cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
797
Views
0
Helpful
1
Replies

Problem ip address assignment!

yaniv
Level 1
Level 1

Hello everyone,


I have a cisco 887vaw and I set dhcp pool.
I have a number of physical devices that require a fixed IP address, I set them an address but for some reason these devices continue to get a dynamic address, I will glad for help and guide about where I went wrong.
I upload the file

Thanks in advance
Yaniv

show ip dhcp binding

Bindings from all pools not associated with VRF:
IP address Client-ID/ Lease expiration Type
Hardware address/
User name
192.168.1.43 011c.1ac0.678c.a6 Jan 18 2017 11:03 AM Automatic
192.168.1.44 0100.1526.0372.4a Jan 18 2017 11:03 AM Automatic
192.168.1.45 0100.0678.1d7e.a2 Jan 18 2017 11:09 AM Automatic
192.168.1.46 0100.0391.cdd0.e3 Jan 18 2017 11:04 AM Automatic
192.168.1.47 011c.6758.7b53.2e Jan 18 2017 12:14 PM Automatic
192.168.1.48 0194.e96a.8c22.82 Jan 18 2017 03:11 PM Automatic
192.168.1.49 01bc.f5ac.e0c9.93 Jan 18 2017 11:55 AM Automatic
192.168.1.50 01c8.f650.958d.63 Jan 18 2017 03:31 PM Automatic
192.168.1.100 0100.1526.0372.4a Infinite Manual
192.168.1.101 0100.0678.1d7e.a1 Infinite Manual
192.168.1.102 0100.0678.1d7e.a2 Infinite Manual
192.168.1.103 0100.1526.0374.d9 Infinite Manual
192.168.1.104 0100.1526.0372.49 Infinite Manual

show running-config

Building configuration...


Current configuration : 6220 bytes
!
! Last configuration change at 19:36:48 UTC Sun Jan 15 2017 by ycoms
!
version 15.5
service timestamps debug datetime msec
service timestamps log datetime msec
service password-encryption
!
hostname Router
!
boot-start-marker
boot-end-marker
!
!
enable secret 5 $1$shMs$A4LGAPWwMz1qcOfCaCl6G.
!
no aaa new-model
ethernet lmi ce
service-module wlan-ap 0 bootimage autonomous
!
crypto pki trustpoint TP-self-signed-4109097357
enrollment selfsigned
subject-name cn=IOS-Self-Signed-Certificate-4109097357
revocation-check none
rsakeypair TP-self-signed-4109097357
!
!
crypto pki certificate chain TP-self-signed-4109097357
certificate self-signed 01
3082022B 30820194 A0030201 02020101 300D0609 2A864886 F70D0101 05050030
31312F30 2D060355 04031326 494F532D 53656C66 2D536967 6E65642D 43657274
69666963 6174652D 34313039 30393733 3537301E 170D3136 31303133 30363334
33305A17 0D323030 31303130 30303030 305A3031 312F302D 06035504 03132649
4F532D53 656C662D 5369676E 65642D43 65727469 66696361 74652D34 31303930
39373335 3730819F 300D0609 2A864886 F70D0101 01050003 818D0030 81890281
8100F57B 902A857F AEFD12B2 ED414BA1 B04D6C24 11867888 AB3B529B 7C7718C5
ABD943A5 7B0A89A6 A47D4D5B 1B3B569C E2597BBC 820A5612 7CF44EBA 2BFB052A
AF32B3A8 E8423996 0883C285 65E5A94D 9505B580 19DF45DF DBF88924 2859A68A
B94B1276 C91117CC F9E4E997 171E99E7 6B34AEA6 9C2920B6 00CCBD44 8A81473F
4E410203 010001A3 53305130 0F060355 1D130101 FF040530 030101FF 301F0603
551D2304 18301680 14F73D1E 7EF9E641 6AEFA206 D2F03707 91292839 81301D06
03551D0E 04160414 F73D1E7E F9E6416A EFA206D2 F0370791 29283981 300D0609
2A864886 F70D0101 05050003 8181009C 01921F54 C3F8F4EA D7617AC7 A1D2EEAD
38EB7143 819E7047 26B80BB9 DFCB55FC 0D8BA1F8 796830F6 BA183ABF 1DB5551C
5EC5F1A8 04D07D75 D319F2A8 5EE842EC A700D933 7CF761A6 510FD54F 3214EC34
6B0DC7FB 8C92EEC8 AFAF1E36 8183B6AF BCEFE842 83AE274A 11FD09F3 73D7E440
1CEE343F E86949A5 9ABDC55B 22ED57
quit
!
!
!
!
!
!
!
!
!
!
!
!
ip nbar http-services
!
!
!
!
!


!
ip dhcp excluded-address 10.0.0.140
ip dhcp excluded-address 192.168.1.254
ip dhcp excluded-address 192.168.1.40
ip dhcp excluded-address 192.168.1.130 192.168.1.150
ip dhcp excluded-address 192.168.1.200 192.168.1.230
ip dhcp excluded-address 192.168.1.2 192.168.1.4
ip dhcp excluded-address 192.168.1.20
ip dhcp excluded-address 192.168.1.30
ip dhcp excluded-address 192.168.1.1
!
ip dhcp pool Vlan10
import all
network 192.168.1.0 255.255.255.0
default-router 192.168.1.1
dns-server 8.8.8.8 81.199.117.170
lease 3
!
ip dhcp pool static Salon
host 192.168.1.102 255.255.255.0
hardware-address 0100.0678.1d7e.a2
!
ip dhcp pool static salon2
host 192.168.1.100 255.255.255.0
hardware-address 0100.1526.0372.4a
!
ip dhcp pool static bedroom1
host 192.168.1.101 255.255.255.0
hardware-address 0100.0678.1d7e.a1
!
ip dhcp pool static bedroom2
host 192.168.1.104 255.255.255.0
hardware-address 0100.1526.0372.49
!
ip dhcp pool static movieroom1
host 192.168.1.103 255.255.255.0
hardware-address 0100.1526.0374.d9
!
!
!
ip name-server 8.8.8.8
ip name-server 81.199.117.170
ip cef
login block-for 300 attempts 5 within 30
no ipv6 cef
!
!
!
!
!
multilink bundle-name authenticated
!
!
!
!
!
!
!
license udi pid C887VA-W-E-K9 sn FGL203723AA
!
!
username cisco privilege 15 password 7 04420A085F741B4707
username cisco2 privilege 15 secret 5 $1$Zvhu$zdXQqs5OZ3VQOKBdJr3UY.
!
!
!
!
!
controller VDSL 0
!
!
class-map type inspect match-all INTERNAL_DOMAIN_FILTER
!
!
!
!
!
!
!
!
!
!
!
interface ATM0
no ip address
shutdown
no atm ilmi-keepalive
!
interface Ethernet0
no ip address
shutdown
!
interface FastEthernet0
no ip address
!
interface FastEthernet1
description Inside Lan Vlan 10
switchport access vlan 10
no ip address
spanning-tree portfast
!
interface FastEthernet2
description (connect to Vlan30 for checking internet Conectivity outside interface)
switchport access vlan 30
no ip address
!
interface FastEthernet3
description Connect To hot Modem
switchport access vlan 30
no ip address
spanning-tree portfast
!
interface Wlan-GigabitEthernet0
description internal switch interface connecting to the embedded AP
switchport mode trunk
no ip address
!
interface wlan-ap0
description Embedded service module interface to manage the embedded AP
ip unnumbered Vlan1
!
interface Vlan1
ip address 192.168.10.1 255.255.255.0
ip nat inside
ip virtual-reassembly in
!
interface Vlan10
ip address 192.168.1.1 255.255.255.0
ip nbar protocol-discovery
ip nat inside
ip virtual-reassembly in
!
interface Vlan30
ip address dhcp
ip nbar protocol-discovery
ip nat outside
ip virtual-reassembly in
!
ip forward-protocol nd
ip http server
ip http authentication local
ip http secure-server
!
!
ip dns server
ip nat inside source list 10 interface Vlan30 overload
ip nat inside source static tcp 192.168.1.40 90 interface Vlan30 90
ip nat inside source static tcp 192.168.1.40 6036 interface Vlan30 6036
ip nat inside source static tcp 192.168.1.220 20547 interface Vlan30 20547
!
ip access-list extended TerminalAccess
permit tcp any any eq 22 log
permit tcp any any
ip access-list extended aclAllowNat
remark --- Traffic allowed to be NATed from inside to out.
remark --- Block NAT traffic to RFC1918 addresses verbosely
deny ip any 10.0.0.0 0.255.255.255
deny ip any 172.16.0.0 0.15.255.255
deny ip any 192.168.0.0 0.0.255.255
ip access-list extended aclallownat
permit ip any any
!
!
access-list 10 permit 192.168.1.0 0.0.0.255
access-list 10 permit 192.168.10.0 0.0.0.255
!
control-plane
!
!
!
mgcp behavior rsip-range tgcp-only
mgcp behavior comedia-role none
mgcp behavior comedia-check-media-src disable
mgcp behavior comedia-sdp-force disable
!
mgcp profile default
!
!
!
!
!
gateway
timer receive-rtp 1200
!
!
alias exec s show ip int br
alias exec sr show run
!
line con 0
no modem enable
line aux 0
access-class sl_def_acl in
line 2
access-class sl_def_acl in
no activation-character
no exec
transport preferred none
transport input all
stopbits 1
line vty 0 4
access-class TerminalAccess in
privilege level 15
password 7 031D5A05565A764540
login
transport input telnet ssh
!
scheduler allocate 20000 1000
!
end

1 Reply 1

johnd2310
Level 8
Level 8

Hi,

You might need to use the client-identifier option instead of hardware-address. Have a look at a wireshark capture of the dhcp traffic to see what the clients are sending.

Thanks

John 

**Please rate posts you find helpful**