A10E/A28E/A28F Configuration Guide
5.1 Overview .................................................................................................................................. 119
5.1.2 IGMP Snooping ............................................................................................................................. 121
5.1.3 MVR ............................................................................................................................................... 122
5.1.4 MVR Proxy ..................................................................................................................................... 122
5.1.5 IGMP filtering ................................................................................................................................ 123
5.2 Configuring IGMP Snooping ....................................................................................................... 124
5.2.1 Preparing for configurations ......................................................................................................... 124
5.2.2 Default configurations of IGMP Snooping .................................................................................... 124
5.2.3 Enabling global IGMP Snooping .................................................................................................... 125
5.2.4 (Optional) enabling IGMP Snooping on VLANs ............................................................................. 125
5.2.5 Configuring the multicast router interface ................................................................................... 125
5.2.6 (Optional) configuring the aging time of IGMP Snooping ............................................................. 126
5.2.7 (Optional) configuring instance leaving ........................................................................................ 126
5.2.8 (Optional) configuring static multicast forwarding table .............................................................. 127
5.2.9 Checking configurations ................................................................................................................ 127
5.3 Configuring MVR ....................................................................................................................... 128
5.3.1 Preparing for configurations ......................................................................................................... 128
5.3.2 Default configurations of MVR ...................................................................................................... 128
5.3.3 Configuring MVR basic information .............................................................................................. 128
5.3.4 Configuring MVR interface information ........................................................................................ 129
5.3.5 Checking configurations ................................................................................................................ 130
5.4 Configuring MVR Proxy ............................................................................................................. 130
5.4.1 Preparing for configurations ......................................................................................................... 130
5.4.2 Default configurations of IGMP Proxy ........................................................................................... 131
5.4.3 Configuring IGMP Proxy ................................................................................................................ 131
5.4.4 Checking configurations ................................................................................................................ 132
5.5 Configuring IGMP filtering ......................................................................................................... 132
5.5.1 Preparing for configurations ......................................................................................................... 132
5.5.2 Default configurations of IGMP filtering ....................................................................................... 133
5.5.3 Enabling global IGMP filtering ...................................................................................................... 133
5.5.4 Configuring IGMP filtering rules.................................................................................................... 133
5.5.5 Applying IGMP filtering rules ........................................................................................................ 134
5.5.6 Configuring the maximum multicast group number .................................................................... 134
5.5.7 Checking configuration ................................................................................................................. 135
5.6 Maintenance ............................................................................................................................. 135
5.7 Configuration examples ............................................................................................................. 136
5.7.1 Example for configuring IGMP Snooping ...................................................................................... 136
5.7.2 Example for configuring MVR and MVR Proxy .............................................................................. 137
5.7.3 Example for applying IGMP filtering and maximum multicast group number to the interface ... 140
5.7.4 Example for applying IGMP filtering and maximum multicast group number to the VLAN ......... 142
6 Security ............................................................................................................................... 145
6.1 ACL ........................................................................................................................................... 145
6.1.1 Introduction .................................................................................................................................. 145
6.1.2 Preparing for configurations ......................................................................................................... 146
6.1.3 Default configurations of ACL ....................................................................................................... 146
6.1.4 Configuring IP ACL ......................................................................................................................... 147
6.1.5 Configuring MAC ACL .................................................................................................................... 147
6.1.6 Configuring MAP ACL .................................................................................................................... 147
6.1.7 Applying ACL ................................................................................................................................. 150