170
To configure SA request messages:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter MSDP view.
msdp
[
vpn-instance
vpn-instance-name
]
N/A
3.
Enable the device to send SA
request messages to an
MSDP peer.
peer
peer-address
request-sa-enable
By default, after receiving a
new join message, a device
does not send an SA request
message to any MSDP peer.
Instead, it waits for the next SA
message from its MSDP peer.
4.
Configure an SA request
policy for an MSDP peer.
peer
peer-address
sa-request-policy
[
acl
ipv4-acl-number
]
By default, no SA request policy
exists, and all SA request from
an MSDP peer are permitted.
Configuring SA message policies
To control the propagation of multicast source information, you can configure the following policies:
•
SA creation policy
—Limits the multicast source information advertised in SA messages. This
policy enables the router to advertise (S, G) entries based on the used ACL that specifies the
multicast sources and groups.
•
SA incoming or outgoing policy
—Limits the receipt or forwarding of SA messages. This
policy enables the router to receive or forward SA messages based on the used ACL that
specifies the multicast sources and groups.
By default, multicast data packets are encapsulated in SA messages and forwarded to MSDP peers
only if the TTL values in the packets are larger than zero. You can set the lower TTL threshold for
multicast data packets encapsulated in SA messages that are sent to an MSDP peer. Then, only
multicast data packets whose TTL values are larger than or equal to the configured value are
encapsulated in SA messages. Only SA messages whose TTL values are larger than or equal to the
configured value are forwarded to the specified MSDP peer. This controls the multicast data packet
encapsulation and limits the propagation range of the SA messages.
To configure SA message policies:
Step
Command
Remarks
1.
Enter system view.
system-view
N/A
2.
Enter MSDP view.
msdp
[
vpn-instance
vpn-instance-name
]
N/A
3.
Configure an SA creation
policy.
import-source
[
acl
ipv4-acl-number
]
By default, no SA creation policies
exist.
4.
Configure an SA incoming or
outgoing policy.
peer
peer-address
sa-policy
{
export
|
import
} [
acl
ipv4-acl-number
]
By default, no SA incoming or
outgoing policy exists.
5.
Set the lower TTL threshold
for multicast data packets
encapsulated
in
SA
messages.
peer peer-address
minimum-ttl
ttl-value
The default setting is 0.