Configure PIM Request Filters
When the threat defense device is acting as an RP, you can restrict specific multicast sources from registering with it to prevent unauthorized sources from registering with the RP. You can define the multicast sources from which the threat defense device will accept PIM register messages.
Procedure
Step 1 | Choose threat defense device. , and edit the | ||
Step 2 | Choose . | ||
Step 3 | On Request Filter, define the multicast sources that are allowed to register with the threat defense device when it acts as an RP:
| ||
Step 4 | Click OK to save the request filter configuration. |