1 MLD Snooping Configuration···················································································································1-1
MLD Snooping Overview ························································································································1-1
How MLD Snooping Works ·············································································································1-3
Protocols and Standards ·················································································································1-6
Configuration Prerequisites ·············································································································1-7
Enabling MLD Snooping··················································································································1-7
Configuration Prerequisites ·············································································································1-8
Configuring Static Ports···················································································································1-9
Configuration Prerequisites ···········································································································1-12
Configuration Prerequisites ···········································································································1-14
Static Port Configuration················································································································1-22
Troubleshooting MLD Snooping ···········································································································1-27
Table of Contents
i