Configuring Multicast Monitoring Options (NSM Procedure)
Multicast is a way for a Layer 2 device to monitor at
the Layer 3 packet content to determine which actions are to be taken
to process or forward a frame. There are specific forms of , such
as IGMP or PIM . In all cases, monitoring involves a device configured
to function at Layer 2 having access to Layer 3 (packet) information.
Monitoring makes multicasting more efficient in these devices.
To configure multicast monitoring in NSM:
- In the navigation tree select Device Manager > Devices.
- In the Devices list, double click the device
to select it.
- In the Configuration tab, expand Multicast
Monitoring Options.
- Add or modify the settings as specified in Table 1.
- Click one:
- OK—To save the changes.
- Cancel—To cancel the modifications.
Table 1: Multicast Monitoring
Options Configuration Details
Task | Your Action |
---|
Establish a list of flood group
addresses for multicast monitoring. | - Click Flood Groups next to Multicast Monitoring
Options.
- Click Add new entry next to Flood Groups.
- In the dialog box, enter the IP addresses.
|
Configure multicast forwarding
cache properties. | - Click Forwarding Cache next to Multicast Monitoring
Options.
- In the Comment box, enter the comments.
- Expand Forwarding Cache.
- Click Threshold next to Forwarding Cache.
- In the Comment box, enter the comments.
- From the Suppress list, select the threshold
value for a forwarding cache.
Range: 1 through 200,000 - From the Reuse list, select the reuse value
for the threshold. The reuse value must be less than the suppression
threshold value.
Range: 1 through 200,000
|
Establish the graceful restart
duration for multicast monitoring. | - Click Graceful Restart next to Multicast Monitoring
Options.
- In the Comment box, enter the comments.
- From the Restart Duration list, select the
duration for graceful restart.
Range: 0 to 300 seconds Default : 180 seconds
|
Establish multicast monitoring
option values. | - Click Option next to Multicast Monitoring Options.
- In the Comment box, enter the comments.
- Expand Options.
- Click Syslog next to Options.
- In the Comment box, enter the comments.
- From the Upto list, select the level up to
which severity the messages to be system logged.
- From the Mark list, select the time interval
in seconds to mark the trace file.
Range : -2147483647 seconds to 2147483647 Seconds Default : 0 - Expand Syslog.
- Click Level next to Syslog.
- Select the Level of severity to be logged.
|
Configure tracing options. | - Click Traceoptions next to Multicast Monitoring
Options.
- In the Comment box, enter the comments.
- Expand Traceoptions.
- Click File next to Trace Options.
- In the Comment box, enter the comments.
- In the Filename box, enter the name of the
file to receive the output of the tracing operation. Enclose the name
within quotation marks.
- In the Size box, enter the maximum size of
each trace file in bytes.
Range : 10240 to 4,294,967,295 bytes - From the Files list, select the maximum number
of files.
- Select the world-readable option to enable
log file access to all users.
- Select the no-world-readable option to prevent
all users from reading the log file.
- Click Flag next to Trace Options.
- Click Add new entry next to flag.
- From the Name list, select a tracing operation
to perform.
- In the Comment box, enter the comments.
|
Published: 2013-01-06