Configuring PIM common features
For the functions or parameters that can be configured in both PIM view and interface view described in
this section:
In PIM view, the configuration is effective on all interfaces. In interface view, the configuration is effective
on only the current interface.
If the same function or parameter is configured in both PIM view and interface view, the configuration in
interface view has preference over the configuration in PIM view, regardless of the configuration
sequence.
Configuration prerequisites
Before you configure PIM common features, complete the following tasks:
•
Configure any unicast routing protocol so that all devices in the domain are interoperable at the
network layer
Configure PIM-DM, or PIM-SM, or PIM-SSM
•
Determine the ACL rule for filtering multicast data
•
Determine the ACL rule defining a legal source address range for hello messages
•
Determine the priority for DR election (global value/interface level value)
•
Determine the PIM neighbor timeout time (global value/interface value)
•
Determine the prune message delay (global value/interface level value)
•
Determine the prune override interval (global value/interface level value)
•
Determine the prune delay
•
Determine the hello interval (global value/interface level value)
•
Determine the maximum delay between hello message (interface level value)
•
Determine the assert timeout time (global value/interface value)
•
Determine the join/prune interval (global value/interface level value)
•
•
Determine the join/prune timeout (global value/interface value)
•
Determine the multicast source lifetime
•
Determine the maximum size of join/prune messages
•
Determine the maximum number of (S, G) entries in a join/prune message
Configuring a multicast data filter
No matter in a PIM-DM domain or a PIM-SM domain, routers can check passing-by multicast data based
on the configured filtering rules and determine whether to continue forwarding the multicast data. In other
words, PIM routers can act as multicast data filters. These filters can help implement traffic control on one
hand, and control the information available to receivers downstream to enhance data security on the
other hand.
To do...
1.
Enter system view.
2.
Enter public network PIM view
or VPN instance PIM view.
Use the command...
system-view
pim [ vpn-instance
vpn-instance-name ]
130
Remarks
—
—