1 Multicast Overview ····································································································································2-1
Introduction to Multicast ··························································································································2-1
Features of Multicast ·······················································································································2-4
Multicast Models ·····································································································································2-5
Multicast Architecture······························································································································2-6
Multicast Addresses ························································································································2-7
Multicast Protocols ························································································································2-10
2 IGMP Snooping Configuration ·················································································································2-1
IGMP Snooping Overview·······················································································································2-1
Principle of IGMP Snooping ············································································································2-1
How IGMP Snooping Works············································································································2-3
Protocols and Standards ·················································································································2-5
Configuration Prerequisites ·············································································································2-6
Enabling IGMP Snooping ················································································································2-6
Configuration Prerequisites ·············································································································2-7
Configuring Static Ports···················································································································2-8
Configuration Prerequisites ···········································································································2-11
Configuration Prerequisites ···········································································································2-13
Table of Contents
i