D-Link DGS-6600-48T Product Manual - Page 299
ip pim bsr-candidate
View all D-Link DGS-6600-48T manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 299 highlights
DGS-6604 ip pim bsr-candidate ip pim bsr-candidate Use this command to configure the router to advertise itself as a candidate bootstrap router (BSR). Use the no form of this command to remove this router as a candidate for being a BSR. ip pim bsr-candidate INTERFACE-ID [HASH-MASK-LENGTH] [PRIORITY] no ip pim bsr-candidate Syntax Description INTERFACE-ID Interface ID, from which the BSR address is derived, in order to make it a candidate. HASH-MASKLENGTH Configure hash mask length for RP selection. The range is 0 to 32. The mask (32 bits maximum) that is to be logically ANDed with the group address before the hash function is executed. All groups with the same seed hash (correspond) to the same RP. For example, if this value is 24, only the first 24 bits of the group addresses matter. Therefore one RP can be derived for multiple groups. PRIORITY Configure priority for a BSR candidate. The range is 0 to 255. The BSR with the larger priority is preferred. If the priority values are the same, the router with the larger IP address is the BSR. Default Command Mode Usage Guideline The router is not a BSR candidate. HASH-MASK-LENGTH: 30 Priority : 64. Global configuration This command is valid in the SM mode This command causes the router to send bootstrap messages to all its PIM neighbors, with the address of the designated interface as the BSR address. The following 2 conditions will cause BSR changes: (1) Bootstrap Timer Expires (2) Receive Preferred BSM. In condition (1), the router is a Candidate-BSR, it will start to originate Bootstrap messages and perform the BSR election. For condition (2), the router will store the RP-Set from the preferred BSR. Functionality of hash-mask is defined in RFC4601 4.7.2. The hash function is used by all routers within a domain, to map a group to one of the RPs from the matching set of group-range-to-RP mappings (all of this set has the same longest mask length and the same highest priority). The algorithm takes as input the group address, and the addresses of the candidate RPs from the mappings, and gives as output, one RP address to be used. CLI Reference Guide 289