Monitoring And Maintaining Ip Multicast Routing; Clearing Caches, Tables, And Databases - Cisco 3845 - Security Bundle Router Software Manual

Software configuration guide
Hide thumbs Also See for 3845 - Security Bundle Router:
Table of Contents

Advertisement

Monitoring and Maintaining IP Multicast Routing

Beginning in privileged EXEC mode, follow these steps to set up an administratively-scoped boundary.
This procedure is optional.
Command
Step 1
configure terminal
Step 2
access-list access-list-number {deny |
permit} source [source-wildcard]
Step 3
interface interface-id
Step 4
ip multicast boundary
access-list-number
Step 5
end
Step 6
show running-config
Step 7
copy running-config startup-config
To remove the boundary, use the no ip multicast boundary interface configuration command.
This example shows how to set up a boundary for all administratively-scoped addresses:
Switch(config)# access-list 1 deny 239.0.0.0 0.255.255.255
Switch(config)# access-list 1 permit 224.0.0.0 15.255.255.255
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# ip multicast boundary 1
Monitoring and Maintaining IP Multicast Routing

Clearing Caches, Tables, and Databases

You can remove all contents of a particular cache, table, or database. Clearing a cache, table, or database
might be necessary when the contents of the particular structure are or suspected to be invalid.
Cisco ME 3800X and 3600X Switch Software Configuration Guide
33-44
Clearing Caches, Tables, and Databases, page 33-44
Displaying System and Network Statistics, page 33-45
Monitoring IP Multicast Routing, page 33-46
Purpose
Enter global configuration mode.
Create a standard access list, repeating the command as many times as
necessary.
For access-list-number, the range is 1 to 99.
The deny keyword denies access if the conditions are matched. The
permit keyword permits access if the conditions are matched.
For source, enter the number of the network or host from which the
packet is being sent.
(Optional) For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place ones in the bit
positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny
statement for everything.
Specify the interface to be configured, and enter interface configuration
mode.
Configure the boundary, specifying the access list you created in Step 2.
Return to privileged EXEC mode.
Verify your entries.
(Optional) Save your entries in the configuration file.
Chapter 33
Configuring IP Multicast Routing
OL-23400-01

Hide quick links:

Advertisement

Table of Contents
loading

This manual is also suitable for:

Me 3800xMe 3600x

Table of Contents