<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Can I configure an ASA5505 to listen to relayed DHCP requests. in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184151#M351376</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I agree with you - the DHCP messages need to come from the hosts themselves.&amp;nbsp; I put the little WLAN controller in transparent mode, and the hosts still did not get an IP Address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then removed the WLAN controller from the equation.&amp;nbsp; Simply plugging in a host to one of the ports on the ASA does the trick, but still, no IP address via DHCP on the host.&amp;nbsp; I can assign a static address and it works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I guess the question is... is this a supported configuration?&amp;nbsp; The commands are available in the ASA, so I would assume that is supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This isn't a firewall that is part of an enterprise network.&amp;nbsp; It has a cable modem on one end, and is for guests that come in to our business.&amp;nbsp; Our layer 8 has requested that we use our enterprise DHCP server instead of the one built in to the ASA, and the management interface is there simply so I can SSH in to the box.&amp;nbsp; The management interface is also there for the DHCP, but that wasn't in initial reason I put it there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for posting my config - it is quite a bare bones setup without much complexity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hostname ASA-Guest-internet&lt;BR /&gt;domain-name guest.com&lt;BR /&gt;enable password Xejxdftnh2wxqfff encrypted&lt;BR /&gt;passwd XejxZFyhjuixqfff encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan80&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.57.1 255.255.255.0 &lt;BR /&gt; !&lt;BR /&gt;interface Vlan240&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.47.240.225 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport access vlan 240&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name guest.com&lt;BR /&gt;access-list outside_in extended permit icmp any any echo-reply &lt;BR /&gt;access-list outside_in extended deny ip any any log &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging console debugging&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-625-53.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;route management 10.100.100.100 255.255.255.255 10.47.240.1 1&lt;BR /&gt;route management 10.57.3.10 255.255.255.255 10.47.240.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ (management) host 10.100.100.100&lt;BR /&gt;key ************&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcprelay server 10.57.3.10 management&lt;BR /&gt;dhcprelay enable inside&lt;BR /&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;tftp-server management 10.57.240.5 testlab_ASA&lt;BR /&gt;webvpn&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;username testlab password c23.VFGsxHlpvDf encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DD"&gt;https://tools.cisco.com/its/service/oddce/services/DD&lt;/A&gt;&lt;BR /&gt;CEService&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:4878ddf939954eb1dfa88f415963000&lt;BR /&gt;: end&lt;BR /&gt;ASA-Guest-internet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 24 Apr 2013 16:30:58 GMT</pubDate>
    <dc:creator>tdennehy</dc:creator>
    <dc:date>2013-04-24T16:30:58Z</dc:date>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184145#M351370</link>
      <description>&lt;P&gt;I'll start out with the fact I work mostly with Wi-Fi and not a lot in the security realm... so please pardon my ignorance for a few moments...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;/P&gt;&lt;P&gt;Here's my setup:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ASA5505&amp;nbsp; ---------------- WS-C3560 --------tagged----------WLC2106&amp;nbsp; -------------------------------AIR-LAP1142------------------wireless laptop client&lt;/P&gt;&lt;P&gt;(DHCP SERVER)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (simple config)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (dhcp proxy disabled)&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; (is requesting dhcp from ASA)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If I plug my workstation into the 3560, my wired client adapter can get an IP address.&amp;nbsp; But the WLAN adapter will not when associated to WLAN.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Usually this is not a problem since you may only have two access points on the controller and a dozen or so hosts.&amp;nbsp; In my case, however, I want to put a few of the ports on the 3560 into the same VLAN as the WLAN on the 2106 so I can give them the same guest access as the WLAN.&amp;nbsp; The hosts plugged into the 3560 get an IP address without issue from the ASA.&amp;nbsp; When I disable dhcp proxy, the WLAN clients get an IP address, but then the APs cannot get an IP address from the internal DHCP server on the WLAN controller, and&amp;nbsp; cease to function when rebooted since they cannot get to the controller without an IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Anyone know if there is a way to configure the ASA to accept the modified DHCP packets from the WLAN controller?&amp;nbsp; It appears to me that the ASA is not able to accept DHCP relayed packets...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;</description>
      <pubDate>Tue, 12 Mar 2019 01:32:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184145#M351370</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2019-03-12T01:32:01Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184146#M351371</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi, &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Quick answer is no, is not able to. If there is a way to put the WLAN as transparent, some sort of like a bridge, that I think It would work, but this scenario, is not possible yet. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;"Clients must be directly connected to the security appliance and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;cannot send requests through another relay agent or a router"&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008075fcfb.shtml"&gt;http://www.cisco.com/en/US/products/ps6120/products_configuration_example09186a008075fcfb.shtml&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Mike Rojas.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 22 Apr 2013 03:20:10 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184146#M351371</guid>
      <dc:creator>Maykol Rojas</dc:creator>
      <dc:date>2013-04-22T03:20:10Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184147#M351372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;&lt;BR /&gt;Any idea why these commands are available?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcprelay server 10.57.10.10 management&lt;/P&gt;&lt;P&gt;dhcp enable inside&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route management 10.57.10.10 255.255.255.255 10.47.240.1 (the 10.47.240 network is routed mgmt)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Apr 2013 23:11:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184147#M351372</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-23T23:11:21Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184148#M351373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;That configuration is supposed to relay the DHCP related broadcast traffic coming to "inside" interface to the actual DHCP server behind "management" as unicast messages.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Much like the "ip helper-address" on Cisco routers.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;It wont however forward already relayed requests/messages with that configuration. That traffic would simply be allowed through the firewall to the actual server with ACL rules to my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Apr 2013 23:14:37 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184148#M351373</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-23T23:14:37Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184149#M351374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I configured the management interface on the ASA to be on our production network so I could manage the device from afar.&amp;nbsp; The device is only for our guest traffic and is going to be attached to a cable modem on the outside and on the inside, a few wired hosts and our guest wlan mapped to that guest vlan.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Problem lies with DHCP.&amp;nbsp; Layer 8 wants IP addresses for guests to come from interprise server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I used the route command to configure the management interface to be a host on our management network.&amp;nbsp; It works fine, and I can use that to ssh to the device from afar.&amp;nbsp; No problems.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then read more of the config guide.. turns out there is a dhcp relay built in to the ASA.&amp;nbsp; I configured it as follows:&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;dhcprelay server 10.57.10.10 management&lt;/P&gt;&lt;P&gt;dhcp enable inside&lt;/P&gt;&lt;P&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;route management 10.57.10.10 255.255.255.255 10.47.240.1 (the 10.47.240 network is routed mgmt)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After I enter in those commands, I can ping the dhcp server from the ASA.&amp;nbsp; Still broken, though.&amp;nbsp; Client does not get IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I can ping the dhcp server from the managment interface, but cannot ping it from the itside interface.&amp;nbsp; If the ASA has a relay built in, am I misconfiguring it?&amp;nbsp; Am I missing something?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Apr 2013 23:20:14 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184149#M351374</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-23T23:20:14Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184150#M351375</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When using the above DHCP Relay configuration on the ASA then the DHCP requests/messages have to come directly from the hosts themselves and they cant be messages relayed by some other network device before ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If some other device is receiving the DHCP request/messages before the ASA and relaying them, then&amp;nbsp; they should be relayed to the DHCP server directly to my understanding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also, the ICMP not reaching the DHCP server from the ASA inside might simply be due to some other configurations.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Like missing ACL statements to allow that traffic or some NAT configuration.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or not activating ICMP Inspection on the ASA&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;fixup protocol icmp error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Tue, 23 Apr 2013 23:37:36 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184150#M351375</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-23T23:37:36Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184151#M351376</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I agree with you - the DHCP messages need to come from the hosts themselves.&amp;nbsp; I put the little WLAN controller in transparent mode, and the hosts still did not get an IP Address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I then removed the WLAN controller from the equation.&amp;nbsp; Simply plugging in a host to one of the ports on the ASA does the trick, but still, no IP address via DHCP on the host.&amp;nbsp; I can assign a static address and it works fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So I guess the question is... is this a supported configuration?&amp;nbsp; The commands are available in the ASA, so I would assume that is supported.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This isn't a firewall that is part of an enterprise network.&amp;nbsp; It has a cable modem on one end, and is for guests that come in to our business.&amp;nbsp; Our layer 8 has requested that we use our enterprise DHCP server instead of the one built in to the ASA, and the management interface is there simply so I can SSH in to the box.&amp;nbsp; The management interface is also there for the DHCP, but that wasn't in initial reason I put it there.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Sorry for posting my config - it is quite a bare bones setup without much complexity.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;hostname ASA-Guest-internet&lt;BR /&gt;domain-name guest.com&lt;BR /&gt;enable password Xejxdftnh2wxqfff encrypted&lt;BR /&gt;passwd XejxZFyhjuixqfff encrypted&lt;BR /&gt;names&lt;BR /&gt;!&lt;BR /&gt;interface Vlan1&lt;BR /&gt;shutdown&lt;BR /&gt;no nameif&lt;BR /&gt;no security-level&lt;BR /&gt;no ip address&lt;BR /&gt;!&lt;BR /&gt;interface Vlan2&lt;BR /&gt;nameif outside&lt;BR /&gt;security-level 0&lt;BR /&gt;ip address dhcp setroute &lt;BR /&gt;!&lt;BR /&gt;interface Vlan80&lt;BR /&gt;nameif inside&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 192.168.57.1 255.255.255.0 &lt;BR /&gt; !&lt;BR /&gt;interface Vlan240&lt;BR /&gt;nameif management&lt;BR /&gt;security-level 100&lt;BR /&gt;ip address 10.47.240.225 255.255.255.0 &lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/0&lt;BR /&gt;switchport access vlan 2&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/1&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/2&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/3&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/4&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/5&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/6&lt;BR /&gt;switchport access vlan 80&lt;BR /&gt;!&lt;BR /&gt;interface Ethernet0/7&lt;BR /&gt;switchport access vlan 240&lt;BR /&gt;!&lt;BR /&gt;ftp mode passive&lt;BR /&gt;dns server-group DefaultDNS&lt;BR /&gt;domain-name guest.com&lt;BR /&gt;access-list outside_in extended permit icmp any any echo-reply &lt;BR /&gt;access-list outside_in extended deny ip any any log &lt;BR /&gt;pager lines 24&lt;BR /&gt;logging console debugging&lt;BR /&gt;mtu outside 1500&lt;BR /&gt;mtu inside 1500&lt;BR /&gt;mtu management 1500&lt;BR /&gt;no failover&lt;BR /&gt;icmp unreachable rate-limit 1 burst-size 1&lt;BR /&gt;asdm image disk0:/asdm-625-53.bin&lt;BR /&gt;no asdm history enable&lt;BR /&gt;arp timeout 14400&lt;BR /&gt;global (outside) 1 interface&lt;BR /&gt;nat (inside) 1 0.0.0.0 0.0.0.0&lt;BR /&gt;access-group outside_in in interface outside&lt;BR /&gt;route management 10.100.100.100 255.255.255.255 10.47.240.1 1&lt;BR /&gt;route management 10.57.3.10 255.255.255.255 10.47.240.1 1&lt;BR /&gt;timeout xlate 3:00:00&lt;BR /&gt;timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 icmp 0:00:02&lt;BR /&gt;timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00&lt;BR /&gt;timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00&lt;BR /&gt;timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute&lt;BR /&gt;timeout tcp-proxy-reassembly 0:01:00&lt;BR /&gt;dynamic-access-policy-record DfltAccessPolicy&lt;BR /&gt;aaa-server TACACS+ protocol tacacs+&lt;BR /&gt;aaa-server TACACS+ (management) host 10.100.100.100&lt;BR /&gt;key ************&lt;BR /&gt;aaa authentication telnet console LOCAL &lt;BR /&gt;aaa authentication ssh console LOCAL &lt;BR /&gt;aaa authentication serial console LOCAL &lt;BR /&gt;aaa authentication enable console LOCAL &lt;BR /&gt;aaa authentication http console LOCAL &lt;BR /&gt;aaa authorization command LOCAL &lt;BR /&gt;no snmp-server location&lt;BR /&gt;no snmp-server contact&lt;BR /&gt;snmp-server enable traps snmp authentication linkup linkdown coldstart&lt;BR /&gt;crypto ipsec security-association lifetime seconds 28800&lt;BR /&gt;crypto ipsec security-association lifetime kilobytes 4608000&lt;BR /&gt;telnet timeout 5&lt;BR /&gt;ssh 10.0.0.0 255.0.0.0 management&lt;BR /&gt;ssh timeout 5&lt;BR /&gt;console timeout 0&lt;BR /&gt;dhcprelay server 10.57.3.10 management&lt;BR /&gt;dhcprelay enable inside&lt;BR /&gt;dhcprelay timeout 60&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;threat-detection basic-threat&lt;BR /&gt;threat-detection statistics access-list&lt;BR /&gt;no threat-detection statistics tcp-intercept&lt;BR /&gt;tftp-server management 10.57.240.5 testlab_ASA&lt;BR /&gt;webvpn&lt;BR /&gt; anyconnect-essentials&lt;BR /&gt;username testlab password c23.VFGsxHlpvDf encrypted privilege 15&lt;BR /&gt;!&lt;BR /&gt;class-map inspection_default&lt;BR /&gt; match default-inspection-traffic&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;policy-map type inspect dns preset_dns_map&lt;BR /&gt; parameters&lt;BR /&gt;&amp;nbsp; message-length maximum client auto&lt;BR /&gt;&amp;nbsp; message-length maximum 512&lt;BR /&gt;policy-map global_policy&lt;BR /&gt;class inspection_default&lt;BR /&gt;&amp;nbsp; inspect dns preset_dns_map &lt;BR /&gt;&amp;nbsp; inspect ftp &lt;BR /&gt;&amp;nbsp; inspect h323 h225 &lt;BR /&gt;&amp;nbsp; inspect h323 ras &lt;BR /&gt;&amp;nbsp; inspect ip-options &lt;BR /&gt;&amp;nbsp; inspect netbios &lt;BR /&gt;&amp;nbsp; inspect rsh &lt;BR /&gt;&amp;nbsp; inspect rtsp &lt;BR /&gt;&amp;nbsp; inspect skinny&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect esmtp &lt;BR /&gt;&amp;nbsp; inspect sqlnet &lt;BR /&gt;&amp;nbsp; inspect sunrpc &lt;BR /&gt;&amp;nbsp; inspect tftp &lt;BR /&gt;&amp;nbsp; inspect sip&amp;nbsp; &lt;BR /&gt;&amp;nbsp; inspect xdmcp &lt;BR /&gt;&amp;nbsp; inspect icmp &lt;BR /&gt;&amp;nbsp; inspect icmp error &lt;BR /&gt;!&lt;BR /&gt;service-policy global_policy global&lt;BR /&gt;prompt hostname context &lt;BR /&gt;call-home&lt;BR /&gt; profile CiscoTAC-1&lt;BR /&gt;&amp;nbsp; no active&lt;BR /&gt;&lt;SPAN&gt;destination address http &lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="https://tools.cisco.com/its/service/oddce/services/DD"&gt;https://tools.cisco.com/its/service/oddce/services/DD&lt;/A&gt;&lt;BR /&gt;CEService&lt;BR /&gt;&lt;SPAN&gt;&amp;nbsp; destination address email &lt;/SPAN&gt;&lt;A class="jive-link-email-small" href="mailto:callhome@cisco.com"&gt;callhome@cisco.com&lt;/A&gt;&lt;BR /&gt;&amp;nbsp; destination transport-method http&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group diagnostic&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group environment&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group inventory periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group configuration periodic monthly&lt;BR /&gt;&amp;nbsp; subscribe-to-alert-group telemetry periodic daily&lt;BR /&gt;Cryptochecksum:4878ddf939954eb1dfa88f415963000&lt;BR /&gt;: end&lt;BR /&gt;ASA-Guest-internet&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Apr 2013 16:30:58 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184151#M351376</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-24T16:30:58Z</dc:date>
    </item>
    <item>
      <title>Re: Can I configure an ASA5505 to listen to relayed DHCP request</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184152#M351377</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Can you try adding this NAT configuration just to be sure that NAT is not an issue&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list INSIDE-NAT0 permit ip 192.168.57.0 255.255.255.0 10.57.3.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;nat (inside) 0 access-list INSIDE-NAT0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Could you also make sure (double check) that in your production network which to my understanding is behind the ASA &lt;STRONG&gt;"management"&lt;/STRONG&gt; interface that it has a route for the network 192.168.57.0/24 towards the ASA &lt;STRONG&gt;"management"&lt;/STRONG&gt; interface IP address of 10.47.240.225&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Also add this configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;same-security-traffic permit inter-interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is required for hosts behind 2 interfaces of equal "security-level" to communicate with eachother&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Apr 2013 17:19:42 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184152#M351377</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-24T17:19:42Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184153#M351378</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I added the NAT configuration. No change.&lt;/P&gt;&lt;P&gt;Added the same-security-traffic statement, and no change.&lt;/P&gt;&lt;P&gt;I did NOT enter a command into the core switch pointing towards 10.47.240.225 since that might require a change request, layer 8, etc.&lt;/P&gt;&lt;P&gt;I can ping and traceroute to the dhcp server from the ASA5505. &lt;/P&gt;&lt;P&gt;I put a dhcp scope on the neighboring switch , and I could get IP addresses via DHCP on the inside interface of the ASA from that switch. I pointed the ASA using the dhcprelay server command to the management IP of the switch, and put it there.&lt;/P&gt;&lt;P&gt;What I would like to do is try a little debugging on the ASA to see if the DHCP discover packet goes out the management interface and never returns. Not exactly sure how to do that, though. I can run wireshark on the PC, but not sure what that will get me.&lt;/P&gt;&lt;P&gt;At this point I think you are correct - it certainly sounds like I need a route pointing back to the management interface. I was always under the impression that if a DHCP packet went out an interface, it would find its way back somehow.&lt;/P&gt;&lt;P&gt;Any idea how I can prove that with debugging? &lt;/P&gt;&lt;P&gt;I really appreciate your help. I'm the WLAN Engineer and don't usually work on security/routing.&lt;/P&gt;&lt;P&gt;Thanks in advance!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 24 Apr 2013 23:56:11 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184153#M351378</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-24T23:56:11Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184154#M351379</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think the return routing might be the issue.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can run a capture on the ASA itself and copy the captured data as a file which you can open with Wireshark.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess you could first try this capture configuration&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DHCP-CAPTURE permit udp 192.168.57.0 255.255.255.0 host 10.57.3.10&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;access-list DHCP-CAPTURE permit udp host 10.57.3.10 192.168.57.0 255.255.255.0&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;capture DHCP-CAPTURE type raw-data access-list DHCP-CAPTURE interface management buffer 1000000 circular-buffer&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Guess you could try that configuration. I presume the ASA should use the "inside" interface IP address as the source address for the DHCP unicast to the DHCP server. And this should match some scope on the DHCP server?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt; I am also pretty green in pretty common areas of networking since I just manage firewalls and vpn devices among some routing/switching. When it comes to wireless I am clueless &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use this command to show all captures on the ASA and also confirm that some traffic is even captured&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use this command to show the capture contents of a specific named capture&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show capture DHCP-CAPTURE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use this command to copy the capture as .pcap file to a remote host with TFTP&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&lt;SPAN&gt;copy /pcap capture:DHCP-CAPTURE t&lt;/SPAN&gt;&lt;A class="jive-link-external-small" href="ftp://x.x.x.x/DHCP-CAPTURE.pcap"&gt;ftp://x.x.x.x/DHCP-CAPTURE.pcap&lt;/A&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;After that you can check the capture contents on your PC with Wireshark directly. I find it alot clearer than looking at the ouput of the "show capture &lt;CAPTURENAME&gt;" command.&lt;/CAPTURENAME&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can use the following command to remove the capture and its contents (doesnt naturally remove the ACL)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;no capture DHCP-CAPTURE&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Hope this helps &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 00:09:35 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184154#M351379</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-25T00:09:35Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184155#M351380</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I tried something else this morning. I put a DHCP scope on the switch that the ASA connects to the management interface. I notice that when I plug my laptop into one of the ASAs inside ports, it does not get an IP address via the management interface. I looked at the dhcp bindings in the little switch and notice that the switch thinks it handed out an IP address since it has a binding.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I issue ipconfig on the laptop, it does not have an address.&lt;/P&gt;&lt;P&gt;My only guess is the packet makes it to the DHCP server once, and then somewhere it gets eaten. I am wondering if it is getting blocked by the ASA on the management interface.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 20:48:46 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184155#M351380</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-25T20:48:46Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184156#M351381</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;This is what 8.2 Configuration Guide says about restrictions related to DHCP Relay&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;PRE __jive_macro_name="quote" class="jive_text_macro jive_macro_quote"&gt;&lt;H3&gt; Configuring DHCP Relay Services &lt;/H3&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1115816"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; A DHCP relay agent allows the ASA to forward DHCP requests from clients to a router connected to a different interface. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1115817"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; The following restrictions apply to the use of the DHCP relay agent: &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1115818"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;The relay agent cannot be enabled if the DHCP server feature is also enabled. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1115822"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;DHCP clients must be directly connected to the ASA and cannot send requests through another relay agent or a router. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1115823"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;For multiple context mode, you cannot enable DHCP relay on an interface that is used by more than one context. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1115827"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;DHCP&amp;nbsp; Relay services are not available in transparent firewall mode. A ASA in&amp;nbsp; transparent firewall mode only allows ARP traffic through; all other&amp;nbsp; traffic requires an access list. To allow DHCP requests and replies&amp;nbsp; through the ASA in transparent mode, you need to configure two access&amp;nbsp; lists, one that allows DCHP requests from the inside interface to the&amp;nbsp; outside, and one that allows the replies from the server in the other&amp;nbsp; direction. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1115831"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; •&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="19" /&gt;When&amp;nbsp; DHCP relay is enabled and more than one DHCP relay server is defined,&amp;nbsp; the security appliance forwards client requests to each defined DHCP&amp;nbsp; relay server. Replies from the servers are also forwarded to the client&amp;nbsp; until the client DHCP relay binding is removed. The binding is removed&amp;nbsp; when the security appliance receives any of the following DHCP messages:&amp;nbsp; ACK, NACK, or decline. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;IMG src="http://www.cisco.com/en/US/i/templates/note.gif" /&gt;&lt;/P&gt;&lt;HR /&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;
&lt;A name="wp1115832"&gt;&lt;/A&gt;&lt;/P&gt;&lt;P&gt; &lt;STRONG&gt;Note &lt;/STRONG&gt;&lt;IMG border="0" height="2" src="http://www.cisco.com/en/US/i/templates/blank.gif" width="1" /&gt;You&amp;nbsp; cannot enable DHCP Relay on an interface running DHCP Proxy. You must&amp;nbsp; Remove VPN DHCP configuration first or you will see an error message.&amp;nbsp; This error happens if both DHCP relay and DHCP proxy are enabled. Ensure&amp;nbsp; that either DHCP relay or DHCP proxy are enabled, but not both. &lt;/P&gt;&lt;/PRE&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Souce:&lt;/P&gt;&lt;P&gt;&lt;A class="jive-link-external-small" href="http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/dhcp.html#wp1115812"&gt;http://www.cisco.com/en/US/docs/security/asa/asa82/configuration/guide/dhcp.html#wp1115812&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;For example I have an ASA5505 at home. It has WAN,LAN and WLAN interfaces.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am currently running DHCP Server on the WLAN interface&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Trying to even start configuring DHCP Relay gives me this warning.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;ASA(config)# dhcprelay enable LAN&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;DHCPRA: can't enable DHCP Relay when DHCPD is running on any interface&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Use the 'no dhcpd enable &lt;SERVER_IFC&gt;' command&lt;/SERVER_IFC&gt;&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; on any interface that has been enabled.&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;dhcprelay command failed&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So my understanding you cant even configure DHCP Relay + DHCP Server on the ASA at the sametime. I got the picture that you were trying to configure DHCP Server on "management" interface and perhaps DHCP Relay on the "inside" ?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 21:05:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184156#M351381</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-25T21:05:02Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184157#M351382</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I only want DHCP to be on the server behind the management interface.&amp;nbsp; I thought the dhcprelay server command tells the ASA where to find the server - in my case, "go look for 10.57.3.10 behind the management interface".&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was thinking that hosts on 192.168.57.0/24 inside interface would dhcp broadcast for an ip address, and the ASA would hear it and shove that request out the management interface and hopefully it would make it to the dhcp server, get and address, and then continue to the internet via the inside interface, going to the internet via the outside interface.&amp;nbsp; The management interface is only so I can get to the box from the production network, and get IP addresses from the enterprise server.&lt;/P&gt;&lt;P&gt;dhcprelay server 10.57.3.10 management&lt;BR /&gt;dhcprelay enable inside&lt;BR /&gt;dhcprelay timeout 60&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 21:29:41 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184157#M351382</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-25T21:29:41Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184158#M351383</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, you mentioned this before.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;But did you confirm if any DHCP request was forwarded out the "management" interface with the capture?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Have you confirmed if the production network has a route for the "inside" network of the ASA pointing towards the "management" interface?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess those were the points to look out for. I would imagine the DHCP Relay should work just fine but I am not sure if the network past the ASA "management" interface has all the required configurations (routing) to make it work.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 21:34:00 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184158#M351383</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-25T21:34:00Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184159#M351384</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; I *sort of* confirmed that a DHCP request went out the management interface because I disconnected all cabling except the cable from the ASA's management port to the switch port where I put a temporary DHCP scope.&amp;nbsp; Then I plugged the laptop into a port on the ASA and I noticed that, via console connection to the switch, that the DHCP binding was in the switch, but the laptop still had no IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I would like to get the network to work with the ASA on the bench and the DHCP scope on the switch on the bench.&amp;nbsp; That way at least when I put it near the production network I will know that "it did work" once... even if it was only on the bench.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The way I see it, if I can't get it working on the bench, it will much more difficult to get it working out in the field...&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I must be missing an ACL or something!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 21:48:02 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184159#M351384</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-25T21:48:02Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184160#M351385</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You sure that it was not some old binding left on the switch?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Basically the only time I have used this in a production enviroment was this.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;The customer had xDSL connections from us to 2 different sites&lt;/LI&gt;&lt;LI&gt;These connections were taken as L2 all the way to our Multiple Context Mode FWSM inside a single Security Context&lt;/LI&gt;&lt;LI&gt;The Security Context had an "outside" interface and the 2 "inside" interfaces named based on their location&lt;/LI&gt;&lt;LI&gt;One of the sites had originally its own DHCP server&lt;/LI&gt;&lt;LI&gt;Other site for some time was using staticly configured IP addresses on the hosts&lt;/LI&gt;&lt;LI&gt;They wanted to start using the other sites DHCP server for the previously staticly configured site&lt;/LI&gt;&lt;LI&gt;We configure the DHCP Relay between these FWSM interfaces and they were able to use the other sites DHCP server for both of their sites&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I guess the simplest way to test if DHCP Relay was working would be to attach 2 hosts to the ASA5505. One on the "management" and one on the "inside" interface. Configure the DHCP Relay just like you have. Configure the other host as DHCP server (or even use a network device as the DHCP server). And configure the "inside" host to use DHCP to aquire IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Then you could first test if it works. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If it doesnt then you can either try to use the debug commands to define what the problem is&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;debug dhcprelay event&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;debug dhcprelay packet&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;debug dhcprelay error&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Or you could do the traffic/packet capture on the ASA to see if traffic is actually leaving the "management" interface for the DHCP server and if anything is coming back.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 25 Apr 2013 22:00:43 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184160#M351385</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-25T22:00:43Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184161#M351386</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt; Yes, I am sure it was not an old binding, unfortunately.&amp;nbsp; I cleared the bindings several times just to prove I am clinically insane and should be commited.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think next week (today is Friday for me) I am doing to do exactly what you just stated.&amp;nbsp; Use my laptop host to get on outside switch where I have the dummy dhcp scope and test to make sure I get an address.&amp;nbsp; Then move it closer to the ASA, then inside the ASA and see if it works.&amp;nbsp; Then move the dhcp server/switch "away" from the ASA and see where it breaks.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I am starting to think you are correct about not having a route back.&amp;nbsp; The routing resource was not available this week..&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I think that I don't fully understand the difference between ping and dhcp.&amp;nbsp; If my management interface can ping and traceroute to the production dhcp, then why can't a dhcp packet find its way to the dhcp server and then back again.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for all your help so far.&amp;nbsp; I'll know more next week.&amp;nbsp; It is time for me to head out...for a well-deserved three day weekend...&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 02:52:05 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184161#M351386</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-26T02:52:05Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184162#M351387</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;If you are talking about sending ICMP Echo from the ASA directly to the DHCP server then this will naturally work as ASA will source the ICMP with its "management" interface IP address. And since this interface IP address is part of a link network between some production device and the ASA then naturally the production network device sees the network as directly connected and has a return route for the ICMP Echo-reply back to the ASA "management" interface.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;However, if the ASA is acting as a DHCP Relay then it will probably send the unicast DHCP messages with a source address of the "inside" interface IP address, NOT the management. &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;To my understanding this works the same way with Cisco router and "ip helper-address" configuration. The unicast DHCP messages are source with the IP address of the interface where the "ip helper-address" is configured in. This could be compared with the "dhcprelay enable inside" which uses the "inside" interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;So this is why I think you need to have a return route for the ASA "inside" network from the DHCP server.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 03:08:56 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184162#M351387</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-26T03:08:56Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184163#M351388</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I believe you are correct about everything.&amp;nbsp; I believe the initial discovery packet is hitting the dhcp server since it is sourced from the ASA's inside interface, and the configuration points to the dhcp server with the dhcprelay command out the management interface.&amp;nbsp; So the dhcp server gets the first packet and replies, but the network doesn't know what to do with it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;The management interface of the ASA is on the same network as all the switches' management interfaces.&amp;nbsp; The interfaces we SSH to in order to configure the switches - so no other users/hosts are on it.&amp;nbsp; That was the logical place to connect the management interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;When I SSH to the core switch and issue "sho ip route", I do not have a route to the 192.168.57.0/24 network in the list because the network does not know about it.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I tried to put an ip helper-address on the management SVI of the core switch pointing to the DHCP server, and of course, that did not work since I did not configure the dhcprelay command to go to the SVI.&amp;nbsp; I still think it would not have worked because the source was the inside interface of the ASA.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Now that I know I have to put an ip route on the core switch - I am not sure where to point the route.&amp;nbsp; If my inside interface is ip address 192.168.57.1/24 and my management ip address 10.47.240.225/24, do you know if I point the ip route to the management host address, or just to the management network itself?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.57.0 255.255.255.0 10.47.240.225&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;or &lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;ip route 192.168.57.0 255.255.255.0 10.47.240.0&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Again, thanks for all your help!&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 16:22:53 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184163#M351388</guid>
      <dc:creator>tdennehy</dc:creator>
      <dc:date>2013-04-26T16:22:53Z</dc:date>
    </item>
    <item>
      <title>Can I configure an ASA5505 to listen to relayed DHCP requests.</title>
      <link>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184164#M351389</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You would configure the static route for the "inside" network to point to the Interface IP address of "management" on the ASA. As that is the next hop towards the "inside" network. I would suggest that just to be thorough, you go through the routing all the way from the DHCP server to the ASA so that you know that the routing is fine.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As I said before I have only used this in the environment with 2 customer xDSL sites connected L2 to the same firewall. This already meant that everything worked wihtout adding any routes as the return traffic always found its way to the firewall (DHCP servers default gateway = firewall interface IP address) and from there back to the host asking for the IP address.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I hope the information has indeed helped. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;You can naturally rate the answer(s) if you have felt them to be of help. Thats the best way to encourage people to keep on helping and answering here on the forums. Naturally if at some point you feel that you have gotten the correct answer that solved the original question, please mark that question as the correct answer at the bottom of that reply. &lt;SPAN __jive_emoticon_name="happy" __jive_macro_name="emoticon" class="jive_macro jive_emote" src="https://community.cisco.com/4.5.4/images/emoticons/happy.gif"&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Naturally you can ask more if needed. Will try to answer if I can.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;- Jouni&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Fri, 26 Apr 2013 17:13:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/can-i-configure-an-asa5505-to-listen-to-relayed-dhcp-requests/m-p/2184164#M351389</guid>
      <dc:creator>Jouni Forss</dc:creator>
      <dc:date>2013-04-26T17:13:57Z</dc:date>
    </item>
  </channel>
</rss>

