Configuring Sa Message Policies - HP MSR1002-4 Configuration Manual

Flexnetwork msr series
Hide thumbs Also See for MSR1002-4:
Table of Contents

Advertisement

Step
1.
Enter system view.
2.
Enter MSDP view.
3.
Enable the device to send SA
request messages to an
MSDP peer.
4.
Configure an SA request
policy.

Configuring SA message policies

To control the propagation of multicast source information, you can configure the following policies:
SA creation policy—Limits the multicast source information advertised in SA messages. This
policy enables the router to advertise (S, G) entries based on the used ACL that specifies the
multicast sources and groups.
SA incoming or outgoing policy—Limits the receipt or forwarding of SA messages. This
policy enables the router to receive or forward SA messages based on the used ACL that
specifies the multicast sources and groups.
By default, multicast data packets are encapsulated in SA messages and forwarded to MSDP peers
only if the TTL values in the packets are larger than zero. You can set the lower TTL threshold for
multicast data packets encapsulated in SA messages that are sent to an MSDP peer. Then, only
multicast data packets whose TTL values are larger than or equal to the configured value are
encapsulated in SA messages. Only SA messages whose TTL values are larger than or equal to the
configured value are forwarded to the specified MSDP peer. This controls the multicast data packet
encapsulation and limits the propagation range of the SA messages.
To configure SA message policies:
Step
1.
Enter system view.
2.
Enter MSDP view.
3.
Configure an SA creation
policy.
4.
Configure an SA incoming or
outgoing policy.
5.
Set the lower TTL threshold
for multicast data packets
encapsulated
messages.
Command
system-view
msdp
vpn-instance-name ]
peer
request-sa-enable
peer
sa-request-policy
ipv4-acl-number ]
Command
system-view
msdp
vpn-instance-name ]
import-source
ipv4-acl-number ]
peer
peer-address
{
export |
ipv4-acl-number ]
peer peer-address minimum-ttl
in
SA
ttl-value
157
vpn-instance
[
peer-address
peer-address
[
acl
Remarks
N/A
[
vpn-instance
N/A
[
acl
By
policies exist.
sa-policy
By default, no SA incoming or
import
}
[ acl
outgoing policies exist.
The default setting is 0.
Remarks
N/A
N/A
By default, after receiving a
new join message, a device
does not send an SA request
message to any MSDP peer.
Instead, it waits for the next SA
message from its MSDP peer.
By default, no SA request
policies exist, and all SA
request are permitted.
default,
no
SA
creation

Hide quick links:

Advertisement

Table of Contents
loading

Table of Contents