Re: LAB 14 Task 4.5 EIGRP "no ip igmp snooping vlan 1363"

From: ismail el-shalh (ishelh_mdsa@yahoo.com)
Date: Fri Aug 04 2006 - 12:02:14 ART


  Bajo thanks , I got the idea now.
   
  :)

Bajo <bajoalex@gmail.com> wrote:
    Sorry forgot the link (under 35050):
  http://www.cisco.com/univercd/cc/td/doc/product/lan/c3550/12225see/scg/swigmp.htm#wp1027678

 
  On 8/4/06, Bajo <bajoalex@gmail.com> wrote: Ismail,
   
  As DOC CD says, "IGMP snooping requires the LAN switch to snoop on the IGMP transmissions between the host and the router and to keep track of multicast groups and member ports"...
   
  So what they are doing is denying an EIGRP update (multicast ...etc) from reaching BB3 (f0/23) and allowing others (f0/1=R1, f0/3=R3, and f0/6=R6) to get any updates.

     
  

 
  On 8/4/06, ismail el-shalh <ishelh_mdsa@yahoo.com > wrote: Hi Group,

R6 BB3
|.6 .254 |
| |
| 204.12.X.0/24 VLAN 1363 |
---------------------------------------------
    | |
    | .3 | .1
   R3 R1

*The task stating "Do not allow BB3 to intercept EIGRP updates coming from any of these devices (R3 and R1)
*Do not use the neighbor command to accomplish this

here is the solution

no ip igmp snooping vlan 1363 <----- What this command will do here?

int fas0/24
ip access-group DENY_EIGRP in

ip access-list extended DENY_EIGRP
deny eigrp any any
permit ip any any

mac-address table static 0000.0c09.f442 vlan 1363 interface fas0/1 fas0/3 fas0/6

also what the mac-address table .. command will do ?

There is no explination for this task in the IEWB.

Thanking your replies :)

Ismail



This archive was generated by hypermail 2.1.4 : Fri Sep 01 2006 - 15:41:56 ART