03-22-2024 08:18 AM
We have a problem with 'IP DHCP SNOOPING', we have port on switch that it is connected a access control device, but, it doesn't work when we set port with 'ip dhcp snooping limit rate 10', we snifered mirroring this port in notebook with wireshark in promiscous mode and, just we saw ICMP packets, for this device work we should put the command 'ip dhcp snooping trust', if someone help us.
Solved! Go to Solution.
03-22-2024 10:20 AM - edited 03-22-2024 10:20 AM
If your device is not getting a DHCP address and NOT populating the DHCP Snooping binding table the the rate limit command is not really functioning in this scenario. You either need to trust the port or create a dhcp snooping static entry shown below:
ip dhcp snooping binding <mac-address> vlan <#> <ip> interface <interface>
Fill out the appropriate information and you should be good to go.
-David
03-22-2024 11:20 AM
ip dhcp snooping binding mac-address vlan vlan ip-address interface type number expiry seconds
The command you need
MHM
03-22-2024 08:36 AM
>...for this device work we should put the command 'ip dhcp snooping trust',
- I don't understand , the command ip dhcp snooping trust is set on interfaces leading to a valid dhcp server (network path)
Have a look at this short tutorial : https://medium.com/@idn.naufal.hasan/cisco-routing-dhcp-snooping-tutorial-d57a20e0fa36
M.
03-22-2024 09:55 AM
Hi @marce1000,
In this port we have a access control device and this it doens't have DHCP packet, we captured by mirroring on switch and it had ICMP packets, port g0/1 jus work if we put this command: 'ip dhcp snooping trust', follow show and configuration:
SW_CTJL_38#sh ip dhcp snooping
Switch DHCP snooping is enabled
Switch DHCP gleaning is disabled
DHCP snooping is configured on following VLANs:
1,6,10,52,54,60,110,120,130,1000
DHCP snooping is operational on following VLANs:
1,6,10,52,54,60,110,120,130,1000
DHCP snooping is configured on the following L3 Interfaces:
Insertion of option 82 is enabled
circuit-id default format: vlan-mod-port
remote-id: 84eb.ef60.2480 (MAC)
Option 82 on untrusted port is not allowed
Verification of hwaddr field is enabled
Verification of giaddr field is enabled
DHCP snooping trust/rate is configured on the following Interfaces:
Interface Trusted Allow option Rate limit (pps)
----------------------- ------- ------------ ----------------
GigabitEthernet0/1 no no 10
Custom circuit-ids:
GigabitEthernet0/2 yes yes 10
Custom circuit-ids:
GigabitEthernet0/3 no no 10
Custom circuit-ids:
GigabitEthernet0/4 no no 10
Custom circuit-ids:
GigabitEthernet0/5 no no 10
Custom circuit-ids:
GigabitEthernet0/6 no no 10
Custom circuit-ids:
GigabitEthernet0/7 no no 10
Custom circuit-ids:
GigabitEthernet0/8 no no 10
Custom circuit-ids:
GigabitEthernet0/10 yes yes unlimited
Custom circuit-ids:
Port-channel1 yes yes unlimited
Custom circuit-ids:
-------------------------------
ip dhcp snooping vlan 1,6,10,52,54,60,110,120,130,1000
ip dhcp snooping
----------------------------------------
interface GigabitEthernet0/1
description ## SERVICOS ##
switchport access vlan 60
switchport mode access
switchport nonegotiate
switchport port-security maximum 2
ip arp inspection limit none
authentication event fail action next-method
authentication event server dead action reinitialize vlan 10
authentication event server alive action reinitialize
authentication host-mode multi-domain
authentication order dot1x mab
authentication priority dot1x mab
authentication port-control auto
authentication violation restrict
mab
dot1x pae authenticator
dot1x timeout tx-period 10
storm-control broadcast level 20.00 10.00
storm-control multicast level 20.00 10.00
storm-control action shutdown
spanning-tree portfast edge
ip verify source
ip dhcp snooping limit rate 10
end
03-22-2024 10:20 AM - edited 03-22-2024 10:20 AM
If your device is not getting a DHCP address and NOT populating the DHCP Snooping binding table the the rate limit command is not really functioning in this scenario. You either need to trust the port or create a dhcp snooping static entry shown below:
ip dhcp snooping binding <mac-address> vlan <#> <ip> interface <interface>
Fill out the appropriate information and you should be good to go.
-David
03-22-2024 09:05 AM
Hello,
If your port keeps err-disabling then it seems you are receiving too many DHCP requests. A couple of questions:
1. Did you capture packets when the device was requesting the IP address? How many DHCP packets came across?
2. Were you monitoring the right interface (double check)
3. Is the device requesting more than One IP address? Is the port a trunk port with multiple VLANs or connected to a server with multiple IP requests?
You could always try increasing the packets per second limit. Cisco recommends not more than 100 pps rate limit.
-David
03-22-2024 10:00 AM
Hi @David Ruess
1. Did you capture packets when the device was requesting the IP address? How many DHCP packets came across?
This device is with fixed IP, there isn't DHCP packets,
2. Were you monitoring the right interface (double check)
yes, definitely
3. Is the device requesting more than One IP address? Is the port a trunk port with multiple VLANs or connected to a server with multiple IP requests?
it is access port
03-22-2024 10:04 AM
This device is with fixed IP, there isn't DHCP packets, <<- this explain some kind the issue here
ARP inspect depend on DHCP snooping table for static endpoint you need to add manually entry into DHCP snooping table otherwise you need to trust the port.
MHM
03-22-2024 09:13 AM
Can yoh share the packet you captue
MHM
03-22-2024 10:45 AM
Follow in attached a capture with 'ip dhcp snooping trus' and another wit 'ip dhcp snooping limit rate 10':
03-22-2024 10:49 AM
Yes friend I will check it but did you add manually the static IP endpoint to dhcp snooping ?
MHM
03-22-2024 11:05 AM
@MHM Cisco World
I don't understand your question, but, this device is fixed IP,
03-22-2024 11:15 AM
You run arp inspection and dhcp snooping, and that correct.
Arp inspection is depend on dhcp snooping database to permit or deny arp from specific port.
Now you use fixed IP and hence there is no dhcp and also NO dhcp snooping and no entry in table,
Here the arp inspection don't have any Info as reference to permit or deny
So you config
Ip dhcp snooping trust, this like disable all dhcp and protocol depen on snooping include arp inspection.
But the solution for any fixed IP in dhcp snooping environment is add manual entry.
MHM
03-22-2024 11:20 AM
ip dhcp snooping binding mac-address vlan vlan ip-address interface type number expiry seconds
The command you need
MHM
03-22-2024 11:33 AM
HI guys,
I didn't find this command 'ip dhcp snooping binding mac-address vlan vlan ip-address interface type number expiry seconds', but, I could fix my problem with:
ip source binding 0001.2a00.6745 vlan 60 10.200.18.25 int g0/1
Tks for help for all of you
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide