<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: VLAN MU's some getting 169 address in ExtremeWireless (WiNG)</title>
    <link>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82952#M7706</link>
    <description>Hi Chris&lt;BR /&gt;
 this what I get from the debug&lt;BR /&gt;
Capturing up to 50 packets from each remote host. Use Ctrl-C to abort&lt;BR /&gt;
[ap7532-Delivery-4,bridge] 1 8:39:56.993108 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-B4c1,bridge] 1 8:39:57.808992 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-Stores,bridge] 1 8:39:56.974656 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-B4c2,bridge] 1 8:39:56.968021 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-PC01,bridge] 1 8:39:57.793869 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-Delivery-3,bridge] 1 8:39:57.760110 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-Dev-1,bridge] 1 8:39:57.537927 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-PC02,bridge] 1 8:39:57.490932 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-Reception-GF,bridge] 1 8:39:57.572147 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
&lt;BR /&gt;
This MAC 40-16-3B-B7-74-49 is showing as being on different AP's in different parts of the site some are remote buildings The MAC shows as being a Samsung Device, possibly a Phone but we do have a lot of Samsung Displays. Just looking through the other MAC's that are not getting IP addresses and its all sorts . Apple/intel/Motorola/zebra etc&lt;BR /&gt;
&lt;BR /&gt;
I have noticed that when you select an AP under devices some AP's show Primary IP as 0.0.0.0 and some have an IP on the LAN ( VLAN 1 )&lt;BR /&gt;
&lt;BR /&gt;
Below is the Running config of one of the AP's that a unit is trying to connect to / get IP - &lt;BR /&gt;
&lt;BR /&gt;
!&lt;BR /&gt;
! Configuration of AP7532 version 5.8.5.0-016R&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
version 2.5&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt;
 permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"&lt;BR /&gt;
 deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"&lt;BR /&gt;
 permit ip any 224.0.0.0/4 rule-precedence 21 rule-description "Allow IP multicast for Chromecast and Apple TV Boxes to work"&lt;BR /&gt;
 permit ip any host 255.255.255.255 rule-precedence 22 rule-description "allow IP local broadcast for Chromecast and Apple TV Boxes to work"&lt;BR /&gt;
 permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;
 permit proto 254 any any rule-precedence 101 rule-description Sip traffic&lt;BR /&gt;
 permit tcp any eq 5061 any rule-precedence 102 rule-description sip traffic&lt;BR /&gt;
 permit ip any 104.245.56.0/21 rule-precedence 103 rule-description RingCentral Network&lt;BR /&gt;
 permit ip any 185.23.248.0/22 rule-precedence 104 rule-description RingCentral Network&lt;BR /&gt;
 permit ip any 199.255.120.0/22 rule-precedence 106 rule-description RingCentral Network&lt;BR /&gt;
 permit ip any 199.68.212.0/22 rule-precedence 107 rule-description RingCentral Network&lt;BR /&gt;
 permit tcp any range 8008 8009 any range 8008 8009 rule-precedence 108 &lt;BR /&gt;
 permit udp any eq 53 any rule-precedence 110 &lt;BR /&gt;
 permit udp any eq 1900 any rule-precedence 111 &lt;BR /&gt;
 permit tcp any 54.236.3.128/26 eq https rule-precedence 113 &lt;BR /&gt;
 permit tcp any 54.241.191.192/26 eq https rule-precedence 114 &lt;BR /&gt;
 permit tcp any 54.246.196.128/26 eq https rule-precedence 115 &lt;BR /&gt;
 permit tcp any 54.207.127.192/27 eq https rule-precedence 116 &lt;BR /&gt;
 permit tcp any 37.58.79.160/27 eq https rule-precedence 117 &lt;BR /&gt;
 permit tcp any 198.11.216.96/27 eq https rule-precedence 118 &lt;BR /&gt;
 permit tcp any 5.153.35.160/27 eq https rule-precedence 119 &lt;BR /&gt;
 permit tcp any 54.249.82.128/26 eq https rule-precedence 121 &lt;BR /&gt;
 permit tcp any 50.22.5.112/28 eq https rule-precedence 122 &lt;BR /&gt;
 permit tcp any 54.175.63.64/26 eq https rule-precedence 123 &lt;BR /&gt;
 permit tcp any 54.93.127.192/26 eq https rule-precedence 124 &lt;BR /&gt;
 permit tcp any 54.209.255.64/26 eq https rule-precedence 125 &lt;BR /&gt;
 permit tcp any 54.241.191.64/26 eq https rule-precedence 126 &lt;BR /&gt;
 permit tcp any 54.219.189.192/26 eq https rule-precedence 127 &lt;BR /&gt;
 permit tcp any 54.4.63.128/26 eq https rule-precedence 128 &lt;BR /&gt;
 permit tcp any 54.233.127.192/27 eq https rule-precedence 129 &lt;BR /&gt;
 permit tcp any 54.219.189.64/26 eq https rule-precedence 130 &lt;BR /&gt;
 permit tcp any 54.175.191.192/26 eq https rule-precedence 131 &lt;BR /&gt;
 permit tcp any 54.250.252.0/26 eq https rule-precedence 132 &lt;BR /&gt;
 permit tcp any 54.171.191.192/26 eq https rule-precedence 133 &lt;BR /&gt;
 permit tcp any 54.93.254.192/26 eq https rule-precedence 134 &lt;BR /&gt;
 permit udp any range 5060 5061 any range 5060 5061 rule-precedence 135 &lt;BR /&gt;
 permit tcp any eq 5494 any rule-precedence 136 &lt;BR /&gt;
!&lt;BR /&gt;
mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;
 permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"&lt;BR /&gt;
 permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"&lt;BR /&gt;
 deny host 60-02-B4-F7-E9-E4 host 60-02-B4-F7-E9-E4 vlan 10 rule-precedence 30 rule-description Winstrom Device ?&lt;BR /&gt;
 deny host 60-02-B4-F7-E8-66 host 60-02-B4-F7-E8-66 vlan 10 rule-precedence 41 rule-description winstrom ?&lt;BR /&gt;
 deny host 60-02-B4-F7-EA-CF host 60-02-B4-F7-EA-CF vlan 10 rule-precedence 60 rule-description winstrom ?&lt;BR /&gt;
 deny host 60-02-B4-F7-E9-B8 host 60-02-B4-F7-E9-B8 vlan 10 rule-precedence 70 rule-description winstrom&lt;BR /&gt;
!&lt;BR /&gt;
ip snmp-access-list c_HQ&lt;BR /&gt;
 permit host xxx.xxx.xxx.137&lt;BR /&gt;
!&lt;BR /&gt;
firewall-policy default&lt;BR /&gt;
 no ip dos tcp-sequence-past-window&lt;BR /&gt;
 storm-control multicast log warnings&lt;BR /&gt;
 ip-mac conflict log-and-drop log-level debugging &lt;BR /&gt;
 no ipv6 firewall enable&lt;BR /&gt;
 no stateful-packet-inspection-l2&lt;BR /&gt;
 alg sip&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
mint-policy global-default&lt;BR /&gt;
 mtu 1460&lt;BR /&gt;
!&lt;BR /&gt;
wlan-qos-policy default&lt;BR /&gt;
 classification normal&lt;BR /&gt;
 classification non-unicast normal&lt;BR /&gt;
 voice-prioritization&lt;BR /&gt;
 qos trust dscp&lt;BR /&gt;
 qos trust wmm&lt;BR /&gt;
!&lt;BR /&gt;
radio-qos-policy default&lt;BR /&gt;
 no admission-control implicit-tspec&lt;BR /&gt;
 admission-control voice&lt;BR /&gt;
 admission-control video&lt;BR /&gt;
 admission-control video max-airtime-percent 15&lt;BR /&gt;
 accelerated-multicast max-streams 60&lt;BR /&gt;
!&lt;BR /&gt;
wlan POT&lt;BR /&gt;
 ssid POT&lt;BR /&gt;
 vlan 10&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 no client-client-communication&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 wpa-wpa2 psk 0 2WqBKL9z7e&lt;BR /&gt;
 client-load-balancing probe-req-intvl 5ghz 24&lt;BR /&gt;
 client-load-balancing probe-req-intvl 2.4ghz 24&lt;BR /&gt;
 ip arp trust&lt;BR /&gt;
 use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;
 broadcast-dhcp validate-offer&lt;BR /&gt;
!&lt;BR /&gt;
wlan ANBG&lt;BR /&gt;
 ssid ANBG&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 wpa-wpa2 psk 0 xxxxx0B1&lt;BR /&gt;
 use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;
!&lt;BR /&gt;
smart-rf-policy Wood2&lt;BR /&gt;
 sensitivity custom&lt;BR /&gt;
 channel-width 5GHz auto&lt;BR /&gt;
 channel-width 2.4GHz auto&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
management-policy default&lt;BR /&gt;
 no telnet&lt;BR /&gt;
 no http server&lt;BR /&gt;
 https server&lt;BR /&gt;
 no ftp&lt;BR /&gt;
 ssh&lt;BR /&gt;
 user admin password 1 ab38cb210d7336ec17bcad7b2d0d7fa644e98f9fcd32c691c5ac1875f5858854 role superuser access all&lt;BR /&gt;
 allowed-location cHQ locations CHQ&lt;BR /&gt;
 snmp-server manager v1&lt;BR /&gt;
 snmp-server manager v2&lt;BR /&gt;
 no snmp-server manager v3&lt;BR /&gt;
 snmp-server community 0 public ro ip-snmp-access-list Mic_HQ&lt;BR /&gt;
 snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;
 snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;
 snmp-server enable traps&lt;BR /&gt;
 snmp-server host xxx.xxx.xxx.137 v2c 161 community 0 public&lt;BR /&gt;
!&lt;BR /&gt;
profile ap7532 Mc_7532&lt;BR /&gt;
 dscp-mapping 46 priority 7&lt;BR /&gt;
 ip name-server xxx.xxx.xxx.184&lt;BR /&gt;
 ip name-server xxx.xxx.xxx.150&lt;BR /&gt;
 ip name-server xxx.xxx.xxx.151&lt;BR /&gt;
 ip domain-name l.local&lt;BR /&gt;
 ip default-gateway xxx.xxx.144.254&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 device-upgrade count 20&lt;BR /&gt;
 led flash-pattern&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
 isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
 isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 data-rates bgn&lt;BR /&gt;
 wlan ANBG bss 2 primary&lt;BR /&gt;
 wlan POT bss 3 primary&lt;BR /&gt;
 max-clients 256&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 data-rates an&lt;BR /&gt;
 wlan POT bss 1 primary&lt;BR /&gt;
 wlan ANBG bss 2 primary&lt;BR /&gt;
 max-clients 256&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 switchport mode trunk&lt;BR /&gt;
 switchport trunk native vlan 1&lt;BR /&gt;
 no switchport trunk native tagged&lt;BR /&gt;
 switchport trunk allowed vlan 1-4094&lt;BR /&gt;
 no cdp receive&lt;BR /&gt;
 no cdp transmit&lt;BR /&gt;
 no lldp receive&lt;BR /&gt;
 no lldp transmit&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 ntp server xxx.xxx.xxx.150 version 3 &lt;BR /&gt;
 ntp server xxx.xxx.xxx.151 prefer version 3 &lt;BR /&gt;
 ntp server xxx.xxx.xxx.184 version 3 &lt;BR /&gt;
 rf-domain-manager capable&lt;BR /&gt;
 logging on&lt;BR /&gt;
 no cdp run&lt;BR /&gt;
 no lldp run&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
 dpi&lt;BR /&gt;
 dpi metadata voice-video&lt;BR /&gt;
 dpi metadata http&lt;BR /&gt;
 dpi metadata ssl&lt;BR /&gt;
 dpi logging on&lt;BR /&gt;
 traffic-shape total-bandwidth 20 Mbps&lt;BR /&gt;
 traffic-shape enable&lt;BR /&gt;
!&lt;BR /&gt;
rf-domain Wood_2&lt;BR /&gt;
 location L_HQ&lt;BR /&gt;
 timezone Europe/London&lt;BR /&gt;
 country-code gb&lt;BR /&gt;
 use smart-rf-policy Wood2&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-82-C7-88&lt;BR /&gt;
 use profile Mic_7532&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname ap7532-Delivery-1&lt;BR /&gt;
 layout-coordinates -899.5 -983.0&lt;BR /&gt;
 area Delivery&lt;BR /&gt;
 floor B4-First-Floor-Kitchen-Sec-end&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 wlan HOTSPOT bss 1 primary&lt;BR /&gt;
 wlan MICWLANBG bss 2 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 channel 48ww&lt;BR /&gt;
 wlan POT bss 1 primary&lt;BR /&gt;
 wlan ANBG bss 2 primary&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
end</description>
    <pubDate>Thu, 25 Jul 2019 14:46:28 GMT</pubDate>
    <dc:creator>Phil_storey</dc:creator>
    <dc:date>2019-07-25T14:46:28Z</dc:date>
    <item>
      <title>VLAN MU's some getting 169 address</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82947#M7701</link>
      <description>Hi&lt;BR /&gt;
   We  have a strange issue on the wifi network,  I will try to explain &lt;BR /&gt;
&lt;BR /&gt;
we have the RFS7K that at present is set to tunnelled , The RFS has a connection into the LAN ( Avaya 5520 ) the port is set to a trunk port and have VLAN 1 &amp;amp; 10 allowed&lt;BR /&gt;
&lt;BR /&gt;
OF the RFS GE1 is set to trunk and allowed VLAN's 1 &amp;amp; 10. Under the virtual adapter there is VLAN1 &amp;amp; VLAN10&lt;BR /&gt;
&lt;BR /&gt;
The WLANs are then mapped to the  VLAN's depending on Access.&lt;BR /&gt;
&lt;BR /&gt;
so in this case VLAN 1 = LAN ( and is working fine with no issues.&lt;BR /&gt;
&lt;BR /&gt;
VLAN 10 on the other hand is causing some issues.&lt;BR /&gt;
&lt;BR /&gt;
On the LAN switch ( Ayaya 5520 ) a port has been allocated to VLAN 10 ( set as the default VLAN ) this in turn has an ADSL router connected to it , the router also is the DHCP server for VLAN10.&lt;BR /&gt;
&lt;BR /&gt;
VLAN 10 is a Guest WLAN, and the DHCP range is 192.168../24&lt;BR /&gt;
&lt;BR /&gt;
The AP's are all 7532  ( FW 5.8 ) &lt;BR /&gt;
&lt;BR /&gt;
On the AP GE 1 is set to trunk with the allowed vlans 1 &amp;amp; 10  and the virtual  adapters Vlan 1 &amp;amp; 10&lt;BR /&gt;
&lt;BR /&gt;
now to the issue:&lt;BR /&gt;
&lt;BR /&gt;
On VLAN 10  some  MU are getting a 169 address or 0.0.0.0, I have selected one of the devices in the statistics / wireless clients  and then selected disconnect client, it then re-appears as a 0.0.0.0 then changes to a 169 address.&lt;BR /&gt;
&lt;BR /&gt;
It seems very hit and miss if you can connect to the VLAN 10 . I can not see anything obvious causing the issue.&lt;BR /&gt;
&lt;BR /&gt;
If I connect to the ADSL router and look at connected devices, it shows the devices that are connected.&lt;BR /&gt;
So I don't think the router is the issue.&lt;BR /&gt;
&lt;BR /&gt;
I I select one of the AP's that that have a MU with a 169 address on it and then   select troubleshooting  and from there select packet capture. and set the interface to vlan  10 and packet direction as any,  I can see DHCP request on VLAN 10 and MINT traffic &lt;BR /&gt;
&lt;BR /&gt;
Its Not affecting all AP's  and the ones that are affected are connected to different switches.&lt;BR /&gt;
&lt;BR /&gt;
Any Help or advice gratefully received</description>
      <pubDate>Wed, 24 Jul 2019 17:45:11 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82947#M7701</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2019-07-24T17:45:11Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN MU's some getting 169 address</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82948#M7702</link>
      <description>On one of the APs that has a client that cannot get a lease, is it consistent?  Or do some of the clients get a lease on the VLAN-10 WLAN?  Hopefully it's a consistent problem.  Easier to troubleshoot.&lt;BR /&gt;
&lt;BR /&gt;
You can use the below command on the controller's CLI to specifically watch a client's DHCP traffic.  This would hopefully show you the DHCP Discovery messages being sent from the client...and the expected DHCP Offer from the DHCP server.  If you see the Request but not the Offer, then either the Requests are not reaching the DHCP server or the DHCP server's Offer messages are not able to make it back to the AP.  From there, you need to locate the source of the breakdown in the wired side traffic flow.&lt;BR /&gt;
&lt;BR /&gt;
# remote-debug live-pktcap hosts  bridge filter ether  port 67 and port 68 and ether host</description>
      <pubDate>Wed, 24 Jul 2019 21:58:12 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82948#M7702</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2019-07-24T21:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN MU's some getting 169 address</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82949#M7703</link>
      <description>Hi Chris&lt;BR /&gt;
        do I need to add anything to the command ?&lt;BR /&gt;
&lt;BR /&gt;
remote-debug live-pktcap hosts bridge filter ether port 67 and port 68 and ether host&lt;BR /&gt;
&lt;BR /&gt;
I have tried different options but returns with incomplete command  The RFS is at Wing 5.8</description>
      <pubDate>Wed, 24 Jul 2019 22:35:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82949#M7703</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2019-07-24T22:35:49Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN MU's some getting 169 address</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82950#M7704</link>
      <description>Either I entered the command improperly or it got seriously messed up when pasting it.&lt;BR /&gt;
Either way, it should be:&lt;BR /&gt;
#&lt;B&gt;remote-debug live-pktcap rf-domain "rf-domain name" bridge filter port 67 and port 68 and ether host "client MAC"&lt;/B&gt; (Don't include the quotes "")&lt;BR /&gt;
&lt;BR /&gt;
...and just to be sure, the client MAC address should be dash delimited. e.g., 00-00-00-11-11-11</description>
      <pubDate>Wed, 24 Jul 2019 22:39:04 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82950#M7704</guid>
      <dc:creator>ckelly</dc:creator>
      <dc:date>2019-07-24T22:39:04Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN MU's some getting 169 address</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82951#M7705</link>
      <description>do you  make ping  to  the   gateway   vlan   from   the  AP?&lt;BR /&gt;
go to   cli   to one  AP then  you cna  ping  to  the  main   gateway?</description>
      <pubDate>Thu, 25 Jul 2019 03:07:49 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82951#M7705</guid>
      <dc:creator>JESUS_REYES_DIA</dc:creator>
      <dc:date>2019-07-25T03:07:49Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN MU's some getting 169 address</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82952#M7706</link>
      <description>Hi Chris&lt;BR /&gt;
 this what I get from the debug&lt;BR /&gt;
Capturing up to 50 packets from each remote host. Use Ctrl-C to abort&lt;BR /&gt;
[ap7532-Delivery-4,bridge] 1 8:39:56.993108 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-B4c1,bridge] 1 8:39:57.808992 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-Stores,bridge] 1 8:39:56.974656 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-B4c2,bridge] 1 8:39:56.968021 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-PC01,bridge] 1 8:39:57.793869 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-Delivery-3,bridge] 1 8:39:57.760110 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-Dev-1,bridge] 1 8:39:57.537927 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-PC02,bridge] 1 8:39:57.490932 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
[ap7532-Reception-GF,bridge] 1 8:39:57.572147 UDP: 0.0.0.0 &amp;gt; 255.255.255.255 ports 68 &amp;gt; 67, data length 556, DHCP Discover from 40-16-3B-B7-74-49, DSCP 0&lt;BR /&gt;
&lt;BR /&gt;
This MAC 40-16-3B-B7-74-49 is showing as being on different AP's in different parts of the site some are remote buildings The MAC shows as being a Samsung Device, possibly a Phone but we do have a lot of Samsung Displays. Just looking through the other MAC's that are not getting IP addresses and its all sorts . Apple/intel/Motorola/zebra etc&lt;BR /&gt;
&lt;BR /&gt;
I have noticed that when you select an AP under devices some AP's show Primary IP as 0.0.0.0 and some have an IP on the LAN ( VLAN 1 )&lt;BR /&gt;
&lt;BR /&gt;
Below is the Running config of one of the AP's that a unit is trying to connect to / get IP - &lt;BR /&gt;
&lt;BR /&gt;
!&lt;BR /&gt;
! Configuration of AP7532 version 5.8.5.0-016R&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
version 2.5&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
ip access-list BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 permit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"&lt;BR /&gt;
 permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"&lt;BR /&gt;
 deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"&lt;BR /&gt;
 permit ip any 224.0.0.0/4 rule-precedence 21 rule-description "Allow IP multicast for Chromecast and Apple TV Boxes to work"&lt;BR /&gt;
 permit ip any host 255.255.255.255 rule-precedence 22 rule-description "allow IP local broadcast for Chromecast and Apple TV Boxes to work"&lt;BR /&gt;
 permit ip any any rule-precedence 100 rule-description "permit all IP traffic"&lt;BR /&gt;
 permit proto 254 any any rule-precedence 101 rule-description Sip traffic&lt;BR /&gt;
 permit tcp any eq 5061 any rule-precedence 102 rule-description sip traffic&lt;BR /&gt;
 permit ip any 104.245.56.0/21 rule-precedence 103 rule-description RingCentral Network&lt;BR /&gt;
 permit ip any 185.23.248.0/22 rule-precedence 104 rule-description RingCentral Network&lt;BR /&gt;
 permit ip any 199.255.120.0/22 rule-precedence 106 rule-description RingCentral Network&lt;BR /&gt;
 permit ip any 199.68.212.0/22 rule-precedence 107 rule-description RingCentral Network&lt;BR /&gt;
 permit tcp any range 8008 8009 any range 8008 8009 rule-precedence 108 &lt;BR /&gt;
 permit udp any eq 53 any rule-precedence 110 &lt;BR /&gt;
 permit udp any eq 1900 any rule-precedence 111 &lt;BR /&gt;
 permit tcp any 54.236.3.128/26 eq https rule-precedence 113 &lt;BR /&gt;
 permit tcp any 54.241.191.192/26 eq https rule-precedence 114 &lt;BR /&gt;
 permit tcp any 54.246.196.128/26 eq https rule-precedence 115 &lt;BR /&gt;
 permit tcp any 54.207.127.192/27 eq https rule-precedence 116 &lt;BR /&gt;
 permit tcp any 37.58.79.160/27 eq https rule-precedence 117 &lt;BR /&gt;
 permit tcp any 198.11.216.96/27 eq https rule-precedence 118 &lt;BR /&gt;
 permit tcp any 5.153.35.160/27 eq https rule-precedence 119 &lt;BR /&gt;
 permit tcp any 54.249.82.128/26 eq https rule-precedence 121 &lt;BR /&gt;
 permit tcp any 50.22.5.112/28 eq https rule-precedence 122 &lt;BR /&gt;
 permit tcp any 54.175.63.64/26 eq https rule-precedence 123 &lt;BR /&gt;
 permit tcp any 54.93.127.192/26 eq https rule-precedence 124 &lt;BR /&gt;
 permit tcp any 54.209.255.64/26 eq https rule-precedence 125 &lt;BR /&gt;
 permit tcp any 54.241.191.64/26 eq https rule-precedence 126 &lt;BR /&gt;
 permit tcp any 54.219.189.192/26 eq https rule-precedence 127 &lt;BR /&gt;
 permit tcp any 54.4.63.128/26 eq https rule-precedence 128 &lt;BR /&gt;
 permit tcp any 54.233.127.192/27 eq https rule-precedence 129 &lt;BR /&gt;
 permit tcp any 54.219.189.64/26 eq https rule-precedence 130 &lt;BR /&gt;
 permit tcp any 54.175.191.192/26 eq https rule-precedence 131 &lt;BR /&gt;
 permit tcp any 54.250.252.0/26 eq https rule-precedence 132 &lt;BR /&gt;
 permit tcp any 54.171.191.192/26 eq https rule-precedence 133 &lt;BR /&gt;
 permit tcp any 54.93.254.192/26 eq https rule-precedence 134 &lt;BR /&gt;
 permit udp any range 5060 5061 any range 5060 5061 rule-precedence 135 &lt;BR /&gt;
 permit tcp any eq 5494 any rule-precedence 136 &lt;BR /&gt;
!&lt;BR /&gt;
mac access-list PERMIT-ARP-AND-IPv4&lt;BR /&gt;
 permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"&lt;BR /&gt;
 permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"&lt;BR /&gt;
 deny host 60-02-B4-F7-E9-E4 host 60-02-B4-F7-E9-E4 vlan 10 rule-precedence 30 rule-description Winstrom Device ?&lt;BR /&gt;
 deny host 60-02-B4-F7-E8-66 host 60-02-B4-F7-E8-66 vlan 10 rule-precedence 41 rule-description winstrom ?&lt;BR /&gt;
 deny host 60-02-B4-F7-EA-CF host 60-02-B4-F7-EA-CF vlan 10 rule-precedence 60 rule-description winstrom ?&lt;BR /&gt;
 deny host 60-02-B4-F7-E9-B8 host 60-02-B4-F7-E9-B8 vlan 10 rule-precedence 70 rule-description winstrom&lt;BR /&gt;
!&lt;BR /&gt;
ip snmp-access-list c_HQ&lt;BR /&gt;
 permit host xxx.xxx.xxx.137&lt;BR /&gt;
!&lt;BR /&gt;
firewall-policy default&lt;BR /&gt;
 no ip dos tcp-sequence-past-window&lt;BR /&gt;
 storm-control multicast log warnings&lt;BR /&gt;
 ip-mac conflict log-and-drop log-level debugging &lt;BR /&gt;
 no ipv6 firewall enable&lt;BR /&gt;
 no stateful-packet-inspection-l2&lt;BR /&gt;
 alg sip&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
mint-policy global-default&lt;BR /&gt;
 mtu 1460&lt;BR /&gt;
!&lt;BR /&gt;
wlan-qos-policy default&lt;BR /&gt;
 classification normal&lt;BR /&gt;
 classification non-unicast normal&lt;BR /&gt;
 voice-prioritization&lt;BR /&gt;
 qos trust dscp&lt;BR /&gt;
 qos trust wmm&lt;BR /&gt;
!&lt;BR /&gt;
radio-qos-policy default&lt;BR /&gt;
 no admission-control implicit-tspec&lt;BR /&gt;
 admission-control voice&lt;BR /&gt;
 admission-control video&lt;BR /&gt;
 admission-control video max-airtime-percent 15&lt;BR /&gt;
 accelerated-multicast max-streams 60&lt;BR /&gt;
!&lt;BR /&gt;
wlan POT&lt;BR /&gt;
 ssid POT&lt;BR /&gt;
 vlan 10&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 no client-client-communication&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 wpa-wpa2 psk 0 2WqBKL9z7e&lt;BR /&gt;
 client-load-balancing probe-req-intvl 5ghz 24&lt;BR /&gt;
 client-load-balancing probe-req-intvl 2.4ghz 24&lt;BR /&gt;
 ip arp trust&lt;BR /&gt;
 use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;
 broadcast-dhcp validate-offer&lt;BR /&gt;
!&lt;BR /&gt;
wlan ANBG&lt;BR /&gt;
 ssid ANBG&lt;BR /&gt;
 vlan 1&lt;BR /&gt;
 bridging-mode tunnel&lt;BR /&gt;
 encryption-type tkip-ccmp&lt;BR /&gt;
 authentication-type none&lt;BR /&gt;
 fast-bss-transition&lt;BR /&gt;
 wpa-wpa2 psk 0 xxxxx0B1&lt;BR /&gt;
 use ip-access-list out BROADCAST-MULTICAST-CONTROL&lt;BR /&gt;
 use mac-access-list out PERMIT-ARP-AND-IPv4&lt;BR /&gt;
!&lt;BR /&gt;
smart-rf-policy Wood2&lt;BR /&gt;
 sensitivity custom&lt;BR /&gt;
 channel-width 5GHz auto&lt;BR /&gt;
 channel-width 2.4GHz auto&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
management-policy default&lt;BR /&gt;
 no telnet&lt;BR /&gt;
 no http server&lt;BR /&gt;
 https server&lt;BR /&gt;
 no ftp&lt;BR /&gt;
 ssh&lt;BR /&gt;
 user admin password 1 ab38cb210d7336ec17bcad7b2d0d7fa644e98f9fcd32c691c5ac1875f5858854 role superuser access all&lt;BR /&gt;
 allowed-location cHQ locations CHQ&lt;BR /&gt;
 snmp-server manager v1&lt;BR /&gt;
 snmp-server manager v2&lt;BR /&gt;
 no snmp-server manager v3&lt;BR /&gt;
 snmp-server community 0 public ro ip-snmp-access-list Mic_HQ&lt;BR /&gt;
 snmp-server user snmptrap v3 encrypted des auth md5 0 admin123&lt;BR /&gt;
 snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123&lt;BR /&gt;
 snmp-server enable traps&lt;BR /&gt;
 snmp-server host xxx.xxx.xxx.137 v2c 161 community 0 public&lt;BR /&gt;
!&lt;BR /&gt;
profile ap7532 Mc_7532&lt;BR /&gt;
 dscp-mapping 46 priority 7&lt;BR /&gt;
 ip name-server xxx.xxx.xxx.184&lt;BR /&gt;
 ip name-server xxx.xxx.xxx.150&lt;BR /&gt;
 ip name-server xxx.xxx.xxx.151&lt;BR /&gt;
 ip domain-name l.local&lt;BR /&gt;
 ip default-gateway xxx.xxx.144.254&lt;BR /&gt;
 autoinstall configuration&lt;BR /&gt;
 autoinstall firmware&lt;BR /&gt;
 device-upgrade count 20&lt;BR /&gt;
 led flash-pattern&lt;BR /&gt;
 crypto ikev1 policy ikev1-default &lt;BR /&gt;
 isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ikev2 policy ikev2-default &lt;BR /&gt;
 isakmp-proposal default encryption aes-256 group 2 hash sha &lt;BR /&gt;
 crypto ipsec transform-set default esp-aes-256 esp-sha-hmac&lt;BR /&gt;
 crypto ikev1 remote-vpn&lt;BR /&gt;
 crypto ikev2 remote-vpn&lt;BR /&gt;
 crypto auto-ipsec-secure&lt;BR /&gt;
 crypto load-management&lt;BR /&gt;
 crypto remote-vpn-client&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 data-rates bgn&lt;BR /&gt;
 wlan ANBG bss 2 primary&lt;BR /&gt;
 wlan POT bss 3 primary&lt;BR /&gt;
 max-clients 256&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 data-rates an&lt;BR /&gt;
 wlan POT bss 1 primary&lt;BR /&gt;
 wlan ANBG bss 2 primary&lt;BR /&gt;
 max-clients 256&lt;BR /&gt;
 interface ge1&lt;BR /&gt;
 switchport mode trunk&lt;BR /&gt;
 switchport trunk native vlan 1&lt;BR /&gt;
 no switchport trunk native tagged&lt;BR /&gt;
 switchport trunk allowed vlan 1-4094&lt;BR /&gt;
 no cdp receive&lt;BR /&gt;
 no cdp transmit&lt;BR /&gt;
 no lldp receive&lt;BR /&gt;
 no lldp transmit&lt;BR /&gt;
 interface vlan1&lt;BR /&gt;
 interface vlan10&lt;BR /&gt;
 interface pppoe1&lt;BR /&gt;
 use firewall-policy default&lt;BR /&gt;
 ntp server xxx.xxx.xxx.150 version 3 &lt;BR /&gt;
 ntp server xxx.xxx.xxx.151 prefer version 3 &lt;BR /&gt;
 ntp server xxx.xxx.xxx.184 version 3 &lt;BR /&gt;
 rf-domain-manager capable&lt;BR /&gt;
 logging on&lt;BR /&gt;
 no cdp run&lt;BR /&gt;
 no lldp run&lt;BR /&gt;
 service pm sys-restart&lt;BR /&gt;
 router ospf&lt;BR /&gt;
 dpi&lt;BR /&gt;
 dpi metadata voice-video&lt;BR /&gt;
 dpi metadata http&lt;BR /&gt;
 dpi metadata ssl&lt;BR /&gt;
 dpi logging on&lt;BR /&gt;
 traffic-shape total-bandwidth 20 Mbps&lt;BR /&gt;
 traffic-shape enable&lt;BR /&gt;
!&lt;BR /&gt;
rf-domain Wood_2&lt;BR /&gt;
 location L_HQ&lt;BR /&gt;
 timezone Europe/London&lt;BR /&gt;
 country-code gb&lt;BR /&gt;
 use smart-rf-policy Wood2&lt;BR /&gt;
!&lt;BR /&gt;
ap7532 84-24-8D-82-C7-88&lt;BR /&gt;
 use profile Mic_7532&lt;BR /&gt;
 use rf-domain Wood_2&lt;BR /&gt;
 hostname ap7532-Delivery-1&lt;BR /&gt;
 layout-coordinates -899.5 -983.0&lt;BR /&gt;
 area Delivery&lt;BR /&gt;
 floor B4-First-Floor-Kitchen-Sec-end&lt;BR /&gt;
 interface radio1&lt;BR /&gt;
 wlan HOTSPOT bss 1 primary&lt;BR /&gt;
 wlan MICWLANBG bss 2 primary&lt;BR /&gt;
 interface radio2&lt;BR /&gt;
 channel 48ww&lt;BR /&gt;
 wlan POT bss 1 primary&lt;BR /&gt;
 wlan ANBG bss 2 primary&lt;BR /&gt;
!&lt;BR /&gt;
!&lt;BR /&gt;
end</description>
      <pubDate>Thu, 25 Jul 2019 14:46:28 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82952#M7706</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2019-07-25T14:46:28Z</dc:date>
    </item>
    <item>
      <title>Re: VLAN MU's some getting 169 address</title>
      <link>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82953#M7707</link>
      <description>Having done some more investigation , I seem that the ADSL router that is doing the DHCP may have been running out of resource, So this has been replaced with a different unit loaded with the openWRT FW, so far it seems to be OK, ( now I have Jinxed it )</description>
      <pubDate>Thu, 01 Aug 2019 15:15:27 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/extremewireless-wing/vlan-mu-s-some-getting-169-address/m-p/82953#M7707</guid>
      <dc:creator>Phil_storey</dc:creator>
      <dc:date>2019-08-01T15:15:27Z</dc:date>
    </item>
  </channel>
</rss>

