{"draft":"draft-ietf-pals-vpls-pim-snooping-06","doc_id":"RFC8220","title":"Protocol Independent Multicast (PIM) over Virtual Private LAN Service (VPLS)","authors":["O. Dornon","J. Kotalwar","V. Hemige","R. Qiu","Z. Zhang"],"format":["ASCII","HTML"],"page_count":"43","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Pseudowire And LDP-enabled Services","abstract":"This document describes the procedures and recommendations for\r\nVirtual Private LAN Service (VPLS) Provider Edges (PEs) to facilitate\r\nreplication of multicast traffic to only certain ports (behind which\r\nthere are interested Protocol Independent Multicast (PIM) routers\r\nand\/or Internet Group Management Protocol (IGMP) hosts) via PIM\r\nsnooping and proxying.\r\n\r\nWith PIM snooping, PEs passively listen to certain PIM control\r\nmessages to build control and forwarding states while transparently\r\nflooding those messages. With PIM proxying, PEs do not flood PIM\r\nJoin\/Prune messages but only generate their own and send them out of\r\ncertain ports, based on the control states built from downstream\r\nJoin\/Prune messages. PIM proxying is required when PIM Join\r\nsuppression is enabled on the Customer Edge (CE) devices and is\r\nuseful for reducing PIM control traffic in a VPLS domain.\r\n\r\nThis document also describes PIM relay, which can be viewed as\r\nlightweight proxying, where all downstream Join\/Prune messages are\r\nsimply forwarded out of certain ports and are not flooded, thereby\r\navoiding the triggering of PIM Join suppression on CE devices.","pub_date":"September 2017","keywords":["multicast"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC8220","errata_url":null}