H3C Technologies H3C S5120 Series Switches User Manual
Page 293

i
Table of Contents
1 Multicast Overview ····································································································································1-1
Introduction to Multicast ··························································································································1-1
Features of Multicast ······················································································································ 1-4
Common Notations in Multicast······································································································ 1-5
Multicast Models ·····································································································································1-6
Multicast Architecture······························································································································1-6
Multicast Addresses ······················································································································· 1-7
Multicast Protocols ························································································································· 1-9
Multicast Packet Forwarding Mechanism ·····························································································1-10
2 IGMP Snooping Configuration ·················································································································2-1
IGMP Snooping Overview·······················································································································2-1
Principle of IGMP Snooping ··········································································································· 2-1
How IGMP Snooping Works··········································································································· 2-3
IGMP Snooping Proxying ··············································································································· 2-5
Protocols and Standards ················································································································ 2-6
IGMP Snooping Configuration Task List·································································································2-6
Configuring Basic Functions of IGMP Snooping·····················································································2-7
Configuration Prerequisites ············································································································ 2-7
Enabling IGMP Snooping ··············································································································· 2-7
Configuring IGMP Snooping Port Functions ···························································································2-9
Configuration Prerequisites ············································································································ 2-9
Configuring Static Ports················································································································ 2-10
Configuring Simulated Joining······································································································ 2-10
Configuring IGMP Snooping Querier ····································································································2-12
Configuration Prerequisites ·········································································································· 2-12
Configuring IGMP Snooping Proxying ··································································································2-14
Configuration Prerequisites ·········································································································· 2-14
Configuring an IGMP Snooping Policy··································································································2-15
Configuration Prerequisites ·········································································································· 2-15
Configuring a Multicast Group Filter····························································································· 2-16