IGMP Snooping Filters

IGMP snooping filters allow you to configure a policy file on a port to allow or deny IGMP report and leave packets coming into the port. (For details on creating policy files, see Policy Manager.) The IGMP snooping filter feature is supported by IGMPv2 and IGMPv3.

Note

Note

Do not confuse IGMP snooping filters with IGMP snooping hardware filters explained in previous section. IGMP snooping filters are software filters, and the action is applied at the software level by the ExtremeXOS multicast manager.

For the policies used as IGMP snooping filters, all the entries should be IP address type entries, and the IP address of each entry must be in the class-D multicast address space but should not be in the multicast control subnet range (224.0.0.x/24).

  1. Use the following template to create a snooping filter policy file that denies IGMP report and leave packets for the 239.11.0.0/16 and 239.10.10.4/32 multicast groups:
    #
    # Add your group addresses between "Start" and "end"
    # Do not touch the rest of the file!!!!
    entry igmpFilter {
    if match any {
    #------------------ Start of group addresses ------------------
    nlri  239.11.0.0/16;
    nlri  239.10.10.4/32;
    #------------------- end of group addresses -------------------
    } then {
    deny;
    }
    }
    entry catch_all {
    if {
    } then {
    permit;
    }
    }
  2. After you create a policy file, use the following command to associate the policy file and filter to a set of ports:
    configure igmp snooping vlan vlanname ports portlist filter [policy | none]
  3. To remove the filter, use the none option.
  4. To display the IGMP snooping filters, use the following command:
    show igmp snooping {vlan} name filter