Contents
Multicast overview ······················································································································································· 1
Introduction to multicast ···················································································································································· 1
Multicast features ······················································································································································ 3
Common notations in multicast ······························································································································· 4
Multicast models ································································································································································ 5
Multicast architecture ························································································································································ 5
Multicast addresses ·················································································································································· 6
Multicast protocols ··················································································································································· 9
Multicast support for VPNs ············································································································································ 12
Introduction to VPN instances ······························································································································ 12
Multicast application in VPNs ······························································································································ 12
Configuring IGMP snooping ····································································································································· 14
Overview ········································································································································································· 14
Basic IGMP snooping concepts ··························································································································· 14
How IGMP snooping works ································································································································· 16
Protocols and standards ······································································································································· 17
Enabling IGMP snooping ····································································································································· 18
Configuring static ports ········································································································································· 21
Enabling fast-leave processing ····························································································································· 22
Configuration prerequisites ·································································································································· 23
Configuration prerequisites ·································································································································· 25
i