diff --git a/python/vyos/util.py b/python/vyos/util.py
index d2e58bef2..cc7ce5b40 100644
--- a/python/vyos/util.py
+++ b/python/vyos/util.py
@@ -1,193 +1,202 @@
 # Copyright 2019 VyOS maintainers and contributors <maintainers@vyos.io>
 #
 # This library is free software; you can redistribute it and/or
 # modify it under the terms of the GNU Lesser General Public
 # License as published by the Free Software Foundation; either
 # version 2.1 of the License, or (at your option) any later version.
 #
 # This library is distributed in the hope that it will be useful,
 # but WITHOUT ANY WARRANTY; without even the implied warranty of
 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
 # Lesser General Public License for more details.
 #
 # You should have received a copy of the GNU Lesser General Public
 # License along with this library.  If not, see <http://www.gnu.org/licenses/>.
 
 import os
 import re
 import grp
 import sys
 import time
 import subprocess
 
 import psutil
 
 import vyos.defaults
 
 
 def read_file(path):
     """ Read a file to string """
     with open(path, 'r') as f:
         data = f.read().strip()
     return data
 
 def colon_separated_to_dict(data_string, uniquekeys=False):
     """ Converts a string containing newline-separated entries
         of colon-separated key-value pairs into a dict.
 
         Such files are common in Linux /proc filesystem
 
     Args:
         data_string (str): data string
         uniquekeys (bool): whether to insist that keys are unique or not
 
     Returns: dict
 
     Raises:
         ValueError: if uniquekeys=True and the data string has
             duplicate keys.
 
     Note:
         If uniquekeys=True, then dict entries are always strings,
         otherwise they are always lists of strings.
     """
     key_value_re = re.compile('([^:]+)\s*\:\s*(.*)')
 
     data_raw = re.split('\n', data_string)
 
     data = {}
 
     for l in data_raw:
         l = l.strip()
         if l:
             match = re.match(key_value_re, l)
             if match:
                 key = match.groups()[0].strip()
                 value = match.groups()[1].strip()
             if key in data.keys():
                 if uniquekeys:
                     raise ValueError("Data string has duplicate keys: {0}".format(key))
                 else:
                     data[key].append(value)
             else:
                 if uniquekeys:
                     data[key] = value
                 else:
                     data[key] = [value]
         else:
             pass
 
     return data
 
 def process_running(pid_file):
     """ Checks if a process with PID in pid_file is running """
     with open(pid_file, 'r') as f:
         pid = f.read().strip()
     return psutil.pid_exists(int(pid))
 
 def seconds_to_human(s, separator=""):
     """ Converts number of seconds passed to a human-readable
     interval such as 1w4d18h35m59s
     """
     s = int(s)
 
     week = 60 * 60 * 24 * 7
     day = 60 * 60 * 24
     hour = 60 * 60
 
     remainder = 0
     result = ""
 
     weeks = s // week
     if weeks > 0:
         result = "{0}w".format(weeks)
         s = s % week
 
     days = s // day
     if days > 0:
         result = "{0}{1}{2}d".format(result, separator, days)
         s = s % day
 
     hours = s // hour
     if hours > 0:
         result = "{0}{1}{2}h".format(result, separator, hours)
         s = s % hour
 
     minutes = s // 60
     if minutes > 0:
         result = "{0}{1}{2}m".format(result, separator, minutes)
         s = s % 60
 
     seconds = s
     if seconds > 0:
         result = "{0}{1}{2}s".format(result, separator, seconds)
 
     return result
 
 def get_cfg_group_id():
     group_data = grp.getgrnam(vyos.defaults.cfg_group)
     return group_data.gr_gid
 
 def file_is_persistent(path):
     if not re.match(r'^(/config|/opt/vyatta/etc/config)', os.path.dirname(path)):
         warning = "Warning: file {0} is outside the /config directory\n".format(path)
         warning += "It will not be automatically migrated to a new image on system update"
         return (False, warning)
     else:
         return (True, None)
 
 def commit_in_progress():
     """ Not to be used in normal op mode scripts! """
 
     # The CStore backend locks the config by opening a file
     # The file is not removed after commit, so just checking
     # if it exists is insufficient, we need to know if it's open by anyone
 
     # There are two ways to check if any other process keeps a file open.
     # The first one is to try opening it and see if the OS objects.
     # That's faster but prone to race conditions and can be intrusive.
     # The other one is to actually check if any process keeps it open.
     # It's non-intrusive but needs root permissions, else you can't check
     # processes of other users.
     #
     # Since this will be used in scripts that modify the config outside of the CLI
     # framework, those knowingly have root permissions.
     # For everything else, we add a safeguard.
     id = subprocess.check_output(['/usr/bin/id', '-u']).decode().strip()
     if id != '0':
         raise OSError("This functions needs root permissions to return correct results")
 
     for proc in psutil.process_iter():
         try:
             files = proc.open_files()
             if files:
                 for f in files:
                     if f.path == vyos.defaults.commit_lock:
                         return True
         except psutil.NoSuchProcess as err:
             # Process died before we could examine it
             pass
     # Default case
     return False
 
 def wait_for_commit_lock():
     """ Not to be used in normal op mode scripts! """
 
     # Very synchronous approach to multiprocessing
     while commit_in_progress():
         time.sleep(1)
 
 def ask_yes_no(question, default=False) -> bool:
     """Ask a yes/no question via input() and return their answer."""
     default_msg = "[Y/n]" if default else "[y/N]"
     while True:
         sys.stdout.write("%s %s " % (question, default_msg))
         c = input().lower().strip()
         if c == '':
             return default
         elif c in ("y", "ye", "yes"):
             return True
         elif c in ("n", "no"):
             return False
         else:
             sys.stdout.write("Please respond with yes/y or no/n\n")
+
+def process_named_running(name):
+    """ Checks if process with given name is running and returns its PID.
+    If Process is not running, return None
+    """
+    for p in psutil.process_iter():
+        if name in p.name():
+            return p.pid
+    return None
diff --git a/src/conf_mode/igmp_proxy.py b/src/conf_mode/igmp_proxy.py
index cd0704124..0e1c2c569 100755
--- a/src/conf_mode/igmp_proxy.py
+++ b/src/conf_mode/igmp_proxy.py
@@ -1,182 +1,193 @@
 #!/usr/bin/env python3
 #
 # Copyright (C) 2018 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
 # published by the Free Software Foundation.
 #
 # This program is distributed in the hope that it will be useful,
 # but WITHOUT ANY WARRANTY; without even the implied warranty of
 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 # GNU General Public License for more details.
 #
 # You should have received a copy of the GNU General Public License
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 #
 #
 
 import sys
 import os
 import jinja2
 
 from netifaces import interfaces
 from vyos.config import Config
 from vyos import ConfigError
 
 config_file = r'/etc/igmpproxy.conf'
 
 # Please be careful if you edit the template.
 config_tmpl = """
 ########################################################
 #
 # autogenerated by igmp_proxy.py
 #
 #   The configuration file must define one upstream
 #   interface, and one or more downstream interfaces.
 #
 #   If multicast traffic originates outside the
 #   upstream subnet, the "altnet" option can be
 #   used in order to define legal multicast sources.
 #   (Se example...)
 #
 #   The "quickleave" should be used to avoid saturation
 #   of the upstream link. The option should only
 #   be used if it's absolutely nessecary to
 #   accurately imitate just one Client.
 #
 ########################################################
 
 {% if not disable_quickleave -%}
 quickleave
 {% endif -%}
 
 {% for interface in interfaces %}
 # Configuration for {{ interface.name }} ({{ interface.role }} interface)
 {% if interface.role == 'disabled' -%}
 phyint {{ interface.name }} disabled
 {%- else -%}
 phyint {{ interface.name }} {{ interface.role }} ratelimit 0 threshold {{ interface.threshold }}
 {%- endif -%}
 {%- for subnet in interface.alt_subnet %}
         altnet {{ subnet }}
 {%- endfor %}
 {%- for subnet in interface.whitelist %}
         whitelist {{ subnet }}
 {%- endfor %}
 {% endfor %}
 """
 
 default_config_data = {
     'disable': False,
     'disable_quickleave': False,
     'interfaces': [],
 }
 
 def get_config():
     igmp_proxy = default_config_data
     conf = Config()
+
+    if conf.exists('protocols igmp'):
+        igmp_proxy['igmp_configured'] = True
+
+    if conf.exists('protocols pim'):
+        igmp_proxy['pim_configured'] = True
+
     if not conf.exists('protocols igmp-proxy'):
         return None
     else:
         conf.set_level('protocols igmp-proxy')
 
     # Network interfaces to listen on
     if conf.exists('disable'):
         igmp_proxy['disable'] = True
 
     # Option to disable "quickleave"
     if conf.exists('disable-quickleave'):
         igmp_proxy['disable_quickleave'] = True
 
     for intf in conf.list_nodes('interface'):
         conf.set_level('protocols igmp-proxy interface {0}'.format(intf))
         interface = {
             'name': intf,
             'alt_subnet': [],
             'role': 'downstream',
             'threshold': '1',
             'whitelist': []
         }
 
         if conf.exists('alt-subnet'):
             interface['alt_subnet'] = conf.return_values('alt-subnet')
 
         if conf.exists('role'):
             interface['role'] = conf.return_value('role')
 
         if conf.exists('threshold'):
             interface['threshold'] = conf.return_value('threshold')
 
         if conf.exists('whitelist'):
             interface['whitelist'] = conf.return_values('whitelist')
 
         # Append interface configuration to global configuration list
         igmp_proxy['interfaces'].append(interface)
 
     return igmp_proxy
 
 def verify(igmp_proxy):
     # bail out early - looks like removal from running config
     if igmp_proxy is None:
         return None
 
     # bail out early - service is disabled
     if igmp_proxy['disable']:
         return None
 
+    if 'igmp_configured' in igmp_proxy or 'pim_configured' in igmp_proxy:
+        raise ConfigError('Can not configure both IGMP proxy and PIM '\
+                          'at the same time')
+
     # at least two interfaces are required, one upstream and one downstream
     if len(igmp_proxy['interfaces']) < 2:
         raise ConfigError('Must define an upstream and at least 1 downstream interface!')
 
     upstream = 0
     for interface in igmp_proxy['interfaces']:
         if interface['name'] not in interfaces():
             raise ConfigError('Interface "{}" does not exist'.format(interface['name']))
         if "upstream" == interface['role']:
             upstream += 1
 
     if upstream == 0:
         raise ConfigError('At least 1 upstream interface is required!')
     elif upstream > 1:
         raise ConfigError('Only 1 upstream interface allowed!')
 
     return None
 
 def generate(igmp_proxy):
     # bail out early - looks like removal from running config
     if igmp_proxy is None:
         return None
 
     # bail out early - service is disabled, but inform user
     if igmp_proxy['disable']:
         print('Warning: IGMP Proxy will be deactivated because it is disabled')
         return None
 
     tmpl = jinja2.Template(config_tmpl)
     config_text = tmpl.render(igmp_proxy)
     with open(config_file, 'w') as f:
         f.write(config_text)
 
     return None
 
 def apply(igmp_proxy):
     if igmp_proxy is None or igmp_proxy['disable']:
          # IGMP Proxy support is removed in the commit
          os.system('sudo systemctl stop igmpproxy.service')
          if os.path.exists(config_file):
              os.unlink(config_file)
     else:
         os.system('sudo systemctl restart igmpproxy.service')
 
     return None
 
 if __name__ == '__main__':
     try:
         c = get_config()
         verify(c)
         generate(c)
         apply(c)
     except ConfigError as e:
         print(e)
         sys.exit(1)
diff --git a/src/conf_mode/protocols_igmp.py b/src/conf_mode/protocols_igmp.py
index 983ca4c3a..45ab78419 100755
--- a/src/conf_mode/protocols_igmp.py
+++ b/src/conf_mode/protocols_igmp.py
@@ -1,158 +1,180 @@
 #!/usr/bin/env python3
 #
 # Copyright (C) 2020 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
 # published by the Free Software Foundation.
 #
 # This program is distributed in the hope that it will be useful,
 # but WITHOUT ANY WARRANTY; without even the implied warranty of
 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 # GNU General Public License for more details.
 #
 # You should have received a copy of the GNU General Public License
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
 import jinja2
 import copy
 import os
 import vyos.validate
 from ipaddress import IPv4Address
 from sys import exit
 
 from vyos import ConfigError
 from vyos.config import Config
+from vyos.util import process_named_running
+from signal import SIGTERM
+
+# Required to use the full path to pimd, in another case daemon will not be started
+pimd_cmd = 'sudo /usr/lib/frr/pimd -d -F traditional --daemon -A 127.0.0.1'
 
 config_file = r'/tmp/igmp.frr'
 
 config_tmpl = """
 !
 {% for iface in old_ifaces -%}
 interface {{ iface }}
 {% for group in old_ifaces[iface].gr_join -%}
 {% if old_ifaces[iface].gr_join[group] -%}
 {% for source in old_ifaces[iface].gr_join[group] -%}
 no ip igmp join {{ group }} {{ source }}
 {% endfor -%}
 {% else -%}
 no ip igmp join {{ group }}
 {% endif -%}
 {% endfor -%}
 no ip igmp
 !
 {% endfor -%}
 {% for iface in ifaces -%}
 interface {{ iface }}
 {% if ifaces[iface].version -%}
 ip igmp version {{ ifaces[iface].version }}
 {% else -%}
 {# IGMP default version 3 #}
 ip igmp
 {% endif -%}
 {% if ifaces[iface].query_interval -%}
 ip igmp query-interval {{ ifaces[iface].query_interval }}
 {% endif -%}
 {% if ifaces[iface].query_max_resp_time -%}
 ip igmp query-max-response-time {{ ifaces[iface].query_max_resp_time }}
 {% endif -%}
 {% for group in ifaces[iface].gr_join -%}
 {% if ifaces[iface].gr_join[group] -%}
 {% for source in ifaces[iface].gr_join[group] -%}
 ip igmp join {{ group }} {{ source }}
 {% endfor -%}
 {% else -%}
 ip igmp join {{ group }}
 {% endif -%}
 {% endfor -%}
 !
 {% endfor -%}
 !
 """
 
 def get_config():
     conf = Config()
     igmp_conf = {
-        'igmp_conf'  : False,
+        'igmp_configured' : False,
+        'pim_configured'  : False,
         'old_ifaces' : {},
         'ifaces'     : {}
     }
     if not (conf.exists('protocols igmp') or conf.exists_effective('protocols igmp')):
         return None
 
+    if conf.exists('protocols igmp-proxy'):
+        igmp_conf['igmp_proxy_configured'] = True
+
+    if conf.exists('protocols pim'):
+        igmp_conf['pim_configured'] = True
+
     if conf.exists('protocols igmp'):
-        igmp_conf['igmp_conf'] = True
+        igmp_conf['igmp_configured'] = True
 
     conf.set_level('protocols igmp')
 
     # # Get interfaces
     for iface in conf.list_effective_nodes('interface'):
         igmp_conf['old_ifaces'].update({
             iface : {
                 'version' : conf.return_effective_value('interface {0} version'.format(iface)),
                 'query_interval' : conf.return_effective_value('interface {0} query-interval'.format(iface)),
                 'query_max_resp_time' : conf.return_effective_value('interface {0} query-max-response-time'.format(iface)),
                 'gr_join' : {}
             }
         })
         for gr_join in conf.list_effective_nodes('interface {0} join'.format(iface)):
             igmp_conf['old_ifaces'][iface]['gr_join'][gr_join] = conf.return_effective_values('interface {0} join {1} source'.format(iface, gr_join))
 
     for iface in conf.list_nodes('interface'):
         igmp_conf['ifaces'].update({
             iface : {
                 'version' : conf.return_value('interface {0} version'.format(iface)),
                 'query_interval' : conf.return_value('interface {0} query-interval'.format(iface)),
                 'query_max_resp_time' : conf.return_value('interface {0} query-max-response-time'.format(iface)),
                 'gr_join' : {}
             }
         })
         for gr_join in conf.list_nodes('interface {0} join'.format(iface)):
             igmp_conf['ifaces'][iface]['gr_join'][gr_join] = conf.return_values('interface {0} join {1} source'.format(iface, gr_join))
 
     return igmp_conf
 
 def verify(igmp):
     if igmp is None:
         return None
 
-    if igmp['igmp_conf']:
+    if 'igmp_proxy_configured' in igmp:
+        raise ConfigError('Can not configure both IGMP proxy and PIM at the same time')
+
+    if igmp['igmp_configured']:
         # Check interfaces
         if not igmp['ifaces']:
             raise ConfigError("IGMP require defined interfaces!")
         # Check, is this multicast group
         for intfc in igmp['ifaces']:
             for gr_addr in igmp['ifaces'][intfc]['gr_join']:
                 if IPv4Address(gr_addr) < IPv4Address('224.0.0.0'):
                     raise ConfigError(gr_addr + " not a multicast group")
 
 def generate(igmp):
     if igmp is None:
         return None
 
     tmpl = jinja2.Template(config_tmpl)
     config_text = tmpl.render(igmp)
     with open(config_file, 'w') as f:
         f.write(config_text)
 
     return None
 
 def apply(igmp):
     if igmp is None:
         return None
 
-    if os.path.exists(config_file):
-        os.system("sudo vtysh -d pimd -f " + config_file)
-        os.remove(config_file)
+    pim_pid = process_named_running('pimd')
+    if igmp['igmp_configured'] or igmp['pim_configured']:
+        if not pim_pid:
+            os.system(pimd_cmd)
+
+        if os.path.exists(config_file):
+            os.system('vtysh -d pimd -f ' + config_file)
+            os.remove(config_file)
+    elif pim_pid:
+        os.kill(int(pim_pid), SIGTERM)
 
     return None
 
 if __name__ == '__main__':
     try:
         c = get_config()
         verify(c)
         generate(c)
         apply(c)
     except ConfigError as e:
         print(e)
         exit(1)
diff --git a/src/conf_mode/protocols_pim.py b/src/conf_mode/protocols_pim.py
index ee5cc035f..1428c449b 100755
--- a/src/conf_mode/protocols_pim.py
+++ b/src/conf_mode/protocols_pim.py
@@ -1,178 +1,200 @@
 #!/usr/bin/env python3
 #
 # Copyright (C) 2020 VyOS maintainers and contributors
 #
 # This program is free software; you can redistribute it and/or modify
 # it under the terms of the GNU General Public License version 2 or later as
 # published by the Free Software Foundation.
 #
 # This program is distributed in the hope that it will be useful,
 # but WITHOUT ANY WARRANTY; without even the implied warranty of
 # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
 # GNU General Public License for more details.
 #
 # You should have received a copy of the GNU General Public License
 # along with this program.  If not, see <http://www.gnu.org/licenses/>.
 
 import jinja2
 import copy
 import os
 import vyos.validate
 from ipaddress import IPv4Address
 from sys import exit
 
 from vyos import ConfigError
 from vyos.config import Config
+from vyos.util import process_named_running
+from signal import SIGTERM
+
+# Required to use the full path to pimd, in another case daemon will not be started
+pimd_cmd = 'sudo /usr/lib/frr/pimd -d -F traditional --daemon -A 127.0.0.1'
 
 config_file = r'/tmp/pimd.frr'
 
 config_tmpl = """
 !
 {% for rp_addr in old_pim.rp -%}
 {% for group in old_pim.rp[rp_addr] -%}
 no ip pim rp {{ rp_addr }} {{ group }}
 {% endfor -%}
 {% endfor -%}
 {% if old_pim.rp_keep_alive -%}
 no ip pim rp keep-alive-timer {{ old_pim.rp_keep_alive }}
 {% endif -%}
 {% for iface in old_pim.ifaces -%}
 interface {{ iface }}
 no ip pim
 !
 {% endfor -%}
 {% for iface in pim.ifaces -%}
 interface {{ iface }}
 ip pim
 {% if pim.ifaces[iface].dr_prio -%}
 ip pim drpriority {{ pim.ifaces[iface].dr_prio }}
 {% endif -%}
 {% if pim.ifaces[iface].hello -%}
 ip pim hello {{ pim.ifaces[iface].hello }}
 {% endif -%}
 !
 {% endfor -%}
 {% for rp_addr in pim.rp -%}
 {% for group in pim.rp[rp_addr] -%}
 ip pim rp {{ rp_addr }} {{ group }}
 {% endfor -%}
 {% endfor -%}
 {% if pim.rp_keep_alive -%}
 ip pim rp keep-alive-timer {{ pim.rp_keep_alive }}
 {% endif -%}
 !
 """
 
 def get_config():
     conf = Config()
     pim_conf = {
-        'pim_conf' : False,
+        'pim_configured'  : False,
+        'igmp_configured' : False,
         'old_pim'  : {
             'ifaces' : {},
             'rp'     : {}
         },
         'pim' : {
             'ifaces' : {},
             'rp'     : {}
         }
     }
     if not (conf.exists('protocols pim') or conf.exists_effective('protocols pim')):
         return None
 
     if conf.exists('protocols pim'):
-        pim_conf['pim_conf'] = True
+        pim_conf['pim_configured'] = True
+
+    if conf.exists('protocols igmp-proxy'):
+        pim_conf['igmp_proxy_configured'] = True
+
+    if conf.exists('protocols igmp'):
+        pim_conf['igmp_configured'] = True
 
     conf.set_level('protocols pim')
 
     # Get interfaces
     for iface in conf.list_effective_nodes('interface'):
         pim_conf['old_pim']['ifaces'].update({
             iface : {
                 'hello' : conf.return_effective_value('interface {0} hello'.format(iface)),
                 'dr_prio' : conf.return_effective_value('interface {0} dr-priority'.format(iface))
             }
         })
 
     for iface in conf.list_nodes('interface'):
         pim_conf['pim']['ifaces'].update({
             iface : {
                 'hello' : conf.return_value('interface {0} hello'.format(iface)),
                 'dr_prio' : conf.return_value('interface {0} dr-priority'.format(iface)),
             }
         })
 
     conf.set_level('protocols pim rp')
 
     # Get RPs addresses
     for rp_addr in conf.list_effective_nodes('address'):
         pim_conf['old_pim']['rp'][rp_addr] = conf.return_effective_values('address {0} group'.format(rp_addr))
 
     for rp_addr in conf.list_nodes('address'):
         pim_conf['pim']['rp'][rp_addr] = conf.return_values('address {0} group'.format(rp_addr))
 
     # Get RP keep-alive-timer
     if conf.exists_effective('rp keep-alive-timer'):
         pim_conf['old_pim']['rp_keep_alive'] = conf.return_effective_value('rp keep-alive-timer')
     if conf.exists('rp keep-alive-timer'):
         pim_conf['pim']['rp_keep_alive'] = conf.return_value('rp keep-alive-timer')
 
     return pim_conf
 
 def verify(pim):
     if pim is None:
         return None
 
-    if pim['pim_conf']:
+    if 'igmp_proxy_configured' in pim:
+        raise ConfigError('Can not configure both IGMP proxy and PIM at the same time')
+
+    if pim['pim_configured']:
         # Check interfaces
         if not pim['pim']['ifaces']:
             raise ConfigError("PIM require defined interfaces!")
 
         if not pim['pim']['rp']:
             raise ConfigError("RP address required")
 
         # Check unique multicast groups
         uniq_groups = []
         for rp_addr in pim['pim']['rp']:
             if not pim['pim']['rp'][rp_addr]:
                 raise ConfigError("Group should be specified for RP " + rp_addr)
             for group in pim['pim']['rp'][rp_addr]:
                 if (group in uniq_groups):
                     raise ConfigError("Group range " + group + " specified cannot exact match another")
 
                 # Check, is this multicast group
                 gr_addr = group.split('/')
                 if IPv4Address(gr_addr[0]) < IPv4Address('224.0.0.0'):
                     raise ConfigError(group + " not a multicast group")
 
             uniq_groups.extend(pim['pim']['rp'][rp_addr])
 
 def generate(pim):
     if pim is None:
         return None
 
     tmpl = jinja2.Template(config_tmpl)
     config_text = tmpl.render(pim)
     with open(config_file, 'w') as f:
         f.write(config_text)
 
     return None
 
 def apply(pim):
     if pim is None:
         return None
 
-    if os.path.exists(config_file):
-        os.system("sudo vtysh -d pimd -f " + config_file)
-        os.remove(config_file)
+    pim_pid = process_named_running('pimd')
+    if pim['igmp_configured'] or pim['pim_configured']:
+        if not pim_pid:
+            os.system(pimd_cmd)
+
+        if os.path.exists(config_file):
+            os.system('vtysh -d pimd -f ' + config_file)
+            os.remove(config_file)
+    elif pim_pid:
+        os.kill(int(pim_pid), SIGTERM)
 
     return None
 
 if __name__ == '__main__':
     try:
         c = get_config()
         verify(c)
         generate(c)
         apply(c)
     except ConfigError as e:
         print(e)
         exit(1)