Manual

+7(495) 797-3311 www.qtech.ru
Москва, Новозаводская ул., 18, стр. 1
241
Source Control Configuration has three parts, of which the first is to enable source control. The
command of source control is as follows:
Command
Explanation
Global Configuration Mode
[no] ip multicast source-control
(Required)
Enable source control globally, the “no ip multicast
source-controlcommand disables source control
globally. It is noticeable that, after enabling source
control globally, all multicast packets are discarded
by default. All source control configuration can not
be processed until that it is enabled globally, while
source control can not be disabled until all
configured rules are disabled.
The next is to configure the rule of source control. It is configured in the same manner as for
ACL, and uses ACL number of 5000-5099, every rule number can be used to configure 10
rules. It is noticeable that these rules are ordered, the front one is the one which is configured
the earliest. Once the configured rules are matched, the following rules won’t take effect, so
rules of globally allow must be put at the end. The commands are as follows:
Command
Explanation
Global Configuration Mode
[no] access-list <5000-5099>
{deny|permit} ip {{<source> <source-
wildcard>}|{host-source <source-
host-ip>}|any-source} {{<destination>
<destination-wildcard>}|{host-
destination <destination-host-
ip>}|any-destination}
The rule used to configure source control. This rule
does not take effect until it is applied to specified
port. Using the NO form of it can delete specified
rule.
The last is to configure the configured rule to specified port.
Note: If the rules being configured will occupy the table entries of hardware, configuring too
many rules will result in configuration failure caused by bottom table entries being full, so we
suggest user to use the simplest rules if possible. The configuration rules are as follows:
Command
Explanation
Port Configuration Mode
[no] ip multicast source-control
access-group <5000-5099>
Used to configure the rules source control uses to
port, the NO form cancels the configuration.
Destination Control Configuration
Like source control configuration, destination control configuration also has three steps.
First, enable destination control globally. Since destination control need to prevent
unauthorized user from receiving multicast data, the switch won’t broadcast the multicast data