Solved

ICMP v3 Problems / IPTV with my new ICMP v3 compatible switches

Posted on 2013-06-14
5
918 Views
Last Modified: 2013-07-09
Hello everyone,

Because I had problems with my old switches and my new IPTV by Swisscom (main boardband provider in switzerland) I bought two new switches which are compatible to ICMP v3 snooping (a ZyXEL GS1910-24 and a ZyXEL GS2200-8).

I configured the two devices like this:
ZyXEL GS2200-8
gs2200-8 icmp config
and the ZyXEL GS1910-24:
gs1910-24 icmp config
But as soon as I turn on the IPTV the whole network goes down within seconds... so I guess I did something wrong. Maybe someone could point me in the right direction.

A little bit more detailed information about my setup:
The internet fiber router is connected to the port1 of the gs2200-8 and the port2 goes to the rj45 patchpanel which is connect to the media room where the cable is patched to the port1 of the gs1910-24 and on the iptv is patched to the port2 of the gs1910-24.

If you need any more informations just let me know.

Thanks and cheers,
Yves
0
Comment
Question by:Yves_
  • 3
  • 2
5 Comments
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
Enable the Querier option on the 2200.

Disable Unknown Multicast Flooding on the 1910.
0
 

Author Comment

by:Yves_
Comment Utility
i have done that. now the network does not go down... but the iptv does not work eighter... additional ideas?
0
 
LVL 45

Expert Comment

by:Craig Beck
Comment Utility
Enable flooding on both switches and see if that works.
0
 

Accepted Solution

by:
Yves_ earned 0 total points
Comment Utility
This all did not work...

I had to put the Port1 of the 1910-24 to Routing Mode and the Port2 into Fast Leave Mode. I also had to activate Leave Proxy Enabled and also the Proxy Enabled Option.

Now it works flawless :)
0
 

Author Closing Comment

by:Yves_
Comment Utility
Other solutions did not work.
0

Featured Post

What Should I Do With This Threat Intelligence?

Are you wondering if you actually need threat intelligence? The answer is yes. We explain the basics for creating useful threat intelligence.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

744 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now