2 ipv6 dcscm configuration task sequence – PLANET XGS3-24040 User Manual
Page 423

Chapter 44 IPv6 Multicast Protocol
44-21
The control of multicast users of IPv6 DCSCM technology is implemented on the basis of controlling the MLD
message sent from the users, so the control module is MLD snooping and the MLD module, the control logic
of which includes the following three methods: controlling according to the VLAN+MAC sending the message,
controlling according to the IP address sending the message, and controlling according to the input port of the
message. MLD snooping can adopts all the three methods at the same time, while the MLD module, at the
third layer, can only control the IP address sending the message.
The service-priority-oriented policy multicast of IPv6 DCSCM technology adopts the following method: for the
confined multicast data, the user-specified priority will be set at the access point, enabling the data can be
sent at a higher priority through TRUNK, and guaranteeing that the data can be sent through the whole net at
the user-specified priority.
44.5.2 IPv6 DCSCM Configuration Task Sequence
1. The source control configuration
2. The destination control configuration
3. The multicast policy configuration
1. The source control configuration
The source control configuration has three steps, first is globally enabling the source control, the following is
the command of globally enabling the source control:
Command
Explanation
Global Configuration Mode
ipv6 multicast source-control(necessary)
no ipv6 multicast source-control
Globally enable the source control, the no
operation of this command will globally
disable the source control. What should be
paid attention to is that, once globally enable
the source control, all the multicast
messages will be dropped by default. All the
source control configurations can only be
done after globally enabled, and only when
all the configured rules are disabled, the
source control can be disabled globally.
The next is configuring the source control rules, which adopts the same method as configuring ACL, using
ACL number from 8000 to 8099, while each rule number can configure 10 rules. What should be paid
attention to is that these rules have orders, the earliest configured rule is at the front. Once a rule is matched,
the following ones will not take effect, so the globally enabled rules should be the last to configure. The
following is the command:
Command
Explanation
Global Configuration Mode