cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
316
Views
3
Helpful
9
Replies

/23 subnet only getting IP addresses for the fist /24

Martin
Level 1
Level 1

Ok so this is a very strange one.

I have the 1117-4p i have got SVIs 10,20,30,40,100 setup on it they all have an IP-Helper address pointing to my DHCP server.

so VLANS 20,30,40,100 are all /24 and clients pick up IPs fine

VLAN 10 is /23 but only clients in the first //24 get IPs any client thats got a static IP in the second /24 does not get an IP.

This all works when i put the old router back in, but not with the 1117. So must be to do with the config, which i will paste below

Current configuration : 8738 bytes
!
! Last configuration change at 00:14:59 UTC Fri Jul 26 2024 by Marty
!
version 16.12
service timestamps debug datetime msec
service timestamps log datetime msec
platform qfp utilization monitor load 80
platform punt-keepalive disable-kernel-core
!
hostname MartyNet-ISR
!
boot-start-marker
boot-end-marker
!
!
enable secret 9 xxxxxx
!
aaa new-model
!
!
aaa authentication login default line
aaa authentication login CON local line
aaa authentication login VTY local line
aaa authorization exec default local if-authenticated
!
!
!
!
!
!
aaa session-id common
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
no destination transport-method email
!
!
!
!
login on-success log
!
!
!
!
!
!
!
subscriber templating
multilink bundle-name authenticated
!
!
!
crypto pki trustpoint TP-self-signed-1250376790
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-1250376790
revocation-check none
rsakeypair TP-self-signed-1250376790
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
!
crypto pki certificate chain TP-self-signed-1250376790
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 31323530 33373637 3930301E 170D3234 30373235 32333234
35325A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D31 32353033
37363739 30308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100C859 4821F105 08444A41 A3458F89 1C6ACB19 946D31EB 8AD9D65B
05A19673 A5203272 48690035 BD82D454 F99336C6 08CE30E4 A5C7D0E3 CBA335FC
9D7F67B5 1231EBAC C15E3379 8F4AA11D F6761378 F8CF38D0 FA6A3B2B 3682889C
2B70B2E6 317F8B55 41816402 2AC20975 CCBA4532 23811FBC 6E56EF7F BBF08C0C
1CAE485D 691799DF 4D50A309 0A599CCE 5A145327 FD9F005F 68F6181D BF480E08
71D78025 8D613F92 CD722C2B 8EE643C6 ABB4D9AD B0086482 9226EE79 BD913043
F7CD7197 9DC530FE DA268582 DEC608AA C17DCC13 60746937 FA21D4C2 2FAF89C9
602E0326 5B9C4A94 E7FE76D3 F717E776 0FA0AABF 4A819EDA FF6BB127 96125BED
0E1817BA AD430203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 141B7A3B 88C77511 65B0974B 186C577D 96C05156
84301D06 03551D0E 04160414 1B7A3B88 C7751165 B0974B18 6C577D96 C0515684
300D0609 2A864886 F70D0101 05050003 82010100 2BCF0AAA 35FE94E9 F1B06AFF
398BD4E0 99C74D02 87376D74 0204CF97 55C2520B 7059AD06 B2FA22E1 B0356EA6
3ED3B68D DB8AFEA3 090166F7 F8F4E2FE 4B1D1ABF 6015F70E 715DAC7F ABEA8437
9EAE6E4F 725781BF 8851A986 4DE504AA 91E841AA 54074A69 A166722D 1D39059F
EFACD224 398A7378 FBE4B5E4 1EA8E40B 3CBE2C78 84BCBEEE 808709B0 6F70EF4C
E397331D A2CB373C 3C8B3EB9 1D89E4CF A298D7BD 1AD7B06D B1A40D1C 27852EBD
88A8AEC4 E65374EA FE2B8CCF B5599E5F B74C81D1 B134C4EF 162E3323 DD412066
74B209FF 482DAE33 A7CB1E32 32DDC1A4 A77927B0 22763D96 29B456FE 3A305EB9
4DC7D989 204CC5A0 5421148E FB9DE6DD A18B759F
quit
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
!
crypto pki certificate pool
cabundle nvram:ios_core.p7b
!
!
license udi pid C1117-4P sn FCZ2443R5JJ
memory free low-watermark processor 70177
!
diagnostic bootup level minimal
!
spanning-tree extend system-id
!
username Marty privilege 15 secret 9 xxxxx
!
redundancy
mode none
!
controller VDSL 0/2/0
!
!
vlan internal allocation policy ascending
!
!
!
!
!
!
interface GigabitEthernet0/0/0
description BT Internet
no ip address
ip mtu 1492
ip nbar protocol-discovery
ip nat outside
ip tcp adjust-mss 1452
negotiation auto
pppoe enable group global
pppoe-client dial-pool-number 1
!
interface GigabitEthernet0/1/0
description Link to Switch port t Gi
switchport trunk allowed vlan 10,20,30,40,100
switchport mode trunk
ip dhcp relay information trusted
spanning-tree portfast trunk
!
interface GigabitEthernet0/1/1
description Link to Switch port t Gi
switchport trunk allowed vlan 10,20,30,40,100
switchport mode trunk
ip dhcp relay information trusted
spanning-tree portfast trunk
!
interface GigabitEthernet0/1/2
description Link to Switch port t Gi
switchport trunk allowed vlan 10,20,30,40,100
switchport mode trunk
spanning-tree portfast trunk
!
interface GigabitEthernet0/1/3
description Link to Switch port t Gi
switchport trunk allowed vlan 10,20,30,40,100
switchport mode trunk
spanning-tree portfast trunk
!
interface ATM0/2/0
no ip address
atm oversubscribe factor 2
no atm enable-ilmi-trap
!
interface Ethernet0/2/0
no ip address
no negotiation auto
!
interface Vlan1
no ip address
shutdown
!
interface Vlan10
description MartyNet
ip address 10.10.10.1 255.255.254.0
ip helper-address 10.10.100.30
ip nat inside
!
interface Vlan20
description KidsNet
ip address 10.10.20.1 255.255.255.0
ip helper-address 10.10.100.30
ip nat inside
!
interface Vlan30
description IoT
ip address 10.10.30.1 255.255.255.0
ip helper-address 10.10.100.30
ip nat inside
!
interface Vlan40
description X-Lights
ip address 10.10.40.1 255.255.255.0
ip helper-address 10.10.100.30
ip nat inside
!
interface Vlan100
description Management
ip address 10.10.100.1 255.255.255.0
ip helper-address 10.10.100.30
ip nat inside
!
interface Dialer1
description BT Internet
ip address negotiated
ip nat outside
encapsulation ppp
ip tcp adjust-mss 1452
dialer pool 1
dialer idle-timeout 0
dialer persistent
dialer-group 1
ppp mtu adaptive
ppp authentication chap callin
ppp chap hostname btxxxxxx.com
ppp chap password 0 password
ppp ipcp dns request
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip nat inside source route-map track-primary-if interface Dialer1 overload
ip nat inside source list 10 interface Dialer1 overload
ip route 0.0.0.0 0.0.0.0 Dialer1
!
!
!
ip access-list standard 10
10 permit 10.10.10.0 0.0.0.255
20 permit 10.10.20.0 0.0.0.255
30 permit 10.10.30.0 0.0.0.255
40 permit 10.10.40.0 0.0.0.255
50 deny any
ip access-list extended 197
dialer-list 1 protocol ip permit
!
!
route-map track-primary-if permit 1
match ip address 197
set interface Dialer1
!
!
!
!
!
control-plane
!
!
line con 0
exec-timeout 0 0
logging synchronous
login authentication VTY
transport input none
stopbits 1
line vty 0 4
exec-timeout 0 0
logging synchronous
login authentication VTY
!
!
!
!
!
!
end

 

and here is the diagram

Martin_0-1722013114014.png

 

 

Also is there any guides on setting up IPv6 on this when the provider uses dynamic addressing

 

Many thanks

9 Replies 9

It subnet conflict 

Need to correct vlan 10 subnet

Make it 10.10.100.0

Or 

Dhcp subnet mask not correct in Dhcp

MHM

making VLAN 10 10.10.100.0 would overlap with VLAN 100

And the server is fine as i mentioned it works perfect with old router which i have connected back in for now

From dhcp ping any IP from IP's that failed to assign 

If you failed to ping then check route in router or SW this dhcp server connect to' does it have prefix with correct mask

And again please check dhcp server subnet mask' sometime admin do some change effect all network.

MHM

Hello


@Martin wrote:

VLAN 10 is /23 but only clients in the first //24 get IPs any client thats got a static IP in the second /24 does not get an IP


 

By the looks of it that /23 isnt overlapping any other L3 subnet so its possible the DHCP scope isn't set to a /23 range and only a /24


Please rate and mark as an accepted solution if you have found any of the information provided useful.
This then could assist others on these forums to find a valuable answer and broadens the community’s global network.

Kind Regards
Paul

DHCP server is fine as its working now with the old router connected, its only when i connect the new router

AliDoskii
Level 1
Level 1

It would be much better if you provide diagram with your question for better visibility of your concern.

Martin
Level 1
Level 1

its fixed, it was to do with the NAT access list

ip access-list standard 10
10 permit 10.10.10.0 0.0.0.255
20 permit 10.10.20.0 0.0.0.255
30 permit 10.10.30.0 0.0.0.255
40 permit 10.10.40.0 0.0.0.255
50 deny any

Line 10 permit 10.10.10.0 0.0.0.255 should of been 0.0.2.255

or i just added another line 15 permit 10.10.11.0 0.0.0.255

Thanks for the help guys, can anyone help with the second part about setting up IPv6 on it with dynamic assidhnment from BT?

 

Hello @Martin ,

you actually had an issue with NAT not an issue with the DHCP server. 

with your previous config of the ACL used by NAT devices in 10.10.11.0/24 the second half of your 10.10.10.0/23 were not able to go to the internet.

As you have noted this does not mean the hosts didn't get an IP address in the /23.

Hope to help

Giuseppe

 

Yes did realise that. It did originally look like it was a dhcp issue but should have checked into it more then clicked and then saw the issue but again thanks everyone. Just need to get my head around IPv6 and get it set up

Review Cisco Networking for a $25 gift card