Configure Pim Vlan Trusted-Gateway - Extreme Networks ExtremeWare Command Reference Manual

Version 7.5
Hide thumbs Also See for ExtremeWare:
Table of Contents

Advertisement

IP Multicast Commands

configure pim vlan trusted-gateway

configure pim vlan [<vlan name> | all] trusted-gateway [<access profile> |
none]
Description
Configures a trusted neighbor policy.
Syntax Description
vlan name
all
access profile
none
Default
No access profile, so all gateways are trusted.
Usage Guidelines
Because PIM leverages the unicast routing capability that is already present in the switch, the access
policy capabilities are, by nature, different. When the PIM protocol is used for routing IP multicast
traffic, the switch can be configured to use an access profile to determine trusted PIM router neighbors
for the VLAN on the switch running PIM.
You can use this feature to select or exclude routers as peers. PIM control packets from non-trusted
sources are not processed.
Example
The following command configures a trusted neighbor policy on the VLAN backbone:
configure pim vlan backbone trusted-gateway nointernet
History
This command was first available in ExtremeWare 4.0.
This command was added to the Summit "e" series of switches in ExtremeWare 7.1e.
Platform Availability
This command is available on all platforms.
1974
Specifies a VLAN name.
Specifies all VLANs.
Specifies an access profile name.
Specifies no access profile, so all gateways are trusted.
ExtremeWare 7.5 Command Reference Guide

Advertisement

Table of Contents
loading

This manual is also suitable for:

Extremeware 7.5

Table of Contents