Configure the Secure Firewall Threat Defense Device as a Candidate Bootstrap Router
You can configure the threat defense device as a candidate BSR.
Procedure
Step 1 | Choose threat defense device. , and edit the |
Step 2 | Choose . |
Step 3 | On Bootstrap Router, check the Configure this FTD as a Candidate Bootstrap Router (C-BSR) check box to perform the C-BSR setup. |
Step 4 | (Optional) Click Add () to select an interface on which no PIM BSR messages will be sent or received in the Configure this FTD as a Border Bootstrap Router (BSR) section.
|
Step 5 | Click OK to save the bootstrap router configuration. |