HP A8800 Configuration Manual page 3

Ip multicast
Hide thumbs Also See for A8800:
Table of Contents

Advertisement

Contents
Multicast overview ······················································································································································· 1
Overview ············································································································································································ 1
Information transmission techniques ······················································································································· 1
Multicast features ······················································································································································ 3
Common notations in multicast ······························································································································· 4
Multicast advantages and applications ················································································································· 4
Multicast models ································································································································································ 5
Multicast architecture ························································································································································ 5
Multicast addresses ·················································································································································· 6
Multicast protocols ··················································································································································· 9
Multicast packet forwarding mechanism ····················································································································· 11
Multicast support for VPNs ············································································································································ 12
Introduction to VPN instances ······························································································································ 12
Multicast application in VPNs ······························································································································ 13
Configuring IGMP snooping ····································································································································· 14
Overview ········································································································································································· 14
Basic concepts in IGMP snooping ······················································································································· 14
How IGMP snooping works ································································································································· 16
IGMP snooping proxying ····································································································································· 17
Protocols and standards ······································································································································· 19
IGMP snooping configuration task list ························································································································· 19
Configuring basic IGMP snooping functions ·············································································································· 20
Enabling IGMP snooping ····································································································································· 20
Specifying the version of IGMP snooping ·········································································································· 20
Configuring the maximum number of global IGMP forwarding entries ·························································· 21
Configuring IGMP snooping port functions ················································································································· 21
Setting aging timers for dynamic ports ··············································································································· 22
Configuring static ports ········································································································································· 22
Configuring a port as a simulated member host ······························································································· 23
Enabling fast-leave processing ····························································································································· 24
Disabling a port from becoming a dynamic router port ··················································································· 25
Configuring IGMP snooping querier ··························································································································· 25
Enabling IGMP snooping querier ························································································································ 26
Configuring parameters for IGMP queries and responses ··············································································· 26
Configuring source IP address for IGMP queries ······························································································· 27
Configuring IGMP snooping proxying ························································································································ 28
Enabling IGMP snooping proxying ····················································································································· 28
Configuring the source IP address for the IGMP messages sent by the proxy ··············································· 28
Configuring IGMP snooping policies ··························································································································· 28
Configuring a multicast group filter ····················································································································· 29
Enabling dropping unknown multicast data ······································································································· 29
Enabling IGMP report suppression ······················································································································ 30
Setting the maximum number of multicast groups that a port can join ··························································· 30
Enabling multicast group replacement ················································································································ 31
Enabling the IGMP snooping host tracking function ························································································· 32
Displaying and maintaining IGMP snooping ·············································································································· 33
IGMP snooping configuration examples ····················································································································· 33
Group policy and simulated joining configuration example ············································································ 33
i
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Advertisement

Table of Contents
loading

Table of Contents