You can create ACL rules on all Candidate-BootStrap Routers (C-BSRs) for filtering Candidate-Rendezvous Point (C-RP) addresses and the addresses of groups that C-RPs serve. A BSR accepts the Advertisement messages and adds C-RP information to the RP-Set only when C-RP addresses and the addresses of the groups that C-RPs serve in the Advertisement messages are within the valid address range. Thus, the C-RP spoofing is prevented.
Procedure
- Run system-view
The system view is displayed.
- Run acl { name advance-acl-name [ advance | [ advance ] number advance-acl-number ] | [ number ] advance-acl-number } [ match-order { config | auto } ]
An advanced ACL is created, and the advanced ACL view is displayed.
- Run rule [ rule-id ] [ name rule-name ] { deny | permit } ip [ destination { destination-ip-address { destination-wildcard | 0 } | any } | source { source-ip-address { source-wildcard | 0 } | any } ] *
Rules are configured for the advanced ACL.
Run the rule command, set the source parameter to a valid C-RP source address range, and set the destination parameter to a multicast group address range to be served by C-RPs.
- Run quit
Return to the system view.
- Run pim [ vpn-instancevpn-instance-name ]
The PIM view is displayed.
- Run crp-policy { advanced-acl-number | acl-name acl-name }
- If an Advertisement message from a C-RP matches an ACL rule and the action is permit, the BSR permits this message.
- If an Advertisement message from a C-RP matches an ACL rule and the action is deny, the BSR denies this message.
- If an Advertisement message from a C-RP does not match any ACL rule, the BSR denies this message.
- If a specified ACL does not exist or does not contain rules, the BSR denies all messages from any C-RP.
- Run commit
The configuration is committed.