Is multicast enabled on the AR router by default


By default, the multicast function of the AR router is disabled.

Other related questions:
Does the web function is enabled on an AR router by default
The web function is enabled on an AR router by default.

On which interface is the default management IP address of an AR router configured
From specified versions on, the router is configured with a management IP address in factory setting and the web NMS is enabled.

Configure multicast on the AR router
For the AR router, the configuration roadmap is as follows: 1. Configure the Layer 3 multicast function on the Layer 3 network to implement multicast routing (supported by some AR models). a. Configure a unicast routing protocol to achieve unicast interworking. This is the prerequisite of multicast routing. b. Configure PIM-SM and configure a multicast traffic aggregation point as the rendezvous point (RP). c. Enable IGMP on interfaces of user gateways to learn multicast service requirements of users. PIM generates multicast routes based on IGMP group information and forwards multicast data to receiver network segments. 2. Configure Layer 2 multicast on the Layer 2 network to forward multicast data to Layer 2 outbound physical interfaces accurately. a. Enable IGMP snooping in a VLAN.

Configure attack defense on an AR router
Attack defense mainly defends the CPU against attack packets to ensure that the server can normally run in case of an attack. Attack defense configuration is composed of the following parts: enabling attack defense, (optional) configuring flooding defense parameters, super-large ICMP packet defense parameters, and scan attack defense parameters, and checking configuration result. By default, no type of attack defense is enabled. For details about how to configure attack defense of AR series routers using command lines and through the web NMS, see the URL: AR router configuration attack defense .

Configure the ASPF firewall on an AR router
The application specific packet filter (ASPF) firewall can detect and filter FTP, HTTP, SIP, and RTSP packets on the application layer. The ASPF firewall filters packets on the application layer based on status. This firewall can detect application layer session information that attempts to pass the firewall, and prevent packets that do not match rules from passing the firewall. After the ActiveX Blocking is configured, the ASPF will block the ActiveX that is transmitted over HTTP, preventing users from installing insecure or malicious controls. After the Java Blocking is configured, the ASPF will block requests that are sent in order to obtain programs containing the Java Applet from web pages. In the system view: 1. Run the firewall interzone zone-name1 zone-name2 command to access the interzone view. 2. In V200R006 and earlier versions, run the detect aspf { all | ftp | http [ activex-blocking | java-blocking ] | rtsp | sip } command to configure the ASPF firewall. In V200R007, run the detect aspf { ftp | rtsp | sip } command to configure the ASPF firewall. Most of the application layer protocols have bidirectional interaction processes. Therefore, during ASPF configuration, ignore directions, and the router automatically checks the status of inbound and outbound packets. By default, the ASPF firewall is not configured for the interzone. 3. Check the configuration result. Run the display firewall interzone [ zone-name1 zone-name2 ] command to query ASPF information about the interzone.

If you have more questions, you can seek help from following ways:
To iKnow To Live Chat
Scroll to top