mdt default
To configure a default multicast distribution tree (MDT) group for a Virtual Private Network (VPN) routing
and forwarding (VRF) instance, use the
mdt default
command in VRF configuration or VRF address family
configuration mode. To disable this function, use the
no
form of this command.
mdt defaultgroup-address
no mdt defaultgroup-address
Syntax Description
IP address of the default MDT group. This address
serves as an identifier for the community in that
provider edge (PE) devices configured with the same
group address become members of the group,
allowing them to receive packets sent by each other.
group-address
Command Default
The command is disabled.
Command Modes
VRF address family configuration (config-vrf-af) VRF configuration (config-vrf)
Command History
Modification
Release
This command was introduced.
Cisco IOS XE Denali 16.3.2
Usage Guidelines
The default MDT group must be the same group configured on all PE devices that belong to the same VPN.
If Source Specific Multicast (SSM) is used as the protocol for the default MDT, the source IP address will be
the address used to source the Border Gateway Protocol (BGP) sessions.
A tunnel interface is created as a result of this command. By default, the destination address of the tunnel
header is the
group-address
argument.
You can access the
mdt default
command by using the
ip vrf
global configuration command. You can also
access the
mdt default
command by using the
vrf definition
global configuration command followed by the
address-family ipv4
VRF configuration command.
Examples
In the following example, Protocol Independent Multicast (PIM) SSM is configured in the backbone. Therefore,
the default and data MDT groups are configured within the SSM range of IP addresses. Inside the VPN, PIM
sparse mode (PIM-SM) is configured and only Auto-RP announcements are accepted.
ip vrf vrf1
rd 1000:1
mdt default 236.1.1.1
mdt data 228.0.0.0 0.0.0.127 threshold 50
Command Reference, Cisco IOS XE Everest 16.5.1a (Catalyst 3650 Switches)
392
mdt default
Summary of Contents for Catalyst 3650 Series
Page 2: ... 2017 Cisco Systems Inc All rights reserved ...
Page 37: ...P A R T I Campus Fabric Campus Fabric page 13 ...
Page 38: ......
Page 51: ...P A R T II Interface and Hardware Components Interface and Hardware Commands page 27 ...
Page 52: ......
Page 165: ...P A R T III IP IP page 141 ...
Page 166: ......
Page 235: ...P A R T IV IP Multicast Routing IP Multicast Routing page 211 ...
Page 236: ......
Page 303: ...P A R T V IPv6 IPv6 page 279 ...
Page 304: ......
Page 307: ...P A R T VI Layer 2 3 Layer 2 3 page 283 ...
Page 308: ......
Page 399: ...P A R T VII Multiprotocol Label Switching MPLS MPLS page 375 Multicast VPN page 385 ...
Page 400: ......
Page 429: ...P A R T VIII Network Management Flexible NetFlow page 405 Network Management page 479 ...
Page 430: ......
Page 595: ...P A R T IX Programmability Programmability page 571 ...
Page 596: ......
Page 624: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 598 ping6 ...
Page 625: ...P A R T X QoS Auto QoS page 601 QoS page 641 ...
Page 626: ......
Page 666: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 640 show auto qos ...
Page 706: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 680 trust device ...
Page 707: ...P A R T XI Routing Bidirectional Forwarding Detection page 683 ...
Page 708: ......
Page 725: ...P A R T XII Security Security page 701 ...
Page 726: ......
Page 875: ...P A R T XIII Stack Manager and High Availability Stack Manager and High Availability page 851 ...
Page 876: ......
Page 912: ......
Page 1027: ...P A R T XV VLAN VLAN page 1003 ...
Page 1028: ......
Page 1100: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 1074 vtp primary ...
Page 1102: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches 1076 Notices ...
Page 1108: ...Command Reference Cisco IOS XE Everest 16 5 1a Catalyst 3650 Switches IN 6 Index ...