44-33
Cisco Catalyst Blade Switch 3130 and 3032 for Dell Software Configuration Guide
OL-12247-04
Chapter 44 Configuring IP Multicast Routing
Configuring IP Multicast Routing
Configuring Candidate RPs
You can configure one or more candidate RPs. Similar to BSRs, the RPs should also have good
connectivity to other devices and be in the backbone portion of the network. An RP can serve the entire
IP multicast address space or a portion of it. Candidate RPs send candidate RP advertisements to the
BSR. When deciding which devices should be RPs, consider these options:
•
In a network of Cisco routers and multilayer switches where only Auto-RP is used, any device can
be configured as an RP.
•
In a network that includes only Cisco PIMv2 routers and multilayer switches and with routers from
other vendors, any device can be used as an RP.
•
In a network of Cisco PIMv1 routers, Cisco PIMv2 routers, and routers from other vendors,
configure only Cisco PIMv2 routers and multilayer switches as RPs.
Beginning in privileged EXEC mode, follow these steps to configure your switch to advertise itself as a
PIMv2 candidate RP to the BSR. This procedure is optional.
To remove this device as a candidate RP, use the
no ip pim rp-candidate
interface-id
global
configuration command.
Command
Purpose
Step 1
configure terminal
Enter global configuration mode.
Step 2
ip pim rp-candidate
interface-id
[
group-list
access-list-number
]
Configure your switch to be a candidate RP.
•
For
interface-id,
specify the interface whose associated IP address
is advertised as a candidate RP address. Valid interfaces include
physical ports, port channels, and VLANs.
•
(Optional) For
group-list
access-list-number
, enter an IP standard
access list number from 1 to 99. If no group-list is specified, the
switch is a candidate RP for all groups.
Step 3
access-list
access-list-number
{
deny
|
permit
}
source
[
source-wildcard
]
Create a standard access list, repeating the command as many times as
necessary.
•
For
access-list-number
, enter the access list number specified in
Step 2.
•
The
deny
keyword denies access if the conditions are matched. The
permit
keyword permits access if the conditions are matched.
•
For
source
, enter the number of the network or host from which the
packet is being sent.
•
(Optional) For
source-wildcard
, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place ones in the bit
positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny
statement for everything.
Step 4
end
Return to privileged EXEC mode.
Step 5
show running-config
Verify your entries.
Step 6
copy running-config startup-config
(Optional) Save your entries in the configuration file.