Command Reference Guide
3Com Router 3000 Ethernet Family
Command Reference Guide Chapter 3 PIM Configuration Commands
3Com Corporation
3-2
not receive and forward other BSR information and legal BSR will not compete
with it.
The above two points can partially protect the security of BSR in the network. However,
if a legal BSR router is controlled by an attacker, it will also lead to the above problem.
The source parameter in the related rule command is translated as BSR address in
bsr-policy command.
Related command: acl, rule.
Example
# Configure BSR filter policy on a router. Only permit 1.1.1.1/32 to act as BSR and
regard others are invalid.
[3Com-pim] bsr-policy 2001
[3Com-pim] quit
[3Com] acl number 2001
[3Com-acl-basic-2001] rule 0 permit source 1.1.1.1 0
3.1.2 c-bsr
Syntax
c-bsr interface-type interface-number hash-mask-len [ priority ]
undo c-bsr
View
PIM view
Parameter
interface-type interface-number: Interface type and interface number of a router. A
candidate BSR is configured on this interface. PIM-SM must be enabled on this
interface, the configuration can take effect.
hash-mask-len: Mask length. The mask performs “And” operation with multicast
address at first and then performs the operation of searching for RP. The value ranges
from 0 to 32.
priority: Priority of the candidate BSR. The larger the value is, the higher the priority of
candidate BSR is. The value ranges from 0 to 255. By default, the priority is 0.
Description
Use the c-bsr command to configure a candidate BSR.
Use the undo c-bsr command to remove the candidate BSR configuration.
By default, no candidate BSR is set.










