How MLD Snooping Works ·············································································································3-3
MLD Snooping Proxying··················································································································3-5
Protocols and Standards ·················································································································3-6
Configuration Prerequisites ·············································································································3-8
Enabling MLD Snooping··················································································································3-8
Configuration Prerequisites ·············································································································3-9
Configuring Static Ports·················································································································3-10
Configuration Prerequisites ···········································································································3-13
Configuration Prerequisites ···········································································································3-15
Configuration Prerequisites ···········································································································3-16
Troubleshooting MLD Snooping ···········································································································3-30
ii