The interface can be a VLANIF interface, or an Loopback interface.
Step 3 Run:
pim bsr-boundary
The BSR boundary is configured. Bootstrap messages cannot pass the BSR boundary.
By default, all the PIM-SM switchs on the network can receive Bootstrap messages.
----End
6.5.5 (Optional) Configuring the BSR Address Range
ACL-based policies can be set on all devices to filter C-BSR addresses. The devices then receive
only the Bootstrap messages with the source addresses being in the valid C-BSR address range.
Thus, BSR spoofing is avoided.
Context
Do as follows on all switches in the PIM-SM domain:
NOTE
By default, all BSR packets are received without the BSR source address check.
Procedure
Step 1 Run:
system-view 
The system view is displayed.
Step 2 Run:
pim [ vpn-instance vpn-instance-name ]
The PIM view is displayed.
Step 3 Run:
bsr-policy { basic-acl-number | acl-name acl-name }
The legal range of BSR addresses is set.
After receiving a BSR message, the switch checks the source address of the message. If the
source address is not within the range of legal addresses, the message is discarded. BSR spoofing
is thus prevented.
{ basic-acl-number | acl-name acl-name } specifies the basic ACL. The ACL defines the
filtering policy for the source address range of the BSR messages.
----End
6.5.6 (Optional) Configuring the Range of Valid C-RP Addresses
ACL-based policies can be set on all C-BSRs to filter C-RP addresses and addresses of the groups
that the C-RPs serve. The BSR adds C-RP information to the RP-set only when the addresses
are in the set legal address range. Thus, C-RP spoofing is avoided.
Quidway S7700 Smart Routing Switch
Configuration Guide - Multicast 6 PIM-SM (IPv4) Configuration
Issue 01 (2011-07-15) Huawei Proprietary and Confidential
Copyright © Huawei Technologies Co., Ltd.
161