cancelar
Mostrando los resultados de 
Buscar en lugar de 
Quiere decir: 
cancel
946
Visitas
10
ÚTIL
8
Respuestas

Problemas de conectividad entre 2 switches

NocBritel
Level 1
Level 1

Buenas.

 

Recientemente he configurado 2 switches para tráfico multicast y de internet, tengo separado el tráfico en 2 VLANs, una para cada tráfico, al interconectar ambos switches he logrado que vean el internet, pero no el tráfico multicast, el puerto dedicado a esa VLAN de cada lado del switch no reconoce ninguna MAC del otro lado. Cuando he logrado que se comunique el multicas por una de las VLANs entonces pierdo el internet. No he logrado que coexistan las 2 VLANs, sin embargo en otros switches que también he configurado sí que funciona. Estoy intentando llevar tráfico multicast de un CiscoSG350 a un CiscoCBS250. He habilitado el protocolo IGMP en ambos extremos y he configurado los puertos como routing y aún así no veo nada de un lado ni de otro.

 

Por favor si alguien tiene alguna experiencia al respecto y me puede ayudar.

Gracias de antemano.

8 RESPUESTAS 8

Sergey Lisitsin
VIP Alumni
VIP Alumni

Hola,

 

Puede monstrar las configuraciones de los switches. 

Gracias, adjunto ambas configuraciones.

Configuración Switch SG350

switchdaf1ac#show running-config

config-file-header

switchdaf1ac

v2.5.0.83 / RTESLA2.5_930_364_091

CLI v1.0

file SSD indicator encrypted

@

ssd-control-start

ssd config

ssd file passphrase control unrestricted

no ssd file integrity control

ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0

!

!

unit-type-control-start

unit-type unit 1 network gi uplink none

unit-type-control-end

!

bridge multicast filtering

vlan database

vlan 521-522

exit

voice vlan oui-table add 0001e3 Siemens_AG_phone________

voice vlan oui-table add 00036b Cisco_phone_____________

voice vlan oui-table add 00096e Avaya___________________

voice vlan oui-table add 000fe2 H3C_Aolynk______________

voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone

voice vlan oui-table add 00d01e Pingtel_phone___________

voice vlan oui-table add 00e075 Polycom/Veritel_phone___

voice vlan oui-table add 00e0bb 3Com_phone______________

bonjour interface range vlan 1

hostname switchdaf1ac

username ***** password encrypted ********** privilege 15

ip ssh server

!

interface vlan 521

 name Canales

 bridge multicast forbidden ip-address 239.0.25.2 add gi1-3,gi5-7

 bridge multicast forward-all add gi4,gi9

!

interface vlan 522

 name Internet

 ip address ******* 255.255.255.0

 bridge multicast forward-all add gi2-3

!

interface GigabitEthernet1

 switchport trunk native vlan none

 switchport trunk allowed vlan 521

!

interface GigabitEthernet2

 description *********

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan none

 switchport trunk allowed vlan 1,522

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface GigabitEthernet3

 description **********

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan none

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface GigabitEthernet4

 description ************

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan none

 switchport trunk native vlan none

 switchport trunk allowed vlan 521-522

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface GigabitEthernet8

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport general allowed vlan add 521 tagged

 switchport access vlan 521

 switchport trunk native vlan none

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface GigabitEthernet9

 description Conexion_VLAN_521

 spanning-tree link-type point-to-point

 switchport access vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface GigabitEthernet10

 description Gestion_522_y_VLAN521T

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 522

 switchport trunk allowed vlan 1,521-522

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

exit

ip igmp snooping

ip igmp snooping vlan 521

ip igmp snooping vlan 521 mrouter interface gi4,gi8-9

ip igmp snooping vlan 521 immediate-leave

ip igmp snooping vlan 521 static 224.168.65.66 interface gi2,gi9-10

ip igmp snooping vlan 521 static 239.0.25.2 interface gi4,gi8-10

ip igmp snooping vlan 521 querier

 

 

Configuración Switch CBS250

switch0616df#show running-config

config-file-header

switch0616df

v3.0.0.69 / RCBS3.0_930_770_008

CLI v1.0

file SSD indicator encrypted

@

ssd-control-start

ssd config

ssd file passphrase control unrestricted

no ssd file integrity control

ssd-control-end cb0a3fdb1f3a1af4e4430033719968c0

!

!

unit-type-control-start

unit-type unit 1 network gi uplink te

unit-type-control-end

!

bridge multicast filtering

vlan database

vlan 521-522

exit

voice vlan oui-table add 0001e3 Siemens_AG_phone

voice vlan oui-table add 00036b Cisco_phone

voice vlan oui-table add 00096e Avaya

voice vlan oui-table add 000fe2 H3C_Aolynk

voice vlan oui-table add 0060b9 Philips_and_NEC_AG_phone

voice vlan oui-table add 00d01e Pingtel_phone

voice vlan oui-table add 00e075 Polycom/Veritel_phone

voice vlan oui-table add 00e0bb 3Com_phone

bonjour interface range vlan 1

hostname switch0616df

username *******password encrypted ******* privilege 15

ip ssh server

!

interface vlan 521

 name Multicast_Canales

 bridge multicast forbidden ip-address 224.168.11.27 add gi1-4,gi6-23,te1-4

 bridge multicast forbidden ip-address 224.168.11.29 add gi1-24,te1-4

 bridge multicast forbidden ip-address 224.168.11.155 add gi1-8,gi10-24,te2-4

 bridge multicast forbidden ip-address 224.168.11.156 add gi1-8,gi10-24,te2-4

 bridge multicast forbidden ip-address 224.168.11.157 add gi1-8,gi10-24,te2-4

 bridge multicast forbidden ip-address 224.168.11.158 add gi1-8,gi10-24,te2-4

 bridge multicast forbidden ip-address 224.168.11.199 add gi1-2,gi4-24,te2-4

 bridge multicast forbidden ip-address 224.168.11.201 add gi1-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.10 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.11 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.12 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.13 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.14 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.15 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.16 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.17 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.18 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 224.168.14.19 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.20 add gi1-10,gi12-24,te2-4

 bridge multicast forbidden ip-address 224.168.14.22 add gi1-24,te1-4

 bridge multicast forbidden ip-address 224.168.31.101 add gi1,gi4-10,gi12-24,te2

 bridge multicast forbidden ip-address 224.168.31.101 add te4

 bridge multicast forbidden ip-address 224.168.32.2 add gi1-4,gi6-10,gi12-24

 bridge multicast forbidden ip-address 224.168.32.2 add te2-4

 bridge multicast forbidden ip-address 224.168.32.4 add gi1-4,gi6-10,gi12-24

 bridge multicast forbidden ip-address 224.168.32.4 add te2-4

 bridge multicast forbidden ip-address 224.168.60.2 add gi1-10,gi12-24,te3-4

 bridge multicast forbidden ip-address 224.168.60.3 add gi1-24,te1,te3-4

 bridge multicast forbidden ip-address 224.168.60.5 add gi1-24,te1,te3-4

 bridge multicast forbidden ip-address 224.168.65.65 add gi1-8,gi10-24,te1-4

 bridge multicast forbidden ip-address 224.169.10.11 add gi1-24,te2,te4

 bridge multicast forbidden ip-address 224.169.10.12 add gi1-24,te2,te4

 bridge multicast forbidden ip-address 224.169.10.13 add gi1-24,te2,te4

 bridge multicast forbidden ip-address 224.169.10.14 add gi1-24,te2,te4

 bridge multicast forbidden ip-address 224.169.11.20 add gi1-24,te2,te4

 bridge multicast forbidden ip-address 224.169.17.21 add gi1-24,te2-4

 bridge multicast forbidden ip-address 224.171.25.25 add gi1-24,te2-4

 bridge multicast forbidden ip-address 224.171.25.26 add gi1-24,te2,te4

 bridge multicast forbidden ip-address 224.171.29.102 add gi1-24,te2-4

 bridge multicast forbidden ip-address 224.171.30.12 add gi1-24,te2,te4

 bridge multicast forbidden ip-address 224.171.30.13 add gi1-24,te2-4

 bridge multicast forbidden ip-address 224.178.101.2 add gi1-10,gi12-24,te2,te4

 bridge multicast forbidden ip-address 224.178.102.2 add gi1-10,gi12-24,te2,te4

 bridge multicast forbidden ip-address 224.178.103.2 add gi1-10,gi12-24,te2,te4

 bridge multicast forbidden ip-address 224.178.104.2 add gi1-10,gi12-24,te2,te4

 bridge multicast forbidden ip-address 230.1.50.101 add gi1-2,gi4-8,gi10,gi12-24

 bridge multicast forbidden ip-address 230.1.50.101 add te1-4

 bridge multicast source 172.172.13.14 group 230.1.50.101 add gi3,gi9,gi11

 bridge multicast forbidden source 172.172.13.14 group 230.1.50.101 add gi1-2,gi4-8,gi10,gi12-24

 bridge multicast forbidden source 172.172.13.14 group 230.1.50.101 add te1-4

 bridge multicast forbidden ip-address 234.5.2.98 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.103 add gi1-8,gi10,gi12-24,te2-4

 bridge multicast forbidden ip-address 234.5.2.104 add gi1-2,gi4-10,gi12-24

 bridge multicast forbidden ip-address 234.5.2.104 add te1-4

 bridge multicast forbidden ip-address 234.5.2.105 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.107 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.109 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.110 add gi1-2,gi4-10,gi12-24

 bridge multicast forbidden ip-address 234.5.2.110 add te1-4

 bridge multicast forbidden ip-address 234.5.2.111 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.112 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.113 add gi1-2,gi4-10,gi12-24

 bridge multicast forbidden ip-address 234.5.2.113 add te1-4

 bridge multicast forbidden ip-address 234.5.2.116 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.117 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.119 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.123 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.124 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.137 add gi1-8,gi10,gi12-24,te2-4

 bridge multicast forbidden ip-address 234.5.2.145 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.146 add gi1-10,gi12-24,te1-4

 bridge multicast forbidden ip-address 234.5.2.148 add gi1-2,gi4-10,gi12-24

 bridge multicast forbidden ip-address 234.5.2.148 add te1-4

 bridge multicast forbidden ip-address 234.5.2.180 add gi1-4,gi6-24,te2-4

 bridge multicast forbidden ip-address 239.0.25.1 add gi1-4,gi6-11,gi13-24

 bridge multicast forbidden ip-address 239.0.25.1 add te4

 bridge multicast source 10.1.19.5 group 239.0.25.1 add gi2,gi5,gi12,te1-3

 bridge multicast forbidden source 10.1.19.5 group 239.0.25.1 add gi1,gi3-4,gi6-11,gi13-24

 bridge multicast forbidden source 10.1.19.5 group 239.0.25.1 add te4

 bridge multicast forbidden ip-address 239.0.25.2 add gi1-4,gi6-11,gi13-24

 bridge multicast forbidden ip-address 239.0.25.2 add te4

 bridge multicast source 10.1.19.5 group 239.0.25.2 add gi2,gi5,gi12,te1-3

 bridge multicast forbidden source 10.1.19.5 group 239.0.25.2 add gi1,gi3-4,gi6-11,gi13-24

 bridge multicast forbidden source 10.1.19.5 group 239.0.25.2 add te4

 bridge multicast forbidden ip-address 239.0.25.3 add gi1-4,gi6-11,gi13-24

 bridge multicast forbidden ip-address 239.0.25.3 add te4

 bridge multicast source 10.1.19.5 group 239.0.25.3 add gi2,gi5,gi12,te1-3

 bridge multicast forbidden source 10.1.19.5 group 239.0.25.3 add gi1,gi3-4,gi6-11,gi13-24

 bridge multicast forbidden source 10.1.19.5 group 239.0.25.3 add te4

 bridge multicast forbidden ip-address 239.0.25.4 add gi1-4,gi6-11,gi13-24

 bridge multicast forbidden ip-address 239.0.25.4 add te4

 bridge multicast source 10.1.19.5 group 239.0.28.4 add gi2,gi5,gi12,te1-3

 bridge multicast forbidden source 10.1.19.5 group 239.0.28.4 add gi1,gi3-4,gi6-11,gi13-24

 bridge multicast forbidden source 10.1.19.5 group 239.0.28.4 add te4

!

interface vlan 522

 name *******

 ip address 154.62.74.18 255.255.255.0

 bridge multicast forward-all add gi7

!

interface GigabitEthernet1

 description Gestión_522

 switchport access vlan 522

 switchport trunk native vlan 522

!

interface GigabitEthernet2

 description ……..

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface GigabitEthernet3

 description ……..

 switchport access vlan 521

 switchport trunk native vlan 521

!

interface GigabitEthernet4

 description *********

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan none

 switchport trunk native vlan 521

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface *******

 description IPVT2_VLAN521

 switchport access vlan 521

 switchport trunk native vlan 521

!

interface GigabitEthernet6

 description IPVT3_VLAN521

 switchport access vlan 521

 switchport trunk native vlan 521

!

interface *******

 description Internet_522

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan none

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface ******

 description Salidas_Inca_521_P2

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 521

 switchport trunk native vlan 521

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface ******

 description Entradas_Inca_521_P7

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 521

 switchport trunk native vlan 521

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface *********

 description Monitorización_Inca_521_P3

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 521

 switchport trunk native vlan 521

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface ********

 description Conexión_SW24SFP_VLAN521_Tx

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 521

 switchport trunk native vlan 521

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface *********

 description Ole_comunicaciones_VLAN_521

 switchport access vlan 521

 switchport trunk native vlan none

 switchport trunk allowed vlan none

!

interface ********

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 521

 switchport trunk native vlan 521

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface **********

 speed 1000

 flowcontrol on

 description Airenetwork

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 521

 switchport trunk native vlan none

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface *************

 description PTV(Procono)

 ip address 192.168.15.2 255.255.255.0

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan 521

 switchport trunk native vlan 521

 switchport trunk allowed vlan 521

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

interface ************

 description Emagina(TVUp)

 ip address 192.168.133.129 255.255.255.252

 switchport mode trunk

 switchport access vlan none

 switchport trunk native vlan none

 switchport trunk allowed vlan 521

!

interface *************

 description Espacio_Rack

 spanning-tree link-type point-to-point

 switchport mode trunk

 switchport access vlan none

 switchport trunk native vlan none

 switchport trunk allowed vlan 521-522

 macro description switch

 !next command is internal.

 macro auto smartport dynamic_type switch

!

exit

ip igmp snooping

ip igmp snooping vlan 521

ip igmp snooping vlan 521 mrouter interface gi2

ip igmp snooping vlan 521 immediate-leave

ip igmp snooping vlan 521 static 224.168.11.27 interface gi5

ip igmp snooping vlan 521 static 224.168.11.155 interface gi9,te1

ip igmp snooping vlan 521 static 224.168.11.156 interface gi9,te1

ip igmp snooping vlan 521 static 224.168.11.157 interface gi9,te1

ip igmp snooping vlan 521 static 224.168.11.158 interface gi9,te1

ip igmp snooping vlan 521 static 224.168.11.199 interface gi3,te1

ip igmp snooping vlan 521 static 224.168.11.201 interface te1

ip igmp snooping vlan 521 static 224.168.14.10 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.11 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.12 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.13 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.14 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.15 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.16 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.17 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.18 interface gi11

ip igmp snooping vlan 521 static 224.168.14.19 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.14.20 interface gi11,te1

ip igmp snooping vlan 521 static 224.168.31.101 interface gi2-3,gi11,te1,te3

ip igmp snooping vlan 521 static 224.168.32.2 interface gi5,gi11,te1

ip igmp snooping vlan 521 static 224.168.32.4 interface gi5,gi11,te1

ip igmp snooping vlan 521 static 224.168.60.2 interface gi11,te1-2

ip igmp snooping vlan 521 static 224.168.60.3 interface te2

ip igmp snooping vlan 521 static 224.168.60.5 interface te2

ip igmp snooping vlan 521 static 224.168.65.65 interface gi9

ip igmp snooping vlan 521 static 224.168.65.66 interface gi9

ip igmp snooping vlan 521 static 224.169.10.11 interface te1,te3

ip igmp snooping vlan 521 static 224.169.10.12 interface te1,te3

ip igmp snooping vlan 521 static 224.169.10.13 interface te1,te3

ip igmp snooping vlan 521 static 224.169.10.14 interface te1,te3

ip igmp snooping vlan 521 static 224.169.11.11

ip igmp snooping vlan 521 static 224.169.11.20 interface te1,te3

ip igmp snooping vlan 521 static 224.169.17.21 interface te1

ip igmp snooping vlan 521 static 224.171.25.25 interface te1

ip igmp snooping vlan 521 static 224.171.25.26 interface te1,te3

ip igmp snooping vlan 521 static 224.171.29.102 interface te1

ip igmp snooping vlan 521 static 224.171.30.12 interface te1,te3

ip igmp snooping vlan 521 static 224.171.30.13 interface te1

ip igmp snooping vlan 521 static 224.178.101.2 interface gi11,te1,te3

ip igmp snooping vlan 521 static 224.178.102.2 interface gi11,te1,te3

ip igmp snooping vlan 521 static 224.178.103.2 interface gi11,te1,te3

ip igmp snooping vlan 521 static 224.178.104.2 interface gi11,te1,te3

ip igmp snooping vlan 521 static 230.1.50.101 interface gi3,gi9,gi11

ip igmp snooping vlan 521 static 234.5.2.98 interface gi11

ip igmp snooping vlan 521 static 234.5.2.103 interface gi9,gi11,te1

ip igmp snooping vlan 521 static 234.5.2.104 interface gi3,gi11

ip igmp snooping vlan 521 static 234.5.2.105 interface gi11

ip igmp snooping vlan 521 static 234.5.2.107 interface gi11

ip igmp snooping vlan 521 static 234.5.2.109 interface gi11

ip igmp snooping vlan 521 static 234.5.2.110 interface gi3,gi11

ip igmp snooping vlan 521 static 234.5.2.111 interface gi11

ip igmp snooping vlan 521 static 234.5.2.112 interface gi11

ip igmp snooping vlan 521 static 234.5.2.113 interface gi3,gi11

ip igmp snooping vlan 521 static 234.5.2.116 interface gi11

ip igmp snooping vlan 521 static 234.5.2.117 interface gi11

ip igmp snooping vlan 521 static 234.5.2.119 interface gi11

ip igmp snooping vlan 521 static 234.5.2.123 interface gi11

ip igmp snooping vlan 521 static 234.5.2.124 interface gi11

ip igmp snooping vlan 521 static 234.5.2.137 interface gi9,gi11,te1

ip igmp snooping vlan 521 static 234.5.2.138 interface te1

ip igmp snooping vlan 521 static 234.5.2.145 interface gi11

ip igmp snooping vlan 521 static 234.5.2.146 interface gi11

ip igmp snooping vlan 521 static 234.5.2.148 interface gi3,gi11

ip igmp snooping vlan 521 static 234.5.2.180 interface gi5,te1

ip igmp snooping vlan 521 static 239.0.25.1 interface gi5,gi12,te1-3

ip igmp snooping vlan 521 static 239.0.25.2 interface gi5,gi12,te1-3

ip igmp snooping vlan 521 static 239.0.25.3 interface gi5,gi12,te1-3

ip igmp snooping vlan 521 static 239.0.25.4 interface gi5,gi12,te1-3

ip igmp snooping vlan 521 querier

ip igmp snooping vlan 521 querier address **********

 

La conexión está desde el puerto 13 del Switch CBS250 al puerto 9 del Switch CG250

Agradezco cualquier ayuda

Sergey Lisitsin
VIP Alumni
VIP Alumni
 

¿Puede decirme cuál es la fuente del tráfico de multicast y en qué puerto reside? Además, ¿a qué grupo se envía?

Buenas.

 

El tráfico proviene de otro switch conectado y de servidores de distribución multicast, en este caso por el puerto 11 del switch se envía y recibe tráfico multicast CBS250. En esta switch sí que al direccionar las iPs a equipos de monitorización se ven presentes, pero en el otro switch al cual estoy intentando enviar este tráfico capa 2 no logro recibir ni transmitir nada, la utilización del puerto es cero y no hay paquetes. Todo el tráfico multicast está sobre la VLAN 521.

 

Gracias de antemano.

Saludos.

Sergey Lisitsin
VIP Alumni
VIP Alumni

Por favor mostrar el resultado de "show span vlan 521" y "show ip igmp group" comandos de todos switches.

Hilda Arteaga
Cisco Employee
Cisco Employee

¡Gracias @Sergey Lisitsin! Nice to see you around and surprised of your Spanish. thanks for assisting @NocBritel on this matter 

 

Estimado @Sergey Lisitsin busca asistir desde Rusia (¡Bravo!)

Gracias @Hilda Arteaga ,

 

Yo estudio espanol y quiero practicar mas

Hola @Sergey Lisitsin ¡eres bienvenido en la comunidad!

Vamos a comenzar

¡Conecte con otros expertos de Cisco y del mundo! Encuentre soluciones a sus problemas técnicos o comerciales, y aprenda compartiendo experiencias.

Queremos que su experiencia sea grata, le compartimos algunos links que le ayudarán a familiarizarse con la Comunidad de Cisco: