02-14-2012 9:16 PM
10-03-2012 6:10 AM
I do not believe that the mulitcast routing has anything to do with the iPad's communications with the STB.
The problem is that when you've got your own router serving your Wireless network via the DMZplus configuration, routing into the IPTV 192.168.1.0/24 subnet isn't happening. I'm not sure that you can configure the RG to route traffic from the DMZplus into the rest of your network (or vice versa).
10-06-2012 12:03 AM
The above post indicates multicast routing resolves the issue. However, I have a Linux based router running suse, unlike the posted solution.
10-06-2012 8:33 AM
I do see that is part of the configuration. And, to be honest, I do not know exactly what protocols or addresses the application uses to communicate with the STB. Maybe we can get someone who has wiresharked the protocol to let us in on the secret.
I am still waiting on an SDK for Android devices.
10-06-2012 11:13 AM
I am guessing telling the LAN router that the RG is a protocol independent multicast neighbor is the trick. The app broadcasts to its subnet asking the uverse RG where the STBs are on the network. Usually this will fail if your app is on a different subnet, but the above post indicates if your router considerably the RG to be a protocol independent multicast neighbor, then broadcast packets may be routed to the RG and vice versa. That's my guess. It seems to be protocol agnostibroader harps this acts as some sort of all purpose broadcast relay, but I don't know. That is my guess.
Please chime in if anyone knows how to setup a protocol independent multicast neighbor under lineup Linux.
10-22-2012 9:27 PM
The U-verse box & the ipad do use SSDP protocol (126.96.36.199 group address) to see each other. The Suse box likely see's this protocol and propogates it accordingly (without routing multicast).
03-04-2014 8:57 AM
Bit of a newbie - weekend router junkie....so unfortunately I have not been abel to translate the ASA commands to Juniper/ NetScreen SSG5 FW/ router....
Does anyone have the multicast config to make this work with an SSG5 behind the AT&T RG?
05-09-2014 2:04 PM
I updated my access-list line to:
access-list acl_out extended permit ip 192.168.1.0 255.255.255.0 host 188.8.131.52
...and it still seems to work fine, and may be more secure if you're running your router under DMZPlus mode.
For those of us without a Cisco ASA or PIX, is there a way to setup firewall, port forwarding, static routes, anything to get the packets on the subnet under the DMZ.
- edited 08-23-2015 3:30 PM
This stupid forum applied my post to another thread.
Please NO SD stretch-o-vision or 480 SD HD Channels
Need Help? PM ATT Uverse Care (all service problems)
ATT Customer Care(billing and all other problems)
Your Results May Vary, In My Humble Opinion
I Call It Like I See It, Simply a U-verse user, nothing more