[c-nsp] MLD snooping

Phil Mayers p.mayers at imperial.ac.uk
Mon Nov 8 04:55:43 EST 2010


On 11/08/2010 07:27 AM, Multicast maillist wrote:
> As per RFC 4541 (Considerations for Internet Group Management Protocol
> (IGMP)and Multicast Listener Discovery (MLD) Snooping Switches), it is
> inferred that forwarding criteria for all multicast IPv6 address (except
> ff02::1) is always based on group database as MLD is mandated for all the
> multicast v6 address.
>
> As per this, there is no special consideration for solicited multicast
> addresses or multicast addresses used for protocol control traffic.
>
> I feel this could cause issues in protocol adjacency maintenance or DAD
> process.

Not in the absence of bugs. You are REQUIRED to join the relevant group 
for the address you are performing DAD on; see RFC 2461 section 7.2.1

The post you link to is talking about a virtual IP on a BigIP; if I had 
to guess I'd say the BigIP is (was, since the post is two years old) buggy.

At a quick glance I'm not sure how IOS handles OSPFv3, but it doesn't 
appear to be a problem.

>
> Shouldn’t the MLD snooping enabled switch forward the traffic for solicited
> multicast address and protocol control packets to all the ports of VLAN?
>

IPv6 subnets can potentially be huge - millions of hosts. Flooding ND 
and DAD requests to all ports may simply not work under those 
circumstances - there may be hundreds of packets/second of such traffic.

The expired draft you link to seemed primarily concerned with soft-state 
size in MLD-snooping switches, although it does mention robustness. 
Frankly from a forward-looking point of view, I think "RAM is cheap" is 
a better argument than "bandwidth is cheap".

Personally I've never seen MLD snooping as a failure mode; perhaps 
others can comment.


More information about the cisco-nsp mailing list