beautypg.com

H3C Technologies H3C WX6000 Series Access Controllers User Manual

Page 15

background image

x

28 Multicast Overview ································································································································28-1

Introduction to Multicast ························································································································28-1

Comparison of Information Transmission Techniques··································································28-1
Roles in Multicast ··························································································································28-4
Advantages and Applications of Multicast·····················································································28-5

Multicast Models ···································································································································28-5
Multicast Architecture····························································································································28-6

Multicast Addresses ······················································································································28-6
Multicast Protocols ······················································································································28-10

Multicast Packet Forwarding Mechanism ···························································································28-12

29 IGMP Snooping Configuration ·············································································································29-1

IGMP Snooping Overview·····················································································································29-1

Principle of IGMP Snooping ··········································································································29-1
Basic Concepts in IGMP Snooping ·······························································································29-2
Work Mechanism of IGMP Snooping ····························································································29-3
Protocols and Standards ···············································································································29-5

IGMP Snooping Configuration Task List·······························································································29-5
Configuring Basic Functions of IGMP Snooping···················································································29-6

Configuration Prerequisites ···········································································································29-6
Enabling IGMP Snooping ·········································································································
·····29-6
Configuring the Version of IGMP Snooping ··················································································29-6

Configuring IGMP Snooping Port Functions·························································································29-7

Configuration Prerequisites ···········································································································29-7
Configuring Aging Timers for Dynamic Ports ················································································29-7
Configuring Static Ports·················································································································29-8
Configuring Simulated Joining·······································································································29-9
Configuring Fast Leave Processing ······························································································29-9

Configuring IGMP Snooping Querier ··································································································29-10

Configuration Prerequisites ·········································································································29-10
Enabling IGMP Snooping Querier ·······························································································29-11
Configuring IGMP Queries and Responses ················································································29-11
Configuring Source IP Address of IGMP Queries ·······································································29-12

Configuring an IGMP Snooping Policy································································································29-13

Configuration Prerequisites ·········································································································29-13
Configuring a Multicast Group Filter···························································································
·29-13
Configuring Multicast Source Port Filtering ·················································································29-14
Configuring the Function of Dropping Unknown Multicast Data··················································29-15
Configuring IGMP Report Suppression ·······················································································29-15
Configuring Maximum Multicast Groups that Can Be Joined on a Port······································29-16
Configuring Multicast Group Replacement··················································································29-16

Displaying and Maintaining IGMP Snooping·······················································································29-17
IGMP Snooping Configuration Examples ···························································································29-18

Configuring Simulated Joining·····································································································29-18
Static Router Port Configuration··································································································29-20
IGMP Snooping Querier Configuration························································································29-23