<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: IGMP queries from the AP7532 without settings applied in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63180#M5635</link>
    <description>&lt;P&gt;Hi Arthur,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The previous screenshot sent, shows that IGMP&amp;nbsp;is disabled.&amp;nbsp;You are correct, The default&amp;nbsp;ip acces-list BROADCAST-MULTICAST-CONTROL is used to stop&amp;nbsp;the unwanted broadcast and multicast traffic propagating from wired to wireless interface. You can apply it as it is, or make changes to it according to your network and application usage if you use any VOIP, push to talk and&amp;nbsp;Chrome Cast type applications that may use multicast.&lt;/P&gt;&lt;P&gt;Let us know how it goes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ovais&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Fri, 11 Dec 2020 03:16:19 GMT</pubDate>
    <dc:creator>Ovais_Qayyum</dc:creator>
    <dc:date>2020-12-11T03:16:19Z</dc:date>
    <item>
      <title>IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63176#M5631</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;Our AP is still sending IGMP queries on the network even if the querier setting is disable on profile.&lt;BR /&gt;IGMP queries are sent from the AP on VLAN 5 and cause conflict on the network.&lt;BR /&gt;On our architecture, we decided to set the querier on a another switch due to sepecific use cases.&lt;/P&gt;&lt;P&gt;First we needed to deactivate ip spoofing firewall rule beacuse the AP dropped IGMP queries from the switch. But even if ip spoofing is deactivated, sometimes some clients answer to both queriers on the ,network (the AP and the switch) and it can cause brief and total disconnections of clients watching multicast flows (e.g cameras).&lt;BR /&gt;Please find below the AP configuration:&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;! Configuration of AP7532 version 5.9.1.4-004R&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;version 2.5&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;client-identity-group default&lt;BR /&gt;&amp;nbsp;load default-fingerprints&lt;BR /&gt;!&lt;BR /&gt;ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;&amp;nbsp;permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt;&amp;nbsp;permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"&lt;BR /&gt;&amp;nbsp;deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"&lt;BR /&gt;&amp;nbsp;deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"&lt;BR /&gt;&amp;nbsp;deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local broadcast"&lt;BR /&gt;&amp;nbsp;permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;!&lt;BR /&gt;mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;&amp;nbsp;permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"&lt;BR /&gt;&amp;nbsp;permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"&lt;BR /&gt;!&lt;BR /&gt;ip snmp-access-list default&lt;BR /&gt;&amp;nbsp;permit any&lt;BR /&gt;!&lt;BR /&gt;firewall-policy default&lt;BR /&gt;&amp;nbsp;no ip dos ipspoof&lt;BR /&gt;&amp;nbsp;no ip dos tcp-sequence-past-window&lt;BR /&gt;&amp;nbsp;no stateful-packet-inspection-l2&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1400&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mint-policy global-default&lt;BR /&gt;!&lt;BR /&gt;meshpoint-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy default&lt;BR /&gt;&amp;nbsp;rate-limit client to-air rate 5000&lt;BR /&gt;&amp;nbsp;rate-limit client from-air rate 5000&lt;BR /&gt;&amp;nbsp;qos trust dscp&lt;BR /&gt;&amp;nbsp;qos trust wmm&lt;BR /&gt;&amp;nbsp;accelerated-multicast 239.1.172.203 classification video&lt;BR /&gt;&amp;nbsp;accelerated-multicast 239.1.172.204 classification video&lt;BR /&gt;&amp;nbsp;accelerated-multicast 239.1.172.205 classification video&lt;BR /&gt;&amp;nbsp;accelerated-multicast 239.1.172.206 classification video&lt;BR /&gt;&amp;nbsp;accelerated-multicast 239.1.172.207 classification video&lt;BR /&gt;!&lt;BR /&gt;radio-qos-policy default&lt;BR /&gt;&amp;nbsp;admission-control video max-clients 25&lt;BR /&gt;&amp;nbsp;admission-control video max-roamed-clients 256&lt;BR /&gt;&amp;nbsp;admission-control video max-airtime-percent 150&lt;BR /&gt;&amp;nbsp;admission-control video reserved-for-roam-percent 12&lt;BR /&gt;&amp;nbsp;accelerated-multicast max-client-streams 4&lt;BR /&gt;&amp;nbsp;accelerated-multicast stream-threshold 500&lt;BR /&gt;&amp;nbsp;accelerated-multicast client-timeout 30&lt;BR /&gt;!&lt;BR /&gt;wlan 1&lt;BR /&gt;&amp;nbsp;ssid SSID1&lt;BR /&gt;&amp;nbsp;vlan 5&lt;BR /&gt;&amp;nbsp;bridging-mode local&lt;BR /&gt;&amp;nbsp;encryption-type ccmp&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no fast-bss-transition over-ds&lt;BR /&gt;&amp;nbsp;wpa-wpa2 psk 0 123456789&lt;BR /&gt;!&lt;BR /&gt;wlan 2&lt;BR /&gt;&amp;nbsp;ssid SSID2&lt;BR /&gt;&amp;nbsp;vlan 11&lt;BR /&gt;&amp;nbsp;bridging-mode local&lt;BR /&gt;&amp;nbsp;encryption-type ccmp&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no broadcast-ssid&lt;BR /&gt;&amp;nbsp;no answer-broadcast-probes&lt;BR /&gt;&amp;nbsp;no fast-bss-transition over-ds&lt;BR /&gt;&amp;nbsp;wpa-wpa2 psk 0 1234567891&lt;BR /&gt;!&lt;BR /&gt;wlan 3&lt;BR /&gt;&amp;nbsp;ssid SSID3&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;bridging-mode local&lt;BR /&gt;&amp;nbsp;encryption-type ccmp&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no broadcast-ssid&lt;BR /&gt;&amp;nbsp;no answer-broadcast-probes&lt;BR /&gt;&amp;nbsp;no fast-bss-transition over-ds&lt;BR /&gt;&amp;nbsp;wpa-wpa2 psk 0 1234567892&lt;BR /&gt;!&lt;BR /&gt;wlan CONFIG_ID&lt;BR /&gt;&amp;nbsp;ssid 12b25aec52a29c946e21ccbd685c3d93&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;bridging-mode local&lt;BR /&gt;&amp;nbsp;encryption-type ccmp&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no fast-bss-transition over-ds&lt;BR /&gt;&amp;nbsp;wpa-wpa2 psk 0 12345EDCBAX&lt;BR /&gt;!&lt;BR /&gt;dhcp-server-policy WiNGExpressDhcpSvrPolicy&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;management-policy default&lt;BR /&gt;&amp;nbsp;no telnet&lt;BR /&gt;&amp;nbsp;no http server&lt;BR /&gt;&amp;nbsp;https server&lt;BR /&gt;&amp;nbsp;ssh&lt;BR /&gt;&amp;nbsp;user admin password 1 e8aaf41a4b1781b2f65b35e450030684d38ed12bbe3614191c37d192f331e02c role superuser access all&lt;BR /&gt;&amp;nbsp;snmp-server manager v2&lt;BR /&gt;&amp;nbsp;snmp-server community 0 private rw&lt;BR /&gt;&amp;nbsp;snmp-server community 0 public ro&lt;BR /&gt;&amp;nbsp;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;&amp;nbsp;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;!&lt;BR /&gt;event-system-policy default&lt;BR /&gt;!&lt;BR /&gt;nsight-policy default&lt;BR /&gt;!&lt;BR /&gt;profile ap7532 default&lt;BR /&gt;&amp;nbsp;no ip igmp snooping&lt;BR /&gt;&amp;nbsp;no ip igmp snooping forward-unknown-multicast&lt;BR /&gt;&amp;nbsp;autoinstall configuration&lt;BR /&gt;&amp;nbsp;autoinstall firmware&lt;BR /&gt;&amp;nbsp;crypto ikev1 policy ikev1-default&lt;BR /&gt;&amp;nbsp; isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;&amp;nbsp;crypto ikev2 policy ikev2-default&lt;BR /&gt;&amp;nbsp; isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;&amp;nbsp;crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;&amp;nbsp;crypto ikev1 remote-vpn&lt;BR /&gt;&amp;nbsp;crypto ikev2 remote-vpn&lt;BR /&gt;&amp;nbsp;crypto auto-ipsec-secure&lt;BR /&gt;&amp;nbsp;crypto load-management&lt;BR /&gt;&amp;nbsp;crypto remote-vpn-client&lt;BR /&gt;&amp;nbsp;interface radio1&lt;BR /&gt;&amp;nbsp; channel 1&lt;BR /&gt;&amp;nbsp; power 20&lt;BR /&gt;&amp;nbsp; wlan 1 bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan 2 bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan 3 bss 3 primary&lt;BR /&gt;&amp;nbsp;interface radio2&lt;BR /&gt;&amp;nbsp; channel 44&lt;BR /&gt;&amp;nbsp; power 20&lt;BR /&gt;&amp;nbsp; wlan 1 bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan 2 bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan 3 bss 3 primary&lt;BR /&gt;&amp;nbsp;interface ge1&lt;BR /&gt;&amp;nbsp; switchport mode trunk&lt;BR /&gt;&amp;nbsp; switchport trunk native vlan 1&lt;BR /&gt;&amp;nbsp; no switchport trunk native tagged&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 1,5,11&lt;BR /&gt;&amp;nbsp;interface vlan1&lt;BR /&gt;&amp;nbsp;interface vlan5&lt;BR /&gt;&amp;nbsp;interface vlan11&lt;BR /&gt;&amp;nbsp;interface pppoe1&lt;BR /&gt;&amp;nbsp;use event-system-policy default&lt;BR /&gt;&amp;nbsp;use firewall-policy default&lt;BR /&gt;&amp;nbsp;use client-identity-group default&lt;BR /&gt;&amp;nbsp;logging on&lt;BR /&gt;&amp;nbsp;service pm sys-restart&lt;BR /&gt;&amp;nbsp;router ospf&lt;BR /&gt;&amp;nbsp;adoption-mode controller&lt;BR /&gt;!&lt;BR /&gt;rf-domain default&lt;BR /&gt;&amp;nbsp;timezone Europe/Paris&lt;BR /&gt;&amp;nbsp;country-code fr&lt;BR /&gt;&amp;nbsp;use nsight-policy default&lt;BR /&gt;!&lt;BR /&gt;self&lt;BR /&gt;! ap7532 94-9B-2C-2A-68-78&lt;BR /&gt;&amp;nbsp;radio-count 2&lt;BR /&gt;&amp;nbsp;use profile default&lt;BR /&gt;&amp;nbsp;use rf-domain default&lt;BR /&gt;&amp;nbsp;hostname ap7532&lt;BR /&gt;&amp;nbsp;license AP VIRTUAL_CONTROLLER_DEFAULT_AP_LICENSE&lt;BR /&gt;&amp;nbsp;no adoption-site&lt;BR /&gt;&amp;nbsp;location default&lt;BR /&gt;&amp;nbsp;ip default-gateway 192.168.104.1&lt;BR /&gt;&amp;nbsp;interface radio1&lt;BR /&gt;&amp;nbsp; shutdown&lt;BR /&gt;&amp;nbsp; channel 1&lt;BR /&gt;&amp;nbsp;interface radio2&lt;BR /&gt;&amp;nbsp; shutdown&lt;BR /&gt;&amp;nbsp; channel 44&lt;BR /&gt;&amp;nbsp;interface vlan1&lt;BR /&gt;&amp;nbsp; no description&lt;BR /&gt;&amp;nbsp; ip address 192.168.104.3/24&lt;BR /&gt;&amp;nbsp; no ip nat&lt;BR /&gt;&amp;nbsp;interface vlan5&lt;BR /&gt;&amp;nbsp; no description&lt;BR /&gt;&amp;nbsp; ip address 10.224.250.3/12&lt;BR /&gt;&amp;nbsp;no use dhcp-server-policy&lt;BR /&gt;&amp;nbsp;no virtual-controller&lt;BR /&gt;&amp;nbsp;rf-domain-manager capable&lt;BR /&gt;&amp;nbsp;no ip dns-server-forward&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please find a Wireshark capture screenshot following a capture done on the AP using the command line, “service pktcap on radio all”:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="53f471adbfae4ff6b94011206415e6e4_c78d5c5f-f2c1-449d-9022-8ae212084559.jpg"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/1068iD9C018FB56088840/image-size/large?v=v2&amp;amp;px=999" role="button" title="53f471adbfae4ff6b94011206415e6e4_c78d5c5f-f2c1-449d-9022-8ae212084559.jpg" alt="53f471adbfae4ff6b94011206415e6e4_c78d5c5f-f2c1-449d-9022-8ae212084559.jpg" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;10.224.250.3 → AP IP address&lt;/P&gt;&lt;P&gt;10.241.14.1 → Switch IP address&lt;/P&gt;&lt;P&gt;I’m quiet new with Wing AP and i’d like to understand what I’am missing or settings to be refine in the configuration.&lt;/P&gt;&lt;P&gt;Thanks for your help !&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;Arthur&lt;/P&gt;</description>
      <pubDate>Thu, 03 Dec 2020 19:02:31 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63176#M5631</guid>
      <dc:creator>Arthurooo</dc:creator>
      <dc:date>2020-12-03T19:02:31Z</dc:date>
    </item>
    <item>
      <title>Re: IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63177#M5632</link>
      <description>&lt;P&gt;Arthuroo,&lt;/P&gt;&lt;P&gt;Is it an Express unit? I am&amp;nbsp;asking because I see WiNGExpress in the HDCP policy name.&lt;/P&gt;&lt;P&gt;Please display configuration with “show run include-factory | include ip igmp” and share it here.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ovais&lt;/P&gt;</description>
      <pubDate>Tue, 08 Dec 2020 02:39:20 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63177#M5632</guid>
      <dc:creator>Ovais_Qayyum</dc:creator>
      <dc:date>2020-12-08T02:39:20Z</dc:date>
    </item>
    <item>
      <title>Re: IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63178#M5633</link>
      <description>&lt;P&gt;Hello Ovais,&lt;/P&gt;&lt;P&gt;How can I check if it’s an Express unit ?&lt;/P&gt;&lt;P&gt;Please find the “show run include-factory | include ip igmp” result:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="fe2839f6fc9c4f4fa85b69877cb3e7ac_c444ad7f-316f-427d-a99c-ab0e50cf4441.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/4166i2669C34B7D569F10/image-size/large?v=v2&amp;amp;px=999" role="button" title="fe2839f6fc9c4f4fa85b69877cb3e7ac_c444ad7f-316f-427d-a99c-ab0e50cf4441.png" alt="fe2839f6fc9c4f4fa85b69877cb3e7ac_c444ad7f-316f-427d-a99c-ab0e50cf4441.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;&lt;P&gt;Arthur&lt;/P&gt;</description>
      <pubDate>Wed, 09 Dec 2020 16:45:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63178#M5633</guid>
      <dc:creator>Arthurooo</dc:creator>
      <dc:date>2020-12-09T16:45:06Z</dc:date>
    </item>
    <item>
      <title>Re: IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63179#M5634</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;To give you more information on this topic, I found something special on the Wireshark capture regarding the AP IGMP query. The unexpected query is still coming from the AP radio to a device (IOS smart phone), according to MAC adresses:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="220275faf339425daf1717fea47a478c_2354251c-b935-4174-a875-cf0a6086a23a.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/5788iE3E23E9B7CCE2163/image-size/large?v=v2&amp;amp;px=999" role="button" title="220275faf339425daf1717fea47a478c_2354251c-b935-4174-a875-cf0a6086a23a.png" alt="220275faf339425daf1717fea47a478c_2354251c-b935-4174-a875-cf0a6086a23a.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Is there any way to block this traffic ? What I’am thinking today is to use the ip acces-list BROADCAST-MULTICAST-CONTROL to filter this undesired traffic.&lt;/P&gt;&lt;P&gt;Moreover, when I check the IGMP query from the switch, the destination address is the expected one: 224.0.0.1:&lt;/P&gt;&lt;FIGURE&gt;&lt;span class="lia-inline-image-display-wrapper" image-alt="220275faf339425daf1717fea47a478c_85e80266-3f01-4968-8c31-4bd2e16a83c1.png"&gt;&lt;img src="https://community.extremenetworks.com/t5/image/serverpage/image-id/661iEA5D1F2FED1F92C2/image-size/large?v=v2&amp;amp;px=999" role="button" title="220275faf339425daf1717fea47a478c_85e80266-3f01-4968-8c31-4bd2e16a83c1.png" alt="220275faf339425daf1717fea47a478c_85e80266-3f01-4968-8c31-4bd2e16a83c1.png" /&gt;&lt;/span&gt;&lt;/FIGURE&gt;&lt;P&gt;Thanks for your help.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arthur&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 01:39:09 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63179#M5634</guid>
      <dc:creator>Arthurooo</dc:creator>
      <dc:date>2020-12-11T01:39:09Z</dc:date>
    </item>
    <item>
      <title>Re: IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63180#M5635</link>
      <description>&lt;P&gt;Hi Arthur,&amp;nbsp;&lt;/P&gt;&lt;P&gt;The previous screenshot sent, shows that IGMP&amp;nbsp;is disabled.&amp;nbsp;You are correct, The default&amp;nbsp;ip acces-list BROADCAST-MULTICAST-CONTROL is used to stop&amp;nbsp;the unwanted broadcast and multicast traffic propagating from wired to wireless interface. You can apply it as it is, or make changes to it according to your network and application usage if you use any VOIP, push to talk and&amp;nbsp;Chrome Cast type applications that may use multicast.&lt;/P&gt;&lt;P&gt;Let us know how it goes.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ovais&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 11 Dec 2020 03:16:19 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63180#M5635</guid>
      <dc:creator>Ovais_Qayyum</dc:creator>
      <dc:date>2020-12-11T03:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63181#M5636</link>
      <description>&lt;P&gt;Hi Ovais,&lt;/P&gt;&lt;P&gt;By using the service pktcap capture on radio, we saw that the specific query was coming from the AP as outbound traffic. If we used the ip acces-list BROADCAST-MULTICAST-CONTROL for outbound traffic, it didn’t improve anything, we saw again the unexpected IGMP query.&lt;/P&gt;&lt;P&gt;To be sure, we refine the IGMP rule in order to deny outbound IGMP traffic coming from 10.224.250.3 to 224.0.0.1. It shows us the same result, the unexpected IGMP query was always sent by the AP.&lt;/P&gt;&lt;P&gt;We tried to remove the IP 10.224.250.3 from the VLAN 5 (please refer to configuration above) and the AP was still always sending IGMP queries but with another IP address. This ip address was based on the MAC address of the AP.&lt;/P&gt;&lt;P&gt;Another interesting thing is, when there are no devices connected to the SSID, and if we capture the traffic as the same time, we don’t see this unexpected query. I observed the query&amp;nbsp; when I connected multiple devices (IOS and Android smartphones) to the SSID.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arthur&lt;/P&gt;</description>
      <pubDate>Mon, 04 Jan 2021 16:33:26 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63181#M5636</guid>
      <dc:creator>Arthurooo</dc:creator>
      <dc:date>2021-01-04T16:33:26Z</dc:date>
    </item>
    <item>
      <title>Re: IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63182#M5637</link>
      <description>&lt;P&gt;Hi Arthur,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I thought of updating the thread. We have noticed this behavior in one more&amp;nbsp;instance&amp;nbsp;as well and are currently investigating the cause of it. As soon as there is&amp;nbsp;an update, I will let you know.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ovais&lt;/P&gt;</description>
      <pubDate>Sat, 13 Mar 2021 00:25:11 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63182#M5637</guid>
      <dc:creator>Ovais_Qayyum</dc:creator>
      <dc:date>2021-03-13T00:25:11Z</dc:date>
    </item>
    <item>
      <title>Re: IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63183#M5638</link>
      <description>&lt;P&gt;Hi Arthur,&lt;/P&gt;&lt;P&gt;I was finally able to reproduce this in my lab and have a fair bit of idea about what you are seeing in your setup.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#000000;"&gt;I am able to see the IGMP query messages from the AP when the client is getting connected. This query message is getting sent as part of &lt;/SPAN&gt;&lt;SPAN style="color:#e74c3c;"&gt;&lt;STRONG&gt;multicast to unicast conversion&lt;/STRONG&gt;&lt;/SPAN&gt;&lt;SPAN style="color:#000000;"&gt;, this is independent of IGMP&amp;nbsp;configured in VLAN.&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="color:#000000;"&gt;This IGMP query message is needed if mc2uc conversion is required. So, disable mc2uc to avoid IGMP query messages from the AP. This will degrade the performance of multicast traffic to some extent though.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN style="color:#000000;"&gt;To add further, in some cases, you might also see an IGMPv1 query even if the configured version is IGMPv3.&lt;/SPAN&gt;&amp;nbsp;It is decided based on the version of the IGMP membership report sent by the wireless stations. If&amp;nbsp;the IGMP membership report is not received from the station then IGMPv1 will be used&amp;nbsp;as default. In case of IGMP querier is enabled on the AP then configured IGMP version will be used for sending IGMP query as part of mc2uc conversion.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Ovais&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 02 Apr 2021 01:09:45 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63183#M5638</guid>
      <dc:creator>Ovais_Qayyum</dc:creator>
      <dc:date>2021-04-02T01:09:45Z</dc:date>
    </item>
    <item>
      <title>Re: IGMP queries from the AP7532 without settings applied</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63184#M5639</link>
      <description>&lt;P&gt;Hi Ovais,&lt;/P&gt;&lt;P&gt;Thanks for the reply and investigation. After doing some tests with our architecture, we found that this IGMP query didn’t have conflict with other IGMP queries.&lt;/P&gt;&lt;P&gt;In my opinion, it should be interesting to make a note in documentation saying that with multicast accelerated feature, the AP can send IGMP query and can generate ip spoofing attack (if other queriers are configured on the network)&amp;nbsp;if the ip dos ipspoof event on the firewall is configured.&lt;/P&gt;&lt;P&gt;Thanks for your help on this subject.&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Arthur&lt;/P&gt;</description>
      <pubDate>Fri, 30 Apr 2021 22:00:31 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/igmp-queries-from-the-ap7532-without-settings-applied/m-p/63184#M5639</guid>
      <dc:creator>Arthurooo</dc:creator>
      <dc:date>2021-04-30T22:00:31Z</dc:date>
    </item>
  </channel>
</rss>

