H3C Technologies H3C S7500E Series Switches User Manual

Page 7

Advertising
background image

i

Table of Contents

1 Multicast Overview·································································································································1-1

Introduction to Multicast ·······················································································································1-1

Comparison of Information Transmission Techniques ·································································1-1

Features of Multicast ····················································································································1-4

Common Notations in Multicast····································································································1-5

Advantages and Applications of Multicast····················································································1-5

Multicast Models ··································································································································1-6

Multicast Architecture ··························································································································1-6

Multicast Addresses ·····················································································································1-7

Multicast Protocols ·····················································································································1-11

Multicast Packet Forwarding Mechanism ··························································································1-13

Multi-Instance Multicast ·····················································································································1-14

Introduction to the Multi-Instance Concept·················································································1-14

Multi-Instance Application in Multicast ·······················································································1-15

2 IGMP Snooping Configuration ··············································································································2-1

IGMP Snooping Overview····················································································································2-1

Principle of IGMP Snooping ·········································································································2-1

Basic Concepts in IGMP Snooping ······························································································2-2

How IGMP Snooping Works·········································································································2-4

IGMP Snooping Proxying ·············································································································2-6

Protocols and Standards ··············································································································2-8

IGMP Snooping Configuration Task List······························································································2-8

Configuring Basic Functions of IGMP Snooping··················································································2-9

Configuration Prerequisites ··········································································································2-9

Enabling IGMP Snooping ·············································································································2-9

Configuring the Version of IGMP Snooping ···············································································2-10

Configuring the Maximum Number of Global IGMP Forwarding Entries ····································2-11

Configuring IGMP Snooping Port Functions ······················································································2-11

Configuration Prerequisites ········································································································2-11

Configuring Aging Timers for Dynamic Ports ·············································································2-11

Configuring Static Ports··············································································································2-12

Configuring Simulated Joining····································································································2-13

Configuring Fast Leave Processing ···························································································2-14

Configuring IGMP Snooping Querier ·································································································2-15

Configuration Prerequisites ········································································································2-15

Enabling IGMP Snooping Querier ······························································································2-15

Configuring IGMP Queries and Responses ···············································································2-16

Configuring Source IP Address of IGMP Queries ······································································2-17

Configuring IGMP Snooping Proxying ·······························································································2-18

Configuration Prerequisites ········································································································2-18

Enabling IGMP Snooping Proxying ····························································································2-18

Advertising