EasyManuals Logo
Home>Cisco>Switch>IE-5000

Cisco IE-5000 User Manual

Cisco IE-5000
1066 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #702 background imageLoading...
Page #702 background image
698
Configuring IP Multicast Routing
Configuring IP Multicast Routing
DETAILED STEPS
To remove an RP address, use the no ip pim rp-address ip-address [access-list-number] [override] global
configuration command.
Command Purpose
1. configure terminal Enter global configuration mode.
2. ip pim rp-address ip-address
[access-list-number] [override]
Configure the address of a PIM RP.
By default, no PIM RP address is configured. You must configure
the IP address of RPs on all routers and multilayer switches
(including the RP). If there is no RP configured for a group, the
switch treats the group as dense, using the dense-mode PIM
techniques.
A PIM device can be an RP for more than one group. Only one
RP address can be used at a time within a PIM domain. The
access-list conditions specify for which groups the device is an
RP.
For ip-address, enter the unicast address of the RP in
dotted-decimal notation.
(Optional) For access-list-number, enter an IP standard
access list number from 1 to 99. If no access list is
configured, the RP is used for all groups.
(Optional) The override keyword means that if there is a
conflict between the RP configured with this command and
one learned by Auto-RP or BSR, the RP configured with this
command prevails.
3. access-list access-list-number
{deny | permit} source
[source-wildcard]
Create a standard access list, repeating the command as many
times as necessary.
For access-list-number, enter the access list number
specified in Step 2.
The deny keyword denies access if the conditions are
matched. The permit keyword permits access if the
conditions are matched.
For source, enter the multicast group address for which the
RP should be used.
(Optional) For source-wildcard, enter the wildcard bits in
dotted decimal notation to be applied to the source. Place
ones in the bit positions that you want to ignore.
Recall that the access list is always terminated by an implicit
deny statement for everything.
4. end Return to privileged EXEC mode.
5. show running-config Verify your entries.
6. copy running-config
startup-config
(Optional) Save your entries in the configuration file.

Table of Contents

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the Cisco IE-5000 and is the answer not in the manual?

Cisco IE-5000 Specifications

General IconGeneral
BrandCisco
ModelIE-5000
CategorySwitch
LanguageEnglish

Related product manuals