NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
rgubele
Apr 28, 2020Aspirant
IGMP Snooping filtering OSPF except on VLAN 1
Hello, I am experiencing an issue where OSPF routers connectted m4300-series switches running IGMP Snooping are unable to form an adjacency. The m4300-series switches seem to be filtering OSPF mu...
- Apr 30, 2020
In 12.0.11.x we introduced a new command 'set igmp-plus" which is needed for all reseved multicast addresses to work.
I beliveve following configuration should fix your issue
vlan database
vlan 20
set igmp-plus 20
rgubele
Apr 30, 2020Aspirant
Hi kevin_hong ,
The routing table in my environment is too large to enable OSPF on the m4300s, and I don't really have enough spare equipment to lab it out.
I can confirm that Cisco <-> 4300 <-> Cisco doesn't work with IGMP Snooping enabled, as I observed this in my production environment.
sdesigowda
Apr 30, 2020Initiate
In 12.0.11.x we introduced a new command 'set igmp-plus" which is needed for all reseved multicast addresses to work.
I beliveve following configuration should fix your issue
vlan database
vlan 20
set igmp-plus 20
- rgubeleApr 30, 2020Aspirant
Hi sdesigowda ,
Thank you for your thoughts. Netgear support just said essentially the same thing to me: Getting these entries now requires igmp-plus mode.
As I mentioned earlier, I did not enable igmp-plus mode for our environment because it appears that it enables features that are undesirable. I have written back to Netgear support to clarify if turning it on will break my environment or not, and I'm working on the maintenance window to give it a try tonight either way.
- rgubeleApr 30, 2020Aspirant
In speaking with Netgear support, it sounds like I can disable the parts of igmp-plus mode that aren't appropriate for our environment after I turn it on. So it sounds like sdesigowda has the right answer here.
I will test tonight and let everyone know.
Thanks everyone for the assistance so far. Much appreciated.
- rgubeleMay 01, 2020Aspirant
I can confirm that sdesigowda solution combined with the advice from Netgear support that I could disable inappropriate features worked. On top of that, after firmware upgrades, packet loss on our network is down 70-80% across the board (not that it was very high to begin with), so I am pleased.
Thank you everyone for your assistance. I would like to humbly suggest that Netgear update the documentation regarding this new feature and the new requirements it imposes. While I realize many will not read the documentation carefully, my team did, and somehow we missed it, so either it's not there, or it's not as clear as it should be. Either way, now that we correctly understand what the feature does, thanks to excellent Netgear support, we are running in a configuration that seems correct to me and that seems initially to be working very well.
So once again, thank you all!
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!