Manual

+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
240
unicast routing must be assured beforehand. (DVMRP uses its own unicast table, please use
show ip dvmrp route command to look up).
If all attempts including Check are made but the problems on DVMRP can’t be solved yet, then
please use commands such as debug DVMRP, and then copy DEBUG information in 3
minutes and send to Technology Service Center.
28.8 DCSCM
28.8.1 Introduction to DCSCM
DCSCM (Destination control and source control multicast) technology mainly includes three
aspects, i.e. Multicast Packet Source Controllable, Multicast User Controllable and Service-
Oriented Priority Strategy Multicast.
The Multicast Packet Source Controllable technology of Security Controllable Multicast
technology is mainly processed in the following manners:
On the edge switch, if source under-control multicast is configured, then only multicast data
from specified group of specified source can pass.
For RP switch in the core of PIM-SM, for REGISTER information out of specified source and
specified group, REGISTER_STOP is transmitted directly and table entry is not allowed to set
up. (This task is implemented in PIM-SM model).
The implement of Multicast User Controllable technology of Security Controllable Multicast
technology is based on the control over IGMP report message sent out by the user, thus the
model being controlled is IGMP snooping and IGMPmodel, of which the control logic includes
the following three, i.e. to take control based on VLAN+MAC address transmitting packets, to
take control based on IP address of transmitting packets and to take control based on the port
where messages enter, in which IGMP snooping can use the above three methods to take
control simultaneously, while since IGMP model is located at layer 3, it only takes control over
the IP address transmitting packets.
The Service-Oriented Priority Strategy Multicast of Security Controllable technology adopts the
following mode: for multicast data in limit range, set the priority specified by the user at the
join-in end so that data can be sent in a higher priority on TRUNK port, consequently
guarantee the transmission is processed in user-specified priority in the entire network.
28.8.2 DCSCM Configuration Task List
Source Control Configuration
Destination Control Configuration
Multicast Strategy Configuration
Source Control Configuration