I have an issue with mutlicast traffic, without going too in depth, we have vehicles controlled by remote consoles. The system uses alot of multicast data which makes it hard by flooding the access points that the vehicles are connected to and filling up the allocated 6mb on the access point.
I am hoping to use some config to stop multicast from being able to flood backwards into other AP's on that VLAN. Attached is a diagram of the setup.
Looking at the diagram, the data from the loader(cat machine) is multicast and is using wireless. The data travels to the cisco switch and then flooded out the other interfaces to site B. Site B is transmitting and recieving multicast and the access points are unable to handle the flooding.
I have looked at private vlans and isolating the sites from each other, but this is a bit painfull to implement. I have also looked at protected ports, which is perfect, but this is only per switch basis, and multicast frames can travel from one switch to another and enter other protected ports.
The other option was filtering multicast via an ACL, but with the switches, they can not filter outbound (towards the site).
Hello!I'm looking for a way to make my EEM script more dynamic and automated for my environment. This is what I have - basically I just capture the 4 IPSec peer IP addresses of each neighbor and insert this data into 4 different variables. ...
Hi all,I have a couple of Nexus9k switches. I need to get tcpdump from the physical interface which connected to the server. I'm looking for a specific protocol on tcpdump so that which feature should I use? I asked that because I couldn't full...
We are building out our first few AAR polices and are running into an error message.Built Global Policy with SLA class and traffic rules for voice traffic, attached to to the sites and VPN we needed, no issue. Building a second policy for management ...
Cisco Champion Radio · S7|E45 Network Insights with AI Endpoint Analytics
Identifying who and what is on the network is a challenge for many organizations. Incomplete visibility makes it difficult to implement advanced security policies and recommendatio...