source ip-address;
}
}
}
proxy {
source-address ip-address;
}
query-interval seconds;
query-last-member-interval seconds;
query-response-interval seconds;
robust-count number;
}
You can include this statement at the following hierarchy levels:
•
[edit bridge-domains bridge-domain-name protocols igmp-snooping]
•
[edit routing-instances routing-instance-name bridge-domains bridge-domain-name
protocols igmp-snooping]
Related
Documentation
Multicast Overview•
• Understanding Multicast Snooping
Example: Configuring IGMP Snooping
This example shows how to configure IGMP snooping. IGMP snooping can reduce
unnecessary traffic from IP multicast applications.
•
Requirements on page 479
•
Overview and Topology on page 480
•
Configuration on page 483
•
Verification on page 485
Requirements
This example uses the following hardware components:
•
One MX Series router
•
One Layer 3 device functioning as a multicast router
Before you begin:
•
Configure the interfaces. See the Interfaces Feature Guide for Security Devices.
•
Configure an interior gateway protocol. See the Junos OS Routing Protocols Library.
•
Configure a multicast protocol. This feature works with the following multicast
protocols:
•
DVMRP
•
PIM-DM
479Copyright © 2017, Juniper Networks, Inc.
Chapter 15: Configuring Internet Group Management Protocol Snooping