D-Link DES-7200 Refrigerator User Manual


  Open as PDF
of 1968
 
DES-7200 Configuration Guide Chapter 9 MLD Snooping Configuration
9-15
range FF88::123
9.4 Configuring Other Restrictions for MLD Snooping
MLD Snooping source port should be checked with Masks, definition of which can
be seen the section "Configuring access control list".
Address binding , source
port check and ACL are applied by sharing Masks, total number of which is
decided by different products.
Due to limited number of Masks, the three functions
may influence each other.
Two masks are occupied when enabling Address
binding function. It is the same with enabling source port check. Masks available
for ACL depend on whether these two functions have been enabled.
Suppose 8
masks should be available for ACL under default condition, when enabling
Address binding function or source port check, masks available for ACL will
decrease by two.
If Address binding and source port check are both enabled, the
masks available for ACL will be reduced by four and only four remains.
On the
other way, when ACL is using a number of masks and the remaining masks
cannot meet the need of the two applications, the system will display the
information of masks resource exhausted when enabling Address binding or
source port check.
When one of the three functions is not in normal state due to
masks limitation, masks occupied for the other two functions may be reduced to
return the function to normal.
When three functions are all enabled and masks
exhausted information is shown after enabling source port check, you may
disable Address binding function (delete all address binding) or delete the ACE of
ACL that occupies a number of masks, and thus source port check can be
normally enabled.
When enabling MLD Snooping or setting router port and source port check has
been enabled, source port check may fail because of insufficient masks. Then,
the system will show "Source port check applying failed for hardware out of
resources".
You should release other masks, disable again before enabling
source port check.
9.5 Typical Configuration Example of MLD Snooping
Networking Requirements
A multicast source server, a layer 3 multicast equipment, an access switch, three
multicast requesters;
Layer 3 multicast equipment supports PIM-SMv6 function;
The access switch supports MLD Snooping functions.
Networking Topology