H3C Technologies H3C S7500E Series Switches User Manual
Page 7
i
Table of Contents
1 Multicast Overview·································································································································1-1
Introduction to Multicast ·······················································································································1-1
Features of Multicast ····················································································································1-4
Common Notations in Multicast····································································································1-5
Multicast Models ··································································································································1-6
Multicast Architecture ··························································································································1-6
Multicast Addresses ·····················································································································1-7
Multicast Protocols ·····················································································································1-11
Multi-Instance Multicast ·····················································································································1-14
2 IGMP Snooping Configuration ··············································································································2-1
IGMP Snooping Overview····················································································································2-1
Principle of IGMP Snooping ·········································································································2-1
How IGMP Snooping Works·········································································································2-4
IGMP Snooping Proxying ·············································································································2-6
Protocols and Standards ··············································································································2-8
IGMP Snooping Configuration Task List······························································································2-8
Configuration Prerequisites ··········································································································2-9
Enabling IGMP Snooping ·············································································································2-9
Configuration Prerequisites ········································································································2-11
Configuring Static Ports··············································································································2-12
Configuring Simulated Joining····································································································2-13
Configuring IGMP Snooping Querier ·································································································2-15
Configuration Prerequisites ········································································································2-15
Configuring IGMP Snooping Proxying ·······························································································2-18
Configuration Prerequisites ········································································································2-18