1 IGMP Snooping Configuration ·················································································································1-1
IGMP Snooping Overview·······················································································································1-1
Principle of IGMP Snooping ············································································································1-1
How IGMP Snooping Works············································································································1-3
Protocols and Standards ·················································································································1-5
Configuration Prerequisites ·············································································································1-6
Enabling IGMP Snooping ················································································································1-6
Configuration Prerequisites ·············································································································1-7
Configuring Static Ports···················································································································1-8
Configuration Prerequisites ···········································································································1-11
Configuration Prerequisites ···········································································································1-13
Static Port Configuration················································································································1-21
Table of Contents
i