3Com Router User Manual
Here you can view all the pages of manual 3Com Router User Manual. The 3Com manuals for Router are available online for free. You can easily download all the documents as PDF.
Page 521
PIM-SM Configuration517 Ta b l e 588 Enable/Disable PIM-SM Protocol By default, the interface disables PIM-SM protocol. Note that PIM-SM only runs on specific interfaces. One interface can only run one multicast routing protocol at one time. Configuring the Candidate BSRIn a PIM-SM domain, there must be a unique bootstrap router to enable PIM-SM router to function normally. BSR takes charge of collecting and sending RP information. Several candidate bootstrap routers (C-BSR) generate one publicly...
Page 522
518CHAPTER 36: CONFIGURING PIM-SM By default, no interface is configured to be candidate RP. Use pim command in system view to enter PIM view. Generally, only one C-BSR and one C-RP are configured in the network, and usually it is the same router. Only one C-BSR can be configured for a single router. The latter configured C-BSR replaces the formerly configured C-BSR. Subscribers are recommended to configure the C-RP and C-BSR at the loopback interface of the same router. This reduces the network...
Page 523
Displaying and Debugging PIM-SM519 By default, the time interval of interface sending Hello message is 30 seconds. Configuring the Threshold of the Shortest Path The PIM-SM router first forwards multicast data packets by the shared tree. But if the multicast data rate exceeds a certain threshold value, the router for the last hop of multicast packets starts the switch from the shared tree to the shortest path tree. Make the following configuration in the system view. Ta b l e 593 Configure the...
Page 524
520CHAPTER 36: CONFIGURING PIM-SM After the above configuration, execute the display command in all views to display PIM-SM configuration, and to verify the effect of the configuration. Executethe debugging command in system view for the debugging of PIM-SM. PIM-SM Configuration ExampleIn the actual network, because different manufacturers provide routing equipment, the routing protocols are different. Because the PIM protocol is independent of any specific unicast protocol, there is no need to pay...
Page 525
Troubleshooting PIM-SM521 [RouterB-Serial1] pim sm [RouterB] interface serial 2 [RouterB-Serial2] pim sm bConfigure the candidate BSR [RouterB-pim] c-bsr serial 0 30 2 cConfigure the candidate RP [RouterB-pim] acl 5 [RouterB-acl-5] rule permit source 225.0.0.0 255.0.0.0 [RouterB-acl-5] pim [RouterB-pim] c-rp serial 0 accept-policy 5 dConfigure PIM domain boundary [RouterB-Serial2] pim bsr-boundary When the Serial 2 has been configured to be BSR, Router D will not be able to receive the BSR information...
Page 527
VIII SECURITY Chapter 37Configuring Terminal Access Security Chapter 38Configuring AAA and RADIUS Protocol Chapter 39Configuring Firewall Chapter 40Configuring IPSec Chapter 41Configuring IKE
Page 529
37 CONFIGURING TERMINAL ACCESS S ECURITY This chapter provides an overview to the security features provided for terminal access of 3Com routers and covers the following topics: ■Terminal Access Security Overview ■Configuring Terminal Access Security ■EXEC Configuration Example Terminal Access Security Overview3Com routers adopt cascade protection for the command line interface, and divide terminal access users into three types: ■Administrators ■Operators ■Guests A guest user can only log onto the...
Page 530
526CHAPTER 37: CONFIGURING TERMINAL ACCESS SECURITY By default, no user is configured. Configuring User Login Authentication All users who access a router through a terminal are called terminal users. 3Com routers divide terminal users into five types: ■Asynchronous port terminal user ■X.25 PAD calling user ■Console port user ■Dumb terminal user ■Telnet terminal user 3Com routers now support command line interpreters that access terminals from four types of interfaces: ■Remote X.25 PAD ■Asynchronous...