44-47
Catalyst 3560 Switch Software Configuration Guide
OL-8553-06
Chapter 44 Configuring IP Multicast Routing
Configuring Basic DVMRP Interoperability Features
Beginning in privileged EXEC mode, follow these steps to set up an administratively-scoped boundary.
This procedure is optional.
To remove the boundary, use the no ip multicast boundary interface configuration command.
This example shows how to set up a boundary for all administratively-scoped addresses:
Switch(config)# access-list 1 deny 239.0.0.0 0.255.255.255
Switch(config)# access-list 1 permit 224.0.0.0 15.255.255.255
Switch(config)# interface gigabitethernet0/1
Switch(config-if)# ip multicast boundary 1
Configuring Basic DVMRP Interoperability Features
These sections contain this configuration information:
Configuring DVMRP Interoperability, page 44-48 (optional)
Configuring a DVMRP Tunnel, page 44-50 (optional)
Advertising Network 0.0.0.0 to DVMRP Neighbors, page 44-51 (optional)
Responding to mrinfo Requests, page 44-52 (optional)
For more advanced DVMRP features, see the “Configuring Advanced DVMRP Interoperability
Features” section on page 44-52.
Command Purpose
Step 1 configure terminal Enter global configuration mode.
Step 2 access-list access-list-number {deny |
permit} source [source-wildcard]
Create a standard access list, repeating the command as many times as
necessary.
For access-list-number, the range is 1 to 99.
The deny keyword denies access if the conditions are matched. The
permit keyword permits access if the conditions are matched.
For source, enter the number of the network or host from which the
packet is being sent.
(Optional) For source-wildcard, enter the wildcard bits in dotted
decimal notation to be applied to the source. Place ones in the bit
positions that you want to ignore.
Recall that the access list is always terminated by an implicit deny
statement for everything.
Step 3 interface interface-id Specify the interface to be configured, and enter interface configuration
mode.
Step 4 ip multicast boundary
access-list-number
Configure the boundary, specifying the access list you created in Step 2.
Step 5 end Return to privileged EXEC mode.
Step 6 show running-config Verify your entries.
Step 7 copy running-config startup-config (Optional) Save your entries in the configuration file.