CONTENTS

 

 1     Scope     
 2     References         
 3     Definitions         
 4     Abbreviations and acronyms     
 5     Conventions       
        5.1     Requirements       
        5.2     Conformance       
 6     Theory of operation (Informative)         
        6.1     L2VPN features   
        6.2     CMTS layer-2 forwarding architecture    
 7     L2VPN operation          
        7.1     CMTS bridging model requirements       
        7.2     Configuring L2VPN forwarding 
        7.3     CMTS upstream L2VPN forwarding      
        7.4     CMTS downstream L2VPN forwarding 
        7.5     L2VPN isolation and privacy      
        7.6     CM and eSAFE exclusion           
        7.7     L2VPN quality of service
        7.8     Stacked 802.1Q tags or tag-in-tag operation       
        7.9     Spanning tree and loop detection
 8     Cable modem requirements       
Annex A – CMTS DOCS-L2VPN-MIB requirements     
        A.1     DOCS-L2VPN-MIB conformance        
        A.2     DOCS-L2VPN-MIB definitions
Annex B – Parameter encodings     
        B.1     Capabilities          
        B.2     Downstream unencrypted traffic (DUT) filtering encoding       
        B.3     L2VPN encoding
        B.4     Confirmation codes         
        B.5     L2VPN error encoding   
        B.6     CM interface mask classification criteria
Appendix I – Example L2VPN encodings     
        I.1            Point-to-point example          
        I.2            Multipoint example    
        I.3            Upstream L2VPN classifier example 
Appendix II – IEEE 802.1Q encapsulation     
Appendix III – Embedded VLAN CM bridging model     
      III.1     IEEE 802.1Q and embedded VLAN model      
      III.2     Embedded bridge MAC domain service primitives        
Appendix IV – L2VPN non-compliant CM restrictions     
       IV.1     Leaking through non-compliant CMs    
Bibliography