3Com 4510G Configuration Manual page 379

3com switch 4510g family
Table of Contents

Advertisement

1 Multicast Overview ····································································································································2-1
Introduction to Multicast ··························································································································2-1
Comparison of Information Transmission Techniques····································································2-1
Features of Multicast ·······················································································································2-4
Common Notations in Multicast·······································································································2-5
Advantages and Applications of Multicast·······················································································2-5
Multicast Models ·····································································································································2-5
Multicast Architecture······························································································································2-6
Multicast Addresses ························································································································2-7
Multicast Protocols ························································································································2-10
Multicast Packet Forwarding Mechanism ·····························································································2-12
2 IGMP Snooping Configuration ·················································································································2-1
IGMP Snooping Overview·······················································································································2-1
Principle of IGMP Snooping ············································································································2-1
Basic Concepts in IGMP Snooping ·································································································2-2
How IGMP Snooping Works············································································································2-3
Protocols and Standards ·················································································································2-5
IGMP Snooping Configuration Task List·································································································2-5
Configuring Basic Functions of IGMP Snooping·····················································································2-6
Configuration Prerequisites ·············································································································2-6
Enabling IGMP Snooping ················································································································2-6
Configuring the Version of IGMP Snooping ····················································································2-7
Configuring IGMP Snooping Port Functions···························································································2-7
Configuration Prerequisites ·············································································································2-7
Configuring Aging Timers for Dynamic Ports ··················································································2-8
Configuring Static Ports···················································································································2-8
Configuring Simulated Joining·········································································································2-9
Configuring Fast Leave Processing ······························································································2-10
Configuring IGMP Snooping Querier ····································································································2-11
Configuration Prerequisites ···········································································································2-11
Enabling IGMP Snooping Querier ·································································································2-11
Configuring IGMP Queries and Responses ··················································································2-12
Configuring Source IP Address of IGMP Queries ·········································································2-13
Configuring an IGMP Snooping Policy··································································································2-13
Configuration Prerequisites ···········································································································2-13
Configuring a Multicast Group Filter······························································································2-14
Configuring Multicast Source Port Filtering ···················································································2-14
Configuring the Function of Dropping Unknown Multicast Data ···················································2-15
Configuring IGMP Report Suppression ·························································································2-16
Configuring Maximum Multicast Groups that Can Be Joined on a Port········································2-16
Configuring Multicast Group Replacement ···················································································2-17
Displaying and Maintaining IGMP Snooping ························································································2-18
IGMP Snooping Configuration Examples ·····························································································2-19
Table of Contents
i

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents