ii
Introduction to MLD Snooping·········································································································3-1
Basic Concepts in MLD Snooping···································································································3-2
How MLD Snooping Works ·············································································································3-3
MLD Snooping Proxying··················································································································3-5
Protocols and Standards·················································································································3-6
MLD Snooping Configuration Task List ··································································································3-7
Configuring Basic Functions of MLD Snooping ······················································································3-8
Configuration Prerequisites·············································································································3-8
Enabling MLD Snooping··················································································································3-8
Configuring the Version of MLD Snooping······················································································3-8
Configuring Limit on the Number of Forwarding Entries Globally···················································3-9
Configuring MLD Snooping Port Functions ····························································································3-9
Configuration Prerequisites·············································································································3-9
Configuring Aging Timers for Dynamic Ports················································································3-10
Configuring Static Ports·················································································································3-10
Configuring Simulated Joining·······································································································3-11
Configuring Fast Leave Processing ······························································································3-12
Configuring MLD Snooping Querier······································································································3-13
Configuration Prerequisites···········································································································3-13
Enabling MLD Snooping Querier···································································································3-13
Configuring MLD Queries and Responses····················································································3-13
Configuring Source IPv6 Addresses of MLD Queries···································································3-15
Configuring MLD Snooping Proxying····································································································3-15
Configuration Prerequisites···········································································································3-15
Enabling MLD Snooping Proxying·································································································3-15
Configuring a Source IPv6 Address for the MLD Messages Sent by the Proxy ···························3-16
Configuring an MLD Snooping Policy ···································································································3-16
Configuration Prerequisites···········································································································3-16
Configuring Dropping Unknown IPv6 Multicast Data ····································································3-16
Configuring MLD Report Suppression···························································································3-17
Configuring Maximum Multicast Groups that Can Be Joined on a Port········································3-17
Configuring IPv6 Multicast Group Replacement ···········································································3-18
Configuring 802.1p Precedence for MLD Messages ····································································3-19
Displaying and Maintaining MLD Snooping··························································································3-19
MLD Snooping Configuration Examples·······························································································3-20
IPv6 Group Policy and Simulated Joining Configuration Example ···············································3-20
Static Port Configuration Example ································································································3-22
MLD Snooping Querier Configuration Example············································································3-26
MLD Snooping Proxying Configuration Example··········································································3-27
Troubleshooting MLD Snooping ···········································································································3-30
Switch Fails in Layer 2 Multicast Forwarding ················································································3-30
4 IPv6 Multicast VLAN Configuration ·········································································································4-1
Introduction to IPv6 Multicast VLAN ·······································································································4-1
IPv6 Multicast VLAN Configuration Task List ·························································································4-2
Configuring IPv6 Multicast VLAN············································································································4-3