![H3C S5120-SI Series Operation Manual Download Page 270](http://html2.mh-extra.com/html/h3c/s5120-si-series/s5120-si-series_operation-manual_3711174270.webp)
i
Table of Contents
1 Multicast Overview ····································································································································1-1
Introduction to Multicast ··························································································································1-1
Comparison of Information Transmission Techniques··································································· 1-1
Features of Multicast ······················································································································ 1-4
Common Notations in Multicast······································································································ 1-5
Advantages and Applications of Multicast······················································································ 1-5
Multicast Models ·····································································································································1-6
Multicast Architecture······························································································································1-6
Multicast Addresses ······················································································································· 1-7
Multicast Protocols ························································································································· 1-8
Multicast Packet Forwarding Mechanism ·····························································································1-10
2 IGMP Snooping Configuration ·················································································································2-1
IGMP Snooping Overview·······················································································································2-1
Principle of IGMP Snooping ··········································································································· 2-1
Basic Concepts in IGMP Snooping ································································································ 2-2
How IGMP Snooping Works··········································································································· 2-3
IGMP Snooping Proxying ··············································································································· 2-5
Protocols and Standards ················································································································ 2-6
IGMP Snooping Configuration Task List·································································································2-6
Configuring Basic Functions of IGMP Snooping·····················································································2-7
Configuration Prerequisites ············································································································ 2-7
Enabling IGMP Snooping ··············································································································· 2-7
Configuring the Version of IGMP Snooping ··················································································· 2-8
Configuring IGMP Snooping Port Functions ···························································································2-9
Configuration Prerequisites ············································································································ 2-9
Configuring Aging Timers for Dynamic Ports ················································································· 2-9
Configuring Static Ports················································································································ 2-10
Configuring Simulated Joining······································································································ 2-10
Configuring Fast Leave Processing ····························································································· 2-11
Configuring IGMP Snooping Querier ····································································································2-12
Configuration Prerequisites ·········································································································· 2-12
Enabling IGMP Snooping Querier ································································································ 2-12
Configuring IGMP Queries and Responses ················································································· 2-13
Configuring Source IP Address of IGMP Queries ········································································ 2-14
Configuring IGMP Snooping Proxying ··································································································2-15
Configuration Prerequisites ·········································································································· 2-15
Enabling IGMP Snooping Proxying ······························································································ 2-15
Configuring a Source IP Address for the IGMP Messages Sent by the Proxy ···························· 2-15
Configuring an IGMP Snooping Policy··································································································2-15
Configuration Prerequisites ·········································································································· 2-15
Configuring a Multicast Group Filter····························································································· 2-16
Configuring the Function of Dropping Unknown Multicast Data··················································· 2-16