Table of Contents Table of Contents Title and Copyright Information Preface Audience Documentation Accessibility Diversity and Inclusion 1 Introduction Overview of IP Service Activator Service Modules Flexible Multi-Vendor Support Device Discovery and Management Policy-Based Management Intelligent Data Modeling OSS Integration Capabilities Event Handler Flexible Activation Extensibility Scalability IPv6 Support Distributed Architecture Core Components Policy Server and Database Naming Service System Logger Database Network Processor and Cartridges Programmatic Intent-Based Network REST API Web Service API Component Manager User Interfaces Configuration Template Module 2 IP Service Activator Features Network Discovery and Representation The Discovery Process Access and Authentication Device and Interface Capabilities The Topology Model Mapping the Network Map Views Manual Mapping Automatic Mapping Device Management and Integrity Communicating with the Device Modeling Device Configuration Ensuring Consistency and Integrity Co-existence with Manual Configuration Logging and Reporting Managing Data The Knowledge Store The External Object Model Transaction-based Processing Defining Transactions Timing of Transactions Transaction Workflows Security Access User Authentication User and Group Permissions Object Ownership and Permissions 3 Transactions About Transactions Transaction Workflows The One-stage Commit Model The Two-stage Commit Model Local and Common Object Models The Transaction Store Working with Transactions Checking the Origin of a Transaction Selecting Transactions Transaction Processing: Data Flow Concretes Searching for Concrete Objects Abstract and Concrete Policy Elements Abstract and Concrete Rules Rule Status Concrete Activation Status Turning Off and On the Concrete Audit State Feature If Concretes are not Created as Expected 4 VPN and Connectivity Services Layer 3 MPLS VPNs (RFC 4364) Key Concepts MPLS Roles of Routers BGP Site and Route Distinguishers VPN-IPv4 and IPv6 Addresses VRF Tables and Route Targets Routing Protocols in the VPN VRF Tables VRF Table Names VRF Re-use and Reduction RD Number Formats RT Number Formats VPN Topologies RDs per VPN VRF Route Limit Co-existence with Predefined VRF Tables Predefined Export Maps PE-PE Routing -iBGP iBGP Peering Optional Load Balancing PE-PE Community Attributes MD5 Authentication PE-CE Configuration PE-CE Protocols Route Redistribution eBGP Configuration IPsec Martini Layer 2 MPLS VPNs Implementation Scenarios Layer 2 Martini VPNs on Routers and MPLS-enabled Switching Devices Creating a Layer 2 Martini VPN in IP Service Activator Layer 2 MPLS Label Switched Paths Supported Services Metro Ethernet Virtual LAN (VLAN) Services VLAN Options Dedicated Internet Access Layer 3 Multicast Services IP Multicast Services VPN Multicast Services 5 Policy-based Services Key Policy Configuration Concepts About Policy Elements Policy Rules Per Hop Behavior Groups SLA Measurement and Collector Parameters About Policy Targets Policy Roles Inheritance Configuring QoS Policies Classifying Traffic Marking Traffic DiffServ Codepoint IP Precedence MPLS Experimental Bits Shaping and Queuing Traffic Traffic Shaping Queuing Mechanisms Policing Traffic Modular QoS CLI Configuring Access Control Policies 6 Extending IP Service Activator About the Configuration Template Module 7 Integration Features REST Web Service API Web Service API OSS Integration Manager About the OIM Command Set About the External Object Model Transaction Monitoring Functions Other Uses of OIM Fault and Event Reporting About Subscriptions Collecting and Filtering Delivery Methods SNMP Trap Reporting CORBA Interface The OSS Java Development Library Ready-to-Use Integrations SLA Monitoring Types of Measurements Supported Web Services and Reference Implementation Reference Implementation