nop only from R5 i am attaching the mroute details
if you can make out anything out of it

On Sat, Jan 1, 2011 at 9:11 PM, Kingsley Charles <[email protected]
> wrote:

> When you ping 239.0.0.5 from R1, are you getting replies from R3?
>
>
> With regards
> Kings
>
>
> On Sat, Jan 1, 2011 at 8:43 PM, manish ludhani 
> <[email protected]>wrote:
>
>>  yep r4 is configured  with multicast routing and rp
>>
>> the thing is i can ping from r3 to the multicast IP but i just see r5
>> replying not r1
>> and i could see mroute all the way up to 1.1.1.1
>>
>> but still i dont get rekeys. (not even cumulative while joining)
>>
>> on R5 without joining igmp group i am getting rekeys
>>
>> Regards
>> Manish
>>   On Sat, Jan 1, 2011 at 7:06 PM, Kingsley Charles <
>> [email protected]> wrote:
>>
>>> Config looks fine. Can you post the R4's config. Have you configured
>>> multicasting routing and rp-address on it too?
>>>
>>>
>>> With regards
>>> Kings
>>>
>>>
>>> On Sat, Jan 1, 2011 at 5:46 PM, manish ludhani <[email protected]
>>> > wrote:
>>>
>>>>  please find below the related config.
>>>>
>>>> apologies for raising it again however  i ve tried everything suggested
>>>> in previous posts
>>>>
>>>> thanks regards
>>>>
>>>>
>>>>
>>>>                                                               R5
>>>>                                                                 |
>>>>                                                             (e0/0)
>>>>                                                                  |
>>>>                                                                  |
>>>> (l1 1.1.1.1)R1(fa0/0 10.10.10.1)--------(e0/0 .2)R2(e0/1
>>>> .2)-------(e1)Pix(e0)----R4(e0/1)---(F0/0)R3(l1 2.2.2.2)
>>>>
>>>>
>>>>
>>>> *R1#
>>>> *R1#sh run | sec crypto
>>>> crypto isakmp policy 10
>>>>  encr 3des
>>>>  hash md5
>>>>  authentication pre-share
>>>>  group 2
>>>> crypto isakmp key cisco address 0.0.0.0 0.0.0.0
>>>> crypto ipsec transform-set TSET esp-3des esp-md5-hmac
>>>> crypto ipsec profile IPSEC_PRO
>>>>  set transform-set TSET
>>>> crypto gdoi group GET_GRP
>>>>  identity number 1234
>>>>  server local
>>>>   rekey address ipv4 MULTI_GRP
>>>>   rekey retransmit 10 number 2
>>>>   rekey authentication mypubkey rsa GETKEY
>>>>   sa ipsec 1
>>>>    profile IPSEC_PRO
>>>>    match address ipv4 GET_TRAFFIC
>>>>    replay counter window-size 64
>>>> ip multicast-routing
>>>> ip pim rp-address 1.1.1.1
>>>>
>>>> interface Loopback1
>>>>  ip address 1.1.1.1 255.255.255.0
>>>>  ip pim sparse-mode
>>>> !
>>>> interface FastEthernet0/0
>>>>  ip address 10.10.10.1 255.255.255.0
>>>>  ip pim sparse-mode
>>>>
>>>>
>>>>
>>>> R1#sh crypto gdoi ks members
>>>>
>>>> Group Member Information :
>>>>
>>>> Number of rekeys sent for group GET_GRP : 8
>>>>
>>>> Group Member ID   : 2.2.2.2
>>>> Group ID          : 1234
>>>> Group Name        : GET_GRP
>>>> Key Server ID     : 0.0.0.0
>>>>
>>>> Group Member ID   : 5.5.5.5
>>>> Group ID          : 1234
>>>> Group Name        : GET_GRP
>>>> Key Server ID     : 0.0.0.0
>>>>
>>>>
>>>> R1#sh crypto gdoi ks rekey
>>>> Group GET_GRP (Multicast)
>>>>     Number of Rekeys sent               : 8
>>>>     Number of Rekeys retransmitted      : 4
>>>>     KEK rekey lifetime (sec)            : 86400
>>>>         Remaining lifetime (sec)        : 86325
>>>>     Retransmit period                   : 10
>>>>     Number of retransmissions           : 2
>>>>     IPSec SA 1  lifetime (sec)          : 3600
>>>>         Remaining lifetime (sec)        : 3526
>>>>     Number of registrations after rekey : 0
>>>>     Multicast destination address       : 239.0.0.5
>>>>
>>>>
>>>> R1#sh run | sec ip access
>>>> ip access-list extended GET_TRAFFIC
>>>>  permit ip host 2.2.2.2 host 3.3.3.3
>>>>  permit ip host 2.2.2.2 host 5.5.5.5
>>>>  permit ip host 2.2.2.2 host 6.6.6.6
>>>> ip access-list extended MULTI_GRP
>>>>  permit udp host 1.1.1.1 eq 848 host 239.0.0.5 eq 848
>>>> R1#
>>>>
>>>>
>>>>
>>>>
>>>> *pix*
>>>>
>>>>
>>>> !
>>>> interface Ethernet0
>>>>  nameif outside
>>>>  security-level 0
>>>>  ip address 30.30.30.1 255.255.255.0
>>>>  igmp access-group MULTI
>>>> !
>>>> interface Ethernet1
>>>>  nameif inside
>>>>  security-level 100
>>>>  ip address 20.20.20.1 255.255.255.0
>>>>  igmp access-group MULTI
>>>> !
>>>>
>>>>
>>>> access-list MULTI standard permit host 239.0.0.5
>>>> access-list OUTSIDE_IN extended permit ip any any log debugging
>>>> access-list OUTSIDE_IN extended permit pim any any
>>>>
>>>>
>>>> access-group OUTSIDE_IN in interface outside
>>>> access-group OUTSIDE_IN in interface inside
>>>>
>>>> pix1# sh run multicast-routing
>>>> multicast-routing
>>>>
>>>> pix1# sh run pim
>>>> pim rp-address 1.1.1.1
>>>>
>>>>
>>>>
>>>> pix1# sh pim neighbor
>>>>
>>>> Neighbor Address  Interface          Uptime    Expires DR pri Bidir
>>>>
>>>> 30.30.30.2        outside            00:36:04  00:01:28 1 (DR)
>>>> 20.20.20.2        inside             00:36:04  00:01:28 1 (DR)
>>>>
>>>>
>>>>
>>>>
>>>> *R3*
>>>>
>>>>
>>>> R3#sh run | sec crypto
>>>> crypto isakmp policy 10
>>>>  encr 3des
>>>>  hash md5
>>>>  authentication pre-share
>>>>  group 2
>>>> crypto isakmp key cisco address 0.0.0.0 0.0.0.0
>>>> crypto gdoi group GET_GRP
>>>>  identity number 1234
>>>>  server address ipv4 1.1.1.1
>>>> crypto map GET_MAP local-address Loopback1
>>>> crypto map GET_MAP 10 gdoi
>>>>  set group GET_GRP
>>>>  crypto map GET_MAP
>>>>
>>>>
>>>> !
>>>> ip multicast-routing
>>>> !
>>>> interface Loopback1
>>>>  ip address 2.2.2.2 255.255.255.0
>>>>  ip pim sparse-mode
>>>>  ip igmp join-group 239.0.0.5
>>>> !
>>>> interface FastEthernet0/0
>>>>  ip address 40.40.40.1 255.255.255.0
>>>>  ip pim sparse-mode
>>>>  duplex auto
>>>>  speed auto
>>>>  crypto map GET_MAP
>>>>
>>>>
>>>> ip pim rp-address 1.1.1.1
>>>>
>>>> R3#sh crypto gdoi
>>>> GROUP INFORMATION
>>>>
>>>>     Group Name               : GET_GRP
>>>>     Group Identity           : 1234
>>>>     Rekeys received          : 0
>>>>     IPSec SA Direction       : Both
>>>>     Active Group Server      : 1.1.1.1
>>>>     Group Server list        : 1.1.1.1
>>>>
>>>>     GM Reregisters in        : 1486 secs
>>>>     Rekey Received           : never
>>>>
>>>>
>>>>     Rekeys received
>>>>          Cumulative          : 0
>>>>          After registration  : 0
>>>>
>>>>  ACL Downloaded From KS 1.1.1.1:
>>>>    access-list  permit ip host 2.2.2.2 host 3.3.3.3
>>>>
>>>> KEK POLICY:
>>>>     Rekey Transport Type     : Multicast
>>>>     Lifetime (secs)          : 86126
>>>>     Encrypt Algorithm        : 3DES
>>>>     Key Size                 : 192
>>>>     Sig Hash Algorithm       : HMAC_AUTH_SHA
>>>>     Sig Key Length (bits)    : 1024
>>>>
>>>> TEK POLICY for the current KS-Policy ACEs Downloaded:
>>>>   FastEthernet0/0:
>>>>     IPsec SA:
>>>>         spi: 0x8213D0D6(2182336726)
>>>>         transform: esp-3des esp-md5-hmac
>>>>         sa timing:remaining key lifetime (sec): (1637)
>>>>         Anti-Replay(Time Based) : 64 sec interval
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> *R5*
>>>>
>>>> R5#sh run | sec crypto
>>>> crypto isakmp policy 10
>>>>  encr 3des
>>>>  hash md5
>>>>  authentication pre-share
>>>>  group 2
>>>> crypto isakmp key cisco address 0.0.0.0 0.0.0.0
>>>> crypto gdoi group GET_GRP
>>>>  identity number 1234
>>>>  server address ipv4 1.1.1.1
>>>> crypto map GET_MAP local-address Loopback1
>>>> crypto map GET_MAP 10 gdoi
>>>>  set group GET_GRP
>>>>  crypto map GET_MAP
>>>>
>>>> interface Loopback1
>>>>  ip address 5.5.5.5 255.255.255.0
>>>>  ip pim sparse-mode
>>>> !
>>>> interface FastEthernet0/0
>>>>  ip address 50.50.50.1 255.255.255.0
>>>>  ip pim sparse-mode
>>>>  duplex auto
>>>>  speed auto
>>>>  crypto map GET_MAP
>>>>
>>>>
>>>> ip pim rp-address 1.1.1.1
>>>> ip multicast-routing
>>>>
>>>>
>>>> R5#sh crypto gdoi
>>>> GROUP INFORMATION
>>>>
>>>>     Group Name               : GET_GRP
>>>>     Group Identity           : 1234
>>>>     Rekeys received          : 2
>>>>     IPSec SA Direction       : Both
>>>>     Active Group Server      : 1.1.1.1
>>>>     Group Server list        : 1.1.1.1
>>>>
>>>>     GM Reregisters in        : 1775 secs
>>>>     Rekey Received(hh:mm:ss) : 00:27:41
>>>>
>>>>
>>>>     Rekeys received
>>>>          Cumulative          : 2
>>>>          After registration  : 2
>>>>
>>>>  ACL Downloaded From KS 1.1.1.1:
>>>>    access-list  permit ip host 2.2.2.2 host 3.3.3.3
>>>>    access-list  permit ip host 2.2.2.2 host 5.5.5.5
>>>>    access-list  permit ip host 2.2.2.2 host 6.6.6.6
>>>>
>>>> KEK POLICY:
>>>>     Rekey Transport Type     : Multicast
>>>>     Lifetime (secs)          : 86399
>>>>     Encrypt Algorithm        : 3DES
>>>>     Key Size                 : 192
>>>>     Sig Hash Algorithm       : HMAC_AUTH_SHA
>>>>     Sig Key Length (bits)    : 1024
>>>>
>>>>
>>>>   On Sat, Jan 1, 2011 at 2:10 PM, Kingsley Charles <
>>>> [email protected]> wrote:
>>>>
>>>>> Can you post the configs of KS, ASA and GM on outside.
>>>>>
>>>>>
>>>>>
>>>>> With regards
>>>>> Kings
>>>>>
>>>>>   On Sat, Jan 1, 2011 at 2:52 AM, manish ludhani <
>>>>> [email protected]> wrote:
>>>>>
>>>>>>   Hi all,
>>>>>>
>>>>>> i am stuck at GETVPN multicast rekey through ASA seems a common
>>>>>> catch. i hv looked at all the previous posts but still not
>>>>>> able to make it work.
>>>>>>
>>>>>> i am using asa in routed mode and KS is inside the firewall. i receive
>>>>>> the Rekeys on the GMs which are inside the firewall but not on the 
>>>>>> outside
>>>>>> GMs
>>>>>> i hv enabled the routing on ASA inside outside interfaces and defined
>>>>>> RP. i tried to enable mpacket debug and noticed i was not receiving any
>>>>>> multicast traffic
>>>>>> packet tracer from inside source KS to multicast address fails (Early
>>>>>> security checks failed).
>>>>>>
>>>>>> i will b gr8ful if any1 please give me any clue.
>>>>>>
>>>>>>
>>>>>> Regards
>>>>>> Manish
>>>>>>
>>>>>> _______________________________________________
>>>>>> For more information regarding industry leading CCIE Lab training,
>>>>>> please visit www.ipexpert.com
>>>>>>
>>>>>>
>>>>>
>>>>
>>>
>>
>
R3#ping 239.0.0.5

Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:

Reply to request 0 from 40.40.40.1, 12 ms
Reply to request 0 from 50.50.50.1, 748 ms
Reply to request 0 from 50.50.50.1, 544 ms
Reply to request 0 from 2.2.2.2, 12 ms
R3#



R3#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
       L - Local, P - Pruned, R - RP-bit set, F - Register flag,
       T - SPT-bit set, J - Join SPT, M - MSDP created entry,
       X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
       U - URD, I - Received Source Specific Host Report,
       Z - Multicast Tunnel, z - MDT-data group sender,
       Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
 Timers: Uptime/Expires
 Interface state: Interface, Next-Hop or VCD, State/Mode

(*, 239.0.0.1), 00:01:12/stopped, RP 1.1.1.1, flags: SPF
  Incoming interface: FastEthernet0/0, RPF nbr 40.40.40.2
  Outgoing interface list: Null

(2.2.2.2, 239.0.0.1), 00:01:12/00:01:49, flags: PFT
  Incoming interface: Loopback1, RPF nbr 0.0.0.0
  Outgoing interface list: Null

(*, 239.0.0.5), 04:12:12/stopped, RP 1.1.1.1, flags: SJCLF
  Incoming interface: FastEthernet0/0, RPF nbr 40.40.40.2
  Outgoing interface list:
    Loopback1, Forward/Sparse, 04:06:19/00:02:17

(2.2.2.2, 239.0.0.5), 00:01:05/00:01:59, flags: PLFT
  Incoming interface: Loopback1, RPF nbr 0.0.0.0, Registering
  Outgoing interface list: Null

(40.40.40.1, 239.0.0.5), 00:01:05/00:01:59, flags: LJT
  Incoming interface: FastEthernet0/0, RPF nbr 0.0.0.0
  Outgoing interface list:
    Loopback1, Forward/Sparse, 00:01:06/00:02:16

(*, 224.0.1.40), 06:13:00/00:02:09, RP 1.1.1.1, flags: SJPL
  Incoming interface: FastEthernet0/0, RPF nbr 40.40.40.2
  Outgoing interface list: Null


R4#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
       L - Local, P - Pruned, R - RP-bit set, F - Register flag,
       T - SPT-bit set, J - Join SPT, M - MSDP created entry,
       X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
       U - URD, I - Received Source Specific Host Report,
       Z - Multicast Tunnel, z - MDT-data group sender,
       Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
 Timers: Uptime/Expires
 Interface state: Interface, Next-Hop or VCD, State/Mode

(*, 239.0.0.5), 04:22:31/00:03:06, RP 1.1.1.1, flags: SJCF
  Incoming interface: Ethernet0/0, RPF nbr 30.30.30.1
  Outgoing interface list:
    Ethernet0/1, Forward/Sparse, 04:18:59/00:03:06

(2.2.2.2, 239.0.0.5), 00:01:10/00:02:19, flags:
  Incoming interface: Ethernet0/1, RPF nbr 40.40.40.1
  Outgoing interface list:
    Ethernet0/0, Forward/Sparse, 00:01:09/00:03:16

(40.40.40.1, 239.0.0.5), 00:01:10/00:02:26, flags: FT
  Incoming interface: Ethernet0/1, RPF nbr 0.0.0.0, Registering
  Outgoing interface list:
    Ethernet0/0, Forward/Sparse, 00:01:09/00:03:15

(*, 224.0.1.40), 06:23:43/00:02:14, RP 1.1.1.1, flags: SJCL
  Incoming interface: Ethernet0/0, RPF nbr 30.30.30.1
  Outgoing interface list:
    Ethernet0/1, Forward/Sparse, 06:23:18/00:02:14

R4#

R4#ping 239.0.0.5

Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:

Reply to request 0 from 40.40.40.1, 232 ms
Reply to request 0 from 50.50.50.1, 476 ms
Reply to request 0 from 50.50.50.1, 440 ms
Reply to request 0 from 40.40.40.1, 288 ms
R4#




R2#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
       L - Local, P - Pruned, R - RP-bit set, F - Register flag,
       T - SPT-bit set, J - Join SPT, M - MSDP created entry,
       X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
       U - URD, I - Received Source Specific Host Report,
       Z - Multicast Tunnel, z - MDT-data group sender,
       Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
 Timers: Uptime/Expires
 Interface state: Interface, Next-Hop or VCD, State/Mode

(*, 239.0.0.5), 04:11:53/stopped, RP 1.1.1.1, flags: SJCF
  Incoming interface: Ethernet0/0, RPF nbr 10.10.10.1
  Outgoing interface list:
    Ethernet0/2, Forward/Sparse, 04:11:53/00:02:41

(2.2.2.2, 239.0.0.5), 00:02:25/00:00:34, flags:
  Incoming interface: Ethernet0/1, RPF nbr 20.20.20.1
  Outgoing interface list:
    Ethernet0/0, Forward/Sparse, 00:02:25/00:03:02
    Ethernet0/2, Forward/Sparse, 00:02:25/00:02:41

(40.40.40.1, 239.0.0.5), 00:02:25/00:00:34, flags:
  Incoming interface: Ethernet0/1, RPF nbr 20.20.20.1
  Outgoing interface list:
    Ethernet0/0, Forward/Sparse, 00:02:25/00:03:03
    Ethernet0/2, Forward/Sparse, 00:02:25/00:02:41

(*, 224.0.1.40), 06:14:31/00:02:38, RP 1.1.1.1, flags: SJCL
  Incoming interface: Ethernet0/0, RPF nbr 10.10.10.1
  Outgoing interface list:
    Ethernet0/2, Forward/Sparse, 04:44:50/00:02:48



(*, 239.0.0.5), 00:07:09/00:03:00, RP 1.1.1.1, flags: S
  Incoming interface: inside
  RPF nbr: 0.0.0.0
  Outgoing interface list:
    outside, Forward, 00:07:09/00:03:00

(2.2.2.2, 239.0.0.5), 00:03:59/00:02:23, flags: ST
  Incoming interface: inside
  RPF nbr: 0.0.0.0
  Outgoing interface list:

(40.40.40.1, 239.0.0.5), 00:03:59/00:02:24, flags: ST
  Incoming interface: inside
  RPF nbr: 0.0.0.0
  Outgoing interface list:


R2#ping 239.0.0.5

Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:

Reply to request 0 from 50.50.50.1, 20 ms
Reply to request 0 from 50.50.50.1, 24 ms
Reply to request 0 from 50.50.50.1, 20 ms
Reply to request 0 from 10.10.10.1, 20 ms
R2#






pix1# sh mroute

Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group,
       C - Connected, L - Local, I - Received Source Specific Host Report,
       P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set,
       J - Join SPT
Timers: Uptime/Expires
Interface state: Interface, State

(*, 239.0.0.5), 00:01:22/00:02:51, RP 1.1.1.1, flags: S
  Incoming interface: inside
  RPF nbr: 20.20.20.2
  Outgoing interface list:
    outside, Forward, 00:01:22/00:02:51

(2.2.2.2, 239.0.0.5), 00:00:12/00:03:17, flags: S
  Incoming interface: outside
  RPF nbr: 30.30.30.2
  Outgoing interface list:
    inside, Forward, 00:00:12/00:03:17

(40.40.40.1, 239.0.0.5), 00:00:12/00:03:17, RP 1.1.1.1, flags: SR
  Incoming interface: inside
  RPF nbr: 20.20.20.2
  Outgoing interface list:
    outside, Null, 00:00:12/00:03:17

(40.40.40.1, 239.0.0.5), 00:00:12/00:03:17, flags: ST
  Incoming interface: outside
  RPF nbr: 30.30.30.2
  Outgoing interface list:
    inside, Forward, 00:00:12/00:03:17





R1#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
       L - Local, P - Pruned, R - RP-bit set, F - Register flag,
       T - SPT-bit set, J - Join SPT, M - MSDP created entry,
       X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
       U - URD, I - Received Source Specific Host Report,
       Z - Multicast Tunnel, z - MDT-data group sender,
       Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
 Timers: Uptime/Expires
 Interface state: Interface, Next-Hop or VCD, State/Mode

(*, 239.0.0.5), 06:29:13/00:03:07, RP 1.1.1.1, flags: SJCL
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    FastEthernet0/0, Forward/Sparse, 04:26:00/00:03:07
    Loopback1, Forward/Sparse, 06:29:13/00:02:39

(2.2.2.2, 239.0.0.5), 00:01:59/00:01:00, flags: L
  Incoming interface: FastEthernet0/0, RPF nbr 10.10.10.2
  Outgoing interface list:
    Loopback1, Forward/Sparse, 00:01:59/00:02:39

(40.40.40.1, 239.0.0.5), 00:01:59/00:01:00, flags: L
  Incoming interface: FastEthernet0/0, RPF nbr 10.10.10.2
  Outgoing interface list:
    Loopback1, Forward/Sparse, 00:01:59/00:02:39

(*, 224.0.1.40), 06:30:03/00:02:54, RP 1.1.1.1, flags: SJCL
  Incoming interface: Null, RPF nbr 0.0.0.0
  Outgoing interface list:
    FastEthernet0/0, Forward/Sparse, 06:28:09/00:02:40
    Loopback1, Forward/Sparse, 06:30:04/00:02:38


R1#ping 239.0.0.5

Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:

*Mar  1 06:47:34.782: IP(0): s=1.1.1.1 (Loopback1) d=239.0.0.5 
(FastEthernet0/0) id=10, ttl=254, prot=1, len=100(100), mforward
Reply to request 0 from 1.1.1.1, 12 ms
Reply to request 0 from 50.50.50.1, 36 ms
Reply to request 0 from 50.50.50.1, 32 ms
R1#











R5#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
       L - Local, P - Pruned, R - RP-bit set, F - Register flag,
       T - SPT-bit set, J - Join SPT, M - MSDP created entry,
       X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
       U - URD, I - Received Source Specific Host Report,
       Z - Multicast Tunnel, z - MDT-data group sender,
       Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
 Timers: Uptime/Expires
 Interface state: Interface, Next-Hop or VCD, State/Mode

(*, 239.0.0.5), 04:33:46/stopped, RP 1.1.1.1, flags: SJPLF
  Incoming interface: FastEthernet0/0, RPF nbr 50.50.50.2
  Outgoing interface list: Null

(2.2.2.2, 239.0.0.5), 00:00:18/00:02:46, flags: PLT
  Incoming interface: FastEthernet0/0, RPF nbr 50.50.50.2
  Outgoing interface list: Null

(40.40.40.1, 239.0.0.5), 00:00:18/00:02:46, flags: PLT
  Incoming interface: FastEthernet0/0, RPF nbr 50.50.50.2
  Outgoing interface list: Null

(5.5.5.5, 239.0.0.5), 00:02:44/00:01:36, flags: LFT
  Incoming interface: Loopback1, RPF nbr 0.0.0.0
  Outgoing interface list:
    FastEthernet0/0, Forward/Sparse, 00:02:43/00:02:44

(50.50.50.1, 239.0.0.5), 00:02:44/00:01:06, flags: PLT
  Incoming interface: FastEthernet0/0, RPF nbr 0.0.0.0
  Outgoing interface list: Null

(*, 224.0.1.40), 05:07:12/00:02:27, RP 1.1.1.1, flags: SJPL
  Incoming interface: FastEthernet0/0, RPF nbr 50.50.50.2
  Outgoing interface list: Null

R5#


R5#ping 239.0.0.5

Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:

Reply to request 0 from 50.50.50.1, 12 ms
Reply to request 0 from 10.10.10.1, 188 ms
Reply to request 0 from 10.10.10.1, 188 ms
Reply to request 0 from 5.5.5.5, 12 ms
R5#

_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to