iTable of Contents1 Multicast Overview ····································································································································1-1Multicast Overview ··································································································································1-1Information Transmission in the Unicast Mode ···············································································1-1Information Transmission in the Broadcast Mode···········································································1-2Information Transmission in the Multicast Mode·············································································1-3Roles in Multicast ····························································································································1-4Advantages and Applications of Multicast·······················································································1-5Multicast Models ·····································································································································1-5Multicast Architecture······························································································································1-6Multicast Protocols ··························································································································1-9Multicast Packet Forwarding Mechanism ·····························································································1-11Implementation of the RPF Mechanism ························································································1-11RPF Check ····································································································································1-122 IGMP Snooping Configuration ·················································································································2-1IGMP Snooping Overview·······················································································································2-1Principle of IGMP Snooping ············································································································2-1Basic Concepts in IGMP Snooping ·································································································2-1Work Mechanism of IGMP Snooping ······························································································2-2IGMP Snooping Configuration ················································································································2-4IGMP Snooping Configuration Task List ·························································································2-4Enabling IGMP Snooping ················································································································2-5Configuring the Version of IGMP Snooping ····················································································2-5Configuring Timers ··························································································································2-6Configuring Fast Leave Processing ································································································2-6Configuring a Multicast Group Filter································································································2-7Configuring the Maximum Number of Multicast Groups on a Port··················································2-8Configuring IGMP Querier···············································································································2-9Suppressing Flooding of Unknown Multicast Traffic in a VLAN ····················································2-10Configuring Static Member Port for a Multicast Group··································································2-10Configuring a Static Router Port····································································································2-11Configuring a Port as a Simulated Group Member ·······································································2-12Configuring a VLAN Tag for Query Messages ··············································································2-13Configuring Multicast VLAN ··········································································································2-13Displaying and Maintaining IGMP Snooping·························································································2-15IGMP Snooping Configuration Examples ·····························································································2-15Configuring IGMP Snooping··········································································································2-15Configuring Multicast VLAN ··········································································································2-17Troubleshooting IGMP Snooping··········································································································2-193 Common Multicast Configuration············································································································3-1Common Multicast Configuration············································································································3-1Configuring a Multicast MAC Address Entry ···················································································3-1Configuring Dropping Unknown Multicast Packets ·········································································3-2Displaying and Maintaining Common Multicast Configuration································································3-2