Configuring C-RPs

About C-RP configuration

To guard against C-RP spoofing, configure a C-RP policy to filter C-RP advertisement messages by using an ACL that specifies the packet source address range and IPv6 multicast groups.

Restrictions and guidelines

Configure C-RPs on devices that reside in the backbone network.

Because the RP and other devices exchange a large amount of information in the IPv6 BIDIR-PIM domain, reserve a large bandwidth between C-RPs and other devices.

You must configure the same C-RP policy on all C-BSRs in the IPv6 BIDIR-PIM domain.

The device might use the BSR RP hash algorithm described in RFC 4601 or in RFC 2362 to calculate the RP for a multicast group. To ensure consistent group-to-RP mappings on all PIM devices in the IPv6 BIDIR-PIM domain, specify the same BSR RP hash algorithm on the devices.

Procedure

  1. Enter system view.

    system-view

  2. Enter IPv6 PIM view.

    ipv6 pim [ vpn-instance vpn-instance-name ]

  3. Configure a C-RP to provide services for IPv6 BIDIR-PIM.

    c-rp ipv6-address [ advertisement-interval adv-interval | { group-policy ipv6-acl-number | scope scope-id } | holdtime hold-time | priority priority ] * bidir

  4. (Optional.) Configure the device to use the RP hash algorithm described in RFC 2362.

    bsr-rp-mapping rfc2362

    By default, the device uses the BSR RP hash algorithm described in RFC 4601.