The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.
The SSM Channel Based Filtering for Multicast Boundaries feature enables the user to apply filtering policies based on Source Specific Multicast (SSM) channels for Source and Group (S,G) addresses, which is a combination of source and destination IP addresses.
Your software release may not support all the features documented in this module. For the latest feature information and caveats, see the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the Feature Information Table at the end of this document.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
The SSM Channel Based Filtering for Multicast Boundaries feature expands the ip multicast boundary command for control plane filtering support. More than one ip multicast boundary command can be applied to an interface.
The following rules govern the ip multicast boundary command:
Perform this task to configure the multicast boundary.
Command or Action | Purpose | |
---|---|---|
|
Example: Router> enable |
Enables privileged EXEC mode. |
|
Example: Router# configure terminal |
Enters global configuration mode. |
|
Example: Router(config)# ip access-list 101 |
Configures the standard or extended access list. |
|
Example: Router(config-ext-nacl)# permit ip host 181.1.2.201 host 232.1.1.11 |
Permits specified ip host traffic. |
|
Example: Router(config-acl-nacl)# deny ip host 181.1.2.203 host 232.1.1.1 |
Denies specified multicast ip group and source traffic. |
|
|
Permits and denies specified host and source traffic. |
|
Example: Router(config)# interface gigabitethernet 2/3/0 |
Enables interface configuration mode. |
|
Example: Router(config-if)# ip multicast boundary acc_grp1 out |
Configures the multicast boundary. |
The following example permits outgoing traffic for (181.1.2.201, 232.1.1.1) and (181.1.2.202, 232.1.1.1) and denies all other (S,G)s.
configure terminal ip access-list extended acc_grp1 permit ip host 0.0.0.0 232.1.1.1 0.0.0.255 permit ip host 181.1.2.201 host 232.1.1.1 permit udp host 181.1.2.202 host 232.1.1.1 permit ip host 181.1.2.202 host 232.1.1.1 deny igmp host 181.2.3.303 host 232.1.1.1 interface gigabitethernet 2/3/0 ip multicast boundary acc_grp1 out
The following example permits outgoing traffic for (192.168.2.201, 232.1.1.5) and 192.168.2.202, 232.1.1.5).
configure terminal ip access-list extended acc_grp6 permit ip host 0.0.0.0 232.1.1.1 5.0.0.255 deny udp host 192.168.2.201 host 232.1.1.5 permit ip host 192.168.2.201 host 232.1.1.5 deny pim host 192.168.2.201 host 232.1.1.5 permit ip host 192.168.2.202 host 232.1.1.5 deny igmp host 192.2.3.303 host 232.1.1.1 interface gigabitethernet 2/3/0 ip multicast boundary acc_grp6 out
The following example denies a group-range that is being announced by the candidate RP. Since the group range is denied, there will be no pim auto-rp mappings created.
configure terminal ip access-list standard acc_grp10 deny 225.0.0.0 0.255.255.255 permit any access-list extended acc_grp12 permit pim host 181.1.2.201 host 232.1.1.8 deny udp host 181.1.2.201 host 232.1.1.8 permit pim host 181.1.2.203 0.0.0.255 host 227.7.7.7 permit ip host 0.0.0.0 host 227.7.7.7 permit ip 181.1.2.203 0.0.0.255 host 227.7.7.7 permit ip host 181.1.2.201 host 232.1.1.7 ip access-list extended acc_grp13 deny ip host 181.1.2.201 host 232.1.1.8 permit ip any any interface gigabitethernet 2/3/0 ip multicast boundary acc_grp10 filter-autorp ip multicast boundary acc_grp12 out ip multicast boundary acc_grp13 in
Related Topic |
Document Title |
---|---|
IP multicast commands: complete syntax, command mode, defaults, usage guidelines, and examples |
Cisco IOS IP Multicast Command Reference |
Standards |
Title |
---|---|
No new or modified standards are supported by this feature. |
-- |
MIBs |
MIBs Link |
---|---|
To locate and download MIBs for selected platforms, Cisco IOS XE releases, and feature sets, use Cisco MIB Locator found at the following URL: |
RFCs |
Title |
---|---|
No new or modified RFCs are supported by this feature. |
-- |
Description |
Link |
---|---|
The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. |
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Table 1 | Feature Information for SSM Channel Based Filtering for Multicast Boundaries |
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnership relationship between Cisco and any other company. (1110R)
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, network topology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentional and coincidental.