13
16.4.5 DVMRP Troubleshooting............................................................................. 652
16.5
ECSCM.............................................................................................................. 657
16.5.1 Introduction to ECSCM ............................................................................... 657
16.5.2 ECSCM Configuration Task List.................................................................. 658
16.5.3 Commands for ECSCM............................................................................... 661
16.5.4 ECSCM Configuration Examples ................................................................ 666
16.5.5 ECSCM Troubleshooting............................................................................. 667
16.6
IGMP ................................................................................................................. 669
16.6.1 Introduction to IGMP ................................................................................... 669
16.6.2 Configuration Task List................................................................................ 671
16.6.3 Commands for IGMP .................................................................................. 673
16.6.4 IGMP Configuration Example...................................................................... 678
16.6.5 IGMP Troubleshooting ................................................................................ 679
CHAPTER 17 IPV6 MULTICAST PROTOCOL ............................................................ 683
17.1
PIM-DM6............................................................................................................ 683
17.1.1 Introduction to PIM-DM6 ............................................................................. 683
17.1.2 PIM-DM Configuration Task List.................................................................. 684
17.1.3 Commands for PIM-DM6 ............................................................................ 685
17.1.4 PIM-DM Typical Application ........................................................................ 689
17.1.5 PIM-DM Troubleshooting ............................................................................ 690
17.2
PIM-SM6............................................................................................................ 693
17.2.1 Introduction to PIM-SM6 ............................................................................. 693
17.2.2 PIM-SM Configuration Task List.................................................................. 694
17.2.3 Commands for PIM-SM............................................................................... 697
17.2.4 PIM-SM Typical Application......................................................................... 705
17.2.5 PIM-SM Troubleshooting............................................................................. 707
17.3
MLD ................................................................................................................... 716
17.3.1 Introduction to MLD..................................................................................... 716
17.3.2 MLD Configuration Task List ....................................................................... 717
17.3.3 Commands for MLD.................................................................................... 718
17.3.4 MLD Typical Application .............................................................................. 724
17.3.5 MLD Troubleshooting.................................................................................. 725
17.4
MLD
S
NOOPING
.................................................................................................. 727
17.4.1 MLD Snooping Introduction......................................................................... 727
17.4.2 MLD Snooping Configuration Task.............................................................. 728
17.4.3 Commands For MLD Snooping Configuration ............................................ 729
17.4.4 MLD Snooping Examples............................................................................ 736
17.4.5 MLD Snooping Troubleshooting.................................................................. 739