|
Rafalg
Created May 5, 2021 12:36:27
(0)
(0)
Reply in last message. They are working only to transmit multicast over igmp snooping vlan, trunk port and this is connected to another network devices which does support igmp snooping, and at last one there is access port type where multicast if delivered.
Rafalg
Created May 5, 2021 12:36:40
(0)
(0)
Reply in last message. They are working only to transmit multicast over igmp snooping vlan, trunk port and this is connected to another network devices which does support igmp snooping, and at last one there is access port type where multicast if delivered. |
Rafalg
Created May 5, 2021 12:34:23
(0)
(0)
Theres igmp snooping enabled on some vlans to distribute milticast vlan 2010 description Stream1 igmp-snooping enable # interface Vlanif2010 ip address 192.168.246.1 255.255.255.0 pim silent pim sm igmp enable # vlan 2010 description Stream1 igmp-snooping enable # interface Vlanif2011 ip address 192.168.247.1 255.255.255.0 pim silent pim sm igmp enable # vlan 2011 description Stream2 igmp-snooping enable Clients are not directly connected. port |
Rafalg
Created May 5, 2021 16:45:48
(0)
(0)
Thanks. My problem is resolved now partially. I can set like acl number 2000 rule 5 deny source 225.1.1.4 0 rule 10 deny source 225.1.1.5 0 igmp-snooping group-policy 2000 But this doesn't priority source 1 or 2. Deny 224.2.2.0/24 would block both sources there, any trick to make it only for specific source only ? Can you point me how to set "block source 2 from any use of 224.2.2.0/24 (no matter if source 1 is available or not)" |
|