i
Table of Contents
1 Multicast Overview····································································································································1-1
Introduction to Multicast··························································································································1-1
Comparison of Information Transmission Techniques··································································· 1-1
Features of Multicast ······················································································································ 1-4
Common Notations in Multicast······································································································ 1-5
Advantages and Applications of Multicast······················································································ 1-5
Multicast Models ·····································································································································1-6
Multicast Architecture······························································································································1-6
Multicast Addresses ······················································································································· 1-7
Multicast Protocols ························································································································· 1-9
Multicast Packet Forwarding Mechanism ·····························································································1-10
2 IGMP Snooping Configuration ·················································································································2-1
IGMP Snooping Overview·······················································································································2-1
Principle of IGMP Snooping ··········································································································· 2-1
Basic Concepts in IGMP Snooping ································································································ 2-2
How IGMP Snooping Works··········································································································· 2-3
IGMP Snooping Proxying··············································································································· 2-5
Protocols and Standards················································································································ 2-6
IGMP Snooping Configuration Task List·································································································2-6
Configuring Basic Functions of IGMP Snooping·····················································································2-7
Configuration Prerequisites············································································································ 2-7
Enabling IGMP Snooping··············································································································· 2-7
Configuring the Version of IGMP Snooping ··················································································· 2-8
Configuring IGMP Snooping Port Functions···························································································2-9
Configuration Prerequisites············································································································ 2-9
Configuring Aging Timers for Dynamic Ports················································································· 2-9
Configuring Static Ports················································································································ 2-10
Configuring Simulated Joining······································································································ 2-10
Configuring Fast Leave Processing ····························································································· 2-11
Configuring IGMP Snooping Querier····································································································2-12
Configuration Prerequisites·········································································································· 2-12
Enabling IGMP Snooping Querier································································································ 2-12
Configuring IGMP Queries and Responses················································································· 2-13
Configuring Source IP Address of IGMP Queries········································································ 2-14
Configuring IGMP Snooping Proxying··································································································2-14
Configuration Prerequisites·········································································································· 2-14
Enabling IGMP Snooping Proxying······························································································ 2-15
Configuring a Source IP Address for the IGMP Messages Sent by the Proxy ···························· 2-15
Configuring an IGMP Snooping Policy··································································································2-15
Configuration Prerequisites·········································································································· 2-15
Configuring a Multicast Group Filter····························································································· 2-16
Configuring the Function of Dropping Unknown Multicast Data··················································· 2-16