Chapter 13 dcscm configuraion, 1 dcscm introduction, 2 dcscm configuration – Amer Networks SS2R48G4i V2 User Manual

Page 122: 1 dcscm configuration task sequence

Advertising
background image

SS2R24G4i/SS2R48G4i

111

Chapter 13 DCSCM Configuraion

13.1 DCSCM Introduction

DCSCM(security control multicast)technology includes three respects multicast source

controllabillity, multicast users controllabillity and the service-priority-oriented multicast policy.

The DCSCM technology mainly use the following methods to realize multicast source

controllabillity

a) On the boundary switch, if configured the source-controlled multicast, only the muticast data of

the specified group sent by specified source can pass.

b) For the RP switch at the PIM-SM core state, REGISTER_STOP will be directly sent for all the

REGISTER information besides than the specified source and group.Creating list entries is not
allowed.(This task is implemented in PIM-SM module).

The implementation of DCSCM technology is based on the contro lboer the IGMP report messages

from users, so the controlling modules are IGMP snooping module and IGMP module. The control logic
of it includes the following three methods control according to the source VLAN+MAC address of the
message, control according to the source IP address of the message, and control according to the port
through which the message enters.IGMP snooping can use all the three methods while the IGMP, since
it is at layer 3, can only control according to the source IP address of the messgae.

The service-priority-oriented mutilcast policy of DCSCM technology adpots the following methods

for the multicast data within a limited range, the user-specified priority is set at the access point, making
data be transmitted on TRUNK at a higher priority, and thus ensuring the data to be transmitted through
the whole network at the user-specified priority.

13.2 DCSCM Configuration

13.2.1 DCSCM Configuration Task Sequence

1) Configuration of source control

2) Configuration of destination control

3) Configuration of multicast policy.

1. Configuration of source control

Configuration of source control can be divided into three parts, the first is to enable the source

control globally, the following is th command to do this

Command Explantation

Global configuration mode

Advertising