Contents
Multicast overview ······················································································································································· 1
Introduction to multicast ···················································································································································· 1
Multicast features ······················································································································································ 3
Common notations in multicast ······························································································································· 4
Multicast models ································································································································································ 5
Multicast architecture ························································································································································ 5
Multicast addresses ·················································································································································· 6
Multicast protocols ··················································································································································· 9
Multicast support for VPNs ············································································································································ 11
Introduction to VPN instances ······························································································································ 11
Multicast application in VPNs ······························································································································ 12
Configuring IGMP snooping ····································································································································· 13
Overview ········································································································································································· 13
Basic IGMP snooping concepts ··························································································································· 13
How IGMP snooping works ································································································································· 15
Protocols and standards ······································································································································· 16
Enabling IGMP snooping ····································································································································· 17
Configuring static ports ········································································································································· 20
Configuration prerequisites ·································································································································· 23
Enabling IGMP snooping querier ························································································································ 23
Configuration prerequisites ·································································································································· 24
i