3Com 4500 Switch User Manual


 
i
Table of Contents
1 Multicast Overview ····································································································································1-1
Multicast Overview··································································································································1-1
Information Transmission in the Unicast Mode ···············································································1-1
Information Transmission in the Broadcast Mode···········································································1-2
Information Transmission in the Multicast Mode·············································································1-3
Roles in Multicast ····························································································································1-3
Common Notations in Multicast·······································································································1-4
Advantages and Applications of Multicast·······················································································1-4
Multicast Models ·····································································································································1-5
Multicast Architecture······························································································································1-6
Multicast Address ····························································································································1-6
Multicast Protocols ··························································································································1-9
Multicast Packet Forwarding Mechanism ·····························································································1-10
Implementation of the RPF Mechanism ························································································1-11
RPF Check ····································································································································1-11
2 Common Multicast Configuration············································································································1-1
Common Multicast Configuration············································································································1-1
Configuring Suppression on the Multicast Source Port···································································1-1
Configuring a Multicast MAC Address Entry ···················································································1-2
Configuring Dropping Unknown Multicast Packets ·········································································1-3
Displaying and Maintaining Common Multicast Configuration································································1-3
3 IGMP Snooping Configuration ·················································································································1-1
IGMP Snooping Overview·······················································································································1-1
Principle of IGMP Snooping ············································································································1-1
Basic Concepts in IGMP Snooping ·································································································1-2
Work Mechanism of IGMP Snooping ······························································································1-3
Configuring IGMP Snooping ···················································································································1-5
Enabling IGMP Snooping················································································································1-5
Configuring the Version of IGMP Snooping ····················································································1-6
Configuring Timers ··························································································································1-7
Configuring Fast Leave Processing ································································································1-7
Configuring a Multicast Group Filter································································································1-8
Configuring the Maximum Number of Multicast Groups on a Port··················································1-9
Configuring IGMP Snooping Querier·····························································································1-10
Suppressing Flooding of Unknown Multicast Traffic in a VLAN····················································1-11
Configuring Static Member Port for a Multicast Group··································································1-12
Configuring a Static Router Port····································································································1-13
Configuring a Port as a Simulated Group Member ·······································································1-13
Configuring a VLAN Tag for Query Messages··············································································1-14
Configuring Multicast VLAN ··········································································································1-15
Displaying and Maintaining IGMP Snooping·························································································1-16
IGMP Snooping Configuration Examples ·····························································································1-17