Configure PIM Request Filters

When the threat defense device is acting as an RP, you can restrict specific multicast sources from registering with it to prevent unauthorized sources from registering with the RP. You can define the multicast sources from which the threat defense device will accept PIM register messages.

Procedure


Step 1

Choose Devices > Device Management, and edit the threat defense device.

Step 2

Choose Routing > Multicast Routing > PIM.

Step 3

On Request Filter, define the multicast sources that are allowed to register with the threat defense device when it acts as an RP:

  • From the Filter PIM register messages using: drop-down list select None, Access List, or Route Map.

  • If you choose Access List from the drop-down list, select an extended ACL or click Add (add icon) to create a new extended ACL. See Configure Extended ACL Objects for the procedure.

    Note

    In the Add Extended Access List Entry dialog box, select Allow from the drop-down list o create a rule that allows the specified source of the specified multicast traffic to register with the threat defense device, or select Block to create a rule that prevents the specified source of the specified multicast traffic from registering with the device.

  • If you choose Route Map, select a route map from the Route Map drop-down list, or click Add (add icon) to create a new route map. See Creating Network Objects for the procedure.

Step 4

Click OK to save the request filter configuration.