Multicast packets are always flooded to trunked vlan ports
I've some problems with configuring a catalyst 6506.
The setup is as follows:
On two ports from the switch (1/3 and 1/4) the same vlan 12 tagged multicast stream 220.127.116.11 is received; but the source address differs: on trunked port 1/3 the stream has src ip 10.10.10.10 and on trunked port 1/4 the stream has src 10.10.10.11.
On trunked port 1/7 there is a host that sends vlan 12 tagged IGMPv3 source specific reports to receive stream 18.104.22.168 but only from source 10.10.10.10.
The stream is always received 2 times by the host regardless of the host sends out IGMPv3 reports to receive the MC or not.
When an IGMPv3 report is send by the host this is tracked by the igmp snooper as follows:
test#show ip igmp snooping explicit-tracking vlan 12
Re: Multicast packets are always flooded to trunked vlan ports
On the C6500 indeed IOS 12.2SXF was running.
I've upgraded the C6500 to IOS 12.2.SXH but the result is the same as with the 12.2SXF software.
I did a capture on the outgoing port and on that port every querier from a vlan sends out an IGMPv3 general query. When a device receives this query, it reply's with an IGMPv3 report. So I think IGMPv3 is supported.
I don't understand why the igmp snooper doesn't stop the flooding of all the MC packets when an IGMPv3 report is received.
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...