ZXR10 GER (V2.6.03) General Excellent Router User Manual Volume-I
344 Confidential and Proprietary Information of ZTE CORPORATION
PIM SM Policy Control
This topic describes how to control PIM-SM policy.
Router Command Line Interface has been accessed.
1. To filter the multicast packets encapsulated in the received
register packet, use accept-register <access-list-number>
command in pimsm configuration mode as shown in
Table
397.
TABLE 397 IP PIM NEIGHBOR FILTER COMMAND
Command
Format
Command
Mode
Command Function
ip pim
neighbor-
filter
<access-
list-
number>
Pimsm
configuration
This filters the multicast
packets encapsulated in the
received register packet
Result: This filters the multicast packets encapsulated in the
received register packet.
Filter the source addresses of the multicast packets
encapsulated in the register packets according to the rules
defined in the ACL.
2. To filter the candidate RP addresses advertised in the BSR
message, use accept-rp <access-list-number> command in
pimsm configuration mode as shown in
Table 398.
TABLE 398 ACCEPT-RP COMMAND
Command
Format
Command
Mode
Command Function
accept-rp
<access-
list-
number>
Pimsm
configuration
This filter the candidate RP
addresses advertised in the
BSR message
Result: This filter the candidate RP addresses advertised in
the BSR message.
3. To limit PIM-SM neighbors, use ip pim neighbor-filter
<access-list-number> command in interface configuration
mode as shown in
Table 399.
TABLE 399 IP PIM NEIGHBOR FILTER COMMAND
Command
Format
Command
Mode
Command Function
ip pim
neighbor-
Interface
configuration
This limits the PIM-SM neighbors
Purpose
Prerequisites
Steps