Dcscm; Introduction To Dcscm - Planet XGS3-42000R User Manual

4-slot layer 3 ipv6/ ipv4 routing chassis switch
Table of Contents

Advertisement

 Next, to assure the Prot ocol of Interface and Link is UP (use show interface command);
 Please check if the correct IP address is configured on the interface (use ip address c ommand);
 Afterwards, enable DVMRP Protoc ol on the interface (use ip dvmrp command and ip dv
multicast-routing command);
 Multicast Protocol requires RPF Check using unicast routing; therefore the correctness of unicast
routing must be assured beforehand. (DVMRP uses its own unicast table, pleas e use show ip dvmrp
route command to look up).
If all attempts including Check are made but the problems on DVMRP can't be solved yet, then please use
commands such as debug DVMRP, and then copy DEBUG information in 3 minutes and send to Tec hnology
Service Center.

43.8 DCSCM

43.8.1 Introduction to DCSCM

DCS CM (Destination control and source control multicast) technology mainly includes three aspects, i.e.
Multicast Packet Source Cont rollable, Multicast User Controllable and Service-Oriented Priority Strategy
Multicast.
The Multicast Packet Source Controllable technology of Security Controllable Multicast technology is mainly
processed in the following manners:
1. On the edge switch, if source under-control multicast is configured, then only multicast data from
specified group of specified source can pass.
2. For RP switch in the core of P IM-SM, for RE GIS TE R information out of s pecified source and
specified group, REGIS TER_STOP is transmitted directly and table entry is not allowed to set up.
(This task is implemented in PIM-SM model).
The implement of Multicast User Controllable technology of Security Controllable Multicast technology is
based on the control over IGMP report message sent
IGMP snooping and IGMP model, of which the control logic includes the following three, i.e. to take control
based on VLAN+MA C address transmitting packets, to take control based on IP address of transmitting
packets and to take control based on the port where messages enter, in which IGMP snooping can use the
above three methods to take control simultaneously, while since IGMP model is located at layer 3, it only
takes control over the IP address transmitting packets .
The Service-Oriented Priority Strategy Multicast of Security Cont rollable technology adopts the following
mode: for multicast data in limit range, set the priority specified by the user at the join-in end so that data can
be sent in a higher priority on TRUNK port, consequently guarantee t he transmission is processed in
user-specified priority in the entire network.
out by the user, thus the model being controlled is
43-38

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents