The option 82 is used to identify the subnet of the IP address which the
DHCP server should lease.

The Cisco switch adds giaddr of 0.0.0.0 which the IOS DHCP server doesn't
accept.


*Option A : *The workaround is to add the following on the server to accept
the DHCP request with giaddr of 0.0.0.0


ip dhcp relay information trust-all (config mode)
ip dhcp relay information trusted. (interface mode)


*Option B :* Disable the dhcp option 82 addition using the following
command:


no ip dhcp snooping information option


When you use DHCP snooping for IPSG with mac-address check, then "ip dhcp
snooping information option" is required on the switch because when the
switch gets the reply from the DHCP server, the switch will use option 82 to
find the port to which the client is connected and forward the DHCP reply.

Hence for DHCP snooping with IPSG of checking IP address alone, you can use
either option A or B.

For DHCP snooping with IPSG of checking IP address and MAC address (you need
to enable switchport security), you should use option A only. This I got
confirmation from Yusuf.



With regards
Kings

On Sat, Dec 4, 2010 at 10:26 AM, Vybhav Ramachandran <[email protected]>wrote:

> Hello Mark,
>
> By default , *ip dhcp snooping information option *is enabled  when one
> turns on DHCP snooping on a switch. Now, the issue with that, although the
> switch here is NOT acting as a DHCP relay, it still inserts the Option-82
> field in the DHCP requests that it receives and sends it over to the DHCP
> server. In this case, since the switch is NOT acting as a relay ,so it will
> not modify the "giaddr" field that is present in the DHCP packet. This field
> is meant only for DHCP relays to modify.
>
> Suppose, now you have an aggregation switch sitting in between our earlier
> switch and the DHCP server . If the aggregation switch has DHCP snooping
> enabled and if it receives a DHCP packet with the Option-82 field set and
> with a GiADDR or 0.0.0.0 on an untrusted interface , it will drop that
> packet. This i think is because the aggregation switch expects some non-zero
> IP on the giaddr field.
>
> So , to prevent this
>
> 1) We can disable option-82 information addition by the remote switch. This
> is using the *no ip dhcp snooping information option*. This way , the
> chances of the DHCP packet getting dropped on it's way to the DHCP server
> are less.
> *
> *
> 2) If we really want the Option-82 information to be present in the DHCP
> requests ( assuming that the DHCP server also supports option-82 based IP
> address allocation ), then we can configure the aggregate switch to allow
> Packets with a GiAddr of  0.0.0.0 by using the *ip dhcp snooping
>  information option allow-untrusted. * Now the aggregation switch also
> learns about the DHCP Bindings . But this is not advisable because, this
> could lead to the aggregation switch accepting packets with spoofed
> Option-82 fields.
>
> Cheers,
> TacACK
>
>
> _______________________________________________
> For more information regarding industry leading CCIE Lab training, please
> visit www.ipexpert.com
>
>
_______________________________________________
For more information regarding industry leading CCIE Lab training, please visit 
www.ipexpert.com

Reply via email to