beautypg.com

H3C Technologies H3C S3100 Series Switches User Manual

Page 272

background image

ii

Introduction to MLD Snooping·········································································································3-1

Basic Concepts in MLD Snooping···································································································3-2

How MLD Snooping Works ·············································································································3-3

MLD Snooping Proxying··················································································································3-5

Protocols and Standards ·················································································································3-6

MLD Snooping Configuration Task List ··································································································3-7

Configuring Basic Functions of MLD Snooping ······················································································3-8

Configuration Prerequisites ·············································································································3-8

Enabling MLD Snooping··················································································································3-8

Configuring the Version of MLD Snooping ······················································································3-8

Configuring Limit on the Number of Forwarding Entries Globally ···················································3-9

Configuring MLD Snooping Port Functions ····························································································3-9

Configuration Prerequisites ·············································································································3-9

Configuring Aging Timers for Dynamic Ports ················································································3-10

Configuring Static Ports·················································································································3-10

Configuring Simulated Joining·······································································································3-11

Configuring Fast Leave Processing ······························································································3-12

Configuring MLD Snooping Querier······································································································3-13

Configuration Prerequisites ···········································································································3-13

Enabling MLD Snooping Querier···································································································3-13

Configuring MLD Queries and Responses····················································································3-13

Configuring Source IPv6 Addresses of MLD Queries ···································································3-15

Configuring MLD Snooping Proxying····································································································3-15

Configuration Prerequisites ···········································································································3-15

Enabling MLD Snooping Proxying·································································································3-15

Configuring a Source IPv6 Address for the MLD Messages Sent by the Proxy ···························3-16

Configuring an MLD Snooping Policy ···································································································3-16

Configuration Prerequisites ···········································································································3-16

Configuring Dropping Unknown IPv6 Multicast Data ····································································3-16

Configuring MLD Report Suppression···························································································3-17

Configuring Maximum Multicast Groups that Can Be Joined on a Port········································3-17

Configuring IPv6 Multicast Group Replacement ···········································································3-18

Configuring 802.1p Precedence for MLD Messages ····································································3-19

Displaying and Maintaining MLD Snooping ··························································································3-19

MLD Snooping Configuration Examples ·······························································································3-20

IPv6 Group Policy and Simulated Joining Configuration Example ···············································3-20

Static Port Configuration Example ································································································3-22

MLD Snooping Querier Configuration Example ············································································3-26

MLD Snooping Proxying Configuration Example ··········································································3-27

Troubleshooting MLD Snooping ···········································································································3-30

Switch Fails in Layer 2 Multicast Forwarding ················································································3-30

4 IPv6 Multicast VLAN Configuration ·········································································································4-1

Introduction to IPv6 Multicast VLAN ·······································································································4-1

IPv6 Multicast VLAN Configuration Task List ·························································································4-2

Configuring IPv6 Multicast VLAN············································································································4-3