3com S7906E Instruccion De Instalación
i
Table of Contents
1 MLD Snooping Configuration···················································································································1-1
MLD Snooping Overview ························································································································1-1
Introduction to MLD Snooping·········································································································1-1
Basic Concepts in MLD Snooping···································································································1-2
How MLD Snooping Works ·············································································································1-4
MLD Snooping Proxying··················································································································1-6
Protocols and Standards ·················································································································1-7
MLD Snooping Configuration Task List ··································································································1-8
Configuring Basic Functions of MLD Snooping ······················································································1-9
Configuration Prerequisites ·············································································································1-9
Enabling MLD Snooping··················································································································1-9
Configuring MLD Snooping Port Functions ··························································································1-11
Configuration Prerequisites ···········································································································1-11
Configuring Static Ports·················································································································1-12
Configuring Simulated Joining·······································································································1-13
Configuring MLD Snooping Querier······································································································1-15
Configuration Prerequisites ···········································································································1-15
Enabling MLD Snooping Querier···································································································1-15
Configuring MLD Snooping Proxying····································································································1-17
Configuration Prerequisites ···········································································································1-17
Configuring an MLD Snooping Policy ···································································································1-18
Configuration Prerequisites ···········································································································1-18
Displaying and Maintaining MLD Snooping ··························································································1-24
MLD Snooping Configuration Examples ·······························································································1-25
Static Port Configuration Example ································································································1-27