346
C
HAPTER
18: M
ULTICAST
P
ROTOCOL
In BSR mechanism, a C-RP router unicasts C-RP messages to the BSR, which then
propagates the C-RP messages among the network by BSR message. To prevent C-RP
spoofing, you need to configure
crp-policy
on the BSR to limit legal C-RP range and
their service group range. Since each C-BSR has the chance to become BSR, you must
configure the same filtering policy on each C-BSR router.
Perform the following configuration in PIM view.
For detailed information of
crp-policy
, please refer to the command manual.
Clearing Multicast Route Entries from PIM Routing Table
Refer to “PIM-DM Overview” on page 333.
Clearing PIM Neighbors
Refer to “PIM-DM Overview” on page 333.
Displaying and
Debugging PIM-SM
After the above configuration, execute display command in any view to display the
running of PIM-SM configuration, and to verify the effect of the configuration.
Execute
debugging
command in user view for the debugging of PIM-SM.
PIM-SM Configuration
Example
Networking Requirements
In actual network, we assume that the switches can intercommunicate.
Suppose that Host A is the receiver of the multicast group at 225.0.0.1. Host B begins
transmitting data destined to 225.0.0.1. Switch_A receives the multicast data from
Host B via Switch_B.
Table 359
Limiting the range of legal C-RP
Operation
Command
Set the legal C-RP range limit
crp-policy acl-number
Restore to the default setting
undo crp-policy
Table 360
Displaying and debugging PIM-SM
Operation
Command
Display the BSR
information
display pim bsr-info
Display the RP information
display pim rp-info
[
group-address
]
Enable the PIM-SM
debugging
debugging pim sm { all | verbose | mrt | warning |
mbr { alert | fresh } | timer { assert | bsr |
crpadv | jp | jpdelay | mrt | probe | spt } | {
recv | send } { assert | bootstrap | crpadv | reg
| regstop | jp } }
Disable the PIM-SM
debugging
undo debugging pim sm { all | verbose | mrt |
warning | mbr { alert | fresh } | timer { assert |
bsr | crpadv | jp | jpdelay | mrt | probe | spt }
| { recv | send } { assert | bootstrap | crpadv |
reg | regstop | jp } }
Содержание 5500 SI - Switch - Stackable
Страница 24: ...24 ABOUT THIS GUIDE...
Страница 30: ...30 CHAPTER 1 GETTING STARTED Figure 3 Setting up a New Connection Figure 4 Configuring the Port for Connection...
Страница 50: ...50 CHAPTER 1 GETTING STARTED...
Страница 54: ...54 CHAPTER 2 ADDRESS MANAGEMENT CONFIGURATION...
Страница 78: ...78 CHAPTER 3 PORT OPERATION...
Страница 88: ...88 CHAPTER 4 XRN CONFIGURATION...
Страница 122: ...122 CHAPTER 8 VLAN VPN CONFIGURATION...
Страница 216: ...216 CHAPTER 15 SSH TERMINAL SERVICES...
Страница 268: ...268 CHAPTER 16 IP ROUTING PROTOCOL OPERATION...
Страница 308: ...308 CHAPTER 17 NETWORK PROTOCOL OPERATION...
Страница 349: ...349...
Страница 350: ...350 CHAPTER 18 MULTICAST PROTOCOL...
Страница 522: ...522 CHAPTER 22 FILE SYSTEM MANAGEMENT...
Страница 584: ...584 CHAPTER 30 PASSWORD CONTROL CONFIGURATION OPERATIONS...
Страница 600: ...600 CHAPTER 31 MSDP CONFIGURATION...
Страница 614: ...614 CHAPTER 32 CLUSTERING...
Страница 670: ...670 CHAPTER C AUTHENTICATING THE SWITCH 5500 WITH CISCO SECURE ACS...