xxv
Cisco Prime Network 4.0 User Guide
OL-29343-01
Chapter 12, “Monitoring Carrier Ethernet
Services” Describes how to view Carrier Ethernet services
in Prime Network Vision and how to work with
VLANs, pseudowires, overlays, VPLS instances,
and Ethernet services.
Chapter 13, “Monitoring Carrier Grade NAT
Properties” Describes the Carrier Grade Name Address
Translation (NAT) properties available in Prime
Network Vision.
Chapter 14, “Monitoring DWDM Properties” Describes how to view and monitor IP over dense
wavelength division multiplexing (DWDM)
properties in Prime Network Vision.
Chapter 15, “Monitoring Ethernet Operations,
Administration, and Maintenance Tool
Properties”
Describes how to use Prime Network Vision to
monitor Ethernet operations, administration, and
maintenance (OAM) tools.
Chapter 16, “Monitoring Y.1731 IPSLA
Configuration” Describes how to view Y.1731 IP Service Level
Agreement (SLA) configurations for the OAM
functionality in Ethernet networks.
Chapter 17, “IPv6 and IPv6 VPN over MPLS” Describes how to use Prime Network Vision to
view IPv6 and 6PVE properties.
Chapter 18, “Monitoring MPLS Services” Describes how to view and manage aspects of
Multiprotocol Label Switching (MPLS) services
using Prime Network Vision, including the MPLS
service view, business configuration, and maps.
This chapter also describes the inventory
properties specific to MPLS VPNs, including
routing entities, label switched entities (LSEs),
BGP neighbors, Multiprotocol BGP (MP-BGP),
VRF instances, pseudowires, and traffic
engineering (TE) tunnels.
Chapter 19, “Viewing IP and MPLS Multicast
Configurations” Describes how to view multicast configurations
and how Prime Network Vision supports
multicast on MPLS and routing entities.
Chapter 20, “Monitoring MToP Services” Describes Mobile Transport over Packet (MToP)
services and how to view their properties in Prime
Network Vision.
Chapter 21, “Viewing and Managing SBCs” Describes the Session Border Controller (SBC)
properties available in Prime Network Vision.
Chapter 22, “Monitoring AAA Configurations” Describes how to view Authentication,
Authorization, and Accounting (AAA)
configuration, which is a security architecture for
distributed systems that determines the access
given to users for specific services and the amount
of resources they have used.
Chapter and Title Description