Chapter 20
| Multicast Filtering Commands
IGMP Snooping
– 466 –
ip igmp snooping
unregistered-data-
flood
This command floods unregistered multicast traffic into the attached VLAN. Use the
no
form to drop unregistered multicast traffic.
Syntax
[
no
]
ip igmp snooping unregistered-data-flood
Default Setting
Disabled
Command Mode
Global Configuration
Command Usage
Once the table used to store multicast entries for IGMP snooping and multicast
routing is filled, no new entries are learned. If no router port is configured in the
attached VLAN, and unregistered-flooding is disabled, any subsequent multicast
traffic not found in the table is dropped, otherwise it is flooded throughout the
VLAN.
Example
Console(config)#ip igmp snooping unregistered-data-flood
Console(config)#
ip igmp snooping
unsolicited-report-
interval
This command specifies how often the upstream interface should transmit
unsolicited IGMP reports when proxy reporting is enabled. Use the
no
form to
restore the default value.
Syntax
ip igmp snooping unsolicited-report-interval
seconds
no ip igmp snooping version-exclusive
seconds
- The interval at which to issue unsolicited reports.
(Range: 1-65535 seconds)
Default Setting
400 seconds
Command Mode
Global Configuration
Command Usage
◆
When a new upstream interface (that is, uplink port) starts up, the switch sends
unsolicited reports for all currently learned multicast channels out through the
new upstream interface.
◆
This command only applies when proxy reporting is enabled (see
page 461
).
Содержание EX-3524
Страница 2: ......
Страница 28: ...Figures 28 ...
Страница 34: ...Section I Getting Started 34 ...
Страница 58: ...Chapter 1 Initial Switch Configuration Setting the System Clock 58 ...
Страница 72: ...Chapter 2 Using the Command Line Interface CLI Command Groups 72 ...
Страница 156: ...Chapter 5 SNMP Commands Notification Log Commands 156 ...
Страница 164: ...Chapter 6 Remote Monitoring Commands 164 ...
Страница 218: ...Chapter 7 Authentication Commands Management IP Filter 218 ...
Страница 268: ...Chapter 8 General Security Measures Port based Traffic Segmentation 268 ...
Страница 292: ...Chapter 9 Access Control Lists ACL Information 292 ...
Страница 312: ...Chapter 10 Interface Commands Power Savings 312 ...
Страница 324: ...Chapter 11 Link Aggregation Commands Trunk Status Display Commands 324 ...
Страница 366: ...Chapter 15 Address Table Commands 366 ...
Страница 428: ...Chapter 17 VLAN Commands Configuring Voice VLANs 428 ...
Страница 572: ...Chapter 25 IP Interface Commands IPv6 Interface 572 ...
Страница 578: ...Section I Appendices 578 ...
Страница 594: ...Appendix C Customer Support Manuals 594 ...