664
control logic includes the following three, i.e. to take control based on VLAN+MAC
address transmitting packets, to take control based on IP address of transmitting packets
and to take control based on the port where messages enter, in which IGMP snooping
can use the above three methods to take control simultaneously, while since IGMP model
is located at layer 3, it only takes control over the IP address transmitting packets.
The Service-Oriented Priority Strategy Multicast of Security Controllable technology
adopts the following mode: for multicast data in limit range, set the priority specified by
the user at the join-in end so that data can be sent in a higer priority on TRUNK port,
consequently guarantee the transmission is processed in user-specified priority in the
entire network.
17.5.2 ECSCM Configuration Task List
1
.
Source Control Configuration
2
.
Destination Control Configuration
3
.
Multicast Strategy Configuration
1
.
Source Control Configuration
Source Controll Configuration has three parts, of which the first is to enable source
control. The command of source control is as follows:
Command: Explanation
Global Configuration Mode
[no] ip multicast source-control
(Required)
Enable source control globally, the “
no ip
multicast source-control
” command
disables source control globally. It is
noticeable that, after enabling source control
globally, all multicast packets are discarded
by default. All source control configuration can
not be processed until the it is enabled
globally, while source control can not be
disabled until all configured rules are
disabled.
The next is to configure the rule of source control. It is configured in the same
manner as for ACL, and uses ACL number of 5000-5009, every rule number can be used
to configure 10 rules. It is noticeable that these rules are ordered, the front one is the one
which is configured the earlist. Once the configured rules are matched, the following rules
won’t take effect, so rules of globally allow must be put at the end. The commands are