705
Configuring IP Multicast Routing
Configuring IP Multicast Routing
DETAILED STEPS
To remove the PIM border, use the
no ip pim bsr-border
interface configuration command.
Figure 90
Constraining PIMv2 BSR Messages
EXAMPLE
The following example configures the interface to be the PIM domain border:
interface ethernet 1
ip pim bsr-border
Defining the IP Multicast Boundary
You define a multicast boundary to prevent Auto-RP messages from entering the PIM domain. You create an access list
to deny packets destined for 224.0.1.39 and 224.0.1.40, which carry Auto-RP information. This procedure is optional.
BEFORE YOU BEGIN
Review the
Information About PIM, page 677
and the
Guidelines and Limitations, page 686
Command
Purpose
1.
configure terminal
Enter global configuration mode.
2.
interface
interface-id
Specify the interface to be configured, and enter interface
configuration mode.
3.
no shutdown
Enable the port, if necessary. By default, UNIs and ENIs are
disabled, and NNIs are enabled.
4.
ip pim bsr-border
Define a PIM bootstrap message boundary for the PIM domain.
Enter this command on each interface that connects to other
bordering PIM domains. This command instructs the switch to
neither send or receive PIMv2 BSR messages on this interface
as shown in
.
5.
end
Return to privileged EXEC mode.
6.
show running-config
Verify your entries.
7.
copy running-config
startup-config
(Optional) Save your entries in the configuration file.
101243
PIMv2 sparse-mode
network
BSR
BSR
messages
Neighboring
PIMv2 domain
Neighboring
PIMv2 domain
Configure the
ip pim b
s
r-border
command on
this interface.
Configure the
ip pim b
s
r-border
command on
this interface.
BSR
messages
Layer 3
switch
Layer 3
switch
Summary of Contents for IE 4000
Page 12: ...8 Configuration Overview Default Settings After Initial Switch Configuration ...
Page 52: ...48 Configuring Interfaces Monitoring and Maintaining the Interfaces ...
Page 108: ...104 Configuring Switch Clusters Additional References ...
Page 128: ...124 Performing Switch Administration Additional References ...
Page 130: ...126 Configuring PTP ...
Page 140: ...136 Configuring CIP Additional References ...
Page 146: ...142 Configuring SDM Templates Configuration Examples for Configuring SDM Templates ...
Page 192: ...188 Configuring Switch Based Authentication Additional References ...
Page 244: ...240 Configuring IEEE 802 1x Port Based Authentication Additional References ...
Page 298: ...294 Configuring VLANs Additional References ...
Page 336: ...332 Configuring STP Additional References ...
Page 408: ...404 Configuring DHCP Additional References ...
Page 450: ...446 Configuring IGMP Snooping and MVR Additional References ...
Page 490: ...486 Configuring SPAN and RSPAN Additional References ...
Page 502: ...498 Configuring Layer 2 NAT ...
Page 770: ...766 Configuring IPv6 MLD Snooping Related Documents ...
Page 930: ...926 Configuring IP Unicast Routing Related Documents ...
Page 976: ...972 Configuring Cisco IOS IP SLAs Operations Additional References ...
Page 978: ...974 Dying Gasp ...
Page 990: ...986 Configuring Enhanced Object Tracking Monitoring Enhanced Object Tracking ...
Page 994: ...990 Configuring MODBUS TCP Displaying MODBUS TCP Information ...
Page 996: ...992 Ethernet CFM ...
Page 1066: ...1062 Using an SD Card SD Card Alarms ...