i
Table of Contents
1 IGMP Snooping Configuration ·················································································································1-1
IGMP Snooping Overview·······················································································································1-1
Principle of IGMP Snooping ············································································································1-1
Basic Concepts in IGMP Snooping ·································································································1-2
How IGMP Snooping Works············································································································1-3
Protocols and Standards·················································································································1-5
IGMP Snooping Configuration Task List·································································································1-5
Configuring Basic Functions of IGMP Snooping·····················································································1-6
Configuration Prerequisites·············································································································1-6
Enabling IGMP Snooping················································································································1-6
Configuring the Version of IGMP Snooping ····················································································1-7
Configuring IGMP Snooping Port Functions···························································································1-7
Configuration Prerequisites·············································································································1-7
Configuring Aging Timers for Dynamic Ports··················································································1-8
Configuring Static Ports···················································································································1-8
Configuring Simulated Joining·········································································································1-9
Configuring Fast Leave Processing ······························································································1-10
Configuring IGMP Snooping Querier····································································································1-11
Configuration Prerequisites···········································································································1-11
Enabling IGMP Snooping Querier·································································································1-11
Configuring IGMP Queries and Responses··················································································1-12
Configuring Source IP Address of IGMP Queries·········································································1-13
Configuring an IGMP Snooping Policy··································································································1-14
Configuration Prerequisites···········································································································1-14
Configuring a Multicast Group Filter······························································································1-14
Configuring Multicast Source Port Filtering···················································································1-15
Configuring the Function of Dropping Unknown Multicast Data····················································1-15
Configuring IGMP Report Suppression·························································································1-16
Configuring Maximum Multicast Groups that Can Be Joined on a Port········································1-16
Configuring Multicast Group Replacement····················································································1-17
Displaying and Maintaining IGMP Snooping·························································································1-18
IGMP Snooping Configuration Examples ·····························································································1-19
Configuring Group Policy and Simulated Joining··········································································1-19
Static Port Configuration················································································································1-21
IGMP Snooping Querier Configuration··························································································1-25
Troubleshooting IGMP Snooping Configuration ···················································································1-27
Switch Fails in Layer 2 Multicast Forwarding ················································································1-27
Configured Multicast Group Policy Fails to Take Effect································································1-27