Operation Manual – MulticastH3C S7500E Series Ethernet Switches Table of ContentsiTable of ContentsChapter 1 Multicast Overview ...................................................................................................... 1-11.1 Introduction to Multicast..................................................................................................... 1-11.1.1 Comparison of Information Transmission Techniques............................................ 1-11.1.2 Roles in Multicast .................................................................................................... 1-41.1.3 Advantages and Applications of Multicast .............................................................. 1-51.2 Multicast Models ................................................................................................................ 1-61.3 Multicast Architecture ........................................................................................................ 1-61.3.1 Multicast Addresses ................................................................................................ 1-71.3.2 Multicast Protocols ................................................................................................ 1-111.4 Multicast Packet Forwarding Mechanism ........................................................................ 1-13Chapter 2 IGMP Snooping Configuration ................................................................................... 2-12.1 IGMP Snooping Overview ................................................................................................. 2-12.1.1 Principle of IGMP Snooping .................................................................................... 2-12.1.2 Basic Concepts in IGMP Snooping ......................................................................... 2-22.1.3 Work Mechanism of IGMP Snooping ...................................................................... 2-42.1.4 Processing of Multicast Protocol Messages ........................................................... 2-62.1.5 Protocols and Standards......................................................................................... 2-62.2 IGMP Snooping Configuration Task List ........................................................................... 2-72.3 Configuring Basic Functions of IGMP Snooping ............................................................... 2-82.3.1 Configuration Prerequisites..................................................................................... 2-82.3.2 Enabling IGMP Snooping........................................................................................ 2-82.3.3 Configuring the Version of IGMP Snooping ............................................................ 2-92.4 Configuring IGMP Snooping Port Functions...................................................................... 2-92.4.1 Configuration Prerequisites..................................................................................... 2-92.4.2 Configuring Aging Timers for Dynamic Ports........................................................ 2-102.4.3 Configuring Static Ports ........................................................................................ 2-112.4.4 Configuring Simulated Joining .............................................................................. 2-122.4.5 Configuring Fast Leave Processing ...................................................................... 2-132.5 Configuring IGMP Snooping Querier ............................................................................... 2-142.5.1 Configuration Prerequisites................................................................................... 2-142.5.2 Enabling IGMP Snooping Querier......................................................................... 2-142.5.3 Configuring IGMP Queries and Responses.......................................................... 2-152.5.4 Configuring Source IP Address of IGMP Queries................................................. 2-162.6 Configuring an IGMP Snooping Policy ............................................................................ 2-172.6.1 Configuration Prerequisites................................................................................... 2-172.6.2 Configuring an IGMP-Snooping Multicast Group Filter......................................... 2-172.6.3 Configuring Multicast Source Port Filtering........................................................... 2-18