i
Table of Contents
1 Multicast Overview ····································································································································1-1
Multicast Overview ··································································································································1-1
Information Transmission in the Unicast Mode ···············································································1-1
Information Transmission in the Broadcast Mode···········································································1-2
Information Transmission in the Multicast Mode·············································································1-2
Roles in Multicast ····························································································································1-3
Advantages and Applications of Multicast·······················································································1-4
Multicast Models ·····································································································································1-4
Multicast Architecture······························································································································1-5
Multicast Address ····························································································································1-6
Multicast Protocols ························································································································1-10
Multicast Packet Forwarding Mechanism ·····························································································1-12
Implementation of the RPF Mechanism ························································································1-12
RPF Check ····································································································································1-13
2 IGMP Snooping Configuration ·················································································································2-1
IGMP Snooping Overview·······················································································································2-1
Principle of IGMP Snooping ············································································································2-1
Basic Concepts in IGMP Snooping ·································································································2-1
Work Mechanism of IGMP Snooping ······························································································2-2
IGMP Snooping Configuration ················································································································2-4
Enabling IGMP Snooping ················································································································2-4
Configuring the Version of IGMP Snooping ····················································································2-5
Configuring Timers ··························································································································2-6
Configuring Fast Leave Processing ································································································2-6
Configuring a Multicast Group Filter································································································2-7
Configuring the Maximum Number of Multicast Groups on a Port··················································2-8
Configuring IGMP Snooping Querier·······························································································2-9
Suppressing Flooding of Unknown Multicast Traffic in a VLAN ····················································2-10
Configuring Static Member Port for a Multicast Group··································································2-11
Configuring a Static Router Port····································································································2-12
Configuring a Port as a Simulated Group Member ·······································································2-12
Configuring a VLAN Tag for Query Messages ··············································································2-13
Configuring Multicast VLAN ··········································································································2-14
Displaying and Maintaining IGMP Snooping·························································································2-15
IGMP Snooping Configuration Examples ·····························································································2-16
Configuring IGMP Snooping··········································································································2-16
Configuring Multicast VLAN ··········································································································2-18
Troubleshooting IGMP Snooping··········································································································2-20
3 MLD Snooping Configuration···················································································································3-1
MLD Snooping Overview ························································································································3-1
Содержание S3100 Series
Страница 12: ...10 You can e mail your comments about product documentation to info h3c com We appreciate your comments...
Страница 74: ...7 7 Sysname ip http acl 2030...
Страница 270: ...1 51 Sysname GigabitEthernet1 0 1 port trunk permit vlan all...
Страница 287: ...1 14 the interface on which the packet actually arrived The RPF check succeeds and the packet is forwarded...
Страница 579: ...ii Configuration Example 2 4 QoS Profile Configuration Example 2 4...
Страница 713: ...1 22 Total associations 1...
Страница 823: ...1 16...
Страница 1054: ...i Table of Contents Appendix A Acronyms A 1...