Contents
Multicast overview ······················································································································································· 1
Introduction to multicast ···················································································································································· 1
Multicast features ······················································································································································ 3
Common notations in multicast ······························································································································· 4
Multicast models ································································································································································ 5
Multicast architecture ························································································································································ 5
Multicast addresses ·················································································································································· 6
Multicast protocols ··················································································································································· 9
Configuring IGMP snooping ····································································································································· 12
Overview ········································································································································································· 12
How IGMP snooping works ································································································································· 14
IGMP snooping proxying ····································································································································· 15
Protocols and standards ······································································································································· 17
Enabling IGMP snooping ····································································································································· 18
Configuring static ports ········································································································································· 20
Enabling IGMP snooping querier ························································································································ 23
i