nop only from R5 i am attaching the mroute details
if you can make out anything out of it
On Sat, Jan 1, 2011 at 9:11 PM, Kingsley Charles <[email protected]
> wrote:
> When you ping 239.0.0.5 from R1, are you getting replies from R3?
>
>
> With regards
> Kings
>
>
> On Sat, Jan 1, 2011 at 8:43 PM, manish ludhani
> <[email protected]>wrote:
>
>> yep r4 is configured with multicast routing and rp
>>
>> the thing is i can ping from r3 to the multicast IP but i just see r5
>> replying not r1
>> and i could see mroute all the way up to 1.1.1.1
>>
>> but still i dont get rekeys. (not even cumulative while joining)
>>
>> on R5 without joining igmp group i am getting rekeys
>>
>> Regards
>> Manish
>> On Sat, Jan 1, 2011 at 7:06 PM, Kingsley Charles <
>> [email protected]> wrote:
>>
>>> Config looks fine. Can you post the R4's config. Have you configured
>>> multicasting routing and rp-address on it too?
>>>
>>>
>>> With regards
>>> Kings
>>>
>>>
>>> On Sat, Jan 1, 2011 at 5:46 PM, manish ludhani <[email protected]
>>> > wrote:
>>>
>>>> please find below the related config.
>>>>
>>>> apologies for raising it again however i ve tried everything suggested
>>>> in previous posts
>>>>
>>>> thanks regards
>>>>
>>>>
>>>>
>>>> R5
>>>> |
>>>> (e0/0)
>>>> |
>>>> |
>>>> (l1 1.1.1.1)R1(fa0/0 10.10.10.1)--------(e0/0 .2)R2(e0/1
>>>> .2)-------(e1)Pix(e0)----R4(e0/1)---(F0/0)R3(l1 2.2.2.2)
>>>>
>>>>
>>>>
>>>> *R1#
>>>> *R1#sh run | sec crypto
>>>> crypto isakmp policy 10
>>>> encr 3des
>>>> hash md5
>>>> authentication pre-share
>>>> group 2
>>>> crypto isakmp key cisco address 0.0.0.0 0.0.0.0
>>>> crypto ipsec transform-set TSET esp-3des esp-md5-hmac
>>>> crypto ipsec profile IPSEC_PRO
>>>> set transform-set TSET
>>>> crypto gdoi group GET_GRP
>>>> identity number 1234
>>>> server local
>>>> rekey address ipv4 MULTI_GRP
>>>> rekey retransmit 10 number 2
>>>> rekey authentication mypubkey rsa GETKEY
>>>> sa ipsec 1
>>>> profile IPSEC_PRO
>>>> match address ipv4 GET_TRAFFIC
>>>> replay counter window-size 64
>>>> ip multicast-routing
>>>> ip pim rp-address 1.1.1.1
>>>>
>>>> interface Loopback1
>>>> ip address 1.1.1.1 255.255.255.0
>>>> ip pim sparse-mode
>>>> !
>>>> interface FastEthernet0/0
>>>> ip address 10.10.10.1 255.255.255.0
>>>> ip pim sparse-mode
>>>>
>>>>
>>>>
>>>> R1#sh crypto gdoi ks members
>>>>
>>>> Group Member Information :
>>>>
>>>> Number of rekeys sent for group GET_GRP : 8
>>>>
>>>> Group Member ID : 2.2.2.2
>>>> Group ID : 1234
>>>> Group Name : GET_GRP
>>>> Key Server ID : 0.0.0.0
>>>>
>>>> Group Member ID : 5.5.5.5
>>>> Group ID : 1234
>>>> Group Name : GET_GRP
>>>> Key Server ID : 0.0.0.0
>>>>
>>>>
>>>> R1#sh crypto gdoi ks rekey
>>>> Group GET_GRP (Multicast)
>>>> Number of Rekeys sent : 8
>>>> Number of Rekeys retransmitted : 4
>>>> KEK rekey lifetime (sec) : 86400
>>>> Remaining lifetime (sec) : 86325
>>>> Retransmit period : 10
>>>> Number of retransmissions : 2
>>>> IPSec SA 1 lifetime (sec) : 3600
>>>> Remaining lifetime (sec) : 3526
>>>> Number of registrations after rekey : 0
>>>> Multicast destination address : 239.0.0.5
>>>>
>>>>
>>>> R1#sh run | sec ip access
>>>> ip access-list extended GET_TRAFFIC
>>>> permit ip host 2.2.2.2 host 3.3.3.3
>>>> permit ip host 2.2.2.2 host 5.5.5.5
>>>> permit ip host 2.2.2.2 host 6.6.6.6
>>>> ip access-list extended MULTI_GRP
>>>> permit udp host 1.1.1.1 eq 848 host 239.0.0.5 eq 848
>>>> R1#
>>>>
>>>>
>>>>
>>>>
>>>> *pix*
>>>>
>>>>
>>>> !
>>>> interface Ethernet0
>>>> nameif outside
>>>> security-level 0
>>>> ip address 30.30.30.1 255.255.255.0
>>>> igmp access-group MULTI
>>>> !
>>>> interface Ethernet1
>>>> nameif inside
>>>> security-level 100
>>>> ip address 20.20.20.1 255.255.255.0
>>>> igmp access-group MULTI
>>>> !
>>>>
>>>>
>>>> access-list MULTI standard permit host 239.0.0.5
>>>> access-list OUTSIDE_IN extended permit ip any any log debugging
>>>> access-list OUTSIDE_IN extended permit pim any any
>>>>
>>>>
>>>> access-group OUTSIDE_IN in interface outside
>>>> access-group OUTSIDE_IN in interface inside
>>>>
>>>> pix1# sh run multicast-routing
>>>> multicast-routing
>>>>
>>>> pix1# sh run pim
>>>> pim rp-address 1.1.1.1
>>>>
>>>>
>>>>
>>>> pix1# sh pim neighbor
>>>>
>>>> Neighbor Address Interface Uptime Expires DR pri Bidir
>>>>
>>>> 30.30.30.2 outside 00:36:04 00:01:28 1 (DR)
>>>> 20.20.20.2 inside 00:36:04 00:01:28 1 (DR)
>>>>
>>>>
>>>>
>>>>
>>>> *R3*
>>>>
>>>>
>>>> R3#sh run | sec crypto
>>>> crypto isakmp policy 10
>>>> encr 3des
>>>> hash md5
>>>> authentication pre-share
>>>> group 2
>>>> crypto isakmp key cisco address 0.0.0.0 0.0.0.0
>>>> crypto gdoi group GET_GRP
>>>> identity number 1234
>>>> server address ipv4 1.1.1.1
>>>> crypto map GET_MAP local-address Loopback1
>>>> crypto map GET_MAP 10 gdoi
>>>> set group GET_GRP
>>>> crypto map GET_MAP
>>>>
>>>>
>>>> !
>>>> ip multicast-routing
>>>> !
>>>> interface Loopback1
>>>> ip address 2.2.2.2 255.255.255.0
>>>> ip pim sparse-mode
>>>> ip igmp join-group 239.0.0.5
>>>> !
>>>> interface FastEthernet0/0
>>>> ip address 40.40.40.1 255.255.255.0
>>>> ip pim sparse-mode
>>>> duplex auto
>>>> speed auto
>>>> crypto map GET_MAP
>>>>
>>>>
>>>> ip pim rp-address 1.1.1.1
>>>>
>>>> R3#sh crypto gdoi
>>>> GROUP INFORMATION
>>>>
>>>> Group Name : GET_GRP
>>>> Group Identity : 1234
>>>> Rekeys received : 0
>>>> IPSec SA Direction : Both
>>>> Active Group Server : 1.1.1.1
>>>> Group Server list : 1.1.1.1
>>>>
>>>> GM Reregisters in : 1486 secs
>>>> Rekey Received : never
>>>>
>>>>
>>>> Rekeys received
>>>> Cumulative : 0
>>>> After registration : 0
>>>>
>>>> ACL Downloaded From KS 1.1.1.1:
>>>> access-list permit ip host 2.2.2.2 host 3.3.3.3
>>>>
>>>> KEK POLICY:
>>>> Rekey Transport Type : Multicast
>>>> Lifetime (secs) : 86126
>>>> Encrypt Algorithm : 3DES
>>>> Key Size : 192
>>>> Sig Hash Algorithm : HMAC_AUTH_SHA
>>>> Sig Key Length (bits) : 1024
>>>>
>>>> TEK POLICY for the current KS-Policy ACEs Downloaded:
>>>> FastEthernet0/0:
>>>> IPsec SA:
>>>> spi: 0x8213D0D6(2182336726)
>>>> transform: esp-3des esp-md5-hmac
>>>> sa timing:remaining key lifetime (sec): (1637)
>>>> Anti-Replay(Time Based) : 64 sec interval
>>>>
>>>>
>>>>
>>>>
>>>>
>>>> *R5*
>>>>
>>>> R5#sh run | sec crypto
>>>> crypto isakmp policy 10
>>>> encr 3des
>>>> hash md5
>>>> authentication pre-share
>>>> group 2
>>>> crypto isakmp key cisco address 0.0.0.0 0.0.0.0
>>>> crypto gdoi group GET_GRP
>>>> identity number 1234
>>>> server address ipv4 1.1.1.1
>>>> crypto map GET_MAP local-address Loopback1
>>>> crypto map GET_MAP 10 gdoi
>>>> set group GET_GRP
>>>> crypto map GET_MAP
>>>>
>>>> interface Loopback1
>>>> ip address 5.5.5.5 255.255.255.0
>>>> ip pim sparse-mode
>>>> !
>>>> interface FastEthernet0/0
>>>> ip address 50.50.50.1 255.255.255.0
>>>> ip pim sparse-mode
>>>> duplex auto
>>>> speed auto
>>>> crypto map GET_MAP
>>>>
>>>>
>>>> ip pim rp-address 1.1.1.1
>>>> ip multicast-routing
>>>>
>>>>
>>>> R5#sh crypto gdoi
>>>> GROUP INFORMATION
>>>>
>>>> Group Name : GET_GRP
>>>> Group Identity : 1234
>>>> Rekeys received : 2
>>>> IPSec SA Direction : Both
>>>> Active Group Server : 1.1.1.1
>>>> Group Server list : 1.1.1.1
>>>>
>>>> GM Reregisters in : 1775 secs
>>>> Rekey Received(hh:mm:ss) : 00:27:41
>>>>
>>>>
>>>> Rekeys received
>>>> Cumulative : 2
>>>> After registration : 2
>>>>
>>>> ACL Downloaded From KS 1.1.1.1:
>>>> access-list permit ip host 2.2.2.2 host 3.3.3.3
>>>> access-list permit ip host 2.2.2.2 host 5.5.5.5
>>>> access-list permit ip host 2.2.2.2 host 6.6.6.6
>>>>
>>>> KEK POLICY:
>>>> Rekey Transport Type : Multicast
>>>> Lifetime (secs) : 86399
>>>> Encrypt Algorithm : 3DES
>>>> Key Size : 192
>>>> Sig Hash Algorithm : HMAC_AUTH_SHA
>>>> Sig Key Length (bits) : 1024
>>>>
>>>>
>>>> On Sat, Jan 1, 2011 at 2:10 PM, Kingsley Charles <
>>>> [email protected]> wrote:
>>>>
>>>>> Can you post the configs of KS, ASA and GM on outside.
>>>>>
>>>>>
>>>>>
>>>>> With regards
>>>>> Kings
>>>>>
>>>>> On Sat, Jan 1, 2011 at 2:52 AM, manish ludhani <
>>>>> [email protected]> wrote:
>>>>>
>>>>>> Hi all,
>>>>>>
>>>>>> i am stuck at GETVPN multicast rekey through ASA seems a common
>>>>>> catch. i hv looked at all the previous posts but still not
>>>>>> able to make it work.
>>>>>>
>>>>>> i am using asa in routed mode and KS is inside the firewall. i receive
>>>>>> the Rekeys on the GMs which are inside the firewall but not on the
>>>>>> outside
>>>>>> GMs
>>>>>> i hv enabled the routing on ASA inside outside interfaces and defined
>>>>>> RP. i tried to enable mpacket debug and noticed i was not receiving any
>>>>>> multicast traffic
>>>>>> packet tracer from inside source KS to multicast address fails (Early
>>>>>> security checks failed).
>>>>>>
>>>>>> i will b gr8ful if any1 please give me any clue.
>>>>>>
>>>>>>
>>>>>> Regards
>>>>>> Manish
>>>>>>
>>>>>> _______________________________________________
>>>>>> For more information regarding industry leading CCIE Lab training,
>>>>>> please visit www.ipexpert.com
>>>>>>
>>>>>>
>>>>>
>>>>
>>>
>>
>
R3#ping 239.0.0.5
Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:
Reply to request 0 from 40.40.40.1, 12 ms
Reply to request 0 from 50.50.50.1, 748 ms
Reply to request 0 from 50.50.50.1, 544 ms
Reply to request 0 from 2.2.2.2, 12 ms
R3#
R3#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,
Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
(*, 239.0.0.1), 00:01:12/stopped, RP 1.1.1.1, flags: SPF
Incoming interface: FastEthernet0/0, RPF nbr 40.40.40.2
Outgoing interface list: Null
(2.2.2.2, 239.0.0.1), 00:01:12/00:01:49, flags: PFT
Incoming interface: Loopback1, RPF nbr 0.0.0.0
Outgoing interface list: Null
(*, 239.0.0.5), 04:12:12/stopped, RP 1.1.1.1, flags: SJCLF
Incoming interface: FastEthernet0/0, RPF nbr 40.40.40.2
Outgoing interface list:
Loopback1, Forward/Sparse, 04:06:19/00:02:17
(2.2.2.2, 239.0.0.5), 00:01:05/00:01:59, flags: PLFT
Incoming interface: Loopback1, RPF nbr 0.0.0.0, Registering
Outgoing interface list: Null
(40.40.40.1, 239.0.0.5), 00:01:05/00:01:59, flags: LJT
Incoming interface: FastEthernet0/0, RPF nbr 0.0.0.0
Outgoing interface list:
Loopback1, Forward/Sparse, 00:01:06/00:02:16
(*, 224.0.1.40), 06:13:00/00:02:09, RP 1.1.1.1, flags: SJPL
Incoming interface: FastEthernet0/0, RPF nbr 40.40.40.2
Outgoing interface list: Null
R4#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,
Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
(*, 239.0.0.5), 04:22:31/00:03:06, RP 1.1.1.1, flags: SJCF
Incoming interface: Ethernet0/0, RPF nbr 30.30.30.1
Outgoing interface list:
Ethernet0/1, Forward/Sparse, 04:18:59/00:03:06
(2.2.2.2, 239.0.0.5), 00:01:10/00:02:19, flags:
Incoming interface: Ethernet0/1, RPF nbr 40.40.40.1
Outgoing interface list:
Ethernet0/0, Forward/Sparse, 00:01:09/00:03:16
(40.40.40.1, 239.0.0.5), 00:01:10/00:02:26, flags: FT
Incoming interface: Ethernet0/1, RPF nbr 0.0.0.0, Registering
Outgoing interface list:
Ethernet0/0, Forward/Sparse, 00:01:09/00:03:15
(*, 224.0.1.40), 06:23:43/00:02:14, RP 1.1.1.1, flags: SJCL
Incoming interface: Ethernet0/0, RPF nbr 30.30.30.1
Outgoing interface list:
Ethernet0/1, Forward/Sparse, 06:23:18/00:02:14
R4#
R4#ping 239.0.0.5
Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:
Reply to request 0 from 40.40.40.1, 232 ms
Reply to request 0 from 50.50.50.1, 476 ms
Reply to request 0 from 50.50.50.1, 440 ms
Reply to request 0 from 40.40.40.1, 288 ms
R4#
R2#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,
Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
(*, 239.0.0.5), 04:11:53/stopped, RP 1.1.1.1, flags: SJCF
Incoming interface: Ethernet0/0, RPF nbr 10.10.10.1
Outgoing interface list:
Ethernet0/2, Forward/Sparse, 04:11:53/00:02:41
(2.2.2.2, 239.0.0.5), 00:02:25/00:00:34, flags:
Incoming interface: Ethernet0/1, RPF nbr 20.20.20.1
Outgoing interface list:
Ethernet0/0, Forward/Sparse, 00:02:25/00:03:02
Ethernet0/2, Forward/Sparse, 00:02:25/00:02:41
(40.40.40.1, 239.0.0.5), 00:02:25/00:00:34, flags:
Incoming interface: Ethernet0/1, RPF nbr 20.20.20.1
Outgoing interface list:
Ethernet0/0, Forward/Sparse, 00:02:25/00:03:03
Ethernet0/2, Forward/Sparse, 00:02:25/00:02:41
(*, 224.0.1.40), 06:14:31/00:02:38, RP 1.1.1.1, flags: SJCL
Incoming interface: Ethernet0/0, RPF nbr 10.10.10.1
Outgoing interface list:
Ethernet0/2, Forward/Sparse, 04:44:50/00:02:48
(*, 239.0.0.5), 00:07:09/00:03:00, RP 1.1.1.1, flags: S
Incoming interface: inside
RPF nbr: 0.0.0.0
Outgoing interface list:
outside, Forward, 00:07:09/00:03:00
(2.2.2.2, 239.0.0.5), 00:03:59/00:02:23, flags: ST
Incoming interface: inside
RPF nbr: 0.0.0.0
Outgoing interface list:
(40.40.40.1, 239.0.0.5), 00:03:59/00:02:24, flags: ST
Incoming interface: inside
RPF nbr: 0.0.0.0
Outgoing interface list:
R2#ping 239.0.0.5
Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:
Reply to request 0 from 50.50.50.1, 20 ms
Reply to request 0 from 50.50.50.1, 24 ms
Reply to request 0 from 50.50.50.1, 20 ms
Reply to request 0 from 10.10.10.1, 20 ms
R2#
pix1# sh mroute
Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group,
C - Connected, L - Local, I - Received Source Specific Host Report,
P - Pruned, R - RP-bit set, F - Register flag, T - SPT-bit set,
J - Join SPT
Timers: Uptime/Expires
Interface state: Interface, State
(*, 239.0.0.5), 00:01:22/00:02:51, RP 1.1.1.1, flags: S
Incoming interface: inside
RPF nbr: 20.20.20.2
Outgoing interface list:
outside, Forward, 00:01:22/00:02:51
(2.2.2.2, 239.0.0.5), 00:00:12/00:03:17, flags: S
Incoming interface: outside
RPF nbr: 30.30.30.2
Outgoing interface list:
inside, Forward, 00:00:12/00:03:17
(40.40.40.1, 239.0.0.5), 00:00:12/00:03:17, RP 1.1.1.1, flags: SR
Incoming interface: inside
RPF nbr: 20.20.20.2
Outgoing interface list:
outside, Null, 00:00:12/00:03:17
(40.40.40.1, 239.0.0.5), 00:00:12/00:03:17, flags: ST
Incoming interface: outside
RPF nbr: 30.30.30.2
Outgoing interface list:
inside, Forward, 00:00:12/00:03:17
R1#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,
Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
(*, 239.0.0.5), 06:29:13/00:03:07, RP 1.1.1.1, flags: SJCL
Incoming interface: Null, RPF nbr 0.0.0.0
Outgoing interface list:
FastEthernet0/0, Forward/Sparse, 04:26:00/00:03:07
Loopback1, Forward/Sparse, 06:29:13/00:02:39
(2.2.2.2, 239.0.0.5), 00:01:59/00:01:00, flags: L
Incoming interface: FastEthernet0/0, RPF nbr 10.10.10.2
Outgoing interface list:
Loopback1, Forward/Sparse, 00:01:59/00:02:39
(40.40.40.1, 239.0.0.5), 00:01:59/00:01:00, flags: L
Incoming interface: FastEthernet0/0, RPF nbr 10.10.10.2
Outgoing interface list:
Loopback1, Forward/Sparse, 00:01:59/00:02:39
(*, 224.0.1.40), 06:30:03/00:02:54, RP 1.1.1.1, flags: SJCL
Incoming interface: Null, RPF nbr 0.0.0.0
Outgoing interface list:
FastEthernet0/0, Forward/Sparse, 06:28:09/00:02:40
Loopback1, Forward/Sparse, 06:30:04/00:02:38
R1#ping 239.0.0.5
Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:
*Mar 1 06:47:34.782: IP(0): s=1.1.1.1 (Loopback1) d=239.0.0.5
(FastEthernet0/0) id=10, ttl=254, prot=1, len=100(100), mforward
Reply to request 0 from 1.1.1.1, 12 ms
Reply to request 0 from 50.50.50.1, 36 ms
Reply to request 0 from 50.50.50.1, 32 ms
R1#
R5#sh ip mroute
IP Multicast Routing Table
Flags: D - Dense, S - Sparse, B - Bidir Group, s - SSM Group, C - Connected,
L - Local, P - Pruned, R - RP-bit set, F - Register flag,
T - SPT-bit set, J - Join SPT, M - MSDP created entry,
X - Proxy Join Timer Running, A - Candidate for MSDP Advertisement,
U - URD, I - Received Source Specific Host Report,
Z - Multicast Tunnel, z - MDT-data group sender,
Y - Joined MDT-data group, y - Sending to MDT-data group
Outgoing interface flags: H - Hardware switched, A - Assert winner
Timers: Uptime/Expires
Interface state: Interface, Next-Hop or VCD, State/Mode
(*, 239.0.0.5), 04:33:46/stopped, RP 1.1.1.1, flags: SJPLF
Incoming interface: FastEthernet0/0, RPF nbr 50.50.50.2
Outgoing interface list: Null
(2.2.2.2, 239.0.0.5), 00:00:18/00:02:46, flags: PLT
Incoming interface: FastEthernet0/0, RPF nbr 50.50.50.2
Outgoing interface list: Null
(40.40.40.1, 239.0.0.5), 00:00:18/00:02:46, flags: PLT
Incoming interface: FastEthernet0/0, RPF nbr 50.50.50.2
Outgoing interface list: Null
(5.5.5.5, 239.0.0.5), 00:02:44/00:01:36, flags: LFT
Incoming interface: Loopback1, RPF nbr 0.0.0.0
Outgoing interface list:
FastEthernet0/0, Forward/Sparse, 00:02:43/00:02:44
(50.50.50.1, 239.0.0.5), 00:02:44/00:01:06, flags: PLT
Incoming interface: FastEthernet0/0, RPF nbr 0.0.0.0
Outgoing interface list: Null
(*, 224.0.1.40), 05:07:12/00:02:27, RP 1.1.1.1, flags: SJPL
Incoming interface: FastEthernet0/0, RPF nbr 50.50.50.2
Outgoing interface list: Null
R5#
R5#ping 239.0.0.5
Type escape sequence to abort.
Sending 1, 100-byte ICMP Echos to 239.0.0.5, timeout is 2 seconds:
Reply to request 0 from 50.50.50.1, 12 ms
Reply to request 0 from 10.10.10.1, 188 ms
Reply to request 0 from 10.10.10.1, 188 ms
Reply to request 0 from 5.5.5.5, 12 ms
R5#
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit
www.ipexpert.com