H3C S3610-28P Operation Manual page 665

S3610 & s5510 series
Table of Contents

Advertisement

Operation Manual – Multicast Protocol
H3C S3610&S5510 Series Ethernet Switches
2.6.4 Configuring IGMP Report Suppression................................................................. 2-18
2.6.5 Configuring Maximum Multicast Groups that Can Be Joined on a Port................ 2-19
2.6.6 Configuring Multicast Group Replacement ........................................................... 2-20
2.7 Displaying and Maintaining IGMP Snooping ................................................................... 2-21
2.8 IGMP Snooping Configuration Examples ........................................................................ 2-22
2.8.1 Configuring Simulated Joining .............................................................................. 2-22
2.8.2 Static Router Port Configuration ........................................................................... 2-24
2.8.3 IGMP Snooping Querier Configuration ................................................................. 2-27
2.9 Troubleshooting IGMP Snooping Configuration .............................................................. 2-30
2.9.1 Switch Fails in Layer 2 Multicast Forwarding........................................................ 2-30
2.9.2 Configured Multicast Group Policy Fails to Take Effect........................................ 2-30
Chapter 3 MLD Snooping Configuration..................................................................................... 3-1
3.1 MLD Snooping Overview ................................................................................................... 3-1
3.1.1 Introduction to MLD Snooping................................................................................. 3-1
3.1.2 Basic Concepts in MLD Snooping........................................................................... 3-2
3.1.3 How MLD Snooping Works ..................................................................................... 3-3
3.1.4 Protocols and Standards......................................................................................... 3-6
3.2 MLD Snooping Configuration Task List ............................................................................. 3-6
3.3 Configuring Basic Functions of MLD Snooping ................................................................. 3-7
3.3.1 Configuration Prerequisites..................................................................................... 3-7
3.3.2 Enabling MLD Snooping ......................................................................................... 3-7
3.3.3 Configuring the Version of MLD Snooping.............................................................. 3-8
3.4 Configuring MLD Snooping Port Functions ....................................................................... 3-8
3.4.1 Configuration Prerequisites..................................................................................... 3-8
3.4.2 Configuring Aging Timers for Dynamic Ports.......................................................... 3-9
3.4.3 Configuring Static Ports ........................................................................................ 3-10
3.4.4 Configuring Simulated Joining .............................................................................. 3-10
3.4.5 Configuring Fast Leave Processing ...................................................................... 3-11
3.5 Configuring MLD Snooping Querier................................................................................. 3-13
3.5.1 Configuration Prerequisites................................................................................... 3-13
3.5.2 Enabling MLD Snooping Querier .......................................................................... 3-13
3.5.3 Configuring MLD Queries and Responses ........................................................... 3-14
3.5.4 Configuring Source IPv6 Addresses of MLD Queries........................................... 3-15
3.6 Configuring an MLD Snooping Policy .............................................................................. 3-16
3.6.1 Configuration Prerequisites................................................................................... 3-16
3.6.2 Configuring an IPv6 Multicast Group Filter ........................................................... 3-16
3.6.3 Configuring Dropping Unknown IPv6 Multicast Data ............................................ 3-17
3.6.4 Configuring MLD Report Suppression .................................................................. 3-18
3.6.5 Configuring Maximum Multicast Groups that that Can Be Joined on a Port................. 3-18
3.6.6 Configuring IPv6 Multicast Group Replacement ................................................... 3-19
3.7 Displaying and Maintaining MLD Snooping..................................................................... 3-20
3.8 MLD Snooping Configuration Examples.......................................................................... 3-21
ii
Table of Contents

Advertisement

Table of Contents
loading

Table of Contents