Configuring C-BSRs
About C-BSRs
You must configure C-BSRs when you configure dynamic RP election.
To prevent a legal BSR from being replaced by a malicious host, configure a BSR policy to filter BSR messages by using an ACL that specifies the legal BSR addresses.
Restrictions and guidelines
Configure C-BSRs on devices that reside in the backbone network.
Because the BSRs and other devices exchange a large amount of information in the IPv6 BIDIR-PIM domain, reserve a large bandwidth between the C-BSRs and other devices.
The C-BSR configuration on all devices in the same IPv6 BIDIR-PIM domain must be the same.
Procedure
Enter system view.
system-view
Enter IPv6 PIM view.
ipv6 pim [ vpn-instance vpn-instance-name ]
Configure a C-BSR.
c-bsr ipv6-address [ scope scope-id ] [ hash-length hash-length | priority priority ] *
By default, no C-BSRs exist.
(Optional.) Configure a BSR policy.
bsr-policy ipv6-acl-number
By default, no BSR policy is configured. All bootstrap messages are regarded as legal.