Operation Manual – Multicast
H3C S5500-EI Series Ethernet Switches
Table of Contents
i
Table of Contents
Chapter 1 Multicast Overview ...................................................................................................... 1-1
1.1 Introduction to Multicast..................................................................................................... 1-1
1.1.1 Comparison of Information Transmission Techniques............................................ 1-1
1.1.2 Roles in Multicast .................................................................................................... 1-4
1.1.3 Advantages and Applications of Multicast .............................................................. 1-5
1.2 Multicast Models ................................................................................................................ 1-6
1.3 Multicast Architecture ........................................................................................................ 1-6
1.3.1 Multicast Addresses ................................................................................................ 1-7
1.3.2 Multicast Protocols ................................................................................................ 1-11
1.4 Multicast Packet Forwarding Mechanism ........................................................................ 1-13
Chapter 2 IGMP Snooping Configuration ................................................................................... 2-1
2.1 IGMP Snooping Overview ................................................................................................. 2-1
2.1.1 Principle of IGMP Snooping .................................................................................... 2-1
2.1.2 Basic Concepts in IGMP Snooping ......................................................................... 2-2
2.1.3 Work Mechanism of IGMP Snooping ...................................................................... 2-4
2.1.4 Processing of Multicast Protocol Messages ........................................................... 2-6
2.1.5 Protocols and Standards......................................................................................... 2-6
2.2 IGMP Snooping Configuration Task List ........................................................................... 2-7
2.3 Configuring Basic Functions of IGMP Snooping ............................................................... 2-8
2.3.1 Configuration Prerequisites..................................................................................... 2-8
2.3.2 Enabling IGMP Snooping........................................................................................ 2-8
2.3.3 Configuring the Version of IGMP Snooping ............................................................ 2-9
2.4 Configuring IGMP Snooping Port Functions...................................................................... 2-9
2.4.1 Configuration Prerequisites..................................................................................... 2-9
2.4.2 Configuring Aging Timers for Dynamic Ports........................................................ 2-10
2.4.3 Configuring Static Ports ........................................................................................ 2-11
2.4.4 Configuring Simulated Joining .............................................................................. 2-12
2.4.5 Configuring Fast Leave Processing ...................................................................... 2-13
2.5 Configuring IGMP Snooping Querier ............................................................................... 2-14
2.5.1 Configuration Prerequisites................................................................................... 2-14
2.5.2 Enabling IGMP Snooping Querier......................................................................... 2-14
2.5.3 Configuring IGMP Queries and Responses.......................................................... 2-15
2.5.4 Configuring Source IP Address of IGMP Queries................................................. 2-16
2.6 Configuring an IGMP Snooping Policy ............................................................................ 2-17
2.6.1 Configuration Prerequisites................................................................................... 2-17
2.6.2 Configuring a Multicast Group Filter...................................................................... 2-17
2.6.3 Configuring Multicast Source Port Filtering........................................................... 2-18