Configure the Secure Firewall Threat Defense Device as a Candidate Bootstrap Router

You can configure the threat defense device as a candidate BSR.

Procedure


Step 1

Choose Devices > Device Management, and edit the threat defense device.

Step 2

Choose Routing > Multicast Routing > PIM.

Step 3

On Bootstrap Router, check the Configure this FTD as a Candidate Bootstrap Router (C-BSR) check box to perform the C-BSR setup.

  1. From the Interface drop-down list, select the interface on the threat defense device from which the BSR address is derived to make it a candidate.

    This interface must be enabled with PIM.

  2. In the Hash mask length field, enter the length of a mask (32 bits maximum) that is to be ANDed with the group address before the hash function is called. All groups with the same seed hash (correspond) to the same RP. For example, if this value is 24, only the first 24 bits of the group addresses matter. This fact allows you to get one RP for multiple groups. The range is 0 to 32.

  3. In the Priority field, enter the priority of the candidate BSR. The BSR with the larger priority is preferred. If the priority values are the same, the router with the larger IP address is the BSR. The range is 0 to 255. The default value is 0.

Step 4

(Optional) Click Add (add icon) to select an interface on which no PIM BSR messages will be sent or received in the Configure this FTD as a Border Bootstrap Router (BSR) section.

  • From the Interface drop-down list, select the interface on which no PIM BSR messages will be sent or received.

    RP or BSR advertisements are filtered effectively isolating two domains of RP information exchange.

  • Check the Enable Border BSR check box to enable BSR.

Step 5

Click OK to save the bootstrap router configuration.