5 ecscm, 1 introduction to ecscm, Ecscm – Accton Technology ES4626 User Manual
Page 657

657
00:00:00
13.1.1.0/24 .D. Vlan1 Directly Connected 1 00:10:22
00:00:00
Displayed Information
Explanations
Network
Target net segment or address and mask
Flags
Routing state flag
Nexthop Xface
Next hop interface address
Nexthop Neighbor
Next hop neighbor
Metric
Routing metric value
Uptime Routing
uptime
Exptime
Routing expire time
16.5 ECSCM
16.5.1 Introduction to ECSCM
ECSCM (EgdeCore Security Control Multicast) technology mainly includes three
aspects, i.e. Multicast Packet Source Controllable, Multicast User Controllable and
Service-Oriented Priority Strategy Multicast.
The Multicast Packet Source Controllable technology of Security Controllable
Multicast technology is mainly processed in the following manners:
1. On the edge switch, if source under-control multicast is configured, then only
multicast data from specified group of specified source can pass.
2. For RP switch in the core of PIM-SM, for REGISTER information out of specified
source and specified group, REGISTER_STOP is transmitted directly and table entry
is not allowed to set up. (This task is implemented in PIM-SM model).
The implement of Multicast User Controllable technology of Security Controllable
Multicast technology is based on the control over IGMP report message sent out by the
user, thus the model being controlled is IGMP snooping and IGMP model, of which the
control logic includes the following three, i.e. to take control based on VLAN+MAC
address transmitting packets, to take control based on IP address of transmitting packets
and to take control based on the port where messages enter, in which IGMP snooping
can use the above three methods to take control simultaneously, while since IGMP model
is located at layer 3, it only takes control over the IP address transmitting packets.
The Service-Oriented Priority Strategy Multicast of Security Controllable technology
adopts the following mode: for multicast data in limit range, set the priority specified by
the user at the join-in end so that data can be sent in a higher priority on TRUNK port,