Chapter 13 dcscm configuraion, 1 dcscm introduction, 2 dcscm configuration – Amer Networks SS2R48G4i V2 User Manual
Page 122: 1 dcscm configuration task sequence
SS2R24G4i/SS2R48G4i
111
Chapter 13 DCSCM Configuraion
13.1 DCSCM Introduction
DCSCM(security control multicast)technology includes three respects multicast source
controllabillity, multicast users controllabillity and the service-priority-oriented multicast policy.
The DCSCM technology mainly use the following methods to realize multicast source
controllabillity
a) On the boundary switch, if configured the source-controlled multicast, only the muticast data of
the specified group sent by specified source can pass.
b) For the RP switch at the PIM-SM core state, REGISTER_STOP will be directly sent for all the
REGISTER information besides than the specified source and group.Creating list entries is not
allowed.(This task is implemented in PIM-SM module).
The implementation of DCSCM technology is based on the contro lboer the IGMP report messages
from users, so the controlling modules are IGMP snooping module and IGMP module. The control logic
of it includes the following three methods control according to the source VLAN+MAC address of the
message, control according to the source IP address of the message, and control according to the port
through which the message enters.IGMP snooping can use all the three methods while the IGMP, since
it is at layer 3, can only control according to the source IP address of the messgae.
The service-priority-oriented mutilcast policy of DCSCM technology adpots the following methods
for the multicast data within a limited range, the user-specified priority is set at the access point, making
data be transmitted on TRUNK at a higher priority, and thus ensuring the data to be transmitted through
the whole network at the user-specified priority.
13.2 DCSCM Configuration
13.2.1 DCSCM Configuration Task Sequence
(
1) Configuration of source control
(
2) Configuration of destination control
(
3) Configuration of multicast policy.
1. Configuration of source control
Configuration of source control can be divided into three parts, the first is to enable the source
control globally, the following is th command to do this
Command Explantation
Global configuration mode