<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SecureStack/G/D-Series DHCPSnooping Client on Trusted Port cannot get DHCP Address in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/securestack-g-d-series-dhcpsnooping-client-on-trusted-port/m-p/41002#M24</link>
    <description>Article ID: 12682 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
SecureStack C3, firmware 1.02.01.0004 and higher&lt;BR /&gt;
SecureStack C2, firmware 5.02.01.0006 and higher&lt;BR /&gt;
SecureStack B3, firmware 1.02.01.0004 and higher&lt;BR /&gt;
SecureStack B2, firmware 4.02.01.0006 and higher&lt;BR /&gt;
G-Series, firmware 1.02.00.0043 and higher&lt;BR /&gt;
D-Series, firmware 6.03.01.0008 and higher &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Changes&lt;/B&gt;&lt;BR /&gt;
Configured DHCP Snooping ('set dhcpsnooping...')(&lt;A href="http://bit.ly/1bgty2I" target="_blank" rel="nofollow noreferrer noopener"&gt;12008&lt;/A&gt;).&lt;BR /&gt;
A client on a trusted port ('set dhcpsnooping trust port &amp;lt;&lt;I&gt;port-string&lt;/I&gt;&amp;gt; enable') attempts to get an IP address assignment via the DHCP process. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
The DHCP process does not complete successfully.&lt;BR /&gt;
The client does not receive an IP address. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
Only trusted DHCP &lt;I&gt;servers&lt;/I&gt; - not DHCP &lt;I&gt;clients&lt;/I&gt; - should be connected on trusted ports. &lt;BR /&gt;
&lt;BR /&gt;
By design, DHCP packets from DHCP clients connected on trusted ports get forwarded without creating the tentative binding for that host/DHCP client. When the DHCP server (on a trusted port) responds to the DHCP client message, because DHCP Snooping doesn't have the host/client binding information it drops the DHCP server's response packet to the client. &lt;BR /&gt;
&lt;BR /&gt;
What is seen on a sniffer trace is that the server responds to the client's Discover request by sending a pair of Offer responses, one using destination UDP port 67 (to notify other servers) and one using destination UDP port 68 (to negotiate with the client). The switch as explained above drops the port 68 traffic, so the client never sees the server's attempt to negotiate. Though the client repeatedly tries to Discover a DHCP server, it never succeeds. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
Functions as Designed (FAD). &lt;BR /&gt;
&lt;BR /&gt;
Place any DHCP &lt;I&gt;client&lt;/I&gt; behind a DHCPSnooping &lt;I&gt;un&lt;/I&gt;trusted port ('set dhcpsnooping trust port &amp;lt;&lt;I&gt;port-string&lt;/I&gt;&amp;gt; disable'). Note that "untrusted" is the default state for a port. &lt;BR /&gt;
&lt;BR /&gt;
Also note that the FAD expectations have been changed as of firmware 6.61.07.0010.&lt;BR /&gt;
G/C5/C3/B5/B3/A4 release notes state, in the 'Changes and Enhancements in 6.61.07.0010' section: &lt;BR /&gt;
17362 &amp;amp; 17619  Addressed an issue which prevented DHCP to function properly on trusted ports when DHCP snooping was enabled.</description>
    <pubDate>Wed, 04 Dec 2013 22:50:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-12-04T22:50:00Z</dc:date>
    <item>
      <title>SecureStack/G/D-Series DHCPSnooping Client on Trusted Port cannot get DHCP Address</title>
      <link>https://community.extremenetworks.com/t5/faqs/securestack-g-d-series-dhcpsnooping-client-on-trusted-port/m-p/41002#M24</link>
      <description>Article ID: 12682 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
SecureStack C3, firmware 1.02.01.0004 and higher&lt;BR /&gt;
SecureStack C2, firmware 5.02.01.0006 and higher&lt;BR /&gt;
SecureStack B3, firmware 1.02.01.0004 and higher&lt;BR /&gt;
SecureStack B2, firmware 4.02.01.0006 and higher&lt;BR /&gt;
G-Series, firmware 1.02.00.0043 and higher&lt;BR /&gt;
D-Series, firmware 6.03.01.0008 and higher &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Changes&lt;/B&gt;&lt;BR /&gt;
Configured DHCP Snooping ('set dhcpsnooping...')(&lt;A href="http://bit.ly/1bgty2I" target="_blank" rel="nofollow noreferrer noopener"&gt;12008&lt;/A&gt;).&lt;BR /&gt;
A client on a trusted port ('set dhcpsnooping trust port &amp;lt;&lt;I&gt;port-string&lt;/I&gt;&amp;gt; enable') attempts to get an IP address assignment via the DHCP process. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Symptoms&lt;/B&gt;&lt;BR /&gt;
The DHCP process does not complete successfully.&lt;BR /&gt;
The client does not receive an IP address. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Cause&lt;/B&gt;&lt;BR /&gt;
Only trusted DHCP &lt;I&gt;servers&lt;/I&gt; - not DHCP &lt;I&gt;clients&lt;/I&gt; - should be connected on trusted ports. &lt;BR /&gt;
&lt;BR /&gt;
By design, DHCP packets from DHCP clients connected on trusted ports get forwarded without creating the tentative binding for that host/DHCP client. When the DHCP server (on a trusted port) responds to the DHCP client message, because DHCP Snooping doesn't have the host/client binding information it drops the DHCP server's response packet to the client. &lt;BR /&gt;
&lt;BR /&gt;
What is seen on a sniffer trace is that the server responds to the client's Discover request by sending a pair of Offer responses, one using destination UDP port 67 (to notify other servers) and one using destination UDP port 68 (to negotiate with the client). The switch as explained above drops the port 68 traffic, so the client never sees the server's attempt to negotiate. Though the client repeatedly tries to Discover a DHCP server, it never succeeds. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution&lt;/B&gt;&lt;BR /&gt;
Functions as Designed (FAD). &lt;BR /&gt;
&lt;BR /&gt;
Place any DHCP &lt;I&gt;client&lt;/I&gt; behind a DHCPSnooping &lt;I&gt;un&lt;/I&gt;trusted port ('set dhcpsnooping trust port &amp;lt;&lt;I&gt;port-string&lt;/I&gt;&amp;gt; disable'). Note that "untrusted" is the default state for a port. &lt;BR /&gt;
&lt;BR /&gt;
Also note that the FAD expectations have been changed as of firmware 6.61.07.0010.&lt;BR /&gt;
G/C5/C3/B5/B3/A4 release notes state, in the 'Changes and Enhancements in 6.61.07.0010' section: &lt;BR /&gt;
17362 &amp;amp; 17619  Addressed an issue which prevented DHCP to function properly on trusted ports when DHCP snooping was enabled.</description>
      <pubDate>Wed, 04 Dec 2013 22:50:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/securestack-g-d-series-dhcpsnooping-client-on-trusted-port/m-p/41002#M24</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-12-04T22:50:00Z</dc:date>
    </item>
  </channel>
</rss>

