cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
4730
Views
0
Helpful
2
Replies

DHCPD: Option 125 not present in the msg.

Evlaa2021
Level 1
Level 1

We have a problem with newer Cisco C9XXX series switches dropping option 125 for Mitel IP Phones. Mitel IP Phones use option 125 to configure the call server, TFTP server and various other network settings.

The switches are completely dropping the DHCP offers when recieved, as you can see from the output below, this means that the phones never recieve an IP Address. If i plug a laptop into the same network i recieve and IP address fine. If i statically set the call server and tftp server on the Mitel phone it also boots up correctly.

 

I have added the following dhcp relay commands, which i believed would not interfere with DHCP offers, or not recognised DHCP options;

ip dhcp relay information policy keep
ip dhcp relay information trust-all


Any ideas what could be causing this behaviour or ways to stop the switch dropping unknown DHCP options;

 

 

Nov 03 13:28:58 10.238.196.1 1651: 003683: Nov 3 13:28:58.931: Option 82 not present
Nov 03 13:28:58 10.238.196.1 1652: 003684: Nov 3 13:28:58.931: DHCPD: Reload workspace interface Vlan200 tableid 0.
Nov 03 13:28:58 10.238.196.1 1653: 003685: Nov 3 13:28:58.931: DHCPD: tableid for 10.238.196.1 on Vlan200 is 0
Nov 03 13:28:58 10.238.196.1 1654: 003686: Nov 3 13:28:58.932: DHCPD: client's VPN is .
Nov 03 13:28:58 10.238.196.1 1655: 003687: Nov 3 13:28:58.932: DHCPD: No option 125
Nov 03 13:28:58 10.238.196.1 1656: 003688: Nov 3 13:28:58.932: DHCPD: Option 125 not present in the msg.
Nov 03 13:28:58 10.238.196.1 1657: 003689: Nov 3 13:28:58.932: Option 82 not present
Nov 03 13:28:58 10.238.196.1 1658: 003690: Nov 3 13:28:58.932: Option 82 not present
Nov 03 13:28:59 10.238.196.1 1659: 003691: Nov 3 13:28:58.932: DHCPD: Option 125 not present in the msg.
Nov 03 13:28:59 10.238.196.1 1660: 003692: Nov 3 13:28:58.932: DHCPD: Sending notification of DISCOVER:
Nov 03 13:28:59 10.238.196.1 1661: 003693: Nov 3 13:28:58.932: DHCPD: htype 1 chaddr 0800.0f5b.303e
Nov 03 13:28:59 10.238.196.1 1662: 003694: Nov 3 13:28:58.932: DHCPD: interface = Vlan200
Nov 03 13:28:59 10.238.196.1 1663: 003695: Nov 3 13:28:58.932: DHCPD: class id

697070686f6e652e6d6974656c2e636f6d00
Nov 03 13:28:59 10.238.196.1 1664: 003696: Nov 3 13:28:58.932: DHCPD: FSM state change INVALID
Nov 03 13:28:59 10.238.196.1 1665: 003697: Nov 3 13:28:58.932: DHCPD: Workspace state changed from INIT to INVALID
Nov 03 13:28:59 10.238.196.1 1666: 003698: Nov 3 13:28:58.932: DHCPD: Looking up binding using address 10.238.196.1
Nov 03 13:28:59 10.238.196.1 1667: 003699: Nov 3 13:28:58.932: DHCPD: setting giaddr to 10.238.196.1.
Nov 03 13:28:59 10.238.196.1 1668: 003700: Nov 3 13:28:58.932: DHCPD: adding relay information option.
Nov 03 13:28:59 10.238.196.1 1669: 003701: Nov 3 13:28:58.932: DHCPD: relay information option content (add/replace):
Nov 03 13:28:59 10.238.196.1 1670: 003702: Nov 3 13:28:58.932: DHCPD: 520696040aeec401
Nov 03 13:28:59 10.238.196.1 1671: 003703: Nov 3 13:28:58.932: DHCPD: giaddr changed to 10.238.226.180
Nov 03 13:28:59 10.238.196.1 1672: 003704: Nov 3 13:28:58.932: DHCPD: BOOTREQUEST from 0108.000f.5b30.3e forwarded to 172.31.4.250.

Nov 03 13:28:59 10.238.196.1 2737: 004769: Nov 3 13:49:03.663: DHCPD: Invalid option 125 information. Dropping DHCP message

 


version 17.1
no service pad
service tcp-keepalives-in
service tcp-keepalives-out
service timestamps debug datetime msec localtime
service timestamps log datetime msec show-timezone year
service password-encryption
service internal
service compress-config
service sequence-numbers
service counters max age 10
! Call-home is enabled by Smart-Licensing.
service call-home
platform punt-keepalive disable-kernel-core
!
hostname MFT-PRWG-2-SW1
!
!
vrf definition Mgmt-vrf
!
address-family ipv4
exit-address-family
!
address-family ipv6
exit-address-family
!
!
!
!
!
aaa new-model
!
!
!
!
!
!
!
!
aaa session-id common
switch 1 provision c9200-48pb
!
!
!
!
vtp mode off
!
!
!
!
!
ip routing
ip arp entry learn 10240
!
!
!
!
!
!
!
no ip domain lookup
ip domain name cmmc.nhs.uk
ip dhcp relay information policy keep
ip dhcp relay information trust-all
!
!
!
login on-success log
call-home
! If contact email address in call-home is configured as sch-smart-licensing@cisco.com
! the email address configured in Cisco Smart License Portal will be used as contact email address to send SCH notifications.
contact-email-addr sch-smart-licensing@cisco.com
profile "CiscoTAC-1"
active
destination transport-method http
!
!
no device-tracking logging theft
!
crypto pki trustpoint SLA-TrustPoint
enrollment pkcs12
revocation-check crl
!
crypto pki trustpoint TP-self-signed-2998201960
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-2998201960
revocation-check none
rsakeypair TP-self-signed-2998201960
!
!
crypto pki certificate chain SLA-TrustPoint
certificate ca 01
30820321 30820209 A0030201 02020101 300D0609 2A864886 F70D0101 0B050030
32310E30 0C060355 040A1305 43697363 6F312030 1E060355 04031317 43697363
6F204C69 63656E73 696E6720 526F6F74 20434130 1E170D31 33303533 30313934
3834375A 170D3338 30353330 31393438 34375A30 32310E30 0C060355 040A1305
43697363 6F312030 1E060355 04031317 43697363 6F204C69 63656E73 696E6720
526F6F74 20434130 82012230 0D06092A 864886F7 0D010101 05000382 010F0030
82010A02 82010100 A6BCBD96 131E05F7 145EA72C 2CD686E6 17222EA1 F1EFF64D
CBB4C798 212AA147 C655D8D7 9471380D 8711441E 1AAF071A 9CAE6388 8A38E520
1C394D78 462EF239 C659F715 B98C0A59 5BBB5CBD 0CFEBEA3 700A8BF7 D8F256EE
4AA4E80D DB6FD1C9 60B1FD18 FFC69C96 6FA68957 A2617DE7 104FDC5F EA2956AC
7390A3EB 2B5436AD C847A2C5 DAB553EB 69A9A535 58E9F3E3 C0BD23CF 58BD7188
68E69491 20F320E7 948E71D7 AE3BCC84 F10684C7 4BC8E00F 539BA42B 42C68BB7
C7479096 B4CB2D62 EA2F505D C7B062A4 6811D95B E8250FC4 5D5D5FB8 8F27D191
C55F0D76 61F9A4CD 3D992327 A8BB03BD 4E6D7069 7CBADF8B DF5F4368 95135E44
DFC7C6CF 04DD7FD1 02030100 01A34230 40300E06 03551D0F 0101FF04 04030201
06300F06 03551D13 0101FF04 05300301 01FF301D 0603551D 0E041604 1449DC85
4B3D31E5 1B3E6A17 606AF333 3D3B4C73 E8300D06 092A8648 86F70D01 010B0500
03820101 00507F24 D3932A66 86025D9F E838AE5C 6D4DF6B0 49631C78 240DA905
604EDCDE FF4FED2B 77FC460E CD636FDB DD44681E 3A5673AB 9093D3B1 6C9E3D8B
D98987BF E40CBD9E 1AECA0C2 2189BB5C 8FA85686 CD98B646 5575B146 8DFC66A8
467A3DF4 4D565700 6ADF0F0D CF835015 3C04FF7C 21E878AC 11BA9CD2 55A9232C
7CA7B7E6 C1AF74F6 152E99B7 B1FCF9BB E973DE7F 5BDDEB86 C71E3B49 1765308B
5FB0DA06 B92AFE7F 494E8A9E 07B85737 F3A58BE1 1A48A229 C37C1E69 39F08678
80DDCD16 D6BACECA EEBC7CF9 8428787B 35202CDC 60E4616A B623CDBD 230E3AFB
418616A9 4093E049 4D10AB75 27E86F73 932E35B5 8862FDAE 0275156F 719BB2F0
D697DF7F 28
quit
crypto pki certificate chain TP-self-signed-2998201960
certificate self-signed 01
30820330 30820218 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 32393938 32303139 3630301E 170D3230 31303230 30383530
32385A17 0D333030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D32 39393832
30313936 30308201 22300D06 092A8648 86F70D01 01010500 0382010F 00308201
0A028201 0100DD2D A7DC771A 79F8C6F2 16C71842 6BCB5BE6 CAAA3729 0E4C46C0
973804BE B7F7A993 0E1D9FC3 AED228D6 061F0E88 C58A1E59 4C02E8B0 DA03DE9C
4952B0EA EAFED07C DAE50DAC 322DDFF8 7153B2F4 1C62A27E 50B8A786 092B7A67
1B1A253F F0D58A40 7D585373 2F87F780 35FE9D64 2AF84026 081D30F7 BF2A0695
2BD2F753 3201D7F9 0A5FF23C 6531EBD8 707FA42D CFF063A7 42B452C0 4B961817
5549BEC4 990F41D4 8ED95BEB 54E26C59 A3A34FB7 3549948A FD3273AC 1EB304AD
271470A4 E8A06BB7 881ED028 C3D20D73 AB34CB16 8C46CBC5 FE039ABA A847E275
97E58A62 D7863E4D AFC06C30 AC3B66D0 FE1314BD 90288B81 62AEF8FC 86CB988C
6F61CC48 0C7F0203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF
301F0603 551D2304 18301680 14C7D9B4 C9239E0D 523EF817 CBF14643 28CC5871
D0301D06 03551D0E 04160414 C7D9B4C9 239E0D52 3EF817CB F1464328 CC5871D0
300D0609 2A864886 F70D0101 05050003 82010100 C9220E9F 3224DBCE 802C2C8A
A95A22E6 576FB856 EEC28B7C 005B8B4B 1DBD8551 F46C4E6D 616866EC 8DFE6928
E9EF12BE 22BD3CDD 97E6FCA8 E670D038 0A142E84 CF2D4DCF 86D6C8B7 66C9B834
B5817D68 2DC4CA01 519C8BE1 99D6EA14 F11FB61E 52E668D3 96E84445 562406E6
761755DF F6117FE4 6B9FFC87 8A00D2FF BF27012A 26C2F9B3 27071C4E EB4F9571
69FDB956 DC77F275 57D6AB6A CDE7CEF6 F4E8328A 157AC183 2DB3A679 E2E816FF
F21E1F2E 6B291C68 F855F7CB 1281E301 2A8E184E 2BDAF562 9753E41A 7AA7CA0D
6433A0F0 01981070 3E6391C1 D41E4BA8 B1D89423 CB56919C F099B3FF 573D9B13
9C97EA4D C79A1EC3 910E4A11 97E95743 6E5758A3
quit
!
!
license boot level network-advantage addon dna-advantage
!
!
diagnostic bootup level minimal
!
spanning-tree mode rapid-pvst
spanning-tree logging
spanning-tree extend system-id
spanning-tree vlan 100,200 priority 0
memory free low-watermark processor 22737
!
errdisable recovery cause udld
errdisable recovery cause bpduguard
errdisable recovery cause security-violation
errdisable recovery cause pagp-flap
errdisable recovery cause dtp-flap
errdisable recovery cause link-flap
errdisable recovery cause gbic-invalid
errdisable recovery cause psecure-violation
errdisable recovery cause dhcp-rate-limit
errdisable recovery cause loopback
!
redundancy
mode sso
!
!
vlan 100
name MFT-PKWG-MGMT
!
vlan 200
name MFT-PKWG-DATA
!
!
!
class-map match-any system-cpp-police-ewlc-control
description EWLC Control
class-map match-any system-cpp-police-topology-control
description Topology control
class-map match-any system-cpp-police-sw-forward
description Sw forwarding, L2 LVX data packets, LOGGING, Transit Traffic
class-map match-any system-cpp-default
description EWLC data, Inter FED Traffic
class-map match-any system-cpp-police-sys-data
description Openflow, Exception, EGR Exception, NFL Sampled Data, RPF Failed
class-map match-any system-cpp-police-punt-webauth
description Punt Webauth
class-map match-any system-cpp-police-l2lvx-control
description L2 LVX control packets
class-map match-any system-cpp-police-forus
description Forus Address resolution and Forus traffic
class-map match-any system-cpp-police-multicast-end-station
description MCAST END STATION
class-map match-any system-cpp-police-high-rate-app
description High Rate Applications
class-map match-any system-cpp-police-multicast
description MCAST Data
class-map match-any system-cpp-police-l2-control
description L2 control
class-map match-any system-cpp-police-dot1x-auth
description DOT1X Auth
class-map match-any system-cpp-police-data
description ICMP redirect, ICMP_GEN and BROADCAST
class-map match-any system-cpp-police-stackwise-virt-control
description Stackwise Virtual OOB
class-map match-any non-client-nrt-class
class-map match-any system-cpp-police-routing-control
description Routing control and Low Latency
class-map match-any system-cpp-police-protocol-snooping
description Protocol snooping
class-map match-any system-cpp-police-dhcp-snooping
description DHCP snooping
class-map match-any system-cpp-police-ios-routing
description L2 control, Topology control, Routing control, Low Latency
class-map match-any system-cpp-police-system-critical
description System Critical and Gold Pkt
class-map match-any system-cpp-police-ios-feature
description ICMPGEN,BROADCAST,ICMP,L2LVXCntrl,ProtoSnoop,PuntWebauth,MCASTData,Transit,DOT1XAuth,Swfwd,LOGGING,L2LVXData,ForusTraffic,ForusARP,McastEndStn,Openflow,Exception,EGRExcption,NflSampled,RpfFailed
!
policy-map system-cpp-policy
!
!
!
!
!
!
!
!
!
!
!
!
!
!
interface GigabitEthernet0/0
vrf forwarding Mgmt-vrf
no ip address
shutdown
negotiation auto
!
interface GigabitEthernet1/0/1
switchport access vlan 100
switchport mode access
!
interface GigabitEthernet1/0/2
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/3
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/4
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/5
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/6
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/7
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/8
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/9
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/10
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/11
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/12
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/13
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/14
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/15
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/16
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/17
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/18
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/19
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/20
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/21
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/22
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/23
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/24
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/25
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/26
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/27
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/28
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/29
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/30
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/31
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/32
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/33
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/34
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/35
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/36
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/37
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/38
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/39
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/40
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/41
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/42
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/43
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/44
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/45
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/46
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/47
switchport access vlan 200
switchport mode access
spanning-tree portfast
spanning-tree bpduguard enable
!
interface GigabitEthernet1/0/48
switchport mode trunk
!
interface GigabitEthernet1/1/1
!
interface GigabitEthernet1/1/2
!
interface GigabitEthernet1/1/3
!
interface GigabitEthernet1/1/4
!
interface TenGigabitEthernet1/1/1
!
interface TenGigabitEthernet1/1/2
!
interface TenGigabitEthernet1/1/3
!
interface TenGigabitEthernet1/1/4
!
interface Vlan1
no ip address
!
interface Vlan100
description MFT-PKWG-MGMT
ip address 10.238.226.180 255.255.255.248
!
interface Vlan200
description MFT-PKWG-DATA
ip address 10.238.196.1 255.255.255.0
ip helper-address 172.31.4.250
no ip redirects
no ip unreachables

!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
ip route 0.0.0.0 0.0.0.0 10.238.226.177 name DEFAULT_ROUTE
ip ssh version 2
!
!
!
logging trap debugging
logging server-arp
logging host 172.31.4.15
logging host 192.168.4.29
logging host 10.165.220.60
logging host 10.166.94.200
logging host 10.238.196.114
ip access-list standard 2
ip access-list standard 3
!

tacacs server dnac-tacacs_10.165.220.46
address ipv4 10.165.220.46
timeout 4
tacacs server dnac-tacacs_10.166.94.202
address ipv4 10.166.94.202
timeout 4
!
!
!
!
!
control-plane
service-policy input system-cpp-policy
!
banner exec ^CC
^C
!
line con 0
stopbits 1
line aux 0
stopbits 1
line vty 5 15
!
ntp server 192.168.255.1 version 2
ntp server 192.168.255.2 version 2
!
!
!
!
!
!
end

2 Replies 2

D_azevedo
Level 1
Level 1

Hi Evan,

 

Do you have any luck dealing with this issue?

 

Best Regards

Sorry for the late reply - we had to add the DHCP option using the correct HEX format for option 125. Luckily the supplier provides a tool to do this.

Review Cisco Networking for a $25 gift card