The igmp-snooping static-router-port command configures a PW-side interface in a VSI as a static router port.
The undo igmp-snooping static-router-port command deletes the static router port configuration.
By default, no PW-side interface in a VSI is configured as a static router port.
igmp-snooping static-router-port remote-peer ip-address [ negotiation-vc-id vc-id ]
undo igmp-snooping static-router-port remote-peer ip-address [ negotiation-vc-id vc-id ]
Parameter |
Description |
Value |
---|---|---|
remote-peer ip-address |
Specifies the IP address of the remote peer. |
The value is in dotted decimal notation. |
negotiation-vc-id vc-id |
Specifies a virtual circuit ID. Generally, this parameter is specified when two ends of a PW have different VSI names. The vc-id parameter must specify an unused VC ID. That is, the specified VC ID cannot be the same as the VSI ID configured for any other VSI or the VC ID specified by negotiation-vc-id vc-id in another VSI. |
The value is an integer that ranges from 1 to 4294967295. |
Usage Scenario
To allow the interface connected to an upstream router to keep receiving or forwarding IGMP Report/Leave packets for a long time, configure the interface as a static router port.
Prerequisites
IGMP snooping has been enabled for VPLS using the igmp-snooping over-vpls enable command in the system view.
Precautions
The configuration takes effect only when IGMP snooping is enabled in the VSI using the igmp-snooping enable (VSI view) command.
# Configure the PW-side interface (with remote peer 1.1.1.1) as a static router port.
<HUAWEI> system-view [HUAWEI] igmp-snooping enable [HUAWEI] igmp-snooping over-vpls enable [HUAWEI] vsi company1 [HUAWEI-vsi-company1] igmp-snooping enable [HUAWEI-vsi-company1] igmp-snooping static-router-port remote-peer 1.1.1.1