Cisco Systems OL-4344-01 manual Cpe

Page 8

Chapter 1 About Cisco IP Solution Center

Overview of ISC

Figure 1-4 Defining the User Role

 

 

 

 

 

 

 

ISC Service Request States

WAIT

 

FAILED

FAILED

 

Provisioning States

 

 

 

DEPLOY

 

DEPLOY

AUDIT

 

Auditing States

 

REQUESTED PENDING DEPLOYED FUNCTIONAL

INVALID

CLOSED

LOST

BROKEN

93827

The permissions to Create, View, Modify, and Delete are enforced for the following resources:

Persistent task

MPLS policy

SAA probe

MPLS service request

Workflow

Layer 2 VPN policy

Device

Layer 2 VPN service request

ISC host

Firewall policy

Customer

Firewall service request

Provider

Network Address Translation service request

PE

IPsec policy

CPE

IPsec service request

Qos Policy

Deployment flow

Qos service request

Template

Cisco IP Solution Center, 3.0: MPLS VPN Management User Guide, 3.0

1-8

OL-4344-01

 

 

Image 8
Contents About Cisco IP Solution Center Overview of ISC ISC Network Management SubnetISC Features Service Provider Network for Vlan ID Management Access Domain Assigned Resource PoolsFeatures and Functions Provided in Provisioning with ISC VPN Service Profile-Based ProvisioningRole-Based Access Control Rbac CPE Customer’s and Provider’s View of the Network Customer’s View of the NetworkAbout Provider Edge Routers PEs About Multi-VRF CEsA Multi-VRF CE Providing Layer 3 Aggregation Using Templates to Customize Configuration Files Mapping IPsec Tunnels to Mpls VPNsAuditing Service Requests Uses for the Template FunctionAbout Mpls VPNs VPNs Sharing SitesCharacteristics of Mpls VPNs Intranets and ExtranetsVPN Routing and Forwarding Tables VRFs VRF Implementation Considerations Ip vrf site2 rdCreating a VRF Instance Route Distinguishers and Route TargetsRoute Target Communities CE Routing CommunitiesHub and Spoke Considerations Security Requirements for Mpls VPNs Address Space and Routing SeparationAddress Space Separation Routing SeparationHiding the Mpls Core Structure Resistance to Attacks Securing the Routing ProtocolLabel Spoofing Routing Authentication Securing the Mpls CoreTrusted Devices PE-CE InterfaceConnectivity Between VPNs LDP AuthenticationSeparation of CE-PE Links MP-BGP Security Features Security Through IP Address ResolutionAPI Functionality Supported North Bound Interface NBIEnsuring VPN Isolation API Approach Distributed Load BalancingNBI Benefits 11 Simple Flat-Based Server Load Balancing Configuration Four-Tier System Architecture Client tierControl tier