
Operation Manual – Multicast Protocol
H3C S5500-SI Series Ethernet Switches Table of Contents
ii
Chapter 2 MLD Snooping Configuration.....................................................................................2-1
2.1 MLD Snooping Overview...................................................................................................2-1
2.1.1 How MLD Snooping Works..................................................................................... 2-1
2.1.2 Basic Concepts in MLD Snooping...........................................................................2-2
2.1.3 Work Mechanism of MLD Snooping .......................................................................2-3
2.2 MLD Snooping Configuration Tasks.................................................................................. 2-5
2.3 Configuring Basic Functions of MLD Snooping.................................................................2-6
2.3.1 Configuration Prerequisites.....................................................................................2-6
2.3.2 Enabling MLD Snooping .........................................................................................2-6
2.3.3 Configuring Port Aging Timers................................................................................2-7
2.4 Configuring Port Functions................................................................................................ 2-8
2.4.1 Configuration Prerequisites.....................................................................................2-8
2.4.2 Configuring Static Ports ..........................................................................................2-8
2.4.3 Enabling the Function of Simulating Member Hosts............................................... 2-9
2.4.4 Configuring the Fast Leave Feature .....................................................................2-10
2.4.5 Configuring MLD Report Suppression .................................................................. 2-11
2.5 Configuring MLD-Related Functions................................................................................2-11
2.5.1 Configuration Prerequisites...................................................................................2-11
2.5.2 Enabling MLD Snooping Querier..........................................................................2-12
2.5.3 Configuring MLD Timers.......................................................................................2-12
2.5.4 Configuring Source IPv6 Addresses of MLD Queries...........................................2-14
2.5.5 Configuring the Function of Dropping Unknown IPv6 Multicast Data................... 2-14
2.6 Configuring an IPv6 Multicast Group Policy....................................................................2-15
2.6.1 Configuration Prerequisites...................................................................................2-15
2.6.2 Configuring an IPv6 Multicast Group Filter...........................................................2-15
2.6.3 Configuring IPv6 Multicast Source Port Filtering ..................................................2-16
2.6.4 Configuring Maximum Multicast Groups that Can Pass Ports..............................2-17
2.6.5 Configuring IPv6 Multicast Group Replacement...................................................2-18
2.7 Displaying and Maintaining MLD Snooping.....................................................................2-19
2.8 MLD Snooping Configuration Examples..........................................................................2-20
2.8.1 Simulated Host Joining .........................................................................................2-20
2.8.2 Static Router Port Configuration ........................................................................... 2-22
2.9 Troubleshooting MLD Snooping......................................................................................2-23
2.9.1 Switch Fails in Layer 2 Multicast Forwarding........................................................ 2-23
2.9.2 Configured IPv6 Multicast Group Policy Fails to Take Effect ...............................2-24
Chapter 3 Multicast VLAN Configuration.................................................................................... 3-1
3.1 Introduction to Multicast VLAN ..........................................................................................3-1
3.2 Configuring Multicast VLAN...............................................................................................3-1
3.3 Displaying and Maintaining Multicast VLAN...................................................................... 3-2
3.4 Multicast VLAN Configuration Example.............................................................................3-2