EasyManua.ls Logo

3Com 4500 - Common Multicast Configuration;Igmp Snooping Configuration

3Com 4500
742 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Loading...
i
Table of Contents
1 Multicast Overview····································································································································1-1
Multicast Overview ··································································································································1-1
Information Transmission in the Unicast Mode ···············································································1-1
Information Transmission in the Broadcast Mode···········································································1-2
Information Transmission in the Multicast Mode·············································································1-3
Roles in Multicast ····························································································································1-3
Common Notations in Multicast·······································································································1-4
Advantages and Applications of Multicast·······················································································1-4
Multicast Models ·····································································································································1-5
Multicast Architecture······························································································································1-6
Multicast Address ····························································································································1-6
Multicast Protocols ··························································································································1-9
Multicast Packet Forwarding Mechanism ·····························································································1-10
Implementation of the RPF Mechanism ························································································1-11
RPF Check ····································································································································1-11
2 Common Multicast Configuration············································································································1-1
Common Multicast Configuration············································································································1-1
Configuring Suppression on the Multicast Source Port···································································1-1
Configuring a Multicast MAC Address Entry ···················································································1-2
Configuring Dropping Unknown Multicast Packets ·········································································1-3
Displaying and Maintaining Common Multicast Configuration································································1-3
3 IGMP Snooping Configuration ·················································································································1-1
IGMP Snooping Overview·······················································································································1-1
Principle of IGMP Snooping ············································································································1-1
Basic Concepts in IGMP Snooping ·································································································1-2
Work Mechanism of IGMP Snooping ······························································································1-3
Configuring IGMP Snooping ···················································································································1-5
Enabling IGMP Snooping ················································································································1-5
Configuring the Version of IGMP Snooping ····················································································1-6
Configuring Timers ··························································································································1-7
Configuring Fast Leave Processing ································································································1-7
Configuring a Multicast Group Filter································································································1-8
Configuring the Maximum Number of Multicast Groups on a Port··················································1-9
Configuring IGMP Snooping Querier·····························································································1-10
Suppressing Flooding of Unknown Multicast Traffic in a VLAN····················································1-11
Configuring Static Member Port for a Multicast Group··································································1-12
Configuring a Static Router Port····································································································1-13
Configuring a Port as a Simulated Group Member ·······································································1-13
Configuring a VLAN Tag for Query Messages··············································································1-14
Configuring Multicast VLAN ··········································································································1-15
Displaying and Maintaining IGMP Snooping·························································································1-16
IGMP Snooping Configuration Examples ·····························································································1-17

Table of Contents

Other manuals for 3Com 4500

Related product manuals