H3C Technologies H3C WX6000 Series Access Controllers User Manual
Page 15
x
28 Multicast Overview ································································································································28-1
Introduction to Multicast ························································································································28-1
Comparison of Information Transmission Techniques··································································28-1
Roles in Multicast ··························································································································28-4
Advantages and Applications of Multicast·····················································································28-5
Multicast Models ···································································································································28-5
Multicast Architecture····························································································································28-6
Multicast Addresses ······················································································································28-6
Multicast Protocols ······················································································································28-10
Multicast Packet Forwarding Mechanism ···························································································28-12
29 IGMP Snooping Configuration ·············································································································29-1
IGMP Snooping Overview·····················································································································29-1
Principle of IGMP Snooping ··········································································································29-1
Basic Concepts in IGMP Snooping ·······························································································29-2
Work Mechanism of IGMP Snooping ····························································································29-3
Protocols and Standards ···············································································································29-5
IGMP Snooping Configuration Task List·······························································································29-5
Configuring Basic Functions of IGMP Snooping···················································································29-6
Configuration Prerequisites ···········································································································29-6
Enabling IGMP Snooping ··············································································································29-6
Configuring the Version of IGMP Snooping ··················································································29-6
Configuring IGMP Snooping Port Functions·························································································29-7
Configuration Prerequisites ···········································································································29-7
Configuring Aging Timers for Dynamic Ports ················································································29-7
Configuring Static Ports·················································································································29-8
Configuring Simulated Joining·······································································································29-9
Configuring Fast Leave Processing ······························································································29-9
Configuring IGMP Snooping Querier ··································································································29-10
Configuration Prerequisites ·········································································································29-10
Enabling IGMP Snooping Querier ·······························································································29-11
Configuring IGMP Queries and Responses ················································································29-11
Configuring Source IP Address of IGMP Queries ·······································································29-12
Configuring an IGMP Snooping Policy································································································29-13
Configuration Prerequisites ·········································································································29-13
Configuring a Multicast Group Filter····························································································29-13
Configuring Multicast Source Port Filtering ·················································································29-14
Configuring the Function of Dropping Unknown Multicast Data··················································29-15
Configuring IGMP Report Suppression ·······················································································29-15
Configuring Maximum Multicast Groups that Can Be Joined on a Port······································29-16
Configuring Multicast Group Replacement··················································································29-16
Displaying and Maintaining IGMP Snooping·······················································································29-17
IGMP Snooping Configuration Examples ···························································································29-18
Configuring Simulated Joining·····································································································29-18
Static Router Port Configuration··································································································29-20
IGMP Snooping Querier Configuration························································································29-23