1 MLD Snooping Configuration···················································································································1-1
MLD Snooping Overview ························································································································1-1
How MLD Snooping Works ·············································································································1-3
Protocols and Standards ·················································································································1-5
Configuration Prerequisites ·············································································································1-6
Enabling MLD Snooping··················································································································1-6
Configuration Prerequisites ·············································································································1-7
Configuring Static Ports···················································································································1-8
Configuration Prerequisites ···········································································································1-11
Configuration Prerequisites ···········································································································1-14
Static Port Configuration················································································································1-21
Troubleshooting MLD Snooping ···········································································································1-26
Table of Contents
i