i
Table of Contents
1 IGMP Snooping Configuration ·················································································································1-1
IGMP Snooping Overview·······················································································································1-1
Principle of IGMP Snooping ············································································································1-1
Basic Concepts in IGMP Snooping ·································································································1-2
How IGMP Snooping Works············································································································1-3
Protocols and Standards ·················································································································1-5
IGMP Snooping Configuration Task List·································································································1-5
Configuring Basic Functions of IGMP Snooping·····················································································1-6
Configuration Prerequisites ·············································································································1-6
Enabling IGMP Snooping ················································································································1-6
Configuring the Version of IGMP Snooping ····················································································1-7
Configuring IGMP Snooping Port Functions ···························································································1-7
Configuration Prerequisites ·············································································································1-7
Configuring Aging Timers for Dynamic Ports ··················································································1-8
Configuring Static Ports···················································································································1-8
Configuring Simulated Joining·········································································································1-9
Configuring Fast Leave Processing ······························································································1-10
Configuring IGMP Snooping Querier ····································································································1-11
Configuration Prerequisites ···········································································································1-11
Enabling IGMP Snooping Querier ·································································································1-11
Configuring IGMP Queries and Responses ··················································································1-12
Configuring Source IP Address of IGMP Queries ·········································································1-13
Configuring an IGMP Snooping Policy··································································································1-13
Configuration Prerequisites ···········································································································1-13
Configuring a Multicast Group Filter······························································································1-14
Configuring Multicast Source Port Filtering ···················································································1-14
Configuring the Function of Dropping Unknown Multicast Data····················································1-15
Configuring IGMP Report Suppression ·························································································1-16
Configuring Maximum Multicast Groups that Can Be Joined on a Port········································1-16
Configuring Multicast Group Replacement····················································································1-17
Displaying and Maintaining IGMP Snooping·························································································1-18
IGMP Snooping Configuration Examples ·····························································································1-19
Configuring Group Policy and Simulated Joining··········································································1-19
Static Port Configuration················································································································1-21
IGMP Snooping Querier Configuration··························································································1-25
Troubleshooting IGMP Snooping Configuration ···················································································1-27
Switch Fails in Layer 2 Multicast Forwarding ················································································1-27
Configured Multicast Group Policy Fails to Take Effect ································································1-27