I have a basic multicast scenario that I am deploying with a VSS 6500 in the core with 4948 connecting to the VSS 6500 hosting the multicast server. I then have the multicast clients connecting via 3750E's that also connect to the VSS 6500.
On the VSS core I have enabled multicast routing and pim dense mode on the SVI Layer 3 interfaces connecting to the multicast server segment aswell as to the access device segment.
On the 4948 and the 3750E, I have enabled "ip igmp snooping" globally.
I am not receiving any multicast traffic on my client device.
To me this setup sounds like it should work. Please post the output of "sh ip mroute" from the core router, are you seeing the multicast group being forwarded out of the access layer Vlan?
Also look at "sh mac-address-table multicast igmp-snooping" on the access layer switches to see if the client ports are registered against the multicast group.
igmp snooping is not required to get this working, it is just a feature to limit the ports the multicast stream are sent to in a layer 2 network. In fact I've seen it cause problems in some multicast implementations.
I agree with James, it does sound like you have configured the basics to get it going.
One thing worth checking is the TTL the server sets in the multicast app. If TTL is set to 1 then it will only stay local to the server subnet. Basically you need to factor in the maximum number of L3 hops from server to client and set the TTL to be greater than that.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...