09-23-2025
02:23 PM
- last edited on
09-23-2025
02:39 PM
by
frsierra
Hello,
We have CoreSwitches configured as DHCP servers and Layer3 for several Vlans but we started noticing DHCP timeouts and after analysis we found out that devices are sending a DHCP request almost every 2 minutes even if the lease time is configured for 8days and they have already an IP
The configuration is basic:
ip dhcp pool Vlan40
network 10.152.104.128 255.255.255.128
default-router 10.152.104.129
dns-server X.X.X.X X.X.X.
domain-name test.com
Debug dhcp packet detail is showing the following result when the DHCP timeout event is detected:
But we don't see any response from the Switch regarding those requests
We have :
- Modified the lease time
- tested with the remember command
- Rebooted the switch
- Issue is happening in several sites and with almost all devices
- in the network we have coreSwitches 3560 versions 3.6.4 and 3.6.6 and 9300 with version 17.12.X and they both showing same issue
Many thanks
09-23-2025 07:18 PM
Hello,
Do you have any other configuration related to DHCP such as DHCP snooping? Can you provide the full device configuration?
Are these PCs that are trying to get an IP address or other network devices?
How many switches/devices are between the DHCP configured network device as a server and the client?
-David
09-24-2025 03:01 AM
Hello @David Ruess
Yes DHCP snooping is configured, below is the DHCP configuration in the switch :
SwitchCore#sh run | s dhcp
ip dhcp snooping vlan 1-4094
no ip dhcp snooping information option
ip dhcp snooping database flash:dhcp-database
ip dhcp snooping
ip dhcp excluded-address 10.152.107.1
ip dhcp excluded-address 10.152.104.251 10.152.104.254
ip dhcp excluded-address 10.152.104.65 10.152.104.75
ip dhcp excluded-address 172.31.82.1 172.31.82.14
ip dhcp excluded-address 172.31.82.101 172.31.82.105
ip dhcp excluded-address 172.31.82.201 172.31.82.254
ip dhcp pool Vlan40
utilization mark high 90 log
network 10.152.104.128 255.255.255.128
default-router 10.152.104.129
dns-server 172.31.82.105 10.246.6.1
domain-name test.com
ip dhcp pool Vlan75
network 10.152.104.64 255.255.255.192
default-router 10.152.104.65
dns-server 172.31.82.105 10.246.6.1
domain-name test.com
ip dhcp pool Vlan90
network 172.31.82.0 255.255.255.0
default-router 172.31.82.254
dns-server 172.31.82.105 10.246.6.1
domain-name test.com
errdisable recovery cause dhcp-rate-limit
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
ip dhcp snooping trust
Issue is impacting mainly Android devices but only some PCs WIFI and Wired
there is only one access switch and an access point for WIFI devices.
Many thanks,
09-24-2025 05:51 AM - edited 09-24-2025 06:25 AM
Hello @hara12386 ,
this message:
09-24-2025 06:18 AM
Hello
A short lease time for dhcp enabled IOT wifi clients I would say best practices especially due to their roaming capabilities
Also disabling proxy between the dhcp server and and its clients would be applicable to negate any false replies sent to the client /server
09-25-2025 02:34 AM
Hello @paul driver
I already played with the lease time but issue remains and proxy is disabled in the L3 interface.
Many thanks,
09-25-2025 10:33 AM
I had a strange DHCP issue recently with Catalyst 9K, you can check the entire topic here.
The only thing that solved the issue was upgrading from 17.03.05 to 17.12.05.
09-27-2025 05:34 AM
if the coreswitch itself is the DHCP server, then I don't think you need any "dhcp snooping trust" configuration here
this command is only neccessary on a switches interface leading to where the DHCP server can be found
like on the uplink of an accessswitch connecting to this coreswitch
On a Cisco Catalyst 9000 series switch (Cat9k), the DHCP snooping database is a dynamic table of IP-to-MAC bindings learned from client devices on untrusted ports,
as you have a LOT of dhcp-snooping trust commands in your configuration, it looks like you trust allmost ALL of your interfaces ?
if so then there will be NO entries in your DHCP-snooping database.
09-27-2025 06:54 AM
This issue solved ?
MHM
09-29-2025 09:17 AM
Hello,
No issue is still not yet fixed, a case is in progress with TAC but no improvement!
Many thanks
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide