ETSI ES 203 385-2014 CABLE DOCSIS Layer 2 Virtual Private Networking (V1 1 1)《电缆 DOCSIS 2层虚拟专用网络 (V1 1 1)》.pdf
《ETSI ES 203 385-2014 CABLE DOCSIS Layer 2 Virtual Private Networking (V1 1 1)《电缆 DOCSIS 2层虚拟专用网络 (V1 1 1)》.pdf》由会员分享,可在线阅读,更多相关《ETSI ES 203 385-2014 CABLE DOCSIS Layer 2 Virtual Private Networking (V1 1 1)《电缆 DOCSIS 2层虚拟专用网络 (V1 1 1)》.pdf(134页珍藏版)》请在麦多课文档分享上搜索。
1、 ETSI ES 203 385 V1.1.1 (2014-11) CABLE; DOCSISLayer 2 Virtual Private Networking ETSI STANDARD ETSI ETSI ES 203 385 V1.1.1 (2014-11) 2Reference DES/CABLE-00008 Keywords access, broadband, cable, data, IP, IPcable, L2VPN, modem ETSI 650 Route des Lucioles F-06921 Sophia Antipolis Cedex - FRANCE Tel.
2、: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org The present document may be made available in electroni
3、c versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such versions and/or in print, the only prevailing docume
4、nt is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents i
5、s available at http:/portal.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced or utilized in any form or by any means, e
6、lectronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the foregoing restriction extend to reproduction in all media. European
7、Telecommunications Standards Institute 2014. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are Trade Marks of ETSI registered for the benefit of its Members. 3GPPTM and LTE are Trade Marks of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners.
8、GSM and the GSM logo are Trade Marks registered and owned by the GSM Association. ETSI ETSI ES 203 385 V1.1.1 (2014-11) 3Contents Intellectual Property Rights 7g3Foreword . 7g3Modal verbs terminology 7g31 Scope 8g32 References 8g32.1 Normative references . 8g32.2 Informative references 9g33 Definiti
9、ons and abbreviations . 10g33.1 Definitions 10g33.2 Abbreviations . 12g34 Requirements and conformance . 15g34.1 Requirements 15g34.2 Conformance 16g35 Theory of operation 16g35.1 L2VPN Features . 16g35.1.1 Transparent LAN Service . 16g35.1.2 Multiple ISP L2VPNs . 18g35.1.3 Management L2VPNs. 18g35.
10、1.4 Other L2VPN-enabled Features 19g35.1.5 High Availability 19g35.2 CMTS Layer 2 Forwarding Architecture . 19g35.2.1 L2VPN and Non-L2VPN Forwarding 19g35.2.2 Point-to-Point and Multipoint L2VPN Forwarding Modes 20g36 L2VPN Operation (Normative) 22g36.1 CMTS Bridging Model Requirements . 22g36.2 Con
11、figuring L2VPN Forwarding . 23g36.2.1 VPNID Subtype 26g36.2.1.1 Border Gateway Protocol (BGP) VPNID Subtype . 26g36.2.2 Downstream Classifier L2VPN Encoding 26g36.2.3 L2VPN SA-Descriptor Subtype 27g36.2.4 Vendor-Specific L2VPN Encoding 27g36.2.5 Configuration Error Requirements . 27g36.2.6 Network S
12、ystem Interface (NSI) Encapsulation . 28g36.2.6.1 NSI Encapsulation Subtype . 28g36.2.6.2 IEEE 802.1Q L2VPN Forwarding 28g36.2.6.3 IEEE 802.1Q L2VPN Forwarding 28g36.2.6.3.1 Point-to-Point CMTS Forwarding with Point-to-Point 802.1Q Forwarding . 29g36.2.6.3.2 Point-to-Point CMTS Forwarding with L2VPN
13、 Bridging Network Element . 29g36.2.6.4 IEEE 802.1Q L2VPN Forwarding 29g36.2.7 Virtual Private LAN Service (VPLS) and Virtual Private Wire Service 29g36.2.7.1 PSN Tunnel - Control Plane and Data Plane Encapsulation . 30g36.2.7.2 PW - Control Plane and Data Plane Encapsulations . 30g36.2.7.2.1 PW Sig
14、naling without Auto-Discovery . 31g36.2.7.2.2 PW Signaling with Auto-Discovery 32g36.3 CMTS Upstream L2VPN Forwarding 33g36.4 CMTS Downstream L2VPN Forwarding . 35g36.4.1 Multipoint Downstream Forwarding 36g36.4.2 DOCSIS3.0 L2VPN Downstream Multicast Forwarding 36g36.5 L2VPN Isolation and Privacy .
15、36g36.5.1 Protecting L2VPN Traffic 37g36.5.2 Preventing Leaking of non-L2VPN Traffic 37g36.5.2.1 Downstream Unencrypted Traffic (DUT) Filtering 38g3ETSI ETSI ES 203 385 V1.1.1 (2014-11) 46.5.2.2 Downstream IP Multicast Encryption (DIME) . 38g36.5.2.3 Mixing L2VPN and non-L2VPN forwarding on the same
16、 CM 38g36.6 CM and eSAFE Exclusion . 38g36.6.1 CM and eSAFE Host Forwarding Model . 39g36.6.2 Cable Modem MAC Bridge Interface Masks . 39g36.6.3 Embedded Host Exclusion 40g36.6.4 CMTS embedded host MAC Address Learning . 40g36.6.4.1 Enable eSAFE DHCP Snooping Subtype . 40g36.6.5 Interface-based Clas
17、sification . 41g36.7 L2VPN Quality of Service . 41g36.7.1 DOCSISQoS 41g36.7.1.1 Service Flow Separation . 41g36.7.1.2 Classification and Scheduling . 42g36.7.2 Backbone Network QoS . 42g36.7.2.1 User Priority 42g36.7.2.1.1 IEEE 802.1d User Priority . 42g36.7.2.1.2 MPLS Traffic Class . 42g36.7.2.1.3
18、IP Precedence 42g36.7.2.2 Downstream User Priority Range Classification . 43g36.7.2.3 Downstream User Priority . 43g36.7.2.4 Upstream User Priority . 43g36.8 Stacked 802.1Q Tags or Tag-in-Tag operation 44g36.9 Spanning Tree and Loop Detection 44g36.10 High Availability 45g36.10.1 802 Encapsulation -
19、 Active/Standby Layer 2 Trunk Ports 45g36.10.2 802 Encapsulation - Link Aggregation . 45g36.10.3 MPLS Encapsulation High Availability . 45g36.11 MPLS Encapsulation - PW Redundancy 45g37 Cable Modem Requirements 46g38 Service Operations, Administration, and Maintenance (OAM) . 47g38.1 Introduction 47
20、g38.2 Service OAM Configuration 47g38.2.1 CM 48g38.2.2 CMTS . 48g38.3 Fault Management 48g38.3.1 Continuity Check Messages (CCM) . 48g38.3.2 Loopback 49g38.3.3 Linktrace . 49g38.4 Performance Management 49g39 Layer 2 Control Protocol Handling 49g3Annex A (normative): CMTS DOCS-L2VPN-MIB Requirements
21、 . 51g3A.1 DOCS-L2VPN-MIB Conformance 51g3A.2 DOCS-L2VPN-MIB Definitions 54g3Annex B (normative): Parameter Encodings 92g3B.1 Capabilities . 92g3B.1.1 L2VPN Capability 92g3B.1.2 Embedded Service/Application Functional Entity (eSAFE) Host Capability 92g3B.1.3 Downstream Unencrypted Traffic (DUT) Filt
22、ering . 92g3B.2 Downstream Unencrypted Traffic (DUT) Filtering Encoding . 93g3B.2.1 Downstream Unencrypted Traffic (DUT) Control . 93g3B.2.2 Downstream Unencrypted Traffic (DUT) CMIM 93g3B.3 L2VPN Encoding . 94g3B.3.1 VPN Identifier 94g3B.3.2 NSI Encapsulation Subtype 95g3B.3.2.1 IEEE 802.1Q S-TPID
23、. 97g3ETSI ETSI ES 203 385 V1.1.1 (2014-11) 5B.3.2.2 IEEE 802.1Q Encapsulation . 97g3B.3.2.2.1 IEEE 802.1Q I-TCI . 97g3B.3.2.2.2 MAC Address of the Destination Backbone Edge Bridge (B-DA) . 98g3B.3.2.2.3 IEEE 802.1Q B-TCI 98g3B.3.2.2.4 IEEE 802.1Q I-TPID . 98g3B.3.2.2.5 IEEE 802.1Q I-PCP 98g3B.3.2.2
24、.6 IEEE 802.1Q I-DEI . 98g3B.3.2.2.7 IEEE 802.1Q I-UCA . 99g3B.3.2.2.8 IEEE 802.1Q I-SID . 99g3B.3.2.2.9 IEEE 802.1Q B-TPID . 99g3B.3.2.2.10 IEEE 802.1Q B-PCP . 99g3B.3.2.2.11 IEEE 802.1Q B-DEI 100g3B.3.2.2.12 IEEE 802.1Q B-VID . 100g3B.3.3 eSAFE DHCP Snooping 100g3B.3.4 CM Interface Mask (CMIM) Sub
- 1.请仔细阅读文档,确保文档完整性,对于不预览、不比对内容而直接下载带来的问题本站不予受理。
- 2.下载的文档,不会出现我们的网址水印。
- 3、该文档所得收入(下载+内容+预览)归上传者、原创作者;如果您是本文档原作者,请点此认领!既往收益都归您。
下载文档到电脑,查找使用更方便
10000 积分 0人已下载
下载 | 加入VIP,交流精品资源 |
- 配套讲稿:
如PPT文件的首页显示word图标,表示该PPT已包含配套word讲稿。双击word图标可打开word文档。
- 特殊限制:
部分文档作品中含有的国旗、国徽等图片,仅作为作品整体效果示例展示,禁止商用。设计者仅对作品中独创性部分享有著作权。
- 关 键 词:
- ETSIES2033852014CABLEDOCSISLAYER2VIRTUALPRIVATENETWORKINGV111 电缆 DOCSIS2 虚拟 专用 网络 V111PDF

链接地址:http://www.mydoc123.com/p-731159.html