Parameters are listed.


     

    Show Configure Ethernet

    To view the Show Configure Ethernet script:


    Step 1blank.gif Model the device in Cisco Prime Network Administration.

    Step 2blank.gif Launch the Cisco Prime Network Vision client and choose Inventory

    Step 3blank.gif In the physical inventory window, choose Physical inventory >IPortConnector >Commands > Configuration >Show Configure Ethernet

    Step 4blank.gif Click on Execute Now button.

    Step 5blank.gif Verify if all the configured Ethernets are listed.


     

    Viewing Cross-VRF Routing Entries

    Cross-VRF routing entries display routing information learned from the BGP neighbors (BGP knowledge base).

    To view properties for cross-VRF routing entries:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > MPBGPs > MPBGP.

    Step 3blank.gif Click the Cross VRFs tab.

    Step 4blank.gif Double-click the required entry in the list of cross-VRFs.

    The Cross VRF Properties window is displayed, containing the information described in Table 17-27 .

     

    Table 17-27 Cross-VRF Properties Window

    Field
    Description

    Name

    Cross-VRF name.

    Cross VRF Routing Entries Table

    Destination

    IP address of the destination network.

    Prefix

    Length of the network prefix in bits.

    Next Hop

    IP address of the next hop in the path.

    Out Going VRF

    Outgoing VRF identifier, hyperlinked to its entry in logical inventory.

    Out Tag

    Outgoing virtual router tag, such as 50 or no tag.

    In Tag

    Incoming virtual router tag, such as 97 or no tag.


     

    Viewing Pseudowire End-to-End Emulation Tunnels

    The Pseudowires branch in logical inventory displays a list of the Layer 2 tunnel edge properties (per edge), including tunnel status and VC labels.

    To view pseudowire properties:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > Pseudowires.

    The Tunnel Edges table is displayed and contains the information described in Table 17-28 .

     

    Table 17-28 Pseudowires Branch Tunnel Edges Table

    Field
    Description

    Local Interface

    Name of the subinterface or port.

    Strings, such as Aggregation Group, EFP, VLAN, and VSI, are included in the interface name, and the entry is hyperlinked to the relevant entry in logical or physical inventory:

    • Aggregation groups are linked to Ethernet Link Aggregation in logical inventory.
    • ATM interfaces are linked to the port in physical inventory and the ATM interface.
    • ATM VCs are linked to the port in physical inventory and the Port IP Properties table.
    • CEM groups are linked to the port in physical inventory and the CEM Group table.
    • EFPs are linked to the port in physical inventory and the EFPs table.
    • IMA groups are linked to IMA Groups in logical inventory.
    • Local switching entities are linked to Local Switching Entity in logical inventory.
    • VLANs are linked to Bridges in logical inventory.
    • VSIs are linked to the VSI entry in logical inventory.

    VC ID

    Tunnel identifier, hyperlinked to the PTP Layer 2 MPLS Tunnel Properties window.

    SAII

    Specifies the Source Access Individual Identifier (SAII) of the tunnel.

    note.gif

    Noteblank.gif The SAII attribute can be configured only if the Pseudowire type is FEC129 TYPE II.


    TAII

    Specifies the Target Attachment Individual Identifier (TAII) of the tunnel.

    note.gif

    Noteblank.gif The TAII can be configured only if the Pseudowire type is FEC129 TYPE II.


    Pseudowire Type

    Type of pseudowire, such as Ethernet, Ethernet Tagged, CESoPSN Basic, PPP, SAToP or FEC129 TYPE II.

    Peer

    Details of the selected peer, hyperlinked to the peer pseudowire tunnel in logical inventory.

    Status

    Operational state of the tunnel: Up or Down.

    Pseudowire Role

    If the pseudowire is in a redundancy configuration, indicates whether its role is as the primary or secondary pseudowire in the configuration.

    If the pseudowire is not configured for redundancy, this field is blank.

    Preferred Path Tunnel

    Path to be used for MPLS pseudowire traffic.

    Local Router IP

    IP address of this tunnel edge, which is used as the MPLS router identifier.

    Peer Router IP

    IP address of the peer tunnel edge, which is used as the MPLS router identifier.

    Local MTU

    Size, in bytes, of the MTU on the local interface.

    Remote MTU

    Size, in bytes, of the MTU on the remote interface.

    Local VC Label

    MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the local router.

    Peer VC Label

    MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the peer router.

    Signaling Protocol

    Protocol used by MPLS to build the tunnel, for example, LDP or TDP.

    Peer Status

    Status of the peer link.

    Associated EVC Name

    Specifies the name of the associated Ethernet Virtual Circuits (EVC)


     

    Viewing MPLS TE Tunnel Information

    Prime Network automatically discovers MPLS TE tunnels and enables you to view MPLS TE tunnel information in inventory.

    To view MPLS TE tunnel information:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the logical inventory window, choose Logical Inventory > Traffic Engineering Tunnels.

    Table 17-29 describes the information that is displayed in the Tunnel Edges table.

     

    Table 17-29 Tunnel Edges Table

    Field
    Description

    Name

    Name of the TE tunnel; for Cisco devices it is the interface name.

    Tunnel Type

    Whether the tunnel is Point-to-Point or Point-to-Multipoint.

    Tunnel Destination

    IP address of the device in which the tunnel ends.

    Administrative Status

    Administrative state of the tunnel: Up or Down.

    Operational Status

    Operational state of the tunnel: Up or Down.

    Outgoing Label

    TE tunnel’s MPLS label distinguishing the LSP selection in the next device.

    Description

    Description of the tunnel.

    Outgoing Interface

    Interface through which the tunnel exits the device.

    Bandwidth (KBps)

    Bandwidth specification for this tunnel in Kb/s.

    Setup Priority

    Tunnel priority upon path setup.

    Hold Priority

    Tunnel priority after path setup.

    Affinity

    Tunnel preferential bits for specific links.

    Affinity Mask

    Tunnel affinity bits that should be compared to the link attribute bits.

    Auto Route

    Whether or not destinations behind the tunnel are routed through the tunnel: Enabled or disabled.

    Lockdown

    Whether or not the tunnel can be rerouted:

    • Enabled—The tunnel cannot be rerouted.
    • Disabled—The tunnel can be rerouted.

    Path Option

    Tunnel path option:

    • Dynamic—The tunnel is routed along the ordinary routing decisions after taking into account the tunnel constraints such as attributes, priority, and bandwidth.
    • Explicit—The route is explicitly mapped with the included and excluded links.

    Average Rate (Kbps)

    Average bandwidth for this tunnel (in Kb/s).

    Burst (Kbps)

    Burst flow specification (in Kb/s) for this tunnel.

    Peak Rate (Kbps)

    Peak flow specification (in Kb/s) for this tunnel.

    LSP ID

    LSP identifier.

    Policy Class

    Value of Policy Based Tunnel Selection (PBTS) configured. Values range from 1-7.

    FRR

    TE Fast Reroute (FRR) status: Enabled or Disabled.

    Type

     

    The Traffic Engineering LSPs tab in the LSEs branch in logical inventory displays TE tunnel LSP information.

    For details about the information displayed for TE tunnel LSPs, see Traffic Engineering LSPs.


     

    Configuring VRFs

    The following commands configure routes that are available or reachable to all the destinations or networks in the VRF. These commands are launched by right-clicking the VRF node and choosing Commands > Configuration. Your permissions determine whether you can run these commands (see Permissions for Managing MPLS Services). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs.

     

    Command
    Description

    Modify VRF

    Delete VRF

    Configures VRF properties, including the VRF route distinguisher, import and export route targets, and any provisioned sites and VRF routes.

    Configuring IP Interfaces

    The following IP interface commands are launched by right-clicking Routing Entities > routing entity and choosing Commands > Configuration. Your permissions determine whether you can run these commands (see Permissions for Managing IP and MPLS Multicast). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs.

     

    Command
    Description

    Create Interface
    Modify Interface
    Delete Interface
    Configure Secondary IP Address
    Delete Secondary IP Address

    Configures an IP interface for the selected routing entity

    Auto-IP in PN

    Prime network supports AUTO-IP feature in 5.2 Release. Auto-IP is an IP address configured on the interface using the Auto-IP ring command. The Auto-IP feature enables node insertion, removal and movement to any location within a ring without the need for reconfiguring the existing nodes manually. When enabled on the physical interface or the sub interface, you can discover the devices in the Auto-IP ring automatically.

    Configuring Auto-IP

    To configure Auto-IP, configure one of the routers in the ring as a seed router. Normally an edge router is configured as a seed router, and the Auto-IP address of the seed router is same as the IP address of the router interface in which the Auto-IP is enabled. The device, in which the Auto-IP configured with priority value 2, becomes the owner interface and assigns the IP address to the non-owner interface (Priority value for non-owner interface is 0) in the ring topology. The Link Layer Discovery Protocol (LLDP) must be enabled on the device before enabling the auto-IP functionality on a node interface.

    note.gif

    Noteblank.gif When you configure Auto-IP feature on the devices, by default, the priority value is 1.


    Configuring MPLS-TP

    The following MPLS-TP commands are launched by right-clicking the appropriate node and choosing MPLS-TP Global > Commands > Configuration. Your permissions determine whether you can run these commands (see Permissions for Managing MPLS Services). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs.

    note.gif

    Noteblank.gif To run the Global Configuration, BFD Configuration, and Link Configuration commands on the Cisco Carrier Packet Transport (CPT) System, right-click the device in the Vision client list or map view, and click Logical Inventory > CPT Context Container.


     

    Command
    Description

    Tunnel Ping
    Tunnel Trace
    LSP Ping

    LSP Trace
    LSP Lockout
    LSP Path Lockout

    LSP Path No Lockout

    These actions are performed at the command the launch point.

    LSP Path Lockout can be accessed at both the tunnel level and endpoint level. If you run the command at the tunnel level, you must indicate whether the Lsp is protected or working.

    Add Global Configuration
    Update Global Configuration
    Remove Global Configuration

    Configure Global configuration with Router-id, Global-id, Fault OAM refresh timer value, Wait before restoring timer value. The remove operation is performed at the command the launch point.

    BFD Global Configuration

    BFD minimum interval and multiplier.

    Add Link Configuration Remove Link Configuration

    MPLS-TP link number, Next hop router address. Only the link number is require for the remove operation.

    Add BFD Template Configuration
    Remove BFD Template Configuration

    Template type and name, interval type and value, For compute hold down Check/UnCheck Multiplier, multiplier value. The remove operation requires a template type and name.

    Show BFD Template
    Show BFD Template at Tunnel

    Show BFD Template requires a template name. The Show BFD Template at Tunnel is performed at the command launch point.

    Add Label Range Configuration
    Remove Label Range Configuration

    Minimum and maximum values for dynamic and static labels. The remove operation is performed at the command launch point.

    Locking/Unlocking MPLS-TP Tunnels in Bulk

    An MPLS-TP network has one or multiple LSPs running between endpoint devices. If you want to shutdown one of the interfaces in the network, the MPLS-TP packet must be diverted through an alternative LSP. This can be achieved by locking the interface. Before attempting to lock or unlock a tunnel, ensure that MPLS-TP tunnels have been configured for the link. Also, ensure that you have the appropriate rights (Configurator and above) to lock or unlock a tunnel.

    The MPLS-TP bulk lockout/unlock option in Prime Network allows you to lock or unlock multiple MPLS-TP tunnels on different VNEs at the same time.

    Your permissions determine whether you can run these commands (see Permissions for Managing MPLS Services). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs.

    Locking MPLS-TP Tunnels

    To lock MPLS-TP tunnels in bulk:


    Step 1blank.gif In the map view, right-click the required link and choose Properties.

    Step 2blank.gif In the link properties window, right-click on the required physical link and choose the Show MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed, which lists all the tunnels in the selected link.

    Step 3blank.gif In the MPLS-TP tunnels’ commands dialog box, choose the tunnels that you want to lock and select the Lock Out option in the Commands field.

    Step 4blank.gif Click Execute Now. You are prompted to confirm the lockout operation.

    Step 5blank.gif Click Yes to confirm. A message is displayed confirming that the selected tunnels have been locked. The status of the tunnel is automatically updated as Lockout(UP) after this operation.


     

    Unlocking MPLS-TP Tunnels

    To unlock MPLS-TP tunnels in bulk:


    Step 1blank.gif In the map view, right-click the required link and choose Properties.

    Step 2blank.gif In the link properties window, right-click on the required physical link and choose the Show MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed, which lists all the tunnels in the selected link.

    Step 3blank.gif In the MPLS-TP tunnels’ commands dialog box, select the locked tunnels that you want to unlock and select the Unlock option in the Commands field.

    Step 4blank.gif Click Execute Now. You are prompted to confirm the unlock operation.

    Step 5blank.gif Click Yes to confirm. A message is displayed confirming that the selected tunnels have been unlocked. The status of the tunnels is automatically updated as Active(UP) after this operation.

    note.gif

    Noteblank.gif If you attempt to unlock a tunnel that is not locked, a message is displayed indicating that there are no valid tunnels to perform the unlock operation.



     

    Linear Protection for MPLS-TP

    As explained earlier, MPLS-TP is the transport profile that fulfills the deployment in the network for the MPLS technology. This technology provides fast protection switching for end-to-end segments wherein the protection switching time is generally less than 50 milliseconds.

    Protection switching is a mechanism wherein route and resources of a protection path are reserved for a selected working path or set of working paths.

    Linear protection provides rapid and simple protection switching because it can operate between any pair of points within the network. For every working Label Switched Paths (LSP) in the network, there is a protected LSP that is not related to any other working entity. When a working LSP fails, the protected LSP is ready to take up transmission of data.

    In Prime Network, the following commands are available for linear protection:

    • Force Switch (Lockout)—This command is used to switch normal traffic from a working LSP to a protected LSP. This command can only be applied on a working LSP. If Force Switch is enabled, then the Working LSP becomes standby and the Protected LSP becomes active.
    • Manual Switch—This command is used to switch normal traffic from a working LSP to a protected LSP. This command can be applied only on a working LSP. If Manual Switch is enabled, then the working LSP becomes standby and the protected LSP becomes active.
    note.gif

    Noteblank.gif The Force Switch and Manual Switch commands are both used to switch traffic from the working LSP to the protected LSP. However, if the Manual Switch command is used, and there is a failure in the protecting LSP, then the working LSP becomes active. In case of the Force Switch command, then the working LSP does not become active if there is a failure in the protecting LSP.+


    • Lockout of Protecting (Lockout)—This command is used to switch traffic from the protected LSP to the working LSP. This command can be applied only on a protected LSP. If Lockout of Protecting is enabled, then the working LSP becomes active and the protected LSP becomes standby.
    • Clear Force Switch (no Lockout)—This command is used to clear the force switch on a working LSP after which the working LSP becomes active and the protected LSP becomes standby.
    • Clear Manual Switch—This command is used to clear the manual switch made on a working LSP, after which the working LSP becomes active and the protected LSP becomes standby.
    • Clear Lockout of Protecting (no Lockout)—This command is used to clear the lockout of protecting made on a protected LSP. The working LSP becomes standby and the protected LSP becomes active after this command is executed.

    Figure 17-24 depicts the MPLS-TP topology along with the working and protected LSPs:

    Figure 17-24 Linear Protection for MPLS-TP

    361847.TIF
    note.gif

    Noteblank.gif In the above figure, you can find working and protected LSPs between two routers. In case of maintenance or network upgrade, the Force Switch and Manual Switch commands can be used to shut down the working LSP link. Similarly, the Lockout of Protecting command can be used to shut down the protected LSP link.


    To switch traffic using the Force Switch or Manual Switch command:


    Step 1blank.gif In the map view, right-click the required link and choose Properties. A list of tunnels for the selected link is displayed.

    Step 2blank.gif Right-click on the required physical link and choose the Manage MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed.

    note.gif

    Noteblank.gif If there are no MPLS-TP tunnels configured for the selected link, then a message indicating the absence of MPLS-TP tunnels is displayed.


    Step 3blank.gif In the MPLS-TP tunnels’ commands dialog box, select the working LSP tunnel and select Force Switch (Lockout) or Manual Switch in the Commands field.

    Step 4blank.gif Click Execute Now. You are prompted to confirm the operation.

    Step 5blank.gif Click Yes to confirm. The status of the working LSP is updated as Standby and the status of the protected LSP is updated as Active after this operation.


     

    To switch traffic using the Lockout of Protecting command:


    Step 1blank.gif In the map view, right-click the required link and choose Properties. A list of tunnels for the selected link is displayed.

    Step 2blank.gif Right-click on the required physical link and choose the Manage MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed.

    Step 3blank.gif In the MPLS-TP tunnels’ commands dialog box, select the protected LSP tunnel and select Lock of Protecting in the Commands field.

    Step 4blank.gif Click Execute Now. You are prompted to confirm the operation.

    Step 5blank.gif Click Yes to confirm. The status of the working LSP is updated as Active and the status of the protected LSP is updated as Standby after this operation.


     

    To clear the Force Switch or Manual switch on a working LSP:


    Step 1blank.gif In the map view, right-click the required link and choose Properties. A list of tunnels for the selected link is displayed.

    Step 2blank.gif Right-click on the required physical link and choose the Manage MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed.

    Step 3blank.gif In the MPLS-TP tunnels’ commands dialog box, select the working LSP tunnel that has been locked and select Clear Force Switch or Clear Manual Switch in the Commands field.

    Step 4blank.gif Click Execute Now. You are prompted to confirm the operation.

    Step 5blank.gif Click Yes to confirm. The status of the working LSP is updated as Active and the status of the protected LSP is updated as Standby after this operation.

    To clear the Lockout of Protecting on a protected LSP:


    Step 1blank.gif In the map view, right-click the required link and choose Properties. A list of tunnels for the selected link is displayed.

    Step 2blank.gif Right-click on the required physical link and choose the Manage MPLS-TP tunnels option. The MPLS-TP tunnels’ commands dialog box is displayed.

    Step 3blank.gif In the MPLS-TP tunnels’ commands dialog box, select the protected LSP tunnel that has been locked and select Clear Lockout of Protecting in the Commands field.

    Step 4blank.gif Click Execute Now. You are prompted to confirm the operation.

    Step 5blank.gif Click Yes to confirm. The status of the protected LSP is updated as Active and the status of the working LSP is updated as Standby after this operation.

    Visualization Status Enhancements- MPLS TP Tunnel

    In the MPLS TP Tunnel, the following visualization status enhancements have been carried out:

    Non Eligible LSPs

    If the tunnel is not configured with protected LSP, i.e., the tunnel is configured with working LSP (Active-UP); the information column displays the value as Protected LSP is not configured. See Figure 17-26.This information is displayed for all non-eligible LSPs which are not eligible for bulk flow operations like FS, LOP, MS, LOCK.

    Figure 17-25 Viewing the Working LSPs and Protected LSPs

    404640.tif

    In the above Figure 17-25, both the status of Working LSP and the Protected LSP are in up state. So, the Information field is blank.

    Lockout State

    In the Lockout State, information value has been changed. If the Working LSP is down, it displays Working LSP is Locked Out. If the Protected LSP is down, it displays that the Protected LSP is Locked Out

    Figure 17-26 Viewing the Lockout States of LSP

    404642.tif

    Figure 17-27 Viewing the Commands for Eligible LSPs

     

    404641.tif

    In the above Figure 17-27 the commands that are executed on LSPs on the link are displayed.

    It will be enabled only when an eligible LSP is working/protected on the link.

    Other Descriptions displayed in the Information Column are :

    • If only the Working LSP is configured, you will not be allowed to Lock the Working LSP since, there is no Protected member to carry the traffic; the information column displays the value as Protected LSP is not configured.
    • If both the “Working LSP EndPoints” and “Protected LSP EndPoints” are configured in the same physical link, which informs that this tunnel will not be allowed for performing the Lockout operations; the information column displays the value as Both LSPs are configured on the same physical link.
    • If the device's Software Version in which the “Manual Switch” feature is disabled; the information column displays the value as Manual switch is disabled.
    • If both the Working (Active) and Protected LSPs are in Down state; the information column displays the value as Working and protected LSPs are down.
    • If the tunnel is not eligible for any Linear Protection operations as it is disabled, the information column displays the value as Linear Protection is disabled.

    Configuring MPLS-TE

    The following table lists commands you can use to configure MPLS-TE and how to launch these commands. You can preview a command before executing it, or schedule it to run at a later time. You may be prompted to enter your device access credentials while executing a command.

    Your permissions determine whether you can run these commands (see Permissions for Managing MPLS Services). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs. (You can also add support for new commands by downloading and installing Prime Network Device Packages (DPs); see the Cisco Prime Network 5.2 Administrator Guide.)

     

    Command
    Navigation
    Description

    Configure MPLS-TE Global

    LSEs > right-click Label Switching > Commands > Configuration

    Configures MPLS at the device level or an interface level. Contains information on MPLS interfaces and whether traffic engineering tunnels are configured.

    Configure MPLS-TE Interface

    Routing Entities > Routing Entity > IP Interfaces tab, right-click the required interface > Commands > Configuration

    Configuring MPLS

    The following table lists commands you can use to configure MPLS and how to launch these commands. You can preview a command before executing it, or schedule it to run at a later time. You may be prompted to enter your device access credentials while executing a command.

    Your permissions determine whether you can run these commands (see Permissions for Managing MPLS Services). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs. (You can also add support for new commands by downloading and installing Prime Network Device Packages (DPs); see the Cisco Prime Network 5.2 Administrator Guide.)

     

    Command
    Navigation
    Description

    Configure MPLS Discovery

    LSEs > right-click Label Switching > Commands > Configuration

    Configures MPLS LDP discovery parameters to discover core MPLS networks. This also includes specifying the discovery method.

    Configure MPLS Label Range

    Configures MPLS static and dynamic label range.

    Enable MPLS on Interface

    LSEs > Label Switching > right-click the selected ID in the MPLS Interface tab > Commands > Configuration

    Enables/disables MPLS protocol on an interface. Contains information on MPLS interfaces and whether traffic engineering tunnels are configured on an interface.

    Disable MPLS on Interface

    Configuring RSVP

    The following RSVP commands manage a reserved-bandwidth path between hosts or the end systems to predetermine and ensure Quality of Service (QoS) for their data transmission. You can preview a command before executing it, or schedule it to run at a later time. You may be prompted to enter your device access credentials while executing a command.

    Your permissions determine whether you can run these commands (see Permissions for Vision Client NE-Related Operations). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs. (You can also add support for new commands by downloading and installing Prime Network Device Packages (DPs); see the Cisco Prime Network 5.2 Administrator Guide.)

     

    Command
    Navigation
    Description

    Configure RSVP

    LSEs > right-click Label Switching > Commands > Configuration

    Configures RSVP on a device or an interface.

    Delete RSVP

    Enable RSVP On Interface

    Disable RSVP On Interface

    Routing Entities > Routing Entity > IP Interfaces tab, right-click the required interface > Commands > Configuration

    Configuring BGP

    The following BGP commands configure the routing protocol to communicate with the other sites and VRFs. BGP neighbors should be configured as part of BGP routing. At least one neighbor and at least one address family must be configured to enable BGP routing.

    You can preview a command before executing it, or schedule it to run at a later time. You may be prompted to enter your device access credentials while executing a command.

    Your permissions determine whether you can run these commands (see Permissions for Vision Client NE-Related Operations). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs. (You can also add support for new commands by downloading and installing Prime Network Device Packages (DPs); see the Cisco Prime Network 5.2 Administrator Guide.)

     

    Command
    Navigation
    Description

    Create BGP Router

    Modify BGP Router

    Delete BGP Router

    MPBGPs > right-click MPBGP > Commands > Configuration > Create BGP Router

    MPBGPs > right-click MPBGP > Commands > Configuration > Modify BGP Router

    MPBGPs > right-click MPBGP > Commands > Configuration > Delete BGP Router

    MPBGPs > MPBGP > right-click on the BGP neighbour in the content pane > Commands > Configuration > Create BGP Address Family

    MPBGPs > MPBGP > right-click on the BGP neighbour in the content pane > Commands > Configuration > Create BGP Neighbour

    Configures BGP routing and establish a BGP routing process with AS number and Router ID

    Create BGP Address Family

    Enter various address family configuration modes that uses IPv4, IPv6, L2VPN, VPNV4 or VPNV6 address prefixes.

    Create BGP Neighbour

    Places the router in Neighbour configuration mode for BGP routing and configures the Neighbour IP address as a BGP peer.

    Modify BGP Neighbour
    Delete BGP Neighbour

    MPBGPs > MPBGP > right-click on the BGP neighbour in the content pane > Commands > Configuration >

    Configuring VRRP

    The following VRRP commands configure the VRRP protocol on routers. These commands configures transparent failover at the first-hop IP router, enabling a group of routers to form a single virtual router. You can preview a command before executing it, or schedule it to run at a later time. You may be prompted to enter your device access credentials while executing a command.

    Your permissions determine whether you can run these commands (see Permissions for Vision Client NE-Related Operations). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs. (You can also add support for new commands by downloading and installing Prime Network Device Packages (DPs); see the Cisco Prime Network 5.2 Administrator Guide.)

     

    Command
    Navigation
    Description

    Create VRRP Group
    Delete VRRP Interface

    Routing Entities > Routing Entity > IP Interfaces tab, right-click the required interface > Commands > Configuration

    Configure a group of routers to form a single virtual router.

    Example is using VRRP group as default router on the client. The LAN clients can be configured with the virtual router as their default gateway thus avoiding single point of failure, which was the case in dynamic discovery protocol.

    Modify VRRP Group
    Delete VRRP
    Show VRRP

    Routing Entities > Routing Entity > IP Interfaces tab, double-click on the VRRP configured interface > select VRRP Group tab > right-click on required group.

    Configuring Bundle Ethernet

    Configure a bundle of one or more ports to form a single link using bundle ethernet commands.

    The following table lists the supported bundle ethernet commands. You can preview a command before executing it, or schedule it to run at a later time. You may be prompted to enter your device access credentials while executing a command.

    Your permissions determine whether you can run these commands (see Appendix B, “Permissions Required to Perform Tasks Using the Prime Network Clients” ). To find out if a device supports these commands, see the Cisco Prime Network 5.2 Supported Cisco VNEs. (You can also add support for new commands by downloading and installing Prime Network Device Packages (DPs); see the Cisco Prime Network 5.2 Administrator Guide.)

     

    Command
    Navigation
    Description

    Configure Bundle Ethernet

    Physical Inventory > Chassis > Slot > Ethernet Port > Commands > Configuration

    Configuring an Ethernet link bundle involves creating a bundle and adding member interfaces to that bundle.

    Viewing MPLS LDP, Static Information

    The Multi-Protocol Label Switching (MPLS) is a scalable, protocol-independent transport. In an MPLS network, data packets are assigned labels. The packet-forwarding decisions are made solely based on the contents of this label, without the need of examining the packet itself. This enables creating end-to-end circuits across any type of transport medium using any protocol.

    Multiprotocol Label Switching (MPLS) Label Distribution Protocol (LDP) enables peer label switch routers (LSRs) in an MPLS network to exchange label binding information for supporting hop-by-hop forwarding in an MPLS network.

    As part of the topological link support, Prime Network started supporting two new service alarms MPLS Link down and MPLS Link up, besides MPLS-TP inventory information. These alarms are raised on the MPLS links during misconfigurations of physical links or shut down of physical interfaces. To view the service alarms supported by Prime Network, refer Cisco Prime Network Supported Service Alarms

    Figure 17-28 Viewing MPLS link configured with LDP and Static

     

    404639.tif

    Working with FEC 129-based Pseudowire

    The following topics describe how to use the Vision client to monitor FEC 129-based pseudowires:

    FEC 129-based Pseudowire

    A pseudowire (PW) is a Layer 2 circuit or a service that emulates the essential attributes of a telecommunication service (such as T1 line) over an MPLS packet-switched network (PSN).

    Pseudowires can be established between two provider edges (PEs) as a single segment (SS) or multisegment (MS) pseudowire.

    The Cisco Prime Network supports FEC 129 pseudowire configured in a single segment mode.

    The single segment pseudowire (SS-PW) pseudowire originates and terminates on the edge of the same MPLS PSN, especially within the same autonomous system (AS). The pseudowire label is unchanged between the originating and terminating provider edge (T-PE) devices.

    The FEC 129 pseudowire uses Source Attachment Individual Identifier (SAII), Target Attachment Individual Identifier (TAII), and Attachment Group Identifier (AGI) to make a key along with the existing attributes such as tunnel ID and peer router IP.

    The FEC 129-based pseudowire can be classified into two types based on the attachment circuit:

    • Type I—The attachment circuit for type I would be VSI, which in turn connected to bridges on either ends. You can identify the Type I pseudowires uniquely with the AGI, SAII, and TAII values.
    • Type II—The attachment circuit for type II would be Ethernet on which EFP is configured. You can identify the Type II pseudowire uniquely with the SAII and TAII values.

    In order to configure FEC 129 Type II pseudowire, an Ethernet interface with EFP already configured, is selected. Under this Ethernet interface (which becomes SAII), you can configure the TAII with the target attachment identifier statement. If the configured target identifier matches a source identifier advertised by a remote PE device by way of a BGP auto discovery message, then the pseudowire between that source and target pair is signaled. If there is no match between an advertised source identifier and the configured target identifier, the pseudowire is not established.

    The following topic explain how to view the FEC 129 pseudowire from the inventory view:

    Viewing FEC 129-based Pseudowire from Logical Inventory

    To view the FEC 129-based pseudowire information in the logical inventory:


    Step 1blank.gif Right-click the required device in the Vision client and choose Inventory.

    Step 2blank.gif In the Inventory window, choose Logical Inventory > Pseudowires.

    note.gif

    Noteblank.gif The AGI, SAII, and TAII are the new attributes supported for the FEC 129-based pseudowires.


    The Pseudowire Tunnel Edges table is displayed and contains the information described in Table 17-30 .

     

    Table 17-30 Pseudowire Tunnel Edges Table

    Field
    Description

    Local Interface

    Name of the subinterface or port.

    Strings, such as Aggregation Group, EFP, VLAN, and VSI, are included in the interface name, and the entry is hyperlinked to the relevant entry in logical or physical inventory.

    VC ID

    Tunnel identifier, hyperlinked to the PTP Layer 2 MPLS Tunnel Properties window.

    Note For the FEC 128 pseudowire, VC ID is populated whereas for the FEC 129 pseudowire, VC ID is not populated.

    AGI

    Attachment Group Identifier (AGI).
    An identifier common to a group of pseudowires that may be connected. The AGI carries VPLS ID of the local PE router VPLS instance. The VPLS ID must be the same for all the PEs in the same VPLS instance.

    SAII

    Specifies the Source Attachment Individual Identifier (SAII) of the tunnel.

    The SAII attribute is configured for FEC 129 Type I and II pseudowires.

    TAII

    Specifies the Target Attachment Individual Identifier (TAII) of the tunnel.

    The TAII attribute is configured for FEC 129 Type I and II pseudowires.

    Pseudowire Type

    Type of pseudowire, in this case Ethernet.

    Peer

    Details of the selected peer, hyperlinked to the peer pseudowire tunnel in logical inventory.

    Status

    Operational state of the tunnel: Up or Down.

    Pseudowire Role

    If the pseudowire is in a redundancy configuration, indicates whether its role is as the primary or secondary pseudowire in the configuration.

    If the pseudowire is not configured for redundancy, this field is blank.

    Preferred Path Tunnel

    Path to be used for MPLS pseudowire traffic.

    Local Router IP

    IP address of local tunnel edge, which is used as the MPLS router identifier.

    Peer Router IP

    IP address of the peer tunnel edge, which is used as the MPLS router identifier.

    Local MTU

    Size, in bytes, of the MTU on the local interface.

    Remote MTU

    Size, in bytes, of the MTU on the remote interface.

    Local VC Label

    MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the local router.

    Peer VC Label

    MPLS label that is used by this router to identify or access the tunnel. It is inserted into the MPLS label stack by the peer router.

    Signaling Protocol

    Protocol used by MPLS to build the tunnel, for example, LDP or TDP.

    Peer Status

    Status of the peer link.

    Associated EVC Name

    Specifies the name of the associated Ethernet Virtual Circuits (EVC).


     

    Viewing FEC 129 Type I-based Pseudowire from VSI Inventory

    To view the FEC 129 Type I-based pseudowire from VSI logical inventory:


    Step 1blank.gif To view VSI properties in the Vision client, open the VSI Properties window in either of the following ways:

    • Double-click the required VNE and, in the Inventory window, choose Logical Inventory > VSIs > vsi.
    • In the navigation pane, expand the VPLS instance, right-click the required VPLS forward, and choose Inventory or Properties.

    Table 17-31 describes the information that is displayed for the selected VSI.

    note.gif

    Noteblank.gif The AGI, SAII, and TAII are the new attributes supported for the FEC 129 pseudowires.


     

    Table 17-31 VSI Properties in Logical Inventory

    Field
    Description

    VSI Name

    VSI name.

    VPN ID

    VPN identifier used in an MPLS network to distinguish between different VPLS traffic.

    VSI Mode

    VSI mode: Point-to-Point (default) or Multipoint.

    Discovery Mode

    VSI discovery mode: Auto-BGP.

    Operational State

    VSI operational status: Up or Down.

    Administrative State

    VSI administrative status: Up or Down.

    Local Bridge

    Local bridge, hyperlinked to the bridge in logical inventory.

    Pseudowires Table

    Pseudowire ID

    Pseudowire identifier, hyperlinked to the Tunnel Edges table under Pseudowires in logical inventory.

    VC ID

    Pseudowire virtual circuit identifier.

    Note For the FEC 128 pseudowire, VC ID is populated whereas for the FEC 129 pseudowire, VC ID is not populated.

    AGI

    Attachment Group Identifier (AGI). An identifier common to a group of pseudowires that may be connected. The AGI carries VPLS ID of the local PE router VPLS instance. The VPLS ID must be the same for all the PEs in the same VPLS instance.

    SAII

    Specifies the Source Access Individual Identifier (SAII) of the tunnel.

    The SAII attribute is configured for FEC 129 Type I and II pseudowires.

    TAII

    Specifies the Target Attachment Individual Identifier (TAII) of the tunnel.

    The TAII attribute is configured for FEC 129 Type I and II pseudowires.

    Peer IP

    IP address of the pseudowire peer.

    Autodiscovery

    The pseudowire was automatically discovered using BGP (auto-BGP).

    In this case, the value is True.

    Split Horizon

    SSH pseudowire policy that indicates whether or not packets are forwarded to the MPLS core. In this case, the value is True.


     

    Viewing FEC 129 links from Topology View

    Viewing FEC 129 Pseudowire Properties from Topology View

    On adding the two associated VNEs to the map, a link is formed between them. This is the topology view and this link depicts the logical association between the associated VNES. Hovering over this link displays all the logical links (or protocols) configured between these peers.

    To view the FEC 129 link:


    Step 1blank.gif In the Vision client map view, select a link connected to two devices and open the link quick view window.

    Step 2blank.gif Click the link between the two VNEs. Identify the FEC 129 pseudowires based on the unique identifiers as mentioned in the Viewing FEC 129-based Pseudowire from Logical Inventory.

    note.gif

    Noteblank.gif If the link is down, it will be displayed in Red and the active links are displayed as green.


    Step 3blank.gif To view the FEC 129 properties in detail, click Properties in the link properties window.

    Step 4blank.gif Select the FEC 129 Type I or II link and the link properties are displayed.

    Table 17-32 describes the information that is displayed for the FEC 129 link.

     

    Table 17-32 FEC 129 Link Properties

    Field
    Description
    General Properties

    Link Type

    Link protocol. In this case, PW.

    Type

    Type of link: Dynamic or Static.

    Bi Directional

    Whether the link is bidirectional: True or False.

    FEC 129 Properties

    Properties are displayed for both ends of the MLPPP link.

    ID

    Pseudowire identifier, hyperlinked to the VLAN entry in Bridges in logical inventory.

    Peer

    Identifier of the pseudowire peer, hyperlinked to the entry in the Pseudowire Tunnel Edges table in logical inventory.

    AGI

    Attachment Group Identifier (AGI). An identifier common to a group of pseudowires that may be connected. The AGI carries VPLS ID of the local PE router VPLS instance. The VPLS ID must be the same for all the PEs in the same VPLS instance.

    Note The FEC 129 Type I topology displays AGI in addition to SAII and TAII.

    SAII

    Specifies the Source Attachment Individual Identifier (SAII) of the tunnel.

    The SAII attribute is configured for FEC 129 Type I and II pseudowires.

    Tunnel Status

    Operational state of the tunnel: Up or Down.

    TAII

    Specifies the Target Attachment Individual Identifier (TAII) of the tunnel.

    The TAII attribute is configured for FEC 129 Type I and II pseudowires.

    Peer Router IP

    IP address of the peer router for this pseudowire.

    Pseudowire Type

    Type of pseudowire, in this case, Ethernet.

    Pseudowire Role

    If the pseudowire is in a redundancy configuration, then the pseudowire role indicates whether its a primary pseudowire or a secondary pseudowire in the configuration.

    If the pseudowire is not configured for redundancy, the field is blank.

    Preferred Path Tunnel

    Specifies the path that has to be used for MPLS pseudowire traffic.

    Local Router IP

    Specifies the IP address of the tunnel edge, which is used as the router identifier.

    Local MTU

    Specifies the byte size of the MTU on the local interface.

    Remote MTU

    Specifies the byte size of the MTU on the remote interface.

    Local VC Label

    Specifies the MPLS label that is used by the local router to identify or access the tunnel. It is inserted in the MPLS label stack by the local router.

    Peer VC Label

    Specifies the MPLS label that is used by the peer router to identify or access the tunnel. It is inserted in the MPLS label stack by the peer router.

    Signaling Protocol

    Specifies the protocol that is used to build the tunnel, such as the LDP or TDP.

    Peer Status

    Specifies the status of the peer link.


     

    FEC 129-based Pseudowire Service Discovery

    The Cisco Prime Network delivers FEC 129-based discovery for various support services such as bridge domains, pseudowires, Virtual Connections, and VPLS.

    The Cisco Prime Network release supports the following service discoveries:

    • Bridge Domain Discovery—Discovers bridges domains such as I-Bridges, B-Bridges, and regular bridges that are not associated to VFIs or pseudowires. For more information, refer to Working with PBB-VPLS.
    • Pseudowire Discovery—Discovers pseudowires in any one of the following ways:

    blank.gif Pseudowires that are associated to I-Bridges and B-Bridges in addition to regular bridges.

    note.gif

    Noteblank.gif As specified in the Bridge Domain discovery, the regular bridges associated to pseudowires, cannot be discovered from the Bridge Domain services.


    blank.gif All the pseudowires that are associated to Ethernet such as FEC 128, FEC 129 Type II, which in turn has an EFP configured. This service discovers the end-to-end pseudowire peers (FEC 128 or FEC 129 Type II) along with the Ethernet attachments.

    note.gif

    Noteblank.gif The FEC 129 Type II end-to-end tunnels are identified from the Pseudowire service using the SAII and TAII values.


    • VPLS Discovery—Discovers VPLS in any one of the following ways:

    blank.gif VFIs associated to I-Bridges, B-Bridges, and regular bridges.

    note.gif

    Noteblank.gif As specified in the Bridge Domain discovery, the regular bridges associated to VFIs, cannot be discovered from the Bridge Domain services.


    blank.gif VFIs associated to pseudowires such as FEC 128, FEC 129 Type I pseudowires (pseudowires which are attached to VFIs which in turn attached to bridges (B-Bridges)) are discovered. This service discovers the end-to-end VFIs, which on expanding from the VPLS map view, displays the end-to-end pseudowire peers (FEC 128 or FEC 129 type I pseudowires).

    note.gif

    Noteblank.gif The FEC 129 Type I end-to-end tunnels are identified from the VPLS service using the Attachment Group Identifier (AGI) value along with SAII and TAII values.


    note.gif

    Noteblank.gif In order to view the B-bridges attached to the VFIs, the bridges must be selected from the Bridge Domain service.


    • Virtual Connection or EVC Discovery—Creates an end-to-end complex circuit representing the network associations in the core network of all the above discovered elements. Using the Virtual Connection map view, the complete topology of the pseudowire is displayed instead of selecting each plugin separately from the VPLS or pseudowire map view.

    blank.gif FEC 129 Type I—Instead of selecting FEC 129 Type I pseudowires and their associated VFIs (from the VPLS service) and the associated B-bridges (from the bridge domain service), the FEC-129 type 1 end-to-end tunnels can be viewed as a single instance from the Virtual Connection service.
    The FEC 129 Type I end-to-end tunnels are identified using the AGI value along with SAII and TAII values.

    blank.gif FEC 129 Type II—The FEC 129 Type II end-to-end tunnels and the Ethernet attachments can be viewed as a single instance from the Virtual Connections service.
    The FEC 129 Type II end-to-end tunnels are identified using the SAII and TAII values.

    The following topics explain how to view the FEC 129-based pseudowire from service discovery:

    Viewing FEC 129 Type II-based Pseudowire Tunnel from Pseudowire Map View

    To discover the links between the FEC Type II pseudowires:


    Step 1blank.gif Choose Add to Map > Pseudowire to open the Add Pseudowire to Specific plugins dialog box.

    Step 2blank.gif In the Add Pseudowire to Specific plugins dialog box, select Show All to display the list of pseudowires.

    Step 3blank.gif To view a specific FEC Type II pseudowire, filter using the pseudowire ID (SAII or TAII) to identify the FEC Type II pseudowire.

    Step 4blank.gif Click OK to add the selected FEC 129 type II pseudowire to the map.

    Step 5blank.gif The selected pseudowire component in the map displays the following links. Click the expand (+) icon to view the links:

    • Association between the EFP of one router (for example, router 1) to the FEC 129 type II pseudowire.
    • Link between the two associated FEC 129 type II pseudowires that are peers.
    • Association between the FEC 129 type II pseudowire of the other router (for example, router 2) to the EFP.


     

    Viewing FEC 129 Type II-based Pseudowire Tunnels from Virtual Connection Map View

    The Virtual Connection view displays the logical association between the FEC 129 type II pseudowires in a single view.

    To view the end-to-end connection between the FEC 129 type II pseudowire peers:


    Step 1blank.gif Open the Add Virtual Connection to Specific plugin dialog box in either of the following ways:

      • In the toolbar, choose Add to Map > Virtual Connection.
      • In the menu bar, choose File > Add to Map > Virtual Connection.

    Step 2blank.gif In the Add Virtual Connection to Specific plugins dialog box, select the virtual connection that you want to view.

    Step 3blank.gif To view a specific FEC type II pseudowire, filter using the pseudowire ID (SAII or TAII) to identify the FEC Type II pseudowire.

    Step 4blank.gif Click OK to add the selected virtual connection component to the map.

    Step 5blank.gif For the selected virtual connection component in the map, you can view the following FEC 129 Type II pseudowire information:


     

    Viewing FEC 129 Type II Pseudowire Links from Virtual Connection View

    To view the end-to-end connection between the FEC 129 type II pseudowire peers:


    Step 1blank.gif Click the expand (+) icon to view the links:

    • Association between the EFP of one router (for example, router 1) to the FEC 129 type II pseudowire.
    • Link between the two associated FEC 129 type II pseudowires that are peers.
    • Association between the FEC 129 type II pseudowire of the other router (for example, router 2) to the EFP.


     

    Viewing FEC 129 Type II Pseudowire Properties from Virtual Connection View

    To view the FEC 129 type II pseudowire properties:


    Step 1blank.gif Right-click the selected virtual connection component in the map.

    Step 2blank.gif Click the Properties tab to display the EVC hyperlink.

    Step 3blank.gif Click the EVC hyperlink to view the EVC terminating points.


     

    Viewing FEC 129 Type I-based Pseudowire Tunnel from VPLS Map view

    The FEC 129 Type I pseudowires are associated to VFIs, which in turn are associated to PBB bridges (that is VFIs are attached to B-bridges, and B-bridges are attached to I-bridges on both the FEC 129 Type I pseudowire peers).

    The following services help in viewing the components involved in forming the FEC 129 Type I-based pseudowire topology:

    • VPLS view—You can view the FEC 129 Type I pseudowires that are attached to the VFIs from the VPLS view. These VFIs are in turn attached to the PBB bridges. To view the VFIs, refer Viewing VPLS.
    • Bridge Domain view—From the bridge domains service, you can view the PBB bridges (I-bridges linked to the B-bridges). To view the bridge domains, refer Viewing Bridge domains.
    note.gif

    Noteblank.gif In addition to PBB bridges, regular bridges, with no associations to pseudowires or VFIs, can also be discovered in the Bridge Domain service.


    Viewing VPLS

    To view the VFIs:


    Step 1blank.gif Choose Add to Map > VPLS to open the Add VPLS Instance to map dialog box.

    Step 2blank.gif In the Add VPLS Instance to map dialog box, select Show All to display the list of VPLS instances.

    Step 3blank.gif Add the required VPLS instance from the VPLS list. It can be filtered either using the VPN-id or the names of the associated VFIs.

    Step 4blank.gif Once the VPLS instance is added to the map, it displays the link between the two associated VFIs. On further expanding these VFI components, you can view the associated FEC 129 Type 1 pseudowire peers, linked to these VFIs on either ends.

    Step 5blank.gif Click the link between the two associated FEC 129 Type 1 pseudowire peers to display the topology link properties window. This link is specific to these FEC 129 Type 1 pseudowire peers.
    Unlike the Map view, topology properties which display all the topology links between the two VNEs are added to the map. Refer Viewing FEC 129 links from Topology View.

    Viewing Bridge domains

    To view the bridge domains associated to the VFIs, follow the steps provided below:


    Step 1blank.gif Open the Add Bridge Domain dialog box in one of the following ways:

    • Choose File Add to Map > Bridge Domain.
    • In the toolbar, click Add to Map and choose Bridge Domain.
    note.gif

    Noteblank.gif The Bridge Domains must be added to the map containing the VPLS instances to view the associations between them.


    Step 2blank.gif In the Add Bridge Domain dialog box, select Show All to display the list of bridge domains.

    Step 3blank.gif For both the peers, select the PBB bridges associated to the VFIs. The bridges can be filtered using the name of the bridges.

    note.gif

    Noteblank.gif I-SID can also be used for filtering I-bridges.


    Step 4blank.gif On adding the PBB-bridges to the map:

    • A link is formed between the associated VPLS plugin and the B-bridges for both the peers.
    • A link is formed between the I-bridges and the B-bridges for both the peers.


     

    Viewing FEC 129 Type I-based Pseudowire Tunnels from Virtual Connection Map View

    The Virtual Connection view displays the logical association between the FEC 129 type I pseudowire peers in a single view.

    To view the end-to-end connection between the FEC 129 type I pseudowire peers:


    Step 1blank.gif Open the Add Virtual Connection to Specific plugin dialog box in either of the following ways:

      • In the toolbar, choose Add to Map > Virtual Connection.
      • In the menu bar, choose File > Add to Map > Virtual Connection.

    Step 2blank.gif In the Add Virtual Connection to Specific plugins dialog box, select the FEC 129 type I-based pseudowire virtual connection that you want to view.

    Step 3blank.gif To view a specific FEC type I pseudowire, filter using the I-SID, VPN-id, or the names of the associated VFIs to identify the FEC Type I pseudowire.

    Step 4blank.gif Click OK to add the selected virtual connection component to the map.

    Step 5blank.gif You can view the following FEC 129 Type I pseudowire information for the selected virtual connection component added to the map:


     

    Viewing FEC 129 Type I Pseudowire Links from Virtual Connection View

    To view the end-to-end connection between the FEC 129 Type I-based pseudowire peers:


    Step 1blank.gif Click the Expand (+) icon to view the associated components and the links:

    • Association between the VPLS instances. Click the Expand (+) icon on the VPLS instances.
    • Association between the VFIs, which on further expansion, displays the corresponding components.
    • Association between the FEC-129 Type I-based pseudowire peers. To view the topology Link Properties window, click the link between the two associated FEC 129 Type I-based pseudowire peers.

    If the above topology has PBB bridges configured on either ends, then the following are displayed in addition to the above components and links:

    • Association between the I-bridges and the B- bridges (of both the FEC 129 Type I pseudowire peers).
    • Association between the B-bridges and the VPLS instances. For further viewing the components attached to the VPLS instances, navigate to Step 1.


     

    Viewing FEC 129 Type I Pseudowire Properties from Virtual Connection View

    To view the virtual connection properties of FEC 129 type I pseudowire peers:


    Step 1blank.gif Right-click the selected virtual connection component in the map.

    Step 2blank.gif Click the Properties tab to display the EVC hyperlink.

    Step 3blank.gif Click the EVC hyperlink to view the EVC terminating points.