iTable of Contents1 IGMP Snooping Configuration ·················································································································1-1IGMP Snooping Overview·······················································································································1-1Principle of IGMP Snooping ············································································································1-1Basic Concepts in IGMP Snooping ·································································································1-2How IGMP Snooping Works············································································································1-3Protocols and Standards ·················································································································1-5IGMP Snooping Configuration Task List·································································································1-5Configuring Basic Functions of IGMP Snooping·····················································································1-6Configuration Prerequisites ·············································································································1-6Enabling IGMP Snooping ················································································································1-6Configuring the Version of IGMP Snooping ····················································································1-7Configuring IGMP Snooping Port Functions···························································································1-7Configuration Prerequisites ·············································································································1-7Configuring Aging Timers for Dynamic Ports ··················································································1-8Configuring Static Ports···················································································································1-8Configuring Simulated Joining·········································································································1-9Configuring Fast Leave Processing ······························································································1-10Configuring IGMP Snooping Querier ····································································································1-11Configuration Prerequisites ···········································································································1-11Enabling IGMP Snooping Querier ·································································································1-11Configuring IGMP Queries and Responses ··················································································1-12Configuring Source IP Address of IGMP Queries ·········································································1-13Configuring an IGMP Snooping Policy··································································································1-13Configuration Prerequisites ···········································································································1-13Configuring a Multicast Group Filter······························································································1-14Configuring Multicast Source Port Filtering ···················································································1-14Configuring the Function of Dropping Unknown Multicast Data····················································1-15Configuring IGMP Report Suppression ·························································································1-16Configuring Maximum Multicast Groups that Can Be Joined on a Port········································1-16Configuring Multicast Group Replacement····················································································1-17Displaying and Maintaining IGMP Snooping·························································································1-18IGMP Snooping Configuration Examples ·····························································································1-19Configuring Group Policy and Simulated Joining··········································································1-19Static Port Configuration················································································································1-21IGMP Snooping Querier Configuration··························································································1-25Troubleshooting IGMP Snooping Configuration ···················································································1-27Switch Fails in Layer 2 Multicast Forwarding ················································································1-27Configured Multicast Group Policy Fails to Take Effect ································································1-27