No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE40E V800R010C10SPC500 Configuration Guide - IP Multicast 01

This is NE40E V800R010C10SPC500 Configuration Guide - IP Multicast
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Verifying the IGMP Policy Control Configuration

Verifying the IGMP Policy Control Configuration

After configuring IGMP Policy Control, verify the IGMP configuration and IGMP operating status.

Prerequisites

IGMP Policy Control have been configured.

Procedure

  • Run the display igmp [ vpn-instance vpn-instance-name | all-instance ] interface [ interface-type interface-number | up | down ] [ verbose ] command to check the configurations and operating status of IGMP on an interface.
  • Run the display cp-rate-limit [ slot slot-id ] [ verbose ] command to check the configuration about all the users that use IGMP packets to launch attacks.
  • Run the display cp-rate-limit interface interface-type interface-number [ vlan vlan-id ] [ verbose ] command to check the configuration about the attackers on a specified interface.
  • Run the display cp-rate-limit interface interface-type interface-number pe-vid pe-vid ce-vid ce-vid [ verbose ] command to check the configuration about the attackers on a QinQ interface.

Example

Run the display igmp interface verbose command. The command output shows detailed IGMP information on an interface.

<HUAWEI> display igmp interface verbose
Interface information of VPN-Instance: public net
 GigabitEthernet1/0/0(192.168.101.1):
   IGMP is enabled
   Current IGMP version is 2
   IGMP state: up
   IGMP group policy: none
   IGMP limit: -
   IGMP access-limit: 5  except: 2002
   Value of query interval for IGMP (negotiated): -
   Value of query interval for IGMP (configured): 60 s
   Value of other querier timeout for IGMP: 0 s
   Value of maximum query response time for IGMP: 10 s
   Value of last member query time: 2 s
   Value of last member query interval: 1 s
   Value of startup query interval: 15 s
   Value of startup query count: 2
   General query timer expiry (hours:minutes:seconds): 00:00:44
   Querier for IGMP: 192.168.101.1 (this router)
   IGMP activity: 4 joins, 0 leaves
   Robustness (negotiated): -
   Robustness (configured): 2
   Require-router-alert: disabled
   Send-router-alert: enabled
   Ip-source-policy: ab
   Query ip-source-policy: 2000
   Prompt-leave: disabled
   SSM-Mapping: enabled
   Startup-query-timer-expiry: off
   Other-querier-present-timer-expiry: off
  Total 2 IGMP Groups reported 

Run the display cp-rate-limit verbose command to check the configuration about the attackers on all interfaces.

<HUAWEI> display cp-rate-limit verbose
[Slot 1]
Interface:               GigabitEthernet1/0/1.1
PeVid(Vid):              20
CeVid:                   30
PassBytes(byte):         1391816
PassByteRate(kbps):      200
DropBytes(byte):         5827014740
DropByteRate(kbps):      838529
PassPackets(packet):     13384
PassPacketRate(pps):     240
DropPackets(packet):     56028990
DropPacketRate(pps):     1007848 
Translation
Download
Updated: 2019-01-03

Document ID: EDOC1100055017

Views: 42685

Downloads: 97

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next