IP-TV through MikroTik Router

Hi experts! I’ll try again to get some help with my still unsolved issue. I have an MikroTik Router CRS124-24G-1S-2nD that i need help to setup IP-TV from the router.

I have set the router as an Home AP via the Quick Set and everything seems to work ok except that I would like to have my IPTV-box working through the router. I use NAT ether1 = input from ISP (Dynamic external IP) the rest of the etherXX-ports is NAT and all within range 192.168.10.1/24.
I have read on the forum, and tried to setup IGMP-proxy so that the multicast can go through from ether1 to ether11 (My IP-TV box), also tried with firewall and routes, but nothing seems to work.

Can someone please lead me in the right direction in an simple and understandable way? RouterOS is a new area for me.


Below exported configuration (only rows i assume is needed to help)

/interface ethernet
set [ find default-name=ether1 ] comment="BBB WAN"
set [ find default-name=ether11 ] comment="External IP to TV-Box" master-port=ether2-master
/ip pool 
add name=dhcp ranges=192.168.10.10-192.168.10.199
/ip dhcp-server
add address-pool=dhcp authoritative=after-2sec-delay disabled=no interface=bridge name=defconf
/interface bridge filter
add action=accept chain=forward disabled=yes in-bridge=bridge in-interface=ether1 out-bridge=bridge \ out-interface=ether11
/interface ethernet switch multicast-fdb
add ports=ether11
/ip firewall filter
add action=fasttrack-connection chain=forward comment=FastTrack connection-state=established,related \
    disabled=yes
add action=accept chain=forward connection-nat-state=srcnat,dstnat in-interface=ether1 in-interface-list=\
    all out-interface-list=all protocol=igmp
add action=accept chain=input comment="allow IPsec NAT" dst-port=4500 protocol=udp
add action=accept chain=input comment="allow IKE" dst-port=500 log=yes log-prefix=VPN protocol=udp
add action=accept chain=input comment="allow l2tp" dst-port=1701 protocol=udp
add action=accept chain=input comment="allow pptp" dst-port=1723 log=yes log-prefix=VPN protocol=tcp
add action=accept chain=input comment="allow sstp" dst-port=443 protocol=tcp
add action=accept chain=input protocol=ipsec-esp
add action=accept chain=input protocol=ipsec-ah
add action=accept chain=input comment="Allow Established connections" connection-state=established
add action=accept chain=input comment="Allow ICMP" protocol=icmp
add action=accept chain=input in-interface=!ether1 src-address=192.168.10.0/24
add action=drop chain=input comment="Drop Invalid connections" connection-state=invalid
add action=drop chain=input comment="Drop everything else"
/ip firewall nat
add action=masquerade chain=srcnat comment="defconf: masquerade" out-interface=ether1
add action=masquerade chain=srcnat comment="masq. vpn traffic" src-address=192.168.89.0/24
add action=masquerade chain=srcnat comment="OpenVPN Masquerade" src-address=192.168.20.0/24
/routing igmp-proxy interface
add alternative-subnets=1.2.3.0/24,2.3.4.0/24 interface=ether1 upstream=yes
add interface=ether11
/routing igmp-proxy mfc
add downstream-interfaces=ether11 group=224.10.10.11 source=192.168.10.1 upstream-interface=wlan1
/routing pim bsr-candidates
add disabled=yes interface=ether11
/routing pim interface
add disabled=yes interface=ether11
/routing pim rp-candidates
add interface=ether11

Hello

Unfortunally I don’t have the answer to your question, but reading your rules, I’ll take a wild guess and say you have Swedish Bredbandsbolaget as ISP - right?
If so, I’m in the exactly same position, and would very much appreciate any hints configuring this.

One hint might be that you need to activate IGMP Snooping on your Bridge, but I had no luck so far :frowning:

PLease let me know if you have got this working.

Cheers,
Kalle Larsson