Hi all, we've been experiencing some multicast problems and I'm hopeful that the experts out there can give me a hand figuring them out before I decide to throw in the towel and put in place GRE tunneling.
Some facts about our network:
Each of our PE has at least 3 uplinks to at least 2 different Pops.
Each PE receives about 90k BGP routes from our 4 route-reflectors with a default route (0/0) for any missing specific routes.
Each PE receives about 3k multicast routes from our 4 route-reflectors with a default route (0/0) for any missing specific routes.
ISISI is our IGP (L1 only, multitopology -- IPv6 unicast/multicast is running as well on all PE with the full ipv6 table (18k))
RFP check is running on all backbone line in loose mode (ip verify unicast source reachable-via any)
PIM sparse mode is active on all backbone links.
There are multiple paths with equal cost metrics on all backbone links and inbound/outbound traffic is not symmetrical (...yes I know)
There are 2 anycast RP (one in the north and the second in the south). IGP metrics determine which is used.
One of our clients it trying to join a group but he's having problems doing so. The configuration of his interface is correct.
From the PE he is connected to as well as within our lab, I can join the group that he is interested in on the router using igmp:
We are pleased to announce availability of Beta software for 16.6.3.
16.6.3 will be the second rebuild on the 16.6 release train targeted
towards Catalyst 9500/9400/9300/3850/3650 switching platforms. We are
looking for early feedback from customers befor...
Introduction Featured Speakers Luis Espejel is the Telecommunications
Manager of IENova, an Oil & Gas company. Currently he works with Cisco
IOS® and Cisco IOS XE platforms, and NX to some extent. He has also
worked as a Senior Engineer with the Routing P...
In this session you can learn more about Layer 3 multicast and the best
practices to identify possible threats and take security measures. It
provides an overview of basic multicast, the best security practices for
use of this technology, and recommendati...