EasyManuals Logo
Home>HP>Network Router>FlexNetwork MSR 954

HP FlexNetwork MSR 954 User Manual

HP FlexNetwork MSR 954
400 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #124 background imageLoading...
Page #124 background image
115
Configuring a BSR
You must configure a BSR if C-RPs are configured to dynamically select the RP. You do not need to
configure a BSR when you have configured only a static RP but no C-RPs.
A BIDIR-PIM domain can have only one BSR, but must have a minimum of one C-BSR. Any router
can be configured as a C-BSR. Elected from C-BSRs, the BSR is responsible for collecting and
advertising RP information in the BIDIR-PIM domain.
Configuring a C-BSR
IMPORTANT:
Because the BSR and other devices exchange a large amount of information in the BIDIR-PIM
domain, reserve a large bandwidth between the C-BSR and other devices.
The BSR election process is summarized as follows:
1. Initially, each C-BSR regards itself as the BSR of the BIDIR-PIM domain and sends BSMs to
other routers in the domain.
2. When a C-BSR receives the BSM from another C-BSR, it compares its own priority with the
priority carried in the message. The C-BSR with a higher priority wins the BSR election. If a tie
exists in the priority, the C-BSR with a higher IP address wins. The loser uses the winner's BSR
address to replace its own BSR address and no longer regards itself as the BSR. The winner
retains its own BSR address and continues to regard itself as the BSR.
The elected BSR distributes the RP-set information collected from C-RPs to all routers in the
BIDIR-PIM domain. All routers use the same hash algorithm to select an RP for a specific multicast
group.
A BSR policy enables the router to filter BSR messages by using an ACL that specifies the legal BSR
addresses. It is used to guard against the following BSR spoofing cases:
•
Some maliciously configured hosts can forge BSMs to fool routers and change RP mappings.
Such attacks often occur on border routers.
•
When an attacker controls a router on the network, the attacker can configure the router as a
C-BSR to win the BSR election. Through this router, the attacker controls the advertising of RP
information.
When you configure a C-BSR, follow these restrictions and guidelines:
•
C-BSRs should be configured on routers on the backbone network.
•
You must configure the same BSR policy on all routers in the BIDIR-PIM domain. The BSR
policy discards illegal BSR messages, but it partially guards against BSR attacks on the
network. If an attacker controls a legal BSR, the problem still exists.
•
For C-BSRs interconnected through a GRE tunnel, configure static multicast routes to make
sure the next hop to a C-BSR is a tunnel interface. For more information about static multicast
routes, see "Configuring multicast routing and forwarding."
To configure a C-BSR:
Step
Command
Remarks
1. Enter system view.
system-view
N/A
2. Enter PIM view.
pim
[
vpn-instance
vpn-instance-name ]
N/A
3. Configure a C-BSR.
c-bsr
ip-address [
scope
group-address { mask-length |
mask } ] [
hash-length
hash-length |
priority
priority ] *
By default, no C-BSRs exist.

Table of Contents

Other manuals for HP FlexNetwork MSR 954

Questions and Answers:

Question and Answer IconNeed help?

Do you have a question about the HP FlexNetwork MSR 954 and is the answer not in the manual?

HP FlexNetwork MSR 954 Specifications

General IconGeneral
BrandHP
ModelFlexNetwork MSR 954
CategoryNetwork Router
LanguageEnglish

Related product manuals