<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Bizzare issue with DHCP Relay - ASA5510 in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746127#M1008988</link>
    <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we recently upgraded our DNS/DHCP servers with newer hardware and more up-to-date version of Linux. &lt;/P&gt;&lt;P&gt;The previous servers were not behind a firewall. The current servers are placed behind our ASA5510 appliance, and we have set up translations and access lists accordingly (please see config).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we switched to the new servers.. and discovered that a number of our ADSL clients can NOT obtain an IP from the DHCP server behind the firewall, UNLESS: we have them assign their IP address to their PC or router statically; then if they switch back to dynamic IP they can obtain that same IP no problem. &lt;/P&gt;&lt;P&gt;Just to isolate the issue, we put the DHCP server on the outside and the problem went away (of course, we can't leave it on the outside for any extended amounts of time).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I debugged DHCP relay, I can see that the firewall is passing the requests, and the DHCP server is replying, but the client never gets an IP unless we statically assign it first.&lt;/P&gt;&lt;P&gt;(In other words, "exchange complete" is the part that is missing prior to us having the customer statically assign the IP first).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 11 Mar 2019 09:52:55 GMT</pubDate>
    <dc:creator>spejic</dc:creator>
    <dc:date>2019-03-11T09:52:55Z</dc:date>
    <item>
      <title>Bizzare issue with DHCP Relay - ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746127#M1008988</link>
      <description>&lt;P&gt;Hello all,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;we recently upgraded our DNS/DHCP servers with newer hardware and more up-to-date version of Linux. &lt;/P&gt;&lt;P&gt;The previous servers were not behind a firewall. The current servers are placed behind our ASA5510 appliance, and we have set up translations and access lists accordingly (please see config).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So we switched to the new servers.. and discovered that a number of our ADSL clients can NOT obtain an IP from the DHCP server behind the firewall, UNLESS: we have them assign their IP address to their PC or router statically; then if they switch back to dynamic IP they can obtain that same IP no problem. &lt;/P&gt;&lt;P&gt;Just to isolate the issue, we put the DHCP server on the outside and the problem went away (of course, we can't leave it on the outside for any extended amounts of time).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I debugged DHCP relay, I can see that the firewall is passing the requests, and the DHCP server is replying, but the client never gets an IP unless we statically assign it first.&lt;/P&gt;&lt;P&gt;(In other words, "exchange complete" is the part that is missing prior to us having the customer statically assign the IP first).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Please help!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; &lt;/P&gt;&lt;P&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 11 Mar 2019 09:52:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746127#M1008988</guid>
      <dc:creator>spejic</dc:creator>
      <dc:date>2019-03-11T09:52:55Z</dc:date>
    </item>
    <item>
      <title>Re: Bizzare issue with DHCP Relay - ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746128#M1008993</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;hostname ASA5510&lt;/P&gt;&lt;P&gt;domain-name xxx.com&lt;/P&gt;&lt;P&gt;enable password xxx&lt;/P&gt;&lt;P&gt;names&lt;/P&gt;&lt;P&gt;name 10.185.225.254 NEXTGEN&lt;/P&gt;&lt;P&gt;name 10.185.225.21 NS1&lt;/P&gt;&lt;P&gt;name 10.185.225.22 NS2&lt;/P&gt;&lt;P&gt;name 10.185.225.101 DNS1&lt;/P&gt;&lt;P&gt;name 10.185.225.110 DNS2&lt;/P&gt;&lt;P&gt;dns-guard&lt;/P&gt;&lt;P&gt;interface Ethernet0/0&lt;/P&gt;&lt;P&gt; nameif outside&lt;/P&gt;&lt;P&gt; security-level 0&lt;/P&gt;&lt;P&gt; ip address 123.x.x.150 255.255.255.0&lt;/P&gt;&lt;P&gt;interface Ethernet0/1&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; nameif inside&lt;/P&gt;&lt;P&gt; security-level 100&lt;/P&gt;&lt;P&gt; ip address 192.168.110.1 255.255.255.0&lt;/P&gt;&lt;P&gt;interface Ethernet0/2&lt;/P&gt;&lt;P&gt; nameif DMZ&lt;/P&gt;&lt;P&gt; security-level 50&lt;/P&gt;&lt;P&gt; ip address 10.185.225.1 255.255.255.0&lt;/P&gt;&lt;P&gt;interface Ethernet0/3&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;interface Management0/0&lt;/P&gt;&lt;P&gt; shutdown&lt;/P&gt;&lt;P&gt; no nameif&lt;/P&gt;&lt;P&gt; no security-level&lt;/P&gt;&lt;P&gt; no ip address&lt;/P&gt;&lt;P&gt;ftp mode passive&lt;/P&gt;&lt;P&gt;object-group network WEBFTPSERVERS&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.140&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.141&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.142&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.143&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.144&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.145&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.151&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.152&lt;/P&gt;&lt;P&gt;object-group network DNSSERVERS&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.21&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.22&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.10&lt;/P&gt;&lt;P&gt; network-object host 123.185.225.1&lt;/P&gt;&lt;P&gt;object-group service WEB_FTP tcp&lt;/P&gt;&lt;P&gt; port-object eq www&lt;/P&gt;&lt;P&gt; port-object eq ftp&lt;/P&gt;&lt;P&gt; port-object eq ftp-data&lt;/P&gt;&lt;P&gt;object-group service DNS_DHCP_RADIUS udp&lt;/P&gt;&lt;P&gt; port-object eq domain&lt;/P&gt;&lt;P&gt; port-object eq bootpc&lt;/P&gt;&lt;P&gt; port-object eq radius&lt;/P&gt;&lt;P&gt; port-object eq radius-acct&lt;/P&gt;&lt;P&gt; port-object eq bootps&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit tcp any object-group WEBFTPSERVERS object&lt;/P&gt;&lt;P&gt;-group WEB_FTP log&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit udp any object-group DNSSERVERS object-gr&lt;/P&gt;&lt;P&gt;oup DNS_DHCP_RADIUS&lt;/P&gt;&lt;P&gt;access-list OUTSIDE-IN extended permit icmp any any&lt;/P&gt;&lt;P&gt;access-list DMZ-OUT extended permit ip any any&lt;/P&gt;&lt;P&gt;mtu outside 1500&lt;/P&gt;&lt;P&gt;mtu inside 1500&lt;/P&gt;&lt;P&gt;mtu DMZ 1500&lt;/P&gt;&lt;P&gt;ip verify reverse-path interface outside&lt;/P&gt;&lt;P&gt;ip audit name ProtectUs attack action alarm drop reset&lt;/P&gt;&lt;P&gt;ip audit interface outside ProtectUs&lt;/P&gt;&lt;P&gt;no failover&lt;/P&gt;&lt;P&gt;arp timeout 14400&lt;/P&gt;&lt;P&gt;global (outside) 1 123.185.225.139&lt;/P&gt;&lt;P&gt;nat (DMZ) 1 10.185.225.0 255.255.255.0&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.140 10.185.225.140 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.141 10.185.225.141 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.142 10.185.225.142 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.143 10.185.225.143 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.144 10.185.225.144 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.145 10.185.225.145 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.151 10.185.225.151 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.152 10.185.225.152 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.21 NS1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.22 NS2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.1 DNS1 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;static (DMZ,outside) 123.185.225.10 DNS2 netmask 255.255.255.255&lt;/P&gt;&lt;P&gt;access-group OUTSIDE-IN in interface outside&lt;/P&gt;&lt;P&gt;access-group DMZ-OUT out interface DMZ&lt;/P&gt;&lt;P&gt;route outside 0.0.0.0 0.0.0.0 123.185.225.125 1&lt;/P&gt;&lt;P&gt;timeout xlate 3:00:00&lt;/P&gt;&lt;P&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;/P&gt;&lt;P&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00&lt;/P&gt;&lt;P&gt;timeout mgcp-pat 0:05:00 sip 0:30:00 sip_media 0:02:00&lt;/P&gt;&lt;P&gt;no snmp-server enable&lt;/P&gt;&lt;P&gt;telnet timeout 5&lt;/P&gt;&lt;P&gt;ssh timeout 5&lt;/P&gt;&lt;P&gt;console timeout 0&lt;/P&gt;&lt;P&gt;dhcprelay server DNS2 DMZ&lt;/P&gt;&lt;P&gt;dhcprelay enable outside&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;class-map inspection_default&lt;/P&gt;&lt;P&gt; match default-inspection-traffic&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;policy-map global_policy&lt;/P&gt;&lt;P&gt; class inspection_default&lt;/P&gt;&lt;P&gt;  inspect dns maximum-length 512&lt;/P&gt;&lt;P&gt;  inspect ftp&lt;/P&gt;&lt;P&gt;  inspect h323 h225&lt;/P&gt;&lt;P&gt;  inspect h323 ras&lt;/P&gt;&lt;P&gt;  inspect netbios&lt;/P&gt;&lt;P&gt;  inspect rsh&lt;/P&gt;&lt;P&gt;  inspect rtsp&lt;/P&gt;&lt;P&gt;  inspect skinny&lt;/P&gt;&lt;P&gt;  inspect esmtp&lt;/P&gt;&lt;P&gt;  inspect sqlnet&lt;/P&gt;&lt;P&gt;  inspect sunrpc&lt;/P&gt;&lt;P&gt;  inspect tftp&lt;/P&gt;&lt;P&gt;  inspect sip&lt;/P&gt;&lt;P&gt;  inspect xdmcp&lt;/P&gt;&lt;P&gt;  inspect http&lt;/P&gt;&lt;P&gt;  inspect icmp&lt;/P&gt;&lt;P&gt;!&lt;/P&gt;&lt;P&gt;service-policy global_policy global&lt;/P&gt;&lt;P&gt;: end&lt;/P&gt;&lt;P&gt;ASA5510#&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Mar 2007 14:47:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746128#M1008993</guid>
      <dc:creator>spejic</dc:creator>
      <dc:date>2007-03-28T14:47:58Z</dc:date>
    </item>
    <item>
      <title>Re: Bizzare issue with DHCP Relay - ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746129#M1008998</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;This sounds like a bug, but we are not aware of any known issues in this area.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would suggest opening a TAC case so it can be further diagnosed. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But you will need to get a capture of the dhcp-relay packets on both interfaces (using the capture feature).  And collect both a bad, and good (when users first static the ip) captures.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can also post the capture here and I will try to take a quick look.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sincerely,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;David.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Mar 2007 20:42:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746129#M1008998</guid>
      <dc:creator>David White</dc:creator>
      <dc:date>2007-03-30T20:42:21Z</dc:date>
    </item>
    <item>
      <title>Re: Bizzare issue with DHCP Relay - ASA5510</title>
      <link>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746130#M1009001</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi David, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;thank you for your reply!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was hoping the issue was simply a mistake I made configuring the appliance; but if you think it might be a bug, then I will assume there's nothing wrong with the config (everything else works properly behind the firewall).&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;We had no choice but to put our DHCP server on the outside and harden the Linux system.&lt;/P&gt;&lt;P&gt;We'll have to leave it like this for now, as we can't afford any more customer downtime.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Therefore, I won't be able to perform packet capture any time soon..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;but thanks very much for your offer!!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sean&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 30 Mar 2007 21:35:16 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bizzare-issue-with-dhcp-relay-asa5510/m-p/746130#M1009001</guid>
      <dc:creator>spejic</dc:creator>
      <dc:date>2007-03-30T21:35:16Z</dc:date>
    </item>
  </channel>
</rss>

