Related
Documentation
Example: Configuring IGMP Snooping
Requirements
Copyright © 2017, Juniper Networks, Inc.
source ip-address;
}
}
}
proxy {
source-address ip-address;
}
query-interval seconds;
query-last-member-interval seconds;
query-response-interval seconds;
robust-count number;
}
You can include this statement at the following hierarchy levels:
[edit bridge-domains bridge-domain-name protocols igmp-snooping]
[edit routing-instances routing-instance-name bridge-domains bridge-domain-name
protocols igmp-snooping]
Multicast Overview
Understanding Multicast Snooping
This example shows how to configure IGMP snooping. IGMP snooping can reduce
unnecessary traffic from IP multicast applications.
Requirements on page 479
Overview and Topology on page 480
Configuration on page 483
Verification on page 485
This example uses the following hardware components:
One MX Series router
One Layer 3 device functioning as a multicast router
Before you begin:
Configure the interfaces. See the Interfaces Feature Guide for Security Devices.
Configure an interior gateway protocol. See the Junos OS Routing Protocols Library.
Configure a multicast protocol. This feature works with the following multicast
protocols:
DVMRP
PIM-DM
Chapter 15: Configuring Internet Group Management Protocol Snooping
479