iTable of Contents1 Multicast Overview ····································································································································2-1Introduction to Multicast ··························································································································2-1Comparison of Information Transmission Techniques····································································2-1Features of Multicast ·······················································································································2-4Common Notations in Multicast·······································································································2-5Advantages and Applications of Multicast·······················································································2-5Multicast Models ·····································································································································2-5Multicast Architecture······························································································································2-6Multicast Addresses ························································································································2-7Multicast Protocols ························································································································2-10Multicast Packet Forwarding Mechanism ·····························································································2-122 IGMP Snooping Configuration ·················································································································2-1IGMP Snooping Overview·······················································································································2-1Principle of IGMP Snooping ············································································································2-1Basic Concepts in IGMP Snooping ·································································································2-2How IGMP Snooping Works············································································································2-3Protocols and Standards ·················································································································2-5IGMP Snooping Configuration Task List·································································································2-5Configuring Basic Functions of IGMP Snooping·····················································································2-6Configuration Prerequisites ·············································································································2-6Enabling IGMP Snooping ················································································································2-6Configuring the Version of IGMP Snooping ····················································································2-7Configuring IGMP Snooping Port Functions···························································································2-7Configuration Prerequisites ·············································································································2-7Configuring Aging Timers for Dynamic Ports ··················································································2-8Configuring Static Ports···················································································································2-8Configuring Simulated Joining·········································································································2-9Configuring Fast Leave Processing ······························································································2-10Configuring IGMP Snooping Querier ····································································································2-11Configuration Prerequisites ···········································································································2-11Enabling IGMP Snooping Querier ·································································································2-11Configuring IGMP Queries and Responses ··················································································2-12Configuring Source IP Address of IGMP Queries ·········································································2-13Configuring an IGMP Snooping Policy··································································································2-13Configuration Prerequisites ···········································································································2-13Configuring a Multicast Group Filter······························································································2-14Configuring Multicast Source Port Filtering ···················································································2-14Configuring the Function of Dropping Unknown Multicast Data ···················································2-15Configuring IGMP Report Suppression ·························································································2-16Configuring Maximum Multicast Groups that Can Be Joined on a Port········································2-16Configuring Multicast Group Replacement ···················································································2-17Displaying and Maintaining IGMP Snooping ························································································2-18IGMP Snooping Configuration Examples ·····························································································2-19