Purpose
Command or Action
Applies the specified access list to IGMP reports.
ip igmp access-group access-list
Example:
Device(config-if)# ip igmp access-group
mygroup
Step 10
Enables PIM-SM on the interface.
ip pim sparse-mode
Step 11
Example:
Device(config-if)# ip pim sparse-mode
You must use sparse
mode.
Note
--
Repeat Steps 1 through 11 on all interfaces that
require access control of SSM channel membership.
Step 12
Enables IGMPv3 on this interface. The default version of IGMP
is IGMP version 2. Version 3 is required by SSM.
ip igmp version 3
Example:
Device(config-if)# ip igmp version 3
Step 13
--
Repeat Step 13 on all host-facing interfaces.
Step 14
Returns to privileged EXEC mode.
end
Example:
Device(config-if)# end
Step 15
Related Topics
Controlling Access to an SSM Network Using IGMP Extended Access Lists , on page 84
Example: Denying All States for a Group G, on page 85
Example: Denying All States for a Source S, on page 85
Example: Permitting All States for a Group G, on page 85
Example: Permitting All States for a Source S, on page 86
Example: Filtering a Source S for a Group G, on page 86
How to Configure IGMP Snooping
Enabling or Disabling IGMP Snooping on a Device (CLI)
By default, IGMP snooping is globally enabled on the device. When globally enabled or disabled, it is also
enabled or disabled in all existing VLAN interfaces. IGMP snooping is by default enabled on all VLANs, but
can be enabled and disabled on a per-VLAN basis.
IP Multicast Routing Configuration Guide, Cisco IOS XE Release 3SE (Catalyst 3650 Switches)
OL-29890-01
57
Configuring IGMP
How to Configure IGMP Snooping