24-26
Catalyst 3550 Multilayer Switch Software Configuration Guide
78-11194-03
Chapter24 Configuring IP Multicast Routing
Configuring IP Multicast Routing
Configuring Candidate RPs
You can configure one or more candidate RPs. Similar to BSRs, the RPs should also have good
connectivity to other devices and be in the backbone portion of the network. An RP can serve the entire
IP multicast address space or a portion of it. Candidate RPs send candidate RP advertisements to the
BSR. When deciding which devices should be RPs, consider these opti ons:
In a network of Cisco routers and multilayer switches where only Auto-RP is used, any device ca n
be configured as an RP.
In a network that includes only Cisco PIMv2 routers and multilayer switches a nd with routers from
other vendors, any device can be used as an RP.
In a network of Cisco PIMv1 routers, Cisco PIMv2 routers, and rou ters fr om oth er ve nd ors,
configure only Cisco PIMv2 routers and multilayer switches as RPs.
Beginning in privileged EXEC mode, follow these steps to configure your multilayer switch to advertise
itself as a PIMv2 candidate RP to the BSR:
To remove this device as a candidate RP, use the no ip pim rp-candidate global configura tion com mand.
Command Purpose
Step1 configure terminal Enter global configuration mode.
Step2 ip pim rp-candidate interface-id
[group-list access-list-number]Configure your multilayer switch to be a candidate RP.
For interface-id, enter the interface type and number whose
associated IP address is advertised as a candidate RP address. Valid
interfaces include physical ports, port channels, and VLANs.
(Optional) For group-list access-list-number, enter an IP standard
access list number from 1 to 99. If no group-list is specified, the
multilayer switch is a candidate RP for all groups.
Step3 access-list access-list-number {deny |
permit} source [source-wildcard]Create a standard access list, repeating the command as many times as
necessary.
For access-list-number, enter the access list number specified in
Step 2.
The deny keyword denies access if the conditions are m atche d. The
permit keyword permits access if the conditions are matched.
For source, enter the number of the network or host from which the
packet is being sent.
(Optional) For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place ones in the bit
positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny
statement for everything.
Step4 end Return to privileged EXEC mode.
Step5 show running-config Verify your entries.
Step6 copy running-config startup-config (Optional) Save your entries in the configuration file.