37.3 DHCP SNOOPING OPTION 82 APPLICATION EXAMPLES................................................................... 37-86
37.4 DHCP SNOOPING OPTION 82 TROUBLESHOOTING.......................................................................... 37-87
CHAPTER 38 IPV4 MULTICAST PROTOCOL ............................................................38-88
38.1 IPV4 MULTICAST PROTOCOL OVERVIEW ......................................................................................... 38-88
38.1.1 Introduction to Multicast .................................................................................................... 38-88
38.1.2 Multicast Address .............................................................................................................. 38-89
38.1.3 IP Multicast Packet Transmission ..................................................................................... 38-90
38.1.4 IP Multicast Application ..................................................................................................... 38-91
38.2 DCSCM........................................................................................................................................ 38-91
38.2.1 Introduction to DCSCM ..................................................................................................... 38-91
38.2.2 DCSCM Configuration Task List........................................................................................ 38-92
38.2.3 DCSCM Configuration Examples...................................................................................... 38-95
38.2.4 DCSCM Troubleshooting .................................................................................................. 38-96
38.3 IGMP SNOOPING........................................................................................................................... 38-96
38.3.1 Introduction to IGMP Snooping......................................................................................... 38-96
38.3.2 IGMP Snooping Configuration Task List ........................................................................... 38-97
38.3.3 IGMP Snooping Examples ................................................................................................ 38-99
38.3.4 IGMP Snooping Troubleshooting .................................................................................... 38-102
CHAPTER 39 IPV6 MULTICAST PROTOCOL ..........................................................39-103
39.1 MLD SNOOPING .......................................................................................................................... 39-103
39.1.1 Introduction to MLD Snooping ........................................................................................ 39-103
39.1.2 MLD Snooping Configuration Task ................................................................................. 39-103
39.1.3 MLD Snooping Examples ............................................................................................... 39-105
39.1.4 MLD Snooping Troubleshooting...................................................................................... 39-108
CHAPTER 40 MULTICAST VLAN .............................................................................40-109
40.1 INTRODUCTIONS TO MULTICAST VLAN ......................................................................................... 40-109
40.2 MULTICAST VLAN CONFIGURATION TASK LIST ............................................................................. 40-109
40.3 MULTICAST VLAN EXAMPLES...................................................................................................... 40-110
CHAPTER 41 ACL CONFIGURATION ......................................................................41-113
41.1 INTRODUCTION TO ACL................................................................................................................ 41-113
41.1.1 Access-list ....................................................................................................................... 41-113
41.1.2 Access-group .................................................................................................................. 41-113
41.1.3 Access-list Action and Global Default Action................................................................... 41-114
41.2 ACL CONFIGURATION TASK LIST.................................................................................................. 41-114
41.3 ACL EXAMPLE ............................................................................................................................ 41-128
41.4 ACL TROUBLESHOOTING ............................................................................................................. 41-133
CHAPTER 42 802.1X CONFIGURATION ..................................................................42-135
42.1 INTRODUCTION TO 802.1X ............................................................................................................ 42-135
9