ZXSEC US Multicast Technical Note
ZXSEC US Multicast Technical Note
Version 3.5
ZTE CORPORATION
ZTE Plaza, Keji Road South,
Hi-Tech Industrial Park,
Nanshan District, Shenzhen,
P. R. China
518057
Tel: (86) 755 26771900 800-9830-9830
Fax: (86) 755 26772236
URL: http://support.zte.com.cn
E-mail: [email protected]
LEGAL INFORMATION
The contents of this document are protected by copyright laws and international treaties. Any reproduction or
distribution of this document or any portion of this document, in any form by any means, without the prior written
consent of ZTE CORPORATION is prohibited. Additionally, the contents of this document are protected by
contractual confidentiality obligations.
All company, brand and product names are trade or service marks, or registered trade or service marks, of ZTE
CORPORATION or of their respective owners.
This document is provided “as is”, and all express, implied, or statutory warranties, representations or conditions
are disclaimed, including without limitation any implied warranty of merchantability, fitness for a particular purpose,
title or non-infringement. ZTE CORPORATION and its licensors shall not be liable for damages resulting from the
use of or reliance on the information contained herein.
ZTE CORPORATION or its licensors may have current or pending intellectual property rights or applications
covering the subject matter of this document. Except as expressly provided in any written license between ZTE
CORPORATION and its licensee, the user of this document shall not acquire any license to the subject matter
herein.
ZTE CORPORATION reserves the right to upgrade or make technical change to this product without further notice.
Users may visit ZTE technical support website http://ensupport.zte.com.cn to inquire related information.
Revision History
Document
ZXSEC US Multicast Technical Note
Name
Document Revision
Product Version V 3.5 R1.0
Number
Equipment
Serial No. Sjzl20084036
Installation Date
Presentation:
(Introductions, Procedures, Illustrations, Completeness, Level of Detail, Organization,
Appearance)
Good Fair Average Poor Bad N/A
Intelligibility:
(Language, Vocabulary, Readability & Clarity, Technical Accuracy, Content)
Good Fair Average Poor Bad N/A
Please check the suggestions which you feel can improve this documentation:
Improve the overview/introduction Make it more concise/brief
Improve the Contents Add more step-by-step procedures/tutorials
Improve the organization Add more troubleshooting information
Include more figures Make it less technical
Your Add more examples Add more/better quick reference aids
suggestions for Add more detail Improve the index
improvement of
this Other suggestions
documentation __________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
__________________________________________________________________________
# Please feel free to write any comments on an attached sheet.
If you wish to be contacted regarding your comments, please complete the following:
Name Company
Postcode Address
Telephone E-mail
This page is intentionally blank.
Contents
Chapter 1.......................................................................... 1
Chapter 2.......................................................................... 9
Chapter 3........................................................................ 27
Figures............................................................................61
Tables .............................................................................63
About This Manual
Chapter Summary
Describes configuring ZXSEC US units to
Chapter 1, ZXSEC US
forward multicast traffic and contains the
Multicast Forwarding
following sections
Chapter 2, Configuring Contains a copy of the description of the
ZXSEC US Multicast config router multicast CLI command
Chapter 3, Multicast Contains the following multicast routing
Routing Example configuration examples and information
Conventions
Typographical ZTE documents employ the following typographical conventions.
Conventions
TABLE 2 TYPOGRAPHICAL CONVENTIONS
Typeface Meaning
Italics References to other Manuals and documents.
“Quotes” Links on screens.
Bold Menus, menu options, function names, input
fields, radio button names, check boxes, drop-
down lists, dialog box names, window names.
CAPS Keys on the keyboard and buttons on screens
and company name.
Constant width Text that you type, program code, files and
directory names, and function names.
[] Optional parameters.
{} Mandatory parameters.
| Select one of the parameters that are delimited
by it.
Note: Provides additional information about a
certain topic.
ZXSEC US Multicast
Forwarding
Overview
Multicasting (also called IP multicasting) consists of using a
single multicast source to send data to many receivers.
Multicasting can be used to send data to many receivers
simultaneously while conserving bandwidth and reducing
network traffic. Multicasting can be used for one-way delivery of
media streams to multiple receivers and for one-way data
transmission for news feeds, financial information, and so on.
Also RIPv2 uses multicasting to share routing table information.
A multicast network typically consists of one or more multicast
sources and one our more multicast receivers. Multicast sources
send multicast packets and multicast receivers receive multicast
packets.
Usually there are various network components in between the
sources and the receivers. These network components may just
forward multicast packets or they may route multicast packets.
Network components that route multicast packets are multicast
routers.
Using a multicast router means that the source only needs to
transmit a single stream of data to the multicast router. The
multicast router routes the data to the receivers. The receivers
can be single receivers or can be part off a multicast group. The
multicast router makes decisions about how to route the packets
to receivers and multicast groups. Typically the multicast router
makes routing decisions based on the source and destination
addresses of the multicast packets. The multicast router can also
apply network address translation (NAT) to multicast packets.
This chapter describes configuring ZXSEC US units to forward
multicast traffic and contains the following sections:
Multicast IP addresses
Multicast IP Addresses
Multicast uses the Class D address space. The 224.0.0.0 to
239.255.255.255 IP address range is reserved for multicast
groups. The multicast address range applies to multicast groups,
not to the originators of multicast packets. Table 4 lists reserved
multicast address ranges and describes what they are reserved
for:
Reserved
Use Use
Address Range
In this range,
packets are not
forwarded by the
Used for network router but remain on
protocols on local the local network.
224.0.0.0 to
networks. For more They have a Time to
224.0.0.255
information, see RFC Live (TTL) of 1.
1700 These addresses are
used for
communicating
routing information.
Global addresses used Some of these
for multicasting data addresses are
224.0.1.0 to between organizations reserved, for
238.255.255.255 and across the Internet. example, 224.0.1.1
For more information, is used for Network
see RFC 1700 Time Protocol (NTP).
Routers are
Limited scope addresses
configured with filters
used for local groups and
239.0.0.0 to to prevent multicasts
organizations. For more
239.255.255.255 to these addresses
information, see RFC
from leaving the local
2365.
system
Note:
RIPv1 uses broadcasting to share routing table information. To
allow RIPv1 packets through a ZXSEC US unit you can add
standard firewall policies. Firewall policies to accept RIPv1
packets can use the ANY predefined firewall service or the RIP
predefined firewall service.
F I G U R E 1 E X A MP L E G A T EW A Y- T O - G AT E W AY C O N F I G U RA T I O N
Configuring ZXSEC US
Multicast Forwarding
You configure ZXSEC US multicast forwarding from the
Command Line Interface (CLI). Two steps are required:
Adding multicast firewall policies
Enabling multicast forwarding
This second step is only required if your ZXSEC US unit is
operating in NAT mode. If your ZXSEC US unit is operating in
Transparent mode, adding a multicast policy enables multicast
forwarding.
Note:
Keywords and
Description Default
variables
The unique ID number
id_integer No default
of this multicast policy
action <accept |
Enter the policy action accept
deny>
Translate externally
received multicast
destination addresses
dnat <address> to addresses that 0.0.0.0
conform to your
organization's internal
addressing policy
Enter the destination
dstaddr IP address and
netmask to match 0.0.0.0
<address_ipv4mask> against multicast NAT
packets.
Enter the destination
interface name to
dstintf <name_str> No default
match against
multicast NAT packets.
Enter the IP address to
substitute for the
nat <address_ipv4> 0.0.0.0
original source IP
address.
Enter the source IP
Srcaddr address and netmask 0.0.0.0
<address_ipv4mask> to match against 0.0.0.0
multicast NAT packets.
Enter the source
interface name to
srcintf <name_str> No default
match against
multicast NAT packets.
Limit the number of
protocols (services)
protocol <integer> No default
sent out via multicast
using the ZXSEC US.
The beginning of the
start-port <integer> port range used for No default
multicast.
The end of the port
end-port <integer> range used for No default
multicast.
Example
Note:
Enabling multicast forwarding is only required if your ZXSEC US
unit is operating in NAT mode. If your ZXSEC US unit is
operating in Transparent mode, adding a multicast policy
enables multicast forwarding.
Enter the following CLI command to enable multicast forwarding:
config system settings
set multicast-forward enable
end
If multicast forwarding is disabled and the ZXSEC US unit drops
packets that have multicast source or destination addresses.
You can also use the multicast-ttl-notchange keyword of the
system settings command so that the ZXSEC US unit does not
increase the TTL value for forwarded multicast packets. You
should use this option only if packets are expiring before
reaching the multicast router.
config system settings
set multicast-ttl-notchange enable
end
Configuring ZXSEC US
Multicast
Overview
This chapter contains a copy of the description of the config
router multicast CLI command.
You use the config router multicast command to configure the
ZXSEC US unit to act as a Protocol Independent Multicast (PIM)
version 2 router.
The ZXSEC US web-based manager you can go to Router >
Dynamic > Multicast to configure basic PIM options. From the
web-based manager you can configure sparse mode or dense
mode operation on any ZXSEC US interface. For information
about the web-based manager PIM options, see the web-based
manager online help or the ZXSEC US Administration Guide.
Note:
To support PIM communications, the sending/receiving
applications and all connecting PIM routers in between must be
enabled with PIM version 2. PIM can use static routes, RIP, OSPF,
or BGP to forward multicast packets to their destinations. To
Sparse Mode
Initially, all candidate BSRs in a PIM domain exchange bootstrap
messages to select one BSR to which each RP sends the
multicast address or addresses of the multicast group(s) that it
can service.
The selected BSR chooses one RP per multicast group and
makes this information available to all of the PIM routers in the
domain through bootstrap messages. PIM routers use the
information to build packet distribution trees, which map each
multicast group to a specific RP. Packet distribution trees may
also contain information about the sources and receivers
associated with particular multicast groups.
Note:
When a ZXSEC US interface is configured as a multicast
interface, sparse mode is enabled on it by default to ensure that
distribution trees are not built unless at least one downstream
receiver requests multicast traffic from a specific source. If the
sources of multicast traffic and their receivers are close to each
other and the PIM domain contains a dense population of active
receivers, you may choose to enable dense mode throughout the
PIM domain instead.
An RP represents the root of a non-source-specific distribution
tree to a multicast group. By joining and pruning the information
contained in distribution trees, a single stream of multicast
packets (for example, a video feed) originating from the source
can be forwarded to a certain RP to reach a multicast destination.
Each PIM router maintains a Multicast Routing Information Base
(MRIB) that determines to which neighboring PIM router join and
prune messages are sent. An MRIB contains reverse-path
information that reveals the path of a multicast packet from its
source to the PIM router that maintains the MRIB.
Dense Mode
The packet organization used in sparse mode is also used in
dense mode. When a multicast source begins to send IP traffic
and dense mode is enabled, the closest PIM router registers the
IP traffic from the multicast source (S) and forwards multicast
packets to the multicast group address (G). All PIM routers
initially broadcast the multicast packets throughout the PIM
domain to ensure that all receivers that have requested traffic
for multicast group address G can access the information if
needed.
To forward multicast packets to specific destinations afterward,
the PIM routers build distribution trees based on the information
in multicast packets. Upstream PIM routers depend on
prune/graft messages from downstream PIM routers to
determine if receivers are actually present on directly connected
network segments. The PIM routers exchange state refresh
messages to update their distribution trees. ZXSEC US units
store this state information in a Tree Information Base (TIB),
which is used to build a multicast forwarding table. The
information in the multicast forwarding table determines
whether packets are forwarded downstream. The forwarding
table is updated whenever the TIB is modified.
PIM routers receive data streams every few minutes and update
their forwarding tables using the source (S) and multicast group
(G) information in the data stream. Superfluous multicast traffic
is stopped by PIM routers that do not have downstream
receivers—PIM routers that do not manage multicast groups
send prune messages to the upstream PIM routers. When a
receiver requests traffic for multicast address G, the closest PIM
Note:
The end-user multicast client-server applications must be
installed and configured to initiate Internet connections and
handle broadband content such as audio/video information.
Client applications send multicast data by registering IP traffic
with a PIM-enabled router. An end-user could type in a class D
multicast group address, an alias for the multicast group address,
or a call-conference number to initiate the session. Rather than
sending multiple copies of generated IP traffic to more than one
specific IP destination address, PIM-enabled routers encapsulate
the data and use the one multicast group address to forward
multicast packets to multiple destinations. Because one
destination address is used, a single stream of data can be sent.
Client applications receive multicast data by requesting that the
traffic destined for a certain multicast group address be
delivered to them-end-users may use phone books, a menu of
ongoing or future sessions, or some other method through a
user interface to select the address of interest.
A class D address in the 224.0.0.0 to 239.255.255.255 range
may be used as a multicast group address, subject to the rules
assigned by the Internet Assigned Numbers Authority (IANA). All
class D addresses must be assigned in advance. Because there
is no way to determine in advance if a certain multicast group
address is in use, collisions may occur (to resolve this problem,
end-users may switch to a different multicast address).
To configure a PIM domain
1. If you will be using sparse mode, determine appropriate
paths for multicast packets.
2. Make a note of the interfaces that will be PIM-enabled. These
interfaces may run a unicast routing protocol.
3. If you will be using sparse mode and want multicast packets
to be handled by specific (static) RPs, record the IP
addresses of the PIM-enabled interfaces on those RPs.
4. Enable PIM version 2 on all participating routers between the
source and receivers. On ZXSEC US units, use the config
router multicast command to set global operating
parameters.
5. Configure the PIM routers that have good connections
throughout the PIM domain to be candidate BSRs.
6. If sparse mode is enabled, configure one or more of the PIM
routers to be candidate RPs.
Note:
All keywords are optional.
Config Interface
Use this subcommand to change interface-related PIM settings,
including the mode of operation (sparse or dense). Global
settings do not override interface-specific settings.
Note:
All keywords are optional.
Config Pim-sm-global
These global settings apply only to sparse mode PIM-enabled
interfaces. Global PIM settings do not override interface-specific
PIM settings.
If sparse mode is enabled, you can configure a DR to send
multicast packets to a particular RP by specifying the IP address
of the RP through the config rp-address subcommand. The IP
address must be directly accessible to the DR. If multicast
packets from more than one multicast group can pass through
the same RP, you can use an access list to specify the associated
multicast group addresses.
Note:
To send multicast packets to a particular RP using the config rp-
address subcommand, the ip-address keyword is required. All
other keywords are optional.
Example
config interface
edit dmz
set pim-mode sparse-mode
end
end
config pim-sm-global
set bsr-candidate enable
set bsr-priority 1
set bsr-interface dmz
set bsr-hash 24
end
This example shows how to enable RP candidacy on the port1
interface for the multicast group addresses given through an
access list named multicast_port1:
config router multicast
set multicast-routing enable
config interface
edit port1
set pim-mode sparse-mode
set rp-candidate enable
set rp-candidate-group multicast_port1
set rp-candidate-priority 15
end
end
Multicast Routing
Example
configuration that uses BSR to find the RP” for an example that
uses a BSR.
Configuration Steps
The following procedures show how to configure the multicast
configuration settings for the devices in the example
configuration.
Cisco_3750_1 router configuration
Cisco_3750_2 router configuration
To configure the ZXSEC US-1300 unit
Cisco_3750_3 router configuration
Cisco_3750_1 router configuration
version 12.2
!
hostname Cisco-3750-1
!
switch 1 provision ws-c3750-24ts
ip subnet-zero
ip routing
!
ip multicast-routing distributed
!
spanning-tree mode pvst
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
interface Loopback0
ip address 169.254.100.1 255.255.255.255
!
interface FastEthernet1/0/23
switchport access vlan 182
switchport mode access
!
interface FastEthernet1/0/24
switchport access vlan 172
switchport mode access
!
interface Vlan172
ip address 10.31.138.1 255.255.255.0
ip pim sparse-mode
ip igmp query-interval 125
ip mroute-cache distributed
!
interface Vlan182
ip address 169.254.82.250 255.255.255.0
ip pim sparse-mode
ip mroute-cache distributed
!
ip classless
ip route 0.0.0.0 0.0.0.0 169.254.82.1
ip http server
Example ZXSEC US PIM-SM configuration using a static RP
ip pim rp-address 169.254.100.1 Source-RP
!
!
ip access-list standard Source-RP
permit 233.254.200.0 0.0.0.255
Cisco_3750_2 router configuration
version 12.2
!
hostname Cisco-3750-2
!
switch 1 provision ws-c3750-24ts
ip subnet-zero
ip routing
!
ip multicast-routing distributed
!
spanning-tree mode pvst
no spanning-tree optimize bpdu transmission
spanning-tree extend system-id
!
interface FastEthernet1/0/23
switchport access vlan 138
switchport mode access
!
interface FastEthernet1/0/24
switchport access vlan 182
switchport mode access
!
interface Vlan138
ip address 10.31.138.250 255.255.255.0
ip pim sparse-mode
ip mroute-cache distributed
!
interface Vlan182
ip address 169.254.82.1 255.255.255.0
ip pim sparse-mode
ip mroute-cache distributed
!
ip classless
ip route 0.0.0.0 0.0.0.0 10.31.138.253
ip route 169.254.100.1 255.255.255.255 169.254.82.250
ip http server
ip pim rp-address 169.254.100.1 Source-RP
!
!
ip access-list standard Source-RP
permit 233.254.200.0 0.0.0.255
To configure the ZXSEC US-1300 unit
1. Configure the internal and external interfaces.
config system interface
edit "internal"
set vdom "root"
set ip 10.31.130.1 255.255.255.0
set allowaccess ping https
set type physical
next
edit "external"
set vdom "root"
set ip 10.31.138.253 255.255.255.0
set allowaccess ping
set type physical
end
end
2. Add a firewall address for the RP.
config firewall address
edit "RP"
set subnet 169.254.100.1/32
end
3. Add standard firewall policies to allow traffic to reach the RP.
config firewall policy
edit 1
set srcintf "internal"
set dstintf "external"
set srcaddr "all"
set dstaddr "RP"
set action accept
set schedule "always"
set service "ANY"
next
edit 2
set srcintf "external"
set dstintf "internal"
set srcaddr "RP"
set dstaddr "all"
set action accept
set schedule "always"
set service "ANY"
end
4. Add the multicast firewall policy.
config firewall multicast-policy
edit 1
set dstaddr 233.254.200.0 255.255.255.0
set dstintf "internal"
set srcaddr 169.254.82.0 255.255.255.0
set srcintf "external"
end
5. Add an access list.
config router access-list
edit "Source-RP"
config rule
edit 1
set prefix 233.254.200.0 255.255.255.0
set exact-match disable
next
end
6. Add some static routes.
config router static
edit 1
set device "internal"
set gateway 10.31.130.250
next
edit 2
set device "external"
set dst 169.254.0.0 255.255.0.0
set gateway 10.31.138.250
next
7. Configure multicast routing.
config router multicast
config interface
edit "internal"
set pim-mode sparse-mode
config igmp
set version 2
end
next
edit "external"
set pim-mode sparse-mode
config igmp
set version 2
end
next
end
set multicast-routing enable
config pim-sm-global
config rp-address
edit 1
set ip-address 169.254.100.1
ZXSEC US PIM-SM
Debugging Examples
Using the example topology shown in Figure 3 you can trace the
multicast streams and states within the three ZXSEC US units
(US-1, US-2, and US-3) using the debug commands described in
this section. The command output in this section is taken from
ZXSEC US unit running US OS v3.0 MR5 patch 1 when the
multicast stream is flowing correctly from source to receiver.
Group Last
Interface Uptime Expires
Address Reporter
239.255.2
port3 00:31:15 00:04:02 10.167.0.62
55.1
Neighbor Uptime/
Interface Ver DR Priority/Mode
Address Expires
10.132.0. 01:57:12/
port2 v2 1/
156 00:01:33
RP: 192.168.1.1
Uptime: 07:23:00
Entries State
(*,*,RP) This state may be reached by general joins for all
Entries groups served by a specified RP
State that maintains a source-specific tree for source
(*,G) Entries
S and group G.
(S,G) Entries State that maintains the RP tree for a given group.
State that maintains source-specific information
(S,G,rpt) about source s on the RP tree for G. For example, if
a source is being received on the source-specific
Entries tree, it will normally have been pruned off the RP
tree.
The FCR state entries are for tracking the sources in
the <*, G> when <S, G> is not available for any
FCR
reason, the stream would typically be flowing when
this state exists.
Joined:
Asserted:
FCR:
The RP will always be listed in a *,G entry, the RPF neighbor and
interface index will also be shown.
In this topology these are the same in all downstream PIM
routers. The state is active so the upstream state is joined.
In this case US-3 is the last hop router so the IGMP join is
received locally on port3. There is no PIM outgoing interface
listed for this entry as it is used for the upstream PIM join.
(10.166.0.11, 239.255.255.1)
RPF nbr: 10.132.0.156
RPF idx: port2
SPT bit: 1
Upstream State: JOINED
Local:
Joined:
Asserted:
Outgoing:
port3
This is the entry for the SPT, no RP IS listed. The S,G stream will
be forwarded out of the stated outgoing interface.
(10.166.0.11, 239.255.255.1, rpt)
RP: 192.168.1.1
RPF nbr: 10.132.0.156
RPF idx: port2
Upstream State: NOT PRUNED
Local:
Pruned:
Outgoing:
The above S,G,RPT state is created for all streams that have
both a S,G and a *,G entry on the router. This is not pruned in
this case because of the topology, the RP and source are
reachable over the same interface.
Although not seen in this scenario, assert states may be seen
when multiple PIM routers exist on the same LAN which can lead
to more than one upstream router having a valid forwarding
state. Assert messages are used to elect a single forwarder from
the upstream devices.
Local:
Joined:
external
Asserted:
Outgoing:
external
The S,G entry shows that we have received a join on the
external interface and the stream is being forwarded out of this
interface.
(10.166.0.11, 239.255.255.1, rpt)
RP: 192.168.1.1
RPF nbr: 0.0.0.0
RPF idx: None
Upstream State: PRUNED
Local:
Pruned:
Outgoing:
External
The S,G,RPT is different from US-3 because US-2 is the RP, it
has pruned back the SPT for the RP to the first hop router.
Example Multicast
Destination NAT (DNAT)
Configuration
The example topology shown in Figure 4 and described below
shows how to configure destination
NAT (DNAT) for two multicast streams. Both of these streams
originate from the same source IP address, which is 10.166.0.11.
The example configuration keeps the streams separate by
creating 2 multicast NAT policies.
In this example the ZXSEC US units in Figure 4 have the
following roles:
US-1 is the RP for dirty networks, 233.0.0.0/8.
US-2 performs all firewall and DNAT translations.
US-3 is the RP for the clean networks, 239.254.0.0/16.
next
end
2. Add PIM and add a unicast routing protocol to the loopback
interface as if it was a normal routed interface. Also add
static joins to the loopback interface for any groups to be
translated.
config router multicast
config interface
edit "loopback"
set pim-mode sparse-mode
config join-group
edit 233.2.2.1
next
edit 233.3.3.1
next
end
next
3. In this example, to add firewall multicast policies, different
source IP addresses are required so you must first add an IP
pool:
config firewall ippool
edit "Multicast_source"
set endip 192.168.20.20
set interface "port6"
set startip 192.168.20.10
next
end
4. Add the translation firewall policies.
Policy 2, which is the source NAT policy, uses the actual IP
address of port6. Policy 1, the DNAT policy, uses an address
from the IP pool.
config firewall multicast-policy
edit 1
set dnat 239.254.3.1
set dstaddr 233.3.3.1 255.255.255.255
set dstintf "loopback"
set nat 192.168.20.10
set srcaddr 10.166.0.11 255.255.255.255
set srcintf "port6"
next
edit 2
set dnat 239.254.1.1
set dstaddr 233.2.2.1 255.255.255.255
set dstintf "loopback"
set nat 192.168.20.1
set srcaddr 10.166.0.11 255.255.255.255
set srcintf "port6"
next
5. Add a firewall multicast policy to forward the stream from
the loopback interface to the physical outbound interface.
This example is an any/any policy that makes sure traffic
accepted by the other multicast policies can exit the ZXSEC
US unit.
config firewall multicast-policy
edit 3
set dstintf "port7"
set srcintf "loopback"
next
Configuration Steps
Example PIM configuration that uses BSR to find the RP
In this sample, ZXSEC US900_1 is the RP for the group
228.1.1.1, 237.1.1.1, 238.1.1.1, and
ZXSEC US900_4 is the RP for the other group which has a
priority of1. OSPF is used in this example to distribute routes
including the loopback interface. All firewalls have full mesh
firewall policies to allow any to any.
In the ZXSEC US900_1 configuration, the NAT policy
translates source address 236.1.1.1 to 237.1.1.1
In the ZXSEC US900_4, configuration, the NAT policy
translates source 236.1.1.1 to 238.1.1.1
Source 236.1.1.1 is injected into network as well.
The following procedures include the CLI commands for
configuring each of the ZXSEC US units in the example
configuration.
To configure ZXSEC US900_1
1. Configure multicast routing.
config router multicast
config interface
edit "port5"
set pim-mode sparse-mode
next
edit "port4"
set pim-mode sparse-mode
next
edit "lan"
edit "lan"
set pim-mode sparse-mode
next
end
set multicast-routing enable
config pim-sm-global
set bsr-candidate enable
set bsr-interface "lo0"
end
end
2. Add multicast firewall policies.
config firewall multicast-policy
edit 1
set dstintf "port5"
set srcintf "port6"
next
edit 2
set dstintf "port6"
set srcintf "port5"
next
edit 3
set dstintf "port6"
set srcintf "lan"
next
edit 4
set dstintf "lan"
set srcintf "port6"
next
edit 5
set dstintf "port5"
set srcintf "lan"
next
edit 6
set dstintf "lan"
set srcintf "port5"
next
end
To configure ZXSEC US900_4
next
edit 6
set srcintf "lan"
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ANY"
next
edit 7
set srcintf "port1"
set dstintf "port1"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ANY"
next
edit 8
set srcintf "port6"
set dstintf "lo0"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ANY"
next
edit 9
set srcintf "port1"
set dstintf "lo0"
set srcaddr "all"
set dstaddr "all"
set action accept
set schedule "always"
set service "ANY"
next
edit 10
Neighbor Uptime/ DR
Interface Ver
Address Expires Priority/Mode
02:22:01/
83.97.1.2 port6 v2 1 / DR
00:01:44
bytes=4416
pkt=138
wrong_if=0
num_ifs=2
index(ttl)=[7(1),6(1),]
grp=238.1.1.1
src=1.4.50.4
intf=10
flags=(0x10000000)[ ]
status=resolved
last_assert=834864
bytes=1765076
pkt=1717
wrong_if=0
num_ifs=1
index(ttl)=[7(1),]
Group
Interface Uptime Expires Last Reporter
Address
236.1.1.1 lan 00:45:48 00:03:21 10.4.1.1
236.1.1.1 lo0 02:19:31 00:03:23 1.4.50.4
Ver/ DR
Address Interface VIFindex Nbr Count
Mode Prior
10.4.1
10.4.1.2 lan 2 v2/S0 1
.2
83.97.
83.97.1.1 port6 0 v2/S1 1
1.2
1.4.50
1.4.50.4 lo0 3 v2/S0 1
.4
RP: 1.4.50.3
Info source: 1.4.50.3, via bootstrap, priority 255
Uptime: 02:20:07, expires: 00:02:24
Group(s): 228.1.1.1/32
RP: 1.4.50.1
Info source: 1.4.50.1, via bootstrap, priority 192
Uptime: 02:18:24, expires: 00:02:06
Group(s): 237.1.1.1/32
RP: 1.4.50.1
Info source: 1.4.50.1, via bootstrap, priority 192
Uptime: 02:18:24, expires: 00:02:06
Group(s): 238.1.1.1/32
RP: 1.4.50.1
Info source: 1.4.50.1, via bootstrap, priority 192
Uptime: 02:18:24, expires: 00:02:06
Get router info multicast pim sparse-mode bsr-info
PIMv2 Bootstrap information
This system is the Bootstrap Router (BSR)
BSR address: 1.4.50.4
Uptime: 02:23:08, BSR Priority: 1, Hash mask length: 10
Next bootstrap message in 00:00:18
Role: Candidate BSR
State: Elected BSR
Candidate RP: 1.4.50.4(lo0)
Advertisement interval 60 seconds
Next Cand_RP_advertisement in 00:00:54