cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
1294
Views
3
Helpful
13
Replies

Problem DHCP SNOOPING - ICMP Packets

DiamanteDesk
Level 1
Level 1

We have a problem with 'IP DHCP SNOOPING', we have port on switch that it is connected a access control device, but, it doesn't work when we set port with 'ip dhcp snooping limit rate 10', we snifered mirroring this port in notebook with wireshark in promiscous mode and, just we saw ICMP packets, for this device work we should put the command 'ip dhcp snooping trust', if someone help us.

2 Accepted Solutions

Accepted Solutions

If your device is not getting a DHCP address and NOT populating the DHCP Snooping binding table the the rate limit command is not really functioning in this scenario. You either need to trust the port or create a dhcp snooping static entry shown below:

 

ip dhcp snooping binding <mac-address> vlan <#> <ip> interface <interface> 

Fill out the appropriate information and you should be good to go. 

 

-David

View solution in original post

ip dhcp snooping binding mac-address vlan vlan ip-address interface type number expiry seconds

The command you need 

MHM

View solution in original post

13 Replies 13

marce1000
VIP
VIP

 

            >...for this device work we should put the command 'ip dhcp snooping trust',
  - I don't understand , the command ip dhcp snooping trust is set on interfaces leading to a valid dhcp server (network path)
  Have a look at this short tutorial : https://medium.com/@idn.naufal.hasan/cisco-routing-dhcp-snooping-tutorial-d57a20e0fa36

 M.



-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
    When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '

Hi @marce1000,

In this port we have a access control device and this it doens't have DHCP packet, we captured by mirroring on switch and it had ICMP packets, port g0/1 jus work if we put this command: 'ip dhcp snooping trust', follow show and configuration:

SW_CTJL_38#sh ip dhcp snooping
Switch DHCP snooping is enabled
Switch DHCP gleaning is disabled
DHCP snooping is configured on following VLANs:
1,6,10,52,54,60,110,120,130,1000
DHCP snooping is operational on following VLANs:
1,6,10,52,54,60,110,120,130,1000
DHCP snooping is configured on the following L3 Interfaces:

Insertion of option 82 is enabled
circuit-id default format: vlan-mod-port
remote-id: 84eb.ef60.2480 (MAC)
Option 82 on untrusted port is not allowed
Verification of hwaddr field is enabled
Verification of giaddr field is enabled
DHCP snooping trust/rate is configured on the following Interfaces:

Interface Trusted Allow option Rate limit (pps)
----------------------- ------- ------------ ----------------
GigabitEthernet0/1 no no 10
Custom circuit-ids:
GigabitEthernet0/2 yes yes 10
Custom circuit-ids:
GigabitEthernet0/3 no no 10
Custom circuit-ids:
GigabitEthernet0/4 no no 10
Custom circuit-ids:
GigabitEthernet0/5 no no 10
Custom circuit-ids:
GigabitEthernet0/6 no no 10
Custom circuit-ids:
GigabitEthernet0/7 no no 10
Custom circuit-ids:
GigabitEthernet0/8 no no 10
Custom circuit-ids:
GigabitEthernet0/10 yes yes unlimited
Custom circuit-ids:
Port-channel1 yes yes unlimited
Custom circuit-ids:
-------------------------------
ip dhcp snooping vlan 1,6,10,52,54,60,110,120,130,1000
ip dhcp snooping
----------------------------------------
interface GigabitEthernet0/1

description ## SERVICOS ##
switchport access vlan 60
switchport mode access
switchport nonegotiate
switchport port-security maximum 2
ip arp inspection limit none
authentication event fail action next-method
authentication event server dead action reinitialize vlan 10
authentication event server alive action reinitialize
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication violation restrict
mab
dot1x pae authenticator
dot1x timeout tx-period 10
storm-control broadcast level 20.00 10.00
storm-control multicast level 20.00 10.00
storm-control action shutdown
spanning-tree portfast edge
ip verify source
ip dhcp snooping limit rate 10
end

If your device is not getting a DHCP address and NOT populating the DHCP Snooping binding table the the rate limit command is not really functioning in this scenario. You either need to trust the port or create a dhcp snooping static entry shown below:

 

ip dhcp snooping binding <mac-address> vlan <#> <ip> interface <interface> 

Fill out the appropriate information and you should be good to go. 

 

-David

Hello,

If your port keeps err-disabling then it seems you are receiving too many DHCP requests. A couple of questions:

1. Did you capture packets when the device was requesting the IP address? How many DHCP packets came across?

2. Were you monitoring the right interface (double check)

3. Is the device requesting more than One IP address? Is the port a trunk port with multiple VLANs or connected to a server with multiple IP requests?

You could always try increasing the packets per second limit. Cisco recommends not more than 100 pps rate limit.

-David

 

Hi @David Ruess 

1. Did you capture packets when the device was requesting the IP address? How many DHCP packets came across?
This device is with fixed IP, there isn't DHCP packets,

2. Were you monitoring the right interface (double check)
yes, definitely

3. Is the device requesting more than One IP address? Is the port a trunk port with multiple VLANs or connected to a server with multiple IP requests?
it is access port

This device is with fixed IP, there isn't DHCP packets, <<- this explain some kind the issue here 
ARP inspect depend on DHCP snooping table for static endpoint you need to add manually entry into DHCP snooping table otherwise you need to trust the port.

MHM

Can yoh share the packet you captue

MHM

Hi @MHM Cisco World 

Follow in attached a capture with 'ip dhcp snooping trus' and another wit 'ip dhcp snooping limit rate 10':

Yes friend I will check it but did you add manually the static IP endpoint to dhcp snooping ?

MHM

@MHM Cisco World 
I don't understand your question, but, this device is fixed IP,

You run arp inspection and dhcp snooping, and that correct. 

Arp inspection is depend on dhcp snooping database to permit or deny arp from specific port. 

Now you use fixed IP and hence there is no dhcp and also NO dhcp snooping and no entry in table, 

Here the arp inspection don't have any Info as reference to permit or deny 

So you config 

Ip dhcp snooping trust, this like disable all dhcp and protocol depen on snooping include arp inspection. 

But the solution for any fixed IP in dhcp snooping environment is add manual entry. 

MHM

ip dhcp snooping binding mac-address vlan vlan ip-address interface type number expiry seconds

The command you need 

MHM

DiamanteDesk
Level 1
Level 1

HI guys,

I didn't find this command 'ip dhcp snooping binding mac-address vlan vlan ip-address interface type number expiry seconds', but, I could fix my problem with:

ip source binding 0001.2a00.6745 vlan 60 10.200.18.25 int g0/1

Tks for help for all of you

Review Cisco Networking for a $25 gift card