07-06-2013 10:50 PM - edited 03-07-2019 02:16 PM
Hello,
I am trying to set DHCP snooping in a network of cisco and hp procurve switches
All switches is connected via 802.1q trunk interfaces,
Lots of VLANS defined
Default VLAN changed to 199
Static-IP clients works, but DHCP clients cannot obtain IP adress
Is there any special consideration for this case?
Example of Cisco Sw config:
ip dhcp snooping vlan 1-99
ip dhcp snooping
interface GigabitEthernet4/1
switchport trunk native vlan 199
switchport mode trunk
ip dhcp snooping trust
Example of HP Sw config:
vlan 1
name "DEFAULT_VLAN"
untagged A1-A4,B1-B24,E1-E4,F1-F24,G1-G4,H1-H24
exit
vlan 2
no ip address
tagged A2
exit
dhcp-snooping
dhcp-snooping authorized-server 10.0.71.74
dhcp-snooping vlan 1
interface A2
dhcp-snooping trust
exit
09-04-2017 12:58 AM
Hi, it's may be too late to write in this post, but i have the same problem, did you found a solution?
I have HP Procurve 2530 switches trunked to cisco WS-C3750X core switch, my DHCP servers aren't in those networks (hosted outside), without dhcp snooping it works but with it activated no IP got by DHCP.
I am wondering if i must configure option 82 in the dhcp servers (Windows 2012 R2 Std)
Thanks for your reply.
09-04-2017 03:43 AM
Hi,
You should not need to configure anything specific regarding Option-82 on your Windows DHCP servers; in fact, the only thing that is expected from your DHCP servers is to ignore the value of this option when assigning an IP address to the client, and include the complete Option-82 exactly as received in their reply.
It has been a known issue, however, that Windows DHCP servers do not handle Option-82 properly; if my memory serves me well, they simply do not respond to packets with Option-82 at all. Disabling the insertion of the Option-82 helps in those cases.
However, let's not jump to conclusions. Can you describe your network in more detail? In particular,
Best regards,
Peter
09-04-2017 06:13 AM
Hi,
Thanks for reply, these are answers to points you asked me :
Could you please tell me if i must configure dhcp-snooping and Relay-Agent also on the Cisco core switches or it's not necessary.
The purpose of all that is to activate ARP protect in the switches, I can't go on without fixing the first step (DHCP Snooping).
Thanks a lot for the reply.
09-04-2017 06:19 AM
09-04-2017 10:55 AM
Hello,
Thank you for your response.
Can you perhaps post the complete configuration of your testing switch where you are testing the DHCP Snooping? I suspect that we should start from there, as everything either breaks or starts working based on the DHCP Snooping configured on that switch. Please also include exact information about the port where the client is connected, and the uplink ports that connect to the core switches.
Also, if there is a chance of performing the Wireshark capture on the DHCP server, that would be also very helpful.
Could you please tell me if i must configure dhcp-snooping and Relay-Agent also on the Cisco core switches or it's not necessary.
That is certainly not necessary. DHCP Snooping should only be used on access layer switches; it has no purpose on distribution or core switches if the DHCP packets have already been validated at the access layer. As for DHCP Relay Agent, it cannot be activated arbitrarily - it should be configured only on the default gateway of the VLAN where the DHCP clients live (the ip helper-address command).
Best regards,
Peter
10-23-2017 08:04 AM
I actually have the same setup and the same issue. The problem is with the authorized servers. I have added the DHCP servers to the authorized list. DHCP renew work fine because the request is first unicast to the known DHCP IP address. However, new leases aren't handled that way. They are broadcast requests, that are then picked up by the relay agent and forwarded to the DHCP servers. Herein lies the issue. The IP address that the switch receives in the return packet is the gateway address. Basically, from what I have seen so far, you will need to add all of your gateways (VLAN interface IP on your router that is setup with IP-Helper) to the authorized IP address list. For me, this is way to inconvenient. I am researching to see if the relay agent can return the DHCP server IP address.
For now, I have removed all authorized servers from the list. This makes the HP switch only use the trusted port setting, allowing any DHCP ACKs from the trusted port no matter what the IP. This is a bit flawed as you may get a rogue DHCP server on a VLAN that is assigned to a switch that does not have DHCP-Snooping enabled. Once all your switches are setup with DHCP-Snooping, you should be fine.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide