Got it

PIM

Created: Dec 10, 2021 07:46:28Latest reply: Dec 10, 2021 08:56:20 202 6 0 0 0
  Rewarded HiCoins: 0 (problem resolved)
Dear all, talking about PIM what are the functions of PIM silent on the access layer? pls provide me an example too so I can understand ckearly. good day!

Featured Answers
Unicef
MVE Created Dec 10, 2021 08:56:20

Dear User,

On the access layer, if the interface directly connected to a host is enabled with the PIM protocol, PIM neighbors can be established on this interface to process various PIM protocol packets. Such configuration, however, may bring security problems. For example, when malicious hosts send a large number of pseudo PIM Hello packets, it may lead to the collapse of the device. To avoid the preceding problem, you can run the pim silent command on the interface to set the interface to work in PIM silent state. After the interface enters the PIM silent state, it is forbidden to receive or forward any PIM protocol packet. All PIM neighbors and the PIM state machine on this interface are deleted and the interface automatically becomes a DR. Meanwhile, the PIM silent function does not affect the IGMP function on the interface. The PIM silent function is applicable only to the interface that is directly connected to the network segment of user hosts, and only one PIM device can be connected to this network segment.

Thanks!
View more
  • x
  • convention:

user_4400653
user_4400653 Created Dec 12, 2021 06:02:13 (0) (0)
best one  
S_Noch
S_Noch Created Dec 17, 2021 08:44:31 (0) (0)
great  

Recommended answer

fuzi_yao
Admin Created Dec 10, 2021 07:51:39

Hi, friend!
A PIM-SM protocol is used in daily multicast protocols. Before PIM-SM is used, PIM is enabled on the routers on the network to establish PIM neighbor relationships. If an attack occurs on the network, a hacker simulates a host to send PIM hello packets to another PIM device to establish a PIM neighbor relationship. Devices on the network may fail to process data, or the performance may reach a bottleneck, causing breakdown. Then, you can configure the PIM silent command on the interface connected to the host. It deletes the PIM neighbor of the interface so that the interface does not receive or forward PIM packets. In this way, attacks can be prevented. A security mechanism is added.
View more
  • x
  • convention:

user_4400653
user_4400653 Created Dec 12, 2021 06:02:03 (0) (0)
good  
S_Noch
S_Noch Created Dec 17, 2021 08:44:18 (0) (0)
nice  
All Answers
Hi, friend!
A PIM-SM protocol is used in daily multicast protocols. Before PIM-SM is used, PIM is enabled on the routers on the network to establish PIM neighbor relationships. If an attack occurs on the network, a hacker simulates a host to send PIM hello packets to another PIM device to establish a PIM neighbor relationship. Devices on the network may fail to process data, or the performance may reach a bottleneck, causing breakdown. Then, you can configure the PIM silent command on the interface connected to the host. It deletes the PIM neighbor of the interface so that the interface does not receive or forward PIM packets. In this way, attacks can be prevented. A security mechanism is added.
View more
  • x
  • convention:

user_4400653
user_4400653 Created Dec 12, 2021 06:02:03 (0) (0)
good  
S_Noch
S_Noch Created Dec 17, 2021 08:44:18 (0) (0)
nice  
Dear User,

On the access layer, if the interface directly connected to a host is enabled with the PIM protocol, PIM neighbors can be established on this interface to process various PIM protocol packets. Such configuration, however, may bring security problems. For example, when malicious hosts send a large number of pseudo PIM Hello packets, it may lead to the collapse of the device. To avoid the preceding problem, you can run the pim silent command on the interface to set the interface to work in PIM silent state. After the interface enters the PIM silent state, it is forbidden to receive or forward any PIM protocol packet. All PIM neighbors and the PIM state machine on this interface are deleted and the interface automatically becomes a DR. Meanwhile, the PIM silent function does not affect the IGMP function on the interface. The PIM silent function is applicable only to the interface that is directly connected to the network segment of user hosts, and only one PIM device can be connected to this network segment.

Thanks!
View more
  • x
  • convention:

user_4400653
user_4400653 Created Dec 12, 2021 06:02:13 (0) (0)
best one  
S_Noch
S_Noch Created Dec 17, 2021 08:44:31 (0) (0)
great  

Comment

You need to log in to comment to the post Login | Register
Comment

Notice: To protect the legitimate rights and interests of you, the community, and third parties, do not release content that may bring legal risks to all parties, including but are not limited to the following:
  • Politically sensitive content
  • Content concerning pornography, gambling, and drug abuse
  • Content that may disclose or infringe upon others ' commercial secrets, intellectual properties, including trade marks, copyrights, and patents, and personal privacy
Do not share your account and password with others. All operations performed using your account will be regarded as your own actions and all consequences arising therefrom will be borne by you. For details, see " User Agreement."

My Followers

Login and enjoy all the member benefits

Login

Block
Are you sure to block this user?
Users on your blacklist cannot comment on your post,cannot mention you, cannot send you private messages.
Reminder
Please bind your phone number to obtain invitation bonus.