?
Solved

Problems enabling DHCP snooping on WS-C3750G

Posted on 2010-11-24
4
Medium Priority
?
891 Views
Last Modified: 2012-05-10
I'm having problems enabling dhcp snooping on a Core switch(WS-C3750G-12S-S). The DHCP server (Win 2003 std.) is connected to port 2/0/13, and I'm testing with a VMware client connected to the switch (vlan5).

NyCoreswitch#sh ip dhcp snooping
Switch DHCP snooping is enabled.
DHCP snooping is configured on following VLANs:
4-6,9-10,44,340
Insertion of option 82 is disabled
   circuit-id format: vlan-mod-port
    remote-id format: MAC
Option 82 on untrusted port is not allowed
Verification of hwaddr field is enabled
Interface                    Trusted     Rate limit (pps)
------------------------     -------     ----------------
...
GigabitEthernet2/0/13        yes         unlimited
...

Open in new window


What am I missing?

Thanks!
0
Comment
Question by:Spanjis
  • 3
4 Comments
 
LVL 79

Expert Comment

by:lrmoore
ID: 34210105
Snooping is enabled, and port 2/0/13 is trusted. This is the way it works. It will trust dhcp server on this port.
I assume that it is the only trusted port? If yes, then what is the issue?
0
 

Author Comment

by:Spanjis
ID: 34214530
Hi Irmoore,

This is the only trusted port right now.

I've double-checked the DHCP-server port.

ipconfig-all tells me that this is the DHCP-server:
DHCP-server . . . . . . . . . . . : 172.18.4.53

So the DHCP-server is connected to port Gi2/0/13:
NyCoreswitch#sh arp | include 172.18.4.53
Internet  172.18.4.53             0   000b.cd2f.9afe  ARPA   Vlan4
NyCoreswitch#sh mac-address-table | include 000b.cd2f.9afe
   4    000b.cd2f.9afe    DYNAMIC     Gi2/0/13

Open in new window


But when i enable dhcp-snooping, and run ipconfig /release /renew the client don't get an IP-address.
0
 

Accepted Solution

by:
Spanjis earned 0 total points
ID: 34240630
Embarrassing, the DHCP server had 2 NIC.
0
 

Author Closing Comment

by:Spanjis
ID: 34276736
debug ip dhcp snooping did the trick :) I then found out the DHCP server had 2 NIC's.
0

Featured Post

Nothing ever in the clear!

This technical paper will help you implement VMware’s VM encryption as well as implement Veeam encryption which together will achieve the nothing ever in the clear goal. If a bad guy steals VMs, backups or traffic they get nothing.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article is in regards to the Cisco QSFP-4SFP10G-CU1M cables, which are designed to uplink/downlink 40GB ports to 10GB SFP ports. I recently experienced this and found very little configuration documentation on how these are supposed to be confi…
This article will show you step-by-step instructions to build your own NTP CentOS server.  The network diagram shows the best practice to setup the NTP server farm for redundancy.  This article also serves as your NTP server documentation.
Viewers will learn how to connect to a wireless network using the network security key. They will also learn how to access the IP address and DNS server for connections that must be done manually. After setting up a router, find the network security…
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…

862 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question