Инструкции По Установке для 3com S7906E
i
Table of Contents
1 IGMP Snooping Configuration ·················································································································1-1
IGMP Snooping Overview·······················································································································1-1
Principle of IGMP Snooping ············································································································1-1
Basic Concepts in IGMP Snooping ·································································································1-2
How IGMP Snooping Works············································································································1-4
IGMP Snooping Proxying ················································································································1-6
Protocols and Standards ·················································································································1-7
IGMP Snooping Configuration Task List·································································································1-8
Configuring Basic Functions of IGMP Snooping·····················································································1-9
Configuration Prerequisites ·············································································································1-9
Enabling IGMP Snooping ················································································································1-9
Configuring IGMP Snooping Port Functions ·························································································1-11
Configuration Prerequisites ···········································································································1-11
Configuring Static Ports·················································································································1-12
Configuring Simulated Joining·······································································································1-13
Configuring IGMP Snooping Querier ····································································································1-15
Configuration Prerequisites ···········································································································1-15
Configuring IGMP Snooping Proxying ··································································································1-17
Configuration Prerequisites ···········································································································1-17
Configuring an IGMP Snooping Policy··································································································1-18
Configuration Prerequisites ···········································································································1-18
Configuring a Multicast Group Filter······························································································1-18
Displaying and Maintaining IGMP Snooping·························································································1-24
IGMP Snooping Configuration Examples ·····························································································1-25
Static Port Configuration Example ································································································1-27