Enable PIM-SSM
To enable PIM-SSM:
Step
Task
1
Create an ACL that uses permit rules to specify what range of
addresses should use SSM. You must at least include one
permit 232.0.0.0/8
rule,
PIM-SSM.
2
Enter the command
you created.
Display address ranges in the PIM-SSM range using the command
EXEC Privilege mode.
Figure 35-2. Enabling PIM-SSM
R1(conf)#do show run pim
!
ip pim rp-address 10.11.12.2 group-address 224.0.0.0/4
ip pim ssm-range ssm
R1(conf)#do show run acl
!
ip access-list standard ssm
seq 5 permit host 239.0.0.2
R1(conf)#do show ip pim ssm-range
Group Address
239.0.0.2
Use PIM-SSM with IGMP version 2 Hosts
PIM-SSM requires receivers that support IGMP version 3. You can employ PIM-SSM even when receivers
support only IGMP version 1 or version 2 by translating (*,G) entries to (S,G) entries.
Translate (*,G) entries to (S,G) entries using the command
CONFIGURATION mode. In a standard access list, specify the groups or the group ranges that you want
to map to a source. Then, specify the multicast source.
•
When a SSM map is in place and FTOS cannot find any matching access lists for a group, it continues
to create (*,G) entries because there is an implicit deny for unspecified groups in the ACL.
•
When you remove the mapping configuration, FTOS removes the corresponding (S,G) states that it
created and reestablishes the original (*,G) states.
•
You may enter multiple
ssm-map
780
|
PIM Source-Specific Mode
, which is the default range for
ip pim ssm-range
and specify the ACL
/ MaskLen
/ 32
ssm-map
commands for different access lists. You may also enter multiple
commands for the same access list, as long as they use different source addresses.
Command Syntax
ip | ipv6
access-list
[
]
standard name
ip | ipv6
pim
[
]
ssm-range acl-name
[
]
show
ip | ipv6
pim ssm-range
ip igmp ssm-map acl source
Command Mode
CONFIGURATION
CONFIGURATION
from
from