3Com 5500G-EI Command Reference Guide - Page 263

Example, c-bsr, Syntax, 1.1.1/32 and 1.1.1.2/32 can be BSRs, thus the routers cannot receive or

Page 263 highlights

PIM Configuration Commands 263 Use the undo bsr-policy command to restore the default setting so that no range limit is set and all received messages are taken as legal. In a PIM SM network using the BSR (bootstrap router) mechanism, every router can set itself as a C-BSR (candidate BSR) and have the authority to advertise RP information in the network once it wins the election. To prevent malicious BSR spoofing in the network, the following two measures need to be taken: ■ Prevent the router from being spoofed by hosts though faking legal BSR messages to modify RP mapping. BSR messages are of multicast type and their TTL is 1, so this type of attacks often hits edge routers. Fortunately, BSRs are inside the network, while the assaulting hosts are outside, therefore neighbor and RPF checks can be used to stop this type of attacks. ■ If a router in the network is manipulated by an attacker, or an illegal router is placed on the network, the attacking router may set itself as a C-BSR and try to win the election and gain the authority to advertise RP information throughout the network. Since the router configured as a C-BSR propagates BSR messages, as multicast with a TTL of 1. Then the network cannot be affected as long as the peer routers do not receive these BSR messages. This is done by configuring bsr-policy on each router to limit the legal BSR range, for example, only 1.1.1.1/32 and 1.1.1.2/32 can be BSRs, thus the routers cannot receive or forward BSR messages received from any other source other than these two. Even legal BSRs cannot contest with them. Problems may still exist if a legal BSR is attacked, though these two measures can effectively guarantee high BSR security. The source parameter in the rule command is translated as a BSR address in the bsr-policy command. Related commands: acl and rule Example Configure BSR filtering policy on routers, only 1.1.1.1/32 can be a BSR. system-view System View: return to User View with Ctrl+Z [SW5500]multicast routing-enable [SW5500]pim [SW5500-pim]bsr-policy 2000 [SW5500-pim]quit [SW5500]acl number 2000 [SW5500-acl-basic-2000]rule 0 permit source 1.1.1.1 0 c-bsr Syntax c-bsr interface-type interface-number hash-mask-len [ priority ] undo c-bsr View PIM View

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176
  • 177
  • 178
  • 179
  • 180
  • 181
  • 182
  • 183
  • 184
  • 185
  • 186
  • 187
  • 188
  • 189
  • 190
  • 191
  • 192
  • 193
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • 215
  • 216
  • 217
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • 225
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • 240
  • 241
  • 242
  • 243
  • 244
  • 245
  • 246
  • 247
  • 248
  • 249
  • 250
  • 251
  • 252
  • 253
  • 254
  • 255
  • 256
  • 257
  • 258
  • 259
  • 260
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • 268
  • 269
  • 270
  • 271
  • 272
  • 273
  • 274
  • 275
  • 276
  • 277
  • 278
  • 279
  • 280
  • 281
  • 282
  • 283
  • 284
  • 285
  • 286
  • 287
  • 288
  • 289
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • 301
  • 302
  • 303
  • 304
  • 305
  • 306
  • 307
  • 308
  • 309
  • 310
  • 311
  • 312
  • 313
  • 314
  • 315
  • 316
  • 317
  • 318
  • 319
  • 320
  • 321
  • 322
  • 323
  • 324
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • 336
  • 337
  • 338
  • 339
  • 340
  • 341
  • 342
  • 343
  • 344
  • 345
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • 353
  • 354
  • 355
  • 356
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • 364
  • 365
  • 366
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • 374
  • 375
  • 376
  • 377
  • 378
  • 379
  • 380
  • 381
  • 382
  • 383
  • 384
  • 385
  • 386
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • 396
  • 397
  • 398
  • 399
  • 400
  • 401
  • 402
  • 403
  • 404
  • 405
  • 406
  • 407
  • 408
  • 409
  • 410
  • 411
  • 412
  • 413
  • 414
  • 415
  • 416
  • 417
  • 418
  • 419
  • 420
  • 421
  • 422
  • 423
  • 424
  • 425
  • 426
  • 427
  • 428
  • 429
  • 430
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • 438
  • 439
  • 440
  • 441
  • 442
  • 443
  • 444
  • 445
  • 446
  • 447
  • 448
  • 449
  • 450
  • 451
  • 452
  • 453
  • 454
  • 455
  • 456
  • 457
  • 458
  • 459
  • 460
  • 461
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • 469
  • 470
  • 471
  • 472
  • 473
  • 474
  • 475
  • 476
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • 484
  • 485
  • 486
  • 487
  • 488
  • 489
  • 490
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • 498
  • 499
  • 500
  • 501
  • 502
  • 503
  • 504
  • 505
  • 506
  • 507
  • 508
  • 509
  • 510
  • 511
  • 512
  • 513
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • 521
  • 522
  • 523
  • 524
  • 525
  • 526
  • 527
  • 528
  • 529
  • 530

PIM Configuration Commands
263
Use the
undo bsr-policy
command to restore the default setting so that no
range limit is set and all received messages are taken as legal.
In a PIM SM network using the BSR (bootstrap router) mechanism, every router
can set itself as a C-BSR (candidate BSR) and have the authority to advertise RP
information in the network once it wins the election. To prevent malicious BSR
spoofing in the network, the following two measures need to be taken:
Prevent the router from being spoofed by hosts though faking legal BSR
messages to modify RP mapping. BSR messages are of multicast type and their
TTL is 1, so this type of attacks often hits edge routers. Fortunately, BSRs are
inside the network, while the assaulting hosts are outside, therefore neighbor
and RPF checks can be used to stop this type of attacks.
If a router in the network is manipulated by an attacker, or an illegal router is
placed on the network, the attacking router may set itself as a C-BSR and try to
win the election and gain the authority to advertise RP information throughout
the network. Since the router configured as a C-BSR propagates BSR messages,
as multicast with a TTL of 1. Then the network cannot be affected as long as
the peer routers do not receive these BSR messages. This is done by configuring
bsr-policy on each router to limit the legal BSR range, for example, only
1.1.1.1/32 and 1.1.1.2/32 can be BSRs, thus the routers cannot receive or
forward BSR messages received from any other source other than these two.
Even legal BSRs cannot contest with them.
Problems may still exist if a legal BSR is attacked, though these two measures can
effectively guarantee high BSR security.
The
source
parameter in the
rule
command is translated as a BSR address in the
bsr-policy
command.
Related commands:
acl
and
rule
Example
Configure BSR filtering policy on routers, only 1.1.1.1/32 can be a BSR.
<SW5500>
system-view
System View: return to User View with Ctrl+Z
[SW5500]
multicast routing-enable
[SW5500]
pim
[SW5500-pim]
bsr-policy 2000
[SW5500-pim]
quit
[SW5500]
acl number 2000
[SW5500-acl-basic-2000]
rule 0 permit source 1.1.1.1 0
c-bsr
Syntax
c-bsr
i
nterface-type interface-number hash-mask-len [ priority ]
undo c-bsr
View
PIM View