Configuring MLD Snooping

Multicast Listener Discovery (MLD) snooping enables a Layer 2 device to listen to and analyze MLD messages exchanged between a connected Layer 3 device and downstream user hosts. The Layer 2 device then uses the message information to set up multicast forwarding entries to implement on-demand multicast data forwarding at the data link layer.

Usage Scenario

On an IPv6 multicast network, after an upstream device sends the service flow of a multicast program, a Layer 2 device at the edge of the access layer forwards the flow to multicast users. The users can then enjoy the multicast program service. As shown in Figure 1, multicast data messages are broadcast at the data link layer by default, causing bandwidth waste.

To resolve this issue, configure MLD snooping on the Layer 2 device, allowing this device to listen to the MLD messages exchanged between the upstream device and downstream hosts. The Layer 2 device can then analyze the messages and generate Layer 2 multicast forwarding entries based on the message information to implement on-demand multicast data forwarding at the link layer.

Figure 1 Multicast message transmission before and after MLD snooping is configured on a Layer 2 device

On the network shown in Figure 1, Receiver A and Receiver B request the service of a multicast group, but Receiver C does not. Before MLD snooping is configured, the Layer 2 device broadcasts the multicast data at the data link layer, and all the receivers can receive the data. After MLD snooping is configured, the Layer 2 device sends the multicast data only to Receiver A and Receiver B who request the data. Therefore, Receiver C does not receive the data of the multicast group.

Pre-configuration Tasks

  • Configure basic VLAN and VPLS functions.

Data Preparation

To configure MLD snooping, you need the following data.

No.

Data

1

VLAN ID or VSI name (for which MLD snooping needs to be configured)

2

(Optional) Router interface aging time

3

(Optional) Aging time of dynamic group members, and the range of group and source addresses that hosts can promptly join or leave

4

(Optional) Range and number of multicast groups to be limited

5

(Optional) Aging time of entries triggered by multicast traffic

Copyright © Huawei Technologies Co., Ltd.
Copyright © Huawei Technologies Co., Ltd.
< Previous topic Next topic >