Help us improve your experience.

Let us know what you think.

Do you have time for a two-minute survey?

 

About This Network Configuration Example

 

This network configuration example describes the advantages of and uses for PIM snooping. It also provides a step-by-step procedure for configuring and verifying PIM snooping for VPLS.