H3C Technologies H3C S5120 Series Switches User Manual

Page 293

Advertising
background image

i

Table of Contents

1 Multicast Overview ····································································································································1-1

Introduction to Multicast ··························································································································1-1

Comparison of Information Transmission Techniques··································································· 1-1

Features of Multicast ······················································································································ 1-4

Common Notations in Multicast······································································································ 1-5

Advantages and Applications of Multicast······················································································ 1-5

Multicast Models ·····································································································································1-6

Multicast Architecture······························································································································1-6

Multicast Addresses ······················································································································· 1-7

Multicast Protocols ························································································································· 1-9

Multicast Packet Forwarding Mechanism ·····························································································1-10

2 IGMP Snooping Configuration ·················································································································2-1

IGMP Snooping Overview·······················································································································2-1

Principle of IGMP Snooping ··········································································································· 2-1

Basic Concepts in IGMP Snooping ································································································ 2-2

How IGMP Snooping Works··········································································································· 2-3

IGMP Snooping Proxying ··············································································································· 2-5

Protocols and Standards ················································································································ 2-6

IGMP Snooping Configuration Task List·································································································2-6

Configuring Basic Functions of IGMP Snooping·····················································································2-7

Configuration Prerequisites ············································································································ 2-7

Enabling IGMP Snooping ··············································································································· 2-7

Configuring the Version of IGMP Snooping ··················································································· 2-8

Configuring IGMP Snooping Port Functions ···························································································2-9

Configuration Prerequisites ············································································································ 2-9

Configuring Aging Timers for Dynamic Ports ················································································· 2-9

Configuring Static Ports················································································································ 2-10

Configuring Simulated Joining······································································································ 2-10

Configuring Fast Leave Processing ····························································································· 2-11

Configuring IGMP Snooping Querier ····································································································2-12

Configuration Prerequisites ·········································································································· 2-12

Enabling IGMP Snooping Querier ································································································ 2-12

Configuring IGMP Queries and Responses ················································································· 2-13

Configuring Source IP Address of IGMP Queries ········································································ 2-14

Configuring IGMP Snooping Proxying ··································································································2-14

Configuration Prerequisites ·········································································································· 2-14

Enabling IGMP Snooping Proxying ······························································································ 2-15

Configuring a Source IP Address for the IGMP Messages Sent by the Proxy ···························· 2-15

Configuring an IGMP Snooping Policy··································································································2-15

Configuration Prerequisites ·········································································································· 2-15

Configuring a Multicast Group Filter····························································································· 2-16

Configuring the Function of Dropping Unknown Multicast Data··················································· 2-16

Advertising