iiiConfiguring RP Address in SA Messages·····················································································5-11Configuring SA Message Cache ···································································································5-12Configuring the Transmission and Filtering of SA Request Messages·········································5-12Configuring a Rule for Filtering the Multicast Sources of SA Messages·······································5-13Configuring a Rule for Filtering Received and Forwarded SA Messages·····································5-13Displaying and Maintaining MSDP········································································································5-14MSDP Configuration Example ··············································································································5-15Anycast RP Configuration ·············································································································5-15Troubleshooting MSDP Configuration ··································································································5-17MSDP Peer Always in the Down State··························································································5-17No SA Entry in the SA Cache of the Router··················································································5-186 IGMP Snooping Configuration ·················································································································6-1IGMP Snooping Overview·······················································································································6-1Principle of IGMP Snooping ············································································································6-1Basic Concepts in IGMP Snooping ·································································································6-2Work Mechanism of IGMP Snooping ······························································································6-3Configuring IGMP Snooping ···················································································································6-5Enabling IGMP Snooping ················································································································6-5Configuring the Version of IGMP Snooping ····················································································6-6Configuring Timers ··························································································································6-6Configuring Fast Leave Processing ································································································6-7Configuring a Multicast Group Filter································································································6-8Configuring the Maximum Number of Multicast Groups on a Port··················································6-9Configuring IGMP Snooping Querier·····························································································6-10Suppressing Flooding of Unknown Multicast Traffic in a VLAN ····················································6-11Configuring Static Member Port for a Multicast Group··································································6-11Configuring a Static Router Port····································································································6-12Disabling a Port from Becoming a Router Port ·············································································6-13Configuring a Port as a Simulated Group Member ·······································································6-13Configuring a VLAN Tag for Query Messages ··············································································6-14Configuring Multicast VLAN ··········································································································6-15Displaying and Maintaining IGMP Snooping·························································································6-16IGMP Snooping Configuration Examples ·····························································································6-17Configuring IGMP Snooping··········································································································6-17Configuring Multicast VLAN ··········································································································6-18Troubleshooting IGMP Snooping··········································································································6-21