Pim sm traffic snooping, Pim sm traffic, Snooping – Brocade BigIron RX Series Configuration Guide User Manual

Page 813: Application examples

Advertising
background image

BigIron RX Series Configuration Guide

735

53-1002484-04

Configuring IP multicast traffic reduction

24

Use the acl-spec parameter to define the number or name identifying an access list that controls
the range of group addresses affected by the boundary.

Use the port-list parameter to define the member ports on which the ACL is applied. The ACL will be
applied to the multicast traffic arriving in both directions.

Use the no multicast boundary command to remove the boundary on an IGMP enabled interface.

NOTE

The ACL, MyBrocadeAccessList can be configured using standard ACL syntax which can be found in
the ACL section.

PIM SM traffic snooping

By default, when a BigIron RX receives an IP multicast packet, the device does not examine the
multicast information in the packet. Instead, the device simply forwards the packet out all ports
except the port that received the packet. In some networks, this method can cause unnecessary
traffic overhead in the network. For example, if the BigIron RX is attached to only one group source
and two group receivers, but has devices attached to every port, the device forwards group traffic
out all ports in the same broadcast domain except the port attached to the source, even though
there are only two receivers for the group.

PIM SM traffic snooping eliminates the superfluous traffic by configuring the device to forward IP
multicast group traffic only on the ports that are attached to receivers for the group.

PIM SM traffic snooping requires IP multicast traffic reduction to be enabled on the device. IP
multicast traffic reduction configures the device to listen for IGMP messages. PIM SM traffic
snooping provides a finer level of multicast traffic control by configuring the device to listen
specifically for PIM SM join and prune messages sent from one PIM SM router to another through
the device.

NOTE

This feature applies only to PIM SM version 2 (PIM V2).

Application examples

Figure 109

shows an example application of the PIM SM traffic snooping feature. In this example,

a device is connected through an IP router to a PIM SM group source that is sending traffic for two
PIM SM groups. The device also is connected to a receiver for each of the groups.

Advertising