i
Table of Contents
1 IGMP Snooping Configuration ·················································································································1-1
IGMP Snooping Overview·······················································································································1-1
Principle of IGMP Snooping ············································································································1-1
Basic Concepts in IGMP Snooping ·································································································1-2
How IGMP Snooping Works············································································································1-3
IGMP Snooping Proxying ················································································································1-5
Protocols and Standards ·················································································································1-6
IGMP Snooping Configuration Task List·································································································1-7
Configuring Basic Functions of IGMP Snooping·····················································································1-8
Configuration Prerequisites ·············································································································1-8
Enabling IGMP Snooping ················································································································1-8
Configuring the Version of IGMP Snooping ····················································································1-9
Configuring IGMP Snooping Port Functions ···························································································1-9
Configuration Prerequisites ·············································································································1-9
Configuring Aging Timers for Dynamic Ports ················································································1-10
Configuring Static Ports·················································································································1-10
Configuring Simulated Joining·······································································································1-11
Configuring Fast Leave Processing ······························································································1-12
Configuring IGMP Snooping Querier ····································································································1-13
Configuration Prerequisites ···········································································································1-13
Enabling IGMP Snooping Querier ·································································································1-13
Configuring IGMP Queries and Responses ··················································································1-14
Configuring Source IP Address of IGMP Queries ·········································································1-15
Configuring IGMP Snooping Proxying ··································································································1-15
Configuration Prerequisites ···········································································································1-15
Enabling IGMP Snooping Proxying ·······························································································1-15
Configuring a Source IP Address for the IGMP Messages Sent by the Proxy ·····························1-16
Configuring an IGMP Snooping Policy··································································································1-16
Configuration Prerequisites ···········································································································1-16
Configuring a Multicast Group Filter······························································································1-16
Configuring the Function of Dropping Unknown Multicast Data····················································1-17
Configuring IGMP Report Suppression ·························································································1-18
Configuring Maximum Multicast Groups that Can Be Joined on a Port········································1-18
Configuring Multicast Group Replacement····················································································1-19
Configuring 802.1p Precedence for IGMP Messages···································································1-20
Displaying and Maintaining IGMP Snooping·························································································1-21
IGMP Snooping Configuration Examples ·····························································································1-21
Group Policy and Simulated Joining Configuration Example························································1-21
Static Port Configuration Example ································································································1-24
IGMP Snooping Querier Configuration Example ··········································································1-27
IGMP Snooping Proxying Configuration Example ········································································1-29
Troubleshooting IGMP Snooping Configuration ···················································································1-32
Switch Fails in Layer 2 Multicast Forwarding ················································································1-32