<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: DHCP Server functionallity with 310i as VC in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72765#M6687</link>
    <description>&lt;P&gt;From the CLI of one of the 7522’s, try running this:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service pktcap on bridge filter port 67 and port 68&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The output will show the actual DHCP traffic bridging through the AP. My guess is that either the OFFER is not making it back or the client’s REQUEST isn’t going out.&lt;/P&gt;</description>
    <pubDate>Tue, 03 Aug 2021 23:53:30 GMT</pubDate>
    <dc:creator>ckelly</dc:creator>
    <dc:date>2021-08-03T23:53:30Z</dc:date>
    <item>
      <title>DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72753#M6675</link>
      <description>&lt;P&gt;Hello,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have an AP310i as a VC in a site, where it adopts APs 7522. In addition to the native VLAN 1, I need to deliver IP to two other different VLANs, for that, I created DHCP servers in the controller. This configuration is identical to another site, where I have an RFS6000 as controller, and everything is working correctly, however, with the 310i as VC, the adopted APs do not deliver IP through this DHCP Server.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is the running config of AP310i (VC):&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;! Configuration of AP310 version 7.6.2.0-018R&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;version 2.7&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;client-identity-group default&lt;BR /&gt;&amp;nbsp;load default-fingerprints&lt;BR /&gt;!&lt;BR /&gt;ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;&amp;nbsp;permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt;&amp;nbsp;permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"&lt;BR /&gt;&amp;nbsp;deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"&lt;BR /&gt;&amp;nbsp;deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"&lt;BR /&gt;&amp;nbsp;deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local broadcast"&lt;BR /&gt;&amp;nbsp;permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;!&lt;BR /&gt;mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;&amp;nbsp;permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"&lt;BR /&gt;&amp;nbsp;permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"&lt;BR /&gt;!&lt;BR /&gt;ip snmp-access-list default&lt;BR /&gt;&amp;nbsp;permit any&lt;BR /&gt;!&lt;BR /&gt;firewall-policy default&lt;BR /&gt;&amp;nbsp;no ip dos tcp-sequence-past-window&lt;BR /&gt;&amp;nbsp;no stateful-packet-inspection-l2&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1400&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mint-policy global-default&lt;BR /&gt;!&lt;BR /&gt;meshpoint-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy default&lt;BR /&gt;&amp;nbsp;qos trust dscp&lt;BR /&gt;&amp;nbsp;qos trust wmm&lt;BR /&gt;!&lt;BR /&gt;radio-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;aaa-policy RADIUS_FOGAS&lt;BR /&gt;&amp;nbsp;authentication server 1 host 191.1.10.3 secret 0 fogas123&lt;BR /&gt;&amp;nbsp;authentication server 1 proxy-mode through-controller&lt;BR /&gt;!&lt;BR /&gt;wlan Fogas_Corporativo&lt;BR /&gt;&amp;nbsp;description Fogas_Corporativo&lt;BR /&gt;&amp;nbsp;ssid Fogas_Corporativo&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;bridging-mode local&lt;BR /&gt;&amp;nbsp;encryption-type ccmp&lt;BR /&gt;&amp;nbsp;authentication-type eap&lt;BR /&gt;&amp;nbsp;no multi-band-operation&lt;BR /&gt;&amp;nbsp;use aaa-policy RADIUS_FOGAS&lt;BR /&gt;!&lt;BR /&gt;wlan Fogas_Mobile&lt;BR /&gt;&amp;nbsp;description Fogas_Mobile&lt;BR /&gt;&amp;nbsp;ssid Fogas_Mobile&lt;BR /&gt;&amp;nbsp;vlan 40&lt;BR /&gt;&amp;nbsp;bridging-mode tunnel&lt;BR /&gt;&amp;nbsp;encryption-type tkip-ccmp&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no multi-band-operation&lt;BR /&gt;&amp;nbsp;no protected-mgmt-frames&lt;BR /&gt;&amp;nbsp;wpa-wpa2 psk 0 Fogas@123&lt;BR /&gt;!&lt;BR /&gt;wlan Fogas_Visitante&lt;BR /&gt;&amp;nbsp;description Fogas_Visitante&lt;BR /&gt;&amp;nbsp;ssid Fogas_Visitante&lt;BR /&gt;&amp;nbsp;vlan 50&lt;BR /&gt;&amp;nbsp;bridging-mode tunnel&lt;BR /&gt;&amp;nbsp;encryption-type none&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no multi-band-operation&lt;BR /&gt;&amp;nbsp;no protected-mgmt-frames&lt;BR /&gt;&amp;nbsp;time-based-access days all start 06:00 end 19:00&lt;BR /&gt;!&lt;BR /&gt;smart-rf-policy default&lt;BR /&gt;&amp;nbsp;no select-shutdown&lt;BR /&gt;&amp;nbsp;no smart-sensor&lt;BR /&gt;&amp;nbsp;smart-sensor auto-trigger&lt;BR /&gt;&amp;nbsp;smart-sensor band smart-band-5GHz&lt;BR /&gt;&amp;nbsp;smart-sensor tri-radio-only&lt;BR /&gt;!&lt;BR /&gt;auto-provisioning-policy APP-FOGAS&lt;BR /&gt;&amp;nbsp;adopt ap7522 precedence 1 profile AP-7522 rf-domain default ip 10.8.0.0/16&amp;nbsp;&lt;BR /&gt;!&lt;BR /&gt;radius-server-policy default&lt;BR /&gt;&amp;nbsp;nas 191.1.10.3/32 secret 0 fogas123&lt;BR /&gt;!&lt;BR /&gt;dhcp-server-policy DHCP_FOGAS&lt;BR /&gt;&amp;nbsp;bootp ignore&lt;BR /&gt;&amp;nbsp;dhcp-pool vlan40&lt;BR /&gt;&amp;nbsp; network 192.168.48.0/24&lt;BR /&gt;&amp;nbsp; address range 192.168.48.10 192.168.48.254&amp;nbsp;&lt;BR /&gt;&amp;nbsp; default-router 192.168.48.1&lt;BR /&gt;&amp;nbsp; dns-server &amp;nbsp;191.1.10.1 172.28.123.21&lt;BR /&gt;&amp;nbsp;dhcp-pool vlan50&lt;BR /&gt;&amp;nbsp; network 192.168.58.0/24&lt;BR /&gt;&amp;nbsp; address range 192.168.58.10 192.168.58.99&amp;nbsp;&lt;BR /&gt;&amp;nbsp; default-router 192.168.58.1&lt;BR /&gt;&amp;nbsp; dns-server &amp;nbsp;8.8.8.8 8.8.4.4&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;management-policy default&lt;BR /&gt;&amp;nbsp;telnet&lt;BR /&gt;&amp;nbsp;no http server&lt;BR /&gt;&amp;nbsp;https server&lt;BR /&gt;&amp;nbsp;rest-server&lt;BR /&gt;&amp;nbsp;ssh&lt;BR /&gt;&amp;nbsp;user admin password 1 8553661a49b0c8a0856a3ee27bfc63a1a5a14b39861bdb89af85a547fbb8d899 role superuser access all&lt;BR /&gt;&amp;nbsp;snmp-server community 0 private rw&lt;BR /&gt;&amp;nbsp;snmp-server community 0 public ro&lt;BR /&gt;&amp;nbsp;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;&amp;nbsp;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;!&lt;BR /&gt;event-system-policy default&lt;BR /&gt;!&lt;BR /&gt;profile anyap AP-7522&lt;BR /&gt;&amp;nbsp;ip default-gateway 10.8.100.200&lt;BR /&gt;&amp;nbsp;no autoinstall configuration&lt;BR /&gt;&amp;nbsp;no autoinstall firmware&lt;BR /&gt;&amp;nbsp;crypto ikev1 policy ikev1-default&amp;nbsp;&lt;BR /&gt;&amp;nbsp; isakmp-proposal default encryption aes-256 group 2 hash sha&amp;nbsp;&lt;BR /&gt;&amp;nbsp;crypto ikev2 policy ikev2-default&amp;nbsp;&lt;BR /&gt;&amp;nbsp; isakmp-proposal default encryption aes-256 group 2 hash sha&amp;nbsp;&lt;BR /&gt;&amp;nbsp;crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;&amp;nbsp;crypto ikev1 remote-vpn&lt;BR /&gt;&amp;nbsp;crypto ikev2 remote-vpn&lt;BR /&gt;&amp;nbsp;crypto auto-ipsec-secure&lt;BR /&gt;&amp;nbsp;crypto load-management&lt;BR /&gt;&amp;nbsp;crypto remote-vpn-client&lt;BR /&gt;&amp;nbsp;interface radio1&lt;BR /&gt;&amp;nbsp; wlan Fogas_Corporativo bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Visitante bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Mobile bss 3 primary&lt;BR /&gt;&amp;nbsp;interface radio2&lt;BR /&gt;&amp;nbsp; wlan Fogas_Corporativo bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Visitante bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Mobile bss 3 primary&lt;BR /&gt;&amp;nbsp;interface radio3&lt;BR /&gt;&amp;nbsp;interface bluetooth1&lt;BR /&gt;&amp;nbsp; shutdown&lt;BR /&gt;&amp;nbsp; mode bt-sensor&lt;BR /&gt;&amp;nbsp;interface up1&lt;BR /&gt;&amp;nbsp; switchport mode trunk&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 1,40,50&lt;BR /&gt;&amp;nbsp;interface eth0&lt;BR /&gt;&amp;nbsp;interface eth1&lt;BR /&gt;&amp;nbsp;interface eth2&lt;BR /&gt;&amp;nbsp;interface eth3&lt;BR /&gt;&amp;nbsp;interface ge1&lt;BR /&gt;&amp;nbsp; switchport mode trunk&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 1,40,50&lt;BR /&gt;&amp;nbsp;interface ge2&lt;BR /&gt;&amp;nbsp;interface fe1&lt;BR /&gt;&amp;nbsp;interface fe2&lt;BR /&gt;&amp;nbsp;interface fe3&lt;BR /&gt;&amp;nbsp;interface fe4&lt;BR /&gt;&amp;nbsp;interface vlan1&lt;BR /&gt;&amp;nbsp; ip address dhcp&lt;BR /&gt;&amp;nbsp;interface pppoe1&lt;BR /&gt;&amp;nbsp;use dhcp-server-policy DHCP_FOGAS&lt;BR /&gt;&amp;nbsp;use firewall-policy default&lt;BR /&gt;&amp;nbsp;use auto-provisioning-policy APP-FOGAS&lt;BR /&gt;&amp;nbsp;service pm sys-restart&lt;BR /&gt;&amp;nbsp;router ospf&lt;BR /&gt;&amp;nbsp;adoption-mode controller&lt;BR /&gt;!&lt;BR /&gt;profile ap310 default-ap310&lt;BR /&gt;&amp;nbsp;ip name-server 191.1.10.1&lt;BR /&gt;&amp;nbsp;ip name-server 191.1.10.3&lt;BR /&gt;&amp;nbsp;ip name-server 172.28.123.21&lt;BR /&gt;&amp;nbsp;ip domain-name fogas.local&lt;BR /&gt;&amp;nbsp;ip default-gateway 10.8.100.200&lt;BR /&gt;&amp;nbsp;autoinstall configuration&lt;BR /&gt;&amp;nbsp;autoinstall firmware&lt;BR /&gt;&amp;nbsp;crypto ikev1 policy ikev1-default&amp;nbsp;&lt;BR /&gt;&amp;nbsp; isakmp-proposal default encryption aes-256 group 2 hash sha&amp;nbsp;&lt;BR /&gt;&amp;nbsp;crypto ikev2 policy ikev2-default&amp;nbsp;&lt;BR /&gt;&amp;nbsp; isakmp-proposal default encryption aes-256 group 2 hash sha&amp;nbsp;&lt;BR /&gt;&amp;nbsp;crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;&amp;nbsp;crypto ikev1 remote-vpn&lt;BR /&gt;&amp;nbsp;crypto ikev2 remote-vpn&lt;BR /&gt;&amp;nbsp;crypto auto-ipsec-secure&lt;BR /&gt;&amp;nbsp;crypto load-management&lt;BR /&gt;&amp;nbsp;crypto remote-vpn-client&lt;BR /&gt;&amp;nbsp;interface radio1&lt;BR /&gt;&amp;nbsp; wlan Fogas_Corporativo bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Mobile bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Visitante bss 3 primary&lt;BR /&gt;&amp;nbsp; antenna-mode 2x2&lt;BR /&gt;&amp;nbsp;interface radio2&lt;BR /&gt;&amp;nbsp; wlan Fogas_Corporativo bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Mobile bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Visitante bss 3 primary&lt;BR /&gt;&amp;nbsp; antenna-mode 2x2&lt;BR /&gt;&amp;nbsp;interface bluetooth1&lt;BR /&gt;&amp;nbsp; shutdown&lt;BR /&gt;&amp;nbsp; mode le-sensor&lt;BR /&gt;&amp;nbsp;interface ge1&lt;BR /&gt;&amp;nbsp; description "Vlan Rede Local"&lt;BR /&gt;&amp;nbsp;interface ge2&lt;BR /&gt;&amp;nbsp; description "Vlan Rede Sem Fio"&lt;BR /&gt;&amp;nbsp;interface vlan1&lt;BR /&gt;&amp;nbsp; ip address dhcp&lt;BR /&gt;&amp;nbsp; ip dhcp client request options all&lt;BR /&gt;&amp;nbsp;interface pppoe1&lt;BR /&gt;&amp;nbsp;interface usb0&lt;BR /&gt;&amp;nbsp;use dhcp-server-policy DHCP_FOGAS&lt;BR /&gt;&amp;nbsp;no use firewall-policy&lt;BR /&gt;&amp;nbsp;ntp server a.ntp.br&amp;nbsp;&lt;BR /&gt;&amp;nbsp;use client-identity-group default&lt;BR /&gt;&amp;nbsp;no virtual-controller management-interface ip address&lt;BR /&gt;&amp;nbsp;logging on&lt;BR /&gt;&amp;nbsp;service pm sys-restart&lt;BR /&gt;&amp;nbsp;router ospf&lt;BR /&gt;&amp;nbsp;adoption-mode controller&lt;BR /&gt;!&lt;BR /&gt;rf-domain default&lt;BR /&gt;&amp;nbsp;location Cuiaba&lt;BR /&gt;&amp;nbsp;contact suporte@fogas.com.br&lt;BR /&gt;&amp;nbsp;timezone Etc/GMT-4&lt;BR /&gt;&amp;nbsp;country-code br&lt;BR /&gt;&amp;nbsp;ad-wips-wireless-mitigation disable&lt;BR /&gt;&amp;nbsp;ad-wips-wired-mitigation disable&lt;BR /&gt;!&lt;BR /&gt;ap7522 94-9B-2C-2A-DB-AC&lt;BR /&gt;&amp;nbsp;use profile AP-7522&lt;BR /&gt;&amp;nbsp;use rf-domain default&lt;BR /&gt;&amp;nbsp;hostname AP-CGB02-ADM01&lt;BR /&gt;&amp;nbsp;area Administracao&lt;BR /&gt;&amp;nbsp;floor Administracao&lt;BR /&gt;&amp;nbsp;interface vlan1&lt;BR /&gt;&amp;nbsp; ip address 10.8.5.1/16&lt;BR /&gt;&amp;nbsp; ip address zeroconf secondary&lt;BR /&gt;!&lt;BR /&gt;ap310 20-9E-F7-78-F5-91&lt;BR /&gt;&amp;nbsp;use profile default-ap310&lt;BR /&gt;&amp;nbsp;use rf-domain default&lt;BR /&gt;&amp;nbsp;hostname AP-CGB-ADM01&lt;BR /&gt;&amp;nbsp;area CONTROLLER&lt;BR /&gt;&amp;nbsp;use radius-server-policy default&lt;BR /&gt;&amp;nbsp;interface radio1&lt;BR /&gt;&amp;nbsp; wlan Fogas_Corporativo bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Visitante bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Mobile bss 3 primary&lt;BR /&gt;&amp;nbsp; ldpc&lt;BR /&gt;&amp;nbsp;interface radio2&lt;BR /&gt;&amp;nbsp; wlan Fogas_Visitante bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Mobile bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Corporativo bss 3 primary&lt;BR /&gt;&amp;nbsp; ldpc&lt;BR /&gt;&amp;nbsp;interface ge2&lt;BR /&gt;&amp;nbsp; switchport mode trunk&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 1,40,50&lt;BR /&gt;&amp;nbsp; switchport trunk native vlan 1&lt;BR /&gt;&amp;nbsp;interface vlan1&lt;BR /&gt;&amp;nbsp; ip address 10.8.5.2/16&lt;BR /&gt;&amp;nbsp; ip address zeroconf secondary&lt;BR /&gt;&amp;nbsp;interface vlan40&lt;BR /&gt;&amp;nbsp; ip address 192.168.48.3/24&lt;BR /&gt;&amp;nbsp;interface vlan50&lt;BR /&gt;&amp;nbsp; ip address 192.168.58.3/24&lt;BR /&gt;&amp;nbsp;use dhcp-server-policy DHCP_FOGAS&lt;BR /&gt;&amp;nbsp;no use auto-provisioning-policy&lt;BR /&gt;&amp;nbsp;virtual-controller&lt;BR /&gt;&amp;nbsp;rf-domain-manager capable&lt;BR /&gt;&amp;nbsp;no adoption-mode&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;end&lt;/P&gt;</description>
      <pubDate>Sat, 31 Jul 2021 21:26:08 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72753#M6675</guid>
      <dc:creator>Matheus_Santana</dc:creator>
      <dc:date>2021-07-31T21:26:08Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72754#M6676</link>
      <description>&lt;P&gt;Matheus,&lt;/P&gt;&lt;P&gt;It looks like the DHCP server configuration is correct on the AP310i.&lt;/P&gt;&lt;P&gt;Are the 7522’s being adopted to the VC 310i? (Are they getting their config?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;On the 7522 Profile though, you need this configuration for the other two VLANs so that those SVI’s know to look for a DHCP server.&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface vlan40&lt;BR /&gt;&amp;nbsp; ip address dhcp&lt;BR /&gt;&amp;nbsp; ip dhcp client request options all &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;interface vlan50&lt;BR /&gt;&amp;nbsp; ip address dhcp&lt;BR /&gt;&amp;nbsp; ip dhcp client request options all &lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 02 Aug 2021 20:28:06 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72754#M6676</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2021-08-02T20:28:06Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72755#M6677</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have include the option in VLAN40 for test, even so, the users don’t get IP.&lt;/P&gt;&lt;P&gt;Here is the run config of one 7522 adopted in 310i:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;!&lt;BR /&gt;! Configuration of AP7522 version 7.6.2.0-018R&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;version 2.7&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;ip snmp-access-list default&lt;BR /&gt;&amp;nbsp;permit any&lt;BR /&gt;!&lt;BR /&gt;firewall-policy default&lt;BR /&gt;&amp;nbsp;no ip dos tcp-sequence-past-window&lt;BR /&gt;&amp;nbsp;no stateful-packet-inspection-l2&lt;BR /&gt;&amp;nbsp;ip tcp adjust-mss 1400&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;mint-policy global-default&lt;BR /&gt;!&lt;BR /&gt;wlan-qos-policy default&lt;BR /&gt;&amp;nbsp;qos trust dscp&lt;BR /&gt;&amp;nbsp;qos trust wmm&lt;BR /&gt;!&lt;BR /&gt;radio-qos-policy default&lt;BR /&gt;!&lt;BR /&gt;aaa-policy RADIUS_FOGAS&lt;BR /&gt;&amp;nbsp;authentication server 1 host 191.1.10.3 secret 0 fogas123&lt;BR /&gt;&amp;nbsp;authentication server 1 proxy-mode through-controller&lt;BR /&gt;!&lt;BR /&gt;wlan Fogas_Corporativo&lt;BR /&gt;&amp;nbsp;description Fogas_Corporativo&lt;BR /&gt;&amp;nbsp;ssid Fogas_Corporativo&lt;BR /&gt;&amp;nbsp;vlan 1&lt;BR /&gt;&amp;nbsp;bridging-mode local&lt;BR /&gt;&amp;nbsp;encryption-type ccmp&lt;BR /&gt;&amp;nbsp;authentication-type eap&lt;BR /&gt;&amp;nbsp;no protected-mgmt-frames&lt;BR /&gt;&amp;nbsp;no radio-resource-measurement&lt;BR /&gt;&amp;nbsp;accounting radius&lt;BR /&gt;&amp;nbsp;data-rates 2.4GHz custom basic-12 basic-18 basic-24 basic-36 basic-48 basic-54 basic-mcs-1s mcs-2s&lt;BR /&gt;&amp;nbsp;data-rates 5GHz custom basic-12 basic-18 basic-24 basic-36 basic-48 basic-54 basic-mcs-1s mcs-2s&lt;BR /&gt;&amp;nbsp;use aaa-policy RADIUS_FOGAS&lt;BR /&gt;!&lt;BR /&gt;wlan Fogas_Mobile&lt;BR /&gt;&amp;nbsp;description Fogas_Mobile&lt;BR /&gt;&amp;nbsp;ssid Fogas_Mobile&lt;BR /&gt;&amp;nbsp;vlan 40&lt;BR /&gt;&amp;nbsp;bridging-mode tunnel&lt;BR /&gt;&amp;nbsp;encryption-type tkip-ccmp&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no protected-mgmt-frames&lt;BR /&gt;&amp;nbsp;wpa-wpa2 psk 0 Fogas@123&lt;BR /&gt;!&lt;BR /&gt;wlan Fogas_Visitante&lt;BR /&gt;&amp;nbsp;description Fogas_Visitante&lt;BR /&gt;&amp;nbsp;ssid Fogas_Visitante&lt;BR /&gt;&amp;nbsp;vlan 50&lt;BR /&gt;&amp;nbsp;bridging-mode tunnel&lt;BR /&gt;&amp;nbsp;encryption-type none&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no protected-mgmt-frames&lt;BR /&gt;!&lt;BR /&gt;auto-provisioning-policy APP-FOGAS-SJK&lt;BR /&gt;&amp;nbsp;adopt ap7522 precedence 1 profile AP-7522 rf-domain default ip 10.9.0.0/16&lt;BR /&gt;!&lt;BR /&gt;radius-server-policy default&lt;BR /&gt;&amp;nbsp;nas 191.1.10.3/32 secret 0 fogas123&lt;BR /&gt;!&lt;BR /&gt;dhcp-server-policy DHCP_FOGAS&lt;BR /&gt;&amp;nbsp;dhcp-pool vlan40&lt;BR /&gt;&amp;nbsp; network 192.168.49.0/24&lt;BR /&gt;&amp;nbsp; address range 192.168.49.10 192.168.49.254&lt;BR /&gt;&amp;nbsp; default-router 192.168.49.1&lt;BR /&gt;&amp;nbsp; dns-server &amp;nbsp;191.1.10.1 172.28.123.21&lt;BR /&gt;&amp;nbsp;dhcp-pool vlan50&lt;BR /&gt;&amp;nbsp; network 192.168.59.0/24&lt;BR /&gt;&amp;nbsp; address range 192.168.59.10 192.168.59.254&lt;BR /&gt;&amp;nbsp; default-router 192.168.59.1&lt;BR /&gt;&amp;nbsp; dns-server &amp;nbsp;192.168.59.1&lt;BR /&gt;!&lt;BR /&gt;!&lt;BR /&gt;management-policy default&lt;BR /&gt;&amp;nbsp;telnet&lt;BR /&gt;&amp;nbsp;no http server&lt;BR /&gt;&amp;nbsp;https server&lt;BR /&gt;&amp;nbsp;rest-server&lt;BR /&gt;&amp;nbsp;no ftp&lt;BR /&gt;&amp;nbsp;ssh&lt;BR /&gt;&amp;nbsp;user admin password 1 2be1cb418e8f64c2db772aee9ebcff7604d6fc945a6dfe02567e5cd50d01cc06 role superuser access all&lt;BR /&gt;&amp;nbsp;snmp-server community 0 private rw&lt;BR /&gt;&amp;nbsp;snmp-server community 0 public ro&lt;BR /&gt;&amp;nbsp;snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;&amp;nbsp;snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;!&lt;BR /&gt;profile anyap AP-7522&lt;BR /&gt;&amp;nbsp;ip default-gateway 10.9.100.200&lt;BR /&gt;&amp;nbsp;ip route 192.168.49.0/24 192.168.49.1&lt;BR /&gt;&amp;nbsp;ip route 192.168.59.0/24 192.168.59.1&lt;BR /&gt;&amp;nbsp;no autoinstall configuration&lt;BR /&gt;&amp;nbsp;no autoinstall firmware&lt;BR /&gt;&amp;nbsp;use radius-server-policy default&lt;BR /&gt;&amp;nbsp;crypto ikev1 policy ikev1-default&lt;BR /&gt;&amp;nbsp; isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;&amp;nbsp;crypto ikev2 policy ikev2-default&lt;BR /&gt;&amp;nbsp; isakmp-proposal default encryption aes-256 group 2 hash sha&lt;BR /&gt;&amp;nbsp;crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;&amp;nbsp;crypto ikev1 remote-vpn&lt;BR /&gt;&amp;nbsp;crypto ikev2 remote-vpn&lt;BR /&gt;&amp;nbsp;crypto auto-ipsec-secure&lt;BR /&gt;&amp;nbsp;crypto load-management&lt;BR /&gt;&amp;nbsp;crypto remote-vpn-client&lt;BR /&gt;&amp;nbsp;interface radio1&lt;BR /&gt;&amp;nbsp; wlan Fogas_Corporativo bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Visitante bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Mobile bss 3 primary&lt;BR /&gt;&amp;nbsp; aggregation ampdu max-aggr-size tx 65535&lt;BR /&gt;&amp;nbsp; max-clients 512&lt;BR /&gt;&amp;nbsp; transmit-beamforming&lt;BR /&gt;&amp;nbsp;interface radio2&lt;BR /&gt;&amp;nbsp; wlan Fogas_Corporativo bss 1 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Visitante bss 2 primary&lt;BR /&gt;&amp;nbsp; wlan Fogas_Mobile bss 3 primary&lt;BR /&gt;&amp;nbsp; max-clients 512&lt;BR /&gt;&amp;nbsp; transmit-beamforming&lt;BR /&gt;&amp;nbsp;interface ge1&lt;BR /&gt;&amp;nbsp; switchport mode trunk&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 1,40,50&lt;BR /&gt;&amp;nbsp;interface vlan1&lt;BR /&gt;&amp;nbsp; ip address dhcp&lt;BR /&gt;&amp;nbsp;interface pppoe1&lt;BR /&gt;&amp;nbsp;use dhcp-server-policy DHCP_FOGAS&lt;BR /&gt;&amp;nbsp;use firewall-policy default&lt;BR /&gt;&amp;nbsp;use auto-provisioning-policy APP-FOGAS-SJK&lt;BR /&gt;&amp;nbsp;controller host 10.9.5.1 pool 1 level 1&lt;BR /&gt;&amp;nbsp;service pm sys-restart&lt;BR /&gt;&amp;nbsp;router ospf&lt;BR /&gt;&amp;nbsp;adoption-mode controller&lt;BR /&gt;!&lt;BR /&gt;rf-domain default&lt;BR /&gt;&amp;nbsp;contact suporte@fogas.com.br&lt;BR /&gt;&amp;nbsp;timezone Etc/GMT-3&lt;BR /&gt;&amp;nbsp;country-code br&lt;BR /&gt;&amp;nbsp;ad-wips-wireless-mitigation disable&lt;BR /&gt;&amp;nbsp;ad-wips-wired-mitigation disable&lt;BR /&gt;!&lt;BR /&gt;ap7522 48-9B-D5-DA-22-2C&lt;BR /&gt;&amp;nbsp;use profile AP-7522&lt;BR /&gt;&amp;nbsp;use rf-domain default&lt;BR /&gt;&amp;nbsp;hostname AP-JSK-ADM03&lt;BR /&gt;&amp;nbsp;area Administracao&lt;BR /&gt;&amp;nbsp;floor Administracao&lt;BR /&gt;&amp;nbsp;ip default-gateway 10.9.100.200&lt;BR /&gt;&amp;nbsp;interface ge1&lt;BR /&gt;&amp;nbsp; switchport mode trunk&lt;BR /&gt;&amp;nbsp; switchport trunk allowed vlan 1,40,50&lt;BR /&gt;&amp;nbsp; switchport trunk native vlan 1&lt;BR /&gt;&amp;nbsp;interface vlan1&lt;BR /&gt;&amp;nbsp; ip address 10.9.5.3/16&lt;BR /&gt;&amp;nbsp;interface vlan40&lt;BR /&gt;&amp;nbsp; ip address dhcp&lt;BR /&gt;&amp;nbsp; ip dhcp client request options all&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 01:43:19 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72755#M6677</guid>
      <dc:creator>Matheus_Santana</dc:creator>
      <dc:date>2021-08-03T01:43:19Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72756#M6678</link>
      <description>&lt;P&gt;You will notice that the settings of this AP and the 310i controller are different, this is because this AP is on another site, adopted in another AP310i, different from the one I sent the initial config, but all the settings are the same as the first one, changing only a few range of IP and addresses, the same problem occurs in both units&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 01:48:13 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72756#M6678</guid>
      <dc:creator>Matheus_Santana</dc:creator>
      <dc:date>2021-08-03T01:48:13Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72757#M6679</link>
      <description>&lt;P&gt;Matheus, I misunderstood something. I thought the issue was that the AP310i was not getting a DHCP lease on those VLANs. Going back and re-reading your original post, the problem is instead that the wireless clients using those VLANs on the adopted 7522’s are not getting leases.&lt;/P&gt;&lt;P&gt;But regardless, if the VC AP (or even controller or regular AP) is going to be running a DHCP service, an SVI is required for the DHCP service to operate on that VLAN. So for the 310i VC, those SVI’s needed to be there, so this was at least PART of the problem.&lt;/P&gt;&lt;P&gt;Let’s start first by checking for the DHCP service on the VC.&amp;nbsp; Run:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show ip dhcp status&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;You can then check for leases using:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;show ip dhcp binding&lt;/STRONG&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 03:32:37 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72757#M6679</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2021-08-03T03:32:37Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72758#M6680</link>
      <description>&lt;P&gt;Mr. Kelly,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Apparently the DHCP Server is running:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AP-JSK-ADM01#show ip dhcp status&lt;BR /&gt;State of DHCP server: running&lt;BR /&gt;Interfaces: vlan40, vlan50&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;AP-JSK-ADM01#show ip dhcp binding&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;&amp;nbsp; &amp;nbsp;# &amp;nbsp; &amp;nbsp; &amp;nbsp; HARDWARE ADDRESS &amp;nbsp; &amp;nbsp; &amp;nbsp; IP ADDRESS &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;EXPIRY TIME&lt;BR /&gt;--------------------------------------------------------------------------------&lt;BR /&gt;&amp;nbsp; 1 &amp;nbsp; &amp;nbsp; &amp;nbsp;36-3B-4C-2E-A5-8D &amp;nbsp; &amp;nbsp; 192.168.49.237 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 07:18:58 2021&lt;BR /&gt;&amp;nbsp; 2 &amp;nbsp; &amp;nbsp; &amp;nbsp;7A-84-2E-DC-1E-45 &amp;nbsp; &amp;nbsp; 192.168.49.242 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 08:46:43 2021&lt;BR /&gt;&amp;nbsp; 3 &amp;nbsp; &amp;nbsp; &amp;nbsp;CE-4A-B3-5D-D4-09 &amp;nbsp; &amp;nbsp; 192.168.49.240 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 09:57:56 2021&lt;BR /&gt;&amp;nbsp; 4 &amp;nbsp; &amp;nbsp; &amp;nbsp;12-57-F6-49-93-8C &amp;nbsp; &amp;nbsp; 192.168.49.241 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 08:34:55 2021&lt;BR /&gt;&amp;nbsp; 5 &amp;nbsp; &amp;nbsp; &amp;nbsp;6A-58-C3-D4-72-8B &amp;nbsp; &amp;nbsp; 192.168.49.246 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 20:27:54 2021&lt;BR /&gt;&amp;nbsp; 6 &amp;nbsp; &amp;nbsp; &amp;nbsp;6E-86-19-DD-3E-E2 &amp;nbsp; &amp;nbsp; 192.168.49.247 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 10:21:32 2021&lt;BR /&gt;&amp;nbsp; 7 &amp;nbsp; &amp;nbsp; &amp;nbsp;A8-DB-03-EE-31-2A &amp;nbsp; &amp;nbsp; 192.168.49.244 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 15:13:41 2021&lt;BR /&gt;&amp;nbsp; 8 &amp;nbsp; &amp;nbsp; &amp;nbsp;D2-B5-B0-0C-D3-0A &amp;nbsp; &amp;nbsp; 192.168.49.243 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 10:28:29 2021&lt;BR /&gt;&amp;nbsp; 9 &amp;nbsp; &amp;nbsp; &amp;nbsp;8A-4C-CD-67-A3-9C &amp;nbsp; &amp;nbsp; 192.168.59.252 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 06:54:34 2021&lt;BR /&gt;&amp;nbsp; 10 &amp;nbsp; &amp;nbsp; A0-39-F7-70-6F-36 &amp;nbsp; &amp;nbsp; 192.168.59.240 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 09:14:48 2021&lt;BR /&gt;&amp;nbsp; 11 &amp;nbsp; &amp;nbsp; CA-35-9C-07-10-BE &amp;nbsp; &amp;nbsp; 192.168.49.248 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 09:43:02 2021&lt;BR /&gt;&amp;nbsp; 12 &amp;nbsp; &amp;nbsp; A4-83-E7-AD-DF-1D &amp;nbsp; &amp;nbsp; 192.168.59.242 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 13:58:58 2021&lt;BR /&gt;&amp;nbsp; 13 &amp;nbsp; &amp;nbsp; 70-FD-46-55-B4-20 &amp;nbsp; &amp;nbsp; 192.168.59.254 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 18:18:50 2021&lt;BR /&gt;&amp;nbsp; 14 &amp;nbsp; &amp;nbsp; 8C-E5-C0-D0-3A-C6 &amp;nbsp; &amp;nbsp; 192.168.49.238 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 17:35:37 2021&lt;BR /&gt;&amp;nbsp; 15 &amp;nbsp; &amp;nbsp; AA-74-EE-A1-56-3B &amp;nbsp; &amp;nbsp; 192.168.49.252 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 19:36:34 2021&lt;BR /&gt;&amp;nbsp; 16 &amp;nbsp; &amp;nbsp; 58-D9-C3-94-48-1E &amp;nbsp; &amp;nbsp; 192.168.59.247 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 08:50:19 2021&lt;BR /&gt;&amp;nbsp; 17 &amp;nbsp; &amp;nbsp; 8C-45-00-83-6A-BC &amp;nbsp; &amp;nbsp; 192.168.59.236 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 18:59:30 2021&lt;BR /&gt;&amp;nbsp; 18 &amp;nbsp; &amp;nbsp; C0-8C-71-3A-FB-17 &amp;nbsp; &amp;nbsp; 192.168.59.237 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 10:48:42 2021&lt;BR /&gt;&amp;nbsp; 19 &amp;nbsp; &amp;nbsp; F0-D7-AA-4C-8A-94 &amp;nbsp; &amp;nbsp; 192.168.59.248 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 22:07:06 2021&lt;BR /&gt;&amp;nbsp; 20 &amp;nbsp; &amp;nbsp; 26-0E-0E-D3-5B-6C &amp;nbsp; &amp;nbsp; 192.168.59.246 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 07:49:05 2021&lt;BR /&gt;&amp;nbsp; 21 &amp;nbsp; &amp;nbsp; A8-16-D0-B7-67-F3 &amp;nbsp; &amp;nbsp; 192.168.49.254 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 18:44:37 2021&lt;BR /&gt;&amp;nbsp; 22 &amp;nbsp; &amp;nbsp; 0E-05-F7-27-D0-2A &amp;nbsp; &amp;nbsp; 192.168.49.239 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 10:08:48 2021&lt;BR /&gt;&amp;nbsp; 23 &amp;nbsp; &amp;nbsp; 9C-E0-63-9B-B6-DB &amp;nbsp; &amp;nbsp; 192.168.49.245 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 08:19:54 2021&lt;BR /&gt;&amp;nbsp; 24 &amp;nbsp; &amp;nbsp; 3A-D9-7A-BF-AD-13 &amp;nbsp; &amp;nbsp; 192.168.59.251 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 13:43:43 2021&lt;BR /&gt;&amp;nbsp; 25 &amp;nbsp; &amp;nbsp; 52-6F-8E-CF-9F-4B &amp;nbsp; &amp;nbsp; 192.168.59.250 &amp;nbsp; &amp;nbsp; Tue Aug &amp;nbsp;3 15:18:40 2021&lt;BR /&gt;&amp;nbsp; 26 &amp;nbsp; &amp;nbsp; BA-14-50-99-D7-5E &amp;nbsp; &amp;nbsp; 192.168.59.235 &amp;nbsp; &amp;nbsp; Wed Aug &amp;nbsp;4 09:13:01 2021&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 20:33:15 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72758#M6680</guid>
      <dc:creator>Matheus_Santana</dc:creator>
      <dc:date>2021-08-03T20:33:15Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72759#M6681</link>
      <description>&lt;P&gt;In looking at those leased addresses, I just noticed something.&lt;/P&gt;&lt;P&gt;You have a DHCP service running on the 7522 AP...as per the 7522 Profile. Is this what you intended?&lt;/P&gt;&lt;P&gt;Normally, there would be a DHCP service running somewhere on the network or with a DHCP helper or on a WiNG controller…..but typically not directly on all of the APs. (maybe on just one AP, but even that’s rare).&lt;/P&gt;&lt;P&gt;As it is, you have a 7522 AP Profile that runs a DHCP service on every 7522….using the SAME address pool. (What’s odd though is that in the 7522 config above, the address pool range is different than that in the actual DHCP server policy (7522 DHCP service has the pool: .&lt;STRONG&gt;49&lt;/STRONG&gt;.10 - .&lt;STRONG&gt;49&lt;/STRONG&gt;.254 and .&lt;STRONG&gt;59&lt;/STRONG&gt;.10 - &lt;STRONG&gt;.59&lt;/STRONG&gt;.254&lt;/P&gt;&lt;P&gt;But on the AP310 VC, the pool in the DHCP server config says: &lt;STRONG&gt;.48&lt;/STRONG&gt;-.10 - &lt;STRONG&gt;.48&lt;/STRONG&gt;.54 and &lt;STRONG&gt;.58&lt;/STRONG&gt;.10 - .&lt;STRONG&gt;58&lt;/STRONG&gt;.254)&lt;/P&gt;&lt;P&gt;Not sure how to explain how these pool ranges are different.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Besides all that though, can you identify what these devices are in the DHCP binding output?&amp;nbsp; Are they wireless clients?&amp;nbsp; Or are they maybe instead wired clients?&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 20:59:24 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72759#M6681</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2021-08-03T20:59:24Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72760#M6682</link>
      <description>&lt;P&gt;I removed the DHCP service from the AP7532 profile, leaving it only on the AP VC 310, really, this was incorrect.&lt;/P&gt;&lt;P&gt;The ranges are different between the AP310 config I sent and this AP7522, because I'm collecting this information from another unit, which works the same way (An AP310 as VC and APs 7522 as slaves), this ap is adopted in another 310 VC , which is in another unit, different from the AP config that I sent at the beginning, in this other unit, the range is 49.&lt;/P&gt;&lt;P&gt;All these users are wireless clients, remembering that from VC, all networks are working normally, from 7522 onwards, VLANs 40 and 50 are not functional.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 21:20:24 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72760#M6682</guid>
      <dc:creator>Matheus_Santana</dc:creator>
      <dc:date>2021-08-03T21:20:24Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72761#M6683</link>
      <description>&lt;P&gt;So all of these DHCP bindings are from wireless clients.&lt;/P&gt;&lt;P&gt;And those lease IP addresses come from VLAN 40 and 50. To be clear, are you saying that those leases are for wireless clients that are directly associated with the radios on the 310i VC and not from clients associating with the 7522’s?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Looking through the configs some more, found this unsupported configuration:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;wlan Fogas_Mobile&lt;BR /&gt;&amp;nbsp;description Fogas_Mobile&lt;BR /&gt;&amp;nbsp;ssid Fogas_Mobile&lt;BR /&gt;&amp;nbsp;vlan 40&lt;BR /&gt;&amp;nbsp;bridging-mode &lt;SPAN style="color:#2980b9;"&gt;&lt;STRONG&gt;tunnel &lt;/STRONG&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Same thing on the “ Fogas_Visitante” WLAN config.&lt;/P&gt;&lt;P&gt;Tunneled WLANs are not supported with VC APs (only supported on hardware WiNG controllers - like the RFS6000 you have).&amp;nbsp; Change this value from “tunnel” to “&lt;STRONG&gt;local&lt;/STRONG&gt;”.&lt;/P&gt;&lt;P&gt;Looks like wlan “Fogas_Corporativo” is already set to ‘local’. Out of curiosity, do wireless clients associating to this WLAN get a DHCP lease?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Also, on the 310i VC, you have ge2 setup as the trunk port and not ge1. Is this correct? Intentional? Network cable is plugged into ge2?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 21:50:42 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72761#M6683</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2021-08-03T21:50:42Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72762#M6684</link>
      <description>&lt;P&gt;The Fogas_Corporativo wlan delivers IP directly from native vlan and doesn't need dhcp server from VC, it already delivers IP automatically.&lt;/P&gt;&lt;P&gt;VC's ge2 port has this trunk configuration, as the routing of vlan 50 arrives there, and for this reason the network was in tunnel,&amp;nbsp;this routing does not physically reach the 7522 at the ends.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 22:20:39 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72762#M6684</guid>
      <dc:creator>Matheus_Santana</dc:creator>
      <dc:date>2021-08-03T22:20:39Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72763#M6685</link>
      <description>&lt;P&gt;For reference, this is what I’m talking about, regarding the tunneling option of the wlan:&lt;/P&gt;&lt;BLOCKQUOTE&gt;&lt;P&gt;wlan Fogas_Visitante&lt;BR /&gt;&amp;nbsp;description Fogas_Visitante&lt;BR /&gt;&amp;nbsp;ssid Fogas_Visitante&lt;BR /&gt;&amp;nbsp;vlan 50&lt;BR /&gt;&amp;nbsp;&lt;STRONG&gt;bridging-mode&lt;/STRONG&gt; &lt;STRONG&gt;tunnel&lt;/STRONG&gt;&lt;BR /&gt;&amp;nbsp;encryption-type none&lt;BR /&gt;&amp;nbsp;authentication-type none&lt;BR /&gt;&amp;nbsp;no protected-mgmt-frames&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;It sounds like maybe you are not familiar with this bridging mode. To be clear, a tunneled wlan like this will force the wireless client’s traffic to be carried over a MiNT tunnel to another MiNT capable device - normally the WiNG controller, where it is then unpacked and dropped onto the proper VLAN that exist on the controller’s interface. In this case, the controller is the AP310i VC.&lt;/P&gt;&lt;P&gt;A “local” bridged wlan will simply take wireless client traffic and bridge it directly onto the assigned VLAN on the APs ge1/ge2 interface, where it then makes its way to the switch and is then treated like normal LAN traffic.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The problem here is that a VC AP does not support a data plane, which is what is needed to be able to process the wireless client traffic coming back via the MiNT tunnel. So when using an AP as a VC, all of your wlans MUST be configured for “local” bridging mode.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 23:04:40 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72763#M6685</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2021-08-03T23:04:40Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72764#M6686</link>
      <description>&lt;P&gt;Understood, currently I've changed it to local, in both VLANs, in addition, I also disabled the DHCP service directly in the profile of the APs 7522, leaving only the 310i. Despite this, clients still don't get IP from the 7522 APs.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 23:24:09 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72764#M6686</guid>
      <dc:creator>Matheus_Santana</dc:creator>
      <dc:date>2021-08-03T23:24:09Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72765#M6687</link>
      <description>&lt;P&gt;From the CLI of one of the 7522’s, try running this:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;enable&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;service pktcap on bridge filter port 67 and port 68&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The output will show the actual DHCP traffic bridging through the AP. My guess is that either the OFFER is not making it back or the client’s REQUEST isn’t going out.&lt;/P&gt;</description>
      <pubDate>Tue, 03 Aug 2021 23:53:30 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72765#M6687</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2021-08-03T23:53:30Z</dc:date>
    </item>
    <item>
      <title>Re: DHCP Server functionallity with 310i as VC</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72766#M6688</link>
      <description>&lt;P&gt;From port 68 to 67 I got this:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10 17:04:47.831224 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 306, DHCP Discover from 8C-45-00-83-6A-BC, DF, DSCP 4&lt;BR /&gt;11 17:04:49.917764 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 306, DHCP Discover from 8C-45-00-83-6A-BC, DF, DSCP 4&lt;BR /&gt;12 17:04:50.573403 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 310, DHCP Discover from A4-63-A1-58-EE-12 for 192.168.59.251, DSCP 0&lt;BR /&gt;13 17:04:52.599713 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 320, DHCP Discover from 52-6F-8E-CF-9F-4B, DF, DSCP 4&lt;BR /&gt;14 17:04:52.739498 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from CA-35-9C-07-10-BE, DF, DSCP 4&lt;BR /&gt;15 17:04:53.620045 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 320, DHCP Discover from 52-6F-8E-CF-9F-4B, DF, DSCP 4&lt;BR /&gt;16 17:04:53.761857 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from CA-35-9C-07-10-BE, DF, DSCP 4&lt;BR /&gt;17 17:04:54.163434 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 306, DHCP Discover from 8C-45-00-83-6A-BC, DF, DSCP 4&lt;BR /&gt;18 17:04:54.399734 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 310, DHCP Discover from A4-63-A1-58-EE-12 for 192.168.59.251, DSCP 0&lt;BR /&gt;19 17:04:54.760749 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 312, DHCP Discover from A8-DB-03-EE-31-2A, DF, DSCP 4&lt;BR /&gt;20 17:04:55.447080 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 294, DHCP Discover from 0E-05-F7-27-D0-2A, DF, DSCP 4&lt;BR /&gt;21 17:04:55.560933 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 320, DHCP Discover from 52-6F-8E-CF-9F-4B, DF, DSCP 4&lt;BR /&gt;22 17:04:55.687330 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from CA-35-9C-07-10-BE, DF, DSCP 4&lt;BR /&gt;23 17:04:59.383870 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 310, DHCP Discover from A4-63-A1-58-EE-12 for 192.168.59.251, DSCP 0&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;And 67 to 68:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;10 17:05:42.188657 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 294, DHCP Discover from 0E-05-F7-27-D0-2A, DF, DSCP 4&lt;BR /&gt;11 17:05:42.902674 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from 36-3B-4C-2E-A5-8D, DF, DSCP 4&lt;BR /&gt;12 17:05:43.199825 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from CA-35-9C-07-10-BE, DF, DSCP 4&lt;BR /&gt;13 17:05:44.307935 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from CA-35-9C-07-10-BE, DF, DSCP 4&lt;BR /&gt;14 17:05:44.899103 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from 36-3B-4C-2E-A5-8D, DF, DSCP 4&lt;BR /&gt;15 17:05:45.573458 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 320, DHCP Discover from 52-6F-8E-CF-9F-4B, DF, DSCP 4&lt;BR /&gt;16 17:05:46.263094 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from CA-35-9C-07-10-BE, DF, DSCP 4&lt;BR /&gt;17 17:05:47.750456 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 308, DHCP Discover from 70-FD-46-55-B4-20, DF, DSCP 4&lt;BR /&gt;18 17:05:48.656315 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from 36-3B-4C-2E-A5-8D, DF, DSCP 4&lt;BR /&gt;19 17:05:50.102281 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from CA-35-9C-07-10-BE, DF, DSCP 4&lt;BR /&gt;20 17:05:50.433774 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 294, DHCP Discover from 0E-05-F7-27-D0-2A, DF, DSCP 4&lt;BR /&gt;21 17:05:53.407806 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 320, DHCP Discover from 52-6F-8E-CF-9F-4B, DF, DSCP 4&lt;BR /&gt;22 17:05:55.215486 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 308, DHCP Request from 98-CA-33-91-12-86 to 0.0.0.0 for 192.168.59.234/0.0.0.0, DSCP 0&lt;BR /&gt;23 17:05:56.527166 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 300, DHCP Discover from 30-FC-EB-75-83-0F, DF, DSCP 4&lt;BR /&gt;24 17:05:56.993740 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 296, DHCP Discover from 36-3B-4C-2E-A5-8D, DF, DSCP 4&lt;BR /&gt;25 17:05:57.022513 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 308, DHCP Request from 98-CA-33-91-12-86 to 0.0.0.0 for 192.168.59.234/0.0.0.0, DSCP 0&lt;BR /&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Aug 2021 03:11:02 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/dhcp-server-functionallity-with-310i-as-vc/m-p/72766#M6688</guid>
      <dc:creator>Matheus_Santana</dc:creator>
      <dc:date>2021-08-05T03:11:02Z</dc:date>
    </item>
  </channel>
</rss>

