Web Management Guide-R04
Table Of Contents
- How to Use This Guide
- Contents
- Figures
- Tables
- Getting Started
- Web Configuration
- Using the Web Interface
- Basic Management Tasks
- Displaying System Information
- Displaying Hardware/Software Versions
- Configuring Support for Jumbo Frames
- Displaying Bridge Extension Capabilities
- Managing System Files
- Setting the System Clock
- Configuring the Console Port
- Configuring Telnet Settings
- Displaying CPU Utilization
- Configuring CPU Guard
- Displaying Memory Utilization
- Resetting the System
- Interface Configuration
- VLAN Configuration
- Address Table Settings
- Spanning Tree Algorithm
- Congestion Control
- Class of Service
- Layer 2 Queue Settings
- Layer 3/4 Priority Settings
- Setting Priority Processing to IP Precedence/DSCP or CoS
- Mapping Ingress DSCP Values to Internal DSCP Values
- Mapping CoS Priorities to Internal DSCP Values
- Mapping Internal DSCP Values to Egress CoS Values
- Mapping IP Precedence Values to Internal DSCP Values
- Mapping IP Port Priority to Internal DSCP Values
- Quality of Service
- VoIP Traffic Configuration
- Security Measures
- AAA Authentication, Authorization and Accounting
- Configuring User Accounts
- Web Authentication
- Network Access (MAC Address Authentication)
- Configuring HTTPS
- Configuring the Secure Shell
- Access Control Lists
- Filtering IP Addresses for Management Access
- Configuring Port Security
- Configuring 802.1X Port Authentication
- DoS Protection
- DHCPv4 Snooping
- DHCPv6 Snooping
- IPv4 Source Guard
- IPv6 Source Guard
- ARP Inspection
- Application Filter
- Basic Administration Protocols
- Configuring Event Logging
- Link Layer Discovery Protocol
- Simple Network Management Protocol
- Configuring Global Settings for SNMP
- Setting Community Access Strings
- Setting the Local Engine ID
- Specifying a Remote Engine ID
- Setting SNMPv3 Views
- Configuring SNMPv3 Groups
- Configuring Local SNMPv3 Users
- Configuring Remote SNMPv3 Users
- Specifying Trap Managers
- Creating SNMP Notification Logs
- Showing SNMP Statistics
- Remote Monitoring
- Switch Clustering
- Setting a Time Range
- Ethernet Ring Protection Switching
- OAM Configuration
- Connectivity Fault Management
- Configuring Global Settings for CFM
- Configuring Interfaces for CFM
- Configuring CFM Maintenance Domains
- Configuring CFM Maintenance Associations
- Configuring Maintenance End Points
- Configuring Remote Maintenance End Points
- Transmitting Link Trace Messages
- Transmitting Loop Back Messages
- Transmitting Delay-Measure Requests
- Displaying Local MEPs
- Displaying Details for Local MEPs
- Displaying Local MIPs
- Displaying Remote MEPs
- Displaying Details for Remote MEPs
- Displaying the Link Trace Cache
- Displaying Fault Notification Settings
- Displaying Continuity Check Errors
- OAM Configuration
- UDLD Configuration
- LBD Configuration
- Smart Pair Configuration
- Multicast Filtering
- Overview
- Layer 2 IGMP (Snooping and Query for IPv4)
- Configuring IGMP Snooping and Query Parameters
- Specifying Static Interfaces for a Multicast Router
- Assigning Interfaces to Multicast Services
- Setting IGMP Snooping Status per Interface
- Filtering IGMP Query Packets and Multicast Data
- Displaying Multicast Groups Discovered by IGMP Snooping
- Displaying IGMP Snooping Statistics
- Filtering and Throttling IGMP Groups
- MLD Snooping (Snooping and Query for IPv6)
- Multicast VLAN Registration for IPv4
- Multicast VLAN Registration for IPv6
- Basic IP Functions
- IP Configuration
- General IP Routing
- IP Services
- Appendices
- Glossary
Chapter 14
| Multicast Filtering
Layer 2 IGMP (Snooping and Query for IPv4)
– 589 –
joining the multicast group. Only when all hosts on that port leave the
group will the member port be deleted.
◆ Multicast Router Discovery – MRD is used to discover which interfaces are
attached to multicast routers. (Default: Disabled)
◆ General Query Suppression – Suppresses general queries except for ports
attached to downstream multicast hosts. (Default: Disabled)
By default, general query messages are flooded to all ports, except for the
multicast router through which they are received.
If general query suppression is enabled, then these messages are forwarded
only to downstream ports which have joined a multicast service.
◆ Proxy Reporting – Enables IGMP Snooping with Proxy Reporting.
(Options: Enabled, Disabled, Using Global Status; Default: Using Global Status)
When proxy reporting is enabled with this command, the switch performs
“IGMP Snooping with Proxy Reporting” (as defined in DSL Forum TR-101, April
2006), including last leave, and query suppression.
Last leave sends out a proxy query when the last member leaves a multicast
group, and query suppression means that specific queries are not forwarded
from an upstream multicast router to hosts downstream from this device.
Rules Used for Proxy Reporting
When IGMP Proxy Reporting is disabled, the switch will use a null IP address for
the source of IGMP query and report messages unless a proxy query address
has been set.
When IGMP Proxy Reporting is enabled, the source address is based on the
following criteria:
■
If a proxy query address is configured, the switch will use that address as
the source IP address in general and group-specific query messages sent to
downstream hosts, and in report and leave messages sent upstream from
the multicast router port.
■
If a proxy query address is not configured, the switch will use the VLAN’s IP
address as the IP source address in general and group-specific query
messages sent downstream, and use the source address of the last IGMP
message received from a downstream host in report and leave messages
sent upstream from the multicast router port.
◆ Interface Version – Sets the protocol version for compatibility with other
devices on the network. This is the IGMP Version the switch uses to send
snooping reports. (Options: 1-3, Using Global Version; Default: Using Global
Version)
This attribute configures the IGMP report/query version used by IGMP
snooping. Versions 1 - 3 are all supported, and versions 2 and 3 are backward
compatible, so the switch can operate with other devices, regardless of the
snooping version employed.