H3C Technologies H3C S3100V2 Series Switches User Manual
Page 6
![background image](https://www.manualsdir.com/files/812884/content/doc006.png)
i
Contents
Multicast overview ······················································································································································· 1
Introduction to multicast····················································································································································1
Comparison of information transmission techniques ····························································································1
Features of multicast·················································································································································3
Common notations in multicast ·······························································································································4
Advantages and applications of multicast·············································································································4
Multicast models································································································································································5
Multicast architecture························································································································································5
Multicast addresses ··················································································································································6
Multicast protocols ···················································································································································9
Multicast packet forwarding mechanism····················································································································· 11
IGMP snooping configuration···································································································································12
IGMP snooping overview·············································································································································· 12
Principle of IGMP snooping ································································································································· 12
Basic concepts in IGMP snooping······················································································································· 13
How IGMP snooping works ································································································································· 14
IGMP snooping proxying ····································································································································· 16
Protocols and standards ······································································································································· 17
IGMP snooping configuration task list ························································································································· 17
Configuring basic functions of IGMP snooping·········································································································· 18
Configuration prerequisites ·································································································································· 18
Enabling IGMP snooping ····································································································································· 18
Configuring the version of IGMP snooping········································································································ 19
Configuring static multicast MAC address entries····························································································· 19
Configuring IGMP snooping port functions················································································································· 20
Configuration prerequisites ·································································································································· 20
Configuring aging timers for dynamic ports ······································································································ 20
Configuring static ports········································································································································· 21
Configuring simulated joining······························································································································ 22
Configuring fast leave processing ······················································································································· 23
Configuring IGMP snooping querier ··························································································································· 24
Configuration prerequisites ·································································································································· 24
Enabling IGMP snooping querier························································································································ 24
Configuring IGMP queries and responses·········································································································· 25
Configuring source IP address of IGMP queries································································································ 26
Configuring IGMP snooping proxying ························································································································ 26
Configuration prerequisites ·································································································································· 26
Enabling IGMP snooping proxying····················································································································· 27
Configuring an IGMP snooping policy························································································································ 27
Configuration prerequisites ·································································································································· 27
Configuring a multicast group filter····················································································································· 28
Configuring multicast source port filtering·········································································································· 28
Configuring the function of dropping unknown multicast data ········································································ 29
Configuring IGMP report suppression ················································································································ 29
Configuring maximum multicast groups that a port can join············································································ 30
Configuring multicast group replacement··········································································································· 31