cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
17841
Views
0
Helpful
7
Replies

DHCP client on Wan not obtaining IP

magnetnetworks
Level 1
Level 1

I have a new 861 router here.  The setup was initially done via CCP Express. I've also downloaded CCP and gone through the configuration with that. The machine will not obtain an IP address on the fe4 WAN port. I've tested it on several networks with different dhcp servers. The first was a LAN running a pfsense firewall as the dhcp server. No IP obtained. The next is my home network. Connected direct to my ADSL modem, no IP obtained from the service provider. I've also tried on the office LAN which is running a Windows dhcp server and no go there as well.  Everything seems to be set up properly. I run "show ip int brief" and the interface indicated it is to obtain it's IP from dhcp but never does.

I've gone through the setup on the command line which seems fairly straight forward. I've hard coded the IP address of the fe4 port and tested connectivity to the office network. The port is functional and NAT works when it's set up with a static IP. The interface always shows status up/up.

I need to use DHCP with this service provider. Has anyone seen this behaviour before? Can anyone make any recommendations on what to try?

Any help appreciated.

1 Accepted Solution

Accepted Solutions

Hi Rob,

This could be due to  ZBF not allowing DHCP messages into the router preventing it from obtaining IP.

Check the link :

https://supportforums.cisco.com/message/882283#882283

The same scenario was faced and the issue was resolved by creating a rule to allow DHCP ports.

Making the following changes in the CCP will help.

source/destination ANY
service name -
services to add - bootps
action - Permit ACL

Configuring ZBF using CCP is explained in the link below:

http://www.cisco.com/en/US/products/ps9422/products_configuration_example09186a0080b5a105.shtml

View solution in original post

7 Replies 7

cadet alain
VIP Alumni
VIP Alumni

hi,

Can you post the running config:  show run will do the trick.

Regards.

Alain.

Don't forget to rate helpful posts.

Here is my running config


Building configuration...

Current configuration : 7093 bytes
!
! Last configuration change at 15:16:39 PCTime Sun Mar 6 2011 by admin
! NVRAM config last updated at 15:04:54 PCTime Sun Mar 6 2011 by cisco
!
version 15.0
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime show-timezone
service timestamps log datetime msec localtime show-timezone
service password-encryption
service sequence-numbers
!
hostname Router
!
boot-start-marker
boot-end-marker
!
logging buffered 51200
logging console critical
enable secret 5 $1$KL2N$LoENB4j3egNpYhLvIzMzj/
!
no aaa new-model
memory-size iomem 10
clock timezone PCTime -8
clock summer-time PCTime date Apr 6 2003 2:00 Oct 26 2003 2:00
!
crypto pki trustpoint TP-self-signed-3642671360
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-3642671360
revocation-check none
rsakeypair TP-self-signed-3642671360
!
!
crypto pki certificate chain TP-self-signed-3642671360
certificate self-signed 01
  3082024F 308201B8 A0030201 02020101 300D0609 2A864886 F70D0101 04050030
  31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
  69666963 6174652D 33363432 36373133 3630301E 170D3933 30333031 30303030
  34365A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
  4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D33 36343236
  37313336 3030819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
  8100A52C 26C037A2 73BEABE9 EB4DB0A1 6973E7B0 8545DDCB C7496BC7 7EF00EFA
  87E7E642 FFAC537D EF3ACD78 33C1128D 0967D86D 70FC9026 FC295827 AD9FAC6B
  6A97F4E2 0DC60D50 93B8BDE1 CAC8A4AE 8912DFA9 DE59CF3D 333DB3FE 539572E3
  CF68F529 26EC38E4 811F3B99 5C488B9C 5155F4FA 4C47C49B A818731F 724BB7F1
  08750203 010001A3 77307530 0F060355 1D130101 FF040530 030101FF 30220603
  551D1104 1B301982 17796F75 726E616D 652E796F 7572646F 6D61696E 2E636F6D
  301F0603 551D2304 18301680 148359DD 58250F69 4306BC0C A618F901 E911C3CE
  D8301D06 03551D0E 04160414 8359DD58 250F6943 06BC0CA6 18F901E9 11C3CED8
  300D0609 2A864886 F70D0101 04050003 8181000D 0936F00A 80679412 903A443B
  AEEBAD9C 5F037561 CC6270FA D54B9EE3 4289E7A9 31BA3E58 17ACC6CF B83ED5B1
  CF8B2073 F914F254 626F4C21 2A1C12C3 33C53DAC A9B207E0 ABCAFB88 312329DA
  C57D0635 C9352BC5 8B8D72CF 456E758F 1F31ABAB 4A45EEFB 0D938EED 20A836DF
  B7D4ECAC 090A992D FB65C9A4 41BEE33C 3A4A0F
   quit
no ip source-route
!
!
ip dhcp excluded-address 172.16.29.1 172.16.29.99
ip dhcp excluded-address 172.16.29.201 172.16.29.254
!
ip dhcp pool ccp-pool1
   import all
   network 172.16.29.0 255.255.255.0
   dns-server 10.16.48.15
   default-router 172.16.29.1
!
!
ip cef
no ip bootp server
ip domain name allpoints.local
ip name-server 10.16.48.15
!
!
license udi pid CISCO861-K9 sn FGL150820ZK
!
!
username admin privilege 15 secret 5 $1$BxzS$S9AbUyGtHa2QtuevsiUz81
!
!
ip tcp synwait-time 10
ip ssh time-out 60
ip ssh authentication-retries 2
!
class-map type inspect match-any ccp-cls-insp-traffic
match protocol cuseeme
match protocol dns
match protocol ftp
match protocol h323
match protocol https
match protocol icmp
match protocol imap
match protocol pop3
match protocol shell
match protocol realmedia
match protocol rtsp
match protocol smtp
match protocol sql-net
match protocol streamworks
match protocol tftp
match protocol vdolive
match protocol tcp
match protocol udp
class-map type inspect match-all ccp-insp-traffic
match class-map ccp-cls-insp-traffic
class-map type inspect match-any ccp-cls-icmp-access
match protocol icmp
match protocol tcp
match protocol udp
class-map type inspect match-all ccp-invalid-src
match access-group 100
class-map type inspect match-all ccp-icmp-access
match class-map ccp-cls-icmp-access
class-map type inspect match-all ccp-protocol-http
match protocol http
!
!
policy-map type inspect ccp-permit-icmpreply
class type inspect ccp-icmp-access
  inspect
class class-default
  pass
policy-map type inspect ccp-inspect
class type inspect ccp-invalid-src
  drop log
class type inspect ccp-protocol-http
  inspect
class type inspect ccp-insp-traffic
  inspect
class class-default
  drop
policy-map type inspect ccp-permit
class class-default
  drop
!
zone security out-zone
zone security in-zone
zone-pair security ccp-zp-self-out source self destination out-zone
service-policy type inspect ccp-permit-icmpreply
zone-pair security ccp-zp-in-out source in-zone destination out-zone
service-policy type inspect ccp-inspect
zone-pair security ccp-zp-out-self source out-zone destination self
service-policy type inspect ccp-permit
!
!
!
!
!
!
!
interface FastEthernet0
!
interface FastEthernet1
!
interface FastEthernet2
!
interface FastEthernet3
!
interface FastEthernet4
description $FW_OUTSIDE$$ES_WAN$
ip address dhcp client-id FastEthernet4
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
ip nat outside
ip virtual-reassembly
zone-member security out-zone
duplex auto
speed auto
!
interface Vlan1
description $ETH-SW-LAUNCH$$INTF-INFO-HWIC 4ESW$$ES_LAN$$FW_INSIDE$
ip address 172.16.29.1 255.255.255.0
no ip redirects
no ip unreachables
no ip proxy-arp
ip flow ingress
ip nat inside
ip virtual-reassembly
zone-member security in-zone
ip tcp adjust-mss 1452
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip http timeout-policy idle 60 life 86400 requests 10000
!
ip nat inside source list 1 interface FastEthernet4 overload
ip route 0.0.0.0 0.0.0.0 10.16.48.2
!
logging trap debugging
access-list 1 remark INSIDE_IF=Vlan1
access-list 1 remark CCP_ACL Category=2
access-list 1 permit 172.16.29.0 0.0.0.255
access-list 100 remark CCP_ACL Category=128
access-list 100 permit ip host 255.255.255.255 any
access-list 100 permit ip 127.0.0.0 0.255.255.255 any
access-list 100 permit ip 10.16.48.0 0.0.0.255 any
no cdp run

!
control-plane
!
banner exec ^C
% Password expiration warning.
-----------------------------------------------------------------------

Cisco Configuration Professional (Cisco CP) is installed on this device
and it provides the default username "cisco" for  one-time use. If you have
already used the username "cisco" to login to the router and your IOS image
supports the "one-time" user option, then this username has already expired.
You will not be able to login to the router with this username after you exit
this session.

It is strongly suggested that you create a new username with a privilege level
of 15 using the following command.

username privilege 15 secret 0

Replace and with the username and password you
want to use.

-----------------------------------------------------------------------
^C
banner login ^CAuthorized access only!
Disconnect IMMEDIATELY if you are not an authorized user!^C
!
line con 0
login local
no modem enable
transport output telnet
line aux 0
login local
transport output telnet
line vty 0 4
privilege level 15
login local
transport input telnet ssh
!
scheduler max-task-time 5000
scheduler allocate 4000 1000
scheduler interval 500
end

I reconfigured from scratch again. The system works fine so long as the WAN is a static IP. I had it running and was able to access the outside from the lan. Changed the wan interface from static to DHCP and boom no connection. This is my first time dealing with IOS and I must be missing something when it comes to the dhcp client.

Her eis the output from the troubleshooter

WAN troubleshooting report details

Router Details

AttributeValue
Router Model861
Image Namec860-universalk9-mz.150-1.M4.bin
IOS Version15.0(1)M4
HostnameRouter

Interface Details

AttributeValue
InterfaceFastEthernet4
IP addressDynamic IP
Description

Test Activity Summary

ActivityStatus
Checking interface status...Up
Checking for DNS settings...Successful
Checking interface IP address..Failed

Test Activity Details

ActivityStatus
Checking interface status...Up
    Interface physical status :Up
    Line protocol status :Up
Checking for DNS settings...Successful
    DNS lookup set :Yes
    Statically configured DNS servers : 10.16.48.15
    Dynamically imported DNS servers :None
Checking interface IP address..Failed
    Interface IP address :Not assigned/received
    Interface IP address Type :Dynamic

Troubleshooting Results


Failure Reason(s)Recommended Action(s)
No IP address for the interface has been obtained. The interface is configured to obtain an IP address through DHCP. The remote end may not be configured with a DHCP server or the DHCP pool may be empty.Please contact your ISP or WAN administrator and check if the server has been configured to lease IP address to the clients connection through DHCP. Retest connection.

Rob.

Can you try configuring the dhcp server IP statically with " ip dhcp server " statement.

I don't see an "ip dhcp server" command option.

I ran config, then ip dhcp-server 172.16.48.5  then exit and saved. Restarted the machine same result, no IP address assigned.

Rob

Hi Rob,

This could be due to  ZBF not allowing DHCP messages into the router preventing it from obtaining IP.

Check the link :

https://supportforums.cisco.com/message/882283#882283

The same scenario was faced and the issue was resolved by creating a rule to allow DHCP ports.

Making the following changes in the CCP will help.

source/destination ANY
service name -
services to add - bootps
action - Permit ACL

Configuring ZBF using CCP is explained in the link below:

http://www.cisco.com/en/US/products/ps9422/products_configuration_example09186a0080b5a105.shtml

Thank you. You hit the nail on the head. Problem solved.

The following thread was also helpful practically identical to my problem

.https://supportforums.cisco.com/thread/2012714?referring_site=kapi

Rob

Hi Rob,

Glad that it worked.

Please mark the post as answered and rate helpful posts.

Thanks.