
Configuring an ip-prefix list ............................................................................................................ 24-5
Displaying IP Route Policy .................................................................................................................... 24-5
IP Route Policy Configuration Example ................................................................................................ 24-6
Controlling RIP Packet Cost to Implement Dynamic Route Backup ............................................. 24-6
Troubleshooting IP Route Policy........................................................................................................... 24-9
25
Multicast Overview................................................................................................................................. 25-1
Multicast Overview ................................................................................................................................ 25-1
Information Transmission in the Unicast Mode ............................................................................. 25-1
Information Transmission in the Broadcast Mode......................................................................... 25-2
Information Transmission in the Multicast Mode........................................................................... 25-3
Roles in Multicast .......................................................................................................................... 25-3
Common Notations in Multicast..................................................................................................... 25-4
Advantages and Applications of Multicast..................................................................................... 25-4
Multicast Models ................................................................................................................................... 25-5
Multicast Architecture............................................................................................................................ 25-5
Multicast Address .......................................................................................................................... 25-6
Multicast Protocols ........................................................................................................................ 25-8
Multicast Packet Forwarding Mechanism ........................................................................................... 25-10
Implementation of the RPF Mechanism ...................................................................................... 25-11
RPF Check .................................................................................................................................. 25-11
26
Common Multicast Configuration ........................................................................................................ 26-1
Common Multicast Configuration.......................................................................................................... 26-1
Configuring Suppression on the Multicast Source Port................................................................. 26-1
Configuring a Multicast MAC Address Entry ................................................................................. 26-2
Configuring Dropping Unknown Multicast Packets ....................................................................... 26-3
Displaying and Maintaining Common Multicast Configuration ............................................................. 26-3
27
IGMP Snooping Configuration.............................................................................................................. 27-1
IGMP Snooping Overview..................................................................................................................... 27-1
Principle of IGMP Snooping .......................................................................................................... 27-1
Basic Concepts in IGMP Snooping ............................................................................................... 27-2
Work Mechanism of IGMP Snooping ............................................................................................ 27-3
Configuring IGMP Snooping ................................................................................................................. 27-5
Enabling IGMP Snooping .............................................................................................................. 27-5
Configuring the Version of IGMP Snooping .................................................................................. 27-6
Configuring Timers ........................................................................................................................ 27-6
Configuring Fast Leave Processing .............................................................................................. 27-7
Configuring a Multicast Group Filter.............................................................................................. 27-8
Configuring the Maximum Number of Multicast Groups on a Port................................................ 27-9
Configuring IGMP Snooping Querier........................................................................................... 27-10
Suppressing Flooding of Unknown Multicast Traffic in a VLAN .................................................. 27-11
Configuring Static Member Port for a Multicast Group................................................................ 27-11
Configuring a Static Router Port.................................................................................................. 27-12
Configuring a Port as a Simulated Group Member ..................................................................... 27-13
Configuring a VLAN Tag for Query Messages ............................................................................ 27-14
Configuring Multicast VLAN ........................................................................................................ 27-14
Displaying and Maintaining IGMP Snooping ...................................................................................... 27-16
IGMP Snooping Configuration Examples ........................................................................................... 27-16
ix