Configuring PIM Snooping

Similar documents
Configuring IGMP Snooping for IPv4 Multicast Traffic

Configuring Router-Port Group Management Protocol

IGMP Snooping for IPv4 Multicast Traffic

Configuring IGMP Snooping for IPv4 Multicast Traffic

Configuring PIM snooping

Constraining IP Multicast in a Switched Ethernet Network

Configuring Bidirectional PIM

Constraining IP Multicast in a Switched Ethernet Network

IGMP Proxy. Finding Feature Information. Prerequisites for IGMP Proxy

Configuring IP Multicast Routing

Configuring IP Multicast Routing

Configuring Private Hosts

Configuring IP Multicast Routing

Configuring PIM. Information About PIM. Send document comments to CHAPTER

Configuring VTP. Understanding How VTP Works CHAPTER

Configuring IP Multicast Routing

PIM Configuration. Page 1 of 9

FSOS Multicast Configuration Guide

ASM. Engineering Workshops

Configuring Multicast Routing

FiberstoreOS IPv6 Multicast Configuration Guide

IP Multicast: IGMP Configuration Guide, Cisco IOS Release 12.2SX

Multicast VLAN Registration (MVR)

IP Multicast Load Splitting across Equal-Cost Paths

Configuring IP Multicast over Unidirectional Links

PIM Allow RP. Finding Feature Information. Restrictions for PIM Allow RP

Multicast Communications

IP Multicasting: Explaining Multicast Cisco Systems, Inc. All rights reserved. Cisco Academy

Multicast Does Not Work in the Same VLAN in Catalyst Switches

Customizing IGMP. Finding Feature Information. Last Updated: December 16, 2011

Configuring Cisco IP Phone Support

Configuring MLD Snooping

Exercises to Communication Systems

IP Multicast. Falko Dressler Regionales Rechenzentrum Grundzüge der Datenkommunikation IP Multicast

VRRP Aware PIM with PIM NonDR Join Feature Configuration Example

Implementing Multicast Service Reflection

IP Multicast Optimization: Optimizing PIM Sparse Mode in a Large IP Multicast Deployment

Chapter 24 PIM Commands

IP Multicast: PIM Configuration Guide

Configuring IP Multicast over Unidirectional Links

Configuring Private VLANs

Configuring IGMP Snooping

Module 7 Implementing Multicast

Configuring IGMP Snooping and MVR

Multicast H3C Low-End Ethernet Switches Configuration Examples. Table of Contents

Advanced Network Training Multicast

Customizing IGMP. Finding Feature Information. Last Updated: October 16, 2012

EXAMGOOD QUESTION & ANSWER. Accurate study guides High passing rate! Exam Good provides update free of charge in one year!

Configuring MLD Snooping

This chapter describes how to configure the Cisco ASA to use the multicast routing protocol.

Lab 7-3 Routing IP Multicast with PIM Sparse Mode

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15S

Multicast Protocol Configuration Examples H3C S7500 Series Ethernet Switches Release Table of Contents

Multicast only Fast Re-Route

IP Multicast: IGMP Configuration Guide

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15M&T

IP Multicast: PIM Configuration Guide, Cisco IOS XE Release 3S

IP Multicast: PIM Configuration Guide

IPv6 Multicast: PIM Sparse Mode

Multicast Overview. IP Multicasting: Explaining Multicast. Lesson Cisco Systems, Inc. All rights reserved. Cisco Public. BSCI Module 7 Lesson 1

Load Splitting IP Multicast Traffic over ECMP

Lab 7-1 Implementing IGMP and IGMP Snooping

IPv6 Multicast: PIM Sparse Mode

Multicast IPTV Distribution For Network Operators

Multicast Quick Start Configuration Guide

IP Multicast: PIM Configuration Guide, Cisco IOS Release 15SY

Configuring IGMP Snooping and Filtering

Configuring Flex Links

Configuring Basic IP Multicast

Configuring a Rendezvous Point

Developing IP Muiticast Networks

IP Multicast Technology Overview

Multiple queriers. Here is a little CLI guide on how to setup IGMP snooping:

IP Multicast: Multicast Services Configuration Guide, Cisco IOS XE Release 3S

Multicast only Fast Re-Route

Implementing IPv6 Multicast

IP Multicast. What is multicast?

3. What could you use if you wanted to reduce unnecessary broadcast, multicast, and flooded unicast packets?

IP Multicast: Multicast Optimization Configuration Guide

IP Multicast: Multicast Optimization Configuration Guide, Cisco IOS Release 12.4T

Configuring VLAN ACLs

BASIC MULTICAST TROUBLESHOOTING. Piotr Wojciechowski (CCIE #25543)

VLAN Trunking Protocol (VTP)

Layer 3 IP Multicast Architecture and Design in Cisco ACI Fabric

Configuring Multicast Listener DiscoveryV2 (MLDV2) Snooping. MLD Snooping Overview. MLD Messages. First Published:

IPv6 Multicast: Bootstrap Router

Table of Contents 1 IGMP Configuration 1-1

Configuring SSM. Finding Feature Information. Prerequisites for Configuring SSM

Using AutoQoS. Understanding AutoQoS CHAPTER

Configuring IGMP Snooping and Filtering

Microsoft Network Load Balancing on UCS B Series Servers Deployment Configuration Example

IT Deployment Guide AT-OMNI-512 AT-OMNI-521 AT-OMNI-111 AT-OMNI-112 AT-OMNI-121 AT-OMNI-122. Atlona Manuals OmniStream AT-OMNI-232

MulticastForwardingInformationBaseOverview

IP Multicast Routing Technology Overview

Configuring UDLD. Understanding UDLD CHAPTER

Financial Services Design for High Availability

This feature module describes how to configure basic IP multicast in an IPv6 network.

Implementing IPv6 Multicast

Configuring IEEE 802.1Q Tunneling

Table of Contents 1 IGMP Snooping Configuration 1-1

Transcription:

CHAPTER 41 This chapter describes how to configure protocol independent multicast (PIM) snooping in Cisco IOS Release 12.2SX. For complete syntax and usage information for the commands used in this chapter, see the Cisco IOS Master Command List, at this URL: http://www.cisco.com/en/us/docs/ios/mcl/allreleasemcl/all_book.html Tip For additional information about Cisco Catalyst 6500 Series Switches (including configuration examples and troubleshooting information), see the documents listed on this page: http://www.cisco.com/en/us/products/hw/switches/ps708/tsd_products_support_series_home.html Participate in the Technical Documentation Ideas forum This chapter consists of these sections: Understanding PIM Snooping, page 41-1 Default PIM Snooping Configuration, page 41-4 PIM Snooping Configuration Guidelines and Restrictions, page 41-4, page 41-5 Understanding PIM Snooping In networks where a Layer 2 switch interconnects several routers, such as an Internet exchange point (IXP), the switch floods IP multicast packets on all multicast router ports by default, even if there are no multicast receivers downstream. With PIM snooping enabled, the switch restricts multicast packets for each IP multicast group to only those multicast router ports that have downstream receivers joined to that group. When you enable PIM snooping, the switch learns which multicast router ports need to receive the multicast traffic within a specific VLAN by listening to the PIM hello messages, PIM join and prune messages, and bidirectional PIM designated forwarder-election messages. With Release 12.2(33)SXJ2 and later releases, PIM snooping also constrains multicast traffic to VPLS interfaces. 41-1

Understanding PIM Snooping Chapter 41 To use PIM snooping, you must enable IGMP snooping on the switch. IGMP snooping restricts multicast traffic that exits through the LAN ports to which hosts are connected. IGMP snooping does not restrict traffic that exits through the LAN ports to which one or more multicast routers are connected. The following illustrations show the flow of traffic and flooding that results in networks without PIM snooping enabled and the flow of traffic and traffic restriction when PIM snooping is enabled. Figure 41-1 shows the flow of a PIM join message without PIM snooping enabled. In the figure, the switches flood the PIM join message intended for Router B to all connected routers. \ Figure 41-1 PIM Join Message Flow without PIM Snooping Router C Router D SP network (*, G) PIM join Receiver IGMP join Router A Router B RP Source 99473 Figure 41-2 shows the flow of a PIM join message with PIM snooping enabled. In the figure, the switches restrict the PIM join message and forward it only to the router that needs to receive it (Router B). 41-2

Chapter 41 Understanding PIM Snooping Figure 41-2 PIM Join Message Flow with PIM Snooping Router C Router D SP network (*, G) PIM join Receiver IGMP join Router A Router B RP Source 99474 Figure 41-3 shows the flow of data traffic without PIM snooping enabled. In the figure, the switches flood the data traffic intended for Router A to all connected routers. Figure 41-3 Data Traffic Flow without PIM Snooping Router C Router D SP network G traffic Receiver Router A Router B RP Source Data 99472 Figure 41-4 shows the flow of data traffic with PIM snooping enabled. In the figure, the switches forward the data traffic only to the router that needs to receive it (Router A). 41-3

Default PIM Snooping Configuration Chapter 41 Figure 41-4 Data Traffic Flow with PIM Snooping Router C Router D SP network G traffic Receiver Router A Router B RP Source Data 99475 Default PIM Snooping Configuration PIM snooping is disabled by default. PIM Snooping Configuration Guidelines and Restrictions When configuring PIM snooping, follow these guidelines and restrictions: When you use the PIM-sparse mode (PIM-SM) feature, downstream routers only see traffic if they previously indicated interest through a PIM join or prune message. An upstream router only sees traffic if it was used as an upstream router during the PIM join or prune process. Join or prune messages are not flooded on all router ports but are sent only to the port corresponding to the upstream router mentioned in the payload of the join or prune message. Directly connected sources are supported for bidirectional PIM groups. Traffic from directly connected sources is forwarded to the designated router and designated forwarder for a VLAN. In some cases, a nondesignated router (NDR) can receive a downstream (S, G) join. For source-only networks, the initial unknown traffic is flooded only to the designated routers and designated forwarders. Dense group mode traffic is seen as unknown traffic and is dropped. The AUTO-RP groups (224.0.1.39 and 224.0.1.40) are always flooded. The switch snoops on designated forwarder election and maintains a list of all designated forwarder routers for various RPs for the VLAN. All traffic is sent to all designated forwarders which ensures that bidirectional functionality works properly. PIM snooping and IGMP snooping can be enabled at the same time in a VLAN. Either RGMP or PIM snooping can be enabled in a VLAN but not both. 41-4

Chapter 41 Any non-pimv2 multicast router will receive all traffic. You can enable or disable PIM snooping on a per-vlan basis. All mroute and router information is timed out based on the hold-time indicated in the PIM hello and join/prune control packets. All mroute state and neighbor information is maintained per VLAN. These sections describe how to configure PIM snooping: Enabling PIM Snooping Globally, page 41-5 Enabling PIM Snooping in a VLAN, page 41-5 Disabling PIM Snooping Designated-Router Flooding, page 41-6 Enabling PIM Snooping Globally To enable PIM snooping globally, perform this task: Command Purpose Step 1 Router(config)# ip pim snooping Enables PIM snooping. Router(config)# no ip pim snooping Disables PIM snooping. Step 2 Router(config)# end Exits configuration mode. Step 3 Router# show ip pim snooping Verifies the configuration. This example shows how to enable PIM snooping globally and verify the configuration: Router(config)# ip pim snooping Router(config)# end Router# show ip pim snooping Global runtime mode: Enabled Global admin mode : Enabled Number of user enabled VLANs: 1 User enabled VLANs: 10 Router# You do not need to configure an IP address or IP PIM in order to run PIM snooping. Enabling PIM Snooping in a VLAN When you apply the ip pim snooping command and associated commands on any VLAN interface, the commands continue to function even if the VLAN interface is in shutdown state. 41-5

Chapter 41 To enable PIM snooping in a VLAN, perform this task: Command Purpose Step 1 Router(config)# interface vlan vlan_id Selects a VLAN interface. Step 2 Router(config-if)# ip pim snooping Enables PIM snooping. Router(config-if)# no ip pim snooping Disables PIM snooping. Step 3 Router(config-if)# end Exits configuration mode. Step 4 Router# show ip pim snooping Verifies the configuration. This example shows how to enable PIM snooping on VLAN 10 and verify the configuration: Router# interface vlan 10 Router(config-if)# ip pim snooping Router(config-if)# end Router# show ip pim snooping vlan 10 3 neighbors (0 DR priority incapable, 0 Bi-dir incapable) 6 mroutes, 3 mac entries DR is 10.10.10.4 RP DF Set Router# Disabling PIM Snooping Designated-Router Flooding Do not disable designated-router flooding on switches in a Layer 2 broadcast domain that supports multicast sources. By default, switches that have PIM snooping enabled will flood multicast traffic to the designated router (DR). This method of operation can send unnecessary multicast packets to the designated router. The network must carry the unnecessary traffic, and the designated router must process and drop the unnecessary traffic. To reduce the traffic sent over the network to the designated router, disable designated-router flooding. With designated-router flooding disabled, PIM snooping only passes to the designated-router traffic that is in multicast groups for which PIM snooping receives an explicit join from the link towards the designated router. To disable PIM snooping designated-router flooding, perform this task: Command Purpose Step 1 Router(config)# no ip pim snooping dr-flood Disables PIM snooping designated-router flooding. Step 2 Router(config)# end Exits configuration mode. Step 3 Router# show running-config include dr-flood Verifies the configuration. This example shows how to disable PIM snooping designated-router flooding: Router(config)# no ip pim snooping dr-flood Router(config)# end 41-6

Chapter 41 Tip For additional information about Cisco Catalyst 6500 Series Switches (including configuration examples and troubleshooting information), see the documents listed on this page: http://www.cisco.com/en/us/products/hw/switches/ps708/tsd_products_support_series_home.html Participate in the Technical Documentation Ideas forum 41-7

Chapter 41 41-8