Configuring An Sa Message Filtering Rule - 3Com MSR 50 Series Configuration Manual

3com msr 30-16: software guide
Hide thumbs Also See for MSR 50 Series:
Table of Contents

Advertisement

c
Configuring an SA
Message Filtering Rule
send SA request messages to the designated MSDP peers up receiving a Join
message of a new receiver.
Follow these steps to configure SA message transmission and filtering:
To do...
Enter system view
Enter public instance MSDP
view or VPN instance MSDP
view
Enable the device to send SA
request messages
Configure a filtering rule for
SA request messages
CAUTION: Before you can enable the device to send SA requests, be sure to
disable the SA message cache mechanism.
By configuring an SA message creation rule, you can enable the router to filter the
(S, G) entries to be advertised when creating an SA message, so that the
propagation of messages of multicast sources is controlled.
In addition to controlling SA message creation, you can also configure filtering
rules for forwarding and receiving SA messages, so as to control the propagation
of multicast source information in the SA messages.
By configuring a filtering rule for receiving or forwarding SA messages, you can
enable the router to filter the (S, G) forwarding entries to be advertised when
receiving or forwarding an SA message, so that the propagation of multicast
source information is controlled at SA message reception or forwarding.
An SA message with encapsulated multicast data can be forwarded to a
designated MSDP peer only if the TTL value in its IP header exceeds the
threshold. Therefore, you can control the forwarding of such an SA message by
configuring the TTL threshold of the encapsulated data packet.
Follow these steps to configure a filtering rule for receiving or forwarding SA
messages:
To do...
Enter system view
Enter public instance MSDP
view or VPN instance MSDP
view
Configure an SA message
creation rule
Configure a filtering rule for
receiving or forwarding SA
messages
Use the command...
system-view
msdp [ vpn-instance
vpn-instance-name ]
peer peer-address
request-sa-enable
peer peer-address
sa-request-policy [ acl
acl-number ]
Use the command...
system-view
msdp [ vpn-instance
vpn-instance-name ]
import-source [ acl
acl-number ]
peer peer-address sa-policy
{ import | export } [ acl
acl-number ]
Configuring SA Messages
Remarks
-
-
Optional
Disabled by default
Optional
SA request messages are not
filtered by default
Remarks
-
-
Required
No restrictions on (S, G)
entries by default
Required
No filtering rule by default
1143

Hide quick links:

Advertisement

Table of Contents

Troubleshooting

loading

Table of Contents