Configuring A Bsr - HP FlexNetwork 7500 Series Configuration Manual

Ip multicast
Hide thumbs Also See for FlexNetwork 7500 Series:
Table of Contents

Advertisement

Step
Enter system view.
1.
Enter PIM view.
2.
Configure a C-RP.
3.
(Optional.) Configure a C-RP
4.
policy.
Enabling Auto-RP listening
This feature enables the switch to receive Auto-RP announcement and discovery messages
destined for 224.0.1.39 and 224.0.1.40 respectively and to learn the RP for each multicast group.
To enable Auto-RP listening:
Step
Enter system view.
1.
Enter PIM view.
2.
Enable Auto-RP listening.
3.

Configuring a BSR

You must configure a BSR if C-RPs are configured to dynamically select the RP. You do not need to
configure a BSR when you have configured only a static RP but no C-RPs.
A PIM-SM domain can have only one BSR, but must have at least one C-BSR. Any router can be
configured as a C-BSR. Elected from C-BSRs, the BSR is responsible for collecting and advertising
RP information in the PIM-SM domain.
Configuring a C-BSR
The BSR election process is summarized as follows:
Initially, each C-BSR regards itself as the BSR of the PIM-SM domain and sends a BSM to
1.
other routers in the domain.
When a C-BSR receives the BSM from another C-BSR, it compares its own priority with the
2.
priority carried in the message. The C-BSR with a higher priority wins the BSR election. If a tie
exists in the priority, the C-BSR with a higher IP address wins. The loser uses the winner's BSR
address to replace its own BSR address and no longer regards itself as the BSR. The winner
retains its own BSR address and continues to regard itself as the BSR.
The elected BSR distributes the RP-set information collected from C-RPs to all routers in the
PIM-SM domain. All routers use the same hash algorithm to select an RP for a specific multicast
group.
A BSR policy enables a PIM-SM router to filter BSR messages by using an ACL that specifies the
legal BSR addresses. It is used to guard against the following BSR spoofing cases:
Some maliciously configured hosts can forge BSMs to fool routers and change RP mappings.
Such attacks often occur on border routers.
Command
system-view
pim [ vpn-instance
vpn-instance-name ]
c-rp ip-address
[ advertisement-interval adv-interval |
group-policy acl-number | holdtime
hold-time | priority priority ] *
crp-policy acl-number
Command
system-view
pim [ vpn-instance
vpn-instance-name ]
auto-rp enable
112
Remarks
N/A
N/A
By default, no C-RPs exist.
By default, no C-RP policy
exists.
Remarks
N/A
N/A
By default, Auto-RP listening is
disabled.

Advertisement

Table of Contents
loading

Table of Contents