No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

S12700 V200R013C00 Command Reference

This document describes all the configuration commands of the device, including the command function, syntax, parameters, views, default level, usage guidelines, examples, and related commands.
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
VSI-based IGMP Snooping Configuration Commands

VSI-based IGMP Snooping Configuration Commands

Command Support

  • The SA series cards do not support VSI-based IGMP snooping.
  • The XGE interface connected to ACU2 does not support VSI-based IGMP snooping.
  • The XGE interface connected to ET1D2IPS0S00, ET1D2FW00S00, ET1D2FW00S01, or ET1D2FW00S02 card does not support VSI-based IGMP snooping.

display igmp-snooping

Function

The display igmp-snooping command displays the IGMP snooping running parameters in a VLAN.

Format

display igmp-snooping [ vsi [ vsi-name ] ]

Parameters

Parameter

Description

Value

vsi [ vsi-name ]

Displays the IGMP snooping running parameters in a specified VSI.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

After completing IGMP snooping configuration in a VSI, you can use this command to check IGMP snooping parameter settings. When a fault occurs in the multicast service, use this command to identify the cause of the fault.

Precautions

The IGMP snooping configuration of a VSI is displayed only when the VSI is in Up state.

Example

# Display IGMP snooping running parameters in VSI company1.

<HUAWEI> display igmp-snooping vsi company1
  IGMP Snooping Information for VSI company1
     IGMP Snooping is Enabled
     IGMP Version is Set to default 2
     IGMP Query Interval is Set to default 60s
     IGMP Max Response Interval is Set to default 10s
     IGMP Robustness is Set to default 2
     IGMP Last Member Query Interval is Set to default 1s
     IGMP Router Port Aging Interval is Set to 180s or holdtime in hello
     IGMP Filter Group-Policy is not set
     IGMP Prompt Leave Disable
     IGMP Router Alert is Not Required
     IGMP Send Router Alert Enable
     IGMP Router Port Learning Enable
     IGMP SSM-Mapping Disable
Table 8-127  Description of the display igmp-snooping command output

Item

Description

IGMP Snooping Information for VSI company1

IGMP snooping running parameters are displayed in VSI company1.

IGMP Snooping is Enabled

IGMP snooping is enabled in the VSI.

By default, IGMP snooping is disabled in a VSI. IGMP snooping can be enabled in a VSI using the igmp-snooping enable (VSI view) command.

IGMP Version is Set to default 2

Both IGMPv1 and IGMPv2 messages can be processed in the VSI (default configuration).

This parameter is configured using the igmp-snooping version command.

IGMP Query Interval is Set to default 60s

The interval at which IGMP General Query messages are sent in the VSI is 60 seconds (default configuration).

This parameter is configured using the igmp-snooping query-interval command.

IGMP Max Response Interval is Set to default 10s

The maximum response time for IGMP General Query messages in the VSI is 10 seconds (default configuration).

This parameter is configured using the igmp-snooping max-response-time command.

IGMP Robustness is Set to default 2

The IGMP robustness variable is 2 (default configuration).

This parameter is configured using the igmp-snooping robust-count command.

IGMP Last Member Query Interval is Set to default 1s

The interval at which IGMP Group-Specific Query messages are sent in the VSI 1 second (default configuration).

This parameter is configured using the igmp-snooping lastmember-queryinterval command.

IGMP Router Port Aging Interval is Set to 180s or holdtime in hello

The aging time of router ports in the VSI is 180 seconds or the holdtime in PIM Hello messages (default configuration).

This parameter is configured using the igmp-snooping router-aging-time command.

IGMP Filter Group-Policy is not set

The default multicast group policy is used in the VSI.

A multicast group policy is configured using the igmp-snooping group-policy command.

IGMP Prompt Leave Disable

Prompt leave is disabled in the VSI (default configuration).

The prompt leave function can be enabled using the igmp-snooping prompt-leave command.

IGMP Router Alert is Not Required

The device does not require that the IGMP messages received in the VSI contain the Router-Alert option in the IP header (default configuration).

The switch can be configured to discard IGMP messages without the Router-Alert option using the igmp-snooping require-router-alert command.

IGMP Send Router Alert Enable

The device sends the IGMP messages that contain the Router-Alert option in the IP headers to the hosts in the VSI (default configuration).

The switch can be configured to send IGMP messages with the Router-Alert option using the igmp-snooping send-router-alert command.

IGMP Router Port Learning Enable

Learning of IGMP router ports is enabled in the VSI.

Router port learning can be enabled using the igmp-snooping router-learning command.

IGMP SSM-Mapping Disable

IGMP SSM mapping is disabled in the VSI.

IGMP snooping SSM mapping can be enabled using the igmp-snooping ssm-mapping enable command.

display igmp-snooping configuration

Function

The display igmp-snooping configuration command displays the IGMP snooping configuration in a VSI.

Format

display igmp-snooping [ vsi [ vsi-name ] ] configuration

Parameters

Parameter Description Value
vsi [ vsi-name ] Displays the non-default IGMP snooping configuration in a specified VSI.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

After completing IGMP snooping configuration in a VSI, use this command to verify the configuration. This command displays only the IGMP snooping configuration.

Prerequisites

This command does not display information about static multicast groups and static router ports. To view information about static multicast groups and static router ports, run the display igmp-snooping port-info and display igmp-snooping router-port command.

Example

# Display the IGMP snooping configuration in VSI company1.

<HUAWEI> display igmp-snooping vsi company1 configuration
 IGMP Snooping Configuration for VSI company1
     igmp-snooping enable
     igmp-snooping version 3
Table 8-128  Description of the display igmp-snooping configuration command output

Item

Description

IGMP Snooping Configuration for VSI company1

The following information displayed is the IGMP snooping configuration in VSI company1.

igmp-snooping enable

IGMP snooping is enabled in the VSI.

This function is configured using the igmp-snooping enable command in the VSI view.

igmp-snooping version 3

Messages of IGMPv1, IGMPv2, and IGMPv3 can be processed in the VSI.

This parameter is configured using the igmp-snooping version version command in the VSI view.

display igmp-snooping port-info

Function

The display igmp-snooping port-info command displays information about group member ports.

Format

display igmp-snooping port-info [ vsi vsi-name [ group-address group-address ] ] [ verbose ]

Parameters

Parameter

Description

Value

vsi vsi-name

Displays group memberships in a specified VSI.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

group-address group-address

Displays member ports of a specified multicast group in a VSI. group-address specifies the IP address of a multicast group.

The value ranges from 224.0.1.0 to 239.255.255.255, in dotted decimal notation.

verbose

Displays detailed information about member ports.

-

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

After IGMP snooping is configured in a VSI on a switch, the IGMP snooping module maintains a Layer 2 multicast forwarding table by snooping the IGMP messages exchanged between the upstream router and downstream hosts. The display igmp-snooping port-info command shows member interfaces in the Layer 2 multicast forwarding table. According to the command output, you can know which downlink interfaces have multicast users connected, and control multicast services conveniently.

Precautions

Only multicast member ports in Up state are displayed in the command output.

Example

# Display information about group member ports in the VSI company1.

<HUAWEI> display igmp-snooping port-info vsi company1
-----------------------------------------------------------------------
                     (Source, Group)  Port                          Flag
  Flag: S:Static     D:Dynamic     M: Ssm-mapping                      
 -----------------------------------------------------------------------
 VSI company1, 3 Entry(s)                                                   
                      (*, 225.0.0.1)  GE1/0/11(VID:1001)            -D- 
                                                1 port(s)               
                      (*, 225.0.0.2)  PW(10.1.1.1/100)             -D- 
                                                1 port(s)               
                      (*, 225.0.0.3)  GE1/0/13                      -D- 
                                                1 port(s)               
 -----------------------------------------------------------------------
Table 8-129  Description of the display igmp-snooping port-info command output

Item

Description

(Source, Group)

(S, G) entry, specifying a multicast source and multicast group.

Port

Outbound port name. Different ports in the command output are described as follows:

  • GE1/0/11(VID:1001) indicates that the AC-side interface is VLANIF 1001, and the group member port is GE1/0/11 in VLAN 1001.
  • PW(10.1.1.1/100) indicates that the member port is a PW-side interface. 10.1.1.1 is the IP address of the remote peer, and 100 is the VC ID of the remote peer.
  • GE1/0/13 indicates that the AC-side interface is GE1/0/13 working in Layer 3 mode, and the group member port is GE1/0/13.

Flag

Type of an outbound port.
  • S: static member port
  • D: dynamic member port
  • M: member port established through SSM mapping

VSI company1, 3 Entry(s)

Number of multicast entries in VSI company 1.

display igmp-snooping router-port

Function

The display igmp-snooping router-port command displays information about the router ports in a specified VSI, including static and dynamic router ports.

Format

display igmp-snooping router-port vsi [ vsi-name ]

Parameters

Parameter

Description

Value

vsi [ vsi-name ]

Displays information about router ports in a specified VSI. If vsi-name is not specified, the command displays router ports in all VSIs.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

A router port connects to an upstream multicast router. The router port can be statically configured or dynamically generated after the interface receives an IGMP Query message.

After completing basic IGMP snooping configuration in a VSI, you can run the display igmp-snooping router-port command to view the type, name, lifetime, and remaining aging time of a router port in the VSI.

Precautions

Information about a router port is displayed only when the interface is in Up state.

Example

# Display information about router ports in VSI company1.

<HUAWEI> display igmp-snooping router-port vsi company1
 Port Name                       UpTime        Expires       Flags
 ---------------------------------------------------------------------
 VSI company1, 3 router-port(s)
 GE1/0/21(VID:100)               18:02:13      00:02:35      DYNAMIC  
 PW(1.1.1.1/2)                   03:28:16      00:01:20      DYNAMIC
 GE1/0/15                        18:02:13      00:02:35      DYNAMIC
Table 8-130  Description of the display igmp-snooping router-port command output

Item

Description

Port Name

Router port name. Different ports in the command output are described as follows:

  • GE1/0/21(VID:100) indicates that the AC-side interface is VLANIF 100, and the router port is GE1/0/21 in VLAN 100.
  • PW(1.1.1.1/2) indicates that the member port is a PW-side interface. 1.1.1.1 is the IP address of the remote peer, and 2 is the VC ID of the remote peer.
  • GE1/0/15 indicates that the AC-side interface is GE1/0/15 working in Layer 3 mode, and the router port is GE1/0/15.

UpTime

Time elapsed since the interface became a router port.

Expires

Remaining aging time of the router port.
  • The remaining aging time is displayed for a dynamic router port.
  • For a static router port, "--" is displayed, indicating that the interface does not age.

Flags

Type of the router port.
  • STATIC: static router port
  • DYNAMIC: dynamic router port

VSI company1, 3 router-port(s)

Number of router ports in VSI company 1.

display igmp-snooping statistics

Function

The display igmp-snooping statistics command displays IGMP snooping statistics.

Format

display igmp-snooping statistics vsi [ vsi-name ]

Parameters

Parameter Description Value
vsi-name

Displays IGMP snooping statistics on a specified VSI.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

After completing basic IGMP snooping configuration in a VSI, you can use the display igmp-snooping statistics command to view IGMP snooping statistics, including the number of IGMP messages sent and received, and the number of PIM hello messages received in each VSI. When a multicast fault occurs, the IGMP snooping statistics help you identify the cause of the fault.

Configuration Impact

When vsi-name is specified, this command displays IGMP snooping statistics in the specified VSI, but does not display IGMP snooping events that occur in the VSI.

Example

# Display IGMP snooping statistics in VSI company1.

<HUAWEI> display igmp-snooping statistics vsi company1
 IGMP Snooping Packets Counter
   Statistics for VSI company1
     Recv V1 Report          0
     Recv V2 Report          304
     Recv V3 Report          0
     Recv V1 Query           0
     Recv V2 Query           523
     Recv V3 Query           0
     Recv Leave              0
     Recv Pim Hello          0
     Send Query(S=0)         0
     Send Query(S!=0)        0
Table 8-131  Description of the display igmp-snooping statistics command output

Item

Description

IGMP Snooping Packets Counter

Statistics on IGMP and PIM packets.

Statistics for VSI company1

Packet statistics in VSI company1.

Recv V1 Report

Number of received IGMPv1 Membership Report messages.

Recv V2 Report

Number of received IGMPv2 Membership Report messages.

Recv V3 Report

Number of received IGMPv3 Membership Report messages.

Recv V1 Query

Number of received IGMPv1 Query messages.

Recv V2 Query

Number of received IGMPv2 Query messages.

Recv V3 Query

Number of received IGMPv3 Query messages.

Recv Leave

Number of received IGMP Leave messages.

Recv Pim Hello

Number of received PIM Hello messages.

Send Query(S=0)

Number of sent IGMP Query messages with the source address 0.0.0.0.

Send Query(S!=0)

Number of sent IGMP Query messages with source addresses other than 0.0.0.0.

display l2-multicast forwarding-table vsi

Function

The display l2-multicast forwarding-table vsi command displays the VSI-based Layer 2 multicast forwarding table.

Format

display l2-multicast forwarding-table vsi [ vsi-name [ group-address { group-address | router-group } ] ]

Parameters

Parameter

Description

Value

vsi-name

Displays Layer 2 multicast forwarding entries in a specified VSI. If vsi-name is not specified, the command displays Layer 2 multicast forwarding entries in all VSIs.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

group-address { group-address | router-group }

Displays Layer 2 multicast forwarding entries of a specified multicast group or all router ports.
  • If you specify group-address, the command displays forwarding entries of the specified multicast group.
  • If you specify router-group, the command displays forwarding entries of all router ports.

The value of group-address is in dotted decimal notation and ranges from 224.0.1.0 to 239.255.255.255.

Views

All views

Default Level

1: Monitoring level

Usage Guidelines

Usage Scenario

After completing configuration of IGMP snooping over VPLS, you can use the display l2-multicast forwarding-table command to view the Layer 2 multicast forwarding table.

Precautions

This command displays multicast forwarding entries in a VSI only when the VSI is in Up state.

Example

# Display the multicast forwarding entries of the VSI company1.

<HUAWEI> display l2-multicast forwarding-table vsi company1
VSI Name : company1, Forwarding Mode : MAC                                
----------------------------------------------------------------------
Group(Mac)                              Interface     Out-Vlan/InLabel
----------------------------------------------------------------------
                         Router-port    5.5.5.9/28               1036 
0100-5e00-0001                          5.5.5.9/28               1036 
                                        GigabitEthernet1/0/21    1000 
0100-5e00-0002                          5.5.5.9/28               1036 
                                        GigabitEthernet1/0/21    1000 
                                        GigabitEthernet1/0/22    0    
----------------------------------------------------------------------
Total Group(s) : 2
Table 8-132  Description of the display l2-multicast forwarding-table command output

Item

Description

VSI Name

Name of the VSI of which the multicast forwarding entries are displayed.

Forwarding Mode

Multicast forwarding mode used in the VSI. Only the MAC address-based forwarding mode is supported.

Group(Mac)

Group MAC address.

Interface

Group member ports and router ports. In this example, 5.5.5.9/28 indicates a PW-side interface, of which the remote peer IP address is 5.5.5.9 and remote peer VSI ID is 28. GigabitEthernet1/0/21 indicates an AC-side interface.

Out-Vlan/InLabel

VLAN ID or inner MPLS label of packets. The value 0 indicates that the router port or member port is an AC-side interface, which is a physical interface working in Layer 3 mode.

Router-port

Router port in the VSI.

igmp-snooping enable (system view)

Function

The igmp-snooping enable command enables IGMP snooping globally.

The undo igmp-snooping enable command disables IGMP snooping globally.

By default, IGMP snooping is disabled globally.

Format

igmp-snooping enable

undo igmp-snooping enable

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

After IGMP snooping is enabled in a VSI, IGMP snooping runs on PE devices in the VSI and maintains a multicast forwarding table by snooping IGMP messages forwarded between the PE devices. The PE devices can manage and control Layer 2 multicast forwarding based on the multicast forwarding table.

Before configuring IGMP snooping in a VSI, enable IGMP snooping globally. Other IGMP snooping configuration commands can be used only after you run the igmp-snooping enable command in the system view.

Precautions

When you run the undo igmp-snooping enable command in the system view, the system displays a message, asking you whether to disable IGMP snooping globally. When you disable IGMP snooping globally, all the IGMP snooping configurations are deleted. When you run the igmp-snooping enable command to enable IGMP snooping globally again, the device uses the default IGMP snooping configuration.

Example

# Enable IGMP snooping globally.
<HUAWEI> system-view
[HUAWEI] igmp-snooping enable

igmp-snooping enable (VSI view)

Function

The igmp-snooping enable command enables IGMP snooping in a VSI.

The undo igmp-snooping enable command disables IGMP snooping in a VSI.

By default, IGMP snooping is disabled in a VSI.

Format

igmp-snooping enable

undo igmp-snooping enable

Parameters

None

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

By default, IGMP snooping not enabled in a VSI after being enabled in the system view. To enable IGMP snooping in a VSI, run the igmp-snooping enable command in the VSI view.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Example

# Enable IGMP snooping in VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable

igmp-snooping group-policy (VSI view)

Function

The igmp-snooping group-policy command configures a multicast group policy in a VSI.

The undo igmp-snooping group-policy command deletes a multicast group policy from a VSI.

By default, no multicast group policy is available in a VSI, and hosts in the VSI can join any multicast group.

Format

igmp-snooping group-policy acl-number [ version version-number ]

undo igmp-snooping group-policy

Parameters

Parameter

Description

Value

acl-number

Specifies the number of the ACL that limits the multicast groups that hosts in a VSI can join.

The value is an integer that ranges from 2000 to 3999.

version version-number

Applies the multicast group policy only to the IGMP messages of the specified version.

The value is an integer that ranges from 1 to 3.
  • 1: IGMPv1
  • 2: IGMPv2
  • 3: IGMPv3

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

A multicast group policy controls the multicast programs that users can order on a device with IGMP snooping enabled. In multicast applications, user hosts send IGMP Report messages to join a group when they order programs of this group. When the upstream Layer 2 device receives the Report messages, the switch matches the Report messages with the ACL referenced in the group policy configured in the VSI. If the messages match the ACL, the switch allows user hosts in the VSI to join the group and accepts the Report messages. If the messages do not match the ACL, the switch prevents the user hosts in the VSI from joining the group.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

  • The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

  • If no IGMP version is specified for a multicast policy, the switch applies the policy to all the received IGMP messages.

Example

# Allow hosts in the VSI company1 to join group 225.1.1.123.

<HUAWEI> system-view
[HUAWEI] acl number 2000
[HUAWEI-acl-basic-2000] rule permit source 225.1.1.123 0
[HUAWEI-acl-basic-2000] quit
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping group-policy 2000

igmp-snooping lastmember-queryinterval

Function

The igmp-snooping lastmember-queryinterval command sets the last member query interval in a VSI, that is, the interval at which Group-Specific Query messages are sent in the VSI.

The undo igmp-snooping lastmember-queryinterval command restores the default last member query interval in a VSI.

By default, Group-Specific Query messages are sent in a VSI at intervals of 1 second.

Format

igmp-snooping lastmember-queryinterval lastmember-queryinterval

undo igmp-snooping lastmember-queryinterval

Parameters

Parameter

Description

Value

lastmember-queryinterval

Specifies the interval at which IGMP Group-Specific Query messages are sent.

The value is an integer that ranges from 1 to 5, in seconds.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

When a member interface receives an IGMP Leave message from a downstream host, the switch starts the aging timer for the interface. The aging time is calculated using the following formula: Aging time = Last member query interval x Last member query count. The igmp-snooping lastmember-queryinterval command sets the last member query interval. The last member query count is set by the igmp-snooping robust-count command.

If the member interface receives Report messages from downstream hosts within the aging time, the switch retains the member interface in the outbound interface list of the corresponding Layer 2 multicast forwarding entry. If the member interface does not receive any Report messages within the aging time, the switch considers that no group member is connected to the interface, and therefore deletes the interface from the Layer 2 multicast forwarding entry.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Hosts running IGMPv1 do not send Leave messages when they leave a multicast group. Therefore, the igmp-snooping lastmember-queryinterval command is valid only when the IGMP message version is set to v2 or v3 in the VSI.

Example

# Set the last member query interval in VSI company1 to 4 seconds.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping lastmember-queryinterval 4

igmp-snooping max-response-time

Function

The igmp-snooping max-response-time command sets the maximum response time for IGMP General Query messages in a VSI.

The undo igmp-snooping max-response-time command restores the default maximum response time for IGMP General Query messages in a VSI.

By default, the maximum response time for IGMP General messages in a VSI is 10 seconds.

Format

igmp-snooping max-response-time max-response-time

undo igmp-snooping max-response-time

Parameters

Parameter

Description

Value

max-response-time

Specifies the maximum response time for IGMP General Query messages.

The value is an integer that ranges from 1 to 25, in seconds. The default value is 10.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The maximum response time for General Query messages is used to calculate the aging time of group member interfaces. When a member port receives a Report message from a downstream host, the switch starts the aging timer for the interface. The aging time is calculated using the following formula: Aging time = Query count x General query interval + Maximum response time for General Query messages. This command sets the maximum response time in the formula. The general query interval is set by the igmp-snooping robust-count command, and the general query interval is set by the igmp-snooping query-interval command.

If the member port receives Report messages from downstream hosts within the aging time, the switch retains the member port in the outbound interface list of the corresponding Layer 2 multicast forwarding entry. If the member port does not receive any Report messages within the aging time, the switch considers that no group member is connected to the interface, and therefore deletes the interface from the Layer 2 multicast forwarding entry.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Set the maximum response time for IGMP General Query messages in VSI company1 to 20 seconds.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping max-response-time 20

igmp-snooping over-vpls enable

Function

The igmp-snooping over-vpls enable command enables IGMP snooping for VPLS.

The undo igmp-snooping over-vpls enable command disables IGMP snooping for VPLS.

By default, IGMP snooping for VPLS is disabled.

Format

igmp-snooping over-vpls enable

undo igmp-snooping over-vpls enable

Parameters

None

Views

System view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

Before configuring IGMP snooping in a VSI, enable IGMP snooping globally and for VPLS in the system view.

Prerequisites

IGMP snooping has been enabled globally using the igmp-snooping enable (system view) command in the system view.

Precautions

When you run the undo igmp-snooping over-vpls enable command in the system view, the system displays a message, asking you whether to disable IGMP snooping for VPLS. If any IGMP snooping for VPLS configuration has been made in the system, the device prompts you to delete all the IGMP snooping for VPLS configuration.

Example

# Enable IGMP snooping for VPLS.
<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable

igmp-snooping prompt-leave

Function

The igmp-snooping prompt-leave command enables the fast leave function in a VSI so that member ports in the VSI can fast leave multicast groups.

The undo igmp-snooping prompt-leave command disables the fast leave function in a VSI.

By default, the fast leave function is disabled in a VSI.

Format

igmp-snooping prompt-leave [ group-policy acl-number ]

undo igmp-snooping prompt-leave

Parameters

Parameter

Description

Value

group-policy acl-number

Allows member ports to fast leave the multicast group specified by an ACL.

The value of acl-number is an integer that ranges from 2000 to 3999.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The fast leave function allows the switch to delete an interface from a group immediately after the interface receives an IGMP Leave message for the multicast group.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

  • The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

  • The configuration is valid only when IGMPv2 or IGMPv3 messages can be processed in the VSI.

  • If you do not specify group-policy when configuring the fast leave function, this function applies to all groups. To specify a group policy in the command, create an ACL and configure rules for the ACL before running the command. The default ACL rule denies all multicast groups. If you do not want to apply the fast leave to a group, use the rule permit source any command.

Example

# Allow member ports in the VSI company1 to fast leave group 225.1.1.123.

<HUAWEI> system-view
[HUAWEI] acl number 2000
[HUAWEI-acl-basic-2000] rule permit source 225.1.1.123 0
[HUAWEI-acl-basic-2000] quit
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping prompt-leave group-policy 2000

igmp-snooping query-interval

Function

The igmp-snooping query-interval command sets the general query interval in a VSI, that is, the interval at which IGMP General Query messages are sent in the VSI.

The undo igmp-snooping query-interval command restores the default general query interval in a VSI.

By default, Group-Specific Query messages are sent in a VSI at an interval of 60 seconds.

Format

igmp-snooping query-interval query-interval

undo igmp-snooping query-interval

Parameters

Parameter

Description

Value

query-interval

Specifies the interval at which IGMP General Query messages are sent.

The value is an integer that ranges from 1 to 65535, in seconds. The default value is 60.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The general query interval is used to calculate the aging time of group member ports. When a member port receives an IGMP Report message from a host, the switch starts the aging timer for the interface. The aging time is calculated using the following formula: Aging time = IGMP robustness variable x General query interval + Maximum response time for General Query messages. The igmp-snooping query-interval command sets the general query interval. The general query count is set by the igmp-snooping robust-count command, and the maximum response time for General Query messages is set by the igmp-snooping max-response-time command.

If the member port receives Report messages from downstream hosts within the aging time, the switch retains the member port in the outbound interface list of the corresponding Layer 2 multicast forwarding entry. If the member port does not receive any Report messages within the aging time, the switch considers that no group member is connected to the interface, and therefore deletes the interface from the Layer 2 multicast forwarding entry.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Set the general query interval in VSI company1 to 100 seconds.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping query-interval 100

igmp-snooping require-router-alert

Function

The igmp-snooping require-router-alert command configures the switch to drop the IGMP messages without the Router-Alert option in the IP header received from a VSI.

The undo igmp-snooping require-router-alert command restores the default setting.

By default, the switch does not check the Router-Alert option of IGMP messages and processes all the received IGMP messages, regardless of whether they carry the Router-Alert option in the IP header.

Format

igmp-snooping require-router-alert

undo igmp-snooping require-router-alert

Parameters

None

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The Router-Alert option identifies the protocol packets that need to be processed by upper-layer routing protocols.

By default, the switch does not check whether IGMP messages contain the Router-Alert option and sends all the IGMP messages to the upper-layer routing protocol. After the igmp-snooping require-router-alert command is executed, the switch checks each IGMP message for the Router-Alert option and discards those IGMP messages with this option. This improves device performance, reduces cost, and enhances security of the upper-layer routing protocol.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Configure the switch to discard the IGMP messages without the Router-Alert option in the IP header received from VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping require-router-alert

igmp-snooping robust-count

Function

The igmp-snooping robust-count command sets the IGMP robustness variable in a VSI, which specifies the query count.

The undo igmp-snooping robust-count command restores the default IGMP robustness variable in a VSI.

By default, the robustness variable in a VSI is 2.

Format

igmp-snooping robust-count robust-count

undo igmp-snooping robust-count

Parameters

Parameter

Description

Value

robust-count

Specifies the IGMP robustness variable in a VSI.

The value is an integer that ranges from 2 to 5. The default value is 2.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The IGMP robustness variable is used to adjust the aging time of group member interfaces.

  • When a member port receives an IGMP Report message from a downstream host, the switch sets the aging time of the interface to: General query count x General query interval + Maximum response time for General Query messages. The igmp-snooping robust-count command sets the general query count. The general query interval is set by the igmp-snooping query-interval command, and the maximum response time for General Query messages is set by the igmp-snooping max-response-time command.

  • When the member port receives a Leave message from a downstream host, the switch starts the aging timer of the interface to: Last member query interval x Last member query count. The igmp-snooping robust-count command sets the general query count. The last member query interval is set by the igmp-snooping lastmember-queryinterval command.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Set the IGMP robustness variable to 5 in VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping robust-count 5

igmp-snooping router-aging-time

Function

The igmp-snooping router-aging-time command sets the aging time of dynamic router ports in a VSI.

The undo igmp-snooping router-aging-time command restores the default aging time of dynamic router ports in a VSI.

By default, the aging time of dynamic router ports in a VSI is 180 seconds.

Format

igmp-snooping router-aging-time router-aging-time

undo igmp-snooping router-aging-time

Parameters

Parameter

Description

Value

router-aging-time

Specifies the aging time of dynamic router ports in a VSI.

The value is an integer that ranges from 1 to 1000, in seconds. The default value is 180 seconds.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

When a short-term congestion occurs on the network, it takes a longer time to transmit Query messages from the IGMP querier to the switch. If a router port on the switch ages in this period, the switch does not send Report or Leave messages to the router port. As a result, multicast data forwarding may be interrupted. Therefore, set a long aging time for router ports if the network is unstable.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Configuration Impact

If a router port receives an IGMP Query message, the switch sets the remaining aging time of the router port to the configured value.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

A too short aging time causes frequent aging of router ports and degrades system performance.

Example

# Set the aging time of router ports in VSI company1 to 500 seconds.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping router-aging-time 500

igmp-snooping router-learning

Function

The igmp-snooping router-learning command enables router port learning in a VSI.

The undo igmp-snooping router-learning command disables router port learning in a VSI.

By default, router port learning is enabled in a VSI.

Format

igmp-snooping router-learning

undo igmp-snooping router-learning

Parameters

None

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

A switch running IGMP snooping considers an interface as a dynamic router port when the interface receives an IGMP General Query message with any source IP address except 0.0.0.0. Router ports are configured to guide forwarding of IGMP Report/Leave messages. To prevent interfaces in a VSI from becoming a router port, disable router port learning in the VSI.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Follow-up Procedure

The switch does not listen on IGMP Query messages in a VSI after router port learning is disabled in the VSI. Therefore, run the igmp-snooping static-router-port command to configure a static router port.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Disable router port learning in VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] undo igmp-snooping router-learning

igmp-snooping send-router-alert

Function

The igmp-snooping send-router-alert command configures the switch to send IGMP messages with the Router-Alert option in the IP header to a VSI.

The undo igmp-snooping send-router-alert command configures the switch to send IGMP messages without the Router-Alert option in the IP header to a VSI.

By default, the switch sends the IGMP messages with the Router-Alert option in the IP header.

Format

igmp-snooping send-router-alert

undo igmp-snooping send-router-alert

Parameters

None

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The Router-Alert option identifies the protocol packets that need to be processed by upper-layer routing protocols.

By default, the switch does not check whether IGMP messages contain the Router-Alert option and sends all the IGMP messages to the upper-layer routing protocol. Sending IGMP messages without the Router-Alert option improves device performance, reduces cost, and enhances security of the upper-layer routing protocol.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Configure the switch to send IGMP messages without the Router-Alert option in the IP header to VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] undo igmp-snooping send-router-alert

igmp-snooping ssm-mapping

Function

The igmp-snooping ssm-mapping command configures the mapping between a multicast group and a multicast source in a VSI.

The undo igmp-snooping ssm-mapping command deletes the mapping between a multicast group and a multicast source in a VSI.

By default, no mappings between multicast groups and multicast sources exist in a VSI.

Format

igmp-snooping ssm-mapping ip-group-address { ip-group-mask | mask-length } ip-source-address

undo igmp-snooping ssm-mapping ip-group-address { ip-group-mask | mask-length } ip-source-address

Parameters

Parameter

Description

Value

ip-group-address

Specifies the IP address of a multicast group.

The value is in dotted decimal notation, and the value range is specified by the igmp-snooping ssm-policy command..

ip-group-mask

Specifies the mask of the multicast group address.

The value is in dotted decimal notation.

mask-length

Specifies the mask length of the multicast group address.

The value is an integer that ranges from 4 to 32.

ip-source-address

Specifies the IP address of a multicast source.

The value is in dotted decimal notation.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

The SSM mapping mechanism converts IGMPv1 and IGMPv2 Report messages into messages with (S, G) information. This mechanism enables hosts that do not support IGMPv3 to work with SSM. To use this mechanism, enable SSM mapping and configure mappings between a multicast group G and multicast sources such as S1, S2 on the switch connected to user hosts. When the switch receives IGMPv1 and IGMPv2 Report messages for a multicast group, it checks the group address of the messages. If the group address is in the SSM group range, the switch converts the messages into one or more IGMPv3 IS_IN (S1, S2...) messages with the group address G.

Prerequisites

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Map multicast group 238.0.0.1 to multicast source 10.1.1.1 in VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping version 3
[HUAWEI-vsi-company1] igmp-snooping ssm-mapping enable
[HUAWEI-vsi-company1] igmp-snooping ssm-mapping 238.0.0.1 32 10.1.1.1

igmp-snooping ssm-mapping enable

Function

The igmp-snooping ssm-mapping enable command enables source-specific multicast (SSM) mapping in a VSI.

The undo igmp-snooping ssm-mapping enable command disables SSM mapping in a VSI.

By default, SSM mapping is disabled in a VSI.

Format

igmp-snooping ssm-mapping enable

undo igmp-snooping ssm-mapping enable

Parameters

None

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

On an SSM network, hosts running IGMPv1 or IGMPv2 cannot select multicast sources when they join a multicast group. To provide SSM services for these hosts, enable SSM mapping on the switch.

Prerequisites

Follow-up Procedure

If the multicast group address is an any-source multicast (ASM) address, configure an SSM group policy to add the multicast group address to the SSM group range using the igmp-snooping ssm-policy command in the VSI view.

Run the igmp-snooping ssm-mapping command to configure mapping between multicast groups and multicast sources.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Enable SSM mapping in VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping version 3
[HUAWEI-vsi-company1] igmp-snooping ssm-mapping enable

igmp-snooping ssm-policy

Function

The igmp-snooping ssm-policy command configures an SSM group policy in a VSI. All the multicast groups permitted by the SSM group policy are SSM groups.

The undo igmp-snooping ssm-policy command deletes the SSM group policy from a VSI.

By default, no SSM group policy is available in a VSI.

Format

igmp-snooping ssm-policy basic-acl-number

undo igmp-snooping ssm-policy

Parameters

Parameter

Description

Value

basic-acl-number

Specifies the number of the basic ACL that defines the range of SSM groups.

The value is an integer that ranges from 2000 to 2999.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

SSM allows multicast group addresses in the range of 232.0.0.0 to 232.255.255.255. If hosts need to join multicast groups out of this range or they are allowed to join only some of multicast groups in the range, configure an SSM group range for the hosts.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Follow-up Procedure

Enable SSM mapping and configure SSM mapping entries in the VSI. The multicast group in an SSM mapping must be in the SSM group range.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

This command must reference an ACL. Before using this command, create an ACL and configure rules for the ACL. By default, the ACL applied to an SSM group policy denies all multicast groups. Therefore, to exclude specific group addresses from the SSM group address range, use a rule permit source any rule with deny rules in the ACL. For details about ACL configuration commands, see ACL Configuration Commands.

Example

# Specify multicast group 225.1.1.123 as an SSM group in VSI comany1.

<HUAWEI> system-view
[HUAWEI] acl number 2000
[HUAWEI-acl-basic-2000] rule permit source 225.1.1.123 0
[HUAWEI-acl-basic-2000] quit
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi comany1
[HUAWEI-vsi-comany1] igmp-snooping enable
[HUAWEI-vsi-comany1] igmp-snooping ssm-policy 2000

igmp-snooping static-router-port (interface view)

Function

The igmp-snooping static-router-port command configures an AC-side interface in a VSI as a static router port.

The undo igmp-snooping static-router-port command deletes the static router port configuration.

By default, no AC-side interface in a VSI is configured as a static router port.

Format

igmp-snooping static-router-port vsi vsi-name

undo igmp-snooping static-router-port vsi vsi-name

Parameters

Parameter

Description

Value

vsi vsi-name

Specifies the VSI to which a static router port belongs.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

Views

GE interface view, XGE interface view, 40GE interface view, 100GE interface view, Eth-Trunk interface view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

To allow the interface connected to an upstream router to keep receiving or forwarding IGMP Report/Leave packets for a long time, configure the interface as a static router port.

Prerequisites

IGMP snooping has been enabled globally using the igmp-snooping enable (system view) command.

Precautions

  • The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

  • Interfaces on a VPLS network include PW-side interfaces and AC-side interfaces. This command configures an AC-side interface as a static router port. To configure a PW-side interface as a static router port, run the igmp-snooping static-router-port (VSI view) command.

  • On a VPLS network, ACs can be set up on different types of interfaces. The method to configure an AC-side interface as a static router port varies according to the type of the AC-side interface:

    • If the AC-side interface bound to a VSI is a physical interface that has been switched to Layer 3 mode using the undo portswitch command, run the igmp-snooping static-router-port command on this interface.
    • If the AC-side interface bound to a VSI is a VLANIF interface, configure the Layer 2 interface in the corresponding VLAN as a static router port. For details, see the igmp-snooping static-router-port vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> command in "VLAN-based IGMP Snooping Configuration Commands."

Example

# Configure GE1/0/1 as a static router port in the VSI company1. (GE1/0/1 has been bound to the VSI company1. IGMP snooping has been enabled globally and in the VSI company1.)

<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 1/0/1
[HUAWEI-GigabitEthernet1/0/1] igmp-snooping static-router-port vsi company1

igmp-snooping static-router-port (VSI view)

Function

The igmp-snooping static-router-port command configures a PW-side interface in a VSI as a static router port.

The undo igmp-snooping static-router-port command deletes the static router port configuration.

By default, no PW-side interface in a VSI is configured as a static router port.

Format

igmp-snooping static-router-port remote-peer ip-address [ negotiation-vc-id vc-id ]

undo igmp-snooping static-router-port remote-peer ip-address [ negotiation-vc-id vc-id ]

Parameters

Parameter

Description

Value

remote-peer ip-address

Specifies the IP address of the remote peer.

The value is in dotted decimal notation.

negotiation-vc-id vc-id

Specifies a virtual circuit ID. Generally, this parameter is specified when two ends of a PW have different VSI names. The vc-id parameter must specify an unused VC ID. That is, the specified VC ID cannot be the same as the VSI ID configured for any other VSI or the VC ID specified by negotiation-vc-id vc-id in another VSI.

The value is an integer that ranges from 1 to 4294967295.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

To allow the interface connected to an upstream router to keep receiving or forwarding IGMP Report/Leave packets for a long time, configure the interface as a static router port.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Interfaces on a VPLS network include PW-side interfaces and AC-side interfaces. This command configures a PW-side interface as a static router port. The method to configure an AC-side interface as a static router port varies according to the type of the AC-side interface:
  • If the AC-side interface bound to a VSI is a VLANIF interface, configure the Layer 2 interface in the corresponding VLAN as a static router port. For details, see the igmp-snooping static-router-port vlan { vlan-id1 [ to vlan-id2 ] } &<1-10> command in "VLAN-based IGMP Snooping Configuration Commands."
  • If the AC-side interface bound to a VSI is a physical interface that has been switched to Layer 3 mode using the undo portswitch command, run the igmp-snooping static-router-port vsi vsi-name command on this interface.

Example

# Configure the PW-side interface (with remote peer 1.1.1.1) as a static router port.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping static-router-port remote-peer 1.1.1.1

igmp-snooping version

Function

The igmp-snooping version command configures the version of IGMP messages that can be processed by IGMP snooping in a VSI.

The undo igmp-snooping version command restores the default IGMP snooping version.

By default, IGMP snooping can process IGMPv1 and IGMPv2 messages in a VSI.

Format

igmp-snooping version version

undo igmp-snooping version

Parameters

Parameter

Description

Value

version

Specifies the version of IGMP messages that can be processed in a VSI.

The value is an integer that ranges from 1 to 3.
  • 1: indicates that IGMP snooping processes only IGMPv1 messages.
  • 2: indicates that IGMP snooping processes IGMPv1 and IGMPv2 messages.
  • 3: indicates that IGMP snooping processes IGMPv1, IGMPv2, and IGMPv3 messages.

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

When hosts in a VSI run different IGMP versions, run the igmp-snooping version command to enable the switch to process IGMP message from all the hosts.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Set the IGMP snooping version to IGMPv1 in VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] igmp-snooping version 1

l2-multicast backup-query forward

Function

The l2-multicast backup-query forward command configures the switch to forward IGMP Query messages to the backup PW.

The undo l2-multicast backup-query forward command disables the switch from forwarding IGMP Query messages to the backup PW.

By default, the switch does not forward IGMP Query messages to the backup PW.

Format

l2-multicast backup-query forward [ source-mac-replace ]

undo l2-multicast backup-query forward

Parameters

Parameter Description Value
source-mac-replace Replaces the source MAC addresses in Query messages to the device MAC address before forwarding the Query messages. -

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

Generally, two PWs are deployed on a VPLS network to ensure reliable service traffic transmission. The two PWs provide redundancy protection for service transmission. If IGMP snooping over VPLS is configured on the switch, the switch does not forward IGMP protocol packets to the backup PW by default. In this case, devices on the backup PW cannot create Layer 2 multicast forwarding entries because they cannot receive IGMP protocol packets. When the primary PW is Down and the backup PW becomes the new primary PW, multicast data traffic will be interrupted for a short time because devices on the new primary PW have not learned Layer 2 multicast forwarding entries. To solve this problem, configure the switch to forward IGMP protocol packets to the backup PW so that multicast data traffic can be quickly switched to the new primary PW.

This command configures the switch to forward IGMP Query messages to the backup PW.

Prerequisites

IGMP snooping has been enabled globally using the igmp-snooping enable (system view) command.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Configure the switch to forward IGMP Query messages to the backup PW.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] l2-multicast backup-query forward

l2-multicast backup-report forward

Function

The l2-multicast backup-report forward command configures the switch to forward IGMP Report/Leave messages to the backup PW.

The undo l2-multicast backup-report forward command disables the switch from forwarding IGMP Report/Leave messages to the backup PW.

By default, the switch does not forward IGMP Report/Leave messages to the backup PW.

Format

l2-multicast backup-report forward [ source-mac-replace ]

undo l2-multicast backup-report forward

Parameters

Parameter Description Value
source-mac-replace Replaces the source MAC addresses in Report/Leave messages to the device MAC address before forwarding the Report/Leave messages. -

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

Generally, two PWs are deployed on a VPLS network to ensure reliable service traffic transmission. The two PWs provide redundancy protection for service transmission. If IGMP snooping over VPLS is configured on the switch, the switch does not forward IGMP protocol packets to the backup PW by default. In this case, devices on the backup PW cannot create Layer 2 multicast forwarding entries because they cannot receive IGMP protocol packets. When the primary PW is Down and the backup PW becomes the new primary PW, multicast data traffic will be interrupted for a short time because devices on the new primary PW have not learned Layer 2 multicast forwarding entries. To solve this problem, configure the switch to forward IGMP protocol packets to the backup PW so that multicast data traffic can be quickly switched to the new primary PW.

This command configures the switch to forward IGMP Report/Leave messages to the backup PW.

Prerequisites

IGMP snooping has been enabled globally using the igmp-snooping enable (system view) command.

Precautions

The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

Example

# Configure the switch to forward IGMP Report/Leave messages to the backup PW.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] l2-multicast backup-report forward

l2-multicast static-group (interface view)

Function

The l2-multicast static-group command statically binds a multicast group to an AC-side interface in a VSI.

The undo l2-multicast static-group command deletes a static multicast from an AC-side interface.

By default, no multicast group is statically bound to an AC-side interface in a VSI.

Format

l2-multicast static-group [ source-address source-address ] group-address group-address1 [ to group-address2 ] vsi vsi-name

undo l2-multicast static-group [ source-address source-address ] group-address { group-address1 [ to group-address2 ] | all } vsi vsi-name

Parameters

Parameter

Description

Value

source-address source-address

Specifies the IP address of a multicast source.

The value is in dotted decimal notation.

group-address group-address1 [ to group-address2 ]

Specifies the IP address of a static multicast group.

The value ranges from 224.0.1.0 to 239.255.255.255 in dotted decimal notation.

vsi vsi-name

Specifies the name of a VSI.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

all

Deletes all static multicast groups.

-

Views

GE interface view, XGE interface view, 40GE interface view, 100GE interface view, Eth-Trunk interface view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

In addition to dynamic multicast forwarding entries generated by Layer 2 protocol protocols, you can configure static Layer 2 multicast forwarding entries by binding groups to interfaces. After a group is statically bound to an interface, users connected to this interface can keep receiving multicast data of the group over a long time.

Static Layer 2 multicast has the following advantages:

  • Protects the system against attacks from protocol packets.
  • Reduces the network delay by directly forwarding multicast packets based on static forwarding entries.
  • Prevents unregistered users from receiving multicast flows, improving information security and protecting service providers' interests.

Prerequisites

IGMP snooping has been enabled globally using the igmp-snooping enable (system view) command.

Precautions

  • The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

  • A static multicast member port does not respond to Query messages sent from an IGMP querier. When a group or (S, G) is statically bound to or unbound from an interface, the interface does not send an IGMP Membership Report message or Leave message.

  • Interfaces on a VPLS network include PW-side interfaces and AC-side interfaces. This command statically binds a group to an AC-side interface. To statically bind a group to a PW-side interface, run the l2-multicast static-group (VSI view) command.

  • On a VPLS network, ACs can be set up on different types of interfaces. The method to statically bind a group to an AC-side interface varies according to the type of the AC-side interface:

    • If the AC-side interface bound to a VSI is a physical interface that has been switched to Layer 3 mode using the undo portswitch command, run the l2-multicast static-group command on this interface.
    • If the AC-side interface bound to a VSI is a VLANIF interface, bind a group to the Layer 2 interface in the corresponding VLAN. For details, see the l2-multicast static-group command in "VLAN-based IGMP Snooping Configuration Commands."

Example

# Statically bind group 225.0.0.1 to GE1/0/1. (GE1/0/1 has been bound to the VSI company1. IGMP snooping has been enabled globally and in the VSI company1.)

<HUAWEI> system-view
[HUAWEI] interface gigabitethernet 1/0/1
[HUAWEI-GigabitEthernet1/0/1] l2-multicast static-group group-address 225.0.0.1 vsi company1

l2-multicast static-group (VSI view)

Function

The l2-multicast static-group command statically binds a multicast group to a PW-side interface in a VSI.

The undo l2-multicast static-group command deletes a static multicast from a PW-side interface.

By default, no multicast group is statically bound to a PW-side interface in a VSI.

Format

l2-multicast static-group [ source-address source-address ] group-address group-address remote-peer ip-address [ negotiation-vc-id vc-id ]

undo l2-multicast static-group [ source-address source-address ] group-address { group-address | all } remote-peer ip-address [ negotiation-vc-id vc-id ]

Parameters

Parameter

Description

Value

source-address source-address

Specifies the IP address of a multicast source.

The value is in dotted decimal notation.

group-address group-address

Specifies the IP address of a static multicast group.

The value of group-address ranges from 224.0.1.0 to 239.255.255.255 in dotted decimal notation.

remote-peer ip-address

Indicates the IP address of the remote peer.

The value is in dotted decimal notation.

negotiation-vc-id vc-id

Specifies a virtual circuit ID. Generally, this parameter is specified when two ends of a PW have different VSI names.

The vc-id parameter must specify an unused VC ID. That is, the specified VC ID cannot be the same as the VSI ID configured for any other VSI or the VC ID specified by negotiation-vc-id vc-id in another VSI. The value is an integer that ranges from 1 to 4294967295.

all

Deletes all static multicast groups.

-

Views

VSI view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

In addition to dynamic multicast forwarding entries generated by Layer 2 protocol protocols, you can configure static Layer 2 multicast forwarding entries by binding entries to interfaces. After a multicast group is statically bound to an interface, users connected to this interface can keep receiving multicast data of the multicast group for a long time.

Static Layer 2 multicast has the following advantages:

  • Protects the system against attacks from protocol packets.
  • Reduces the network delay by directly forwarding multicast packets based on static forwarding entries.
  • Prevents unregistered users from receiving multicast flows, improving information security and protecting service providers' interests.

Prerequisites

IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.

Precautions

  • The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.

  • A static multicast member port does not respond to Query messages sent from an IGMP querier. When an interface is statically bound to or unbound from a multicast group or (S, G), the interface does not send an IGMP Membership Report message or Leave message.

  • Interfaces on a VPLS network include PW-side interfaces and AC-side interfaces. This command statically binds a group to a PW-side interface. The method to statically bind a group to an AC-side interface varies according to the type of the AC-side interface:
    • If the AC-side interface bound to a VSI is a VLANIF interface, bind a group to the Layer 2 interface in the corresponding VLAN. For details, see the l2-multicast static-group command in "VLAN-based IGMP Snooping Configuration Commands."
    • If the AC-side interface bound to a VSI is a physical interface that has been switched to Layer 3 mode using the undo portswitch command, run the l2-multicast static-group [ source-address source-address ] group-address group-address1 [ to group-address2 ] vsi vsi-name command on this interface.

Example

# Statically bind group 224.1.1.1 to the PW (with the remote IP address as 1.1.1.1) in the VSI company1.

<HUAWEI> system-view
[HUAWEI] igmp-snooping enable
[HUAWEI] igmp-snooping over-vpls enable
[HUAWEI] vsi company1
[HUAWEI-vsi-company1] igmp-snooping enable
[HUAWEI-vsi-company1] l2-multicast static-group group-address 224.1.1.1 remote-peer 1.1.1.1

reset igmp-snooping group

Function

The reset igmp-snooping group command clears dynamic multicast forwarding entries.

Format

reset igmp-snooping group { vsi { name vsi-name [ [ source-address source-address ] group-address group-address ] | all } | all }

Parameters

Parameter

Description

Value

name vsi-name

Clears the dynamic multicast forwarding entries of a specified VSI.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

all

Clears the dynamic multicast forwarding entries of all VSIs.

-

source-address source-address

Deletes the dynamic group memberships of a specified source address.

The value is in dotted decimal notation.

group-address group-address

Deletes the dynamic group memberships of a specified group address.

The value of group-address ranges from 224.0.1.0 to 239.255.255.255 in dotted decimal notation.

Views

User view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

When multicast groups on interfaces change, the system generates new Layer 2 multicast forwarding entries until the aging time of multicast member interfaces expire. To enable the system to generate new multicast forwarding entries immediately, use the reset igmp-snooping group command to clear old multicast forwarding entries.

Precautions

If the command clears the dynamic forwarding entries of a VSI, the hosts in the VSI cannot receive multicast packets.

This command cannot clear static multicast forwarding entries.

Example

# Delete all dynamic forwarding entries of VSI company1.

<HUAWEI> reset igmp-snooping group vsi name company1

reset igmp-snooping statistics

Function

The reset igmp-snooping statistics command clears IGMP snooping statistics.

Format

reset igmp-snooping statistics { vsi { name vsi-name | all } | all }

Parameters

Parameter

Description

Value

name vsi-name

Clears IGMP snooping statistics in a specified VSI.

The value is a string of 1 to 31 case-sensitive characters, spaces not supported. When double quotation marks are used around the string, spaces are allowed in the string.

all

Clears all the IGMP snooping statistics.

-

Views

User view

Default Level

2: Configuration level

Usage Guidelines

Usage Scenario

To analyze the IGMP snooping statistics collected in a certain period, run this command to clear the previous statistics. After a while, run the display igmp-snooping statistics command to view the IGMP snooping statistics.

Precautions

The cleared IGMP snooping statistics cannot be restored.

Example

# Clear IGMP snooping statistics of VSI company1.

<HUAWEI> reset igmp-snooping statistics vsi name company1
Translation
Download
Updated: 2019-04-09

Document ID: EDOC1100065659

Views: 124769

Downloads: 88

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next