
Configuring PIM-SM
SecureStack C3 Configuration Guide
20-49
Configuring PIM-SM
Design Considerations
Enterasys Networks
recommends
that
administrators
consider
the
following
recommendations
before
configuring
the
SecureStack
C3
for
a
PIM
‐
SM
environment.
•
A
SecureStack
C3
cannot
be
configured
as
a
Candidate
‐
RP
or
a
Candidate
‐
BSR.
•
A
SecureStack
C3
should
not
be
the
first
hop
router
for
a
multicast
stream.
In
other
words,
the
multicast
stream
should
not
originate
on
a
SecureStack
C3.
•
A
SecureStack
C3
should
not
be
positioned
in
the
core
of
a
PIM
‐
SM
topology,
and
should
only
be
positioned
at
the
edge
in
a
PIM
‐
SM
topology.
In
other
words,
the
SecureStack
C3
should
only
be
used
to
deliver
multicast
streams
to
end
clients.
Purpose
To
enable
and
configure
Protocol
Independent
Multicast
in
Sparse
Mode
(PIM
‐
SM).
This
protocol
provides
the
means
of
dynamically
learning
how
to
forward
multicast
traffic
in
an
environment
where
group
members
are
sparsely
located
throughout
the
network
and
bandwidth
is
limited.
In
situations
where
members
are
densely
located
and
bandwidth
is
plentiful,
DVMRP
would
suffice
(see
“
Configuring
DVMRP
”
on
page
20
‐
33.)
PIM
‐
SM
determines
the
network
topology
using
the
underlying
unicast
routing
protocol
to
build
a
Multicast
Routing
Information
Base
(MRIB).
Commands
* Advanced License Required *
PIM-SM is an advanced routing feature that must be enabled with a license key. If you have purchased an
advanced license key, and have enabled routing on the device, you must activate your license as described in
the chapter entitled “Activating Licensed Features” in order
to enable the PIM-SM command set. If you wish
to purchase an advanced routing license, contact Enterasys Networks Sales.
Note:
An Enterasys Networks Feature Guide document containing an in-depth discussion of
multicast configuration is located on the Enterasys Networks web site:
http://www.enterasys.com/support/manuals/
Note:
IGMP must be enabled on all VLANs running PIM-SM, and must also be globally enabled
on the SecureStack C3. For details on enabling IGMP, refer to
Chapter 13
.
For information about...
Refer to page...
Global configuration commands
ip pimsm
20-50
ip pimsm staticrp
20-50
Interface configuration commands
ip pimsm enable
20-51
ip pimsm query-interval
20-52
Summary of Contents for SECURESTACK C3
Page 2: ......
Page 34: ...xxxii...
Page 40: ...Getting Help xxxviii About This Guide...
Page 126: ...clear license 4 6 Activating Licensed Features...
Page 132: ...set port inlinepower 5 6 Configuring System Power and PoE...
Page 228: ...clear port protected name 7 60 Port Configuration...
Page 270: ...clear snmp interface 8 42 SNMP Configuration...
Page 396: ...clear port txq 12 10 Port Priority Configuration...
Page 414: ...ip igmp robustness 13 18 IGMP Configuration...
Page 542: ...clear arpinspection statistics 17 32 DHCP Snooping and Dynamic ARP Inspection...
Page 546: ...Enabling Router Configuration Modes 18 4 Preparing for Router Mode...
Page 640: ...traceroute ipv6 21 10 IPv6 Management...
Page 698: ...show ipv6 dhcp binding 24 20 DHCPv6 Configuration...
Page 746: ...show ipv6 ospf virtual link 25 48 OSPFv3 Configuration...
Page 834: ...ip access group 26 88 Authentication and Authorization Configuration...
Page 848: ...TACACS Configuration clear tacacs interface 27 14...
Page 866: ...sFlow Configuration show sflow agent 28 18...
Page 872: ...Index 4...