Ok but that would break the purpose of dhcp snopping :-) With regards Kings
On Fri, Apr 13, 2012 at 12:56 PM, Marko Milivojevic <[email protected]>wrote: > > You have a port on the switch facing the router that's acting as the > Relay, correct? You need to trust that port, simple... :-) > > -- > Marko Milivojevic - CCIE #18427 (SP R&S) > Senior CCIE Instructor - IPexpert > > On Thu, Apr 12, 2012 at 22:55, Kingsley Charles < > [email protected]> wrote: > >> Marko, I read them. Very nice blog. >> >> I wanted to understand, what you meant by 2nd workaround, >> >> >> 1. Disable snooping >> 2. Trust the Relay port >> >> >> With regards >> Kings >> >> >> On Fri, Apr 13, 2012 at 11:15 AM, Marko Milivojevic >> <[email protected]>wrote: >> >>> On Thu, Apr 12, 2012 at 21:48, Kingsley Charles < >>> [email protected]> wrote: >>> >>>> Hi Marko >>>> >>>> Please let me know, what did you mean by "Trust the Relay port". Are >>>> you saying that we should make the port connected to relay port as dhcp >>>> snooping trust port. >>>> >>> >>> Did you read the articles I sent you? Unfortunately, if you want to >>> have DHCP Snooping enabled on the Catalyst switch running 12.2(46)SE, >>> that's exactly what you need to do. I was unable to make it work otherwise, >>> using the exact same steps you tried. >>> >>> >>>> But why are we hitting this issue. The mac address is there, the switch >>>> should have forwarded the DHCP offer packet back to relay. >>>> >>>> My guess is that the issue is because of the chaddress being client's >>>> mac address and dst mac is relay's mac address. The switch is trying >>>> forward to chaddress. >>>> >>> >>> A bug? >>> >>> -- >>> Marko Milivojevic - CCIE #18427 (SP R&S) >>> Senior CCIE Instructor - IPexpert >>> >> >> >
_______________________________________________ For more information regarding industry leading CCIE Lab training, please visit www.ipexpert.com Are you a CCNP or CCIE and looking for a job? Check out www.PlatinumPlacement.com
