Cisco Support Community
cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
Community Member

IGMP Snooping @ VPLS

Hello All,

Are there any best practices guidelines for the configuration of a "system-ip-address" on a IGMP SNOOPING profile ?

igmp snooping profile TESTES_SNOOPING

system-ip-address 1.1.1.1

internal-querier

!

For instance, using a different "system-ip-address" on the VPLS PE members would be a good practice ?

It seems that any legal IPv4 IP address fits the purpose.

Thank you!

1 REPLY
Community Member

Re: IGMP Snooping @ VPLS

If you want to use the internal querier command you must use the system-ip-address because the router by default use the ip address 0.0.0.0. In "IOS-XR command reference" indicates some circumstances where you could change the system-ip-address :

The system-ip-address command configures an IP address for IGMP snooping use. If not explicitly configured, the default address is 0.0.0.0. The default is adequate except in the following circumstances:

  • If you are configuring an internal querier. The internal querier cannot use 0.0.0.0.
  • If the bridge needs to communicate with a non-Cisco IGMP router that does not accept the 0.0.0.0 address.

IGMP snooping uses the value set by the system-ip-address command in the following ways:

  • The internal-querier sends queries from the system IP address. An address other than the default 0.0.0.0 must be configured.
  • IGMPv3 sends proxy reports from the system IP address. The default address 0.0.0.0 is preferred but may not be acceptable to some IGMP routers.
  • In response to topology change notifications (TCNs) in the bridge domain, IGMP snooping sends global-leaves from the system IP address. The default address 0.0.0.0 is preferred but may not be acceptable to some IGMP routers.

http://www.cisco.com/en/US/docs/routers/asr9000/software/asr9k_r4.2/multicast/command/reference/b_mcast_cr42asr9k_chapter_0100.html#wp936383286

785
Views
0
Helpful
1
Replies
CreatePlease to create content