06-02-2019 01:54 PM
Hello all,
Please could someone explain what I'm missing here? DHCP snooping doesn't appear to be inspecting DHCP packets for a PVLAN setup.
VLAN 150 - Primary VLAN
VLAN 152 - Secondary VLAN, Community
DHCP snooping is enabled on both switches (Catalyst 3560's), for both the primary and secondary VLAN. No additional settings have been configured for DHCP snooping.
- I have ALS01 connected to DLS01 via an LACP etherchannel link, using 802.1q.
- I have a Windows 10 laptop running DHCPWIZ, with a DHCP range of 192.168.150.17-27. This laptop is connected to fa0/45 on DLS01.
- I have another Windows 10 laptop connected to f0/48 on ALS01.
- In testing;
- the interface connected to the DHCP server was configured with 'ip dhcp snooping trust'.
- Port channel 2 originating at the ALS01 end was also configured with 'ip dhcp snooping trust'.
The laptop was able to retrieve an IP address via DHCP successfully, with the first address from the pool, of 192.168.150.17.
I then removed the trusted interfaces on both DLS01 and ALS01, and the laptop was still able to retrieve an IP address. No entries were ever present when running 'show ip dhcp snooping binding' on either DLS01 or ALS01.
Configs below (surplus config omitted)
DLS01
============================================
ip dhcp snooping vlan 150,152
!
#TRUNK LINK TO ALS01
interface Port-channel2
switchport trunk encapsulation dot1q
switchport mode trunk
!
#INTERFACE CONNECTING TO DHCP SERVER
interface FastEthernet0/45
switchport private-vlan host-association 150 152
switchport mode private-vlan host
!
vlan 150
private-vlan primary
private-vlan association 151-152
ALS01
==============================================
ip dhcp snooping vlan 150,152
!
vlan 150
private-vlan primary
private-vlan association 151-152
!
#TRUNK LINK TO DLS01
interface Port-channel2
switchport trunk encapsulation dot1q
switchport mode trunk
!
#INTERFACE CONNECTING TO CLIENT LAPTOP
interface FastEthernet0/48
switchport private-vlan host-association 150 152
switchport mode private-vlan host
How is the laptop still able to retrieve an address?
Many thanks.
Solved! Go to Solution.
06-05-2019 10:40 AM
06-02-2019 11:35 PM
06-03-2019 12:39 AM
Thanks for the reply Mark.
Yes, 'ip dhcp snooping trust' had been applied to another uplink/trunk also, running from ALS01, over to DLS02.
During testing, I removed cables supporting this connection to DLS02, to leave only the uplink to DLS01.
Still no snooping.
When running 'show ip dhcp snooping', the table correctly identified ports that had been configured as trusted.
When running 'show ip dhcp snooping binding' on either DLS01 or ALS01, no leases were recorded, despite the laptop receiving an IP address from the pool.
06-03-2019 12:48 AM - edited 06-03-2019 12:49 AM
hmm you should see something like this below , really thats all i have enabled and its working , not much in it with configuration sounds like you have it all in place , i wonder if its an issue with running pvt vlans , i dont use them but i see a post stating some points to get it working ,maybe check this make sure you are set the same , also what image are you running on in case there is a known caveat raised against it we can check,
xxxxxxxxxxxxxxx#sh ip dhcp snooping binding
MacAddress IpAddress Lease(sec) Type VLAN Interface
------------------ --------------- ---------- ------------- ---- --------------------
2C:31:24:6A:47:36 172.28.10.129 133774 dhcp-snooping 10 GigabitEthernet1/2/17
!
interface GigabitEthernet1/2/17
description
switchport access vlan 11
switchport mode access
switchport voice vlan 10
ip access-group PERMIT-ANY in
authentication control-direction in
authentication event fail action next-method
authentication event server dead action reinitialize vlan 11
authentication event server dead action authorize voice
authentication event server alive action reinitialize
authentication host-mode multi-auth
authentication open
authentication order mab dot1x
authentication priority dot1x mab
authentication port-control auto
authentication periodic
authentication timer reauthenticate server
authentication timer inactivity server dynamic
authentication violation restrict
mab
no snmp trap link-status
auto qos trust
dot1x pae authenticator
dot1x timeout tx-period 10
spanning-tree portfast edge
service-policy input AutoQos-4.0-Input-Policy
service-policy output AutoQos-4.0-Output-Policy
ip dhcp snooping limit rate 7
interface Port-channel11
description xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
switchport
switchport mode trunk
ip dhcp snooping trust
would help if i posted the link i saw :)
https://community.cisco.com/t5/switching/pvlan-w-dhcp-snooping/td-p/797753
06-03-2019 01:15 AM
Thanks again Mark. I'm glad you pointed out that link, I shouted 'Eureka!' to my wife after reading https://community.cisco.com/t5/switching/pvlan-w-dhcp-snooping/m-p/797754/highlight/true#M31506
The excitement was squashed around 10 seconds later!
I'll verify the exact image when I get home this afternoon.
Thanks for your help so far.
06-03-2019 01:43 AM
06-03-2019 02:58 AM
06-03-2019 03:03 AM
06-04-2019 09:48 AM
Hi Mark,
I've removed DLS02 from the mix altogether, to leave only the LACP Etherchannel link between DLS01 and ALS01.
- Laptop running DHCP server is sitting in fa0/45 on DLS01, interface NOT marked as trusted.
- Etherchannel/port channel link on ALS01 NOT marked as trusted.
- Laptop client is sitting in fa0/48 in ALS01.
- Debug level configured for console logging (am direct to both switches).
- Debug enabled for DHCP snooping packets and events, nothing being recorded at all.
- Running (C3560-IPSERVICESK9-M), Version 15.0(2)SE9, RELEASE SOFTWARE (fc1) on both switches.
Baffled! Occasional display of 'DHCP_SNOOPING: checking expired snoop binding entries' displayed on both switches following enabling of DHCP snooping.
DLS01
===================================
hostname DLS01
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
system mtu routing 1500
vtp mode transparent
ip routing
!
!
!
ip dhcp snooping vlan 150,152
!
!
spanning-tree vlan 150 priority 0
!
vlan internal allocation policy ascending
!
vlan 150
private-vlan primary
private-vlan association 151-152
!
vlan 151
private-vlan isolated
!
vlan 152
private-vlan community
!
interface Port-channel2
switchport trunk encapsulation dot1q
switchport mode trunk
!
interface FastEthernet0/45
switchport private-vlan host-association 150 152
switchport mode private-vlan host
ALS01
==================================
hostname ALS01
!
boot-start-marker
boot-end-marker
!
!
!
no aaa new-model
system mtu routing 1500
vtp mode transparent
ip routing
!
!
!
ip dhcp snooping vlan 150,152
!
!
spanning-tree mode rapid-pvst
spanning-tree extend system-id
!
vlan internal allocation policy ascending
!
vlan 150
private-vlan primary
private-vlan association 151-152
!
vlan 151
private-vlan isolated
!
vlan 152
private-vlan community
!
interface FastEthernet0/48
switchport private-vlan host-association 150 152
switchport mode private-vlan host
!
06-05-2019 10:40 AM
06-05-2019 12:47 PM
06-05-2019 10:14 PM
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide