beautypg.com

2 ipv6 dcscm configuration task sequence – PLANET XGS3-24040 User Manual

Page 423

background image

Chapter 44 IPv6 Multicast Protocol

44-21

The control of multicast users of IPv6 DCSCM technology is implemented on the basis of controlling the MLD

message sent from the users, so the control module is MLD snooping and the MLD module, the control logic

of which includes the following three methods: controlling according to the VLAN+MAC sending the message,

controlling according to the IP address sending the message, and controlling according to the input port of the

message. MLD snooping can adopts all the three methods at the same time, while the MLD module, at the

third layer, can only control the IP address sending the message.

The service-priority-oriented policy multicast of IPv6 DCSCM technology adopts the following method: for the

confined multicast data, the user-specified priority will be set at the access point, enabling the data can be

sent at a higher priority through TRUNK, and guaranteeing that the data can be sent through the whole net at

the user-specified priority.

44.5.2 IPv6 DCSCM Configuration Task Sequence

1. The source control configuration

2. The destination control configuration

3. The multicast policy configuration

1 The source control configuration

The source control configuration has three steps, first is globally enabling the source control, the following is

the command of globally enabling the source control:

Command

Explanation

Global Configuration Mode

ipv6 multicast source-control(necessary)

no ipv6 multicast source-control

Globally enable the source control, the no

operation of this command will globally

disable the source control. What should be

paid attention to is that, once globally enable

the source control, all the multicast

messages will be dropped by default. All the

source control configurations can only be

done after globally enabled, and only when

all the configured rules are disabled, the

source control can be disabled globally.

The next is configuring the source control rules, which adopts the same method as configuring ACL, using

ACL number from 8000 to 8099, while each rule number can configure 10 rules. What should be paid

attention to is that these rules have orders, the earliest configured rule is at the front. Once a rule is matched,

the following ones will not take effect, so the globally enabled rules should be the last to configure. The

following is the command:

Command

Explanation

Global Configuration Mode