iiConfiguring Group Policy and Simulated Joining··········································································2-19Static Port Configuration················································································································2-21IGMP Snooping Querier Configuration··························································································2-25Troubleshooting IGMP Snooping Configuration ···················································································2-27Switch Fails in Layer 2 Multicast Forwarding ················································································2-27Configured Multicast Group Policy Fails to Take Effect ································································2-273 Multicast VLAN Configuration··················································································································3-1Introduction to Multicast VLAN················································································································3-1Multicast VLAN Configuration Task List··································································································3-3Configuring Sub-VLAN-Based Multicast VLAN ······················································································3-3Configuration Prerequisites ·············································································································3-3Configuring Sub-VLAN-Based Multicast VLAN···············································································3-3Configuring Port-Based Multicast VLAN ·································································································3-4Configuration Prerequisites ·············································································································3-4Configuring User Port Attributes······································································································3-4Configuring Multicast VLAN Ports ···································································································3-5Displaying and Maintaining Multicast VLAN ···························································································3-6Multicast VLAN Configuration Examples ································································································3-6Sub-VLAN-Based Multicast VLAN Configuration············································································3-6Port-Based Multicast VLAN Configuration ····················································································3-104 MLD Snooping Configuration···················································································································4-1MLD Snooping Overview ························································································································4-1Introduction to MLD Snooping·········································································································4-1Basic Concepts in MLD Snooping···································································································4-2How MLD Snooping Works ·············································································································4-3Protocols and Standards ·················································································································4-5MLD Snooping Configuration Task List ··································································································4-5Configuring Basic Functions of MLD Snooping ······················································································4-6Configuration Prerequisites ·············································································································4-6Enabling MLD Snooping··················································································································4-6Configuring the Version of MLD Snooping ······················································································4-7Configuring MLD Snooping Port Functions ····························································································4-7Configuration Prerequisites ·············································································································4-7Configuring Aging Timers for Dynamic Ports ··················································································4-8Configuring Static Ports···················································································································4-8Configuring Simulated Joining·········································································································4-9Configuring Fast Leave Processing ······························································································4-10Configuring MLD Snooping Querier······································································································4-11Configuration Prerequisites ···········································································································4-11Enabling MLD Snooping Querier···································································································4-11Configuring MLD Queries and Responses····················································································4-12Configuring Source IPv6 Addresses of MLD Queries ···································································4-13Configuring an MLD Snooping Policy ···································································································4-14Configuration Prerequisites ···········································································································4-14Configuring an IPv6 Multicast Group Filter····················································································4-14Configuring IPv6 Multicast Source Port Filtering···········································································4-15Configuring MLD Report Suppression···························································································4-16