This chapter describes IGMP, PIM-SM, and IGMP snooping configurations.