PIM-SM Overview
345
Perform the following configuration in PIM view.
If an entry of a source group is denied by the ACL, or the ACL does not define
operation to it, or there is no ACL defined, the RP will send RegisterStop messages to
the DR to prevent the register process of the multicast data stream.
Only the register messages matching the ACL
permit
clause can be accepted by the
RP. Specifying an undefined ACL will make the RP to deny all register messages.
Limiting the Range of Legal BSR
In the PIM SM network using BSR (bootstrap router) mechanism, every router can set
itself as C-BSR (candidate BSR) and take the authority to advertise RP information in
the network once it wins in the contention. To prevent malicious BSR proofing in the
network, the following two measures need to be taken:
■
Prevent the router from being spoofed by hosts though faking legal BSR messages
to modify RP mapping. BSR messages are of multicast type and their TTL is 1, so
this type of attacks often hit edge routers. Fortunately, BSRs are inside the
network, while assaulting hosts are outside, therefore neighbor and RPF checks
can be used to stop this type of attack.
■
If a router in the network is manipulated by an attacker, or an illegal router is
accessed into the network, the attacker may set itself as C-BSR and try to win the
contention and gain authority to advertise RP information among the network.
Since the router configured as C-BSR shall propagate BSR messages, which are
multicast messages sent hop by hop with TTL as 1, among the network, then the
network cannot be affected as long as the peer routers do not receive these BSR
messages. One way is to configure
bsr-policy
on each router to limit legal BSR
range, for example, only 1.1.1.1/32 and 1.1.1.2/32 can be BSR, thus the routers
cannot receive or forward BSR messages other than these two. Even legal BSRs
cannot contest with them.
Perform the following configuration in PIM View.
For detailed information of
bsr-policy
, please refer to the command manual.
Limiting the Range of Legal C-RP
In the PIM-SM network using BSR mechanism, every router can set itself as C-RP
(candidate rendezvous point) servicing particular groups. If elected, a C-RP becomes
the RP servicing the current group.
Table 357
Configuring RP to filter the register messages sent by DR
Operation
Command
Configure RP to filter the register messages sent by DR
register-policy acl_number
Cancel the configured filter of messages
undo register-policy
Table 358
Limiting the range of legal BSR
Operation
Command
Set the legal BSR range limit
bsr-policy acl_number
Restore to the default setting
undo bsr-policy
Summary of Contents for 5500 SI - Switch - Stackable
Page 24: ...24 ABOUT THIS GUIDE...
Page 50: ...50 CHAPTER 1 GETTING STARTED...
Page 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Page 78: ...78 CHAPTER 3 PORT OPERATION...
Page 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Page 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Page 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Page 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Page 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Page 349: ...349...
Page 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Page 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Page 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Page 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Page 614: ...614 CHAPTER 32 CLUSTERING...
Page 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...