Configuring C-BSRs

About C-BSRs

You must configure C-BSRs when you configure dynamic RP election.

To prevent a legal BSR from being replaced by a malicious host, configure a BSR policy to filter BSR messages by using an ACL that specifies the legal BSR addresses.

Restrictions and guidelines

Configure C-BSRs on devices that reside in the backbone network.

Because the BSR and other devices exchange a large amount of information in the IPv6 PIM-SM domain, reserve a large bandwidth between the C-BSR and other devices.

The C-BSR configuration on the devices in the IPv6 PIM-SM domain must be the same.

Procedure

  1. Enter system view.

    system-view

  2. Enter IPv6 PIM view.

    ipv6 pim [ vpn-instance vpn-instance-name ]

  3. Configure a C-BSR.

    c-bsr ipv6-address [ scope scope-id ] [ hash-length hash-length | priority priority ] *

  4. (Optional.) Configure a BSR policy.

    bsr-policy ipv6-acl-number

    By default, no BSR policies are configured. All bootstrap messages are regarded as legal.