Wired Networks

How to configure IGMPV3 Snooping on MAS 7.4

IGMPV3 snooping is supported only from MAS 7.4 code.

 

  • IGMPV3 snooping is applicable to “L2 switches”
  • Enhancement of IGMPv1/v2 w.r.to.
  • Builds the source entry based on the (S,G) report received from the host.
  • IGMPv3 Snooping is used to snoop the membership reports that have group records of different types. These group records specify the source specific Multicast (SSM) traffic for a particular group.
  • With IGMPv3 snooping feature, it will make switch source specific multicast (SSM) aware and would be able to service SSM aware clients.

IGMP snooping is used at the edge of the network to optimize network bandwidth.  Specifically, devices that support IGMP snooping listen for the IGMP reports that hosts send in order to join an IP multicast group.  These devices record which host has joined which IP multicast group, and only forward IP multicast traffic to the hosts that have joined the specific multicast group of the packet

 

IGMP-snooping can be enabled on L2 vlan, which will contain the flooding domain and suppress reports towards the router ports. In such a case, we will limit the generation of queries only from L3 Manager. Reports will be learnt both by igmp-snooping and igmp. IGMP snooping maintains list of interfaces on a vlan where hosts have subscribed to multicast streams. This database is maintained by snooping IGMP reports on each interface.
 

  • All the considerations and configurations are similar to what exists today, i.e. snooping (V2 snooping) is enabled by default in an igmp-snooping profile. However, a new configuration command need to be issued for V3 snooping explicitly. IGMPV3 snooping feature will snoop the membership reports which will have group records of different types. These group records will specify source specific Multicast (SSM) traffic for a particular group.
  • The group record types used by V3 in the membership reports are:

     IS_INCLUDE
     IS_EXCLUDE
     TO_INCLUDE
     TO_EXCLUDE
     ALLOW_SRCS
     BLOCK_SRCS

 

 

Environment : There is no special environment or requirement for this feature to work as this configuration can be used for any requirement of multicast services.

 

Network Topology : No specific requirement of topology as we could configure this feature in any environment.

 

You can use the following CLI command to enable IGMPv3 snooping in an igmp-snooping profile:
(host) (config) #vlan-profile igmp-snooping-profile <profile-name>
(host) (igmp-snooping-profile "<profile-name>") #snooping v3
 
 To enable v3 snooping proxy, use the following command:
(host) (igmp-snooping-profile "<profile-name>") #snooping-proxy v3
 
To apply the igmp-snooping profile on a VLAN interface
(host) (config) #vlan <id>
(host) (VLAN "<id>") #igmp-snooping-profile <profile-name>
 
Sample Configuration
(host) (config) #vlan-profile igmp-snooping-profile igmp-snoop-11
(host) (igmp-snooping-profile "igmp-snoop-11") #snooping v3
(host) (igmp-snooping-profile "igmp-snoop-11") #snooping-proxy v3
(host) (config) #vlan 11
(host) (VLAN "11") #igmp-snooping-profile igmp-snoop-11
 
show IGMPv3 configurations
(host) # show vlan-profile igmp-snooping-profile igmp-snoop-11
igmp-snooping-profile "igmp-snoop-11" (N/A)
-------------------------------------------
Parameter Value
--------- -----
IGMP snooping Enabled
IGMPv3 snooping Enabled
IGMP snooping proxy Enabled
IGMPv3 snooping proxy Enabled
Enable fast leave Enabled
startup-query-count 2
startup-query-interval(secs) 31
query-interval(secs) 15000
query-response-interval(secs) 10
last-member-query-count 2
last-member-query-interval(secs) 10
robustness-variable 2
 
Snooping Proxy:
 In wired switching world IGMP snooping proxy is aimed at containing number of IGMP join/leaves to be sent to routers.
               
You can use the following command on a VLAN interface to know the IGMP Snooping version in use:
(host) #show vlan 11 extensive
Dot1q tag: 11, Description: VLAN0011
IGMP-snooping profile name: igmp-snoop-11
IGMP-snooping: Enabled, Version: 3
IGMP-snooping proxy: Enabled, Version: 3
MAC aging time: 5 minutes
Number of interfaces: 28, Active: 22
VLAN membership:
GE0/0/2* Access Trusted Untagged
GE0/0/3* Access Trusted Untagged
GE0/0/4* Access Trusted Untagged
GE0/0/5* Access Trusted Untagged
GE0/0/6* Access Trusted Untagged
GE0/0/7* Access Trusted Untagged
NOTE:
 IGMPv3 Snooping is effective only when all the clients under the VLAN are v3 capable. If a V2 client joins the IGMPv3 Snooping enabled VLAN, the VLAN downgrades the snooping to IGMPv2 causing the v3 capable clients on the VLAN to receive traffic from all sources in that group.
 
 
(ArubaS3500-24P) #show igmp-snooping membership detail
Flags: H - IGMP/MLD listener, M - Multicast Router
       S - Multicast Source, * - Downgraded to V2
 
Group:225.0.0.3 Vlan:0011
  Port: GE0/0/13   Expiry: 00:04:16 Uptime: 00:00:04
        (H)  IP: 11.1.1.20        MAC: 00:00:04:00:00:00
        (S)  SRC: 11.1.1.51       
        (S)  SRC: 11.1.1.52       
 
When there is a downgrade of snooping mode from V3 to V2, all the (S,G) entries for the V3 members are cleared and corresponding (*,G) are established. From following we can make out which member is downgraded to (*,G).
(ArubaS3500-24P) #show igmp-snooping membership detail
Flags: H - IGMP/MLD listener, M - Multicast Router
       S - Multicast Source, * - Downgraded to V2
 
Group:225.0.0.3 Vlan:0011
  Port: GE0/0/13   Expiry: 00:03:59 Uptime: 00:00:21
        (*H)  IP: 11.1.1.20        MAC: 00:00:04:00:00:00
 
 
(Host) # show igmp-snooping membership detail
Flags: H - IGMP/MLD listener, M - Multicast Router
       S - Multicast Source, * - Downgraded to V2
Group:239.116.107.240 Vlan:0011
  Port: GE2/0/1    Expiry: 00:03:57 Uptime: 07:36:08
        (H)  IP: 10.1.30.12       MAC: 00:10:94:00:00:ee        Filter: INCLUDE
        (S)  SRC: 63.63.63.69
        (S)  SRC: 63.63.63.70
        (S)  SRC: 63.63.63.71
        (S)  SRC: 63.63.63.72
        (S)  SRC: 63.63.63.63
        (S)  SRC: 63.63.63.64
        (S)  SRC: 63.63.63.65
        (S)  SRC: 63.63.63.66
        (S)  SRC: 63.63.63.67
        (S)  SRC: 63.63.63.68

Group:239.116.107.243 Vlan:0011
  Port: GE2/0/2    Expiry: 00:03:39 Uptime: 07:36:59
        (H)  IP: 10.1.30.12       MAC: 00:10:94:00:00:ee        Filter: EXCLUDE
        (S)  SRC: 63.63.63.69
        (S)  SRC: 63.63.63.70
        (S)  SRC: 63.63.63.71
        (S)  SRC: 63.63.63.72

 

 

From the above steps we were able to successfully configure IGMPV3 snooping on MAS.

 

Here are the below commands to verify igmp snooping

show igmp-snooping membership detail.
show vlan <id> extensive
show vlan-profile igmp-snooping-profile igmp-snoop-

 

 

Here are the configuration trace options to enable debugging for this feature. Find below.

(7member) (traceoptions) #igmp-snooping flags ?
all                     Enable tracing on all igmp-snooping modules
config                  Enable igmp-snooping configuration tracing
errors                  Enable igmp-snooping error tracing
receive                 Enable igmp-snooping PDU received (RX) tracing
transmit                Enable igmp-snooping PDU transmit (TX) tracing
<cr>
 
((7member) #show trace igmp-snooping
Jul 29 17:12:03 trace_on: Tracing to "/var/log/traces/mc.log" startedJul 29 17:12:03 [MC-SEND] Send (V3 Report) on (GSmiley Sad239.0.0.7), V:63) egress:8713 intfSmiley Sadport-channel8)
Jul 29 17:12:03 [MC-SEND] Send (V3 Report) on (GSmiley Sad229.0.0.3), V:63) egress:8713 intfSmiley Sadport-channel8)
Jul 29 17:12:03 [MC-SEND] Send (V3 Report) on (GSmiley Sad229.0.0.3), V:63) egress:8713 intfSmiley Sadport-channel8)
Jul 29 17:12:03 [MC-SEND] Send_V3_Query(General) on (G:,V:65) egress:8708 intf(port-channel3)
Jul 29 17:12:03 [MC-RECV] IGMP V3 report
Jul 29 17:12:03 [MC-RECV] IGMP (V3 Report) received on interface(port-channel3) vlan(65) for group (224.0.0.6)
Jul 29 17:12:03 [MC-ERR] Reserved multicast group address: (224.0.0.6)
Jul 29 17:12:03 [MC-ERR] Reserved multicast group address: (224.0.0.6)
Jul 29 17:12:04 [MC-SEND] Send (V3 Report) on (GSmiley Sad229.0.0.10), V:63) egress:8713 intfSmiley Sadport-channel8)
Jul 29 17:12:04 [MC-SEND] Send (V3 Report) on (GSmiley Sad229.0.0.10), V:63) egress:8713 intfSmiley Sadport-channel8)
Jul 29 17:12:04 [MC-SEND] Send (V3 Report) on (GSmiley Sad229.0.0.8), V:63) egress:8713 intfSmiley Sadport-channel8)
Jul 29 17:12:04 [MC-SEND] Send (V3 Report) on (GSmiley Sad229.0.0.8), V:63) egress:8713 intfSmiley Sadport-channel8)
Jul 29 17:12:04 [MC-SEND] Send (V3 Report) on (GSmiley Sad229.0.0.6), V:63) egress:8713 intfSmiley Sadport-channel8)
Jul 29 17:12:04 [MC-SEND] Send (V3 Report) on (GSmiley Sad229.0.0.6), V:63) egress:8713 intfSmiley Sadport-channel8)

Version history
Revision #:
1 of 1
Last update:
‎04-07-2015 01:52 PM
Updated by:
 
Labels (1)
Contributors
Search Airheads
Showing results for 
Search instead for 
Did you mean: 
Is this a frequent problem?

Request an official Aruba knowledge base article to be written by our experts.