H3C S5500-EI Series Operation Manual

Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Table of Contents
Table of Contents
Chapter 1 Multicast Overview......................................................................................................1-1
1.1 Introduction to Multicast.....................................................................................................1-1
1.1.1 Comparison of Information Transmission Techniques............................................1-1
1.1.2 Roles in Multicast....................................................................................................1-4
1.1.3 Advantages and Applications of Multicast .............................................................. 1-5
1.2 Multicast Models................................................................................................................1-6
1.3 Multicast Architecture ........................................................................................................1-6
1.3.1 Multicast Addresses................................................................................................1-7
1.3.2 Multicast Protocols................................................................................................ 1-11
1.4 Multicast Packet Forwarding Mechanism........................................................................1-13
Chapter 2 IGMP Snooping Configuration ................................................................................... 2-1
2.1 IGMP Snooping Overview ................................................................................................. 2-1
2.1.1 Principle of IGMP Snooping....................................................................................2-1
2.1.2 Basic Concepts in IGMP Snooping.........................................................................2-2
2.1.3 Work Mechanism of IGMP Snooping......................................................................2-4
2.1.4 Processing of Multicast Protocol Messages ...........................................................2-6
2.1.5 Protocols and Standards.........................................................................................2-6
2.2 IGMP Snooping Configuration Task List ........................................................................... 2-7
2.3 Configuring Basic Functions of IGMP Snooping ............................................................... 2-8
2.3.1 Configuration Prerequisites.....................................................................................2-8
2.3.2 Enabling IGMP Snooping........................................................................................2-8
2.3.3 Configuring the Version of IGMP Snooping............................................................ 2-9
2.4 Configuring IGMP Snooping Port Functions...................................................................... 2-9
2.4.1 Configuration Prerequisites.....................................................................................2-9
2.4.2 Configuring Aging Timers for Dynamic Ports........................................................2-10
2.4.3 Configuring Static Ports ........................................................................................ 2-11
2.4.4 Configuring Simulated Joining .............................................................................. 2-12
2.4.5 Configuring Fast Leave Processing......................................................................2-13
2.5 Configuring IGMP Snooping Querier...............................................................................2-14
2.5.1 Configuration Prerequisites...................................................................................2-14
2.5.2 Enabling IGMP Snooping Querier......................................................................... 2-14
2.5.3 Configuring IGMP Queries and Responses..........................................................2-15
2.5.4 Configuring Source IP Address of IGMP Queries.................................................2-16
2.6 Configuring an IGMP Snooping Policy............................................................................2-17
2.6.1 Configuration Prerequisites...................................................................................2-17
2.6.2 Configuring a Multicast Group Filter......................................................................2-17
2.6.3 Configuring Multicast Source Port Filtering........................................................... 2-18
i
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Table of Contents
2.6.4 Configuring the Function of Dropping Unknown Multicast Data...........................2-19
2.6.5 Configuring IGMP Report Suppression................................................................. 2-20
2.6.6 Configuring Maximum Multicast Groups that Can Be Joined on a Port................ 2-20
2.6.7 Configuring Multicast Group Replacement ........................................................... 2-21
2.7 Displaying and Maintaining IGMP Snooping...................................................................2-23
2.8 IGMP Snooping Configuration Examples........................................................................ 2-23
2.8.1 Configuring Simulated Joining .............................................................................. 2-23
2.8.2 Static Router Port Configuration ........................................................................... 2-26
2.8.3 IGMP Snooping Querier Configuration.................................................................2-29
2.9 Troubleshooting IGMP Snooping Configuration..............................................................2-31
2.9.1 Switch Fails in Layer 2 Multicast Forwarding........................................................2-31
2.9.2 Configured Multicast Group Policy Fails to Take Effect........................................2-32
Chapter 3 MLD Snooping Configuration..................................................................................... 3-1
3.1 MLD Snooping Overview................................................................................................... 3-1
3.1.1 Introduction to MLD Snooping.................................................................................3-1
3.1.2 Basic Concepts in MLD Snooping...........................................................................3-2
3.1.3 How MLD Snooping Works..................................................................................... 3-4
3.1.4 Protocols and Standards.........................................................................................3-6
3.2 MLD Snooping Configuration Task List............................................................................. 3-6
3.3 Configuring Basic Functions of MLD Snooping.................................................................3-7
3.3.1 Configuration Prerequisites.....................................................................................3-7
3.3.2 Enabling MLD Snooping ......................................................................................... 3-7
3.3.3 Configuring the Version of MLD Snooping..............................................................3-8
3.4 Configuring MLD Snooping Port Functions.......................................................................3-8
3.4.1 Configuration Prerequisites.....................................................................................3-8
3.4.2 Configuring Aging Timers for Dynamic Ports..........................................................3-9
3.4.3 Configuring Static Ports ........................................................................................ 3-10
3.4.4 Configuring Simulated Joining .............................................................................. 3-10
3.4.5 Configuring Fast Leave Processing......................................................................3-11
3.5 Configuring MLD Snooping Querier.................................................................................3-12
3.5.1 Configuration Prerequisites...................................................................................3-12
3.5.2 Enabling MLD Snooping Querier .......................................................................... 3-13
3.5.3 Configuring MLD Queries and Responses ........................................................... 3-13
3.5.4 Configuring Source IPv6 Addresses of MLD Queries...........................................3-15
3.6 Configuring an MLD Snooping Policy..............................................................................3-15
3.6.1 Configuration Prerequisites...................................................................................3-15
3.6.2 Configuring an IPv6 Multicast Group Filter...........................................................3-16
3.6.3 Configuring IPv6 Multicast Source Port Filtering .................................................. 3-17
3.6.4 Configuring Dropping Unknown IPv6 Multicast Data............................................ 3-18
3.6.5 Configuring MLD Report Suppression ..................................................................3-18
3.6 . 6 C on f i g u r i n g M a x i m u m M ul t i c a s t Gr o u p s t h at t h a t C a n Be J o i n e d o n a P o r t.................3-19
3.6.7 Configuring IPv6 Multicast Group Replacement................................................... 3-20
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Table of Contents
3.7 Displaying and Maintaining MLD Snooping.....................................................................3-21
3.8 MLD Snooping Configuration Examples..........................................................................3-22
3.8.1 Simulated Joining..................................................................................................3-22
3.8.2 Static Router Port Configuration ........................................................................... 3-24
3.8.3 MLD Snooping Querier Configuration...................................................................3-27
3.9 Troubleshooting MLD Snooping...................................................................................... 3-29
3.9.1 Switch Fails in Layer 2 Multicast Forwarding........................................................3-29
3.9.2 Configured IPv6 Multicast Group Policy Fails to Take Effect ...............................3-30
Chapter 4 Multicast VLAN Configuration.................................................................................... 4-1
4.1 Introduction to Multicast VLAN .......................................................................................... 4-1
4.2 Configuring Multicast VLAN...............................................................................................4-1
4.3 Displaying and Maintaining Multicast VLAN...................................................................... 4-2
4.4 Multicast VLAN Configuration Example............................................................................. 4-2
Chapter 5 IPv6 Multicast VLAN Configuration...........................................................................5-1
5.1 Introduction to IPv6 Multicast VLAN..................................................................................5-1
5.2 Configuring IPv6 Multicast VLAN.......................................................................................5-1
5.3 Displaying and Maintaining IPv6 Multicast VLAN.............................................................. 5-2
5.4 IPv6 Multicast VLAN Configuration Examples................................................................... 5-3
Chapter 6 IGMP Configuration..................................................................................................... 6-1
6.1 IGMP Overview.................................................................................................................. 6-1
6.1.1 IGMP Versions........................................................................................................6-1
6.1.2 Work Mechanism of IGMPv1 .................................................................................. 6-1
6.1.3 Enhancements Provided by IGMPv2...................................................................... 6-3
6.1.4 Enhancements in IGMPv3 ...................................................................................... 6-4
6.1.5 Protocols and Standards.........................................................................................6-6
6.2 IGMP Configuration Task List............................................................................................6-6
6.3 Configuring Basic Functions of IGMP................................................................................ 6-7
6.3.1 Configuration Prerequisites.....................................................................................6-7
6.3.2 Enabling IGMP........................................................................................................6-7
6.3.3 Configuring IGMP Versions..................................................................................... 6-8
6.3.4 Configuring a Static Member of a Multicast Group.................................................6-8
6.3.5 Configuring a Multicast Group Filter........................................................................6-9
6.4 Adjusting IGMP Performance............................................................................................6-9
6.4.1 Configuration Prerequisites.....................................................................................6-9
6.4.2 Configuring IGMP Message Options.....................................................................6-10
6.4.3 Configuring IGMP Query and Response Parameters........................................... 6-11
6.4.4 Configuring IGMP Fast Leave Processing............................................................6-13
6.5 Displaying and Maintaining IGMP....................................................................................6-14
6.6 IGMP Configuration Example..........................................................................................6-15
6.7 Troubleshooting IGMP.....................................................................................................6-17
6.7.1 No Member Information on the Receiver-Side Router.......................................... 6-17
iii
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Table of Contents
6.7.2 Inconsistent Memberships on Routers on the Same Subnet................................6-18
Chapter 7 PIM Configuration........................................................................................................7-1
7.1 PIM Overview.....................................................................................................................7-1
7.1.1 Introduction to PIM-DM...........................................................................................7-2
7.1.2 How PIM-DM Works................................................................................................ 7-2
7.1.3 Introduction to PIM-SM ........................................................................................... 7-5
7.1.4 How PIM-SM Works................................................................................................7-6
7.1.5 Introduction to BSR Admin-scope Regions in PIM-SM.........................................7-11
7.1.6 SSM Model Implementation in PIM....................................................................... 7-13
7.1.7 Protocols and Standards.......................................................................................7-15
7.2 Configuring PIM-DM........................................................................................................7-16
7.2.1 PIM-DM Configuration Task List...........................................................................7-16
7.2.2 Configuration Prerequisites...................................................................................7-16
7.2.3 Enabling PIM-DM.................................................................................................. 7-16
7.2.4 Enabling State Refresh.........................................................................................7-17
7.2.5 Configuring State Refresh Parameters................................................................. 7-17
7.2.6 Configuring PIM-DM Graft Retry Period................................................................7-18
7.3 Configuring PIM-SM ........................................................................................................7-19
7.3.1 PIM-SM Configuration Task List ........................................................................... 7-19
7.3.2 Configuration Prerequisites...................................................................................7-19
7.3.3 Enabling PIM-SM ..................................................................................................7-20
7.3.4 Configuring a BSR ................................................................................................7-21
7.3.5 Configuring an RP.................................................................................................7-25
7.3.6 Configuring PIM-SM Register Messages..............................................................7-28
7.3.7 Disabling RPT-to-SPT Switchover........................................................................7-29
7.4 Configuring PIM-SSM...................................................................................................... 7-30
7.4.1 PIM-SSM Configuration Task List.........................................................................7-30
7.4.2 Configuration Prerequisites...................................................................................7-30
7.4.3 Enabling PIM-SM ..................................................................................................7-31
7.4.4 Configuring the SSM Group Range ......................................................................7-31
7.5 Configuring PIM Common Information ............................................................................7-32
7.5.1 PIM Common Information Configuration Task List...............................................7-32
7.5.2 Configuration Prerequisites...................................................................................7-33
7.5.3 Configuring a PIM Filter ........................................................................................ 7-33
7.5.4 Configuring PIM Hello Options..............................................................................7-34
7.5.5 Configuring PIM Common Timers......................................................................... 7-36
7.5.6 Configuring Join/Prune Message Limits ............................................................... 7-38
7.6 Displaying and Maintaining PIM ...................................................................................... 7-38
7.7 PIM Configuration Examples...........................................................................................7-39
7.7.1 PIM-DM Configuration Example............................................................................7-39
7.7.2 PIM-SM Configuration Example............................................................................ 7-43
7.7.3 PIM-SSM Configuration Example ......................................................................... 7-48
iv
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Table of Contents
7.8 Troubleshooting PIM Configuration.................................................................................7-51
7.8.1 Failure of Building a Multicast Distribution Tree Correctly....................................7-51
7.8.2 Multicast Data Abnormally Terminated on an Intermediate Router...................... 7-53
7.8.3 RPs Unable to Join SPT in PIM-SM......................................................................7-53
7.8.4 No Unicast Route Between BSR and C-RPs in PIM-SM......................................7-54
Chapter 8 MSDP Configuration....................................................................................................8-1
8.1 MSDP Overview.................................................................................................................8-1
8.1.1 Introduction to MSDP.............................................................................................. 8-1
8.1.2 How MSDP Works...................................................................................................8-2
8.1.3 Protocols and Standards.........................................................................................8-8
8.2 MSDP Configuration Task List...........................................................................................8-9
8.3 Configuring Basic Functions of MSDP ..............................................................................8-9
8.3.1 Configuration Prerequisites.....................................................................................8-9
8.3.2 Enabling MSDP.......................................................................................................8-9
8.3.3 Creating an MSDP Peer Connection....................................................................8-10
8.3.4 Configuring a Static RPF Peer..............................................................................8-10
8.4 Configuring an MSDP Peer Connection.......................................................................... 8-11
8.4.1 Configuration Prerequisites...................................................................................8-11
8.4.2 Configuring MSDP Peer Description..................................................................... 8-11
8.4.3 Configuring an MSDP Mesh Group.......................................................................8-12
8.4.4 Configuring MSDP Peer Connection Control........................................................8-12
8.5 Configuring SA Messages Related Parameters.............................................................. 8-13
8.5.1 Configuration Prerequisites...................................................................................8-13
8.5.2 Configuring SA Message Content......................................................................... 8-13
8.5.3 Configuring SA Request Messages......................................................................8-14
8.5.4 Configuring an SA Message Filtering Rule........................................................... 8-15
8.5.5 Configuring SA Message Cache...........................................................................8-16
8.6 Displaying and Maintaining MSDP ..................................................................................8-16
8.7 MSDP Configuration Examples.......................................................................................8-17
8.7.1 Inter-AS Multicast Configuration Leveraging BGP Routes...................................8-17
8.7.2 Inter-AS Multicast Configuration Leveraging Static RPF Peers............................8-23
8.7.3 Anycast RP Configuration..................................................................................... 8-27
8.8 Troubleshooting MSDP.................................................................................................... 8-32
8.8.1 MSDP Peers Stay in Down State.......................................................................... 8-32
8.8.2 No SA Entries in the Router’s SA Cache.............................................................. 8-32
8.8.3 Inter-RP Communication Faults in Anycast RP Application .................................8-33
Chapter 9 Multicast Routing and Forwarding Configuration.................................................... 9-1
9.1 Multicast Routing and Forwarding Overview..................................................................... 9-1
9.1.1 Introduction to Multicast Routing and Forwarding................................................... 9-1
9.1.2 RPF Mechanism...................................................................................................... 9-2
9.1.3 Multicast Static Routes............................................................................................ 9-4
9.1.4 Multicast Traceroute................................................................................................ 9-5
v
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Table of Contents
9.2 Configuration Task List...................................................................................................... 9-6
9.3 Configuring Multicast Routing and Forwarding.................................................................. 9-6
9.3.1 Configuration Prerequisites.....................................................................................9-6
9.3.2 Enabling IP Multicast Routing.................................................................................9-7
9.3.3 Configuring Multicast Static Routes........................................................................9-7
9.3.4 Configuring a Multicast Route Match Rule.............................................................. 9-8
9.3.5 Configuring Multicast Load Splitting........................................................................ 9-8
9.3.6 Configuring a Multicast Forwarding Range.............................................................9-9
9.3.7 Configuring the Multicast Forwarding Table Size ................................................... 9-9
9.3.8 Tracing a Multicast Path........................................................................................ 9-10
9.4 Displaying and Maintaining Multicast Routing and Forwarding.......................................9-11
9.5 Configuration Examples................................................................................................... 9-12
9.5.1 Changing an RPF Route....................................................................................... 9-12
9.5.2 Creating an RPF Route.........................................................................................9-14
9.6 Troubleshooting Multicast Routing and Forwarding........................................................9-17
9.6.1 Multicast Static Route Failure ............................................................................... 9-17
9.6.2 Multicast Data Fails to Reach Receivers .............................................................. 9-17
vi
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview

Chapter 1 Multicast Overview

Note:
This manual chiefly focuses on the IP multicast technology and device operations. Unless otherwise stated, the term “multicast” in this document refers to IP multicast.

1.1 Introduction to Multicast

As a technique coexisting with unicast and broadcast, the multicast technique effectively addresses the issue of point-to-multipoint data transmission. By allowing high-efficiency point-to-multipoint data transmission over a network, multicast greatly saves network bandwidth and reduces network load.
With the multicast technology, a network operator can easily provide new value-added services, such as live Webcasting, Web TV, dist ance learning, telemedi cine, Web ra dio, real-time videoconferencing, and other bandwidth- and time-critical information services.

1.1.1 Comparison of Information Transmission Techniques

I. Unicast
In unicast, the information source sends a separate copy of information to each host that needs the information, as shown in
Figure 1-1.
1-1
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
Figure 1-1 Unicast transmission
Assume that Hosts B, D and E need this information. The information source establishes a separate transmission channel for each of these hosts.
In unicast transmission, the traffic over the network is proportional to the number of hosts that need the information. If a large number of users need the information, the information source needs to send a copy of the same information to each of these users. This means a tremendous pressure on the information source and the network bandwidth.
As we can see from the information transmission process, unicast is not suitable for batch transmission of information.
II. Broadcast
In broadcast, the information source sends information to all h osts on the network, even if some hosts do not need the information, as shown in
Figure 1-2.
1-2
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
Figure 1-2 Broadcast transmission
Assume that only Hosts B, D, and E need the information. If the information source broadcasts the information, Hosts A and C also receive it. In addition to information security issues, this also causes traffic flooding on the same network.
Therefore, broadcast is disadvantageous in transmitting data to specific hosts; moreover, broadcast transmission is a significant usage of network resources.
III. Multicast
As discussed above, the unicast and broadcast techniques are unable to provide point-to-multipoint data transmissions with the minimum network consumption.
The multicast technique has solved this problem. When some hosts on the network need multicast information, the multicast source (Source in the figure) sends only one copy of the information. Multicast distribution threes are built for the multicast packets through multicast routing protocols, and the packets are replicated only on nodes where the trees branch, as shown in
Figure 1-3:
1-3
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
Figure 1-3 Multicast transmission
Assume that Hosts B, D and E need the information. To receive the information correctly, these hosts need to join a receiver set, which is known as a multicast group. The routers on the network duplicate and forward the information based on the distribution of the receivers in this set. Finally, the information is correctly delivered to Hosts B, D, and E.
To sum up, multicast has the following advantages:
z Over unicast: As multicast traffic flows to the node the farthest possible from the
source before it is replicated and distributed, an increase of the number of hosts will not remarkably add to the network load.
z Over broadcast: As multicast data is sent only to the receivers that need it,
multicast uses the network bandwidth reasonably and brings no waste of network resources, and enhances network security.

1.1.2 Roles in Multicast

The following roles are involved in multicast transmission:
z An information sender is referred to as a Multicast Source (“Source” in Figure 1-3). z Each receiver is a Multicast Group Member (“Receiver” in Figure 1-3). z All receivers interested in the same information form a Multicast Group. Multicast
groups are not subject to geographic restrictions.
z A router that supports Layer 3 multicast is called multicast router or Layer 3
multicast device. In addition to providing the multicast routing function, a multicast router can also manage multicast group members.
1-4
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
For a better understanding of the multicast concept, you can assimilate multicast transmission to the transmission of TV programs, as shown in
Table 1-1.
Table 1-1 An analogy between TV transmission and multicast transmission
Step TV transmission Multicast transmission
1
2
3
4
A TV station transmits a TV program through a channel.
A user tunes the TV set to the channel.
The user starts to watch the TV program transmitted by the TV station via the channel.
The user turns off the TV set or tunes to another channel.
A multicast source sends multicast data to a multicast group.
A receiver joins the multicast group.
The receiver starts to receive the multicast data that the source sends to the multicast group.
The receiver leaves the multicast group or joins another group.
Note:
z A multicast source does not necessarily belong to a multicast group. Namely, a
multicast source is not necessarily a multicast data receiver.
z A multicast source can send data to multiple multicast groups at the same time, and
multiple multicast sources can send data to the same multicast group at the same time.

1.1.3 Advantages and Applications of Multicast

I. Advantages of multicast
Advantages of the multicast technique include:
z Enhanced efficiency: reduces the CPU load of information source servers and
network devices.
z Optimal performance: reduces redundant traffic. z Distributive application: Enables point-to-multiple-point applications at the price of
the minimum network resources.
II. Applications of multicast
Applications of the multicast technique include:
z Multimedia and streaming applications, such as Web TV, Web radio, and real-time
video/audio conferencing.
z Communication for training and cooperative operations, su ch as distance learning
and telemedicine.
z Data warehouse and financial applications (stock quotes).
1-5
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
z Any other point-to-multiple-point data distribution application.

1.2 Multicast Models

Based on how the receivers treat the multicast sources, there are two multicast models:

I. ASM model

In the ASM model, any sender can send information to a multicast group as a multicast source, and numbers of receivers can join a multicast group identified by a group address and obtain multicast information addressed to that multicast group. In this model, receivers are not aware of the position of multicast sources in advance. However, they can join o r leave the multicast group at any time.

II. SSM model

In the practical life, users may be interested in the multicast data from only certain multicast sources. The SSM model provides a transmission service that allows users to specify the multicast sources they are interested in at the client side.
The radical difference between the SSM model and the ASM model is that in the SSM model, receivers already know the locations of the multicast sources by some other means. In addition, the SSM model uses a multicast address range that is differe nt from that of the ASM model, and dedicated multicast forwarding paths are established between receivers and the specified multicast sources.

1.3 Multicast Architecture

IP multicast addresses the following questions:
z Where should the multicast source transmit information to? (multicast addressing) z What receivers exist on the network? (host registration) z Where is the multicast source from which the receivers need to receive multicast
data? (multicast source discovery)
z How should information be transmitted to the receivers? (multicast routing)
IP multicast falls in the scope of end-to-end service. The multicast architectu re involves the following four parts:
1) Addressing mechanism: Information is sent from a multicast source to a group of receivers through a multicast address.
2) Host registration: Receiver hosts are allowed to join and leave multicast groups dynamically. This mechanism is the basis for group membership management.
3) Multicast routing: A multicast distribution tree (namely a forwarding path tree for multicast data on the network) is constructed for delivering multicast data from a multicast source to receivers.
4) Multicast applications: A software system that supports multicast applications, such as video conferencing, must be installed on multicast sources and receiver
1-6
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
hosts, and the TCP/IP stack must support reception and transmission of multicast data.

1.3.1 Multicast Addresses

To allow communication between multicast sources and multicast group members, network-layer multicast addresses, namely, multicast IP addresses must be provided. In addition, a technique must be available to map multicast IP addresses to link-layer multicast MAC addresses.
I. IPv4 multicast addresses
Internet Assigned Numbers Authority (IANA) assigned the Class D address space (224.0.0.0 to 239.255.255.255) for IPv4 multicast. The specific address blocks and usages are shown in
Table 1-2 Class D IP address blocks and description
Address block Description
Table 1-2.
224.0.0.0 to 224.0.0.255
224.0.1.0 to 238.255.255.255
239.0.0.0 to 239.255.255.255
Reserved permanent group addresses. The IP address 224.0.0.0 is reserved, and other IP addresses can be used by routing protocols and for topology searching, protocol maintenance, and so on. Commonly used permanent group addresses are listed in
Table 1-3. A packet destined for an
address in this block will not be forwarded beyond the local subnet regardless of the Time to Live (TTL) value in the IP header.
Globally scoped group addresses. This block includes two types of designated group addresses:
z 232.0.0.0/8: SSM group addresses, and z 233.0.0.0/8: Glop group addresses; for details,
see RFC 2770.
Administratively scoped multicast addresses. These addresses are considered to be locally rather than globally unique, and can be reused in domains administered by different organizations without causing conflicts. For details, refer to RFC
2365.
1-7
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
Note:
z The membership of a group is dynamic. Hosts can join or leave multicast groups at
any time.
z “Glop” is a mechanism for assigning multicast addresses between different
autonomous systems (ASs). By filling an AS number into the middle two bytes of
233.0.0.0, you get 255 multicast addresses for that AS.
Table 1-3 Some reserved multicast addresses
Address Description
224.0.0.1 All systems on this subnet, including hosts and routers
224.0.0.2 All multicast routers on this subnet
224.0.0.3 Unassigned
224.0.0.4 Distance Vector Multicast Routing Protocol (DVMRP) routers
224.0.0.5 Open Shortest Path First (OSPF) routers
224.0.0.6 OSPF designated routers/backup designated routers
224.0.0.7 Shared Tree (ST) routers
224.0.0.8 ST hosts
224.0.0.9 Routing Information Protocol version 2 (RIPv2) routers
224.0.0.11 Mobile agents
224.0.0.12 Dynamic Host Configuration Protocol (DHCP) server/relay agent
224.0.0.13 All Protocol Independent Multicast (PIM) routers
224.0.0.14 Resource Reservation Protocol (RSVP) encapsulation
224.0.0.15 All Core-Based Tree (CBT) routers
224.0.0.16 Designated Subnetwork Bandwidth Management (SBM)
224.0.0.17 All SBMs
224.0.0.18 Virtual Router Redundancy Protocol (VRRP)
II. IPv6 Multicast Addresses
As defined in RFC 4291, the format of an IPv6 multicast is as follows:
1-8
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
Figure 1-4 IPv6 multicast format
z 0xFF: 8 bits, indicating that this address is an IPv6 multicast address. z Flags: 4 bits, of which the high-order flag is reserved and set to 0; the definition
and usage of the second bit can be found in RFC 3956; and definition and usage of the third bit can be found in RFC 3306; the low-order bit is the Transient (T) flag. When set to 0, the T flag indicates a permanently-assigned multicast address assigned by IANA; when set to 1, the T flag indicates a transient, or dynamically assigned multicast address.
z Scope: 4 bits, indicating the scope of the IPv6 internetwork for which the multicast
traffic is intended. Possible values of this field are given in
z Reserved: 80 bits, all set to 0 currently. z Group ID: 112 bits, identifying the multicast group. For details about this field, refer
Table 1-4.
to RFC 3306.
Table 1-4 Values of the Scope field
Value Meaning
0, 3, F Reserved 1 Node-local scope 2 Link-local scope 4 Admin-local scope 5 Site-local scope 6, 7, 9 through D Unassigned 8 Organization-local scope E Global scope
III. Ethernet multicast MAC addresses
When a unicast IP packet is transmitted over Ethernet, the destination MAC address is the MAC address of the receiver. When a multicast p acket is transmitted over Ethernet, however, the destination address is a multicast MAC address because the packet is directed to a group formed by a number of receivers, rather than to one specific receiver .
1-9
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
1) IPv4 multicast MAC addresses As defined by IANA, the high-order 24 bits of an IPv4 multicast MAC address are
0x01005e, bit 25 is 0x0, and the low-order 23 bits are the low-order 23 bits of a multicast IPv4 address. The IPv4-to-MAC mapping relation is shown in
Figure 1-5.
Figure 1-5 IPv4-to-MAC address mapping
The high-order four bits of a multicast IPv4 address are 1110, indicating that this address is a multicast address, and only 23 bits of the remaining 2 8 bits are mapped t o a MAC address, so five bits of the multicast IPv4 address are lost. As a result, 32 multicast IPv4 addresses map to the same MAC address. Therefore, in Layer 2 multicast forwarding, a device may receive some multicast data addressed for other IPv4 multicast groups, and such redundant data n eeds to be filtered by the upper layer.
2) IPv6 multicast MAC addresses The high-order 16 bits of an IPv6 multicast MAC address are 0x3333, and the low-order
32 bits are the low-order 32 bits of a multicast IPv6 address.
Figure 1-6 shows an
example of mapping an IPv6 multicast address, FF1E::F30E:0101, to a MAC address.
Figure 1-6 An example of IPv6-to-MAC address mapping
1-10
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview

1.3.2 Multicast Protocols

Note:
z Generally, we refer to IP multicast working at the network layer as Layer 3 multicast
and the corresponding multicast protocols as Layer 3 multicast protocols, which include IGMP/MLD, PIM/IPv6 PIM, and MSDP; we refer to IP multicast working at the data link layer as Layer 2 multicast and the corresponding multicast protocols as Layer 2 multicast protocols, which include IGMP Snooping/MLD Snooping, and multicast VLAN/IPv6 multicast VLAN.
z IGMP Snooping, IGMP, multicast VLAN, PIM and MSDP are for IPv4, MLD
Snooping, MLD, IPv6 multicast VLAN, and IPv6 PIM are for IPv6. This section provides only general descriptions about appli cations and function s of the Layer 2 and Layer 3 multicast protocols in a network. For details of these protocols, refer to the respective chapters.
I. Layer 3 multicast protocols
Layer 3 multicast protocols include multicast group management protocols and multicast routing protocols.
Figure 1-7 describes where these multicast protocols are in
a network.
Figure 1-7 Positions of Layer 3 multicast protocols
1) Multicast management protocols Typically, the internet group management protocol (IGMP) or multicast listener
discovery protocol (MLD) is used between host s and Layer 3 multicast devices di rectly
1-11
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
connected with the hosts. These protocols define the mechanism of establishing and maintaining group memberships between hosts and Layer 3 multicast devices.
2) Multicast routing protocols A multicast routing proto col runs on Layer 3 multicast devices to esta blish and maintain
multicast routes and forward multicast packets correctly and ef ficiently . Multicast routes constitute a loop-free data transmission path from a data source to multiple receivers, namely, a multicast distribution tree.
In the ASM model, multicast routes come in intra-domain routes and inter-domain routes.
z An intra-domain multicast routing protocol is used to discover multicast sources
and build multicast distribution trees within an AS so as to deliver multicast data to receivers. Among a variety of mature intra-domain multicast routing protocols, protocol independent multicast (PIM) is a popular one. Based on the forwarding mechanism, PIM comes in two modes – dense mode (often referred to as PIM-DM) and sparse mode (often referred to as PIM-SM).
z An inter-domain multicast routing protocol is used for delivery of multicast
information between two ASs. So far, mature solutions include multicast source discovery protocol (MSDP).
For the SSM model, multicast routes are not divided into inter-domain routes and intra-domain routes. Since receivers know the position of the multicast source, channels established through PIM-SM are suff icient for multicast information transport.
II. Layer 2 multicast protocols
Layer 2 multicast protocols include IGMP Snooping/MLD Snooping and multicast VLAN/IPv6 multicast VLAN.
Figure 1-8 shows where these protocols are in the
network.
Source
Receiver Receiver
Multicast VLAN
/IPv6 Multicast VLAN
IGMP Snooping /MLD Snooping
IPv4/IPv6 multicast packets
Figure 1-8 Position of Layer 2 multicast protocols
1-12
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 1 Multicast Overview
1) IGMP Snooping/MLD Snooping Running on Layer 2 devices, Internet Group Management Protocol Snooping (IGMP
Snooping) and Multicast Listener Discovery Snooping (MLD Snooping) are multicast constraining mechanisms that manage and control multicast groups by listening to and analyzing IGMP or MLD messages exchanged between the hosts and Layer 3 multicast devices, thus effectively controlling the flooding of multicast dat a i n a L ayer 2 network.
2) Multicast VLAN/IPv6 multicast VLAN In the traditional multicast-on-demand mode, when users in differen t VLANs on a Layer
2 device need multicast information, the upstream Layer 3 device needs to forward a separate copy of the multicast data to each VLAN of the Layer 2 device. With the multicast VLAN or IPv6 multicast VLAN feature enabled on the Layer 2 device, the Layer 3 multicast device needs to send only one copy of multicast to the multicast VLAN or IPv6 multicast VLAN on the Layer 2 device. This avoids waste of network bandwidth and extra burden on the Layer 3 device.

1.4 Multicast Packet Forwarding Mechanism

In a multicast model, a multicast source sends information to the host group identified by the multicast group address in the destination address field of IP multicast packets. Therefore, to deliver multicast packets to receivers located in different parts of the network, multicast routers on the forwarding path usually need to forward multicast packets received on one incoming interface to multiple outgoing interfaces. Compared with a unicast model, a multicast model is more complex in the following aspect s.
z To ensure multicast packet transmission in the network, unicast routing tables or
multicast routing tables specially provided for multicast must be used as guidance for multicast forwarding.
z To process the same multicast information from different peers received on
different interfaces of the same device, every multicast packet is subject to a reverse path forwarding (RPF) check on the incoming interface. The result of the RPF check determines whether the packet will be forwarded or discarded. The RPF check mechanism is the basis for most multicast routing protocols to implement multicast forwarding.
Note:
For details about the RPF mechanism, refer to RPF Mechanism.
1-13
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration

Chapter 2 IGMP Snooping Configuration

When configuring IGMP Snooping, go to the following sections for information you are interested in:
z IGMP Snooping Overview z IGMP Snooping Configuration Task List z Displaying and Maintaining IGMP Snooping z IGMP Snooping Configuration Examples z Troubleshooting IGMP Snooping Configuration

2.1 IGMP Snooping Overview

Internet Group Management Protocol Snooping (IGMP Snooping) is a multicast constraining mechanism that runs on Layer 2 devices to manage and control multicast groups.

2.1.1 Principle of IGMP Snooping

By analyzing received IGMP messages, a Layer 2 device running IGMP Snooping establishes mappings between ports and multicast IP addresses and forwards multicast data based on these mappings.
As shown in packets are broadcast to all devices at Layer 2. When IGMP Snooping is running on the switch, multicast packets for known multicast groups are multicast to the receivers, rather than broadcast to all hosts, at Layer 2.
Figure 2-1, when IGMP Snooping is not running on the switch, multicast
2-1
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
Multicast packet transmission
without IGMP Snooping
Multicast router
Source
Layer 2 switch
Host A
Receiver
Host B
Multicast packets
Host C
Receiver
Figure 2-1 Before and after IGMP Snooping is enabled on the Layer 2 device

2.1.2 Basic Concepts in IGMP Snooping

Multicast packet transmission
when IGMP Snooping runs
Source
Host A
Receiver
Host B
Multicast router
Layer 2 switch
Host C
Receiver
I. IGMP Snooping related ports
As shown in Figure 2-2, Router A connects to the multicast source, IGMP Snooping runs on Switch A and Switch B, Host A and Ho st C are receiver hosts (namely, multicast group members).
Router A Switch A
Eth1/0/1 Eth1/0/2
Eth1/0/3
Eth1/0/1
Source
Switch B
Router port Member port
Multicast packets
Receiver
Eth1/0/2
Host C
Host D
Receiver
Host A
Host B
Figure 2-2 IGMP Snooping related ports
Ports involved in IGMP Snooping, as shown in
2-2
Figure 2-2, are described as follows:
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
z Router port: A router port is a port on the Ethernet switch that leads switch towards
the Layer 3 multicast device (DR or IGMP querier). In the figure, Ethernet 1/0/1 of Switch A and Ethernet 1/0/1 of Switch B are router ports. The switch registers all its local router ports (including static and dynamic router ports) in its router port list .
z Member port: A member port is a port on the Ethernet switch that leads switch
towards multicast group members. In the figure, Ethernet 1/0/2 and Ethernet 1/0/3 of Switch A and Ethernet 1/0/2 of Switch B are member ports. The swit ch registers all the member ports (including static and dynamic member ports) on the local device in its IGMP Snooping forwarding table.
Note:
z Whenever mentioned in this document, a router port is a port on the switch that
leads the switch to a Layer 3 multicast device, rather than a port on a router.
z An IGMP-snooping-enabled switch deems that all its ports on which IGMP general
queries with the source address other than 0.0.0.0 or PIM hello messages are
received to be router ports.
II. Aging timers for dynamic ports in IGMP Snooping and related messages
and actions
Table 2-1 Aging timers for dynamic ports in IGMP Snooping and related messages and
actions
Timer Description
For each router
port, the switch Router port aging timer
sets a timer
initialized to the
aging time of the
route port.
Message before
expiry
IGMP general query of which the source address is not 0.0.0.0 or PIM hello
Action after
expiry
The switch removes this port from its router port list.
When a port joins
Member port aging timer
a multicast group,
the switch sets a
timer for the port,
which is initialized
to the member port
aging time.
IGMP membership report
The switch removes this port from the multicast group forwarding table.
2-3
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
Note:
The port aging mechanism of IGMP Snooping works only for dynamic ports; a static port will never age out.

2.1.3 Work Mechanism of IGMP Snooping

A switch running IGMP Snooping performs different actions when it receives different IGMP messages, as follows:
I. When receiving a general query
The IGMP querier periodically sends IGMP general queries to all hosts and routers (224.0.0.1) on the local subnet to find out whether active multicast group members exist on the subnet.
Upon receiving an IGMP general query, the switch forwards it through all ports in the VLAN except the receiving port and performs the following to the receiving port:
z If the receiving port is a router port existing in its router port list, the switch resets
the aging timer of this router port.
z If the receiving port is not a router port existing in its router port list, the switch adds
it into its router port list and sets an aging timer for this router port.
II. When receiving a membership report
A host sends an IGMP report to the multicast router in the following circumstances:
z Upon receiving an IGMP query, a multicast group member host responds with an
IGMP report.
z When intended to join a multicast group, a host sends an IGMP report to the
multicast router to announce that it is interested in the multicast information addressed to that group.
Upon receiving an IGMP report, the switch forwards it through all the router po rts in the VLAN, resolves the address of the reported multicast group, and performs the following:
z If no forwarding table entry exists for the reported group, the switch creates an
entry, adds the port as member port to the outgoing port list, and starts a member port aging timer for that port.
z If a forwarding table entry exists for the reported group, but the port is not included
in the outgoing port list for that group, the switch adds the port as a member port to the outgoing port list, and starts a member port aging timer for that port.
2-4
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
z If a forwarding table entry exists for the reported group and the port is included in
the outgoing port list, which means that this port is already a member port, the switch resets the member port aging timer for that port.
Note:
A switch does not forward an IGMP report through a non-router port. The reason is as follows: Due to the IGMP report suppression mechanism, if the switch forwards a report message through a member port, all the attached hosts listening to the reported multicast address will suppress their own reports upon hea ring thi s repo rt, and this will prevent the switch from knowing whether any hosts attached to that port are still active members of the reported multicast group. For the description of IGMP report suppression mechanism, refer to
of IGMPv1
.
Work Mechanism
III. When receiving a leave group message
When an IGMPv1 host leaves a multicast group, the host does not send an IGMP leave group message, so the switch cannot know immediately that the host has left the multicast group. However , as the ho st stop s sending IGMP report s as soo n as it leaves a multicast group, the switch deletes the forwarding entry for the member port corresponding to the host from the forwarding table when its aging timer expires.
When an IGMPv2 or IGMPv3 host leaves a multicast group, the host sends an IGMP leave group message to the multicast router.
When the switch hears a group-specific IGMP leave g roup message on a member port, it first checks whether a forwarding table entry for that group exists, and, if one exists, whether its outgoing port list contains that port.
z If the forwarding table entry does not exist or if its outgoing port list does not
contain the port, the switch discards the IGMP leave group message instead of forwarding it to any port.
z If the forwarding table entry exists and its outgoing port list contains the port, the
switch forwards the leave group message to all router ports in the VLAN. Because the switch does not know whether any other hosts attached to the port are still listening to that group address, the switch does not immediately removes the port from the outgoing port list of the forwarding table entry for that group; instead, it resets the member port aging timer for the port.
Upon receiving the IGMP leave group message from a host, the IGMP querier resolves from the message the address of the multicast group that the host just left and sends an IGMP group-specific query to that multicast group through the port that received the leave group message. Upon hearing the IGMP group-specific query, the switch
2-5
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
forwards it through all its router ports in the VLAN and all member ports for that multicast group, and performs the following:
z If any IGMP report in response to the group-specific query is heard on a member
port before its aging timer expires, this means that some host attached to the port is receiving or expecting to receive multicast data for that multicast group. The switch resets the aging timer of the member port.
z If no IGMP report in response to the group-specific query is heard on a member
port before its aging timer expires, this means that no hosts attached to the port are still listening to that group address: the switch removes the port from the outgoing port list of the forwarding table entry for that multicast group when the aging timer expires.

2.1.4 Processing of Multicast Protocol Messages

With Layer 3 multicast routing enabled, an IGMP Snooping switch processes multicast protocol messages differently under different conditions, specifically as follows:
1) If only IGMP is enabled, or both IGMP and PIM are enabled on the switch, the switch handles multicast protocol messages in the normal way.
2) In only PIM is enabled on the switch:
z The switch broadcasts IGMP messages as unknown messages in the VLAN. z Upon receiving a PIM hello message, the switch will maintain the corresponding
router port.
3) When IGMP is disabled on the switch, or when IGMP forwarding entries are cleared (by using the reset igmp group command):
z If PIM is disabled, the switch clears all its Layer 2 multicast entries and router
ports.
z If PIM is enabled, the switch clears only its Layer 2 multicast entries without
deleting its router ports.
4) When PIM is disabled on the switch:
z If IGMP is disabled, the switch clears all its router ports. z If IGMP is enabled, the switch maintains all its Layer 2 multicast entries and router
ports.

2.1.5 Protocols and Standards

IGMP Snooping is documented in:
z RFC 4541: Considerations for Internet Group Management Protocol (IGMP) and
Multicast Listener Discovery (MLD) Snooping Switches
2-6
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration

2.2 IGMP Snooping Configuration Task List

Complete these tasks to configure IGMP Snooping:
Task Remarks
Configuring Basic Functions of IGMP Snooping
Configuring IGMP Snooping Port Functions
Configuring IGMP Snooping Querier
Configuring an IGMP Snooping Policy
Enabling IGMP Snooping Required Configuring the Version of IGMP
Snooping Configuring Aging Timers for Dynamic
Ports Configuring Static Ports Optional Configuring Simulated Joining Optional Configuring Fast Leave Processing Optional Enabling IGMP Snooping Querier Optional Configuring IGMP Queries and
Responses Configuring Source IP Address of IGMP
Queries Configuring a Multicast Group Filter Optional Configuring Multicast Source Port
Filtering Configuring the Function of Dropping
Unknown Multicast Data Configuring IGMP Report Suppression Optional
Optional
Optional
Optional
Optional
Optional
Optional
Configuring Maximum Multicast Groups that Can Be Joined on a Port
Configuring Multicast Group Replacement
2-7
Optional
Optional
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
Note:
z Configurations made in IGMP Snooping view are effective for all VLANs, while
configurations made in VLAN view are effective only for ports belonging to the current VLAN. For a given VLAN, a configuration made in IGMP Snooping view is effective only if the same configuration is not made in VLAN view.
z Configurations made in IGMP Snooping view are effective for all ports;
configurations made in Ethernet port view are effective only for the current port; configurations made in manual port group view are effective only for all the ports in the current port group; configurations made in aggregation group view are effective only for the master port. For a given port, a configuration made in IGMP Snooping view is effective only if the same configuration is not made in Ethernet port view or port group view.

2.3 Configuring Basic Functions of IGMP Snooping

2.3.1 Configuration Prerequisites

Before configuring the basic functions of IGMP Snooping, complete the following task:
z Configure the corresponding VLANs.
Before configuring the basic functions of IGMP Snooping, prepare the following data:
z Version of IGMP Snooping.

2.3.2 Enabling IGMP Snooping

Follow these steps to enable IGMP Snooping:
To do... Use the command... Remarks
Enter system view Enable IGMP Snooping
globally and enter IGMP-Snooping view
Return to system view Enter VLAN view
Enable IGMP Snooping in the VLAN
system-view
vlan vlan-id
igmp-snooping
quit
igmp-snooping enable
— Required
Disabled by default —
— Required
Disabled by default
2-8
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
Note:
z IGMP Snooping must be enabled globally before it can be enabled in a VLAN. z After enabling IGMP Snooping in a VLAN, you cannot enable IGMP and/or PIM on
the corresponding VLAN interface, and vice versa.
z When you enable IGMP Snooping in a specified VLAN, this function takes effect for
Ethernet ports in this VLAN only.

2.3.3 Configuring the Version of IGMP Snooping

By configuring an IGMP Snooping version, you actually configure the version of IGMP messages that IGMP Snooping can process.
z IGMP Snooping version 2 can process IGMPv1 and IGMPv2 messages, but not
IGMPv3 messages, which will be flooded in the VLAN.
z IGMP Snooping version 3 can process IGMPv1, IGMPv2 and IGMPv3 messages.
Follow these steps to configure the version of IGMP Snooping:
To do... Use the command... Remarks
Enter system view Enter VLAN view
system-view
vlan vlan-id
Configure the version of IGMP Snooping
igmp-snooping version
version-number
— — Optional
Version 2 by default
Caution:
If you switch IGMP Snooping from version 3 to version 2, the system will clear all IGMP Snooping forwarding entries from dynamic joins, and will:
z Keep forwarding entries for version 3 static (*, G) joins; z Clear forwarding entries from version 3 static (S, G) joins, which will be restored
when IGMP Snooping is switched back to version 3.
For details about static joins, Refer to
Configuring Static Ports.

2.4 Configuring IGMP Snooping Port Functions

2.4.1 Configuration Prerequisites

Before configuring IGMP Snooping port functions, complete the following t asks:
2-9
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
z Enable IGMP Snooping in the VLAN or enable IGMP on the desired VLAN
interface
z Configure the corresponding port groups.
Before configuring IGMP Snooping port functions, prepare the following data:
z Aging time of router ports, z Aging timer of member ports, and z Multicast group and multicast source addresses

2.4.2 Configuring Aging Timers for Dynamic Ports

If the switch receives no IGMP general queries or PIM hello messages on a dynamic router port, the switch removes the port from the router port list when the aging timer of the port expires.
If the switch receives no IGMP reports for a multi cast group on a dynamic member port, the switch removes the port from the outgoing port list of the forwarding table entry for that multicast group when the aging timer of the port for that group expires.
If multicast group memberships change frequently, you can set a relatively small value for the member port aging timer , and vice versa.
I. Configuring aging timers for dynamic ports globally
Follow these steps to configure aging timers for dynamic ports globally:
To do... Use the command... Remarks
Enter system view
system-view
Enter IGMP Snooping view
Configure router port aging time
Configure member port aging time
igmp-snooping
router-aging-time
interval
host-aging-time interval
Optional 105 seconds by default
Optional 260 seconds by default
II. Configuring aging timers for dynamic ports in a VLAN
Follow these steps to configure aging timers for dynamic ports in a VLAN:
To do... Use the command... Remarks
Enter system view Enter VLAN view
system-view
vlan vlan-id
Configure router port aging time
igmp-snooping router-aging-time
interval
2-10
— —
Optional 105 seconds by default
Operation Manual – Multicast H3C S5500-EI Series Ethernet Switches Chapter 2 IGMP Snooping Configuration
To do... Use the command... Remarks
Configure member port aging time

2.4.3 Configuring Static Ports

If all the hosts attached to a port are interested in the multicast data addressed to a particular multicast group or the multicast data that a particular multica st source sends to a particular group, you can configure static (*, G) or (S, G) joining on that port, namely configure the port as a group-specific or source-and-group-specific static member port.
You can configure a port of a switch to be a st atic rout er p ort, thro ugh which the swit ch can forward all the multicast traffic it received.
Follow these steps to configure static ports:
To do... Use the command... Remarks
Enter system view
Enter the corresponding view
system-view
Enter Ethernet port view
Enter port group view
igmp-snooping host-aging-time interval
interface interface-type
interface-number
port-group { manual
port-group-name |
aggregation agg-id }
Optional 260 seconds by default
Use either command.
igmp-snooping
Configure the port(s) as static member port(s)
Configure the port(s) as static router port(s)
static-group group-address [ source-ip
source_address ] vlan vlan-id
igmp-snooping static-router-port vlan
vlan-id
Required Disabled by
default
Required Disabled by
default
Note:
z The static (S, G) joining function is available only if a valid multicast source address
is specified and IGMP Snooping version 3 is currently running on th e switch.
z A static member port does not respond to queries from the IGMP querier; when
static (*, G) or (S, G) joining is enabled or disabled on a port, the port does not send an unsolicited IGMP report or an IGMP leave group message.
z Static member ports and static router ports never age out. To remove such a port,
you need to use the corresponding command.
2-11
Loading...
+ 186 hidden pages