Configuring C-RPs

About C-RP configuration

To avoid C-RP spoofing, configure a C-RP policy to filter C-RP advertisement messages by using an ACL that specifies the packet source address range and multicast group addresses.

Restrictions and guidelines

Configure C-RPs on devices that reside in the backbone network.

Because the RP and other devices exchange a large amount of information in the BIDIR-PIM domain, reserve a large bandwidth between C-RPs and other devices.

You must configure the same C-RP policy on all C-BSRs in the IPv6 PIM-SM domain because every C-BSR might become the BSR.

The device might use the BSR RP hash algorithm described in RFC 4601 or in RFC 2362 to calculate the RP for a multicast group. To ensure consistent group-to-RP mappings on all PIM devices in the IPv6 PIM-SM domain, specify the same BSR RP hash algorithm on the devices.

Procedure

  1. Enter system view.

    system-view

  2. Enter IPv6 PIM view.

    ipv6 pim [ vpn-instance vpn-instance-name ]

  3. Configure a C-RP.

    c-rp ipv6-address [ advertisement-interval adv-interval | { group-policy ipv6-acl-number | scope scope-id } | holdtime hold-time | priority priority ] *

  4. (Optional.) Configure a C-RP policy.

    crp-policy ipv6-acl-number

    By default, no C-RP policies are configured. All C-RP advertisement messages are regarded as legal.

  5. (Optional.) Configure the device to use the BSR RP hash algorithm described in RFC 2362.

    bsr-rp-mapping rfc2362

    By default, the device uses the BSR RP hash algorithm described in RFC 4601.