02-19-2022 10:58 AM
AP-01.361*#sho run!! Configuration of AP7632 version 7.7.0.0-018R!!version 2.7!!client-identity-group defaultload default-fingerprints!ip access-list ACL-MGMT-INpermit icmp 192.168.163.0/24 any rule-precedence 1permit tcp 192.168.163.0/24 any eq ssh log rule-precedence 2permit tcp 192.168.163.0/24 any eq https log rule-precedence 3deny ip any any rule-precedence 5!ip access-list ACL-TRFC-INpermit ip 192.168.163.0/24 any rule-precedence 1deny ip any any rule-precedence 4!ip access-list ACL-TRFC-OUTpermit ip any any rule-precedence 1deny ip any any rule-precedence 2!ip access-list BROADCAST-MULTICAST-CONTROLpermit tcp any any rule-precedence 10 rule-description "permit all TCP traffic"permit udp any eq 67 any eq dhcpc rule-precedence 11 rule-description "permit DHCP replies"deny udp any range 137 138 any range 137 138 rule-precedence 20 rule-description "deny windows netbios"deny ip any 224.0.0.0/4 rule-precedence 21 rule-description "deny IP multicast"deny ip any host 255.255.255.255 rule-precedence 22 rule-description "deny IP local broadcast"permit ip any any rule-precedence 100 rule-description "permit all IP traffic"!mac access-list PERMIT-ARP-AND-IPv4permit any any type ip rule-precedence 10 rule-description "permit all IPv4 traffic"permit any any type arp rule-precedence 20 rule-description "permit all ARP traffic"!ip snmp-access-list defaultpermit any!firewall-policy defaultip dos tcp-post-syn log-and-drop log-level warningsip dos tcp-bad-sequence log-and-drop log-level warningsip dos tcp-sequence-past-window log-and-drop log-level warningsno stateful-packet-inspection-l2ip tcp adjust-mss 1400!!mint-policy global-default!meshpoint-qos-policy default!wlan-qos-policy defaultqos trust dscpqos trust wmm!radio-qos-policy default!wlan wlan1ssid AP-01.361vlan 1bridging-mode localencryption-type tkip-ccmpauthentication-type noneno multi-band-operationno protected-mgmt-frameswpa-wpa2 psk 0 xxxxxxxxxxxxxxxxxuse ip-access-list in ACL-TRFC-INuse ip-access-list out ACL-TRFC-OUTrelay-agent dhcp-option82!smart-rf-policy default-smartrfno select-shutdown!wips-policy defaultevent excessive eap-flood threshold-client 15 threshold-radio 40 filter-ageout 600event client-anomaly dos-broadcast-deauth filter-ageout 0event ap-anomaly ad-hoc-violationevent client-anomaly fuzzing-invalid-mgmt-frames filter-ageout 0event client-anomaly non-conforming-data filter-ageout 0event ap-anomaly transmitting-device-using-invalid-macevent client-anomaly crackable-wep-iv-key-used filter-ageout 0event ap-anomaly wireless-bridgeevent excessive auth-server-failures threshold-client 5 threshold-radio 20 filter-ageout 600event client-anomaly fuzzing-invalid-seq-num filter-ageout 0event ap-anomaly null-probe-responseevent client-anomaly fuzzing-all-zero-macs filter-ageout 0event excessive frames-from-unassoc-station threshold-client 2 threshold-radio 0 filter-ageout 600event ap-anomaly asleapevent excessive eap-nak-flood threshold-client 10 threshold-radio 20 filter-ageout 600event client-anomaly wellenreiter filter-ageout 0event ap-anomaly unencrypted-wired-leakageevent excessive 80211-replay-check-failure threshold-client 10 threshold-radio 25 filter-ageout 600event excessive dos-eapol-start-storm threshold-client 10 threshold-radio 20 filter-ageout 600event client-anomaly tkip-mic-counter-measures filter-ageout 0event client-anomaly invalid-8021x-frames filter-ageout 0event client-anomaly identical-src-and-dest-addr filter-ageout 0event client-anomaly non-changing-wep-iv filter-ageout 0event excessive dos-assoc-or-auth-flood threshold-client 25 threshold-radio 45 filter-ageout 600event client-anomaly fuzzing-invalid-frame-type filter-ageout 0event ap-anomaly ap-ssid-broadcast-in-beaconevent excessive dos-unicast-deauth-or-disassoc threshold-client 25 threshold-radio 45 filter-ageout 600event excessive aggressive-scanning threshold-client 30 threshold-radio 200 filter-ageout 600event client-anomaly netstumbler-generic filter-ageout 0event ap-anomaly airjackevent excessive decryption-failures threshold-client 25 threshold-radio 75 filter-ageout 600event ap-anomaly impersonation-attackap-detectionap-detection air-terminationap-detection air-termination mode autoap-detection air-termination allow-channel-switch!!management-policy defaultno telnetno http serverhttps serverno rest-serversshuser admin password 1 xxxxx role superuser access allno snmp-server manager v3snmp-server community 0 private rwsnmp-server community 0 public rosnmp-server user snmptrap v3 encrypted des auth md5 0 admin123snmp-server user snmpmanager v3 encrypted des auth md5 0 admin123restrict-access ip-access-list ACL-MGMT-IN!event-system-policy default!nsight-policy default!profile ap7632 361ip name-server 192.168.163.1ip name-server 8.8.8.8ip name-server 8.8.4.4ip domain-name 361ip default-gateway 192.168.163.1autoinstall configurationautoinstall firmwarecrypto ikev1 policy ikev1-defaultisakmp-proposal default encryption aes-256 group 2 hash shacrypto ikev2 policy ikev2-defaultisakmp-proposal default encryption aes-256 group 2 hash shacrypto ipsec transform-set default esp-aes-256 esp-sha-hmaccrypto ikev1 remote-vpncrypto ikev2 remote-vpncrypto auto-ipsec-securecrypto load-managementcrypto remote-vpn-clientinterface radio1wlan wlan1 bss 1 primaryantenna-mode 2x2interface radio2wlan wlan1 bss 1 primaryantenna-mode 2x2interface bluetooth1shutdownmode le-sensorinterface ge1spanning-tree force-version 0interface vlan1ip address dhcpip address zeroconf secondaryip dhcp client request options alluse ip-access-list in ACL-TRFC-INinterface pppoe1use firewall-policy defaultntp server ntp1.stratum1.ru preferntp server ntp1.stratum2.ruuse client-identity-group defaultlogging onservice pm sys-restartrouter ospfadoption-mode controller!rf-domain defaultlocation "Moscow"contact "ADMIN"timezone Europe/Moscowcountry-code ruuse smart-rf-policy default-smartrfuse wips-policy defaultad-wips-wireless-mitigation disablead-wips-wired-mitigation disableuse nsight-policy defaultchannel-list dynamic!ap7632 B4-2D-56-8A-88-90use profile 361use rf-domain defaulthostname AP-01.361channel-list dynamicno mint mlcp vlanno mint mlcp ipip igmp snoopingarea "Moscow"floor 7interface vlan1description "Virtual Interface for LAN by Wizard"ip address 192.168.163.3/24ip address zeroconf secondaryno ip dhcp client request options allno virtual-controllerno rf-domain-manager capableno adoption-mode!!endAP-01.361*#
Solved! Go to Solution.
02-21-2022 03:17 AM
Hi Andrey,
your IP access list "ACL-TRFC-IN" is blocking the DHCP request from your mobile clients.
Please add to the ACL:
permit udp any eq 68 any eq 67 rule-precedence 2 rule-description "permit DHCP requests"
any DHCP should work.
Best regards,
Angelo
02-21-2022 07:08 AM
02-21-2022 05:03 AM
Hi Andrey,
you have not permitted all ip traffic in your inbound IP ACL.
You have only permitted traffic from devices with the source IP address out of the range 192.168.163.0/24.
But your device don't have any IP address when they do the DHCP request ( that's why they are doing DHCP 🙂 ).
In the DHCP request the source IP address is 0.0.0.0.
So the IP ACL was doing what it should do!
Regards,
Angelo
02-21-2022 04:41 AM
02-21-2022 03:17 AM
Hi Andrey,
your IP access list "ACL-TRFC-IN" is blocking the DHCP request from your mobile clients.
Please add to the ACL:
permit udp any eq 68 any eq 67 rule-precedence 2 rule-description "permit DHCP requests"
any DHCP should work.
Best regards,
Angelo