HP FlexNetwork 5130 EI IP Multicast Configuration Guide

HPE FlexNetwork 5130 EI Switch Series
IP Multicast Configuration Guide
Part number:5998-5477s Software version: Release 3111P02 and later Document version: 6W101-20161010
© Copyright 2015, 2016 Hewlett Packard Enterprise Development LP The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements acco mpanying such products and services. Nothing herein should be construe d as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions co ntained herein.
Confidential computer software. V alid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and T e chnical Data for Commercial Items are licensed to the U.S. Government under vendor’s standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the United States and other countries.
Microsoft® and Windows® are trademarks of the Microsoft group of companies. Adobe® and Acrobat® are trademarks of Adobe Systems In corporated. Java and Oracle are registered trademarks of Oracle and/or its affiliates. UNIX® is a registered trademark of The Open Group.

Contents

Multicast overview ··························································································· 1
Introduction to multicast ····································································································································· 1
Information transmission techniques ·········································································································· 1 Multicast features ······································································································································· 3 Common notations in multicast ·················································································································· 4
Multicast benefits and applications ············································································································ 4 Multicast models ················································································································································ 4 IP multicast architecture ····································································································································· 5
Multicast addresses ··································································································································· 5
Multicast protocols ····································································································································· 8 Multicast packet forwarding mechanism ·········································································································· 11
Configuring IGMP snooping ·········································································· 12
Overview ·························································································································································· 12
Basic IGMP snooping concepts ··············································································································· 12
How IGMP snooping works ······················································································································ 14
Protocols and standards ·························································································································· 15 IGMP snooping configuration task list ·············································································································· 15 Configuring basic IGMP snooping features ····································································································· 16
Enabling IGMP snooping ························································································································· 16
Specifying an IGMP snooping version ····································································································· 17
Setting the maximum number of IGMP snooping forwarding entries ······················································· 17 Configuring IGMP snooping port features ········································································································ 18
Setting aging timers for dynamic ports ····································································································· 18
Configuring static ports ···························································································································· 19
Configuring a port as a simulated member host ······················································································ 19
Enabling fast-leave processing ················································································································ 20
Disabling a port from becoming a dynamic router port ············································································ 20 Configuring the IGMP snooping querier ··········································································································· 21
Configuration prerequisites ······················································································································ 21
Enabling the IGMP snooping querier ······································································································· 21
Configuring parameters for IGMP queries and responses ······································································· 22 Configuring parameters for IGMP messages ··································································································· 22
Configuration prerequisites ······················································································································ 23
Configuring source IP addresses for IGMP messages ············································································ 23
Setting the 802.1p priority for IGMP messages ······················································································· 24 Configuring IGMP snooping policies ················································································································ 24
Configuring a multicast group policy ········································································································ 24
Configuring multicast source port filtering ································································································ 25
Enabling dropping unknown multicast data ······························································································ 25
Enabling IGMP report suppression ·········································································································· 26
Setting the maximum number of multicast groups on a port ···································································· 26
Enabling the multicast group replacement feature ··················································································· 26 Displaying and maintaining IGMP snooping ···································································································· 27 IGMP snooping configuration examples ·········································································································· 28
Group policy and simulated joining configuration example (for VLANs) ·················································· 28
Static port configuration example ············································································································· 30
IGMP snooping querier configuration example ························································································ 33 Troubleshooting IGMP snooping ····················································································································· 36
Layer 2 multicast forwarding cannot function ··························································································· 36
Multicast group policy does not work ······································································································· 36
Configuring PIM snooping ············································································· 37
Overview ·························································································································································· 37 Configuring PIM snooping ································································································································ 38 Displaying and maintaining PIM snooping ······································································································· 38 PIM snooping configuration example ··············································································································· 39
i
Troubleshooting PIM snooping ························································································································ 42
PIM snooping does not work on a Layer 2 device ··················································································· 42
Configuring multicast VLANs ········································································ 43
Overview ·························································································································································· 43 Multicast VLAN configuration task list ·············································································································· 45 Configuring a sub-VLAN-based multicast VLAN ······························································································ 45
Configuration prerequisites ······················································································································ 45
Configuration guidelines ··························································································································· 45
Configuration procedure ··························································································································· 45 Configuring a port-based multicast VLAN ········································································································ 46
Configuration prerequisites ······················································································································ 46
Configuring user port attributes ················································································································ 46
Assigning user ports to a multicast VLAN ································································································ 46 Setting the maximum number of multicast VLAN forwarding entries ······························································· 47 Displaying and maintaining multicast VLANs ··································································································· 47 Multicast VLAN configuration examples ·········································································································· 48
Sub-VLAN-based multicast VLAN configuration example ······································································· 48
Port-based multicast VLAN configuration example ·················································································· 50
Configuring MLD snooping ··········································································· 54
Overview ·························································································································································· 54
Basic MLD snooping concepts ················································································································· 54
How MLD snooping works ······················································································································· 56
Protocols and standards ·························································································································· 57 MLD snooping configuration task list ··············································································································· 57 Configuring basic MLD snooping features ······································································································· 58
Enabling MLD snooping ··························································································································· 58
Specifying an MLD snooping version ······································································································· 58
Setting the maximum number of MLD snooping forwarding entries ························································ 59 Configuring MLD snooping port features ········································································································· 60
Setting aging timers for dynamic ports ····································································································· 60
Configuring static ports ···························································································································· 60
Configuring a port as a simulated member host ······················································································ 61
Enabling fast-leave processing ················································································································ 61
Disabling a port from becoming a dynamic router port ············································································ 62 Configuring the MLD snooping querier ············································································································ 63
Configuration prerequisites ······················································································································ 63
Enabling the MLD snooping querier ········································································································· 63
Configuring parameters for MLD queries and responses ········································································ 63 Configuring parameters for MLD messages ···································································································· 64
Configuration prerequisites ······················································································································ 64
Configuring source IPv6 addresses for MLD messages ·········································································· 65
Setting the 802.1p priority for MLD messages ························································································· 66 Configuring MLD snooping policies ················································································································· 66
Configuring an IPv6 multicast group policy ······························································································ 66
Configuring IPv6 multicast source port filtering ························································································ 67
Enabling dropping unknown IPv6 multicast data ····················································································· 67
Enabling MLD report suppression ············································································································ 68
Setting the maximum number of IPv6 multicast groups on a port ···························································· 68
Enabling IPv6 multicast group replacement ····························································································· 69 Displaying and maintaining MLD snooping ······································································································ 69 MLD snooping configuration examples ············································································································ 70
IPv6 group policy and simulated joining configuration example (for VLANs) ··········································· 70
Static port configuration example ············································································································· 72
MLD snooping querier configuration example ·························································································· 75 Troubleshooting MLD snooping ······················································································································· 78
Layer 2 multicast forwarding cannot function ··························································································· 78
IPv6 multicast group policy does not work ······························································································· 78
Configuring IPv6 PIM snooping ···································································· 79
Overview ·························································································································································· 79
ii
Configuring IPv6 PIM snooping ······················································································································· 80 Displaying and maintaining IPv6 PIM snooping ······························································································· 81 IPv6 PIM snooping configuration example ······································································································· 81 Troubleshooting IPv6 PIM snooping ················································································································ 84
IPv6 PIM snooping does not work on a Layer 2 device ··········································································· 84
Configuring IPv6 multicast VLANs ································································ 85
Overview ·························································································································································· 85 IPv6 multicast VLAN configuration task list ······································································································ 87 Configuring a sub-VLAN-based IPv6 multicast VLAN ····················································································· 87
Configuration prerequisites ······················································································································ 87
Configuration guidelines ··························································································································· 87
Configuration procedure ··························································································································· 87 Configuring a port-based IPv6 multicast VLAN ································································································ 88
Configuration prerequisites ······················································································································ 88
Configuring user port attributes ················································································································ 88
Assigning user ports to an IPv6 multicast VLAN ······················································································ 88 Setting the maximum number of IPv6 multicast VLAN forwarding entries ······················································· 89 Displaying and maintaining IPv6 multicast VLANs ·························································································· 89 IPv6 multicast VLAN configuration examples ·································································································· 90
Sub-VLAN-based IPv6 multicast VLAN configuration example ······························································· 90
Port-based IPv6 multicast VLAN configuration example ·········································································· 92
Document conventions and icons ································································· 96
Conventions ····················································································································································· 96 Network topology icons ···································································································································· 97
Support and other resources ········································································ 98
Accessing Hewlett Packard Enterprise Support ······························································································ 98 Accessing updates ··········································································································································· 98
Websites ·················································································································································· 99
Customer self repair ································································································································· 99
Remote support ········································································································································ 99
Documentation feedback ························································································································· 99
Index ··········································································································· 101
iii

Multicast overview

Introduction to multicast

As a technique that coexists with unicast and broadcast, the multicast technique effectively addresses the issue of point-to-multipoint data transmission. By enabling high-efficiency point-to-multipoint data transmission over a network, multicast greatly saves network band width and reduces network load.
By using multicast technology, a network operator can easily provide bandwidth-critical and time-critical information services. These services include live webcasting, Web TV, distance learning, telemedicine, Web radio, and real-time video conferencing.

Information transmission techniques

The information transmission techniques include unicast, broadcast, and multicast.
Unicast
In unicast transmission, the information source must send a separate copy of information to each host that needs the information.
Figure 1 Unicast transmission
Host A
Receiver
Host B
Source
Host C
Receiver
Host D
IP network
Packets for Host B Packets for Host D Packets for Host E
In Figure 1, Host B, Host D, and Host E need the information. A separate transmi ssion channel must be established from the information source to each of these hosts.
Receiver
Host E
In unicast transmission, the traffic transmitted over the network is proportion al to the number of hosts that need the information. If a large number of hosts need the information, the information source must send a separate copy of the same information to each of these hosts. Sending many copies can place a tremendous pressure on the information source and the network bandwidth.
Unicast is not suitable for batch transmission of information.
1
Broadcast
In broadcast transmission, the information source sends information to all hosts on the su bnet, even if some hosts do not need the information.
Figure 2 Broadcast transmission
Multicast
In Figure 2, only Host B, Host D, and Host E need the information. If the information is broadcast to the subnet, Host A and Host C also receive it. In addition to information security issue s, broadcasting to hosts that do not need the information also causes traffic flooding on the same subnet.
Broadcast is not as efficient as multicast for sending data to groups of hosts.
Multicast provides point-to-multipoint data transmissions with the minimum network consumption. When some hosts on the network need multicast information, the information sender, or multicast source, sends only one copy of the information. Multicast distribution trees are built through multicast routing protocols, and the packets are replicated only on nodes where the trees branch.
2
Figure 3 Multicast transmission
In Figure 3, the multicast source sends only one copy of the information to a multicast group. Host B, Host D, and Host E, which are information receivers, must join the multicast group. The routers on the network duplicate and forward the information based on the distribution of the group members. Finally, the information is correctly delivered to Host B, Host D, and Host E.
To summarize, multicast has the following advantages:
Advantages over unicast—Multicast data is replicated and distributed until it flows to the farthest-possible node from the source. The increase of multicast re ceivers will not remarka bly increase the load of the source or the usage of network resources.
Advantages over broadcast—Multicast data is sent only to the receivers that need it. This saves network bandwidth use and enhances network security. In addition, multicast data is not confined to the same subnet.

Multicast features

A multicast group is a multicast re ceiver set identified by an IP multicast address. Hosts must join a multicast group to become members of the multicast group before they receive the multicast data addressed to that multicast group. T ypically, a multicast source does not need to join a multicast group.
A multicast so urce is an information sen der. It can send data to multiple multicast groups at the same time. Multiple multicast sources can send data to the same multicast group at the same time.
The group memberships are dynamic. Hosts can join or leave multicast groups at any time. Multicast groups are not subject to geographic restrictions.
Multicast routers or Layer 3 multicast devices are routers or Layer 3 switches that support Layer 3 multicast. They provide multicast routing and manage multicast group memberships on stub subnets with attached group members. A multicast router itself can be a multicast group member.
For a better understanding of the multicast concept, you can compare multicast transmission to the transmission of TV programs.
3
Table 1 Comparing TV program transmission and multicast transmission
TV program transmission Multicast transmission
A TV station transmits a TV program through a channel.
A user tunes the TV set to the channel. A receiver joins the multicast group.
The user starts to watch the TV program transmitted by the TV station on the channel.
The user turns off the TV set or tunes to another channel.
A multicast source sends multicast data to a multicast group.
The receiver starts to receive the multicast data sent by the source to the multicast group.
The receiver leaves the multicast group or joins another group.

Common notations in multicast

The following notations are commonly used in multicast transmission:
(*, G)—Rendezvous point tree (RPT), or a multicast packet that any multicast source sends to multicast group G. The asterisk (*) represents any multicast source, and "G" represents a specific multicast group.
(S, G)—Shortest path tree (SPT), or a multicast packet that multicast source "S" sends to multicast group "G." "S" represents a specific multicast source, and "G" represents a specific multicast group.

Multicast benefits and applications

Multicast benefits
Enhanced efficiency—Reduces the processor load of information source servers and network devices.
Optimal performance—Reduces redundant traffic.
Distributed application—Enables point-to-multipoint applications at the price of minimum
network resources.
Multicast applications
Multimedia and streaming applications, such as web TV, web radio, and real-time video/audio conferencing
Communication for training and cooperative operation s, su ch as distance learning and telemedicine
Data warehouse and financial applications (stock quotes)
Any other point-to-multipoint application for data distribution

Multicast models

Based on how the receivers treat the multicast sources, the multicast models include any-source multicast (ASM), source-filtered multicast (SFM), and source-specific multicast (SSM).

ASM model

In the ASM model, any multicast sources can send information to a multicast group. Receivers can join a multicast group and get multicast information addressed to that multicast group from any
4
multicast sources. In this model, receivers do not know the positions of the multicast sources in advance.

SFM model

The SFM model is derived from the ASM model. To a multicast source, the two models appear to have the same multicast membership architecture.
The SFM model functionally extends the ASM model. The upper-layer software checks the source address of received multicast packets and permits or denies multicast traffic from specific sources. Therefore, receivers can receive the multicast data from only part of the multicast sources. To a receiver, multicast sources are not all valid, but are filtered.

SSM model

The SSM model provides a transmission service that enables multicast receivers to specify the multicast sources in which they are interested.
In the SSM model, receivers have already determined the locations of the multicast sources. This is the main difference between the SSM model and the ASM model. In addition, the SSM model uses a different multicast address range than the ASM/SFM model. Dedicated multicast forwarding paths are established between receivers and the specified multicast sources.

IP multicast architecture

IP multicast addresses the following issues:
Where should the multicast source transmit information to? (Multicast addressin g.)
What receivers exist on the network? (Host registration.)
Where is the multicast source that will provide data to the receivers? (Multicast source
discovery.)
How is the information transmitted to the receivers? (Multicast routing.)
IP multicast is an end-to-end service. The multicast architecture involves the following parts:
Addressing mechanism—A multicast source se nds information to a group of receivers through a multicast address.
Host registration—Multicast receivers can join and leave multicast groups dynamically. This mechanism is the basis for management of group memberships.
Multicast routing—A multicast distribution tree (a forwarding path tree for multicast data on the network) is constructed for delivering multicast data from a multicast source to receivers.
Multicast applications—A software system that supports multicast applications, such as video conferencing, must be installed on multicast sources and multicast receivers. The TCP/IP stack must support reception and transmission of multicast data.

Multicast addresses

IP multicast addresses
IPv4 multicast addresses: IANA assigns the Class D address block (224.0.0.0 to 239.255.255.255) to IPv4 multicast.
Table 2 Class D IP address blocks and description
Address block Description
224.0.0.0 to 224.0.0.255
Reserved permanent group addresses. The IP address
224.0.0.0 is reserved. Other IP addresses can be used by routing protocols and for topology searching, protocol maintenance, and so on. Table 3 lists comm
on permanent
5
Address block Description
A
group addresses. A packet destined for an address in this block will not be forwarded beyond the local subnet regardless
224.0.1.0 to 238.255.255.255
239.0.0.0 to 239.255.255.255
NOTE:
of the TTL value in the IP header. Globally scoped group addresses. This block includes the
following types of designated group addresses:
232.0.0.0/8—SSM group addresses.
233.0.0.0/8—Glop group addresses.
Administratively scoped multicast addresses. These addresses are considered locally unique rather than globall y unique. You can reuse them in domains administered by different organizations without causing conflicts. For more information, see RFC 2365.
"Glop" is a mechanism for assigning multicast addresses between different ASs. By filling an
S number into the middle two bytes of 233.0.0.0, you get 255 multicast addresses for that AS.
For more information, see RFC 2770.
Table 3 Common permanent multicast group addresses
Address Description
224.0.0.1 All systems on this subnet, including hosts and routers.
224.0.0.2 All multicast routers on this subnet.
224.0.0.3 Unassigned.
224.0.0.4 DVMRP routers.
224.0.0.5 OSPF routers.
224.0.0.6 OSPF designated routers and backup designated routers.
224.0.0.7 Shared Tree (ST) routers.
224.0.0.8 ST hosts.
224.0.0.9 RIPv2 routers.
224.0.0.11 Mobile agents.
224.0.0.12 DHCP server/relay agent.
224.0.0.13 All Protocol Independent Multicast (PIM) routers.
224.0.0.14 RSVP encapsulation.
224.0.0.15 All Core-Based Tree (CBT) routers.
224.0.0.16 Designated SBM.
224.0.0.17 All SBMs.
224.0.0.18 VRRP.
IPv6 multicast addresses:
6
Figure 4 IPv6 multicast format
The following describes the fields of an IPv6 multicast address:
{ 0xFF—The most significant eight bits are 11111111. { Flags—The Flags field contains four bits.
Figure 5 Flags field format
Table 4 Flags field description
Bit Description
0 Reserved, set to 0.
When set to 0, this address is an IPv6 multicast address without an embedded RP address.
R
When set to 1, this address is an IPv6 multicast address with an embedded RP address. (The P and T bits must also be set to 1.)
When set to 0, this address is an IPv6 multicast address not based on a unicast prefix.
P
When set to 1, this address is an IPv6 multicast address based on a unicast prefix. (The T bit must also be set to 1.)
When set to 0, this address is an IPv6 multicast
T
address permanently-assigned by IANA.
When set to 1, this address is a transient or dynamically assigned IPv6 multicast address.
Scope—The Scope field contains four bits, which represent the scope of the IPv6
{
internetwork for which the multicast traffic is intended.
Table 5 Values of the Scope field
Value Meaning
0, F Reserved. 1 Interface-local scope. 2 Link-local scope. 3 Subnet-local scope. 4 Admin-local scope. 5 Site-local scope. 6, 7, 9 through D Unassigned. 8 Organization-local scope.
7
Value Meaning
E Global scope.
{ Group ID—The Group ID field contains 112 bits. It uniquely identifies an IPv6 multicast
group in the scope that the Scope field defines.
Ethernet multicast MAC addresses
IPv4 multicast MAC addresses: As defined by IANA, the most significant 24 bits of an IPv4 multicast MAC address are
0x01005E. Bit 25 is 0, and the other 23 bits are the least significant 23 bits of an IPv4 multicast address.
Figure 6 IPv4-to-MAC address mapping
The most significant four bits of an IPv4 multicast address are fixed at 1110. In an IPv4-to-MAC address mapping, five bits of the IPv4 multicast address are lost. As a result, 32 IPv4 multicast addresses are mapped to the same IPv4 multicast MAC address. Therefore, a device might receive unwanted multicast data at Layer 2 processing, which needs to be filtered by the upper layer.
IPv6 multicast MAC addresses: As defined by IANA, the most significant 16 bits of an IPv6 multicast MAC address are 0x3333.
The least significant 32 bits are mapped from the least significant 32 bits of an IPv6 multicast address. Therefore, the problem of duplicate IPv6-to-MAC address mapping also arises like IPv4-to-MAC address mapping.
Figure 7 An example of IPv6-to-MAC address mapping

Multicast protocols

Multicast protocols include the following categories:
Layer 3 and Layer 2 multicast protocols:
8
{ Layer 3 multicast refers to IP multicast working at the network layer.
Layer 3 multicast protocols—IGMP, MLD, PIM, IPv6 PIM, MSDP, MBGP, and IPv6 MBGP.
{ Layer 2 multicast refers to IP multicast working at the data link layer.
Layer 2 multicast protocols—IGMP snooping, MLD snooping, PIM snooping, IPv6 PIM snooping, multicast VLAN, and IPv6 multicast VLAN.
IPv4 and IPv6 multicast protocols:
{ For IPv4 networks—IGMP snooping, PIM snooping, multicast VLAN, IGMP, PIM, MSDP,
and MBGP.
{ For IPv6 networks—MLD snooping, IPv6 PIM snooping, IPv6 multicast VLAN, MLD, IPv6
PIM, and IPv6 MBGP.
This section provides only general descriptions about applications and functions of the Layer 2 and Layer 3 multicast protocols in a network. For more information about Layer 2 multi cast protocols, see the related chapters.
Layer 3 multicast protocols
In Figure 8, Layer 3 multicast protocols include multicast group management protocols an d multicast routing protocols.
Figure 8 Positions of Layer 3 multicast protocols
Multicast group management protocols: Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) protoc ol
are multicast group management protocols. Typically, they run between hosts and Layer 3 multicast devices that directly connect to the hosts to establish and maintain the multicast group memberships.
Multicast routing protocols: A multicast routing protocol runs on Layer 3 multicast devices to establish and maintain
multicast routes and correctly and efficiently forward multicast packets. Multicast routes constitute loop-free data transmission paths (also known as multicast distribution trees) from a data source to multiple receivers.
In the ASM model, multicast routes include intra-domain routes and inter-domain routes.
{ An intra-domain multicast routing protocol discovers multicast sources and builds multicast
distribution trees within an AS to deliver multicast data to receivers. Among a variety of mature intra-domain multicast routing protocols, PIM is most widely used. Based on the
9
forwarding mechanism, PIM has dense mode (often referred to as "PIM-DM") and sparse mode (often referred to as "PIM-SM").
{ An inter-domain multicast routing protocol is used for delivering multicast information
between two ASs. So far, mature solutions include Multicast Source Discovery Protocol (MSDP) and MBGP. MSDP propagates multicast source information among different ASs. MBGP is an extension of the MP-BGP for exchanging multicast routing information among different ASs.
For the SSM model, multicast routes are not divided into intra-domain routes and inter-domain routes. Because receivers know the position of the multicast source, channels established through PIM-SM are sufficient for the transport of multicast information.
Layer 2 multicast protocols
In Figure 9, Layer 2 multicast protocols include IGMP snooping, MLD snooping, PIM snooping, IPv6 PIM snooping, multicast VLAN, and IPv6 multicast VLAN.
Figure 9 Positions of Layer 2 multicast protocols
IGMP snooping and MLD snooping: IGMP snooping and MLD snooping run on Layer 2 devices as multi ca st constraining
mechanisms to improve multicast forwarding efficiency. They generate Layer 2 multicast forwarding tables by listening to IGMP or MLD messages exchanged between the hosts and Layer 3 multicast devices. This effectively controls the flooding of multicast data in Layer 2 networks.
PIM snooping and IPv6 PIM snooping: PIM snooping and IPv6 PIM snooping run on Layer 2 devices. They work with IGMP snooping
or MLD snooping to analyze received PIM messages. Then, they add the ports that are interested in specific multicast data to a PIM snooping routing entry or IPv6 PIM snooping routing entry. In this way, multicast data can be forwarded to only the ports that are interested in the data.
Multicast VLAN and IPv6 multicast VLAN: Multicast VLAN or IPv6 multicast VLAN runs on a Layer 2 device on a multicast network where
multicast receivers for the same group exist in different VLANs. With these protocols, the Layer 3 multicast device sends only one copy of multicast to the multicast VLAN or IPv6 multicast VLAN on the Layer 2 device. This method avoids waste of network bandwidth an d extra burden on the Layer 3 device.
10

Multicast packet forwarding mechanism

In a multicast model, multicast receivers of a multicast group are usually located at different areas on the network. They are identified by the same multicast group address. To deliver multicast packets to these receivers, a multicast source encapsulates the multicast data in an IP packet with the multicast group address as the destination address. Multicast routers on the forwarding paths forward multicast packets that an incoming interface receives through multiple outgoing interfaces. Compared to a unicast model, a multicast model is more complex in the following aspects:
To ensure multicast packet transmission in the network, different routing tables are used for multicast forwarding. These routing tables include unicast routing tables, routing tables for multicast (for example, the MBGP routing table), and static multicast routing tables.
To process the same multicast information from different peers received on dif fe rent interfaces, the multicast device performs an RPF check on each multicast packet. The RPF check result determines whether the packet will be forwarded or discarded. The RPF check mechanism is the basis for most multicast routing protocols to implement multicast forwarding.
11

Configuring IGMP snooping

Overview

IGMP snooping runs on a Layer 2 device as a multicast constraining mechanism to improve multicast forwarding efficiency. It creates Layer 2 multicast forw arding entries from IGMP packets that are exchanged between the hosts and the router.
As shown in Figure 10, packets to all hosts. When IGMP snooping is enable d, the Layer 2 device forwards multicast packets of known multicast groups to only the receivers.
Figure 10 Multicast packet transmission without and with IGMP snooping
when IGMP snooping is not enabled, the Layer 2 device floods multicast

Basic IGMP snooping concepts

IGMP snooping related ports
As shown in Figure 11, IGMP snooping runs on Switch A and Switch B, and Host A and Host C are receivers in a multicast group.
12
Figure 11 IGMP snooping related ports
Router A Switch A
GE1/0/1 GE1/0/2
GE1/0/3
GE1/0/1
Source
Switch B
Router port Member port
Multicast packets
Receiver
GE1/0/2
Host C
Host D
Receiver
Host A
Host B
The following describes the ports involved in IGMP snooping:
Router port—Layer 3 multicast device-side port. Layer 3 multicast devices include designated routers (DRs) and IGMP queriers. In Figure 11, Gigab
itEthernet 1/0/1 of Switch A and GigabitEthernet 1/0/1 of Switch B are the router ports. A Layer 2 dev ice records all its router ports in a router port list.
Do not confuse the "router port" in IGMP snooping with the "routed interface" commonly known as the "Layer 3 interface." The router port in IGMP snooping is a Layer 2 interface.
Member port—Multicast receiver-side port. In Figure 11, Giga
bitEthernet 1/0/2 and GigabitEthernet 1/0/3 of Switch A and GigabitEthernet 1/0/2 of Switch B are the member ports. A Layer 2 dev ice records all its member ports in the IGMP snooping forwarding table.
Unless otherwise specified, router ports and member ports in this document include both static and dynamic router ports and member ports.
NOTE:
When IGMP snooping is enabled, all ports that receive PIM hello messages or IGMP general queries with the source addresses other than 0.0.0.0 are considered dynamic router ports.
Aging timers for dynamic ports in IGMP snooping
The following are aging timers for dynamic ports in IGMP snooping:
Dynamic router port aging timer—The Layer 2 device starts this timer for a port that receives an IGMP general query with the source address other than 0.0.0.0 or a PIM hello message. If the port does not receive either of these messages before the timer expires, the Layer 2 devi ce removes the port from its router port list.
Dynamic member port aging timer—The Layer 2 device starts this timer for a port that receives an IGMP report. If the port does not receive a report before the timer expires, the Layer 2 device removes the port from the IGMP snooping forwarding entries.
NOTE:
In IGMP snooping, only dynamic ports age out. Static ports never age out.
13

How IGMP snooping works

The ports in this section are dynamic ports. For information about how to configure and remove static ports, see "Configuring static ports."
messages types include general query, IGMP report, and leave message. An IGMP
IGMP snooping-enabled Layer 2 device performs differently depen ding on the message.
General query
The IGMP querier periodically sends IGMP general queries to all hosts and routers on the local subnet to check for the existence of multicast group members.
After receiving an IGMP general query, the Layer 2 device forwards the query to all ports in the VLAN except the receiving port. The Layer 2 device also performs one of the following actions:
If the receiving port is a dynamic router port in the router port list, the Layer 2 device restarts the aging timer for the port.
If the receiving port does not exist in the router port list, the Layer 2 device adds the port to the router port list. It also starts an aging timer for the port.
IGMP report
A host sends an IGMP report to the IGMP querier for the following purpo ses:
Responds to queries if the host is a multicast group member.
Applies for a multicast group membership.
After receiving an IGMP report from a host, the Layer 2 device forwards the report through all the router ports in the VLAN. It also resolves the address of the reported multicast group, and looks up the forwarding table:
If no match is found, the Layer 2 device creates a forwarding entry with the receiving port as an outgoing interface to the forwarding entry . It also marks the receiving port as a dynamic member port and starts an aging timer for the port.
If a match is found but the receiving port is not in the forwarding entry, the Layer 2 device adds the port as an outgoing interface to the forwarding entry. It also marks the receiving port as a dynamic member port and starts an aging timer for the port.
If a match is found and the receiving port is in the forwarding entry, the Layer 2 device restarts the aging timer for the port.
In an application with a multicast group policy configured on an IGMP snooping-enabled Layer 2 device, when a user requests a multicast program, the user's host initiates an IGMP report. After receiving this report, the Layer 2 device resolves the multicast group address in the report and performs ACL filtering on the report. If the report passes ACL filtering, the Layer 2 device creates an IGMP snooping forwarding entry with the receiving port as an outgoing interface. If the report does not pass ACL filtering, the Layer 2 device drops this report, which means the receiver does not successfully join the multicast group and cannot retrieve the program.
A Layer 2 device does not forward an IGMP report through a non-router port because of the IGMP report suppression mechanism.
Leave message
An IGMPv1 host does not send any leave messages when it leaves a multicast group. The Layer 2 device cannot immediately update the status of the port that connects to the receiver host. In this case, it does not remove the port from the outgoing interface list in the associated forwarding entry until the aging timer for the multicast group on the port expires.
An IGMPv2 or IGMPv3 host sends an IGMP leave message when it leaves a multicast group. When the Layer 2 device receives an IGMP leave message on a dynamic mem ber port, the Layer 2
device first examines whether a forwarding entry matches the group address in the message.
If no match is found, the Layer 2 device discards the IGMP leave message.
14
If a match is found but the receiving port is not in the forwarding entry, the Layer 2 device discards the IGMP leave message.
If a match is found and the receiving port is in the forwarding entry, the Layer 2 device forwards the leave message to all router ports in the VLAN. The Layer 2 device does not immediately remove the port from the forwarding entry for that group. Instead, it adjusts the aging timer for the port.
After receiving the IGMP leave message, the IGMP querier resolves the multicast group address in the message. Then, it sends an IGMP group-specific query to the multicast group through the port that received the leave message.
After receiving the IGMP group-specific query, the Layer 2 device forwards the query through all its router ports in the VLAN and all member ports of the multicast group. Then, it waits for the responding IGMP reports from the directly connected receivers. For the dynamic member port that received the leave message, the Layer 2 device also performs one of the following actions:
If the port receives an IGMP report before the aging timer expires, the Layer 2 device restarts the aging timer for the port.
If the port does not receive an IGMP report when the aging timer expires, the Layer 2 device removes the port from the forwarding entry for the multicast group.

Protocols and standards

RFC 4541, Considerations for Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) Snooping Switches

IGMP snooping configuration task list

Tasks at a glance
Configuring basic IGMP snooping features:
(Required.) Enabling IGMP snooping
(Optional.) Specifying an IGMP snooping version
(Optional.) Setting the maximum number of IGMP snooping forwarding entries
Configuring IGMP snooping port features:
(Optional.) Setting aging timers fo
(Optional.) Configuring static ports
(Optiona
(Optional.) Enabling fast-leave processing
(Optiona
Configuring the IGMP snooping querier:
(Optional.) Enabling the IGMP snooping querier
(Optiona
Configuring parameters for IGMP messages:
(Optional.) Configuring source IP addresses for IGMP messages
(Optiona
l.) Configuring a port as a simulated member host
l.) Disabling a port from becoming a dynamic router port
l.) Configuring parameters for IGMP queries and responses
l.) Setting the 802.1p priority for IGMP messages
r dynamic ports
15
Tasks at a glance
Configuring IGMP snooping policies:
(Optional.) Configuring a multicast group policy
(Optional.) Configuring multicast source port filtering
(Optional.) Enabling dropping unknown multicast data
(Optional.) Enabling IGMP report suppression
(Optional.) Setting the maximum number of multicast groups on a port
(Optional.) Enabling the multicast group re
placement feature
The IGMP snooping configurations made on Layer 2 aggregate interfaces do not interfere with the configurations made on member ports. In addition, the configurations made on Layer 2 aggregate interfaces do not take part in aggregation calculations. The configuration made on a member port of the aggregate group takes effect after the port leaves the aggregate group.

Configuring basic IGMP snooping features

Before you configure basic IGMP snooping features, complete the following tasks:
Configure the associated VLANs.
Determine the IGMP snooping version.
Determine the IGMP last member query interval.
Determine the maximum response time for IGMP general queries.

Enabling IGMP snooping

When you enable IGMP snooping, follow these guidelines:
You must enable IGMP snooping globally before you enable it for a VLAN.
IGMP snooping for a VLAN works only on the member ports in that VLAN.
You can enable IGMP snooping for the specified VLANs in IGMP-snooping view or for a VLAN
in VLAN view. For a VLAN, the configuration in VLAN view has the same priority as the configuration in IGMP-snooping view, and the most recent configuration takes effect.
To enable IGMP snooping for a VLAN in IGMP-snooping view:
Step Command Remarks
1. Enter system view.
2. Enable IGMP snooping
globally and enter IGMP-snooping view.
3. Enable IGMP snooping for specified VLANs.
To enable IGMP snooping for a VLAN in VLAN view:
Step Command Remarks
1. Enter system view.
2. Enable IGMP snooping
globally and enter IGMP-snooping view.
3. Return to system view.
system-view
igmp-snooping
enable vlan
system-view
igmp-snooping
quit
vlan-list
N/A By default, IGMP snooping is globally
disabled. By default, IGMP snooping is d isabled
for a VLAN.
N/A By default, IGMP snooping is
globally disabled. N/A
16
Step Command Remarks
4. Enter VLAN view.
5. Enable IGMP snooping for
the VLAN.
vlan
igmp-snooping enable
vlan-id

Specifying an IGMP snooping version

Different IGMP snooping version s ca n process different versions of IGMP messages.
IGMPv2 snooping can process IGMPv1 and IGMPv2 messages, but it floods IGMPv3 messages in the VLAN instead of processing them.
IGMPv3 snooping can process IGMPv1, IGMPv2, and IGMPv3 messages.
If you change IGMPv3 snooping to IGMPv2 snooping, the switch performs the following operations:
Clears all IGMP snooping forwarding entries that are dynamically added.
Keeps static IGMPv3 snooping forwarding entries (*, G).
Clears static IGMPv3 snooping forwarding entries (S, G), which will be resto re d when IGMP
snooping is switched back to IGMPv3 snooping.
N/A By default, IGMP snooping is
disabled for a VLAN.
For more information about static IGMP snooping forwarding entries, se e "Conf iguring static ports." You can specify the version for the specified VLANs in IGMP-snooping view or for a VLAN in VLAN
view. For a VLAN, the configuration in VLAN view has the same priority as the configuration in IGMP-snooping view, and the most recent configuration takes effect.
To specify an IGMP snooping version for a VLAN in IGMP-snooping view:
Step Command Remarks
1. Enter system view.
2. Enable IGMP snooping
globally and enter IGMP-snooping view.
3. Specify an IGMP snooping version for the specified VLANs.
To specify an IGMP snooping version for a VLAN in VLAN view:
system-view
igmp-snooping
version
vlan-list
N/A
version-number
vlan
N/A
The default setting is 2.
Step Command Remarks
1. Enter system view.
2. Enter VLAN view.
3. Specify an IGMP snooping
version for the VLAN.
system-view vlan
vlan-id
igmp-snooping version
version-number
N/A N/A
The default setting in a VLAN is 2.

Setting the maximum number of IGMP snooping forwarding entries

You can modify the maximum number of IGMP snooping forwarding entries, including dynamic entries and static entries. When the number of forwarding entries on the switch reaches the upper limit, the switch does not automatically remove any existing entries. As a best practice, manually remove some entries to allow new entries to be created.
17
To set the maximum number of IGMP snooping forwarding entries:
Step Command Remarks
1. Enter system view.
2. Enter IGMP-snooping view.
3. Set the maximum number of
IGMP snooping forwarding entries.
system-view igmp-snooping
entry-limit
N/A
limit
N/A The default setting is
4294967295.

Configuring IGMP snooping port features

Before you configure IGMP snooping port features, complete the following tasks:
Enable IGMP snooping for the VLAN.
Determine the aging timer for dynamic router ports.
Determine the aging timer for dynamic member ports.
Determine the addresses of the multicast group and multicast source.

Setting aging timers for dynamic ports

When you set aging timers for dynamic ports, follow these guidelines:
If the memberships of multicast groups frequently change, you can set a relatively small value for the aging timer of the dynamic member ports. If the membership s of multica st groups rarely change, you can set a relatively large value.
If a dynamic router port receives a PIMv2 hello message, the aging timer value for the port is specified by the hello message. In this case, the router-aging-time or igmp-snooping router-aging-time command does not take effect on the port.
You can set the timers globally for all VLANs in IGMP-snooping view or for a VLAN in VLAN view. For a VLAN, the VLAN-specific configuration takes priority over the global configuration.
Setting the aging timers for dynamic ports globally
Step Command Remarks
4. Enter system view.
5. Enter IGMP-snooping view.
6. Set the aging timer for dynamic
router ports globally.
7. Set the global aging timer for dynamic member ports globally.
system-view igmp-snooping
router-aging-time
host-aging-time
Setting the aging timers for dynamic ports in a VLAN
N/A
N/A
interval
interval
The default setting is 260 seconds.
The default setting is 260 seconds.
Step Command Remarks
1. Enter system view.
2. Enter VLAN view.
3. Set the aging timer for
dynamic router ports in the VLAN.
4. Set the aging timer for
system-view vlan
vlan-id
igmp-snooping router-aging-time
igmp-snooping host-aging-time
N/A
interval
18
N/A The default setting is 260
seconds. The default setting is 260
Step Command Remarks
dynamic member ports in the VLAN.

Configuring static ports

You can configure the following types of static ports:
Static member port—When you configure a port as a static member port for a multicast group, all hosts attached to the port will receive multicast data for the group.
The static member port does not respond to IGMP queries. When you complete or cancel this configuration on a port, the port does not send an unsolicited IGMP report or leave message.
Static router port—When you configure a port as a static router port for a multicast group, all multicast data for the group received on the port will be forwarded.
Static member ports and static router ports never age out. To remove such a port, use the undo igmp-snooping static-group or undo igmp-snooping static-router-port command.
To configure static ports:
Step Command Remarks
1. Enter system view.
2. Enter Layer 2 Ethernet
interface view or Layer 2 aggregate interface view.
3. Configure the port as a static port.
interval
system-view
interface
interface-number
Configure the port as a static member port:
igmp-snooping static-group group-address [ source-ip source-address ] vlan vlan-id
Configure the port as a static router port:
igmp-snooping static-router-port vlan
vlan-id
N/A
interface-type
seconds.
N/A
By default, a port is not a static member port or a static router port.

Configuring a port as a simulated member host

When a port is configured as a simulated member host, it is equivalent to an independent host in the following ways:
It sends an unsolicited IGMP report when you complete the config uration.
It responds to IGMP general queries with IGMP reports.
It sends an IGMP leave message when you cancel the configuration.
The version of IGMP running on the simulated member host is the same as the version of IGMP snooping running on the port. The port ages out in the same way as a dynamic member port.
To configure a port as a simulated member host:
Step Command Remarks
1. Enter system view.
2. Enter Layer 2 Ethernet
system-view
interface
interface-type
19
N/A N/A
Step Command Remarks
interface view or Layer 2 aggregate interface view.
interface-number
3. Configure the port as a simulated member host.
igmp-snooping host-join
group-address [ source-address ]

Enabling fast-leave processing

This feature enables the switch to immediately remove a port from the forwarding entry for a multicast group when the port receives a leave massage.
Configuration restrictions and guidelines
When you enable fast-leave processing, follow these restrictio ns and guidelines:
Do not enable fast-leave processing on a port that has multiple receiver hosts in a VLAN. If fast-leave processing is enabled, the remaining receivers cannot receive multicast data for a group after a receiver leaves that group.
You can enable fast-leave processing globally for all ports in IGMP-snooping view or for a port in interface view. For a port, the port-specific configuration takes priority over the global configuration.
Enabling fast-leave processing globally
Step Command Remarks
1. Enter system view.
system-view
source-ip
vlan
vlan-id
N/A
By default, the port is not a simulated member host.
2. Enter IGMP-snooping view.
3. Enable fast-leave processing
globally.
igmp-snooping
fast-leave [ vlan
vlan-list ]
N/A By default, fast-leave processing
is disabled globally.
Enabling fast-leave processing on a port
Step Command Remarks
1. Enter system view.
2. Enter Layer 2 Ethernet
interface view or Layer 2 aggregate interface view.
3. Enable fast-leave processing on the port.
system-view
interface
interface-number
igmp-snooping fast-leave [ vlan
vlan-list ]
N/A
interface-type
N/A
By default, fast-leave processing is disabled on a port.

Disabling a port from becoming a dynamic router port

A receiver host might send IGMP general queries or PIM hello messages for testing purposes. On the Layer 2 device, the port that receives either of the messages becomes a dynamic router port. Before the aging timer for the port expires, the following problems might occur:
All multicast data for the VLAN to which the port belongs flows to the port. Then, the port forwards the data to attached receiver hosts. The receiver hosts will receive multicast data that it does not want to receive.
The port forwards the IGMP general queries or PIM hello messages to its upstream multicast routers. These messages might affect the multicast routing protocol state (such as the IGMP querier or DR election) on the multicast routers. This might further cause network interruption.
20
To solve these problems, you can disable a port from becoming a dynamic router port. This also improves network security and the control over receiver hosts.
To disable a port from becoming a dynamic router port:
Step Command Remarks
1. Enter system view.
2. Enter Layer 2 Ethernet
interface view or Layer 2 aggregate interface view.
system-view
interface
interface-number
interface-type
N/A
N/A
3. Disable the port from becoming a dynamic router port.
igmp-snooping router-port-deny [ vlan
vlan-list ]
By default, a port can become a dynamic router port.
This configuration does not affect the static router port configuration.

Configuring the IGMP snooping querier

This section describes how to configure an IGMP snoopin g querier.

Configuration prerequisites

Before you configure the IGMP snooping querier for the VLAN, complete the following tasks:
Enable IGMP snooping for the VLAN.
Determine the IGMP general query interval.
Determine the IGMP last member query interval.
Determine the maximum response time for IGMP general queries.

Enabling the IGMP snooping querier

This feature enables the switch to periodically send IGMP general queries to establish and maintain multicast forwarding entries at the data link Layer . You can configure an IGMP snooping querier on a network without Layer 3 multicast devices.
Configuration guidelines
When you enable the IGMP snooping querier, do not configure an IGMP snooping querier on a multicast network that runs IGMP. An IGMP snooping querier does not take part in IGMP querier elections. However, it might affect IGMP querier ele ctions if it sends IGMP general queries with a low source IP address.
Configuration procedure
To enable the IGMP snooping querier for a VLAN:
Step Command Remarks
1. Enter system view.
2. Enter VLAN view.
3. Enable the IGMP snooping querier.
system-view
vlan-id
21
vlan
igmp-snooping querier
N/A N/A By default, the IGMP snooping
querier is disabled.

Configuring parameters for IGMP queries and responses

CAUTION:
To avoid mistakenly deleting multicast group members, make sure the IGMP general query interva l is greater than the maximum response time for IGMP general queries.
You can modify the IGMP general query interval based on the actual condition of the network. A receiver host starts a timer for each multicast group that it has joined when it receives an IGMP
query (general query or group-specific query). This timer is initialized to a random value in the range of 0 to the maximum response time advertised in the IGMP query . When the timer value decreases to 0, the host sends an IGMP report to the multicast group.
To speed up the response of hosts to IGMP queries and to avoid simultaneous timer expirations which cause IGMP report traffic bursts, you must correctly set the maximum response time.
The maximum response time for IGMP general queries is set by the max-response-time command.
The maximum response time for IGMP group-specific queries equals the IGMP last member query interval, which is set by the last-member-query-interval interval command.
You can configure the parameters globally for all VLANs in IGMP-snooping view or for a VLAN in VLAN view. For a VLAN, the VLAN-speci fic configuration takes pri ority over the global configuration.
Configuring the global parameters for IGMP queries and responses
Step Command Remarks
1. Enter system view.
2. Enter IGMP-snooping view.
3. Set the maximum response
time for IGMP general queries.
4. Set the IGMP last member query interval.
system-view igmp-snooping
max-response-time
last-member-query-interval
interval
interval
Configuring the parameters for IGMP queries and responses in a VLAN
Step Command Remarks
1. Enter system view.
2. Enter VLAN view.
3. Set the IGMP general query
interval in the VLAN.
4. Set the maximum response time for IGMP general queries in the VLAN.
5. Set the IGMP last member query interval in the VLAN.
system-view vlan
vlan-id N/A
igmp-snooping query-interval
igmp-snooping max-response-time
interval
igmp-snooping last-member-query-interval
interval
interval
N/A N/A
The default setting is 10 seconds.
The default setting is 1 second.
N/A
The default setting is 125 seconds.
The default setting is 10 seconds.
The default setting is 1 second.

Configuring parameters for IGMP messages

This section describes how to configure parameters for IGMP messages.
22

Configuration prerequisites

Before you configure parameters for IGMP messages in a VLAN, complete the following tasks:
Enable IGMP snooping for the VLAN.
Determine the source IP address of IGMP general queries.
Determine the source IP address of IGMP group-specific queries.
Determine the source IP address of IGMP reports.
Determine the source IP address of IGMP leave messages.
Determine the 802.1p priority of IGMP messages.

Configuring source IP addresses for IGMP messages

A Layer 2 device does not enlist the port that receives an IGMP query whose source IP address is
0.0.0.0 on a port as a dynamic router port. This might prevent multicast forwarding entries from being correctly created at the data link layer and eventually cause multicast traffic forwarding failures.
To avoid this problem, when a Layer 2 device acts as the IGMP snooping querier, you can configure a non-all-zero IP address as the source IP addre ss of IGMP queries. You can also change the source IP address of IGMP messages sent by a simulated member host or an IGMP snooping proxy.
Changing the source address of IGMP queries might affect the IGMP querier election within the subnet.
To configure source IP addresses for IGMP messages in a VLAN:
Step Command Remarks
1. Enter system view.
2. Enter VLAN view.
3. Configure the source IP
address for IGMP general queries.
4. Configure the source IP address for IGMP group-specific queries.
system-view
vlan-id
vlan
igmp-snooping general-query source-ip
ip-address
igmp-snooping special-query source-ip
ip-address
N/A N/A The default setting is the IP address of the
current VLAN interface. If the current VLAN interface does not have an IP address, the source IP address is 0.0.0.0.
By default, the source IP address of IGMP group-specific queries is one of the following:
The source address of IGMP group-specific queries if the IGMP snooping querier has received IGMP general queries.
The IP address of the current VLAN interface if the IGMP snooping querier does not receive an IGMP general query.
0.0.0.0 if the IGMP snooping querier does not receive an IGMP general query and the current VLAN interface does not have an IP address.
5. Configure the source IP address for IGMP reports.
6. Configure the source IP address for IGMP leave
igmp-snooping report source-ip
igmp-snooping leave source-ip
ip-address
ip-address
23
The default setting is the IP address of the current VLAN interface. If the current VLAN interface does not have an IP address, the source IP address is 0.0.0.0.
The default setting is the IP address of the current VLAN interface. If the current
Step Command Remarks
messages. VLAN interface does not have an IP
address, the source IP address is 0.0.0.0.

Setting the 802.1p priority for IGMP messages

When congestion occurs on outgoing ports of the Layer 2 device, it forwards IGMP messages in their
802.1p priority order, from highest to lowest. You can assign a higher 802.1p priority to IGMP messages that are created or forwarded by the switch.
You can set the 802.1p priority globally for all VLANs in IGMP-snooping view or for a VLAN in VLAN view. For a VLAN, the VLAN-specific configuration takes priority over the global configuration.
Setting the 802.1p priority for IGMP messages globally
Step Command Remarks
1. Enter system view.
2. Enter IGMP-snooping view.
3. Set the 802.1p priority for
IGMP messages.
system-view igmp-snooping
dot1p-priority
N/A N/A
priority-number The default setting is 0.
Setting the 802.1p priority for IGMP messages in a VLAN
Step Command Remarks
1. Enter system view.
2. Enter VLAN view.
3. Set the 802.1p priority for
IGMP messages in the VLAN.
system-view vlan
vlan-id N/A
igmp-snooping dot1p-priority
priority-number
N/A
The default setting is 0.

Configuring IGMP snooping policies

Before you configure IGMP snooping policies, complete the following tasks:
Enable IGMP snooping for the VLAN.
Determine the ACLs to be used by multicast group policies.
Determine the maximum number of multicast groups that a port can join.

Configuring a multicast group policy

This feature enables the switch to filter IGMP reports by using an ACL that specifies the multicast groups and the optional sources. It is used to control the multicast groups that receiver hosts can join.
Configuration guidelines
When you configure a multicast group policy, follow these guidelines:
This configuration takes effect only on the multicast groups that a port joins dynamically.
You can configure a multicast group policy globally for all ports in IGMP-snooping view or for a
port in interface view. For a port, the port-specific configuration takes priority over the global configuration.
24
Configuring a multicast group policy globally
Step Command Remarks
1. Enter system view.
2. Enter IGMP-snooping view.
system-view igmp-snooping
N/A
N/A
3. Configure a multicast group policy globally.
group-policy
vlan-list ]
acl-number [
vlan
Configuring a multicast group policy on a port
Step Command Remarks
1. Enter system view.
2. Enter Layer 2 Ethernet
interface view or Layer 2 aggregate interface view.
3. Configure a multicast group policy on the port.
system-view
interface
interface-number
igmp-snooping group-policy
acl-number [
N/A
vlan-list ]
interface-type
vlan

Configuring multicast source port filtering

This feature enables the switch to discard all multicast data packets and to a ccept multicast protocol packets. You can enable this feature on ports that connect only to multicast receivers.
You can enable this feature for the specified ports in IGMP-snooping view or for a port in interface view. For a port, the configuration in interface view has the same priority as the configuration in IGMP-snooping view, and the most recent configuration takes effect.
By default, no multicast group policies exist. Hosts can join all multicast groups.
N/A
By default, no multicast group policies exist. Hosts can join all multicast groups.
Configuring multicast source port filtering globally
Step Command Remarks
1. Enter system view.
2. Enter IGMP-snooping view.
3. Enable multicast source port
filtering.
system-view igmp-snooping
source-deny port
interface-list
Configuring multicast source port filtering on a port
Step Command Remarks
1. Enter system view.
2. Enter Layer 2 Ethernet
interface view.
3. Enable multicast source port filtering.
system-view interface
interface-number
igmp-snooping source-deny
interface-type

Enabling dropping unknown multicast data

This feature enables the switch to drop all unknown multicast data. Unknown multicast data refers to multicast data for which no forwarding entries exist in the IGMP snooping forwarding table.
N/A N/A By default, multicast source port
filtering is disabled.
N/A
N/A
By default, the multicast source port filtering is disabled.
25
Loading...
+ 73 hidden pages