@ PScottC:
The thing is, not all Metro Ethernet services end in L2 switchports facing a customer network, and even among those that are, not all would require an allowance of over 1K CAM entries. Some customer-facing ports would go to MPLS VPN endpoints, for example, where the provider switch might use a routed port for a point-to-point network inside a customer-specific VRF, so the concept of mac-hungry L2 access wouldn't apply.
Also, for ethernet relay services, where a vlan becomes analagous to a frame-relay "circuit" from a provider's perspective, in some cases mac-learning can be disabled outright. Since all traffic has only two endpoints, there are cases where frame flooding (for unknown destination macs) doesn't matter since it only has one path to take. Such a setup can still have redundancy, too, since STP would block the floods in an L2 domain and if the provider has an MPLS core then LSRs wouldn't base forwarding for MPLS VCs on the CAM tables anyway.
So, for a single provider edge switch, you definitely wouldn't need a 1K port-security restriction on every customer-facing port. I'd say 1K is pretty high in general, but if your CAM tables became a major scaling issue for a provider, I'd say establish a baseline of expected customer usage, make recorded port-security violations a part of normal network monitoring (which it should be anyway) and handle extreme cases case-by-case.
As for QnQ, it's useful for preserving available provider vlans and STP instances, if you had a point-to-point ethernet relay service where a customer wanted to exchange tags between their sites. It wouldn't help the CAM for the reasons you mention, though.
@ Cluebird:
In many things, there's definitely more of an emphasis on enterprises than providers. In Cisco texts especially, I notice they often look at the enterprise network as "we" and the provider network as "they". The original scenario in this thread wasn't for a MetroE network (I used it as a classic example of edge trunks), but sicne the question was more about why Cisco doesn't recommend a particular setting for a specific technology, I didn't think more elaboration on use was needed; if I was asking how to redesign a network such that port-security on an etherchannel wasn't needed, I definitely would have explained the scenario at hand in more detail.
CCNP, CCDP