IGMP Snooping. Mario Baldi. Pietro Nicoletti. Politecnico di Torino. Studio Reti
|
|
- Julian Daniel
- 5 years ago
- Views:
Transcription
1 IGMP Snooping Mario Baldi Politecnico di Torino mario.baldi[at]polito.it staff.polito.it/mario.baldi Pietro Nicoletti Studio Reti piero[at]studioreti.it Based on chapter 8 of: M. Baldi, P. Nicoletti, Switched LAN, McGraw-Hill, 00, ISBN _IGMPsnoop -
2 Copyright notice This set of transparencies, hereinafter referred to as slides, is protected by copyright laws and provisions of International Treaties. The title and copyright regarding the slides (including, but not limited to, each and every image, photography, animation, video, audio, music and text) are property of the authors specified on page. The slides may be reproduced and used freely by research institutes, schools and Universities for non-profit, institutional purposes. In such cases, no authorization is requested. Any total or partial use or reproduction (including, but not limited to, reproduction on magnetic media, computer networks, and printed reproduction) is forbidden, unless explicitly authorized by the authors by means of written license. Information included in these slides is deemed as accurate at the date of publication. Such information is supplied for merely educational purposes and may not be used in designing systems, products, networks, etc. In any case, these slides are subject to changes without any previous notice. The authors do not assume any responsibility for the contents of these slides (including, but not limited to, accuracy, completeness, enforceability, updated-ness of information hereinafter provided). In any case, accordance with information hereinafter included must not be declared. In any case, this copyright notice must never be removed and must be reported even in partial uses. 08_IGMPsnoop -
3 Traditional multicast transmission Flooding Forward on every interface but receiving one Multicast traffic not bounded no scalability Alternative: Knowing member s dislocation for each group 08_IGMPsnoop -
4 GMRP: GARP Multicast Registration Protocol GARP instantiation (Generic Attribute Registration Protocol) Defined in IEEE 80.D Allow Station to communicate their membership group to the switch. Switch to communicate to adjacent switches from which group they must collect frames. Resolved by Same problems of multicast IP!!! IGMP (Internet Group Management Protocol) Multicast routing protocols 08_IGMPsnoop - 4
5 GARP: details Insert or delete miscellaneous attributs in equipments internal entity called GID GID (GARP Information Distribution) is a finite state machine which define the registration and declaration current state for each attribute s value Attribute s registration or deletion takes place only in the port receiving the GARP PDU helding the declaration Registration can take place in the ports that STP has Blocked GIP (GARP Information Propagation) Entity responsible for information propagation between GARP Participant internally in single bridge between different bridge (based on type LLC) 08_IGMPsnoop - 5
6 GARP: entities and architecture GARP participant GARP application GID Bridge GARP participant GARP application GID End Station GARP participant GARP application GID LLC LLC LLC Frame RX Frame TX MAC relay entity Frame RX Frame TX Frame RX Frame TX 08_IGMPsnoop - 6
7 IGMP Snooping: prelude GMRP barely used Defined years ago, supported by most of switches Why should we complicate network operativeness and management with an additional protocol? It s preferred to use existent protocols: IGMP Assumption: Level multicast frame exchange is used nearly exclusively to send multicast IP packets 08_IGMPsnoop - 7
8 IGMP Snooping: mechanics Sending and receiving multicast packet must be preceded by the registration to the group identified by its IP address G Send IGMP host membership report message Transmitted in level multicast frame addressed to multicast MAC g of G IP address Switches snoop host membership report messages Learn on which interfaces are present members of g group Update their multicast forwarding tables 08_IGMPsnoop - 8
9 IGMP on traditional LAN Equivalent H s Ethernet address R IP multicast address of every station Query (H,h) Report (G,g) Report (F,f) 4 08_IGMPsnoop - 9
10 IGMP on IGMP Snooping LAN Equivalent H s Ethernet address IP multicast address of every station Query (H,h) R 7 Forwarding table f,, g, i,, group port Forwarding table f,, i, Report (F,f) β 5 Report (I,i) 4 A B C D α γ 4 6 Forwarding table f,,4 g, i,,4 Report (G,g) E 08_IGMPsnoop - 0
11 IGMP querier function IGMP querier function, which is normally carried by Mrouter, can be achieved by a Switch in the network which supports this function The switch periodically sends query IGMP which are used by the other switches in the network for the IGMP snooping function 08_IGMPsnoop -
12 Switch IGMP querier Equivalent H s Ethernet address IP multicast address of every station Query (H,h) 7 Forwarding table f,, g, i,, group port Forwarding table f,, i, Report (F,f) β 5 Report (I,i) 4 A B C D α γ 4 6 Forwarding table f,,4 g, i,,4 Report (G,g) E 08_IGMPsnoop -
13 Cisco switch configuration example Switch with IGMP querier function Switch(config)# interface vlan vlan_id Switch(config-if)# ip address ip_address subnet_mask Switch(config-if)# ip igmp snooping querier Switch with IGMP snooping function Global level configuration Switch(config)# ip igmp snooping Interface level configuration Switch(config)# interface vlan vlan_id Switch(config-if)# ip igmp snooping 08_IGMPsnoop -
Traffic priority - IEEE 802.1p
Traffic priority - IEEE 802.1p Mario Baldi Politecnico di Torino mario.baldi[at]polito.it staff.polito.it/mario.baldi Pietro Nicoletti Studio Reti piero[at]studioreti.it www.studioreti.it Based on chapter
More informationICMPv6. Internet Control Message Protocol version 6. Mario Baldi. Politecnico di Torino. (Technical University of Turin)
ICMPv6 Internet Control Message Protocol version 6 Mario Baldi Politecnico di Torino (Technical University of Turin) http://www.baldi.info Copyright Notice This set of transparencies, hereinafter referred
More informationSpanning Tree Protocol
Spanning Tree Protocol Exercises Mario Baldi Politecnico di Torino (Technical University of Turin) http://www.mario-baldi.net Copyright Notice This set of transparencies, hereinafter referred to as slides,
More informationVLAN. Mario Baldi. Pietro Nicoletti. Politecnico di Torino. Studio Reti
VLAN Mario Baldi Politecnico di Torino http://staff.polito.it/mario.baldi Pietro Nicoletti Studio Reti http://www.studioreti.it Based on chapter 5 of: M. Baldi, P. Nicoletti, Switched LAN, McGraw-Hill,
More informationLAN design using layer 3 switches
LAN design using layer 3 switches Mario Baldi Politecnico di Torino http://www.mario-baldi.net Pietro Nicoletti Studio Reti http://www.studioreti.it Based on chapter 10 of: M. Baldi, P. Nicoletti, Switched
More informationConfiguring IPsec on Cisco Routers Mario Baldi Politecnico di Torino (Technical University of Torino)
Configuring IPsec on Cisco Routers Mario Baldi Politecnico di Torino (Technical University of Torino) http://staff.polito.it/mario.baldi Nota di Copyright This set of transparencies, hereinafter referred
More informationIP over. Mario Baldi. Politecnico di Torino. (Technical University of Turin) IPinterconnection - 1 Copyright: si veda nota a pag.
IP over ATM SDH DWDM Mario Baldi Politecnico di Torino (Technical University of Turin) www.baldi.info IPinterconnection - 1 Copyright: si veda nota a pag. 2 Nota di Copyright This set of transparencies,
More informationStatic Routing Design Exercises
Static Routing Design Exercises Mario Baldi Flavio Marinone Fulvio Risso Static_routing_ex - 1 Copyright notice: page 2 Copyright notice This set of transparencies, hereinafter referred to as slides, is
More informationROUTING PROTOCOLS. Mario Baldi Routing - 1. see page 2
ROUTING PROTOCOLS Mario Baldi www.baldi.info Routing - 1 Copyright Notice This set of transparencies, hereinafter referred to as slides, is protected by copyright laws and provisions of International Treaties.
More informationMPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino)
MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino) http://staff.polito.it/mario.baldi MPLS - 1 MPLS - 2 Copyright notice This set of transparencies,
More informationRapid spanning tree protocol
Rapid spanning tree protocol Mario Baldi Politecnico di Torino http://staff.polito.it/mario.baldi Pietro Nicoletti Studio Reti http://www.studioreti.it Based on chapter 4 of: M. Baldi, P. Nicoletti, Switched
More informationMultimedia Networking and Quality of Service
Multimedia Networking and Quality of Service Mario Baldi Politecnico di Torino (Technical Univeristy of Torino) Department of Computer Engineering mario.baldi [at] polito.it +39 011 564 7067 staff.polito.it/mario.baldi
More informationMultimedia Applications over Packet Networks
Multimedia Networking and Quality of Service Mario Baldi Technical Univeristy of Torino Computer Engineering Department mario.baldi@polito.it +39 011 564 7067 staff.polito.it/mario.baldi Nota di Copyright
More informationROUTING AND FORWARDING
ROUTING AND FORWARDING Mario Baldi www.baldi.info Routing - 1 Copyright Notice This set of transparencies, hereinafter referred to as slides, is protected by copyright laws and provisions of International
More informationMPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino)
MPLS Multi-protocol label switching Mario Baldi Politecnico di Torino (Technical University of Torino) http://staff.polito.it/mario.baldi MPLS - 1 MPLS - 2 Copyright notice This set of transparencies,
More informationTroubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Copyright Notice
More informationConfiguring MLD Snooping
This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 6 Displaying
More informationIGMP Snooping for IPv4 Multicast Traffic
40 CHAPTER Prerequisites for IGMP Snooping, page 40-1 Restrictions for IGMP Snooping, page 40-1 Information About IGMP Snooping, page 40-2 Default Settings for IGMP Snooping, page 40-8 How to Configure
More informationConfiguring IGMP Snooping for IPv4 Multicast Traffic
30 CHAPTER Configuring IGMP Snooping for IPv4 Multicast Traffic This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping for IPv4 multicast traffic on the Catalyst 6500
More informationConfiguring IGMP Snooping for IPv4 Multicast Traffic
CHAPTER 38 Configuring IGMP Snooping for IPv4 Multicast Traffic This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping in Cisco IOS Release 12.2SX. For complete syntax
More informationConfiguring MLD Snooping
This module contains details of configuring MLD snooping Finding Feature Information, page 1 Information About Configuring IPv6 MLD Snooping, page 1 How to Configure IPv6 MLD Snooping, page 5 Displaying
More informationWAN Technologies (to interconnect IP routers) Mario Baldi
WAN Technologies (to interconnect IP routers) Mario Baldi www.baldi.info WAN_Technologies - 1 Copyright: see page 2 Copyright Notice This set of transparencies, hereinafter referred to as slides, is protected
More informationConfiguring GVRP. Introduction to GVRP GARP. How GARP works. GARP messages
Contents Configuring GVRP 1 Introduction to GVRP 1 GARP 1 GVRP 4 Protocols and standards 5 GVRP configuration task list 5 Configuring GVRP functions 5 Configuring GARP timers 6 Displaying and maintaining
More informationConfiguring VLANs. Finding Feature Information. Prerequisites for VLANs
Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 7 Monitoring VLANs, page 19 Where to Go Next,
More informationSwitches running the LAN Base feature set support only static routing on SVIs.
Finding Feature Information, on page 1 Prerequisites for VLANs, on page 1 Restrictions for VLANs, on page 2 Information About VLANs, on page 2 How to Configure VLANs, on page 6 Monitoring VLANs, on page
More informationConfiguring MAC Address Tables
This chapter contains the following sections: Information About MAC Addresses, page 1 Configuring MAC Addresses, page 2 Configuring MAC Move Loop Detection, page 4 Verifying the MAC Address Configuration,
More informationConfiguring MAC Address Tables
This chapter contains the following sections: Information About MAC Addresses, page 1 Configuring MAC Addresses, page 1 Verifying the MAC Address Configuration, page 4 Information About MAC Addresses To
More informationConfiguring IGMP Snooping
This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on a Cisco NX-OS device. About IGMP Snooping, page 1 Licensing Requirements for IGMP Snooping, page 4 Prerequisites
More informationConfiguring IGMP Snooping and MVR
CHAPTER 21 This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on the Cisco ME 3400 Ethernet Access switch, including an application of local IGMP snooping, Multicast
More informationAuthentication and Security: IEEE 802.1x and protocols EAP based
Authentication and Security: IEEE 802.1x and protocols EAP based Pietro Nicoletti Piero[at]studioreti.it 802-1-X-EAP-Eng - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by copyright
More informationMulticast Does Not Work in the Same VLAN in Catalyst Switches
Multicast Does Not Work in the Same VLAN in Catalyst Switches Document ID: 68131 Introduction Prerequisites Requirements Components Used Related Products Conventions Problem Revisit Some Key Multicast
More informationConfiguring MAC Address Tables
This chapter contains the following sections: Information About MAC Addresses, page 1 Configuring MAC Addresses, page 2 Verifying the MAC Address Configuration, page 4 Verifying RMAC Learning Feature,
More informationTable of Contents 1 IGMP Snooping Configuration 1-1
Table of Contents 1 IGMP Snooping Configuration 1-1 IGMP Snooping Overview 1-1 Principle of IGMP Snooping 1-1 Basic Concepts in IGMP Snooping 1-2 How IGMP Snooping Works 1-3 Processing of Multicast Protocol
More informationChapter 4 Configuring Switching
Chapter 4 Configuring Switching Using the Switching Tab The navigation tabs on the top of the home page include a Switching tab that lets you manage your GS108T Gigabit Smart Switch using features under
More informationIGMP Snooping Configuration
IGMP Snooping Configuration Page 1 of 14 Contents Chapter 1 IGMP Snooping...3 1.1 Brief Introduction to IGMP Snooping... 3 1.2 IGMP Snooping Configuration... 3 1.2.1 Brief Configuration to IGMP Snooping...
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 9 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN membership modes, VLAN configuration
More informationConfiguring Resilient Ethernet Protocol
CHAPTER 19 This chapter describes how to use Resilient Ethernet Protocol (REP) on the Catalyst 4500 series switch. REP is a Cisco proprietary protocol that provides an alternative to Spanning Tree Protocol
More informationConfiguring VLANs. Finding Feature Information. Prerequisites for VLANs
Finding Feature Information, page 1 Prerequisites for VLANs, page 1 Restrictions for VLANs, page 2 Information About VLANs, page 2 How to Configure VLANs, page 8 Monitoring VLANs, page 22 Where to Go Next,
More informationIGMP Snooping Command Reference
This chapter describes commands used to configure Internet Group Management Protocol (IGMP) snooping., page 2 immediate-leave, page 3 mrouter, page 4 report-suppression, page 5 show, page 6 show querier,
More informationConfiguring IGMP Snooping and Filtering
CHAPTER 18 This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on the Catalyst 4500 series switch. It provides guidelines, procedures, and configuration examples.
More informationConfigure Multicast on Cisco Mobility Express AP's
Configure Multicast on Cisco Mobility Express AP's Contents Introduction Prerequisites Requirements Components Used Configure Enable Multicast on Mobility Express Multicast Delivery Mechanism IGMP Snooping
More informationAuthentication and Security: IEEE 802.1x and protocols EAP based
Authentication and Security: IEEE 802.1x and protocols EAP based Pietro Nicoletti piero[at]studioreti.it 802-1-X-2008-Eng - 1 P. Nicoletti: see note pag. 2 Copyright note These slides are protected by
More informationIEEE 802.1ad Support on Provider Bridges
IEEE 802.1ad Support on Provider Bridges First Published: April 19, 2010 Last Updated: May 26, 2011 Service provider bridges (also called provider bridges) allow switches in a service provider network
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 3550 switch. It includes information about VLAN
More informationBasic IGMP v3 snooping support (BISS) is supported. Bridge domain (BD) interfaces from 1 to 4094 support IGMP snooping.
This module describes how to enable and configure the Ethernet Virtual Connection (EVC)-based IGMP Snooping feature both globally and on bridge domains. Finding Feature Information, on page 1 Prerequisites
More informationZyPerMX / MXE Configuration FAQ
ZyPerMX / MXE Configuration FAQ ZeeVee, Inc. 295 Foster Street, Suite 200 Littleton, MA 01460 USA Table of Contents Firmware... 3 Network... 3 Miscellaneous... 4 Appendix 1: Recommended Switches... 6 Appendix
More informationConfiguring IGMP Snooping and Filtering
CHAPTER 20 This chapter describes how to configure Internet Group Management Protocol (IGMP) snooping on the Catalyst 4500 series switch. It provides guidelines, procedures, and configuration examples.
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094). It includes information about VLAN modes and the VLAN Membership
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 12 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 14 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Catalyst 3750 switch. It includes information about VLAN
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 10 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the switch. It includes information about VLAN membership
More informationQUICK INSTALL GUIDE for BROADATA CERTIFIED ETHERNET SWITCHES. Netgear GS510TLP Cisco SG Black Box LGB5028A
QUICK INSTALL GUIDE for BROADATA CERTIFIED ETHERNET SWITCHES Netgear GS510TLP Cisco SG500-25 Black Box LGB5028A AVoIP HDMI/VGA Encoder/Decoder Ethernet Switch Configuration This quick install guide provides
More informationManaged Ethernet Switch User s Manual
Managed Ethernet Switch User s Manual Information Coding: UM00D908 Version: V1.1 Product version: all Product Name: Managed Industrial Ethernet Switches on DIN Rail and Rack. Applicable to: Technical Support
More informationAvaya Virtual Services Platform 7000 Series Configuration Layer 2
Avaya Virtual Services Platform 7000 Series Configuration Layer 2 Release 10.1 NN47202-502, 02.01 March 2012 2012 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure
More informationFor information about configuring these settings from Cluster Management Suite (CMS), refer to the online help.
Configuring VLANs This chapter provides information about configuring virtual LANs (VLANs). It includes command-line interface (CLI) procedures for using commands that have been specifically created or
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 16 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on your Catalyst 2950 or Catalyst 2955 switch. It includes information
More informationConfiguring Flex Links and the MAC Address-Table Move Update Feature
CHAPTER 23 Configuring Flex Links and the MAC Address-Table Move Update Feature This chapter describes how to configure Flex Links, a pair of interfaces on the Catalyst 3750-X or 3560-X switch that provide
More informationimagsystems LIGHTNING
1 Introduction 3 2 Required switch characteristics 3 2.1 Switch Speed 3 2.2 Packets Routing 3 3 Ethernet Switch Configuration Requirements 4 4 Switches Validated by imagsystems 5 5 Ethernet Switch Configuration
More informationConfiguring VLANs. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco ME 3400 Ethernet Access switch. It includes information
More informationConfiguring Flex Links and the MAC Address-Table Move Update Feature
CHAPTER 19 Configuring Flex Links and the MAC Address-Table Move Update Feature This chapter describes how to configure Flex Links, a pair of interfaces on the Catalyst 3560 switch that provide a mutual
More informationMicrosoft Network Load Balancing on UCS B Series Servers Deployment Configuration Example
Microsoft Network Load Balancing on UCS B Series Servers Deployment Configuration Example Document ID: 118262 Contributed by Charles Stizza, Vishal Mehta, and Vincent La Bua, Cisco TAC Engineers. Aug 14,
More informationConfiguring Wireless Multicast
Finding Feature Information, on page 1 Prerequisites for, on page 1 Restrictions for, on page 1 Information About Wireless Multicast, on page 2 How to Configure Wireless Multicast, on page 6 Monitoring
More informationCatalyst 1900 Series and Catalyst 2820 Series Enterprise Edition Software Configuration Guide
INDEX A allowed list, VLAN 2-28 to 2-29 ATM 2-5 firmware upgrade B-5 to B-7 LANE trunk connections 1-4 module 2-9, 2-13, 2-23 networks 2-5 trunk 2-4, 2-14 B bridge groups 3-15 bridge number 2-10 Bridge
More informationRecommendations for Upgrading a Catalyst 2950 Switch to a Catalyst 2960 Switch
APPENDIXC Recommendations for Upgrading a Catalyst 2950 Switch to a Catalyst 2960 Switch This appendix describes the configuration compatibility issues and the feature behavior differences that you might
More informationResilient Ethernet Protocol (REP)
The is a Cisco proprietary protocol that provides an alternative to the Spanning Tree Protocol (STP). REP provides a way to control network loops, handle link failures, and improve convergence time. It
More informationVLAN Configuration. Understanding VLANs CHAPTER
CHAPTER 11 This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the CGR 2010 ESM. It includes information about VLAN membership
More informationUnderstanding and Configuring CDP
CHAPTER 17 This chapter describes how to configure Cisco Discovery Protocol (CDP) on the Catalyst 4500 series switch. It also provides guidelines, procedures, and configuration examples. This chapter includes
More informationConfiguring VLANs. Understanding VLANs CHAPTER
7 CHAPTER This chapter describes how to configure normal-range VLANs (VLAN IDs 1 to 1005) and extended-range VLANs (VLAN IDs 1006 to 4094) on the Cisco MWR 2941 router. It includes information about VLAN
More informationConfiguring Layer 2 Switching
This chapter describes how to configure Layer 2 switching using Cisco NX-OS. This chapter includes the following sections: Finding Feature Information, page 1 Information About Layer 2 Switching, page
More informationConstraining IP Multicast in a Switched Ethernet Network
Constraining IP Multicast in a Switched Ethernet Network This module describes how to configure devices to use the Cisco Group Management Protocol (CGMP) in switched Ethernet networks to control multicast
More informationConfiguring PIM Snooping
CHAPTER 41 This chapter describes how to configure protocol independent multicast (PIM) snooping in Cisco IOS Release 12.2SX. For complete syntax and usage information for the commands used in this chapter,
More informationConfiguring Multicast VLAN Registration
Finding Feature Information, page 1 Restrictions for MVR, page 1 Information About Multicast VLAN Registration, page 2 How to Configure MVR, page 5 Monitoring MVR, page 10 Configuration Examples for MVR,
More informationConfiguring Resilient Ethernet Protocol
This chapter describes Resilient Ethernet Protocol (REP), REP configuration guidelines, VLAN load balancing, REP timers, and REP over EVC. This chapter also describes procedures to configure REP. Understanding
More informationConfiguring SPAN and RSPAN
34 CHAPTER This chapter describes how to configure the Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on the Catalyst 4500 series switches. SPAN selects network traffic for analysis by a network
More informationMultiple queriers. Here is a little CLI guide on how to setup IGMP snooping:
Here is a little CLI guide on how to setup IGMP snooping: IGMP snooping is usually done per VLAN and thus I will focus on that. You always need at least one querier, per VLAN, in your IGMP snooping setup
More information1.1 MRP MAC Address Registration Protocol (MMRP) - Purpose
1.1 MRP MAC Address Registration Protocol (MMRP) - Purpose MMRP provides a mechanism that allows end stations and MAC Bridges to dynamically register (and subsequently, deregister) Group membership and
More informationConfiguring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery
Configuring Virtual Private LAN Service (VPLS) and VPLS BGP-Based Autodiscovery Finding Feature Information, page 1 Configuring VPLS, page 1 Configuring VPLS BGP-based Autodiscovery, page 17 Finding Feature
More informationConfiguring MAC Address Tables
This chapter contains the following sections: Information About MAC Addresses, page 1 Guidelines for Configuring the MAC Address Tables, page 2 MAC Address Movement, page 2 Configuring MAC Addresses, page
More informationHands-On VPLS: Virtual Private LAN Service
Hands-On Course Description Carriers have offered connectivity services based on traditional TDM, Frame Relay and ATM for many years. However, the cost of operating separate networks to provide each of
More informationOverview. Overview. OTV Fundamentals. OTV Terms. This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices.
This chapter provides an overview for Overlay Transport Virtualization (OTV) on Cisco NX-OS devices., page 1 Sample Topologies, page 6 OTV is a MAC-in-IP method that extends Layer 2 connectivity across
More informationConfiguring SPAN and RSPAN
Finding Feature Information, page 1 Prerequisites for SPAN and RSPAN, page 1 Restrictions for SPAN and RSPAN, page 2 Information About SPAN and RSPAN, page 3 How to Configure SPAN and RSPAN, page 14 Monitoring
More informationConfiguring IP Multicast Routing
39 CHAPTER This chapter describes how to configure IP multicast routing on the Catalyst 3560 switch. IP multicasting is a more efficient way to use network resources, especially for bandwidth-intensive
More informationSpanning Tree Protocol
For conceptual information about, see the Using the with the EtherSwitch Network Module section of the EtherSwitch Network feature module. Finding Feature Information, page 1 Information About, page 1
More informationConfiguring SPAN and RSPAN
24 CHAPTER This chapter describes how to configure Switched Port Analyzer (SPAN) and Remote SPAN (RSPAN) on your Catalyst 2950 or Catalyst 2955 switch. Note For complete syntax and usage information for
More informationConfiguring Q-in-Q VLAN Tunnels
Information About Q-in-Q Tunnels, page 1 Licensing Requirements for Interfaces, page 7 Guidelines and Limitations, page 7 Configuring Q-in-Q Tunnels and Layer 2 Protocol Tunneling, page 8 Configuring Q-in-Q
More informationLAN Based Radio Synchronization
LAN Based Radio Synchronization Introduction The latest generation of Spectralink IP-DECT base stations supports to use Local Area Network (LAN) for synchronization of the DECT radios when running software
More informationEX Lite L3 Hardened Managed 24-port Gigabit and 4-port 1G/10G SFP+ Ethernet Switch SFP
Lite L3 Hardened Managed 24-port Gigabit and 4-port 1G/10G SFP+ Ethernet Switch Reduced depth of 254mm NEMATS2 SFP Option Overview EtherWAN s Series provides a Hardened Full-Gigabit Managed 28-port switching
More informationChapter. Managed Switch Software Monitoring. In This Chapter...
Managed Switch Software Monitoring Chapter 23 In This Chapter... System Information...3 2 Port and Power Status...3 4 Network Statistics...3 5 Spanning Tree Status...3 8 Real-Time Ring Status...3 10 Multicast
More informationManaged Gigabit PoE Switch PS2460GM
Managed Gigabit PoE Switch PS2460GM Description PS2460GM Enterprise Gigabit Ethernet switch with management function is designed to meet rigorous mission critical applications, such as factory automation,
More informationLAN Emulation Overview
This overview chapter gives a high-level description of (LANE). Procedures for configuring LANE are provided in the following chapters in this publication: Configuring chapter Configuring Token Ring chapter
More informationCisco Systems, Inc. Norman Finn. July 9, /12. Class of Service in Class of Service in Norman Finn Cisco Systems
Class of Service in 802.1 Norman Finn Cisco Systems, Inc. July 9, 1996 1/12 CoS Bridging Example sw2 16 Mb T-R 100 Mb Ether sw3 sw1 10 Mb Ether FDDI X Y 100 Mb and 10 Mb Ethernet prevent passing access
More informationTable of Contents Chapter 1 Multicast VLAN Configuration
Table of Contents Table of Contents... 1-1 1.1 Multicast VLAN Overview... 1-1 1.2 Configuring Multicast VLAN... 1-1 1.3 Multicast VLAN Configuration Examples... 1-2 1.4 Introduction to Multicast VLAN PLUS...
More informationMultiple I-tag Registration Protocol
Multiple I-tag Registration Protocol Multiple I-tag Registration Protocol (MIRP) for signaling among I-components Version 1 Norman Finn Cisco Systems IEEE 802.1 interim, Los Gatos, California, January-February,
More informationConfiguring Q-in-Q VLAN Tunnels
This chapter describes how to configure Q-in-Q VLAN tunnels. Finding Feature Information, page 1 Feature History for Q-in-Q Tunnels and Layer 2 Protocol Tunneling, page 1 Information About Q-in-Q Tunnels,
More informationUnicasts, Multicasts and Broadcasts
Unicasts, Multicasts and Broadcasts Part 1: Frame-Based LAN Operation V1.0: Geoff Bennett Contents LANs as a Shared Medium A "Private" Conversation Multicast Addressing Performance Issues In this tutorial
More informationINSTALLER S NETWORK SWITCH CONFIGURATION GUIDE
INSTALLER S NETWORK SWITCH CONFIGURATION GUIDE HDM-C6MXIP-SET 2016 Avenview Inc. All rights reserved. The contents of this document are provided in connection with Avenview Inc. ( Avenview ) products.
More informationSwitched Ethernet Virtual LANs
Switched Ethernet Virtual LANs Computer Networks Lecture 4 http://goo.gl/pze5o8 Switched Ethernet 2 LAN Switches Behave as bridges (operates in the logical tree topology) Switching is implemented by hardware
More informationConfiguring Private VLANs
CHAPTER 15 This chapter describes how to configure private VLANs on the Cisco 7600 series routers. Note For complete syntax and usage information for the commands used in this chapter, refer to the Cisco
More informationAdvanced Network Training Multicast
Division of Brocade Advanced Network Training Multicast Larry Mathews Systems Engineer lmathews@brocade.com Training Objectives Session will concentrate on Multicast with emphasis on Protocol Independent
More informationFSOS Multicast Configuration Guide
FSOS Multicast Configuration Guide Contents 1 Configuring IP Multicast-Routing...6 1.1 Overview...6 1.2 Configuration... 6 1.3 Validation... 6 2 Configuring IGMP... 8 2.1 Overview...8 2.2 References...9
More information