Huawei Technologies Proprietary 1-1 Chapter 1 IGMP Snooping Configuration When configuring IGMP Snooping, go to the following sections for the information you are interested in: IGMP Snooping Overview IGMP Snooping Configuration Tasks Displaying and Maintaining IGMP Snooping IGMP Snooping Configuration Example Troubleshooting IGMP Snooping 1.1 IGMP Snooping Overview 1.1.1 IGMP Snooping Principle Running at the data link layer, IGMP Snooping is a multicast control mechanism on the Layer 2 Ethernet switch and it is used for multicast group management and control. When receiving IGMP messages transmitted between the host and router, the Layer 2 Ethernet switch uses IGMP Snooping to analyze the information carried in the IGMP messages. If the switch hears IGMP host report message from an IGMP host, it will add the host to the corresponding multicast table. If the switch hears IGMP leave message from an IGMP host, it will remove the host from the corresponding multicast table. The switch creates and maintains a MAC multicast address table at Layer 2 by continuously listening to IGMP messages. After that, the switch can forward the multicast packets transmitted from the upstream router according to the MAC multicast address table. When IGMP Snooping is disabled, packets are broadcasted at Layer 2. See the following figure: Video stream VOD Server Layer 2 Ethernet Switch Video stream Multicast group member Non-multicast group member Multicast router Video stream Video stream Video stream Non-multicast group member Internet/Intranet
Huawei Technologies Proprietary 1-2 When IGMP Snooping runs, packets are multicast rather than broadcast at Layer 2. See the following figure: Video stream VOD Server Layer 2 Ethernet Switch Video stream Multicast group member Non-multicast group member Multicast router Video stream Video stream Video stream Non-multicast group member Internet/Intranet
Figure 1-2 Multicast packet transmission when IGMP Snooping runs 1.1.2 IGMPv3 Snooping I. IGMPv3 overview In addition to compatibility with and inheritance from IGMPv1 and IGMPv2, IGMPv3 provides an enhanced host control capability. A host can not only join a designated multicast group but also specify to receive information from a designated multicast source.
Note: S8500 series switches support IGMPv1 and IGMPv2, but they do not support IGMPv3 currently.
IGMP queries fall into general queries and group-specific queries. This section mainly introduces IGMPv3 messages that are different from in IGMPv2. 1) Query messages The following figure shows the differences between IGMPv2 and IGMPv3 query messages: The size of an IGMPv2 general query is eight bytes and that of an IGMPv3 general query is twelve bytes. The size of an IGMPv 2 group-specific query is eight bytes and that of an IGMPv3 general query is equal to or greater than twelve bytes. The size of an IGMPv3 source-and-group-specific query is greater than twelve bytes. Operation Manual IGMP Snooping Quidway S8500 Series Routing Switches Chapter 1 IGMP Snooping Configuration
Huawei Technologies Proprietary 1-3 type = 0x11 Checksum Group Address Max Resp Time IGMPv2 query type = 0x11 Checksum Group Address Source Address[1] . . . Source Address[N] Resv S QRV QQIC Number of Source(N) Max Resp Code IGMPv3 query type = 0x11 Checksum Group Address Max Resp Time IGMPv2 query type = 0x11 Checksum Group Address Source Address[1] . . . Source Address[N] Resv S QRV QQIC Number of Source(N) Max Resp Code IGMPv3 query
Figure 1-3 Message formats of IGMPv2 and IGMPv3 queries 2) Membership report message The following figure shows the differences between IGMPv2 and IGMPv3 membership report messages: The type field of an IGMPv2 membership report is set to 0x16. IGMPv2 cannot recognize IGMPv3 membership report messages. Upon receiving an IGMPv3 report, the device transmits the IGMPv3 query transparently in the VLAN and converts it into an IGMPv2 report for further processing. Operation Manual IGMP Snooping Quidway S8500 Series Routing Switches Chapter 1 IGMP Snooping Configuration
Huawei Technologies Proprietary 1-4 type = 0x16 Checksum Group Address 0x00 IGMPv2 membership report Record Type 1...6 Number of Sources(N) Multicast Address Source Record[1] . . . Source Record[N] Aux Data Len Auxili ary Data type = 0x22 Checksum Reserved Group Recoed[1] . . . Group Record[M] Number of Group Records(M) Reserved IGMPv3 membership report type = 0x16 Checksum Group Address 0x00 IGMPv2 membership report Record Type 1...6 Number of Sources(N) Multicast Address Source Record[1] . . . Source Record[N] Aux Data Len Auxili ary Data type = 0x22 Checksum Reserved Group Recoed[1] . . . Group Record[M] Number of Group Records(M) Reserved IGMPv3 membership report
Figure 1-4 Message formats of IGMPv2 and IGMPv3 membership reports II. Message processing in IGMPv3 Snooping on an S8500 switch
Note: Currently, the device supports only the INCLUDE mode of source filtering in IGMPv3 reports, that is, IGMPv3 report messages are converted to IGMPv2 reports except those with the filtering mode set to include { NULL }, which are converted to IGMPv2 leave messages.
With IGMPv3 Snooping enabled, upon receiving an IGMPv3 query, the device transmits the IGMPv3 query transparently in the VLAN and then converts it into an IGMPv2 report for further processing. 1.1.3 Implementing IGMP Snooping I. Concepts related to IGMP Snooping To facilitate the description, this section first introduces some concepts related to IGMP Snooping. Router Port: The port that connects the switch to a multicast router and resides on the switch, instead of the router. Multicast member port: The Ethernet switch port connected to a multicast member. The multicast member refers to a host joined a multicast group. Operation Manual IGMP Snooping Quidway S8500 Series Routing Switches Chapter 1 IGMP Snooping Configuration
Huawei Technologies Proprietary 1-5 MAC multicast group: The multicast group is identified by MAC multicast address and maintained by the Ethernet switch. Router port aging time: Time set on the router port aging timer. If the switch has not received any IGMP general query message when the timer expires, it considers the port no longer as a router port. Multicast group member port aging time: When a port joins an IP multicast group, the aging timer of the port is started. The multicast group member port aging time is set on this aging timer. If no IGMP report or PIM hello message reaches the port when the timer expires the switch sends a multicast group-specific query message. When the maximum response time expires, if no IGMP report reaches the port, the switch judges that the port is no longer a member port. Maximum response time: When the switch transmits IGMP group-specific query message to the multicast member port, the Ethernet switch starts a response timer. The maximum response time refers to the timer length. If the switch has not received any IGMP report message before the timer expires, it will remove the port from the multicast member ports. II. Implementing Layer 2 multicast with IGMP Snooping The Ethernet switch runs IGMP Snooping to listen to IGMP messages and map the host and its ports to the corresponding multicast group address. To implement IGMP Snooping, the Layer 2 Ethernet switch processes different IGMP messages in the way illustrated in the figure below: IGMP message An Ethernet switch running IGMP Snooping IGMP message A router running IGMP Internet
Figure 1-5 Implement IGMP Snooping 1) IGMP general query message: Transmitted by the multicast router to the multicast group members to query which multicast group contains a member. When an IGMP general query message arrives at the router port, the Ethernet switch will reset the aging timer of the port. When a port other than the router port receives the IGMP general query message, the Ethernet switch will start the aging timer for the port. Operation Manual IGMP Snooping Quidway S8500 Series Routing Switches Chapter 1 IGMP Snooping Configuration
Huawei Technologies Proprietary 1-6 2) IGMP group-specific query message: IGMP group-specific query messages are used to find out whether a particular group still has members on the local subnet. Upon hearing an IGMP group-specific query message, the switch sends the group-specific query message only to the multicast group being queried. 3) IGMP report message: IGMP report messages are sent by hosts to the multicast router to join multicast groups or report their group memberships in response to IGMP query messages. Upon hearing an IGMP report message, the switch checks whether the MAC multicast group corresponding to the reported IP multicast group exists and proceeds accordingly. If the MAC multicast group does not exist, the switch notifies the router that a member is ready to join the reported multicast group, creates a new MAC-based forwarding entry, adds the port that received the report message to the entry, starts an aging timer for the port, and then adds all the router ports in the native VLAN of the port into the MAC multicast forwarding table. If the corresponding MAC multicast group exists but does not contain the port received the report message, the switch adds the port into the multicast group and starts the port aging timer. If the MAC multicast group exists and contains the port that received the message, the switch will only reset the aging timer of the port. 4) IGMP leave message: Transmitted from the multicast group member to the multicast router to notify that a host left the multicast group. Upon hearing a leave message for an IP multicast group, the Ethernet switch sends a group-specific query message for that group to the port on which it heard the message, to check whether any other active members for that group are attached to the port, and meanwhile starts a maximum response timer. If the switch receives no report message for that multicast group before the timer expires, the port will be removed from the corresponding MAC-based forwarding table entry. If the switch has no more member ports for that MAC multicast group, the switch will notify the upstream multicast router to prune the branch off the multicast distribution tree.
Note: You can configure a port of a Layer 2 switch as a multicast group member to respond to an IGMP query message of a multicast router, so as to prevent the multicast router from canceling the corresponding path if there is no multicast member in the current network segment. For details, refer to the part of configuring a router to join a multicast group in IGMP Configuration. By default, ports of a Layer 2 switch do not belong to any multicast group. Note that, the specified port must belong to an IGMP Snooping-enabled VLAN. Otherwise, the configuration will not work.
Huawei Technologies Proprietary 1-7 1.2 IGMP Snooping Configuration Tasks Enabling IGMP Snooping Configuring IGMP Snooping Parameters Disabling Flooding of Unknown Multicast Packets in the VLAN Configuring an ACL for Filtering Multicast Groups Configuring the Fast Leave Function Static Router Port Configuration Configuring IGMP Snooping Multicast Data Load Balancing Configuring an IGMP Snooping Querier Configuring IGMP Report Replay Suppression 1.2.1 Enabling IGMP Snooping You can control the creation and maintenance of MAC multicast tables at Layer 2 by enabling IGMP Snooping. I. Configuration prerequisites Make sure Layer 2 and Layer 3 multicast protocols are not enabled in the same VLAN or on the same VLAN interface. VLAN VPN is disabled in the VLAN. II. Configuration procedure Follow these steps to enable IGMP Snooping: To do... Use the command... Remarks Enter system view system-view Enable IGMP Snooping igmp-snooping { enable | disable } Required IGMP Snooping is disabled by default. Enter VLAN view vlan vlan-id Enable IGMP Snooping igmp-snooping { enable | disable } Required IGMP Snooping is disabled by default. Display IGMP Snooping configuration display igmp-snooping configuration The display command can be executed in any view.
Huawei Technologies Proprietary 1-8 Caution: Before configuring IGMP Snooping, first enable it globally in system view and then enable it in VLAN view. Otherwise, the configuration will not work. IGMP Snooping is applicable to isolate-user VLANs. If IGMP Snooping is enabled in an isolate-user VLAN, it is enabled in all the secondary VLANs. Therefore, enabling IGMP Snooping in a secondary VLAN is not necessary. The IGMP packets in a secondary VLAN are processed in the isolate-user VLAN. That is, for a user-isolate VLAN, all the multicast services are processed in the isolate-user VLAN. A port in a secondary VLAN cannot be used for receiving multicast traffic.
1.2.2 Configuring IGMP Snooping Parameters IGMP Snooping parameters include: Router port aging time Maximum response time Multicast group member port aging time I. Configuration prerequisites IGMP Snooping is enabled globally. II. Configuration procedure Perform the following operations to configure IGMP Snooping parameters: To do... Use the command... Remarks Enter system view system-view Configure router port aging time igmp-snooping router-aging-time seconds Optional By default, the route port aging time is 260 seconds Configure maximum response time igmp-snooping max-response-time seconds Optional By default the maximum response time is 1 second Configure multicast group member port aging time igmp-snooping host-aging-time seconds Optional By default, the multicast group member port aging time is 260 seconds.
Huawei Technologies Proprietary 1-9 1.2.3 Disabling Flooding of Unknown Multicast Packets in the VLAN If neither IGMP Snooping nor Layer 3 multicast is enabled in a VLAN, unknown multicast packets are flooded in the VLAN. Therefore, to disable unknown multicast packets from being flooded in a VLAN, you need to enable IGMP Snooping in the VLAN and execute the igmp-snooping nonflooding-enable command. I. Configuration prerequisites IGMP Snooping is enabled in the VLAN. II. Configuration procedure For a general board Follow these steps to disable flooding of unknown multicast packets in the VLAN on a general board: To do... Use the command... Remarks Enter system view system-view Disable flooding of unknown multicast packets in the VLAN igmp-snooping nonflooding-enable By default, multicast packets are flooded in a VLAN.
For a special board Follow these steps to disable flooding of unknown multicast packets in the VLAN on a special board: To do... Use the command... Remarks Enter system view system-view Disable flooding of unknown multicast packets in multiple VLANs on the 10GE boards igmp-snooping 10ge-non-flooding enable slot slot-num By default, 10GE boards do not support non-flooding of unknown multicast packets. Disable flooding of unknown multicast packets in the VLAN igmp-snooping nonflooding-enable By default, multicast packets are flooded in the VLAN Display the configuration information display current-configuration The display command can be executed in any view
Huawei Technologies Proprietary 1-10 Caution: The configuration listed in the above table is recommended for 10 GE ports on LSB1XP2B0, LSB1XK1B0, and LSB1TGX1B0 boards (including 110 GE and 210 GE boards) only when Layer 2 multicast is not flooded in multiple VLANs and inter-board and intra-board forwarding are not required. After you perform the configuration successfully, the board restarts automatically and your configuration will take effect. When the board is not in position, the commands do not take effect.
1.2.4 Configuring an ACL for Filtering Multicast Groups I. Configuration prerequisites IGMP Snooping is enabled globally. II. Configuration procedure Follow these steps to configure an ACL for filtering multicast groups: To do... Use the command... Remarks Enter system view system-view Enter VLAN view vlan vlan-id Apply an ACL for filtering multicast groups in the VLAN igmp-snooping group-policy acl-number Required By default, the ACL for filtering multicast groups is not configured in a VLAN. In this case, a host can join any multicast group. After the ACL for filtering multicast groups is configured, the multicast groups that are not permitted by the ACL cannot be created.
Huawei Technologies Proprietary 1-11 Caution: If the ACL applied to a VLAN does not exist or contain any rule, the host cannot join any multicast group. The rules of the ACL for filtering multicast groups are not limited by the ACL. This function applies to all the members in the specified VLAN. The rules for filtering multicast groups take effect only when the configuration policy bound to the ACL number exists. The rules for filtering multicast groups have no effect on locally configured static multicast groups.
1.2.5 Configuring the Fast Leave Function I. Configuration prerequisites IGMP Snooping is enabled globally. II. Configuration procedure Follow these steps to configure the fast leave function: To do... Use the command... Remarks Enter system view system-view Enable the fast leave function igmp-snooping fast-leave [ vlan { vlan-id [ to vlan-id ] } &<1-10> ] This function is disabled by default. Enter Ethernet port view interface interface-type interface-number
Enable the fast leave function igmp-snooping fast-leave [ vlan { vlan-id [ to vlan-id ] } &<1-10> ] This function is disabled by default
Note: The fast leave configuration performed in system view and that performed in port view are independent of each other. That is, the configuration performed in system view is effective to all the ports in the specified VLAN, whereas the configuration performed in port view is effective for the port in the specified VLAN. For example, a trunk port belongs to multiple VLANs.
Huawei Technologies Proprietary 1-12 Caution: The fast leave function cannot take effect if the specified VLAN does not exist, the port does not belong to the specified VLAN, or IGMP Snooping is not enabled in the VLAN. If you enable IGMP Snooping again, the original configuration of fast leave will be cleared. You cannot configure this command when IGMP Snooping is not enabled globally. (You can use the igmp-snooping enable command in system view to enable IGMP Snooping globally.) For an aggregation port, the fast leave function only takes effects on the master aggregation port. If an IGMPv1 host in the same group joins the port, even if fast leave is enabled on the port, it does not take effect.
1.2.6 Static Router Port Configuration By configuring a port in a VLAN to be a static router port, you can enable IGMP packets to be transparently transmitted through the port, meeting the requirements of specific networks. I. Prerequisites The port and VLAN involved already exist. The port to be configured belong to the corresponding VLAN. II. Configuring a static router port Follow these steps to configure a port in a VLAN to be a static router port in VLAN view: To do... Use the command... Remarks Enter system view system-view Enter VLAN view vlan vlan-id Configure a static router port multicast static-router-port port-number The port-number argument is in the format of interface-type interface-number, where the interface-type argument can only be Ethernet port type. By default, no static router port is configured.
Huawei Technologies Proprietary 1-13 Follow these steps to configure a port in a VLAN to be a static router port in Ethernet port view: To do... Use the command... Remarks Enter system view system-view Enter Ethernet port view interface interface-type interface-number The interface-type argument can only be Ethernet port type. Configure a static router port multicast static-router-port vlan vlan-id By default, no static router port is configured.
Caution: You will fail to configure a port to be a static router port if the port identified by the port-number argument does not exist, or the port does not belong to the VLAN. You will fail to configure a port to be a static router port if the VLAN identified by the vlan-id argument does not exist or the port does not belong to the VLAN. You can configure multiple ports in a VLAN to be static router ports by performing the above configuration repeatedly. The newly configured ports do not overwrite the existing static router ports. When a trunk port belongs to multiple VLANs, this port can be configured as the static router port for multiple VLANs. Static router ports can be configured in VLAN view or Ethernet port view. However, you can verify the configured static router ports only by executing the display this command in Ethernet port view. The configuration of a static router port takes effect on the current port only, no matter whether the current port is an aggregated port or not. To configure all ports in an aggregation group as static router ports, you can enable the static router port function on all the ports in the aggregation group. The static router port is valid when IGMP Snooping, IGMP, PIM-DM or PIM-SM is enabled in the VLAN.
1.2.7 Configuring IGMP Snooping Multicast Data Load Balancing After IGMP Snooping is enabled in a VLAN, multicast packets will be flooded in the VLAN if no port has joined the destination multicast group. With IGMP Snooping non-flooding enabled, data packets are not flooded in the VLAN but are forwarded to router ports if no member port for the destination multicast group exists. Since multicast routers send IGMP query and PIM Hello messages periodically, the switch can Operation Manual IGMP Snooping Quidway S8500 Series Routing Switches Chapter 1 IGMP Snooping Configuration
Huawei Technologies Proprietary 1-14 recognize which ports are router ports. If neither member ports nor router ports exist, multicast packets are dropped. When a user joins a multicast group, the device deletes the original multicast MAC address created by IGMP-snooping non-flooding and creates a new IGMP-snooping multicast MAC address. With the IGMP Snooping non-flooding function enabled, if any router port is in an aggregation group, the system can evenly distribute unknown multicast traffic to different aggregation ports according to the hash algorithm, thus implementing load balancing of multicast traffic. Follow these steps to configure IGMP Snooping multicast non-flooding: To do... Use the command... Remarks Enter system view system-view Enable IGMP Snooping igmp-snooping enable Required Enable IGMP Snooping non-flooding igmp-snooping nonflooding-enable Required Configure aging time point for IGMP Snooping non-flooding entries igmp-snooping non-flooding entry-age-time HH:MM:SS Optional Display the configuration information display igmp-snooping configuration The display command can be executed in any view
Caution: When you enable IGMP Snooping non-flooding, a aging time point is configured. The default aging time point is 3:00:00. After you disable IGMP Snooping or IGMP Snooping non-flooding, the aging time point is invalidated at the same time.
1.2.8 Configuring an IGMP Snooping Querier IGMP Snooping runs on Layer 2 switches connecting with users and layer-3 devices. Layer-3 devices send general queries to maintain membership in the local subnet. The IGMP Snoopingenabled device maintains Layer 2 multicast forwarding tables by listening to IGMP messages. Where Layer 2 multicast is implemented without the need of Layer-3 devices, IGMP Snooping queriers can establish and maintain multicast forwarding tables. IGMP Snooping queriers are used in Layer 2only multicast networks. Operation Manual IGMP Snooping Quidway S8500 Series Routing Switches Chapter 1 IGMP Snooping Configuration
Huawei Technologies Proprietary 1-15 IGMP general query IGMP report Multicast source Switch (IGMP Snooping) Receiver Receiver IGMP general query
Figure 1-6 Implement IGMP Snooping query IGMP Snooping querier configuration tasks include: Enabling IGMP Snooping Configuring the interval at which the IGMP Snooping querier sends general queries in a VLAN Configuring a maximum response time of IGMP general queries in a VLAN Configuring the source IP address the IGMP Snooping querier uses to send general query messages in a VLAN Configuring an IGMP Snooping querier I. Configuration prerequisites Layer 2 and Layer 3 multicast protocols cannot be enabled in the same VLAN or on the same VLAN interface. VLAN VPN is disabled in the VLAN. VLAN VPN-enabled ports are not added into this VLAN. II. Configuration procedure Follow these steps to configure an IGMP Snooping querier: To do... Use the command... Remarks Enter system view system-view Enable IGMP Snooping igmp-snooping { enable | disable } Required This function is disabled by default. Enter VLAN view vlan vlan-id Enable IGMP Snooping igmp-snooping { enable | disable } Required This function is disabled by default. Configure the interval at which the IGMP Snooping querier sends general queries in the VLAN igmp-snooping query-interval time-interval Optional By default, the query interval is 60 seconds. Operation Manual IGMP Snooping Quidway S8500 Series Routing Switches Chapter 1 IGMP Snooping Configuration
Huawei Technologies Proprietary 1-16 To do... Use the command... Remarks Configure a maximum response time igmp-snooping max-response-time max-response-time Optional By default, the maximum response time of an IGMP query message is 10 seconds. Configure a source IP address of general query messages igmp-snooping general-query source-ip { current-interface | ip-address } Optional By default, the source IP address is 0.0.0.0. Enable IGMP Snooping querier igmp-snooping querier Required By default, IGMP Snooping querier is not enabled in a VLAN. Display the IGMP Snooping configuration information in a VLAN display igmp-snooping configuration vlan vlan-id The display command can be executed in any view.
Note: The default source IP address of IGMP general queries is 0.0.0.0. If you configure the IGMP Snooping querier to use the primary IP address of the current VLAN interface as the source IP address of IGMP general queries and the device fails to obtain the primary IP address of the virtual interface, the default source IP address, namely, 0.0.0.0, will be used. For compatibility with devices that do not support general messages with the source IP address 0.0.0.0, you need to configure the source IP address manually. If you need to configure multiple queriers, it is advisable that you configure a longer query interval to prevent deterioration of device performance caused by too many IGMP general queries.
1.2.9 Configuring IGMP Report Replay Suppression If IGMP Snooping relays (namely, forwards without any change) every IGMP report message it hears on an IGMP-Snooping-enabled VLAN interface immediately to router ports in the VLAN, the upstream device may suffer from a big burden. Therefore, IGMP report relay needs to be suppressed in an IGMP-Snooping-enabled VLAN. Operation Manual IGMP Snooping Quidway S8500 Series Routing Switches Chapter 1 IGMP Snooping Configuration
Huawei Technologies Proprietary 1-17 With the IGMP report relay suppression function enabled, within each query cycle, the Layer 2 device relays only the first IGMP report per multicast group to the Layer 3 device and will not relay the subsequent IGMP reports for the same multicast group to the Layer 3 device. This helps reduce the number of packets being transmitted over the network.
Note: Currently, S8500 series switches do not support suppression of IGMPv3 messages. The IGMP report relay suppression feature is effective only for a VLAN with IGMP Snooping enabled.
I. Configuration prerequisites IGMP Snooping is enabled globally. II. Enabling IGMP report transparent transmission suppression Follow these steps to enable IGMP report transparent transmission suppression: To do... Use the command... Remarks Enter system view system-view Enable IGMP Snooping igmp-snooping enable Required Enable IGMP report transmission suppression igmp-snooping report-aggregation Required By default, this function is disabled. Display the IGMP Snooping configuration information in system view display igmp-snooping configuration The display command can be executed in any view.
Huawei Technologies Proprietary 1-18 1.3 Displaying and Maintaining IGMP Snooping To do... Use the command... Remarks Display the information about current IGMP Snooping configuration display igmp-snooping configuration Display IGMP Snooping statistics of received and sent messages display igmp-snooping statistics Display IP/MAC multicast group information in a VLAN display igmp-snooping group [ vlan vlan-id [group-address] ] Enable IGMP Snooping debugging debugging igmp-snooping { abnormal | all | events | forward | groups | packets | timers } Available in any view Clear IGMP Snooping statistics information reset igmp-snooping statistics Available in user view
1.4 IGMP Snooping Configuration Example 1.4.1 Enabling IGMP Snooping I. Network requirements As shown in Figure 1-7, to implement Layer 2 multicast delivery, IGMP Snooping needs to be enabled on the switch deployed between the PCs. II. Network diagram Switch Router Multicast Internet
Huawei Technologies Proprietary 1-19 III. Configuration procedure Suppose you need to enable IGMP Snooping on VLAN 10. The configuration procedure is as follows: # Display the current state of IGMP Snooping. <Quidway> display igmp-snooping configuration # If IGMP Snooping is not enabled, enable it in system view. <Quidway> system-view System View: return to User View with Ctrl+Z. [Quidway] igmp-snooping enable # Display the status of VLAN-interface 10, to check if PIM or IGMP is enabled on this interface. [Quidway] display current-configuration interface vlan-interface 10 # Enable IGMP Snooping in VLAN view only if PIM or IGMP is not running on VLAN 10 (IGMP Snooping can be enabled in a VLAN only if PIM and IGMP are not running in the VLAN). [Quidway] vlan10 [Quidway-vlan10] igmp-snooping enable 1.5 Troubleshooting IGMP Snooping Symptom: The multicast function cannot be implemented on the switch. Analysis and solutions: 1) IGMP Snooping is disabled. Carry out the display current-configuration command in any view to display the status of IGMP Snooping. If IGMP Snooping is not enabled, carry out the igmp-snooping enable command in system view to enable IGMP Snooping. Then, use the same command in VLAN view to enable IGMP Snooping in the corresponding VLAN. 2) Multicast forwarding table set up by IGMP Snooping is incorrect. Carry out the display igmp-snooping group command in any view to display if the multicast group is the expected one. If the multicast group created by IGMP Snooping is not correct, contact maintenance personnel for help. Continue with diagnosis 3 if the second step is completed. 3) Multicast forwarding table set up at the bottom layer is incorrect. In any view, carry out the display mac-address vlan command to check whether the MAC multicast forwarding table established at the bottom layer by vlan-id is consistent with that established by IGMP Snooping. If they are not consistent, contact the maintenance personnel for help.