Multicast deployments have additional security considerations that go beyond just a unicast routing environment. Additional security considerations can be requested by several components and processes of multicast systems, which can add complexity to the existing network infrastructure.
When designing IP multicast solutions, the security goals should be defined because multicast traffic has a different nature compared to unicast traffic. The security goals must focus on the differences between unicast and multicast and they include the following aspects:
- State information: Multicast state information is different from unicast state information. In unicast, only the routing table and the routing protocol . . .
The content below this message is for members only.