beautypg.com

H3C Technologies H3C S3100V2 Series Switches User Manual

Page 6

background image

i

Contents

Multicast overview ······················································································································································· 1

Introduction to multicast····················································································································································1

Comparison of information transmission techniques ····························································································1

Features of multicast·················································································································································3

Common notations in multicast ·······························································································································4

Advantages and applications of multicast·············································································································4

Multicast models································································································································································5

Multicast architecture························································································································································5

Multicast addresses ··················································································································································6

Multicast protocols ···················································································································································9

Multicast packet forwarding mechanism····················································································································· 11

IGMP snooping configuration···································································································································12

IGMP snooping overview·············································································································································· 12

Principle of IGMP snooping ································································································································· 12

Basic concepts in IGMP snooping······················································································································· 13

How IGMP snooping works ································································································································· 14

IGMP snooping proxying ····································································································································· 16

Protocols and standards ······································································································································· 17

IGMP snooping configuration task list ························································································································· 17

Configuring basic functions of IGMP snooping·········································································································· 18

Configuration prerequisites ·································································································································· 18

Enabling IGMP snooping ····································································································································· 18

Configuring the version of IGMP snooping········································································································ 19

Configuring static multicast MAC address entries····························································································· 19

Configuring IGMP snooping port functions················································································································· 20

Configuration prerequisites ·································································································································· 20

Configuring aging timers for dynamic ports ······································································································ 20

Configuring static ports········································································································································· 21

Configuring simulated joining······························································································································ 22

Configuring fast leave processing ······················································································································· 23

Disabling a port or a group of ports from changing into dynamic router ports············································· 23

Configuring IGMP snooping querier ··························································································································· 24

Configuration prerequisites ·································································································································· 24

Enabling IGMP snooping querier························································································································ 24

Configuring IGMP queries and responses·········································································································· 25

Configuring source IP address of IGMP queries································································································ 26

Configuring IGMP snooping proxying ························································································································ 26

Configuration prerequisites ·································································································································· 26

Enabling IGMP snooping proxying····················································································································· 27

Configuring a source IP address for the IGMP messages sent by the proxy·················································· 27

Configuring an IGMP snooping policy························································································································ 27

Configuration prerequisites ·································································································································· 27

Configuring a multicast group filter····················································································································· 28

Configuring multicast source port filtering·········································································································· 28

Configuring the function of dropping unknown multicast data ········································································ 29

Configuring IGMP report suppression ················································································································ 29

Configuring maximum multicast groups that a port can join············································································ 30

Configuring multicast group replacement··········································································································· 31