M
ULTICAST
F
ILTERING
C
OMMANDS
33-18
Command Mode
Interface Configuration (Ethernet, Port Channel)
Command Usage
• A port which is not configured as an MVR receiver or source port can
use IGMP snooping to join or leave multicast groups using the
standard rules for multicast filtering.
• MVR receiver ports cannot be members of a trunk. Receiver ports can
belong to different VLANs, but should not be configured as a
member of the MVR VLAN. IGMP snooping can be used to allow a
receiver port to dynamically join or leave multicast groups within the
MVR VLAN. Multicast groups can also be statically assigned to a
receiver port using the
group
keyword.
• One or more interfaces may be configured as MVR source ports. A
source port is able to both receive and send data for multicast groups
which it has joined through IGMP snooping or which have been
statically assigned using the
group
keyword.
• The IP address range from 224.0.0.0 to 239.255.255.255 is used for
multicast streams. MVR group addresses cannot fall within the
reserved IP multicast address range of 224.0.0.x.
• Immediate leave applies only to receiver ports. When enabled, the
receiver port is immediately removed from the multicast group
identified in the leave message. When immediate leave is disabled, the
switch follows the standard rules by sending a group-specific query to
the receiver port and waiting for a response to determine if there are
any remaining subscribers for that multicast group before removing
the port from the group list.
• Using immediate leave can speed up leave latency, but should only be
enabled on a port attached to one multicast subscriber to avoid
disrupting services to other group members attached to the same
interface.
• Immediate leave does not apply to multicast groups which have been
statically assigned to a port.
• IGMP snooping must be enabled to a allow a subscriber to
dynamically join or leave an MVR group (see
ip igmp snooping
on
Summary of Contents for 7824M/FSW - annexe 1
Page 2: ......
Page 24: ...TABLE OF CONTENTS xxiv ...
Page 28: ...TABLES xxviii ...
Page 32: ...FIGURES xxxii Figure 16 3 DNS Cache 16 7 ...
Page 34: ...GETTING STARTED ...
Page 46: ...SYSTEM DEFAULTS 1 12 ...
Page 62: ...SWITCH MANAGEMENT ...
Page 74: ...CONFIGURING THE SWITCH 3 12 ...
Page 112: ...BASIC MANAGEMENT TASKS 4 38 ...
Page 168: ...USER AUTHENTICATION 6 30 ...
Page 223: ...SHOWING PORT STATISTICS 9 33 Figure 9 12 Port Statistics ...
Page 230: ...ADDRESS TABLE SETTINGS 10 6 ...
Page 304: ...CLASS OF SERVICE 13 16 ...
Page 316: ...QUALITY OF SERVICE 14 12 ...
Page 338: ...MULTICAST FILTERING 15 22 ...
Page 346: ...DOMAIN NAME SERVICE 16 8 ...
Page 348: ...COMMAND LINE INTERFACE IP Interface Commands 35 1 ...
Page 362: ...OVERVIEW OF COMMAND LINE INTERFACE 17 14 ...
Page 494: ...USER AUTHENTICATION COMMANDS 21 48 ...
Page 514: ...CLIENT SECURITY COMMANDS 22 20 ...
Page 540: ...ACCESS CONTROL LIST COMMANDS 23 26 ...
Page 558: ...INTERFACE COMMANDS 24 18 ...
Page 576: ...MIRROR PORT COMMANDS 26 4 ...
Page 582: ...RATE LIMIT COMMANDS 27 6 ...
Page 616: ...SPANNING TREE COMMANDS 29 28 ...
Page 644: ...VLAN COMMANDS 30 28 ...
Page 664: ...CLASS OF SERVICE COMMANDS 31 20 ...
Page 678: ...QUALITY OF SERVICE COMMANDS 32 14 ...
Page 720: ...APPENDICES ...
Page 726: ...SOFTWARE SPECIFICATIONS A 6 ...
Page 730: ...TROUBLESHOOTING B 4 ...
Page 746: ...INDEX Index 6 ...
Page 747: ......