beautypg.com

5 ipv6 dcscm, 1 introduction to ipv6 dcscm, 2 ipv6 dcscm configuration task sequence – QTECH QSW-8300 Инструкция по настройке User Manual

Page 281: Dcscm

background image

+7(495) 797-3311 www.qtech.ru

Москва, Новозаводская ул., 18, стр. 1

280

29.5 IPv6 DCSCM

29.5.1 Introduction to IPv6 DCSCM

The technology of IPv6 DCSCM (Destination Control and Source Control Multicast) includes

three aspects: the multicast source control, the multicast user control and the service-priority-

oriented policy multicast.

IPv6 DCSCM Controllable Multicast technology proceeds as the following way:

1. If source controlled multicast is configured on the edge switches, only the multicast data of

the specified group from the specified source can pass.

2. The RP switches which are the core of PIM-SM will directly send REGISTER_STOP as

response to the REGISTER messages not from the specified source and specified group, and

no entry is allowed to be created. (This task is implemented in the PIM-SM module).

The control of multicast users of IPv6 DCSCM technology is implemented on the basis of

controlling the MLD message sent from the users, so the control module is MLD snooping and

the MLD module, the control logic of which includes the following three methods: controlling

according to the VLAN+MAC sending the message, controlling according to the IP address

sending the message, and controlling according to the input port of the message. MLD

snooping can adopts all the three methods at the same time, while the MLD module, at the

third layer, can only control the IP address sending the message.

The service-priority-oriented policy multicast of IPv6 DCSCM technology adopts the following

method: for the confined multicast data, the user-specified priority will be set at the access

point, enabling the data can be sent at a higher priority through TRUNK, and guaranteeing that

the data can be sent through the whole net at the user-specified priority.

29.5.2 IPv6 DCSCM Configuration Task Sequence

The source control configuration

The destination control configuration

The multicast policy configuration

The source control configuration

The source control configuration has three steps, first is globally enabling the source control,

the following is the command of globally enabling the source control:

Command

Explanation

Global Configuration Mode

ipv6 multicast source-control(necessary)

no ipv6 multicast source-control

Globally enable the source control, the no

operation of this command will globally disable

the source control. What should be paid

attention to is that, once globally enable the

source control, all the multicast messages will