Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?


About This Network Configuration Example


This network configuration example describes the advantages of and uses for PIM snooping. It also provides a step-by-step procedure for configuring and verifying PIM snooping for VPLS.