Hi Alex

No, the pool is there for it. The reason it's being disallowed is because 
I do not have that MAC address in the list of allowed/authorized users. 
In other words, someone with that MAC is either unaware they are trying to 
get onto my network, or they are trying to steal service. (I would assume 
they are unaware since they've been trying now for six days. :)

 On Sun, 28 
Sep 2003, sB Tech Support wrote:

> Do you turn on DHCP relay on the Cisco 3550? The DHCP packet could come
> from different subnet and you do not have the IP pool for it?
> 
> Alex
> sB Tech Support
> [EMAIL PROTECTED] 
>  
> 
> -----Original Message-----
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Sam
> Sent: Sunday, September 28, 2003 11:06 PM
> To: [EMAIL PROTECTED]
> Subject: [smartBridges] OT: unknown client requests
> 
> Hi Everyone
> 
> I have a quick question. Apparently someone has fired up a wireless
> device 
> near one of my APs that is trying to request an ip from my dhcp server. 
> Each hour my logfiles are filled with this:
> 
> Sep 27 18:01:18 logan2 dhcpd: DHCPDISCOVER from 00:0a:e9:00:b9:ca via
> 204.96.181.131: unknown client
> Sep 27 18:02:21 logan2 dhcpd: DHCPDISCOVER from 00:0a:e9:00:b9:ca via
> 204.96.181.131: unknown client
> Sep 27 18:03:25 logan2 dhcpd: DHCPDISCOVER from 00:0a:e9:00:b9:ca via
> 204.96.181.131: unknown client
> 
> (204.96.181.131 is a Cisco 3550 switch at the hop before the traffic
> comes 
> into the 3550 at my NOC)
> 
> over and over and over. The dhcp server is acting exactly like it is 
> supposed to and not allowing him an ip. However, two questions come to 
> mind:
> 
> 1) Is this hurting anything? The utilization on my box is minimal. I
> don't 
> know a lot about how DHCP works. and had I known more in the beginning, 
> would not be using it. Now thoughi t would be difficult to retrofit back
> 
> to all static, though I may still do that at some point.
> 
> 2) Is there any way of knowing where this is coming from? I doubt there 
> is, but if I knew even which AP it was coming through that might be 
> helpful. I don't have any sniffer capability, at least not right now. I 
> have heard of this ethereal product, but haven't look at it and don't
> know 
> if it will do what I want. I use Network General Sniffers at my other
> job 
> (Union Pacific Railroad) and am fluent with them but don't have one here
> 
> nor can I afford one. :(
> 
> Thanks
> Sam
> 
> 
> 
> ----------ANNOUNCEMENT----------
> Don't forget to register for WISPCON IV
> http://www.wispcon.info/us/wispcon-iv/wispcon-iv.htm
> 
> The PART-15.ORG smartBridges Discussion List
> To Join: mailto:[EMAIL PROTECTED] (in the body type subscribe
> smartBridges <yournickname>
> To Remove: mailto:[EMAIL PROTECTED] (in the body type unsubscribe
> smartBridges)
> Archives: http://archives.part-15.org  
> 
> ----------ANNOUNCEMENT----------
> Don't forget to register for WISPCON IV
> http://www.wispcon.info/us/wispcon-iv/wispcon-iv.htm
> 
> The PART-15.ORG smartBridges Discussion List
> To Join: mailto:[EMAIL PROTECTED] (in the body type subscribe smartBridges 
> <yournickname>
> To Remove: mailto:[EMAIL PROTECTED] (in the body type unsubscribe smartBridges)
> Archives: http://archives.part-15.org  
> 

----------ANNOUNCEMENT----------
Don't forget to register for WISPCON IV
http://www.wispcon.info/us/wispcon-iv/wispcon-iv.htm

The PART-15.ORG smartBridges Discussion List
To Join: mailto:[EMAIL PROTECTED] (in the body type subscribe smartBridges 
<yournickname>
To Remove: mailto:[EMAIL PROTECTED] (in the body type unsubscribe smartBridges)
Archives: http://archives.part-15.org  

Reply via email to