Command Manual – MulticastH3C S3600 Series Ethernet Switches-Release 1510 Chapter 6 PIM Configuration Commands6-2Problems may still exist if a legal BSR is attacked, though these two measures caneffectively guarantee high BSR security.The source keyword in the rule command is translated into BSR address in thebsr-policy command.Related command: acl, rule.Example# Configure a BSR filtering policy on routers to allow only 101.1.1.1/32 to be BSR.system-viewSystem View: return to User View with Ctrl+Z.[H3C] multicast routing-enable[H3C] pim[H3C-pim] bsr-policy 2000[H3C-pim] quit[H3C] acl number 2000[H3C-acl-basic-2000] rule 0 permit source 101.1.1.1 06.1.2 c-bsrSyntaxc-bsr interface-type interface-number hash-mask-len [ priority ]undo c-bsrViewPIM viewParameterinterface-type interface-number: VLAN interface. The candidate BSR is configured onthe VLAN interface. PIM-SM must be enabled on the VLAN interface first.hash-mask-len: Length of the mask. The value ranges from 0 to 32.priority: Priority of the candidate BSR. The greater the value of the priority, the higherthe priority of the BSR. The value ranges from 0 to 255. By default, the priority is 0.DescriptionUse the c-bsr command to configure a candidate BSR.Use the undo c-bsr command to remove the candidate BSR configured.By default, no candidate BSR is set.For the configuration of the candidate BSR, the larger bandwidth should be guaranteedsince a large amount of information will be exchanged between BSR and other devicesin the PIM domain.