Link to home
Start Free TrialLog in
Avatar of wiziah
wiziahFlag for Australia

asked on

Mulitcasting with Acronis Snap Deploy across 1 vlan

In our Melbourne office we have a managed  linksys srw2024 24 port gb switch which connects to a cisco 878 router.

There is a office cubical area which has 4 dumb linksys gb switches which between them connects 10 devices; laptops, our DC box, and our imaging server. The imaging server has acronis snap deploy as well as controlling our MSP anti virus service. This single office area only has 1 patch cable connecting it to the managed linksys switch. The other offices on the floor connect directly to this managed switch.

When I use snap deploy to image pc's for rollout it floods our network and our voip phones die also. I have enabled multicasting/igmp snooping on the managed linksys (see screen shots).

On the cisco 878 router we have 2 vlans, vlan1 is for the ppl in the office and vlan2 is for the phones/connection to another switch.

I have read a heap of material on the subject and all of it relates to multiple routers between the multicast source and the host. This isn't my scenario. My multicast source is connected to a dumb switch which in turn is connected to the managed linksys switch.

I have followed article such as this one:

http://www.ciscoarticles.com/Cisco-IOS/1251.html

With out much success..

This is where I need some advice or understand of what I need to do to get imaging working on our network without causing the network to 'go down' (extremely slow web browsing, copying files, voip phones go silence etc)

The 878 router is 192.168.30.1
The managed linksys is 192.68.30.5
The imaging box is 192.168.30.248
Acronis Snap Deploy uses the multicast address of 239.255.219.45 or essentially 239.0.0.0 0.255.255.255

Part of the router config:

ip name-server 192.168.30.243
ip name-server 192.168.30.1
ip multicast-routing

interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
 switchport access vlan 2
!
interface FastEthernet3
 switchport access vlan 2

interface Vlan1
 ip address 192.168.30.1 255.255.255.0
 ip nbar protocol-discovery
 ip flow ingress
 ip flow egress
 ip pim sparse-dense-mode
 ip nat inside
 ip virtual-reassembly
 ip route-cache flow
 ip igmp version 3
 load-interval 60
 priority-group 1
!
interface Vlan2
 ip address 10.11.80.5 255.255.0.0
 ip access-group 102 in
 ip nbar protocol-discovery
 ip nat inside
 ip virtual-reassembly
 load-interval 60
 priority-group 1
!

ip forward-protocol nd
ip route 0.0.0.0 0.0.0.0 Dialer1
ip route 192.168.31.0 255.255.255.0 192.168.30.2
ip route 192.168.32.0 255.255.255.0 192.168.30.2
ip route 192.168.33.0 255.255.255.0 192.168.30.2
ip route 192.168.34.0 255.255.255.0 192.168.30.2
ip route 192.168.35.0 255.255.255.0 Dialer1
ip route 210.247.203.161 255.255.255.255 Dialer1

ip http access-class 70
ip http secure-server
ip pim rp-address 192.168.30.1
ip pim ssm range 19
ip nat translation timeout 3600
no ip nat service sip tcp port 5060
no ip nat service sip udp port 5060
....

access-list 19 permit 239.0.0.0 0.255.255.255

access-list 110 remark HIGH PRIORITY TRAFFIC
access-list 110 permit tcp any any eq 6100
access-list 110 permit udp any any eq 6000
access-list 110 permit udp any any range 9000 9001
access-list 110 permit udp any any range 30000 30031
access-list 110 permit icmp any any echo
access-list 110 permit udp any any eq 5060
access-list 110 permit tcp any any eq 5180
access-list 110 permit tcp any any eq 8000
access-list 110 permit tcp any any range 10000 10100
access-list 110 permit tcp any any eq 3389
access-list 111 remark MEDIUM PRIORITY TRAFFIC
access-list 111 permit tcp any any eq telnet
access-list 111 permit tcp any any eq 22
access-list 111 permit tcp any any eq smtp
access-list 111 permit tcp any any eq pop3
access-list 111 permit tcp any any eq www
access-list 111 permit tcp any any eq 443
access-list 111 permit tcp any any eq 1723
access-list 111 permit tcp any any eq 49400
access-list 111 permit tcp any any eq 3306
access-list 111 permit tcp any any eq ftp
access-list 111 permit tcp any any eq ftp-data
access-list 111 permit tcp any any eq 3389
dialer-list 1 protocol ip permit
priority-list 1 protocol ip high list 110
priority-list 1 protocol ip medium list 111

As you can see I am lost..  when I run any commands to such as:

A17#sh ip igmp groups
IGMP Connected Group Membership
Group Address    Interface                Uptime    Expires   Last Reporter   Group Accounted
224.0.1.60       Vlan1                    1w1d      00:02:27  192.168.30.205
224.0.1.40       Vlan1                    1w1d      stopped   192.168.30.1

It doesn't show my hosts...I would expect this?

Help!!

 User generated image User generated image User generated imagelinksys-multicasting-3.jpg
Avatar of Don Johnston
Don Johnston
Flag of United States of America image

When I've worked on networks that image PC's with multicast, we always put the devices into a VLAN just for that purpose. Once the imaging is complete, we move the PC's back into their regular VLAN.

The only alternative that I can think of is to implement QOS.
Have you checked that the "dumb linksys gb switches" doesn't have  broadcast storm prevention as default?
Avatar of wiziah

ASKER

The 8 port linksys gb switches don't have any interfaces to them. From my understanding the multicast packets should pass through. The only reference I have to broadcast storm are from the screen shots attached (which I can only assume what I have enabled is correct).

Regarding the separate VLAN, due to the cabling to the office area it can only be on the same VLAN. From everything I have read this shouldn't be a problem as IGMP snooping should stop multicast packets flooding the network.

If that's the only way then I will have the organise another cable run etc which will be very expensive...hence why I am looking down this route.
Because of the volume of traffic generated by multicast imaging, If you can't segregate the traffic, you're going to have these issues.
ASKER CERTIFIED SOLUTION
Avatar of expert1010
expert1010
Flag of Sweden image

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
wiziah need to check out the problem I wrote about on Cisco's site and srw2024. And to add to that Acronis seems to have a history of not playing nice with mc and certain networks.

If there is a problem with slow network when deploying a multicast source on the very same network I can see only two logical explanations. High bandwidth usage on shared resource or multicast treated as broadcast from the perspective of the switch.
If the author doesn't respond, I think the question should be deleted with no refund.
I had a peek at wiziah's earlier questions and he don't seem to be in the habit of abandon them. And there's always things in our lifes that get in the way. So, if  I have some say in this I'd give the guy some time to respond. I have no problem with a month or so.
Avatar of wiziah

ASKER

Sorry guys with the delay, I have been away and been freakish busy being eoy etc..

Anyway, export1010 I have followed up on your post. There seems to be a possible incompatibility as you suggested. We have looking at getting a managed Cisco router into the office to keep platform the same and I will then create a separate VLAN.

I'll award the points to you..

oh, the annoying factor is Acronis support aren't any help with this either unfortunately.