– 459 –
20
Multicast Filtering Commands
This switch uses IGMP (Internet Group Management Protocol) to check for any
attached hosts that want to receive a specific multicast service. It identifies the
ports containing hosts requesting a service and sends data out to those ports only.
It then propagates the service request up to any neighboring multicast switch/
router to ensure that it will continue to receive the multicast service.
IGMP Snooping
This section describes commands used to configure IGMP snooping on the switch.
Table 100: Multicast Filtering Commands
Command Group
Function
IGMP Snooping
Configures multicast groups via IGMP snooping or static assignment,
sets the IGMP version, enables proxy reporting, displays current
snooping settings, and displays the multicast service and group
members
Static Multicast Routing
Configures static multicast router ports which forward all inbound
multicast traffic to the attached VLANs
IGMP Filtering and
Throttling
Configures IGMP filtering and throttling
Multicast VLAN Registration
Configures a single network-wide multicast VLAN shared by hosts
residing in other standard or private VLAN groups, preserving security
and data isolation for normal traffic
Table 101: IGMP Snooping Commands
Command
Function
Mode
ip igmp snooping
Enables
IGMP
snooping
GC
ip igmp snooping
proxy-reporting
Enables IGMP Snooping with Proxy Reporting
GC
ip igmp snooping querier
Allows this device to act as the querier for IGMP snooping
GC
ip igmp snooping
router-alert-option-check
Discards any IGMPv2/v3 packets that do not include the
Router Alert option
GC
ip igmp snooping
router-port-expire-time
Configures the querier timeout
GC
ip igmp snooping tcn-flood
Floods multicast traffic when a Spanning Tree topology
change occurs
GC
ip igmp snooping
tcn-query-solicit
Sends an IGMP Query Solicitation when a Spanning Tree
topology change occurs
GC
Summary of Contents for EX-3524
Page 2: ......
Page 28: ...Figures 28 ...
Page 34: ...Section I Getting Started 34 ...
Page 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Page 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Page 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Page 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Page 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Page 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Page 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Page 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Page 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Page 366: ...Chapter 15 Address Table Commands 366 ...
Page 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Page 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Page 578: ...Section I Appendices 578 ...