Table of Contents

1Multicast Overview ····································································································································1-1Multicast Overview··································································································································1-1 Information Transmission in the Unicast Mode ···············································································1-1 Information Transmission in the Broadcast Mode···········································································1-2 Information Transmission in the Multicast Mode·············································································1-3 Roles in Multicast ····························································································································1-4 Advantages and Applications of Multicast·······················································································1-5 Multicast Models ·····································································································································1-5 Multicast Architecture······························································································································1-6 Multicast Protocols ··························································································································1-9 Multicast Packet Forwarding Mechanism ·····························································································1-11 Implementation of the RPF Mechanism ························································································1-11 RPF Check ····································································································································1-12

2IGMP Snooping Configuration ·················································································································2-1IGMP Snooping Overview·······················································································································2-1 Principle of IGMP Snooping ············································································································2-1 Basic Concepts in IGMP Snooping ·································································································2-1 Work Mechanism of IGMP Snooping ······························································································2-2 IGMP Snooping Configuration ················································································································2-4 IGMP Snooping Configuration Task List ·························································································2-4 Enabling IGMP Snooping ················································································································2-5 Configuring the Version of IGMP Snooping ····················································································2-5 Configuring Timers ··························································································································2-6 Configuring Fast Leave Processing ································································································2-6 Configuring a Multicast Group Filter································································································2-7 Configuring the Maximum Number of Multicast Groups on a Port··················································2-8 Configuring IGMP Querier···············································································································2-9 Suppressing Flooding of Unknown Multicast Traffic in a VLAN····················································2-10 Configuring Static Member Port for a Multicast Group··································································2-10 Configuring a Static Router Port····································································································2-11 Configuring a Port as a Simulated Group Member ·······································································2-12 Configuring a VLAN Tag for Query Messages··············································································2-13 Configuring Multicast VLAN ··········································································································2-13 Displaying and Maintaining IGMP Snooping·························································································2-15 IGMP Snooping Configuration Examples ·····························································································2-15 Configuring IGMP Snooping··········································································································2-15 Configuring Multicast VLAN ··········································································································2-17 Troubleshooting IGMP Snooping··········································································································2-19

3Common Multicast Configuration············································································································3-1Common Multicast Configuration············································································································3-1 Configuring a Multicast MAC Address Entry ···················································································3-1 Configuring Dropping Unknown Multicast Packets ·········································································3-2 Displaying and Maintaining Common Multicast Configuration································································3-2

i

Page 440
Image 440
3Com WX3000 operation manual Table of Contents