Cisco − Multicast in a Campus Network: CGMP and IGMP Snoo

Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping

Table of Contents
Multicast in a Campus Network: CGMP and IGMP Snooping.....................................................................1 Contents...................................................................................................................................................1 Introduction..............................................................................................................................................1 Multicast Address....................................................................................................................................2 IGMP.......................................................................................................................................................3 IGMP Version 1..........................................................................................................................3 IGMP Version 2..........................................................................................................................4 Interoperability Between IGMP Version 1 and Version 2.........................................................4 IGMP on a Router.......................................................................................................................5 Practical Example on a Router ....................................................................................................5 CGMP......................................................................................................................................................7 CGMP Frames and CGMP Message Types...............................................................................7 Learning Router Ports.................................................................................................................8 Joining a Group with CGMP......................................................................................................8 Leaving a Group With CGMP....................................................................................................9 CGMP Troubleshooting ..............................................................................................................9 CGMP and Source−Only Network...........................................................................................10 Configuring Cisco Routers and Switches to Enable CGMP ....................................................10 Practical Example of CGMP Use and Debug Command and Output......................................11 IGMP Snooping.....................................................................................................................................20 IGMP Snooping Overview.......................................................................................................20 Learning the Router Port ...........................................................................................................20 Joining a Group With IGMP Snooping....................................................................................20 Leaving a Group With IGMP Snooping...................................................................................21 IGMP / CGMP Interaction ........................................................................................................22 Multicast Source−Only Network..............................................................................................22 Limitations................................................................................................................................22 Configuration of IGMP Snooping on Cisco Switches..............................................................22 Practical Example of IGMP Snooping ......................................................................................22 Related Information...............................................................................................................................26

i

Multicast in a Campus Network: CGMP and IGMP Snooping Contents Introduction Multicast Address IGMP IGMP Version 1 IGMP Version 2 Interoperability Between IGMP Version 1 and Version 2 IGMP on a Router Practical Example on a Router CGMP CGMP Frames and CGMP Message Types Learning Router Ports Joining a Group With CGMP Leaving a Group With CGMP CGMP Troubleshooting CGMP and Source−Only Network Configuring Cisco Routers and Switches to Enable CGMP Practical Example of CGMP Use and Debug Command and Output IGMP Snooping IGMP Snooping Overview Learning the Router Port Joining a Group With IGMP Snooping Leaving a Group With IGMP Snooping IGMP/CGMP Interaction Multicast Source−Only Network Limitations Configuration of IGMP Snooping on Cisco Switches Practical Example of IGMP Snooping Related Information Introduction The purpose of the Cisco Group Management Protocol (CGMP) and Internet Group Management Protocol (IGMP) Snooping is to restrain multicast traffic in a switched network. By default. But. and this can consume a lot of bandwidth if many multicast servers are sending streams to the segment. since a multicast MAC address is never used as source address for a Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . a LAN switch floods multicast traffic within the broadcast domain. Multicast traffic is flooded because a switch usually learns MAC addresses by looking into the source address field of all the frames it receives.

5000.255 are multicast IP addresses.packet and since they do not appear in the MAC address table.20. For each GDA there is an associated MAC address. This solution works well.0 to 239. It enables the Cisco multicast router to understand IGMP messages sent by hosts and informs the switch about the information contained in the IGMP packet.20 corresponds to MAC 01−00−5e−14−14−14 ♦ 224.20. refer to the following documents: • Configuring CGMP and IGMP on Catalyst 2900XL/3500XL Series Switches • Configuring IGMP Snooping on Catalyst 2950 Series Switches • Configuring IGMP Snooping on Catalyst 3550 Series Switches • Configuring IGMP Snooping on Catalyst 4000 with Supervisor III • Configuring IGMP Snooping on Catalyst 6000 Series Switches Running Native IOS The following section briefly describes a multicast address. 2. except that the static entries disappear at reboot. and additional detail on CGMP and IGMP snooping.255. The second option is to use CGMP.255. The last (and most efficient) option is to use IGMP Snooping.0. Therefore: ♦ 230. all IP addresses from 224. and IGMP snooping configurations are for Catalyst 5000 and 6000 running CatOS. For more information on configuring multicast on other switch platforms. Advanced hardware is required. but it is not scalable and not dynamic. The first solution to that problem is to configure static MAC addresses for each group and each client. CGMP configurations given in this document are for Catalyst 4000 and 5000 switches running CatOS (CGMP is not supported on Catalyst 6000). which is a Cisco proprietary protocol which runs between the multicast router and the switch. Multicast IP addresses are Class D IP addresses. You can do it on a Catalyst 4000. With IGMP snooping. Multicast Address 1. the functionality of IGMP. or 6000 switch by issuing the following command : • set cam static {multicast_mac} {mod/port} • set cam permanent {multicast_mac} {mod/port} These two commands have the same effect.10. Therefore. followed by the last 23 bits of the GDA translated in hex.10 corresponds to MAC 01−00−5e−0a−0a−0a Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . They are also referred to as Group Destination Addresses (GDA). the switch intercepts IGMP messages from the host itself and updates its MAC table accordingly.0. This MAC address is formed by 01−00−5e.10. the switch has no method for learning them. and permanent do not.

0. but a one−to−many mapping: ♦ 224.0..0.Consequently.. this is not a one−to−one mapping. They are send with the following fields: Layer 2 information: • Source MAC : host MAC address • Destination MAC : destination MAC for the GDA Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .6 is used by: Open Shortest Path First (OSPF). ♦ 224. addresses from 224.2 − All multicast−capable routers.. Membership queries are issued by router at regular intervals to check whether there is still a host interested in the GDA in that segment. For example: ♦ 224.10.10.0.10 corresponds to MAC 01−00−5e−0a−0a−0a ♦ 226. IGMP Version 1 IGMP messages are transmitted in IP datagrams and contain the following fields: • Version : will be 1 • Type : there are two types of IGMP messages: Membership Query and Membership Report • Checksum • GDA Membership reports are issued by hosts that want to receive a specific multicast group (GDA). In general.10.10.0. like HSRP). Some Multicast IP addresses are reserved for special use.. It specifies how a host can register a router to receive specific multicast traffic. Cisco recommends that you not use these for GDA in a multicast network. 3. Host membership reports are issued either unsolicited (when the host wants to receive GDA traffic first) or in response to a membership query. ♦ . IGMP IGMP is a standard defined in RFC1112 for IGMPv1 and in RFC2236 for IGMPv2.0.255 are reserved and used by various protocols (standard or proprietary.10 corresponds to MAC 01−00−5e−0a−0a−0a. ♦ 224.0. as well. The following section gives a brief overview on IGMP.0..5 and 224.0. CGMP and IGMP Snooping do not work with this reserved address range.0.0.1 to 224.0.1 − All multicast−capable hosts.

Below are several possibilities: • Scenario A: Version 1 router with a mix of version 1 and version 2 hosts. the router will not have any answers to its query and will delete the GDA for that subnet. the query router is chosen with the help of multicast routing protocol. After three IGMP query attempts with no answer.0. IGMP Version 2 In version 2 of IGMP. the version field has been removed.Layer 3 information: • Source IP : IP address of the host • Destination IP : GDA IGMP packet: • IGMP data contains furthermore the GDA and some other fields Host membership queries are sent by router to the all multicast address: 224.0 Interoperability Between IGMP Version 1 and Version 2 With both versions of IGMP. it should send a Leave Group IGMP message to destination 224. this interface is erased from the outgoing interface list for all entries linked to that GDA.0. and the type field can now accept different values. all hosts must only use the version 1 report.0.0. it is chosen by the lowest IP address among the routers.1. • IGMP Leave Message: when a host wants to leave a group. These queries use 0. If a host no longer wants to receive the traffic. The type can be : • Membership Query • Version 1 Membership Report • Version 2 Membership Report • Leave Group Below is a brief description of the most important new features added with IGMPv2. only one router per IP subnet will send queries.2 (instead of leaving silently like in IGMPv1). Since the router does not understand the version 2 report or version 2.0 in the IGMP GDA field. it simply quits.0. The router simply keeps a multicast routing entry for each source and links it to a list of outgoing interfaces (interface from where the IGMP report came). In version 1. In version 2. Note: IGMPv1 has no leave mechanism.0.0. • A router can now send a group−specific query by sending a Membership Query to the group GDA instead of sending it to 0. This router is called the query router. If it is the last.0. Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . A host for each group must respond to that query or the router will stop forwarding the traffic for that GDA to that segment (after 3 attempts).

3. the version 2 router must be administratively−configured as a version 1 router. the router will not forward multicast traffic for that group into that subnet. • Scenario C: Version 1 router and version 2 router located on the same segment. IGMP on a Router If. the group joined. there is no user registered to a specific group in a subnet. Configuration: ip multicast−routing interface FastEthernet0 no ip address no ip directed−broadcast ! interface FastEthernet0. On a router you need to perform the following tasks. it possible that they will not agree on the query router. The version 1 hosts will not understand the version 2 query or the version 2 group membership query. That means that a router needs to receive an IGMP report for a GDA in order to add it to the multicast routing table and to start forwarding traffic for that group.• Scenario B: Version 2 router with a mix of version 1 and version 2 hosts.2 Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . In the following output. Fast−Ethernet 0. and so on. Therefore. configure the following): ip igmp join−group [GDA_ip_address] ip igmp version [1 | 2] Practical Example on a Router We have configured a router to route between two subinterfaces.2 and Fast−Ethernet 0. by default. We have also configured both interfaces to run IGMP. In any case. Enable multicast routing in the global mode: ip multicast−routing Configure a multicast routing protocol on the involved interface: ip pim dense−mode (for example) Monitor IGMP: sh ip igmp interface sh ip igmp group sh ip mroute Configure a router to send the IGMP report (on the interface. The version 1 router has no way to detect version 2 router. you can see the IGMP version. The router must only use IGMP version 1 and suspend the leave operation.

2.255.3.255.3 encapsulation isl 3 ip address 3.0.3. 2 leaves Multicast routing is enabled on interface Multicast TTL threshold is 0 Multicast designated router (DR) is 2.0 no ip redirects no ip directed−broadcast ip pim dense−mode ! interface FastEthernet0.1 255. RP 0.1 (this system) IGMP querying router is 3. J − Join SPT Timers: Uptime/Expires Interface state: Interface. flags: DJC Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .1 (this system) IGMP querying router is 2.255.1 255.255.3.2. 224.10. State/Mode (*.3.10).0 no ip redirects no ip directed−broadcast ip pim dense−mode ! sh ip igmp interface: Fa0.2 is up.3. 1 leaves Multicast routing is enabled on interface Multicast TTL threshold is 0 Multicast designated router (DR) is 3.2. 00:01:15/00:02:59. P − Pruned R − RP−bit set. line protocol is up Internet address is 2.1/24 IGMP is enabled on interface Current IGMP version is 2 CGMP is disabled on interface IGMP query interval is 60 seconds IGMP querier timeout is 120 seconds IGMP max query response time is 10 seconds Inbound IGMP access group is not set IGMP activity: 3 joins.0.2.3. T − SPT−bit set. S − Sparse.3. line protocol is up Internet address is 3.1/24 IGMP is enabled on interface Current IGMP version is 2 CGMP is disabled on interface IGMP query interval is 60 seconds IGMP querier timeout is 120 seconds IGMP max query response time is 10 seconds Inbound IGMP access group is not set IGMP activity: 1 joins.encapsulation isl 2 ip address 2.2.1 (this system) Multicast groups joined: 224.40 Fa0. L − Local.0.2.3 is up.1 (this system) No multicast groups joined sh ip mroute and sh ip igmp group: Malaga#sh ip mroute IP Multicast Routing Table Flags: D − Dense.2.1.0. F − Register flag. C − Connected.2.3.10. Next−Hop or VCD.

2926T.2. RPF nbr 0. 2926F.10. Catalyst 2948G. CGMP Frames and CGMP Message Types CGMP was first implemented by Cisco to restrain multicast traffic in a layer 2 network. • Message Type: Join or Leave. the router provides the interface between the hosts. 00:00:39/00:00:00 Malaga#sh ip igmp groups IGMP Connected Group Membership Group Address Interface 224. CGMP frames are Ethernet frames with the destination MAC address: 01−00−0c−dd−dd−dd and with a SNAP header with the value: 0x2001. and Catalyst 4912: supported for all software versions. • Catalyst 4000 series.x. • Count: The number of multicast/unicast address pairs in the message. • USA: The 48 bit MAC unicast address of the devices that wants to join the GDA.3. it cannot distinguish an IGMP packet. not capable of looking at layer 3 packets.0. With CGMP.3. Because a switch is.2 CGMP CGMP is supported on the following platforms: • Catalyst 5000 Series: supported for all software above 2. The routers "talk" IGMP.3 Malaga# Uptime 00:02:48 Expires 00:02:04 Last Reporter 3. • Catalyst 2901.Incoming interface: Null. RPF nbr 0. • GDA: The 48 bit MAC address of the multicast group. by essence. • Catalyst 2900XL and Catalyst 3500XL: supported for all software above version 11. Note: CGMP is not supported on Catalyst 6000.0. and 2926G: supported for all software above version 2. The CGMP frames contain the following fields : • Version: 1 or 2.10 Fa0.0 Outgoing interface list: FastEthernet0.2. 2902. • Catalyst 1900 and 2820: supported since software version 6.2.3.10. Forward/Dense. 00:01:16/00:00:00 (2. flags: CT Incoming interface: FastEthernet0.3. and CGMP Fast Leave supported since version SA3. 00:00:39/00:02:20.10.0.0 Outgoing interface list: FastEthernet0.10.10). Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . and the switches "talk" CGMP.3.0.3. Forward/Dense. 224.2.2(8)SA.

the switch knows on which port the USA is located and then: ♦ either creates a new static entry for the GDA and links the USA port to it along with all router ports. • A switch with CGMP enabled needs to listen to the CGMP 01−00−0c−dd−dd−dd addresses. The processor of the switch looks into the CAM table for the USA. processes it. It then sends it back to the switch. so the client sends an IGMP Membership report message.Note: The value of the count field determines how many times the last two fields display. and sends a CGMP message to the switch. By default. Delete all groups. Joining a Group with CGMP • A new client requests to receive traffic for a GDA (group destination address or Multicast group). Delete port from group. there is also a static method for configuring router ports on the switch. Unassign router port. Assign router port. Delete group. Once the USA is seen in the CAM table. Below is the list of all possible CGMP messages: GDA Mcast MAC USA Client MAC Join/Leave Join Meaning Add port to group. the address 01−00−0c−dd−dd−dd is added to the sh cam system. • The router receives the IGMP report. The router copies the destination MAC address into the GDA field of the CGMP join and copies the source MAC address into the USA of the CGMP join. or Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . These messages will be generated by the router on all interfaces configured to run CGMP. The switch learns router ports when it receives a CGMP join to GDA 00−00−00−00−00−00 with Router MAC USA (3rd type of message in the table). when you enable CGMP in a switch. the processors of a switch (called NMP in Catalyst) only listen to multicast addresses in sh cam system. Mcast MAC Client MAC Leave 00−00−00−00−00−00 Router MAC Join 00−00−00−00−00−00 Mcast MAC 00−00−00−00−00−00 Router MAC 00−00−00−00−00−00 00−00−00−00−00−00 Leave Leave Leave Learning Router Ports The switch needs to be aware of all router ports so that they will automatically be added to any newly−created multicast entries. However. Thus.

The reserved IP multicast addresses. When IGMP version 1 is the host. which is the same as IGMP Leave with IGMP version 2. CGMP does not prune multicast traffic for any IP multicast address that maps into the MAC address range of 01−00−5E−00−00−00 to 01−00−5E−00−00−FF. in the Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . do not send IGMP Leave messages. it forwards the IGMP Leave message to all router ports. when CGMP Leave is enabled. CGMP Troubleshooting 1. the switch regenerates them and sends them to all router ports.0. Cisco added to the original CGMP specification (CGMPv2). enter the set cgmp leave enable command. Fast−Leave processing ensures optimal bandwidth management for all hosts on a switched network. The router then starts the normal deletion process by sending a group−specific query. It also sends a CGMP Leave message to the switch that will erase the group from the static table. 2. With CGMP Fast−Leave. This means that no port will be deleted from a group if any users are still interested in that group. two entries are added to the sh cam system: 01−00−5e−00−00−01 01−00−5e−00−00−02 because IGMP Leave uses 224. unless a spanning tree topology−change occurs in the VLAN or the router sends one of the last CGMP Leave message in the previous table. 3. So. This addition is called CGMP Fast−Leave. in debugging HSRP problems. even when multiple multicast groups are in use simultaneously. the port is pruned from the multicast tree for the multicast group specified in the original leave message. the router removes this group from the multicast routing table for that interface. When CGMP Leave processing is disabled. and CGMP Self−Join messages. CGMP Fast−Leave processing allows the switch to detect IGMP version 2 leave messages sent to the all−router multicast address (224. Since no responses are received. When CGMP Leave processing is enabled.0. To enable CGMP Leave processing. Routers receiving hsrp hello or hsrp peers lose connectivity! Therefore. CGMP Leave processing is disabled by default.1.♦ simply adds the USA port to the list of the ports for this GDA (if the static entry already exists). Leaving a Group With CGMP Static entries learned with CGMP are permanent. When the supervisor engine module receives a leave message.0. If it is the last port in the multicast group. HSRP.0.2) by hosts on any of the supervisor engine module ports.0. The router will only send leave messages if it does not receive a reply to three consecutive IGMP queries. all HSRP packets go to the switch CPU.0. Due to a conflict with the Hot Standby Router Protocol (HSRP). try disabling CGMP Fast−Leave. it starts a query−response timer and sends a message on the port on which that leave was received to determine if there is still a host willing to receive this multicast group on that port.2 and IGMP Query uses 224. With the introduction of IGMP version 2 and the presence of IGMP Leave. the Catalyst 5000 family switch learns router ports through PIM−v1. HSRP uses MAC address 01−00−5e−00−00−02. If this timer expires before a CGMP Join message is received. Since HSRP is not an IGMP packet. the Catalyst 5000 family switch learns router ports through CGMP Self−Join messages only.

range 224. 2926. • Multicast Router Enable the IP multicasting (global command): ip multicast−routing Enable each interface running CGMP (interface mode): ip pim [sparse−mode |dense−mode] ip igmp ip cgmp Debugging Layer 2 multicast problem: debug ip igmp debug ip cgmp • Catalyst 4000 or 5000 series Enable/disable CGMP: set cgmp [enable¦disable] Enable/disable CGMP Fast−Leave: set cgmp leave [enable¦disable] Configure the multicast router (static): set multicast router [slot/port] Clear multicast router: Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .0. Configuring Cisco Routers and Switches to Enable CGMP The following commands are only valid for Catalyst 4000 and 5000 series (plus 2901. CGMP still needs to restrict the flooding of this source (for router use only). If a router detects multicast traffic on one interface with no IGMP report.0.0. are used to forward local IP multicast traffic in a single Layer 3 hop. However. it is identified as a multicast source−only network. and the switch simply adds this group (with only the router port). 2948G. 2902.0 to 224. and 4912). Therefore.255. there is a chance that no IGMP reports will be generated in that segment.0. The router generates a CGMP Join message for itself. CGMP and Source−Only Network A source−only network is a segment with only a source multicast and no real client.

clear multicast router [slot/port | all] Various commands to verify CGMP operation: sh cam static sh cgmp statistic [Vlan_id] sh cgmp leave sh multicast router sh multicast group sh multicast group cgmp sh multicast group count Practical Example of CGMP Use and Debug Command and Output Below is a practical configuration example for a Cisco router and Catalyst switches. Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .

you will see a few sniffer traces and the configuration of the switch and the router.The following detailed example shows the operations involved as a host joins a group. Finally. We enabled CGMP on the switch: fish (enable) set cgmp en MCAST−CGMP: Set CGMP Sys Entrie MCAST−CGMP: Set CGMP Sys Entrie MCAST−CGMP: Set CGMP Sys Entrie CGMP support for IP multicast enabled. fish (enable) Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . Joining a group with CGMP 1. It then shows the operations as a host leaves a group with Fast−Leave enabled.

fish (enable) sh cgmp leave CGMP: enabled CGMP leave: enabled fish (enable) sh cam sys * = Static Entry. USA 0060. as we are running CGMP Fast−Leave. On the Router: 6d01h: CGMP: Sending self Join on Fa0. In addition. we can see the entries for 01−00−5e−00−00−01 and 01−00−5e−00−00−02. we included the entry 01−00−0c−dd−dd−dd for all VLANs in the sh cam system command. + = Permanent Entry. vlanNo 2 fish (enable) sh multi router CGMP enabled IGMP disabled Port −−−−−−−−− 3/1 Vlan −−−−−−−−−−−−−−−− 2−3 Total Number of Entries = 1 '*' − Configured Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . vlanNo 2 MCAST−ROUTER: Creating RouterPortTimer for port 3/1. # = System Entry.0000. X = Port Security Entry VLAN −−−− 1 1 1 1 1 1 1 1 2 2 2 2 2 2 3 3 3 3 3 Total Dest MAC/Route Des [CoS] Destination Ports or VCs / [Protocol Type] −−−−−−−−−−−−−−−−−− −−−−− −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− 00−10−2f−00−14−00 # 7/1 00−e0−fe−4b−f3−ff # 1/9 01−00−0c−cc−cc−cc # 1/9 01−00−0c−cc−cc−cd # 1/9 01−00−0c−dd−dd−dd # 1/9 01−00−0c−ee−ee−ee # 1/9 01−80−c2−00−00−00 # 1/9 01−80−c2−00−00−01 # 1/9 00−10−2f−00−14−00 # 7/1 01−00−0c−cc−cc−cc # 1/9 01−00−0c−cc−cc−cd # 1/9 01−00−0c−dd−dd−dd # 1/9 01−80−c2−00−00−00 # 1/9 01−80−c2−00−00−01 # 1/9 01−00−0c−cc−cc−cc # 1/9 01−00−0c−cc−cc−cd # 1/9 01−00−0c−dd−dd−dd # 1/9 01−80−c2−00−00−00 # 1/9 01−80−c2−00−00−01 # 1/9 Matching CAM Entries Displayed = 19 2. Therefore. R = Router Entry.83c9 On the Switch: MCAST−CGMP−JOIN: recvd CGMP JOIN msg on port 3/1 vlanNo 2 MCAST−CGMP−JOIN: join GDA 00−00−00−00−00−00 MCAST−CGMP−JOIN:USA 00−60−70−cd−83−c9 MCAST−ROUTER: Adding QUERIER port 3/1.70cd. the router port is added to the router port list (see frame 1 below).0000. The router sends a CGMP Join message to GDA 00−00−00−00−00−00 with the USA MAC of the router.As shown below.3 6d01h: GDA 0000.

3.2 4.10 will be forwarded only to this port in this VLAN.10.3 5. The address is located on port 3/2. The switch with 01−00−cc−dd−dd−dd in the sh cam sys command has CGMP enabled.3. fish (enable) sh cam sta * = Static Entry.10 Fa0.10.10.10. This shows that we will now forward traffic for 224.3. and the switch makes a static entry in the CAM table for 01−00−5e−0a−0a−0a bounded to port 3/2.3) for 224. On the Switch: MCAST−CGMP−JOIN: MCAST−CGMP−JOIN: MCAST−CGMP−JOIN: MCAST−CGMP−JOIN: MCAST−CGMP−JOIN: MCAST−CGMP−JOIN: recvd CGMP JOIN msg on port 3/1 vlanNo 3 join GDA 01−00−5e−0a−0a−0a MCAST−CGMP−JOIN:USA 00−60−5c−f4−bd−e2 3/2/3: index 81 recvd CGMP JOIN msg on port 3/1 vlanNo 2 join GDA 01−00−5e−00−01−28 MCAST−CGMP−JOIN:USA 00−60−70−cd−83−c9 3/1/2: index 80 6.2 which is the client PC.10.2 for 224. therefore. # = System Entry. The router receives the report and sends a CGMP Join message with the following: ♦ Source MAC: MAC of router ♦ Dest MAC: 01−00−cc−dd−dd−dd ♦ Contents: MAC address of the client PC (USA): 00−00−0c−07−ac−00 Mac address of the multicast group: 01−00−5e−0a−0a−0a (see frame 3 below) On the Router: 6d01h: IGMP: Received v2 Report from 3.3.3.10. X = Port Security Entry VLAN Dest MAC/Route Des [CoS] Destination Ports or VCs / [Protocol Type] −−−− −−−−−−−−−−−−−−−−−− −−−−− −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− 3 01−00−5e−0a−0a−0a 3/1−2 Total Matching CAM Entries Displayed = 3 fish (enable) Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .2 (Fa0. R = Router Entry. The switch makes a lookup in the dynamic CAM table to determine on which port the MAC address of the client PC is located.3.10. Thus. Below is the static entry in the Catalyst where 3/1 is the router port and 3/2 is the client port.10 6d01h: CGMP: Sending Join on Fa0. able to process the packet. all subsequent traffic for multicast group 224.3 . Malaga#sh ip igmp groups IGMP Connected Group Membership Group Address Interface 224.10 6d01h: CGMP: Received IGMP Report on Fa0.3 6d01h: from 3.3.10. Shown below is the sh ip igmp group on the router malaga.10.3 Malaga# Uptime 00:02:48 Expires 00:02:04 Last Reporter 3. The PC on 3/1 send IGMP a report containing the GDA: 224.10 (see frame 2 below).10.10. The switch also adds the router port 3/1 to the static entry for that GDA. The switch is.3. This is a consequence of the reception of the IGMP report from 3.3.10 to fa0.10. + = Permanent Entry.

the Catalyst forwards the IGMP Leave message to the router: MCAST−TIMER:IGMPLeaveTimer expired on port 3/2 vlanNo 3 GDA 01−00−5e−0a−0a−0a MCAST−TIMER:IGMPLeaveTimer expiry: Transmit IGMP Leave on port 3/1 vlanNo 3 MCAST−SEND:Transmitting IGMP Leave msg on port 3/1 vlanNo 3 MCAST−SEND: Inband Transmit Succeeded for IGMP Leave Message on port 3/1 vlanNo 3 Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . We can also look at the sh cam system command output to determine if the switch is listening to 01−00−5e−00−00−01 and 01−00−5e−00−00−02 (addresses used for the leave). The client sends a IMPG Leave message to 224.2. fish (enable) sh cgmp leave CGMP: enabled CGMP leave: enabled fish (enable) sh cam sys * = Static Entry. + = Permanent Entry. R = Router Entry.0. X = Port Security Entry VLAN Dest MAC/Route Des [CoS] Destination Ports or VCs / [Protocol Type] −−−− −−−−−−−−−−−−−−−−−− −−−−− −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− 1 00−10−2f−00−14−00 # 7/1 1 00−e0−fe−4b−f3−ff # 1/9 1 01−00−0c−cc−cc−cc # 1/9 1 01−00−0c−cc−cc−cd # 1/9 1 01−00−0c−dd−dd−dd # 1/9 1 01−00−0c−ee−ee−ee # 1/9 1 01−80−c2−00−00−00 # 1/9 1 01−80−c2−00−00−01 # 1/9 2 00−10−2f−00−14−00 # 7/1 2 01−00−0c−cc−cc−cc # 1/9 2 01−00−0c−cc−cc−cd # 1/9 2 01−00−0c−dd−dd−dd # 1/9 2 01−00−5e−00−00−01 # 1/9 2 01−00−5e−00−00−02 # 1/9 2 01−80−c2−00−00−00 # 1/9 2 01−80−c2−00−00−01 # 1/9 3 01−00−0c−cc−cc−cc # 1/9 3 01−00−0c−cc−cc−cd # 1/9 3 01−00−0c−dd−dd−dd # 1/9 3 01−00−5e−00−00−01 # 1/9 3 01−00−5e−00−00−02 # 1/9 3 01−80−c2−00−00−00 # 1/9 Do you wish to continue y/n [n]? y Total Matching CAM Entries Displayed = 22 2.QueryTime = 0 MCAST−IGMP−LEAVE:deletion_timer = 1 MCAST−SEND:Transmitting IGMP Mac Based GS Query msg on port 3/2 vlanNo 3 MCAST−SEND: Transmit Succeeded for IGMP Group Specific Query msg on port 3/2 vlanNo 3 3. Since no response was received.0. The switch intercepts it and sends an IGMP Query on the port on which he receives the leave.Leaving a Group With CGMP Fast−Leave Enabled The example below requires that the client is an IGMP version 2 client and that Fast−Leave is enabled on the switch 1. Below is some debug output on the switch: MCAST−IGMP−LEAVE:Recvd leave on port 3/2 vlanNo 3 MCAST−IGMP−LEAVE:router_port_tbl[vlanNo]. # = System Entry. We need to enable CGMP Fast−Leave. Look at the sh cgmp− leave command output to determine if it is enabled.

10.10 Sending Leave on Fa0. SSAP CR Bit = 00 (Command) LLC: Unnumbered frame: UI LLC: SNAP: −−−−− SNAP Header −−−−− SNAP: SNAP: Vendor ID = Cisco1 SNAP: Type = 2001 (CGMP) SNAP: CGMP: −−−−− Cisco Group Management Protocol −−−−− CGMP: CGMP: Version = 16 CGMP: Type = 0 (Join) CGMP: Reserved CGMP: Count = 1 CGMP: CGMP: Group Destination Address and Unicast Source Address CGMP: Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .8. ISL: −−−−− ISL Protocol Packet −−−−− ISL: ISL: Destination Address = 01000C0000 ISL: Type = 0 (Ethernet) ISL: User = 0 (Normal) ISL: Source Address = 8C958B7B1000 ISL: Length = 76 ISL: Constant value = 0xAAAA03 ISL: Vendor ID = 0x8C958B ISL: Virtual LAN ID (VLAN) = 2 ISL: Bridge Protocol Data Unit (BPDU) = 0 ISL: Port Index = 193 ISL: Reserved ISL: ETHER: −−−−− Ethernet Header −−−−− ETHER: ETHER: Destination = Multicast 01000CDDDDDD <−−−−send to the cgmp macaddress present in ETHER: Source = Station Cisco11411E1 ETHER: 802.5e0a.10.3 GDA 0100.200.108 (Fa0.3) for 224.10.4. Below is the debug on the router: On the Router: IGMP: IGMP: IGMP: CGMP: Received Leave from 10.3 CGMP Traces and Configuration − − − − − − − − − − − − − − − − − − − − Frame 1 − − − − − − − − − − − − − − − − − − − − This is a CGMP Join frame to GDA 00−00−00−00−00−00.0000.3 length = 24 ETHER: LLC: −−−−− LLC Header −−−−− LLC: LLC: DSAP Address = AA. The router receives an IGMP Leave message and sends a CGMP Leave message to the switch and deletes the group from his IGMP group list.3 to 224. DSAP IG Bit = 00 (Individual Address) LLC: SSAP Address = AA. USA 0000.10.10. It is used to add the router port to the router port list.0a0a.10.10.0000 IGMP: Deleting 224.10 Send v2 Query on Fa0.3 to 224.10.10 Send v2 Query on Fa0.10 on Fa0.

0.10] IGMP: Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping ..0C14.10. = internetwork control IP: .0000 =0000.. = last fragment IP: Fragment offset = 0 bytes IP: Time to live = 1 seconds/hops IP: Protocol = 2 (IGMP) IP: Header checksum = CC09 (correct) IP: Source address = [2... . ETHER: Source = Station Cisco176DCCA <−−−−sourced by the PC connected in 3/1 ETHER: Ethertype = 0800 (IP) ETHER: IP: −−−−− IP Header −−−−− IP: IP: Version = 4. . 0...0. .. .10. = normal reliability IP: Total length = 28 bytes IP: Identification = 0 IP: Flags = 0X IP: .11E1 <−−−−−−MAC of Router The frame 1 result is on the switch..10.10..... = normal delay IP: .10..10] IP: No options IP: IGMP: −−−−− IGMP header −−−−− IGMP: IGMP: Version = 1 IGMP: Type = 6 (Ver2 Membership Report) IGMP: Unused = 0x00 IGMP: Checksum = FFEA (correct) IGMP: Group Address = [224.2] IP: Destination address = [224...0 .. with 3/1 being the port that is connected to the router: − − − − − − − − − − − − − − − − − − − − Frame 2 − − − − − − − − − − − − − − − − − − − − This frame is an IGMP membership report sent by the host to request (or confirm) that users want to receive traffic for group 224...0. header length = 20 bytes IP: Type of service = C0 IP: 110. ISL: −−−−− ISL Protocol Packet −−−−− ISL: ISL: Destination Address = 01000C0000 ISL: Type = 0 (Ethernet) ISL: User = 0 (Normal) ISL: Source Address = 8C958B7B1000 ISL: Length = 76 ISL: Constant value = 0xAAAA03 ISL: Vendor ID = 0x8C958B ISL: Virtual LAN ID (VLAN) = 2 ISL: Bridge Protocol Data Unit (BPDU) = 0 ISL: Port Index = 195 ISL: Reserved ISL: ETHER: −−−−− Ethernet Header −−−−− ETHER: ETHER: Destination = Multicast 01005E0A0A0A <−−−− destination is the GDA MAC...1.CGMP: CGMP: CGMP: GDA USA =0000.10.0000. = may fragment IP: ...1...10.. = normal throughput IP: .

.0C76. CGMP: USA =0000. DSAP IG Bit = 00 (Individual Address) LLC: SSAP Address = AA.DCCA <−−−MAC of the PC in 3/1 CGMP: And finally. SSAP CR Bit = 00 (Command) LLC: Unnumbered frame: UI LLC: SNAP: −−−−− SNAP Header −−−−− SNAP: SNAP: Vendor ID = Cisco1 SNAP: Type = 2001 (CGMP) SNAP: CGMP: −−−−− Cisco Group Management Protocol −−−−− CGMP: CGMP: Version = 16 CGMP: Type = 0 (Join) CGMP: Reserved CGMP: Count = 1 CGMP: CGMP: Group Destination Address and Unicast Source Address CGMP: CGMP: GDA =0100.3 length = 24 ETHER: LLC: −−−−− LLC Header −−−−− LLC: LLC: DSAP Address = AA.. Current ! version service service configuration: 12.0A0A <−−− GDA MAC added in sh cam static. ISL: −−−−− ISL Protocol Packet −−−−− ISL: ISL: Destination Address = 01000C0000 ISL: Type = 0 (Ethernet) ISL: User = 0 (Normal) ISL: Source Address = 8C958B7B1000 ISL: Length = 76 ISL: Constant value = 0xAAAA03 ISL: Vendor ID = 0x8C958B ISL: Virtual LAN ID (VLAN) = 2 ISL: Bridge Protocol Data Unit (BPDU) = 0 ISL: Port Index = 193 ISL: Reserved ISL: ETHER: −−−−− Ethernet Header −−−−− ETHER: ETHER: Destination = Multicast 01000CDDDDDD ETHER: Source = Station Cisco11411E1 ETHER: 802. below is the configuration of the router and the switch: Malaga (router) Configuration: Malaga#wr t Building configuration.0 timestamps debug uptime timestamps log uptime Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .− − − − − − − − − − − − − − − − − − − Frame 3 − − − − − − − − − − − − − − − − − − − − This frame is the CGMP frame sent by the router to the switch to tell the switch to add a static entry for 01−00−5e−0a−0a−0a.5E0A.

1 255.255.3.255.1 255.0 no ip redirects no ip directed−broadcast ! interface FastEthernet0.no service password−encryption ! hostname Malaga ! ! ip subnet−zero ip multicast−routing ip dvmrp route−limit 20000 interface FastEthernet0 no ip address no ip directed−broadcast ! interface FastEthernet0.0 no ip redirects no ip directed−broadcast ip pim dense−mode ip cgmp ! Fish configuration for CGMP: #cgmp set cgmp enable set cgmp leave enable ! CGMP statistics for VLAN 3: fish (enable) sh cgmp sta 3 CGMP enabled CGMP statistics for vlan 3: valid rx pkts received invalid rx pkts received valid cgmp joins received valid cgmp leaves received valid igmp leaves received valid igmp queries received igmp gs queries transmitted igmp leaves transmitted failures to add GDA to EARL topology notifications received fish (enable) 109 0 108 1 1 63 1 1 0 0 Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .3 encapsulation isl 3 ip address 3.2.1.1 255.0 no ip redirects no ip directed−broadcast ip pim dense−mode ip cgmp ! interface FastEthernet0.1 encapsulation isl 1 ip address 1.1.2 encapsulation isl 2 ip address 2.255.3.2.255.255.255.

Once a router port is detected. it is added to the port list of all GDAs in that VLAN. And. by enabling IGMP snooping on a switch. when the switch hears an IGMP leave. instead of snooping all multicast traffic for a group. • Catalyst 6000 family: supported without restriction. You can run IGMP snooping with the following hardware and software: • Catalyst 5000 family: with Supervisor III and NFFC or NFFC II. it sends only a few IGMP frames. Joining a Group With IGMP Snooping Below are two joining scenarios.x. • The switch intercepts the IGMP membership report that was sent by the host that wanted to join the group.IGMP Snooping IGMP snooping is another feature that allows you to directly capture IGMP frames. To run IGMP snooping. Rather. Scenario A: Host A is the first host to join a group in the segment. minimum. as implied by the name. and software version 4. Learning the Router Port The switch listens to the following messages in order to detect router ports with IGMP snooping : • IGMP Membership query send to 01−00−5e−00−00−01 • PIMv1 hello send to 01−00−5e−00−00−02 • PIMv2 hello send to 01−00−5e−00−00−0d • DVMRP probes send to 01−00−5e−00−04 • MOSPF message send to 01−00−5e−00−05 or 06 So. • Host A sends an unsolicited IGMP Membership report. This new ASIC layer 3− aware card only snoops IGMP frames. is a feature that allows the switch to "listen in" on the IGMP conversation between hosts and routers. the Cisco implementation of IGMP snooping does not send all the multicast traffic to the switch processor. we are adding all the above MAC entries to the sh cam system command of the snooping switch. you need to have a Netflow feature card. it removes the host's port from the CAM table entry. IGMP Snooping Overview IGMP snooping. Thus. the switch adds the host's port number to the GDA list for that group. Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . When a switch hears an IGMP report from a host for a given multicast group.

the switch forwards IGMP reports to router ports using proxy reporting and will only forward one report per group within 10s. If it receives a response from that port. • The switch issues a group−specific Query IGMP query for the group on that port (and only on that port). Therefore. All hosts members of the group will answer that query. • Since this is the last non−router port for that GDA. • The switch forwards the IGMP report on to all router ports. Note: In order to maintain group membership. Leaving a Group With IGMP Snooping Let's assume host A wants to leave group. the multicast router sends a IGMP query every 60 seconds. the other host does not see each of the other reports. This is so that the router will also receive the IGMP report and will update its multicast routing table accordingly. • Since host B is still interested by that group on that switch. • The switch will not necessarily forward the IGMP report to all router ports. let's assume Host B wants to leave the group and host B is the last user interested by this group in this segment: • The switch captures the IGMP Leave message from host A. • The switch issues a group−specific IGMP query for that group on that port. • The switch intercepts the IGMP membership report sent by the host that wants to join the group. But. Now. Actually.• The switch creates a multicast entry for that group and links it to the port on which it has received the report and to all router ports. the switch did not forward the leave message. • If the switch does not receives a report. it does nothing and discards the leave. This query is intercepted by the switch and forwarded to all ports on the switch. all hosts send a report (instead of one per group). it discards this port from the entry. the switch forwards the IGMP Leave message to all router ports and removes the entry from its table. to forward only one report per group among all received responses. but host B still wants to receive the group: • The switch captures the IGMP Leave message from host A. The switch then uses Proxy Reporting. as well. this would not be the last non−router port in the entry. • As the multicast entry already exists. the switch simply adds the port to the existing CAM entry. and thus. Scenario B: Host B now is the second host to join the same group • Host B sends an unsolicited IGMP Membership report. it discards this port from the entry. • If the switch does not receive a report. Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . given the fact that the switch intercepts the report back as well.

due to hardware limitations. Configuration of IGMP Snooping on Cisco Switches To enable/disable CGMP: set igmp [enable¦disable] Configure (static) multicast a router: set multicast router [mod / port] clear multicast router [mod/port | all] Monitor and check IGMP statistics: sh igmp statistics [vlan_number] sh multicast router Practical Example of IGMP Snooping The setup for this example is similar to that CGMP testing. The switch running IGMP Snooping will detect CGMP messages and will detect that some switches in the network are running CGMP. Therefore. you might need to run CGMP on some switches in the same network. The only difference is that port 3/2 and 3/3 are both connected to the same VLAN and are both client−configured to join group Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . In this case. but you do have a lot of multicast traffic! In this case. These entries are flagged internally as mcast_source_only and will be aged out each 5 minutes. Note that even after this aging. Any reports sent to the router should only be what is strictly needed for IGMP Snooping. Limitations As with CGMP. This is absolutely necessary for the proper operation of CGMP because routers use the source MAC address of the IGMP report in order to create a CGMP Join. used earlier in this document. it will move to a special IGMP−CGMP mode and will disable the proxy reporting. you might end up with a situation where you do not have any IGMP packets in that segment. a switch running IGMP Snooping is able to detect these multicast streams and will add a multicast entry for that group with only the router port. Routers running CGMP need to see all IGMP reports. the switch will simply forward the traffic from that group to everybody in the segment. so we need to disable proxy reporting. Multicast Source−Only Network If the segment contains only one multicast server (multicast source) and no client. Note that this is a special case. the address will be relearned after few seconds if the traffic continues. GDAs that map to a MAC that falls in the range 01−00−5e−00−00−xx will never be pruned by IGMP Snooping. Fortunately. you might not be able to run IGMP Snooping on all switches. or when the router port goes away.IGMP / CGMP Interaction In some networks.

vlanNo 2 MCAST−ROUTER: Creating RouterPortTimer for port 3/1. looks at what the switch does. X = Port Security Entry VLAN −−−− 1 1 1 1 1 1 1 1 1 1 1 1 1 2 2 2 2 2 2 2 2 2 Dest MAC/Route Des −−−−−−−−−−−−−−−−−− 00−10−2f−00−14−00 00−e0−fe−4b−f3−ff 01−00−0c−cc−cc−cc 01−00−0c−cc−cc−cd 01−00−0c−dd−dd−dd 01−00−0c−ee−ee−ee 01−00−5e−00−00−01 01−00−5e−00−00−04 01−00−5e−00−00−05 01−00−5e−00−00−06 01−00−5e−00−00−0d 01−80−c2−00−00−00 01−80−c2−00−00−01 00−10−2f−00−14−00 01−00−0c−cc−cc−cc 01−00−0c−cc−cc−cd 01−00−0c−dd−dd−dd 01−00−5e−00−00−01 01−00−5e−00−00−04 01−00−5e−00−00−05 01−00−5e−00−00−06 01−00−5e−00−00−0d [CoS] −−−−− # # # # # # # # # # # # # # # # # # # # # # Destination Ports or VCs / [Protocol Type] −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− 7/1 1/9 1/9 1/9 1/9 1/9 1/9 1/9 1/9 1/9 1/9 1/9 1/9 7/1 1/9 1/9 1/9 1/9 1/9 1/9 1/9 1/9 2. The following example explains several manipulations. and examines the resulting output. and so on. # = System Entry. R = Router Entry. fish (enable) set igmp en MCAST−IGMP: Set Sys Entries MCAST−SYS−ENTRIES: Add system Entries in vlan 1 MCAST−IGMP: Set Sys Entries MCAST−SYS−ENTRIES: Add system Entries in vlan 2 MCAST−IGMP: Set Sys Entries MCAST−SYS−ENTRIES: Add system Entries in vlan 3 IGMP feature for IP multicast enabled fish (enable) sh cam sys * = Static Entry.224. Notice that each set of entries has been added to the sh cam sys command output. The switch receives a PIMv2 packet from router Malaga and adds the router port.10. MOSPF. vlanNo 2 MCAST−IGMPQ:recvd a PIM V2 packet of type HELLO on the port 3/1 vlanNo 3 MCAST−ROUTER: Adding port 3/1. MCAST−IGMPQ:recvd a PIM V2 packet of type HELLO on the port 3/1 vlanNo 2 MCAST−ROUTER: Adding port 3/1. vlanNo 3 MCAST−ROUTER: Creating RouterPortTimer for port 3/1. Let's enable IGMP snooping on the switch and see the result with the debug. + = Permanent Entry. 1.10.10. allowing for the detection of the router port through PIM. In the following "fish" is a Cat 5500 running IGMP Snooping and "malaga" is the multicast router connected to port 3/1. vlanNo 3 Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .

# = System Entry. Now we add one more user in VLAN 3 on port 3/3: fish (enable) sh cam sta * = Static Entry.QueryTime = 0 MCAST−DEL−TIMER: Deletion Timer Value set to Random Value 1 MCAST−SEND:Transmitting IGMP Mac Based GS Query msg on port 3/2 vlanNo 3 MCAST−SEND: Transmit Succeeded for IGMP Group Specific Query msg on port 3/2 vlanNo 3 MCAST−TIMER:IGMPLeaveTimer expired on port 3/2 vlanNo 3 GDA 01−00−5e−0a−0a−0a MCAST−TIMER:IGMPLeaveTimer:delete leave timer fish (enable) sh cam sta * = Static Entry.10 MCAST−RELAY:Relaying packet on port 3/1 vlanNo 3 MCAST−SEND: Inband Transmit Succeeded for IGMP RELAY msg on port 3/1 vlanNo 3 fish (enable) sh cam sta * = Static Entry. # = System Entry.10. X = Port Security Entry Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping .10. the entry is added. This host sends an IGMP membership report. # = System Entry. 3/2 sends an IGMP Leave message.10. Now let's remove port 3/2. + = Permanent Entry. X = Port Security Entry VLAN −−−− 3 Dest MAC/Route Des −−−−−−−−−−−−−−−−−− 01−00−5e−0a−0a−0a [CoS] −−−−− Destination Ports or VCs / [Protocol Type] −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− 3/1−3 5.10 (on port 3/2). R = Router Entry.10. MCAST−IGMPQ:recvd an IGMP Leave on the port 3/2 vlanNo 3 GDA 224. and the switch sends back an IGMP group−specific query on port 3/2 and starts a timer. it deletes the port from the group.10 MCAST−IGMPQ−LEAVE:router_port_tbl[vlanNo]. When the timer expires without receiving a response.10. X = Port Security Entry VLAN −−−− 3 Dest MAC/Route Des −−−−−−−−−−−−−−−−−− 01−00−5e−0a−0a−0a [CoS] −−−−− Destination Ports or VCs / [Protocol Type] −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− 3/1−2 4. The report is received.10. R = Router Entry. On fish: MCAST−IGMPQ:recvd an IGMP V2 Report on the port 3/2 vlanNo 3 GDA 224. Therefore. R = Router Entry. and the IGMP report is forwarded to the router.fish (enable) sh multi router CGMP disabled IGMP enabled Port −−−−−−−−− 3/1 Vlan −−−−−−−−−−−−−−−− 2−3 Total Number of Entries = 1 '*' − Configured fish (enable) 3. snooped by the switch. Now let's connect a new host in group 224. + = Permanent Entry. + = Permanent Entry.

MCAST−IGMPQ:recvd an IGMP Leave on the port 3/3 vlanNo 3 GDA 224. To finish.10. The multicast entry has disappeared from the sh cam static command output.VLAN −−−− 3 Dest MAC/Route Des −−−−−−−−−−−−−−−−−− 01−00−5e−0a−0a−0a [CoS] −−−−− Destination Ports or VCs / [Protocol Type] −−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−−− 3/1. The only difference from the previous point is that the IGMP Leave message is finally forwarded to the router port.3/3 6.10. let's just have a look at an example of the sh igmp statistic command output. fish (enable) sh igmp stat 2 IGMP enabled IGMP statistics for vlan 2: Total valid pkts rcvd: Total invalid pkts recvd General Queries recvd Group Specific Queries recvd MAC−Based General Queries recvd Leaves recvd Reports recvd Queries Xmitted GS Queries Xmitted Reports Xmitted Leaves Xmitted Failures to add GDA to EARL Topology Notifications rcvd fish (enable) sh igmp stat 3 IGMP enabled IGMP statistics for vlan 3: Total valid pkts rcvd: Total invalid pkts recvd General Queries recvd Group Specific Queries recvd MAC−Based General Queries recvd Leaves recvd Reports recvd Queries Xmitted GS Queries Xmitted Reports Xmitted Leaves Xmitted Failures to add GDA to EARL Topology Notifications rcvd fish (enable) 329 0 82 0 0 0 82 0 0 0 0 0 0 360 0 93 6 0 11 64 0 14 0 10 0 1 Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . Finally. the host on port 3/3 leaves the group and sends an IGMP Leave message.10 MCAST−SEND:Transmitting IGMP Mac Based GS Query msg on port 3/3 vlanNo 3 MCAST−SEND: Transmit Succeeded for IGMP Group Specific Query msg on port 3/3 vlanNo 3 MCAST−TIMER:IGMPLeaveTimer expired on port 3/3 vlanNo 3 GDA 01−00−5e−0a−0a−0a MCAST−TIMER:IGMPLeaveTimer expiry: Transmit IGMP Leave on port 3/1 vlanNo 3 MCAST−SEND:Transmitting IGMP Leave msg on port 3/1 vlanNo 3 MCAST−SEND: Inband Transmit Succeeded for IGMP Leave Message on port 3/1 vlanNo 3 MCAST−TIMER:IGMPLeaveTimer:delete leave timer We are now back at the beginning.

Important Notices and Privacy Statement. 2002 Document ID: 10559 Cisco − Multicast in a Campus Network: CGMP and IGMP Snooping . All rights reserved. Updated: Mar 26.Related Information • LAN Technologies Technical Tips • LAN Technologies Top Issues All contents are Copyright © 1992−−2002 Cisco Systems Inc.

Sign up to vote on this title
UsefulNot useful