- About This Document
- IP Multicast Basics
- IGMP Configuration
- Overview
- Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for IGMP
- Default Configuration
- Configuring Basic IGMP Functions
- Optimizing IGMP Performance
- Configuring IGMP SSM Mapping
- Configuring IGMP Limit
- Configuring IGMP Proxy
- Configuring Basic IGMP Proxy Functions
- (Optional) Configuring the IGMP Proxy Interface Protection Mode
- (Optional) Associating IGMP Proxy with NQA
- (Optional) Configuring an SSM Group Address Range
- (Optional) Configuring a Multicast Source Lifetime
- (Optional) Configuring Source Filtering
- (Optional) Setting a Switchback Delay for IGMP Proxy Interfaces
- Checking the Configuration
- Maintaining IGMP
- Configuration Examples
- Common Misconfigurations
- MLD Configuration
- IPv4 PIM Configuration
- Overview
- Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for IPv4 PIM
- Default Configuration
- Configuring IPv4 PIM-DM
- Configuring Basic PIM-DM Functions
- Adjusting Control Parameters for a Multicast Source
- Adjusting Control Parameters for Establishing Neighbor Relationships
- Adjusting Control Parameters for Prune Messages
- Adjusting Graft Control Parameters
- Adjusting State Refresh Control Parameters
- Adjusting Assert Control Parameters
- Configuring PIM Silent
- Configuring PIM IPSec
- Configuring IPv4 PIM-SM
- Configuring PIM-SM in the ASM Model
- Configuring PIM-SM in the SSM Model
- Adjusting Multicast Source Control Parameters
- Adjusting Control Parameters for Establishing Neighbor Relationships
- Adjusting Control Parameters for DR Election
- Adjusting Control Parameters for Join/Prune Messages
- Adjusting Assert Control Parameters
- Configuring PIM BFD
- Configuring PIM GR
- Configuring PIM Silent
- Configuring PIM IPSec
- Maintaining PIM (IPv4)
- Configuration Example
- Common Misconfigurations
- A PIM-DM Network Fails to Set Up an SPT
- RPT on a PIM-SM Network Fails to Be Established
- SPT on a PIM-SM Network Fails to Be Established
- Source DR Does Not Send Register Messages to the RP After Receiving Multicast Data Packets
- After the Source DR Sends a Register Message to the RP, the Registration Interface Still Exists in the Corresponding Multicast Forwarding Entry
- IPv6 PIM Configuration
- Configuration Task Summary
- Licensing Requirements and Limitations for IPv6 PIM
- Default Configuration
- Configuring IPv6 PIM-DM
- Configuring Basic IPv6 PIM-DM Functions
- Adjusting the Control Parameters for a Multicast Source
- Adjusting the Control Parameters for Establishing Neighbor Relationships
- Adjusting the Control Parameters for Prune Messages
- Adjusting Graft Control Parameters
- Adjusting State Refresh Control Parameters
- Adjusting Assert Control Parameters
- Configuring IPv6 PIM Silent
- Configuring IPv6 PIM-SM
- Configuring IPv6 PIM-SM in the ASM Model
- Configuring IPv6 PIM-SM in the SSM Model
- Adjusting the Control Parameters for a Multicast Source
- Adjusting the Control Parameters for Establishing Neighbor Relationships
- Adjusting the Control Parameters for DR Election
- Adjusting the Control Parameters for Join/Prune Messages
- Adjusting Assert Control Parameters
- Configuring IPv6 PIM GR
- Configuring IPv6 PIM Silent
- Maintaining IPv6 PIM-DM
- Maintaining IPv6 PIM-SM
- Configuration Example
- Common Misconfigurations
- MSDP Configuration
- Multicast VPN Configuration
- Layer 3 Multicast CAC Configuration
- Introduction to Layer 3 Multicast CAC
- Principles
- Configuration Task Summary
- Licensing Requirements and Limitations for Layer 3 Multicast CAC
- Configuring Layer 3 Multicast CAC for All Multicast Groups
- Configuring Layer 3 Multicast CAC for a Channel
- Maintaining Layer 3 Multicast CAC
- Configuration Examples
- Common Misconfigurations
- IPv4 Multicast Route Management Configuration
- Overview
- Principles
- Configuration Task Summary
- Licensing Requirements and Limitations for IPv4 Multicast Route Management
- Default Configuration
- Configuring RPF Check Policies
- Configuring a Multicast Boundary
- Disabling Software Forwarding for Multicast Packets
- Configuring Parameters for Controlling the MFIB
- Maintaining Multicast Routes
- Configuration Examples
- Common Misconfigurations
- IPv6 Multicast Route Management Configuration
- Overview
- Principles
- Configuration Task Summary
- Licensing Requirements and Limitations for IPv6 Multicast Route Management
- Default Configuration
- Configuring IPv6 Multicast Load Splitting
- Configuring an IPv6 Multicast Boundary
- Disabling Software Forwarding for IPv6 Multicast Packets
- Configuring the Parameters for Controlling the IPv6 Multicast Forwarding Table
- Maintaining IPv6 Multicast Routes
- Configuration Examples
- Common Misconfigurations
- IGMP Snooping Configuration
- Overview
- Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for IGMP Snooping
- Default Configuration
- Configuring VLAN-based IGMP Snooping
- Configuring VSI-based IGMP Snooping
- Maintaining VLAN-based IGMP Snooping
- Maintaining VSI-based IGMP Snooping
- Configuration Examples
- Example for Configuring VLAN-based IGMP Snooping
- Example for Configuring VLAN-based Layer 2 Multicast Through Static Ports
- Example for Configuring an VLAN-based IGMP Snooping Querier
- Example for Configuring VLAN-based IGMP Snooping Proxy
- Example for Configuring VLAN-based IGMP Snooping SSM Mapping
- Example for Configuring IGMP Snooping in a VSI
- Common Misconfigurations
- FAQ
- MLD Snooping Configuration
- Overview
- Principles
- Applications
- Configuration Task Summary
- Licensing Requirements and Limitations for MLD Snooping
- Default Configuration
- Configuring Basic MLD Snooping Functions
- Enabling MLD Snooping
- Setting the MLD Snooping Version
- (Optional) Configuring a Static Router Port
- (Optional) Configuring a Static Member Port
- (Optional) Configuring the MLD Snooping Querier
- (Optional) Suppressing Report and Done Messages
- (Optional) Configuring the Router-Alert Option
- Checking the Configuration
- Configuring MLD Snooping Proxy
- Configuring an MLD Snooping Policy
- Configuring Relationship Fast-Update
- Maintaining MLD Snooping
- Configuration Examples
- Example for Configuring MLD Snooping
- Example for Configuring a Static Interface to Implement Layer 2 Multicast
- Example for Configuring the MLD Snooping Querier
- Example for Configuring MLD Snooping Proxy
- Example for Configuring Fast Leave for Interfaces
- Example for Configuring MLD Snooping to Respond to Network Topology Changes
- Common Misconfigurations
- Static Multicast MAC Address Configuration
- Multicast VLAN Replication Configuration
- Layer 2 Multicast CAC Configuration
- Introduction to Layer 2 Multicast CAC
- Principles
- Configuration Task Summary
- Licensing Requirements and Limitations for Layer 2 Multicast CAC
- Configuring VLAN-based Layer 2 Multicast CAC
- Configuring VSI-based Layer 2 Multicast CAC
- Maintaining Layer 2 Multicast CAC
- Configuration Examples
- Common Misconfigurations
- Multicast Network Management
- Overview
- Configuration Task Summary
- Licensing Requirements and Limitations for Multicast Network Management
- Configuring Basic Multicast Network Management Functions
- Adjusting the Frequency of Multicast Protocol Trap Messages
- Adjusting the Frequency of IGMP or MLD Trap Messages
- Adjusting the Interval for Sending PIM Trap Messages
- Setting the Interval for Sending Trap Messages About IGMP Group Join Failures Due to Excessive IGMP Entries
- Setting the Interval for Sending Trap Messages About Group Join Failures Caused by IPv4 Multicast CAC Limit Exceeding
- Setting the Interval for Sending Trap Messages About Layer 2 Multicast Entry Generation Failures Caused by Layer 2 Multicast CAC Limit Exceeding
- Checking the Configuration
- Configuring the Upper and Lower Alarm Thresholds for Multicast Protocol Entries
- Configuring the Upper and Lower Alarm Thresholds for IGMP/MLD Entries
- Configuring the Upper and Lower Alarm Thresholds for Multicast Entry Usage on a User-Side IGMP/MLD Device
- Configuring the Upper and Lower Alarm Thresholds for Multicast Forwarding Entries
- Configuring the Upper and Lower Alarm Thresholds for PIM Entries
- Checking the Configuration
- Configuring Alarm Thresholds for Multicast Index Usage