Configuring C-RPs
About C-RP configuration
To avoid C-RP spoofing, configure a C-RP policy to filter C-RP advertisement messages by using an ACL that specifies the packet source address range and multicast group addresses.
Restrictions and guidelines
Configure C-RPs on devices that reside in the backbone network.
Because the RP and other devices exchange a large amount of information in the BIDIR-PIM domain, reserve a large bandwidth between C-RPs and other devices.
You must configure the same C-RP policy on all C-BSRs in the IPv6 PIM-SM domain because every C-BSR might become the BSR.
The device might use the BSR RP hash algorithm described in RFC 4601 or in RFC 2362 to calculate the RP for a multicast group. To ensure consistent group-to-RP mappings on all PIM devices in the IPv6 PIM-SM domain, specify the same BSR RP hash algorithm on the devices.
Procedure
Enter system view.
system-view
Enter IPv6 PIM view.
ipv6 pim [ vpn-instance vpn-instance-name ]
Configure a C-RP.
c-rp ipv6-address [ advertisement-interval adv-interval | { group-policy ipv6-acl-number | scope scope-id } | holdtime hold-time | priority priority ] *
(Optional.) Configure a C-RP policy.
crp-policy ipv6-acl-number
By default, no C-RP policies are configured. All C-RP advertisement messages are regarded as legal.
(Optional.) Configure the device to use the BSR RP hash algorithm described in RFC 2362.
bsr-rp-mapping rfc2362
By default, the device uses the BSR RP hash algorithm described in RFC 4601.