What is the difference in a interface between to use config join-group
and create static igmp group address (config router
multicast-flow)?Because "Creating a static IGMP group entry ensures that
FortiGate will preserve this IGMP group information fo...
Hello,"policy routing" can be applied with multicast addresses
(destination addresses)I have already applied to my configuration
firewall multicast-policies, should I apply policy routing as well to
force the traffic to a specific outgoing interface ...
HelloWhen I execute the command for a multicast address for instance :
"get router info multicast PIM dense-mode table 184.108.40.206" the
Upstream IF is not what I attend and the the upstream state is pruned.My
logical configuration (see the picture) i...
Hello Gents,is It possible to force pim dense mode to work always on
forwarding the multicast packet acting on timers? For instance PIM dense
mode flush packet every 3 min about , some trick to maintain this state
? my problem is that my client do no...
Hello Adrian, thank you for you reply I intend multicast routing , in
short the RPF (reverse path forwarding ) used from PIM protocol show (
get router info multicast pim dense-mode tables 239.x.x.x ) often the
incoming interface and outgoing interfa...
Thank you very much ! Very useful for troubleshooting. I found the
solution, the clients was not able to join the multicast group in good
manner. PIM was not to work correctly. I forced inside the firewall the
instructions to join the group:config ro...
Intend multicast routing? for one group PIM is mandatory, for the other
the topology create a lot of issue with PIM due to RPF check fail due to
packet with incoming interface wrong and some messages are drop .
Thank you Jin for your reply!,I know that have no sense to enable both ,
but I have a an issue with a group of users PIM enabled connected on the
network and I prefer to let them work in forwarding, and at the same
another group of users where the PI...
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.