1 Scope
2 References
3 Definitions
4 Abbreviations and acronyms
5 Conventions
5.1 Requirements
5.2 Conformance
6 Theory of operation (Informative)
6.1 L2VPN features
6.2 CMTS layer-2 forwarding architecture
7 L2VPN operation
7.1 CMTS bridging model requirements
7.2 Configuring L2VPN forwarding
7.3 CMTS upstream L2VPN forwarding
7.4 CMTS downstream L2VPN forwarding
7.5 L2VPN isolation and privacy
7.6 CM and eSAFE exclusion
7.7 L2VPN quality of service
7.8 Stacked 802.1Q tags or tag-in-tag operation
7.9 Spanning tree and loop detection
8 Cable modem requirements
Annex A – CMTS DOCS-L2VPN-MIB requirements
A.1 DOCS-L2VPN-MIB conformance
A.2 DOCS-L2VPN-MIB definitions
Annex B – Parameter encodings
B.1 Capabilities
B.2 Downstream unencrypted traffic (DUT) filtering encoding
B.3 L2VPN encoding
B.4 Confirmation codes
B.5 L2VPN error encoding
B.6 CM interface mask classification criteria
Appendix I – Example L2VPN encodings
I.1 Point-to-point example
I.2 Multipoint example
I.3 Upstream L2VPN classifier example
Appendix II – IEEE 802.1Q encapsulation
Appendix III – Embedded VLAN CM bridging model
III.1 IEEE 802.1Q and embedded VLAN model
III.2 Embedded bridge MAC domain service primitives
Appendix IV – L2VPN non-compliant CM restrictions
IV.1 Leaking through non-compliant CMs
Bibliography