Configuring A Bsr - HP A5500 SI Switch Series Configuration Manual

Hide thumbs Also See for A5500 SI Switch Series:
Table of Contents

Advertisement

and encapsulates its own IP address together with the RP-set information in its bootstrap messages. The
BSR then floods the bootstrap messages to all PIM routers in the network.
Each C-RP encapsulates a timeout value in its C-RP-Adv messages. Upon receiving a C_RP-Adv message,
the BSR obtains this timeout value and starts a C-RP timeout timer. If the BSR fails to hear a subsequent C-
RP-Adv message from the C-RP within the timeout interval, the BSR assumes the C-RP to have expired or
become unreachable.
The C-RP timers need to be configured on C-RP routers.
Follow these steps to configure C-RP timers globally:
To do...
Enter system view
Enter public network PIM view or
VPN instance PIM view
Configure the C-RP-Adv interval
Configure C-RP timeout time
NOTE:
For more information about the configuration of other timers in PIM-SM, see
common
timers."

Configuring a BSR

A PIM-SM domain can have only one BSR, but must have at least one C-BSR. You can configure any
router as a C-BSR. Elected from C-BSRs, the BSR is responsible for collecting and advertising RP
information in the PIM-SM domain.
Configuring a C-BSR
Configure C-BSRs on routers in the backbone network. When you are configuring a router as a C-BSR,
be sure to specify a PIM-SM-enabled interface on the router. The following summarizes the BSR election
process:
Initially, every C-BSR assumes itself to be the BSR of this PIM-SM domain and uses its interface IP
address as the BSR address to send bootstrap messages.
When a C-BSR receives the bootstrap message of another C-BSR, it first compares its own priority
with the other C-BSR's priority carried in the message. The C-BSR with a higher priority wins. If a tie
occurs in the priority, the C-BSR with a higher IP address wins. The loser uses the winner's BSR
address to replace its own BSR address and no longer assumes itself to be the BSR, and the winner
retains its own BSR address and continues to assume itself to be the BSR.
Configuring a legal range of BSR addresses enables filtering of bootstrap messages based on the
address range, thereby preventing a maliciously configured host from masquerading as a BSR. You must
make the same configuration on all routers in the PIM-SM domain. The typical BSR spoofing cases and
the corresponding preventive measures are as follows:
Use the command...
system-view
pim [ vpn-instance vpn-instance-
name ]
c-rp advertisement-interval interval
c-rp holdtime interval
135
Remarks
Optional
60 seconds by default.
Optional
150 seconds by default.
"Configuring PIM

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

A5500 ei switch series

Table of Contents