Aruba IP Multicast Configuration Guide

Type
Configuration Guide
HPE FlexFabric 5710 Switch Series
IP Multicast Configuration Guide
Part number: 5200-4986b
Software version: Release 2612 and later
Document version: 6W102-20200310
© Copyright 2020 Hewlett Packard Enterprise Development LP
The information contained herein is subject to change without notice. The only warranties for Hewlett Packard
Enterprise products and services are set forth in the express warranty statements accompanying such
products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett
Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein.
Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or
copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software
Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor’s
standard commercial license.
Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard
Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise
website.
Acknowledgments
Intel®, Itanium®, Pentium®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the
United States and other countries.
Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the
United States and/or other countries.
Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated.
Java and Oracle are registered trademarks of Oracle and/or its affiliates.
UNIX® is a registered trademark of The Open Group.
i
Contents
Multicast overview ············································································ 1
Introduction to multicast ··············································································································· 1
Information transmission techniques ························································································ 1
Multicast features ················································································································ 3
Common notations in multicast ······························································································· 4
Multicast benefits and applications ·························································································· 4
Multicast models ························································································································ 4
IP multicast architecture ·············································································································· 5
Multicast addresses ············································································································· 5
Multicast protocols ··············································································································· 8
Multicast packet forwarding mechanism ························································································ 11
Multicast support for VPNs ········································································································· 11
Introduction to VPN instances ······························································································ 11
Multicast application in VPNs ······························································································· 12
Configuring IGMP snooping ······························································ 13
Overview ································································································································ 13
IGMP snooping ports ········································································································· 13
How IGMP snooping works ································································································· 15
IGMP snooping proxying ····································································································· 16
Protocols and standards ····································································································· 17
IGMP snooping configuration task list ··························································································· 17
IGMP snooping configuration task list for VLANs ······································································ 17
IGMP snooping configuration task list for VSIs ········································································· 18
Configuring basic IGMP snooping features ···················································································· 19
Enabling IGMP snooping ···································································································· 19
Specifying an IGMP snooping version ···················································································· 20
Setting the maximum number of IGMP snooping forwarding entries ············································· 21
Configuring static multicast MAC address entries ····································································· 21
Setting the IGMP last member query interval ··········································································· 22
Configuring IGMP snooping port features ······················································································ 23
Setting aging timers for dynamic ports ··················································································· 23
Configuring static ports ······································································································· 24
Configuring a port as a simulated member host ······································································· 24
Enabling fast-leave processing ····························································································· 25
Disabling a port from becoming a dynamic router port ······························································· 25
Configuring the IGMP snooping querier ························································································ 26
Configuration prerequisites ·································································································· 26
Enabling the IGMP snooping querier ····················································································· 26
Enabling IGMP snooping querier election ··············································································· 27
Configuring parameters for IGMP general queries and responses ················································ 27
Enabling IGMP snooping proxying ······························································································· 28
Configuring parameters for IGMP messages ·················································································· 29
Configuration prerequisites ·································································································· 29
Configuring source IP addresses for IGMP messages ······························································· 29
Setting the 802.1p priority for IGMP messages ········································································ 31
Configuring IGMP snooping policies ····························································································· 31
Configuring a multicast group policy ······················································································ 31
Enabling multicast source port filtering ··················································································· 32
Enabling dropping unknown multicast data ············································································· 33
Enabling IGMP report suppression ························································································ 33
Setting the maximum number of multicast groups on a port ························································ 33
Enabling multicast group replacement ···················································································· 34
Enabling host tracking ········································································································ 35
Configuring an IGMP snooping user access control policy ·························································· 35
Setting the DSCP value for outgoing IGMP snooping protocol packets ················································ 35
Displaying and maintaining IGMP snooping ··················································································· 36
ii
IGMP snooping configuration examples ························································································ 37
Group policy and simulated joining configuration example(for VLANs) ·········································· 37
Static port configuration example (for VLANs) ·········································································· 39
IGMP snooping querier configuration example (for VLANs) ························································ 41
IGMP snooping proxying configuration example (for VLANs) ······················································ 44
VLAN-based IGMP snooping access policy configuration example ·············································· 46
IGMP snooping configuration example (for VXLANs) ································································ 48
Troubleshooting IGMP snooping ································································································· 52
Layer 2 multicast forwarding cannot function ··········································································· 52
Multicast group policy does not work ····················································································· 53
Configuring PIM snooping ································································ 54
Overview ································································································································ 54
Configuring PIM snooping ·········································································································· 55
Displaying and maintaining PIM snooping ····················································································· 56
PIM snooping configuration example ···························································································· 56
Network requirements ········································································································ 56
Configuration procedure ····································································································· 57
Verifying the configuration ··································································································· 59
Troubleshooting PIM snooping ···································································································· 60
PIM snooping does not work on a Layer 2 device ····································································· 60
Configuring multicast VLANs ···························································· 61
Overview ································································································································ 61
Multicast VLAN configuration task list ··························································································· 63
Configuring a sub-VLAN-based multicast VLAN ············································································· 63
Configuration prerequisites ·································································································· 63
Configuration restrictions and guidelines ················································································ 63
Configuration procedure ····································································································· 64
Configuring a port-based multicast VLAN ······················································································ 64
Configuration prerequisites ·································································································· 64
Configuring user port attributes ···························································································· 64
Assigning user ports to a multicast VLAN ··············································································· 65
Setting the maximum number of multicast VLAN forwarding entries ···················································· 65
Displaying and maintaining multicast VLANs ·················································································· 66
Multicast VLAN configuration examples ························································································ 66
Sub-VLAN-based multicast VLAN configuration example ··························································· 66
Port-based multicast VLAN configuration example ···································································· 69
Configuring multicast routing and forwarding ········································ 73
Overview ································································································································ 73
RPF check mechanism ······································································································· 73
Static multicast routes ········································································································ 75
Multicast forwarding across unicast subnets ············································································ 76
Mtrace ···························································································································· 77
Multicast routing and forwarding configuration task list ····································································· 78
Enabling IP multicast routing ······································································································ 78
Configuring multicast routing and forwarding ·················································································· 78
Configuring static multicast routes ························································································· 78
Specifying the longest prefix match principle ··········································································· 79
Configuring multicast load splitting ························································································ 79
Configuring a multicast forwarding boundary ··········································································· 80
Enabling multicast forwarding between sub-VLANs of a super VLAN ·················································· 80
Using mtrace to trace a multicast path ·························································································· 81
Using mtrace1 to trace a multicast path ·················································································· 81
Using mtrace2 to trace a multicast path ·················································································· 81
Setting the maximum number of cached unknown multicast packets ··················································· 81
Displaying and maintaining multicast routing and forwarding ····························································· 82
Multicast routing and forwarding configuration examples ·································································· 83
Changing an RPF route ······································································································ 83
Creating an RPF route ········································································································ 85
Multicast forwarding over a GRE tunnel ·················································································· 87
iii
Troubleshooting multicast routing and forwarding············································································ 90
Static multicast route failure ································································································· 90
Configuring IGMP ··········································································· 91
Overview ································································································································ 91
IGMPv1 overview ·············································································································· 91
IGMPv2 enhancements ······································································································ 92
IGMPv3 enhancements ······································································································ 93
IGMP SSM mapping ·········································································································· 94
IGMP proxying ·················································································································· 95
IGMP support for VPNs ······································································································ 96
Protocols and standards ····································································································· 96
IGMP configuration task list ········································································································ 97
Configuring basic IGMP features ································································································· 97
Enabling IGMP ················································································································· 97
Specifying an IGMP version ································································································· 98
Configuring a static group member ························································································ 98
Configuring a multicast group policy ······················································································ 98
Adjusting IGMP performance ······································································································ 99
Configuring IGMP query and response parameters ··································································· 99
Enabling fast-leave processing ··························································································· 101
Configuring IGMP SSM mappings ····························································································· 102
Configuration prerequisites ································································································ 102
Configuration procedure ··································································································· 102
Configuring IGMP proxying ······································································································ 102
Configuration prerequisites ································································································ 102
Enabling IGMP proxying ··································································································· 102
Enabling multicast forwarding on a non-querier interface ························································· 103
Configuring multicast load splitting on an IGMP proxy ····························································· 103
Enabling IGMP NSR ··············································································································· 104
Setting the DSCP value for outgoing IGMP protocol packets ··························································· 104
Displaying and maintaining IGMP ······························································································ 104
IGMP configuration examples ··································································································· 105
Basic IGMP features configuration example ·········································································· 105
IGMP SSM mapping configuration example ·········································································· 107
IGMP proxying configuration example ·················································································· 110
Troubleshooting IGMP ············································································································ 112
No membership information on the receiver-side router ··························································· 112
Inconsistent membership information on the routers on the same subnet ···································· 112
Configuring PIM ··········································································· 113
Overview ······························································································································ 113
PIM-DM overview ············································································································ 113
PIM-SM overview ············································································································ 115
BIDIR-PIM overview ········································································································· 121
Administrative scoping overview ························································································· 124
PIM-SSM overview ·········································································································· 126
Relationship among PIM protocols ······················································································ 127
PIM support for VPNs ······································································································· 128
Protocols and standards ··································································································· 128
Configuring PIM-DM ··············································································································· 128
PIM-DM configuration task list ···························································································· 129
Configuration prerequisites ································································································ 129
Enabling PIM-DM ············································································································ 129
Enabling the state refresh feature ······················································································· 129
Configuring state refresh parameters ··················································································· 130
Configuring the PIM-DM graft retry timer ·············································································· 130
Configuring PIM-SM ··············································································································· 131
PIM-SM configuration task list ···························································································· 131
Configuration prerequisites ································································································ 131
Enabling PIM-SM ············································································································ 131
Configuring an RP ··········································································································· 132
iv
Configuring a BSR ··········································································································· 134
Configuring multicast source registration ·············································································· 136
Configuring the switchover to SPT ······················································································ 137
Configuring BIDIR-PIM ············································································································ 137
BIDIR-PIM configuration task list ························································································ 137
Configuration prerequisites ································································································ 138
Enabling BIDIR-PIM ········································································································· 138
Configuring an RP ··········································································································· 139
Configuring a BSR ··········································································································· 141
Configuring PIM-SSM ············································································································· 143
PIM-SSM configuration task list ·························································································· 143
Configuration prerequisites ································································································ 143
Enabling PIM-SM ············································································································ 143
Configuring the SSM group range ······················································································· 144
Configuring common PIM features ····························································································· 144
Configuration task list ······································································································· 144
Configuration prerequisites ································································································ 144
Configuring a multicast source policy ··················································································· 145
Configuring a PIM hello policy ···························································································· 145
Configuring PIM hello message options················································································ 145
Configuring common PIM timers ························································································· 147
Setting the maximum size of a join or prune message ····························································· 148
Enabling BFD for PIM ······································································································· 148
Enabling PIM passive mode ······························································································ 149
Enabling PIM NSR ··········································································································· 149
Enabling SNMP notifications for PIM ··················································································· 150
Setting the DSCP value for outgoing PIM protocol packets ······················································· 150
Displaying and maintaining PIM ································································································ 150
PIM configuration examples ····································································································· 151
PIM-DM configuration example ·························································································· 151
PIM-SM non-scoped zone configuration example ··································································· 154
PIM-SM admin-scoped zone configuration example ································································ 157
BIDIR-PIM configuration example ······················································································· 162
PIM-SSM configuration example ························································································· 166
Troubleshooting PIM··············································································································· 169
A multicast distribution tree cannot be correctly built ······························································· 169
Multicast data is abnormally terminated on an intermediate router ············································· 170
An RP cannot join an SPT in PIM-SM ·················································································· 170
An RPT cannot be built or multicast source registration fails in PIM-SM ······································ 170
Configuring MSDP ········································································ 172
Overview ······························································································································ 172
How MSDP works ··········································································································· 172
MSDP support for VPNs ··································································································· 177
Protocols and standards ··································································································· 177
MSDP configuration task list ····································································································· 178
Configuring basic MSDP features ······························································································ 178
Configuration prerequisites ································································································ 178
Enabling MSDP ·············································································································· 178
Specifying an MSDP peer ································································································· 179
Configuring a static RPF peer ···························································································· 179
Configuring an MSDP peering connection ··················································································· 179
Configuration prerequisites ································································································ 179
Configuring a description for an MSDP peer ·········································································· 180
Configuring an MSDP mesh group ······················································································ 180
Controlling MSDP peering connections ················································································ 180
Configuring SA message-related parameters ··············································································· 181
Configuration prerequisites ································································································ 181
Enabling multicast data encapsulation in SA messages ··························································· 181
Configuring the originating RP of SA messages ····································································· 182
Configuring SA request messages ······················································································ 182
Configuring SA message policies ························································································ 183
v
Configuring the SA cache mechanism ················································································· 184
Enabling MSDP NSR ·············································································································· 184
Setting the DSCP value for outgoing MSDP protocol packets ·························································· 184
Displaying and maintaining MSDP ····························································································· 185
MSDP configuration examples ·································································································· 185
PIM-SM inter-domain multicast configuration ········································································· 185
Inter-AS multicast configuration by leveraging static RPF peers ················································ 190
Anycast RP configuration ·································································································· 194
SA message filtering configuration ······················································································ 198
Troubleshooting MSDP ··········································································································· 201
MSDP peers stay in disabled state ······················································································ 202
No SA entries exist in the router's SA message cache ····························································· 202
No exchange of locally registered (S, G) entries between RPs ·················································· 203
Configuring MLD snooping ····························································· 204
Overview ······························································································································ 204
MLD snooping ports ········································································································· 204
How MLD snooping works ································································································· 206
MLD snooping proxying ···································································································· 207
Protocols and standards ··································································································· 208
MLD snooping configuration task list ·························································································· 208
MLD snooping configuration task list for VLANs ····································································· 208
MLD snooping configuration task list for VSIs ········································································ 209
Configuring basic MLD snooping features ··················································································· 210
Enabling MLD snooping ···································································································· 210
Specifying an MLD snooping version ··················································································· 211
Setting the maximum number of MLD snooping forwarding entries············································· 212
Configuring static IPv6 multicast MAC address entries ···························································· 212
Setting the MLD last listener query interval ··········································································· 213
Configuring MLD snooping port features ····················································································· 214
Setting aging timers for dynamic ports ················································································· 214
Configuring static ports ····································································································· 215
Configuring a port as a simulated member host ····································································· 215
Enabling fast-leave processing ··························································································· 216
Disabling a port from becoming a dynamic router port ····························································· 216
Configuring the MLD snooping querier ························································································ 217
Configuration prerequisites ································································································ 217
Enabling the MLD snooping querier ····················································································· 217
Enabling MLD snooping querier election ··············································································· 218
Configuring parameters for MLD general queries and responses ··············································· 219
Enabling MLD snooping proxying ······························································································ 219
Configuring parameters for MLD messages ················································································· 220
Configuration prerequisites ································································································ 220
Configuring source IPv6 addresses for MLD messages ··························································· 220
Setting the 802.1p priority for MLD messages ········································································ 222
Configuring MLD snooping policies ···························································································· 223
Configuring an IPv6 multicast group policy ············································································ 223
Enabling IPv6 multicast source port filtering ·········································································· 224
Enabling dropping unknown IPv6 multicast data ····································································· 224
Enabling MLD report suppression ······················································································· 225
Setting the maximum number of IPv6 multicast groups on a port ··············································· 225
Enabling IPv6 multicast group replacement ··········································································· 225
Enabling host tracking ······································································································ 226
Configuring an MLD snooping user access control policy ························································· 227
Setting the DSCP value for outgoing MLD snooping protocol packets ··············································· 227
Displaying and maintaining MLD snooping ·················································································· 227
MLD snooping configuration examples ······················································································· 228
IPv6 group policy and simulated joining configuration example (for VLANs) ································· 228
Static port configuration example (for VLANs) ········································································ 230
MLD snooping querier configuration example (for VLANs) ························································ 233
MLD snooping proxying configuration example (for VLANs) ······················································ 235
VLAN-based MLD snooping access policy configuration example ·············································· 237
vi
MLD snooping configuration example (for VXLANs) ································································ 239
Troubleshooting MLD snooping ································································································· 244
Layer 2 multicast forwarding cannot function ········································································· 244
IPv6 multicast group policy does not work ············································································· 245
Configuring IPv6 PIM snooping ······················································· 246
Overview ······························································································································ 246
Configuring IPv6 PIM snooping ································································································· 247
Displaying and maintaining IPv6 PIM snooping ············································································ 248
IPv6 PIM snooping configuration example ··················································································· 248
Network requirements ······································································································ 248
Configuration procedure ··································································································· 249
Verifying the configuration ································································································· 251
Troubleshooting IPv6 PIM snooping ··························································································· 252
IPv6 PIM snooping does not work on a Layer 2 device ···························································· 252
Configuring IPv6 multicast VLANs···················································· 253
Overview ······························································································································ 253
IPv6 multicast VLAN configuration task list ·················································································· 255
Configuring a sub-VLAN-based IPv6 multicast VLAN ····································································· 255
Configuration prerequisites ································································································ 255
Configuration restrictions and guidelines ·············································································· 255
Configuration procedure ··································································································· 255
Configuring a port-based IPv6 multicast VLAN ············································································· 256
Configuration prerequisites ································································································ 256
Configuring user port attributes ·························································································· 256
Assigning user ports to an IPv6 multicast VLAN ····································································· 256
Setting the maximum number of IPv6 multicast VLAN forwarding entries ··········································· 257
Displaying and maintaining IPv6 multicast VLANs ········································································· 258
IPv6 multicast VLAN configuration examples ··············································································· 258
Sub-VLAN-based IPv6 multicast VLAN configuration example ·················································· 258
Port-based IPv6 multicast VLAN configuration example ··························································· 261
Configuring IPv6 multicast routing and forwarding ······························· 265
Overview ······························································································································ 265
RPF check mechanism ····································································································· 265
IPv6 multicast forwarding across IPv6 unicast subnets ···························································· 267
IPv6 mtrace ···················································································································· 267
IPv6 multicast routing and forwarding configuration task list ···························································· 268
Enabling IPv6 multicast routing ································································································· 268
Configuring IPv6 multicast routing and forwarding ········································································· 268
Specifying the longest prefix match principle ········································································· 268
Configuring IPv6 multicast load splitting ··············································································· 269
Configuring an IPv6 multicast forwarding boundary ································································· 269
Enabling IPv6 multicast forwarding between sub-VLANs of a super VLAN ··································· 269
Using mtrace2 to trace an IPv6 multicast path ·············································································· 270
Setting the maximum number of cached unknown IPv6 multicast packets ·········································· 270
Displaying and maintaining IPv6 multicast routing and forwarding ···················································· 271
IPv6 multicast forwarding over a GRE tunnel configuration example ················································· 272
Configuring MLD ·········································································· 276
Overview ······························································································································ 276
How MLDv1 works ··········································································································· 276
MLDv2 enhancements ······································································································ 278
MLD SSM mapping ·········································································································· 279
MLD proxying ················································································································· 280
MLD support for VPNs ······································································································ 280
Protocols and standards ··································································································· 280
MLD configuration task list ······································································································· 281
Configuring basic MLD features ································································································ 281
Enabling MLD ················································································································· 281
Specifying an MLD version ································································································ 282
vii
Configuring a static group member ······················································································ 282
Configuring an IPv6 multicast group policy ············································································ 283
Adjusting MLD performance ····································································································· 283
Configuring MLD query and response parameters ·································································· 283
Enabling fast-leave processing ··························································································· 285
Configuring MLD SSM mappings ······························································································· 286
Configuration prerequisites ································································································ 286
Configuration procedure ··································································································· 286
Configuring MLD proxying ········································································································ 286
Configuration prerequisites ································································································ 286
Enabling MLD proxying ····································································································· 286
Enabling IPv6 multicast forwarding on a non-querier interface ··················································· 287
Configuring IPv6 multicast load splitting on an MLD proxy ························································ 287
Enabling MLD NSR ················································································································ 288
Setting the DSCP value for outgoing MLD protocol packets ···························································· 288
Displaying and maintaining MLD ······························································································· 288
MLD configuration examples ···································································································· 289
Basic MLD features configuration examples ·········································································· 289
MLD SSM mapping configuration example ············································································ 291
MLD proxying configuration example ··················································································· 294
Troubleshooting MLD ·············································································································· 296
No member information exists on the receiver-side router ························································ 296
Inconsistent membership information on the routers on the same subnet ···································· 296
Configuring IPv6 PIM ···································································· 297
Overview ······························································································································ 297
IPv6 PIM-DM overview ····································································································· 297
IPv6 PIM-SM overview ····································································································· 299
IPv6 BIDIR-PIM overview ·································································································· 305
IPv6 administrative scoping overview··················································································· 308
IPv6 PIM-SSM overview ··································································································· 310
Relationship among IPv6 PIM protocols ··············································································· 311
IPv6 PIM support for VPNs ································································································ 312
Protocols and standards ··································································································· 312
Configuring IPv6 PIM-DM ········································································································ 312
IPv6 PIM-DM configuration task list ····················································································· 313
Configuration prerequisites ································································································ 313
Enabling IPv6 PIM-DM ····································································································· 313
Enabling the state refresh feature ······················································································· 313
Configuring state refresh parameters ··················································································· 314
Configuring the IPv6 PIM-DM graft retry timer ········································································ 314
Configuring IPv6 PIM-SM ········································································································ 315
IPv6 PIM-SM configuration task list ····················································································· 315
Configuration prerequisites ································································································ 315
Enabling IPv6 PIM-SM ····································································································· 315
Configuring an RP ··········································································································· 316
Configuring a BSR ··········································································································· 318
Configuring IPv6 multicast source registration ······································································· 320
Configuring the switchover to SPT ······················································································ 321
Configuring IPv6 BIDIR-PIM ····································································································· 321
IPv6 BIDIR-PIM configuration task list ·················································································· 321
Configuration prerequisites ································································································ 322
Enabling IPv6 BIDIR-PIM ·································································································· 322
Configuring an RP ··········································································································· 322
Configuring a BSR ··········································································································· 324
Configuring IPv6 PIM-SSM ······································································································ 326
IPv6 PIM-SSM configuration task list ··················································································· 326
Configuration prerequisites ································································································ 327
Enabling IPv6 PIM-SM ····································································································· 327
Configuring the IPv6 SSM group range ················································································ 327
Configuring common IPv6 PIM features ······················································································ 328
Configuration task list ······································································································· 328
viii
Configuration prerequisites ································································································ 328
Configuring an IPv6 multicast source policy ·········································································· 328
Configuring an IPv6 PIM hello policy···················································································· 329
Configuring IPv6 PIM hello message options ········································································· 329
Configuring common IPv6 PIM timers ·················································································· 331
Setting the maximum size of a join or prune message ····························································· 332
Enabling BFD for IPv6 PIM ································································································ 332
Enabling IPv6 PIM passive mode ························································································ 333
Enabling IPv6 PIM NSR ···································································································· 333
Enabling SNMP notifications for IPv6 PIM ············································································· 333
Setting the DSCP value for outgoing IPv6 PIM protocol packets ················································ 334
Displaying and maintaining IPv6 PIM ························································································· 334
IPv6 PIM configuration examples ······························································································ 335
IPv6 PIM-DM configuration example ···················································································· 335
IPv6 PIM-SM non-scoped zone configuration example ···························································· 338
IPv6 PIM-SM admin-scoped zone configuration example ························································· 341
IPv6 BIDIR-PIM configuration example ················································································ 347
IPv6 PIM-SSM configuration example ·················································································· 351
Troubleshooting IPv6 PIM ········································································································ 354
A multicast distribution tree cannot be correctly built ······························································· 354
IPv6 multicast data is abnormally terminated on an intermediate router ······································· 354
An RP cannot join an SPT in IPv6 PIM-SM ··········································································· 355
An RPT cannot be built or IPv6 multicast source registration fails in IPv6 PIM-SM ························· 355
Document conventions and icons ···················································· 356
Conventions ························································································································· 356
Network topology icons ··········································································································· 357
Support and other resources ·························································· 358
Accessing Hewlett Packard Enterprise Support ············································································ 358
Accessing updates ················································································································· 358
Websites ······················································································································· 359
Customer self repair ········································································································· 359
Remote support ·············································································································· 359
Documentation feedback ·································································································· 359
Index ························································································· 361
1
Multicast overview
Introduction to multicast
As a technique that coexists with unicast and broadcast, the multicast technique effectively
addresses the issue of point-to-multipoint data transmission. By enabling high-efficiency
point-to-multipoint data transmission over a network, multicast greatly saves network bandwidth and
reduces network load.
By using multicast technology, a network operator can easily provide bandwidth-critical and
time-critical information services. These services include live webcasting, Web TV, distance learning,
telemedicine, Web radio, and real-time video conferencing.
Information transmission techniques
The information transmission techniques include unicast, broadcast, and multicast.
Unicast
In unicast transmission, the information source must send a separate copy of information to each
host that needs the information.
Figure 1 Unicast transmission
In Figure 1, Host B, Host D, and Host E need the information. A separate transmission channel must
be established from the information source to each of these hosts.
In unicast transmission, the traffic transmitted over the network is proportional to the number of hosts
that need the information. If a large number of hosts need the information, the information source
must send a separate copy of the same information to each of these hosts. Sending many copies
can place a tremendous pressure on the information source and the network bandwidth.
Unicast is not suitable for batch transmission of information.
Source
Receiver
Receiver
Receiver
Host A
Host B
Host C
Host D
Host E
Packets for Host B
Packets for Host D
Packets for Host E
IP network
2
Broadcast
In broadcast transmission, the information source sends information to all hosts on the subnet, even
if some hosts do not need the information.
Figure 2 Broadcast transmission
In Figure 2, only Host B, Host D, and Host E need the information. If the information is broadcast to
the subnet, Host A and Host C also receive it. In addition to information security issues, broadcasting
to hosts that do not need the information also causes traffic flooding on the same subnet.
Broadcast is disadvantageous in transmitting data to specific hosts. Moreover, broadcast
transmission is a significant waste of network resources.
Multicast
Multicast provides point-to-multipoint data transmissions with the minimum network consumption.
When some hosts on the network need multicast information, the information sender, or multicast
source, sends only one copy of the information. Multicast distribution trees are built through multicast
routing protocols, and the packets are replicated only on nodes where the trees branch.
3
Figure 3 Multicast transmission
In Figure 3, the multicast source sends only one copy of the information to a multicast group. Host B,
Host D, and Host E, which are information receivers, must join the multicast group. The routers on
the network duplicate and forward the information based on the distribution of the group members.
Finally, the information is correctly delivered to Host B, Host D, and Host E.
To summarize, multicast has the following advantages:
• Advantages over unicast—Multicast data is replicated and distributed until it flows to the
farthest-possible node from the source. The increase of receiver hosts will not remarkably
increase the load of the source or the usage of network resources.
• Advantages over broadcast—Multicast data is sent only to the receivers that need it. This
saves network bandwidth and enhances network security. In addition, multicast data is not
confined to the same subnet.
Multicast features
• A multicast group is a multicast receiver set identified by an IP multicast address. Hosts must
join a multicast group to become members of the multicast group before they receive the
multicast data addressed to that multicast group. Typically, a multicast source does not need to
join a multicast group.
• A multicast source is an information sender. It can send data to multiple multicast groups at the
same time. Multiple multicast sources can send data to the same multicast group at the same
time.
• The group memberships are dynamic. Hosts can join or leave multicast groups at any time.
Multicast groups are not subject to geographic restrictions.
• Multicast routers or Layer 3 multicast devices are routers or Layer 3 switches that support Layer
3 multicast. They provide multicast routing and manage multicast group memberships on stub
subnets with attached group members. A multicast router itself can be a multicast group
member.
For a better understanding of the multicast concept, you can compare multicast transmission to the
transmission of TV programs.
4
Table 1 Comparing TV program transmission and multicast transmission
TV program transmission Multicast transmission
A TV station transmits a TV program through a
channel.
A multicast source sends multicast data to a multicast
group.
A user tunes the TV set to the channel. A receiver joins the multicast group.
The user starts to watch the TV program
transmitted by the TV station on the channel.
The receiver starts to receive the multicast data sent by
the source to the multicast group.
The user turns off the TV set or tunes to another
channel.
The receiver leaves the multicast group or joins another
group.
Common notations in multicast
The following notations are commonly used in multicast transmission:
• (*, G)—Rendezvous point tree (RPT), or a multicast packet that any multicast source sends to
multicast group G. The asterisk (*) represents any multicast source, and "G" represents a
specific multicast group.
• (S, G)—Shortest path tree (SPT), or a multicast packet that multicast source "S" sends to
multicast group "G." "S" represents a specific multicast source, and "G" represents a specific
multicast group.
For more information about the concepts RPT and SPT, see "Configuring PIM" and "Configuring
IPv6 PIM."
Multicast benefits and applications
Multicast benefits
• Enhanced efficiency—Reduces the processor load of information source servers and network
devices.
• Optimal performance—Reduces redundant traffic.
• Distributed application—Enables point-to-multipoint applications at the price of minimum
network resources.
Multicast applications
• Multimedia and streaming applications, such as Web TV, Web radio, and real-time video/audio
conferencing
• Communication for training and cooperative operations, such as distance learning and
telemedicine
• Data warehouse and financial applications (stock quotes)
• Any other point-to-multipoint application for data distribution
Multicast models
Based on how the receivers treat the multicast sources, the multicast models include any-source
multicast (ASM), source-filtered multicast (SFM), and source-specific multicast (SSM).
5
ASM model
In the ASM model, any multicast sources can send information to a multicast group. Receivers can
join a multicast group and get multicast information addressed to that multicast group from any
multicast sources. In this model, receivers do not know the positions of the multicast sources in
advance.
SFM model
The SFM model is derived from the ASM model. To a multicast source, the two models appear to
have the same multicast membership architecture.
The SFM model functionally extends the ASM model. The upper-layer software checks the source
address of received multicast packets and permits or denies multicast traffic from specific sources.
The receivers obtain the multicast data from only part of the multicast sources. To a receiver,
multicast sources are not all valid, but are filtered.
SSM model
The SSM model provides a transmission service that enables multicast receivers to specify the
multicast sources in which they are interested.
In the SSM model, receivers have already determined the locations of the multicast sources. This is
the main difference between the SSM model and the ASM model. In addition, the SSM model uses a
different multicast address range than the ASM/SFM model. Dedicated multicast forwarding paths
are established between receivers and the specified multicast sources.
IP multicast architecture
IP multicast addresses the following issues:
• Where should the multicast source transmit information to? (Multicast addressing.)
• What receivers exist on the network? (Host registration.)
• Where is the multicast source that will provide data to the receivers? (Multicast source
discovery.)
• How is the information transmitted to the receivers? (Multicast routing.)
IP multicast is an end-to-end service. The multicast architecture involves the following parts:
• Addressing mechanism—A multicast source sends information to a group of receivers
through a multicast address.
• Host registration—Receiver hosts can join and leave multicast groups dynamically. This
mechanism is the basis for management of group memberships.
• Multicast routing—A multicast distribution tree (a forwarding path tree for multicast data on the
network) is constructed for delivering multicast data from a multicast source to receivers.
• Multicast applications—A software system that supports multicast applications, such as video
conferencing, must be installed on multicast sources and receiver hosts. The TCP/IP stack
must support reception and transmission of multicast data.
Multicast addresses
IP multicast addresses
• IPv4 multicast addresses:
IANA assigned the Class D address block (224.0.0.0 to 239.255.255.255) to IPv4 multicast.
6
Table 2 Class D IP address blocks and description
Address block Description
224.0.0.0 to 224.0.0.255
Reserved permanent group addresses. The IP address 224.0.0.0
is reserved. Other IP addresses can be used by routing protocols
and for topology searching, protocol maintenance, and so
on. Table 3 lists common permanent group addresses. A packet
destined for an address in this block will not be forwarded beyond
the local subnet regardless of the TTL value in the IP header.
224.0.1.0 to 238.255.255.255
Globally scoped group addresses. This block includes the
following types of designated group addresses:
• 232.0.0.0/8—SSM group addresses.
• 233.0.0.0/8—Glop group addresses.
239.0.0.0 to 239.255.255.255
Administratively scoped multicast addresses. These addresses
are considered locally unique rather than globally unique. You can
reuse them in domains administered by different organizations
without causing conflicts. For more information, see RFC 2365.
NOTE:
Glop is a mechanism for assigning multicast addresses between different ASs. By filling an AS
number into the middle two bytes of 233.0.0.0, you get 255 multicast addresses for that AS. For more
information, see RFC 2770.
Table 3 Common permanent multicast group addresses
Address Description
224.0.0.1 All systems on this subnet, including hosts and routers.
224.0.0.2 All multicast routers on this subnet.
224.0.0.3 Unassigned.
224.0.0.4 DVMRP routers.
224.0.0.5 OSPF routers.
224.0.0.6 OSPF designated routers and backup designated routers.
224.0.0.7 Shared Tree (ST) routers.
224.0.0.8 ST hosts.
224.0.0.9 RIPv2 routers.
224.0.0.11 Mobile agents.
224.0.0.12 DHCP server/relay agent.
224.0.0.13 All Protocol Independent Multicast (PIM) routers.
224.0.0.14 RSVP encapsulation.
224.0.0.15 All Core-Based Tree (CBT) routers.
224.0.0.16 Designated SBM.
224.0.0.17 All SBMs.
224.0.0.18 VRRP.
• IPv6 multicast addresses:
7
Figure 4 IPv6 multicast format
The following describes the fields of an IPv6 multicast address:
{ 0xFF—The most significant eight bits are 11111111.
{ Flags—The Flags field contains four bits.
Figure 5 Flags field format
Table 4 Flags field description
Bit Description
0 Reserved, set to 0.
R
• When set to 0, this address is an IPv6 multicast address
without an embedded RP address.
• When set to 1, this address is an IPv6 multicast address with
an embedded RP address. (The P and T bits must also be set
to 1.)
P
• When set to 0, this address is an IPv6 multicast address not
based on a unicast prefix.
• When set to 1, this address is an IPv6 multicast address
based on a unicast prefix. (The T bit must also be set to 1.)
T
• When set to 0, this address is an IPv6 multicast address
permanently-assigned by IANA.
• When set to 1, this address is a transient or dynamically
assigned IPv6 multicast address.
{ Scope—The Scope field contains four bits, which represent the scope of the IPv6
internetwork for which the multicast traffic is intended.
Table 5 Values of the Scope field
Value Meaning
0, F Reserved.
1 Interface-local scope.
2 Link-local scope.
3 Subnet-local scope.
4 Admin-local scope.
5 Site-local scope.
6, 7, 9 through D Unassigned.
8 Organization-local scope.
E Global scope.
8
{ Group ID—The Group ID field contains 112 bits. It uniquely identifies an IPv6 multicast
group in the scope that the Scope field defines.
Ethernet multicast MAC addresses
• IPv4 multicast MAC addresses:
As defined by IANA, the most significant 24 bits of an IPv4 multicast MAC address are
0x01005E. Bit 25 is 0, and the other 23 bits are the least significant 23 bits of an IPv4 multicast
address.
Figure 6 IPv4-to-MAC address mapping
The most significant four bits of an IPv4 multicast address are fixed at 1110. In an IPv4-to-MAC
address mapping, five bits of the IPv4 multicast address are lost. As a result, 32 IPv4 multicast
addresses are mapped to the same IPv4 multicast MAC address. A device might receive
unwanted multicast data at Layer 2 processing, which needs to be filtered by the upper layer.
• IPv6 multicast MAC addresses:
As defined by IANA, the most significant 16 bits of an IPv6 multicast MAC address are 0x3333.
The least significant 32 bits are mapped from the least significant 32 bits of an IPv6 multicast
address. Therefore, the problem of duplicate IPv6-to-MAC address mapping also arises like
IPv4-to-MAC address mapping.
Figure 7 IPv6-to-MAC address mapping
IMPORTANT:
Because of the duplicate mapping from multicast IP address to multicast MAC address, the device
might inadvertently send multicast protocol packets as multicast data in Layer 2 forwarding. To avoid
this, do not use the IP multicast addresses that are mapped to multicast MAC addresses
0100-5E00-00xx and 3333-0000-00xx (where "x" represents any hexadecimal number from 0 to F).
Multicast protocols
Multicast protocols include the following categories:
9
• Layer 3 and Layer 2 multicast protocols:
{ Layer 3 multicast refers to IP multicast operating at the network layer.
Layer 3 multicast protocols—IGMP, MLD, PIM, IPv6 PIM, MSDP, MBGP, and IPv6
MBGP.
{ Layer 2 multicast refers to IP multicast operating at the data link layer.
Layer 2 multicast protocols—IGMP snooping, MLD snooping, PIM snooping, IPv6 PIM
snooping, multicast VLAN, and IPv6 multicast VLAN.
• IPv4 and IPv6 multicast protocols:
{ For IPv4 networks—IGMP snooping, PIM snooping, multicast VLAN, IGMP, PIM, MSDP,
and MBGP.
{ For IPv6 networks—MLD snooping, IPv6 PIM snooping, IPv6 multicast VLAN, MLD, IPv6
PIM, and IPv6 MBGP.
This section provides only general descriptions about applications and functions of the Layer 2 and
Layer 3 multicast protocols in a network. For more information about these protocols, see the related
chapters.
Layer 3 multicast protocols
In Figure 8, Layer 3 multicast protocols include multicast group management protocols and multicast
routing protocols.
Figure 8 Positions of Layer 3 multicast protocols
• Multicast group management protocols:
Internet Group Management Protocol (IGMP) and Multicast Listener Discovery (MLD) protocol
are multicast group management protocols. Typically, they run between hosts and Layer 3
multicast devices that directly connect to the hosts to establish and maintain multicast group
memberships.
• Multicast routing protocols:
A multicast routing protocol runs on Layer 3 multicast devices to establish and maintain
multicast routes and correctly and efficiently forward multicast packets. Multicast routes
constitute loop-free data transmission paths (also known as multicast distribution trees) from a
data source to multiple receivers.
In the ASM model, multicast routes include intra-domain routes and inter-domain routes.
{ An intra-domain multicast routing protocol discovers multicast sources and builds multicast
distribution trees within an AS to deliver multicast data to receivers. Among a variety of
10
mature intra-domain multicast routing protocols, PIM is most widely used. Based on the
forwarding mechanism, PIM has dense mode (often referred to as PIM-DM) and sparse
mode (often referred to as PIM-SM).
{ An inter-domain multicast routing protocol is used for delivering multicast information
between two ASs. So far, mature solutions include Multicast Source Discovery Protocol
(MSDP) and MBGP. MSDP propagates multicast source information among different ASs.
MBGP is an extension of the MP-BGP for exchanging multicast routing information among
different ASs.
For the SSM model, multicast routes are not divided into intra-domain routes and inter-domain
routes. Because receivers know the positions of the multicast sources, channels established
through PIM-SM are sufficient for the transport of multicast information.
Layer 2 multicast protocols
In Figure 9, Layer 2 multicast protocols include IGMP snooping, MLD snooping, PIM snooping, IPv6
PIM snooping, multicast VLAN, and IPv6 multicast VLAN.
Figure 9 Positions of Layer 2 multicast protocols
• IGMP snooping and MLD snooping:
IGMP snooping and MLD snooping are multicast constraining mechanisms that run on Layer 2
devices. They manage and control multicast groups by monitoring and analyzing IGMP or MLD
messages exchanged between the hosts and Layer 3 multicast devices. This effectively
controls the flooding of multicast data in Layer 2 networks.
• PIM snooping and IPv6 PIM snooping:
PIM snooping and IPv6 PIM snooping run on Layer 2 devices. They work with IGMP snooping
or MLD snooping to analyze received PIM messages. Then, they add the ports that are
interested in specific multicast data to a PIM snooping routing entry or IPv6 PIM snooping
routing entry. In this way, multicast data can be forwarded to only the ports that are interested in
the data.
• Multicast VLAN and IPv6 multicast VLAN:
Multicast VLAN or IPv6 multicast VLAN runs on a Layer 2 device in a multicast network where
multicast receivers for the same group exist in different VLANs. With these protocols, the Layer
3 multicast device sends only one copy of multicast to the multicast VLAN or IPv6 multicast
VLAN on the Layer 2 device. This method avoids waste of network bandwidth and extra burden
on the Layer 3 device.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328
  • Page 329 329
  • Page 330 330
  • Page 331 331
  • Page 332 332
  • Page 333 333
  • Page 334 334
  • Page 335 335
  • Page 336 336
  • Page 337 337
  • Page 338 338
  • Page 339 339
  • Page 340 340
  • Page 341 341
  • Page 342 342
  • Page 343 343
  • Page 344 344
  • Page 345 345
  • Page 346 346
  • Page 347 347
  • Page 348 348
  • Page 349 349
  • Page 350 350
  • Page 351 351
  • Page 352 352
  • Page 353 353
  • Page 354 354
  • Page 355 355
  • Page 356 356
  • Page 357 357
  • Page 358 358
  • Page 359 359
  • Page 360 360
  • Page 361 361
  • Page 362 362
  • Page 363 363
  • Page 364 364
  • Page 365 365
  • Page 366 366
  • Page 367 367
  • Page 368 368
  • Page 369 369
  • Page 370 370
  • Page 371 371
  • Page 372 372
  • Page 373 373
  • Page 374 374
  • Page 375 375
  • Page 376 376
  • Page 377 377
  • Page 378 378
  • Page 379 379
  • Page 380 380
  • Page 381 381
  • Page 382 382
  • Page 383 383
  • Page 384 384
  • Page 385 385
  • Page 386 386
  • Page 387 387
  • Page 388 388
  • Page 389 389
  • Page 390 390
  • Page 391 391
  • Page 392 392
  • Page 393 393
  • Page 394 394
  • Page 395 395
  • Page 396 396
  • Page 397 397
  • Page 398 398
  • Page 399 399
  • Page 400 400
  • Page 401 401
  • Page 402 402
  • Page 403 403
  • Page 404 404
  • Page 405 405
  • Page 406 406
  • Page 407 407

Aruba IP Multicast Configuration Guide

Type
Configuration Guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI