No relevant resource is found in the selected language.

This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Read our privacy policy>Search

Reminder

To have a better experience, please upgrade your IE browser.

upgrade

NE40E V800R010C10SPC500 Configuration Guide - IP Multicast 01

This is NE40E V800R010C10SPC500 Configuration Guide - IP Multicast
Rate and give feedback:
Huawei uses machine translation combined with human proofreading to translate this document to different languages in order to help you better understand the content of this document. Note: Even the most advanced machine translation cannot match the quality of professional translators. Huawei shall not bear any responsibility for translation accuracy and it is recommended that you refer to the English document (a link for which has been provided).
Controlling the Sending of SA Request Messages

Controlling the Sending of SA Request Messages

If the Source Active (SA) cache capacity is large on a remote MSDP peer, to shorten the time taken by a receiver to obtain multicast source information, enable the local Rendezvous Point (RP) to send SA Request messages, and configure a policy on the peer to filter SA Request messages to be received from the local RP.

Context

If the local RP has a small SA cache capacity and needs to receive multicast data, the local RP cannot immediately obtain useful (S, G) information. Instead, it has to wait for the SA message sent by the remote MSDP peer in the next sending period.

If the SA cache function is enabled and the SA cache capacity is large on the remote MSDP peer, enable the local RP to send SA Request messages to shorten the time taken by a receiver to obtain multicast source information.

  • When the local RP needs to receive (S, G) information, it actively sends an SA Request message to the specified remote MSDP peer rather than waits for the SA message sent in the next sending period.

  • Upon receipt of the SA Request message, the remote MSDP peer responds with an SA Response message carrying the required (S, G) information.

    If the remote MSDP peer is configured to filter SA Request messages to be received, the remote peer responds to only the SA Request messages that matches the specified rule.

Procedure

  • Enable the local RP to send SA Request messages.
    1. Run system-view

      The system view is displayed.

    2. Run msdp [ vpn-instance vpn-instance-name ]

      The MSDP view is displayed.

    3. Run peer peer-address request-sa-enable

      The local RP is enabled to send SA Request messages to a specified MSDP peer.

      peer-address: specifies the IP address of a remote MSDP peer. When the local RP receives a new Join message, it sends an SA Request message only to the peer specified by peer-address.

      NOTE:

      Before running this command on the local RP, disable the SA cache function on the local RP and ensure that the SA cache function is enabled on the MSDP peer specified by peer-address.

    4. Run commit

      The configuration is committed.

  • Configure a policy on the remote MSDP peer to filter SA Request messages to be received.
    1. Run system-view

      The system view is displayed.

    2. Configure a basic numbered ACL or a naming ACL as needed.

      • Configure a basic numbered ACL.

        1. Run acl [ number ] basic-acl-number [ match-order { auto | config } ]

          A basic numbered ACL is created, and the basic numbered ACL view is displayed.

        2. Run rule [ rule-id ] [ name rule-name ] { deny | permit } source { source-ip-address { source-wildcard | 0 } | any }

          Rules are configured for the basic numbered ACL.

      • Configure a naming ACL.

        1. Run acl name acl-name basic [ match-order { auto | config } ]

          A naming ACL is created, and the naming ACL view is displayed.

        2. Run rule [ rule-id ] [ name rule-name ] { deny | permit } ip [ destination { destination-ip-address { destination-wildcard | 0 } | any } | source { source-ip-address { source-wildcard | 0 } | any } ] *

          Rules are configured for the naming ACL.

      If a basic numbered ACL is used, run the rule command and set the source parameter to the multicast group address.

      If a naming ACL is used, run the rule command and set the destination parameter to a multicast group address.

    3. Run quit

      Return to the system view.

    4. Run msdp [ vpn-instance vpn-instance-name ]

      The MSDP view is displayed.

    5. Run peer peer-address sa-request-policy [ acl { basic-acl-number | acl-name } ]

      A policy is configured on the MSDP peer to filter SA Request messages to be received.

      • peer-address: specifies the address of the MSDP peer that sends SA Request messages.

      • acl basic-acl-number and acl-name: defines a filtering policy.

      NOTE:
      • If an SA Request message matches an ACL rule and the action is permit, the interface permits this message.
      • If an SA Request message matches an ACL rule and the action is deny, the interface denies this message.
      • If an SA Request message does not match any ACL rule, the device denies this message.
      • If a specified ACL does not exist or does not contain rules, the device ignores all SA Request messages from this peer.

    6. Run commit

      The configuration is committed.

Translation
Download
Updated: 2019-01-03

Document ID: EDOC1100055017

Views: 44221

Downloads: 97

Average rating:
This Document Applies to these Products
Related Version
Related Documents
Share
Previous Next