Cisco Systems OL-4344-01 manual Uses for the Template Function, Auditing Service Requests

Page 13

Chapter 1 About Cisco IP Solution Center

Using Templates to Customize Configuration Files

The template files and data files are in XML format. The template file, its data files, and all template configuration file files are mapped to a single directory.

ISC creates the initial ISC configlet. Through the Template Manager, you can create a template configuration file. You can then associate a template configuration file with a service request, which effectively merges the ISC configlet and the template configuration file. You can then download this merged ISC configlet to the target router (or routers).

You can also create a template configuration file and download it directly to a router.

Uses for the Template Function

Service providers can use the Template Manager to enhance ISC functionality. You can use the Template Manager to provide initial configuration for any service provider core device or edge device.

The Template Manager can be used as a stand-alone tool to generate complete configuration files that you can download to any ISC target.

Some of the additional uses for templates are as follows:

IOS firewall provisioning

Add a set of commands that ISC does not include to a service request; for example, provisioning ATM Class of Service.

Use the template feature to apply Class of Service using IP connectivity.

Download a ISC service request and an Cisco IOS configuration file in one download operation through the console. This edge device staging method would create a template and apply the service request in one step.

Auditing Service Requests

A service request audit verifies that service requests are deployed on the network. You can audit new or existing requests. A service request audit can be scheduled on a regular basis to verify the state of the network provisioning requests. The audit verifies the following:

Verifies the IOS configuration on all network devices.

Verifies the routing tables and routing for the VPN.

ISC audits against the Repository, not the network. The service operator should schedule auditing after the collection of configuration and routing tables has taken place.

Auditing an existing service request involves three tasks:

Collects configuration

Collects routing

Runs an audit against the specified service requests

Auditing Report Services

Audit reports provide these services:

Audit New Services: Handles auditing of services requested but not yet deployed (that is, the configuration is not apparent in the router).

The Audit New Services also identifies problems with the download of configuration files to routers

Cisco IP Solution Center, 3.0: MPLS VPN Management User Guide, 3.0

 

OL-4344-01

1-13

 

 

 

Image 13
Contents About Cisco IP Solution Center ISC Network Management Subnet Overview of ISCISC Features Service Provider Network for Vlan ID Management Resource Pools Access Domain AssignedVPN Service Profile-Based Provisioning Features and Functions Provided in Provisioning with ISCRole-Based Access Control Rbac CPE Customer’s View of the Network Customer’s and Provider’s View of the NetworkAbout Multi-VRF CEs About Provider Edge Routers PEsA Multi-VRF CE Providing Layer 3 Aggregation Mapping IPsec Tunnels to Mpls VPNs Using Templates to Customize Configuration FilesUses for the Template Function Auditing Service RequestsVPNs Sharing Sites About Mpls VPNsIntranets and Extranets Characteristics of Mpls VPNsVPN Routing and Forwarding Tables VRFs Ip vrf site2 rd VRF Implementation ConsiderationsRoute Distinguishers and Route Targets Creating a VRF InstanceCE Routing Communities Route Target CommunitiesHub and Spoke Considerations Address Space and Routing Separation Security Requirements for Mpls VPNsAddress Space Separation Routing SeparationHiding the Mpls Core Structure Securing the Routing Protocol Resistance to AttacksLabel Spoofing Securing the Mpls Core Routing AuthenticationTrusted Devices PE-CE InterfaceSeparation of CE-PE Links LDP AuthenticationConnectivity Between VPNs Security Through IP Address Resolution MP-BGP Security FeaturesEnsuring VPN Isolation North Bound Interface NBIAPI Functionality Supported NBI Benefits Distributed Load BalancingAPI Approach 11 Simple Flat-Based Server Load Balancing Configuration Client tier Four-Tier System ArchitectureControl tier