Allied Telesis Patch 86261-04 Manuel d'utilisateur Page 44

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 48
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs
Vue de la page 43
44 add ip filter Patch Release Note
Patch 86261-09 for Software Release 2.6.1
C613-10388-00 REV J
add ip filter
Syntax ADD IP FILter=filter-number {ACTion=INCLude|EXCLude}
SOurce=ipadd [SMask=ipadd] [ENTry=entry-number] [other-
parameters]
Description This command adds a pattern to a routing filter. For details about the
command parameters, see Table on page 44
Parameters for the BGP route import feature in the add ip f
IGMP Snooping All-Group Entry
Because IGMP is an IP-based protocol, multicast group membership for VLAN
aware devices is on a per-VLAN basis. If at least one port in the VLAN is a
member of a multicast group, multicast packets will be flooded onto all ports in
the VLAN by default.
IGMP snooping enables the switch to forward multicast traffic intelligently on
the switch. The switch listens to IGMP membership reports, queries and leaves
messages to identify the switch ports that are members of multicast groups.
Multicast traffic will only be forwarded to ports identified as members of the
specific multicast group.
This enhancement allows network managers to prevent specified ports from
acting as IGMP all-group ports, and specify which ports are allowed to behave
as all-group entry ports, by using the ENABLE IP IGMP ALLGROUP
command.
For example, consider a video streaming service which has 15 channels. When
the switch receives IGMP membership reports destined for the address
239.0.0.2 from an unauthorised user, all 15 channels of multicast data floods to
that port, which may affect the service of the network. In order to avoid this,
the network manager decides whether or not to allow a particular port to
behave as an IGMP all-group port, e.g. port 8. Then, whenever the above IGMP
Parameter Option/Range Description
filter-number
300...399
Filters in the range 300 to 399 are treated as routing filters, and use the action
parameter to specify the action to take with a route that matches the pattern.
ACTion The action to take when the filter pattern is matched.
INCLude Route information matching the filter will be included.
EXCLude Route information matching the filter will be excluded.
SOurce The source IP address, in dotted decimal notation, for the filter pattern.
SMask The mask, in dotted decimal notation, to apply to source addresses for this pattern.
The mask is used to determine the portion of the source IP address in the IP packet
that is significant for comparison with this pattern. The values of source and smask
must be compatible. For each bit in smask which is set to zero (0) the equivalent bit
in source must also be zero (0). If source is not 0.0.0.0, then smask can not be
0.0.0.0. The default is 255.255.255.255, unless source is 0.0.0.0.
ENTry entry-number The entry parameter specifies the entry number in the filter which this new pattern
occupy. Existing patterns with the same or higher entry numbers are pushed down
the filter. The default is to add the new pattern to the end of the filter.
*Caps denote command shortcuts
Vue de la page 43
1 2 ... 39 40 41 42 43 44 45 46 47 48

Commentaires sur ces manuels

Pas de commentaire