06-30-2023 01:10 PM
Hello everyone, I have a problem using Cisco 9500-16X-A with Terra Christie.
Terra Christie is a system for SDVoE in this case I am using for a videowall. I did a configuration based on IGMPv2, as the Christie uses, as you can see below:
Switch#show run
Building configuration...
Current configuration : 10353 bytes
!
! Last configuration change at 18:40:50 UTC Fri Jun 30 2023
!
version 17.9
service timestamps debug datetime msec
service timestamps log datetime msec
! Call-home is enabled by Smart-Licensing.
service call-home
platform punt-keepalive disable-kernel-core
!
hostname Switch
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
no aaa new-model
switch 1 provision c9500-16x
!
!
!
!
ip routing
!
!
!
!
!
ip multicast-routing
!
!
!
ip igmp snooping querier
ip igmp snooping vlan 1 querier version 2
ip igmp snooping vlan 1 querier address 192.168.1.1
ip igmp snooping vlan 1 querier query-interval 125
no ip igmp snooping vlan 20 querier
ip igmp snooping vlan 1 immediate-leave
ip igmp snooping vlan 1 last-member-query-count 3
ip igmp snooping vlan 1 last-member-query-interval 255
ip igmp snooping vlan 1 static 224.1.1.254 interface Te1/0/5
ip igmp snooping vlan 1 static 224.1.1.253 interface Te1/0/2
no ip igmp snooping vlan 20
ip igmp profile 10
range 224.1.1.1 224.1.3.255
login on-success log
!
!
!
!
!
!
!
!
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-4227008633
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-4227008633
revocation-check none
rsakeypair TP-self-signed-4227008633
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-4227008633
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 34323237 30303836 3333301E 170D3233 30363330 31353135
34335A17 0D333330 36323931 35313534 335A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 32323730
30383633 33308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100E2C7 96694447 69A6B046 51FF6435 727C3574 997B78F8 41BF7F33
28599C89 AF64B86E 08531430 39D7BB0C BC4230CB D6436168 C669FA2F FC2AF1F5
1567248D B9C5D139 3F632278 CA00D1F3 34C3D6A7 510B8E8D F2DD272E 06750F0A
CACCAAB4 5F99C322 7A140595 573BC37C 935B3574 22D8AB58 9C119AA7 E44B03A0
90275892 DD0755A2 54A666BD 4419D008 3504548C 45BCF6FC DFB0C23E A106F080
1ED2A345 E699B044 4BE79B8B 44E8EB7F 6FB3DAE8 69065C9E 595107E3 E6347E18
8F988083 60432482 EDDD0C2E 24C6A94A 80096E9C AAAB19B9 365BD0AE F20D2B64
3D7CD6CE 966D8685 2A3B6DFD 3D5192F3 4C63DB00 AC49DC29 9CFAF348 8284FE0A
7922CF17 54350203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 1427C934 29F5C9D3 132E02AD F09060FB 6403E0E9
9E301D06 03551D0E 04160414 27C93429 F5C9D313 2E02ADF0 9060FB64 03E0E99E
300D0609 2A864886 F70D0101 05050003 82010100 0E34A275 CF13F2FF FD4B1C5D
6E9A3217 FE5A141F 0319F4B8 A18AD310 38B790B1 5867C037 A504B214 C8C783AC
57BA9F0D BE736268 53D7905A FE74E89F 81F58802 635638FB CB45E667 9CB5F36D
4CDE5521 55557192 A94A2FC8 51B89F33 3DE2412A CEBACB8A CD06B3FD 94BB1D0A
7C38F5BA 14887526 2D971C46 9904C79A B1A6D43C B73B2E37 AC03E7DC 804FE117
C1941CA4 E6CD7649 51895A73 E7F85B22 AD8BEC80 6F5B8084 95D8FAFD B7CA7121
7DC2D239 D829BEEE 0EC02496 C8B213FA A07E2567 405297F8 AA68D8B0 7D843B05
DB9EFF01 10C075B7 8477FD67 53D6C9F8 E48CC924 59519F3D BAAD7505 28A777DC
5AE12769 355A7C6C 2D294686 39546CFE C8951565
quit
!
!
license boot level network-advantage addon dna-advantage
memory free low-watermark processor 130905
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
!
!
!
redundancy
mode sso
crypto engine compliance shield disable
!
!
!
!
!
transceiver type all
monitoring
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic
class-map match-any system-cpp-default
description EWLC Data, Inter FED Traffic
class-map match-any system-cpp-police-sys-data
description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual OOB
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
shutdown
negotiation auto
!
interface TenGigabitEthernet1/0/1
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/2
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/3
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/4
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/5
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/6
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/7
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/8
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/9
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/10
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/11
switchport access vlan 20
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/12
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/13
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/14
switchport mode access
ip igmp filter 10
!
interface TenGigabitEthernet1/0/15
!
interface TenGigabitEthernet1/0/16
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/5
!
interface TenGigabitEthernet1/1/6
!
interface TenGigabitEthernet1/1/7
!
interface TenGigabitEthernet1/1/8
!
interface FortyGigabitEthernet1/1/1
!
interface FortyGigabitEthernet1/1/2
!
interface Vlan1
ip address 192.168.1.1 255.255.255.0
ip pim sparse-mode
ip igmp last-member-query-count 3
ip igmp explicit-tracking
!
interface Vlan20
ip address 192.168.2.1 255.255.255.0
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
!
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
!
line con 0
stopbits 1
line vty 0 4
login
transport input ssh
line vty 5 15
login
transport input ssh
!
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
!
!
!
!
!
!
end
And I have this problem:
I doesn't create the groups of IGMP, so I do not know what happen this. Please, I will really appreciate that you could help me. In my software Terra Manager, I see this:
Receiver status is "stopped", so I cannot display anything on my screen. What do you can recommend me to solve this problem.
Port 1: Controller
Port 2: Transmitter
Port 5: Receiver
Port 11: PC
Currently, I am using that for the test. Thank you in advance.
07-04-2023 03:08 PM
Wow...glad to hear you sorted that out @lejarac
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide