Contents
Multicast overview ······················································································································································· 1
Introduction to multicast ···················································································································································· 1
Features of multicast ················································································································································· 3
Common notations in multicast ······························································································································· 4
Multicast models ································································································································································ 5
Multicast architecture ························································································································································ 5
Multicast addresses ·················································································································································· 6
Multicast protocols ··················································································································································· 9
Multi-instance multicast ·················································································································································· 12
IGMP snooping configuration ··································································································································· 14
IGMP snooping overview ·············································································································································· 14
Principle of IGMP snooping ································································································································· 14
How IGMP snooping works ································································································································· 16
IGMP snooping proxying ····································································································································· 18
Protocols and standards ······································································································································· 19
Configuration prerequisites ·································································································································· 20
Enabling IGMP snooping ····································································································································· 20
Configuration prerequisites ·································································································································· 22
Configuring static ports ········································································································································ 23
Configuring simulated joining ······························································································································ 24
Configuration prerequisites ·································································································································· 26
Enabling IGMP snooping querier ························································································································ 27
Configuration prerequisites ·································································································································· 29
Configuration prerequisites ·································································································································· 30
iii