Configure PIM-SSM
Configuring PIM-SSM is a two-step process.
1
Configure PIM-SSM.
2
Enable PIM-SSM for a range of addresses.
Related Configuration Tasks
•
Use PIM-SSM with IGMP Version 2 Hosts
Enabling PIM-SSM
To enable PIM-SSM, follow these steps.
1
Create an ACL that uses permit rules to specify what range of addresses should use SSM.
CONFIGURATION mode
ip access-list standard
name
2
Enter the
ip pim ssm-range
command and specify the ACL you created.
CONFIGURATION mode
ip pim ssm-range
acl-name
Enabling PIM-SSM
To display address ranges in the PIM-SSM range, use the
show ip pim ssm-range
command from EXEC Privilege mode.
R1(conf)#do show run pim
!
ip pim rp-address 10.11.12.2 group-address 224.0.0.0/4
ip pim ssm-range ssm
R1(conf)#do show run acl
!
ip access-list standard ssm
seq 5 permit host 239.0.0.2
R1(conf)#do show ip pim ssm-range
Group Address / MaskLen
239.0.0.2 / 32
Use PIM-SSM with IGMP Version 2 Hosts
PIM-SSM requires receivers that support IGMP version 3. You can employ PIM-SSM even when receivers support only IGMP version 1 or
version 2 by translating (*,G) entries to (S,G) entries.
Translate (*,G) entries to (S,G) entries using the
ip igmp ssm-map acl
command source from CONFIGURATION mode. In a standard
access list, specify the groups or the group ranges that you want to map to a source. Then, specify the multicast source.
•
When an SSM map is in place and Dell Networking OS cannot find any matching access lists for a group, it continues to create (*,G)
entries because there is an implicit deny for unspecified groups in the ACL.
•
When you remove the mapping configuration, Dell Networking OS removes the corresponding (S,G) states that it created and re-
establishes the original (*,G) states.
•
You may enter multiple
ssm-map
commands for different access lists. You may also enter multiple
ssm-map
commands for the same
access list, as long as they use different source addresses.
•
When an extended ACL is associated with this command, Dell Networking OS displays an error message. If you apply an extended ACL
before you create it, Dell Networking OS accepts the configuration, but when the ACL is later defined, Dell Networking OS ignores the
ACL and the stated mapping has no effect.
594
PIM Source-Specific Mode (PIM-SSM)
Summary of Contents for S3048-ON
Page 1: ...Dell Configuration Guide for the S3048 ON System 9 11 2 5 ...
Page 137: ...0 Gi 1 1 Gi 1 2 rx Flow N A N A 0 0 No N A N A yes Access Control Lists ACLs 137 ...
Page 142: ...Figure 10 BFD Three Way Handshake State Changes 142 Bidirectional Forwarding Detection BFD ...
Page 241: ...Dell Control Plane Policing CoPP 241 ...
Page 287: ... RPM Synchronization GARP VLAN Registration Protocol GVRP 287 ...
Page 428: ...Figure 53 Inspecting the LAG Configuration 428 Link Aggregation Control Protocol LACP ...
Page 477: ...Figure 73 Configuring Interfaces for MSDP Multicast Source Discovery Protocol MSDP 477 ...
Page 478: ...Figure 74 Configuring OSPF and BGP for MSDP 478 Multicast Source Discovery Protocol MSDP ...
Page 483: ...Figure 77 MSDP Default Peer Scenario 2 Multicast Source Discovery Protocol MSDP 483 ...
Page 484: ...Figure 78 MSDP Default Peer Scenario 3 484 Multicast Source Discovery Protocol MSDP ...
Page 745: ...Figure 104 Single and Double Tag TPID Match Service Provider Bridging 745 ...
Page 746: ...Figure 105 Single and Double Tag First byte TPID Match 746 Service Provider Bridging ...