1 IGMP Snooping Configuration ·················································································································1-1
IGMP Snooping Overview·······················································································································1-1
Principle of IGMP Snooping ············································································································1-1
How IGMP Snooping Works············································································································1-3
Protocols and Standards ·················································································································1-5
Configuration Prerequisites ·············································································································1-7
Enabling IGMP Snooping ················································································································1-7
Configuration Prerequisites ·············································································································1-8
Configuring Static Ports···················································································································1-9
Configuration Prerequisites ···········································································································1-12
Configuration Prerequisites ···········································································································1-14
Static Port Configuration················································································································1-22
Table of Contents
i