Originally Posted by
Forkur
Ни плеер ваш, ни настройки которые вы привели не помогают.
Прошивка
1.9.2.7-10б
Провайдер UnionLine, плейлист
http://www.u-l.ru/iptv.m3u
Напрямую всё показывает. Enable multicast routing? - Yes
Может всё-таки 1.9.2.7-10а : http://oleg.wl500g.info/pre10a/WL500gp-1.9.2.7-10.7.trx ?
Code:
#EXTM3U
#EXTINF:0,Орт
rtsp://10.14.100.1:7001/optt.sdp
#EXTINF:0,Россия
rtsp://10.14.100.1:7002/russ.sdp
#EXTINF:0,ТВЦ
rtsp://10.14.100.1:7003/tvcc.sdp
#EXTINF:0,НТВ
rtsp://10.14.100.1:7004/ntvv.sdp
rtsp://10.14.100.1:7001/optt.sdp Н-да, как всё запущено ... Смотреть IPTV через RealPlayer ...
File Description : Informational file created with media broadcasting software;
contains the format, timing, and authorship of the streamed media;
may be created for live streaming media with a program like Sorenson.
Broadcaster or for prerecorded media using a program like PlaylistBroadcaster.
In order for SDP information to be transmitted with the streaming media, the SDP
file must be stored in the designated media directory on the streaming server.
Program(s) that open sdp files : Apple QuickTime Player RealNetworks RealPlayer
RTFM : http://tools.ietf.org/html/draft-ietf-mmusic-sdp-new-26
Code:
4.1. Media and Transport Information
An SDP session description includes the following media information:
o The type of media (video, audio, etc.)
o The transport protocol (RTP/UDP/IP, H.320, etc.)
o The format of the media (H.261 video, MPEG video, etc.)
In addition to media format and transport protocol, SDP conveys
address and port details. For an IP multicast session, these comprise:
o The multicast group address for media
o The transport port for media
This address and port are the destination address and destination
port of the multicast stream, whether being sent, received, or both.
For unicast IP sessions, the following are conveyed:
o The remote address for media
o The remote transport port for media
Session description
v= (protocol version)
o= (owner/creator and session identifier)
s= (session name)
i=* (session information)
u=* (URI of description)
e=* (email address)
p=* (phone number)
c=* (connection information - not required if included in all media)
b=* (zero or more bandwidth information lines)
One or more time descriptions ("t=" and "r=" lines, see below)
z=* (time zone adjustments)
k=* (encryption key)
a=* (zero or more session attribute lines)
Zero or more media descriptions
Time description
t= (time the session is active)
r=* (zero or more repeat times)
Media description, if present
m= (media name and transport address)
i=* (media title)
c=* (connection information - optional if included at session-level)
b=* (zero or more bandwidth information lines)
k=* (encryption key)
a=* (zero or more media attribute lines)
An example SDP description is:
v=0
o=jdoe 2890844526 2890842807 IN IP4 10.47.16.5
s=SDP Seminar
i=A Seminar on the session description protocol
u=http://www.example.com/seminars/sdp.pdf
e=j.doe@example.com (Jane Doe)
c=IN IP4 224.2.17.12/127
t=2873397496 2873404696
a=recvonly
m=audio 49170 RTP/AVP 0
m=video 51372 RTP/AVP 99
a=rtpmap:99 h263-1998/90000
Such layered encodings
are normally transmitted in multiple multicast groups to allow
multicast pruning. This technique keeps unwanted traffic from sites
only requiring certain levels of the hierarchy. For applications
requiring multiple multicast groups, we allow the following notation
to be used for the connection address:
<base multicast address>[/<ttl>]/<number of addresses>
If the number of addresses is not given it is assumed to be one.
Multicast addresses so assigned are contiguously allocated above
the base address, so that, for example:
c=IN IP4 224.2.1.1/127/3
would state that addresses 224.2.1.1, 224.2.1.2 and 224.2.1.3 are to
be used at a TTL of 127. This is semantically identical to including
multiple "c=" lines in a media description:
c=IN IP4 224.2.1.1/127
c=IN IP4 224.2.1.2/127
c=IN IP4 224.2.1.3/127
5.12. Encryption Keys
("k=")
k=<method>
k=<method>:<encryption key>
If transported over a secure and trusted channel, the session
description protocol MAY be used to convey encryption keys. A simple
mechanism for key exchange is provided by the key field ("k=")
although this is primarily supported for compatibility with older
implementations and its use is NOT RECOMMENDED. Work is in progress
to define new key exchange mechanisms for use with SDP [28] [29] and
it is expected that new applications will use those mechanisms.
A key field is permitted before the first media entry (in which case
it applies to all media in the session), or for each media entry as
required. The format of keys and their usage is outside the scope of
this document, and the key field provides no way to indicate the
encryption algorithm to be used, key type, or other information about
the key: this is assumed to be provided by the higher-level protocol
using SDP. If there is a need to convey this information within SDP,
the extensions mentioned previously SHOULD be used. Many security
protocols require two keys: one for confidentiality, another for
integrity. This specification does not support transfer of two keys.
The method indicates the mechanism to be used to obtain a usable key
by external means, or from the encoded encryption key given. The
following methods are defined:
k=clear:<encryption key>
The encryption key is included untransformed in this key field.
This method MUST NOT be used unless it can be guaranteed that
the SDP is conveyed over a secure channel. The encryption key
is interpreted as text according to the charset attribute, use
the "k=base64:" method to convey characters that are otherwise
prohibited in SDP.
k=base64:<encoded encryption key>
The encryption key is included in this key field but has been
base64 encoded [13] because it includes characters that are
prohibited in SDP. This method MUST NOT be used unless it can
be guaranteed that the SDP is conveyed over a secure channel.
k=uri:<URI to obtain key>
A Universal Resource Identifier is included in the key field.
The URI refers to the data containing the key, and may require
additional authentication before the key can be returned. When
a request is made to the given URI, the reply should specify
the encoding for the key. The URI is often a a SSL/
TLS-protected HTTP URI ("https:"), although this is not
required.
k=prompt
No key is included in this SDP description, but the session or
media stream referred to by this key field is encrypted. The
user should be prompted for the key when attempting to join the
session, and this user-supplied key should then be used to
decrypt the media streams. The use of user-specified keys is
NOT RECOMMENDED, since such keys tend to have weak security
properties.
The key field MUST NOT be used unless it can be guaranteed that the
SDP is conveyed over a secure and trusted channel. An example of
such a channel might be SDP embedded inside an S/MIME message or a
TLS-protected HTTP session. It is important to ensure that the
secure channel is with the party that is authorised to join the
session, not an intermediary: if a caching proxy server is used, it
is important to ensure that the proxy is either trusted or unable to
access the SDP.
Переведите один из LAN-портов в один WLAN с WAN-портом ...
Почитайте FAQ : здесь и тут ... Может быть только это поможет ...
З.Ы. Вместо "апов" лучше пользовались бы больше поиском ...
И что, у Вас в UL после Spacesoft'a совсем не осталось спецов ?