User's Manual
17
41.1
OVERVIEW ........................................................................................................................................ 308
41.2 RELATED CONCEPTS OF FAST ETHER-RING PROTECTION .................................................................. 308
41.2.1 Roles of Ring’s Nodes .......................................................................................................... 308
41.2.2 Role of the Ring’s Port ......................................................................................................... 309
41.2.3 Control VLAN and Data VLAN ............................................................................................. 309
41.2.4 Aging of the MAC Address Table ......................................................................................... 310
41.2.5 Symbol of a Complete Ring Network ................................................................................... 310
41.3 TYPES OF EAPS PACKETS ............................................................................................................... 310
41.4 FAST ETHERNET RING PROTECTION MECHANISM ............................................................................... 310
41.4.1 Ring Detection and Control of Master Node ........................................................................ 310
41.4.2 Notification of Invalid Link of Transit Node ............................................................................ 311
41.4.3 Resuming the Link of the Transit Node ................................................................................. 3 1 1
41.5 FAST ETHERNET RING PROTECTION CONFIGURATION ......................................................................... 311
41.6 DEFAULT EAPS SETTINGS ................................................................................................................. 311
41.7 REQUISITES BEFORE CONFIGURATION ............................................................................................... 312
41.8 MEAPS CONFIGURATION TASKS ...................................................................................................... 312
41.9 FAST ETHERNET RING PROTECTION CONFIGURATION ........................................................................ 312
41.9.1 Configuring the Master Node ............................................................................................... 312
41.9.2 Configuring the Transit Node ............................................................................................... 313
41.9.3 Configuring the Ring Port ..................................................................................................... 313
41.9.4 Browsing the State of the Ring Protection Protocol ............................................................. 314
41.10 MEAPS CONFIGURATION ............................................................................................................... 314
41.10.1 Configuration Example ....................................................................................................... 314
CHAPTER 42 IGMP SNOOPING CONFIGURATION ..................................................... 316
42.1 IGMP SNOOPING CONFIGURATION TASK ........................................................................................... 316
42.1.1 Enabling/Disabling IGMP Snooping of VLAN ...................................................................... 316
42.1.2 Adding/Deleting Static Multicast Address of VLAN .............................................................. 317
42.1.3 Configuring Immediate-leave of VLAN ................................................................................. 317
42.1.4 Configuring Static Routing Interface of VLAN ...................................................................... 317
42.1.5 Configuring IPACL of Generating Multicast Forward Table .................................................. 317
42.1.6 Configuring the Function to Filter Multicast Message Without Registered Destination
Addresss ......................................................................................................................................... 318
42.1.7 Configuring Router Age Timer of IGMP Snooping ............................................................... 318
42.1.8 Configuring Response Time of IGMP Snooping. ................................................................. 318
42.1.9 Configuring Querier of IGMP Snooping ............................................................................... 319
42.1.10 Configuring IGMP Snooping’s Querier Time ...................................................................... 319
42.1.11 Configuring Filter of IGMP Snooping.................................................................................. 320
42.1.12 Configuring Clear-group of IGMP Snooping ...................................................................... 320
42.1.13 Configuring quick-query of IGMP-snooping ....................................................................... 320
42.1.14 Configuring Decrease-query-report-for-mvc of IGMP Snooping ........................................ 321
42.1.15 Configuring no-send-special-query of IGMP-snooping ...................................................... 321