Tp-Link T3700G-28TQ V1 Руководство пользователя онлайн [249/415] 393819
237
RPF Mechanism
PIM uses the unicast routing table to perform the RPF check. RPF mechanism ensures the
multicast packets being forwarded correctly according to the multicast routing configuration, and
avoids loops causing by various reasons.
1. RPF Check
The RPF check relies on unicast route or static multicast route. The unicast routing table
aggregates the shortest paths to each destination network segments, and the static multicast
routing table lists specified static RPF routing entries configured by the user manually. Instead of
maintaining certain unicast routing independently, the multicast routing protocol relies on the
current unicast routing information or static multicast routing in the network to establish multicast
routing entries.
When performing the RPF check, the router will look up the unicast routing table and the static
multicast routing table at the same time. The process is as below:
(1) Chose an optimal route from the unicast routing table and the static routing table respectively:
The router looks up the unicast routing table with the IP address of the packet source as the
destination address, and selects an optimal unicast route automatically. The output interface of
the corresponding entry is the RPF interface, and the next hop is the RPF neighbor. The router
will consider the traveling path of the multicast data sent from the RPF neighbor and received
on the RPF interface as the shortest path from the multicast source S to the local network.
The router looks up the static multicast routing table with the IP address of the packet source
specified as the source address, and selects an optimal static multicast route automatically.
The corresponding entry explicitly specifies the RPF interface and RPF neighbor.
(2) Select one from the two optimal routes as the RPF route:
According to the longest mask matching principle, the longest mask matching route between them
will be selected; if the two routes have the same mask, the route with higher priority will be
selected; if the two routes also have the same priority, then the static multicast route is prior to the
unicast route.
2. RPF Mechanism Application
When the router receives multicast packets sent from multicast source S to multicast group G, it
will look up the multicast forwarding table at first:
(1) If the corresponding entry (S, G) exists and the packet’s actual arriving interface is the same
as the input interface in the multicast forwarding table, the packet will be forwarded to all the
output interfaces.
(2) If the corresponding entry (S, G) exists and the packet’s actual arriving interface is different
from the input interface in the multicast forwarding table, the router will perform RPF check on
this packet:
If the check result shows that the RPF interface is the same as the input interface in the current
(S, G) entry, which indicates that the (S, G) entry is correct and the packet from the wrong path
will be discarded;
Содержание
- Ce mark warning 2
- Copyright trademarks 2
- Fcc statement 2
- Safety information 3
- 安全諮詢及注意事項 3
- Package contents 13
- Chapter 1 about this guide 14
- Conventions 14
- Intended readers 14
- Overview of this guide 14
- Chapter 2 introduction 19
- Main features 19
- Overview of the switch 19
- Appearance description 20
- Front panel 20
- Rear panel 23
- Chapter 3 login to the switch 24
- Configuration 24
- Chapter 4 system 26
- System info 26
- System summary 26
- Device description 28
- System time 29
- Daylight saving time 30
- User config 31
- User management 31
- User table 31
- Boot config 33
- System tools 33
- Config restore 34
- Config backup 35
- Firmware upgrade 35
- System reboot 36
- System reset 36
- Access control 37
- Access security 37
- Ssl config 38
- Ssh config 40
- Application example 1 for ssh 41
- Application example 2 for ssh 42
- Chapter 5 stack 46
- Stack info 52
- Stack management 52
- Stack config 53
- Switch renumber 54
- Configuration procedure 55
- Application example for stack 56
- Chapter 6 switching 57
- Port config 57
- The following entries are displayed on this screen 57
- Port mirror 58
- Port security 60
- Port isolation 62
- Loopback detection 63
- Lag table 66
- Static lag 67
- Lacp config 68
- Traffic monitor 70
- Traffic summary 70
- Traffic statistics 71
- Mac address 73
- Address table 74
- Static address 75
- Dynamic address 77
- Filtering address 79
- Chapter 7 vlan 81
- Q vlan 82
- Vlan config 83
- Port config 85
- Configuration procedure 86
- Application example for 802 q vlan 87
- Mac vlan 88
- Configuration procedure 89
- Port enable 89
- Application example for mac vlan 90
- Protocol group table 92
- Protocol vlan 92
- Protocol group 93
- Protocol template 94
- Application example for protocol vlan 95
- Configuration procedure 95
- Vlan vpn 97
- Port enable 98
- Vpn config 98
- Vlan mapping 99
- Configuration procedure of vlan mapping function 101
- Configuration procedure of vlan vpn function 101
- Configuration procedure 104
- Private vlan 105
- Pvlan config 106
- Port config 107
- Application example for private vlan 108
- Configuration procedure 108
- Chapter 8 spanning tree 111
- Stp config 116
- Port config 118
- Stp summary 118
- Mstp instance 120
- Region config 120
- Instance config 121
- Instance port config 122
- Global configuration procedure for spanning tree function 124
- Port protect 124
- Stp security 124
- Application example for stp function 127
- Tc protect 127
- Chapter 9 multicast 132
- Igmp snooping 134
- Snooping config 135
- Port config 136
- Vlan config 138
- Configuration procedure 139
- Multicast vlan 139
- Configuration procedure 141
- Querier config 141
- Application example for multicast vlan 143
- Multicast ip 144
- Multicast ip table 144
- Static multicast ip 145
- Multicast filter 147
- Profile config 147
- Profile binding 149
- Configuration procedure 150
- Packet statistics 150
- Chapter 10 routing 152
- Interface 152
- Routing table 155
- Static routing 155
- Application example for static routing 156
- Dhcp server 157
- Dhcp server 163
- Pool setting 165
- Binding table 166
- Manual binding 166
- Packet statistics 167
- Application example for dhcp server and relay 169
- Dhcp relay 170
- Global config 172
- Configuration procedure 174
- Dhcp server 174
- Proxy arp 174
- Proxy arp 175
- Application example for proxy arp 176
- Basic config 180
- Interface config 182
- Rip database 183
- Application example for rip 184
- Process 202
- Network 205
- Interface 206
- Area aggregation 212
- Virtual link 213
- Route redistribution 214
- Asbr aggregation 215
- 0 neighbor table 216
- 1 link state database 218
- 2 application example for ospf 218
- Basic config 224
- Advanced config 226
- Virtual ip config 227
- Track config 228
- Virtual router statistics 229
- Application example for vrrp 231
- Chapter 11 multicast routing 233
- Global config 234
- Mroute table 235
- Interface config 240
- Interface state 241
- Static multicast config 242
- Multicast group table 243
- Profile binding 244
- Configuration procedure 246
- Packet statistics 246
- Application example for igmp 247
- Pim dm 248
- Pim dm interface 253
- Pim dm neighbor 253
- Application example for pim dm 255
- Pim sm 256
- Pim sm interface 262
- Pim sm neighbor 263
- Rp mapping 266
- Rp info 267
- Application example for pim sm 268
- Static mroute 269
- Static mroute config 270
- Static mroute table 271
- Application example for static mroute 272
- Chapter 12 qos 274
- Diffserv 277
- Port priority 277
- Configuration procedure 278
- Schedule mode 278
- 802 p priority 279
- Configuration procedure 280
- Dscp priority 280
- Configuration procedure 281
- Bandwidth control 282
- Rate limit 282
- Storm control 283
- Voice vlan 284
- Global config 286
- Port config 287
- Oui config 288
- Configuration procedure of voice vlan 289
- Chapter 13 acl 290
- Time range 290
- Time range summary 290
- Time range create 291
- Acl config 292
- Holiday config 292
- Acl create 293
- Acl summary 293
- Mac acl 294
- Standard ip acl 294
- Extend ip acl 295
- Policy config 297
- Policy create 297
- Policy summary 297
- Action create 298
- Binding table 299
- Policy binding 299
- Port binding 300
- Vlan binding 301
- Application example for acl 302
- Configuration procedure 302
- Binding table 304
- Chapter 14 network security 304
- Ip mac binding 304
- Manual binding 305
- Arp scanning 307
- Dhcp snooping 309
- Global config 311
- Port config 313
- Arp inspection 314
- Arp detect 317
- Arp defend 318
- Configuration procedure 318
- Arp statistics 319
- Ip source guard 320
- Dos defend 322
- Dos defend 323
- Global config 327
- Port config 328
- Radius server 330
- Configuration procedure 331
- Chapter 15 snmp 332
- Global config 334
- Snmp config 334
- Snmp view 335
- Snmp group 336
- Snmp user 337
- Snmp community 339
- Configuration procedure 340
- Notification 341
- Statistics 343
- History 344
- Chapter 16 lldp 349
- Lldp working mechanism 349
- Lldpdu format 349
- Basic config 352
- Global config 352
- Port config 353
- Device info 354
- Local info 355
- Neighbor info 356
- Device statistics 357
- Elements 358
- Lldp med 358
- Global config 359
- Port config 360
- Local info 362
- Neighbor info 363
- Chapter 17 cluster 365
- Neighbor info 366
- Ndp summary 367
- Ndp config 368
- Device table 369
- Ntdp summary 371
- Ntdp config 372
- Cluster 373
- Cluster summary 373
- Cluster config 376
- Member config 379
- Cluster topology 380
- Application example for cluster function 382
- Chapter 18 maintenance 384
- Cpu monitor 384
- System monitor 384
- Memory monitor 385
- Log table 386
- Local log 387
- Remote log 388
- Backup log 389
- Cable test 389
- Device diagnostics 389
- Loopback 391
- Network diagnostics 391
- Tracert 392
- Chapter 19 system maintenance via ftp 394
- Configure the hyper terminal 394
- Hardware installation 394
- Download firmware via bootutil menu 396
- Appendix a specifications 400
- Appendix b configuring the pcs 402
- Appendix c 802 x client software 404
- Installation guide 404
- Uninstall software 407
- Configuration 409
- Appendix d glossary 412
Похожие устройства
- Tp-Link T3700G-28TQ V1 Руководство по быстрому старту
- Tp-Link T3700G-28TQ V1 Инструкция по установке
- Tp-Link T3700G-28TQ V1 Rackmount Switch_EU2_12Languages__ Installation Guide
- Tp-Link T2500-28TC V2 Руководство по использованию коммандной строки
- Tp-Link T2500-28TC V2 Руководство пользователя
- Tp-Link T2500-28TC V2 Инструкция по установке
- Tp-Link T2500-28TC V2 Руководство по быстрому старту
- Tp-Link T2500-28TC V1 Руководство по использованию коммандной строки
- Tp-Link T2500-28TC V1 Инструкция по установке
- Tp-Link T2500-28TC V1 Руководство пользователя
- Tp-Link T2500-28TC V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство по использованию коммандной строки
- Tp-Link T3700G-52TQ V1 Инструкция по установке
- Tp-Link T3700G-52TQ V1 Руководство по быстрому старту
- Tp-Link T3700G-52TQ V1 Руководство пользователя
- Champion LM5127BS Деталировка
- Champion LM5127BS Инструкция по установке
- Champion LM5347BS Руководство пользователя
- Champion LM5347BS Деталировка
- Champion EM3110 Руководство пользователя