cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
2733
Views
5
Helpful
6
Replies

DHCP Snooping between Cisco and HP Switches

recep.sefer
Level 1
Level 1

Hello,

I am trying to set DHCP snooping in a network of cisco and hp procurve switches

All switches is connected via 802.1q trunk interfaces,

Lots of VLANS defined                  

Default VLAN changed to 199

Static-IP clients works, but DHCP clients cannot obtain IP adress

Is there any special consideration for this case?

Example of Cisco Sw config:

ip dhcp snooping vlan 1-99

ip dhcp snooping

interface GigabitEthernet4/1

switchport trunk native vlan 199

switchport mode trunk

ip dhcp snooping trust

Example of HP Sw config:

vlan 1

   name "DEFAULT_VLAN"

   untagged A1-A4,B1-B24,E1-E4,F1-F24,G1-G4,H1-H24

   exit

vlan 2

   no ip address

   tagged A2

   exit

dhcp-snooping

dhcp-snooping authorized-server 10.0.71.74

dhcp-snooping vlan 1

interface A2

   dhcp-snooping trust

   exit

6 Replies 6

higrungies
Level 1
Level 1

Hi, it's may be too late to write in this post, but i have the same problem, did you found a solution?

I have HP Procurve 2530 switches trunked to cisco WS-C3750X core switch, my DHCP servers aren't in those networks (hosted outside), without dhcp snooping it works but with it activated no IP got by DHCP.

I am wondering if i must configure option 82 in the dhcp servers (Windows 2012 R2 Std)

 

Thanks for your reply.

Hi,

You should not need to configure anything specific regarding Option-82 on your Windows DHCP servers; in fact, the only thing that is expected from your DHCP servers is to ignore the value of this option when assigning an IP address to the client, and include the complete Option-82 exactly as received in their reply.

It has been a known issue, however, that Windows DHCP servers do not handle Option-82 properly; if my memory serves me well, they simply do not respond to packets with Option-82 at all. Disabling the insertion of the Option-82 helps in those cases.

However, let's not jump to conclusions. Can you describe your network in more detail? In particular,

  • You have Cat3750 and HP switches. Which of these switches are access layer switches, and which are distribution layer switches?
  • What exact switches are configured with DHCP Snooping?
  • What exact switches are configured as DHCP Relay Agents?
  • By any chance, do you have an option of running Wireshark on your DHCP servers to see whether the client DHCP packets arrive to the DHCP servers when you have the DHCP Snooping activated?

Best regards,
Peter

Hi,

Thanks for reply, these are answers to points you asked me :

  • You have Cat3750 and HP switches. Which of these switches are access layer switches, and which are distribution layer switches?  I have 7 production access HP switches Cat3750-24 + 1 testing switch (total of 8), each one is connected (by 1 truncked interface) to 2 cisco core switches with HSRP configured. those Cisco core switches are connected to our hoster Wan link.
  • What exact switches are configured with DHCP Snooping? I configured the testing switch.
  • What exact switches are configured as DHCP Relay Agents? The same testing switch.
  • By any chance, do you have an option of running Wireshark on your DHCP servers to see whether the client DHCP packets arrive to the DHCP servers when you have the DHCP Snooping activated? yes I'll do it this afternoon.

Could you please tell me if i must configure dhcp-snooping and Relay-Agent also on the Cisco core switches or it's not necessary.

The purpose of all that is to activate ARP protect in the switches, I can't go on without fixing the first step (DHCP Snooping).

 

Thanks a lot for the reply.

An important point i have to clarify, DHCP servers are hosted outside the LAN, DHCP packets routed through WAN, IP Helper-addresse are configured on Vlans, without DHCP-snooping it's working.

Thanks.

Hello,

Thank you for your response.

Can you perhaps post the complete configuration of your testing switch where you are testing the DHCP Snooping? I suspect that we should start from there, as everything either breaks or starts working based on the DHCP Snooping configured on that switch. Please also include exact information about the port where the client is connected, and the uplink ports that connect to the core switches.

Also, if there is a chance of performing the Wireshark capture on the DHCP server, that would be also very helpful.

Could you please tell me if i must configure dhcp-snooping and Relay-Agent also on the Cisco core switches or it's not necessary.

That is certainly not necessary. DHCP Snooping should only be used on access layer switches; it has no purpose on distribution or core switches if the DHCP packets have already been validated at the access layer. As for DHCP Relay Agent, it cannot be activated arbitrarily - it should be configured only on the default gateway of the VLAN where the DHCP clients live (the ip helper-address command).

Best regards,
Peter

I actually have the same setup and the same issue. The problem is with the authorized servers. I have added the DHCP servers to the authorized list. DHCP renew work fine because the request is first unicast to the known DHCP IP address. However, new leases aren't handled that way. They are broadcast requests, that are then picked up by the relay agent and forwarded to the DHCP servers. Herein lies the issue. The IP address that the switch receives in the return packet is the gateway address. Basically, from what I have seen so far, you will need to add all of your gateways (VLAN interface IP on your router that is setup with IP-Helper) to the authorized IP address list. For me, this is way to inconvenient. I am researching to see if the relay agent can return the DHCP server IP address.

 

For now, I have removed all authorized servers from the list. This makes the HP switch only use the trusted port setting, allowing any DHCP ACKs from the trusted port no matter what the IP. This is a bit flawed as you may get a rogue DHCP server on a VLAN that is assigned to a switch that does not have DHCP-Snooping enabled. Once all your switches are setup with DHCP-Snooping, you should be fine.

 

Review Cisco Networking for a $25 gift card