beautypg.com
i
Contents
Multicast overview ······················································································································································· 1
Introduction to multicast ···················································································································································· 1
Information transmission techniques ······················································································································· 1
Multicast features ······················································································································································ 3
Common notations in multicast ······························································································································· 4
Multicast advantages and applications ················································································································· 4
Multicast models ································································································································································ 5
Multicast architecture ························································································································································ 5
Multicast addresses ·················································································································································· 6
Multicast protocols ··················································································································································· 9
Multicast packet forwarding mechanism ····················································································································· 11
Multicast support for VPNs ············································································································································ 11
Introduction to VPN instances ······························································································································ 12
Multicast application in VPNs ······························································································································ 12
Configuring IGMP snooping ····································································································································· 13
Overview ········································································································································································· 13
Basic IGMP snooping concepts ··························································································································· 13
How IGMP snooping operates ···························································································································· 15
IGMP snooping proxying ····································································································································· 16
Protocols and standards ······································································································································· 17
IGMP snooping configuration task list ························································································································· 18
Configuring basic IGMP snooping functions ·············································································································· 18
Enabling IGMP snooping ····································································································································· 19
Specifying the IGMP snooping version ··············································································································· 19
Setting the maximum number of IGMP snooping forwarding entries ······························································ 20
Configuring IGMP snooping port functions ················································································································· 20
Setting aging timers for dynamic ports ··············································································································· 20
Configuring static ports ········································································································································· 21
Configuring a port as a simulated member host ······························································································· 22
Enabling IGMP snooping fast-leave processing ································································································· 22
Disabling a port from becoming a dynamic router port ··················································································· 23
Configuring IGMP snooping querier ··························································································································· 24
Enabling IGMP snooping querier ························································································································ 24
Configuring parameters for IGMP queries and responses ··············································································· 25
Configuring source IP addresses for IGMP queries ··························································································· 26
Configuring IGMP snooping proxying ························································································································ 26
Enabling IGMP snooping proxying ····················································································································· 26
Configuring the source IP addresses for the IGMP messages sent by the proxy ············································ 27
Configuring an IGMP snooping policy ························································································································ 27
Configuring a multicast group filter ····················································································································· 27
Enabling dropping unknown multicast data ······································································································· 28
Enabling IGMP report suppression ······················································································································ 29
Setting the maximum number of multicast groups that a port can join ··························································· 29
Enabling multicast group replacement ················································································································ 30
Enabling the IGMP snooping host tracking function ························································································· 31
Displaying and maintaining IGMP snooping ·············································································································· 31
IGMP snooping configuration examples ····················································································································· 32
Group policy and simulated joining configuration example ············································································ 32