1 IGMP snooping ··········································································································································1-1
Overview ·················································································································································1-1
Principle of IGMP Snooping ············································································································1-1
IGMP Snooping Related Ports ········································································································1-1
Protocols and Standards ·················································································································1-4
Configuring IGMP Snooping ···················································································································1-4
Configuration Task List····················································································································1-4
Table of Contents
i