208 CHAPTER 16: IGMP SNOOPING CONFIGURATION
IGMP Snooping
Configuration
Examples
Configuring IGMP
Snooping
Network requirements
To prevent multicast traffic from being flooded at Layer 2, enable IGMP snooping
on Layer 2 switches.
■ As shown in Figure 64, Router A connects to a multicast source (Source)
through Ethernet1/0/2, and to Switch A through Ethernet1/0/1.
■ Run PIM-DM and IGMP on Router A. Run IGMP snooping on Switch A. Router
A acts as the IGMP querier.
■ The multicast source sends multicast data to the multicast group 224.1.1.1.
Host A and Host B are receivers of the multicast group 224.1.1.1.
Network diagram
Figure 64 Network diagram for IGMP Snooping configuration
Configuration procedure
1 Configure the IP address of each interface
Configure an IP address and subnet mask for each interface shown in Figure 64.
The detailed configuration steps are omitted.
2 Configure Router A
Clear IGMP Snooping
statistics
reset igmp-snooping
statistics
You can execute the reset
command in user view.
Table 160 Display and maintain IGMP Snooping
Operation Command Remarks
Multicast packets
Source
Router A Switch A
Receiver
Receiver
Host B
Host A
Host C
1.1.1.1/24
Eth1/0/4
Eth1/0/2
Eth1 /0/3
IGMP querier
Eth1 /0/1
Eth1 /0/1
10.1 .1.1/24
Eth1/0/2
1.1.1.2/24
VLAN100