DHCP Snooping database - The current agent is active

Hello, I need to change an database URL. But switch can't end active agent.
After release of command I get an message, and nothing happend. After release "no" the result is the same.
I had tried no ip dhcp snooping and also use a timers to expire, but I think switch have got a software error.
Version 12.2(33)SXH6, RELEASE SOFTWARE (fc1)
switch#ip dhcp snooping database scp://user:[email protected]/tftpboot/snooping/switch
%Cannot change URL.  The current agent is active.

Hi Sunil, that was the last idea I had got.
The one before the last was write on this support forum.
So I tried everythink but  reboot. Which is little bit strange solution.
Thank you.

Similar Messages

  • ME3400 dhcp snooping database restore

    Hi guys,
    NTP synchronization on ME3400 takes around 10 minutes and I couldn not find way to reduce it.
    The problem is with restoring dhcp snooping database from flash/tftp after switch boots up.
    Database is restored after clock synchronization, but 10 minutes is to long as users with snooping/DAI are blocked until snooping database is restored.
    As ME3400 does not have hw clock, option with restoring clock after it boots up is not available.
    Does anyone had similar problem?
    Please share any idea/proposal how to overcome this issue.
    Many thanks,
    Grgo

    Hi Sunil, that was the last idea I had got.
    The one before the last was write on this support forum.
    So I tried everythink but  reboot. Which is little bit strange solution.
    Thank you.

  • Nexus DHCP Snooping save database?

    Is there a way save the DHCP snooping database on Nexus7K or 5K, either to flash or server?  Without this, wouldn't DAI and IP Source Guard be triggered by normal traffic after a reboot?

    Hi Sunil, that was the last idea I had got.
    The one before the last was write on this support forum.
    So I tried everythink but  reboot. Which is little bit strange solution.
    Thank you.

  • N7K - Any way to save the DHCP Snooping DB?

    Catalyst has 'ip dhcp snooping database' command to save as a file.  Cannot find similar command on the Nexus.  Without it, wouldn't a reboot cause the DB to come up empty, triggering arp inspection and source guard for legitimate traffic?

    Hello Bob,
    In the recently releases by default DHCP bindings are not saved persistently across switch reboots. To maintain persistent bindings across switch reboots, use the copy run start command.
    When the copy run start command is issued, all bindings that exist at that time are made persistent across switch reboots.

  • Catalyst 3750E's and DHCP Snooping

    I am using on our perimeter Catalyst 3750E's and 4500 series switches and I have DHCP Snooping enabled.  Each switch has redundant Layer 3 10Gb uplinks back to our Core/Distribution switches.  We have a central DHCP server and each switch writes its snooping database back to a central TFTP server.
    This was working fine until we upgraded our Active Directory domain to a 2008 domain, with our DHCP server now residing on a Windows 2008R2 server.
    Since the upgrade all 12 stacks of 3750E's will no longer write of the dhcp snooping database.
    show ip dhcp snooping database
    Agent URL : tftp://<path>
    Write delay Timer : 3600 seconds
    Abort Timer : 300 seconds
    Agent Running : No
    Delay Timer Expiry : 17 (00:00:17)
    Abort Timer Expiry : Not Running
    Last Succeded Time : None
    Last Failed Time : None
    Last Failed Reason : No failure recorded.
    Total Attempts       :        0   Startup Failures :        0
    Successful Transfers :        0   Failed Transfers :        0
    Successful Reads     :        0   Failed Reads     :        0
    Successful Writes    :        0   Failed Writes    :        0
    Media Failures       :        0
    All of the 4500's (5 of them) however still work as they did prior to the upgrade.
    show ip dhcp snooping database
    Agent URL : tftp://<path>
    Write delay Timer : 3600 seconds
    Abort Timer : 60 seconds
    Agent Running : No
    Delay Timer Expiry : 2737 (00:45:37)
    Abort Timer Expiry : Not Running
    Last Succeded Time : 07:18:07 EDT Wed Jun 15 2011
    Last Failed Time : None
    Last Failed Reason : No failure recorded.
    Total Attempts       :       13   Startup Failures :        0
    Successful Transfers :       13   Failed Transfers :        0
    Successful Reads     :        0   Failed Reads     :        0
    Successful Writes    :       13   Failed Writes    :        0
    Media Failures       :        0
    Is this a software bug and has anybody else seen this after upgrading to a Windows 2008 AD domain?

    well i found this 
    When DHCP snooping is disabled and DAI is enabled, the switch shuts down all the hosts because all 
    ARP entries in the ARP table will be checked against a nonexistent DHCP database. When DHCP 
    snooping is disabled or in non-DHCP environments, use ARP ACLs to permit or to deny ARP packets
    We dont do arp acl 
    Here is a little infor on the setup on 6500 
    Switch DHCP snooping is enabled
    DHCP snooping is configured on following VLANs: Q,W,E,RT,TY,Y
    Insertion of option 82 is enabled
    Option 82 on untrusted port is not allowed
    Verification of hwaddr field is enabled
    Verification of giaddr field is enabled
    Interface                    Trusted     Rate limit (pps)
    GigabitEthernetX/X          yes         unlimited
    Port-channel                     yes         unlimited
    port config port-channel 
    ip arp inspection trust
     ip dhcp snooping trust
    2960 config 
    Switch DHCP snooping is enabled
    DHCP snooping is configured on following VLANs:Q
    Insertion of option 82 is disabled
       circuit-id default format: vlan-mod-port
       remote-id: 1111:1111:1111 (MAC)
    Option 82 on untrusted port is not allowed
    Verification of hwaddr field is enabled
    Verification of giaddr field is enabled
    DHCP snooping trust/rate is configured on the following Interfaces:
    Interface                  Trusted    Allow option    Rate limit (pps)
    Port-channel              yes        yes             unlimited
    port config 
    interface Port-channel
    ip arp inspection trust
    ip dhcp snooping trust

  • How to synchronize between DHCP binding table and DHCP snooping table ?

    I clear DHCP snooping table with command "clear ip dhcp snooping binding " , and PC can't communicate with other any more. So how to synchronize between DHCP binding table and DHCP snooping table ?
    dhcp-test#sh ip dhcp bind
    IP address Client-ID/ Lease expiration Type
    Hardware address
    99.1.65.32 0100.1125.353c.25 Mar 02 1993 01:05 AM Automatic
    99.1.65.33 0100.1438.059f.85 Mar 02 1993 12:01 AM Automatic
    dhcp-test#sh ip dhcp snooping binding
    MacAddress IpAddress Lease(sec) Type VLAN Interface
    Total number of bindings: 0
    thanks!

    ip dhcp snooping binding mac-address vlan vlan-id ip-address interface interface-id expiry seconds
    Add binding entries to the DHCP snooping binding database. The vlan-id range is from 1 to 4904. The seconds range is from 1 to 4294967295.
    Enter the above command for each entry that you add
    To delete the database agent or binding file, use the no ip dhcp snooping database interface configuration command. To reset the timeout or delay values, use the ip dhcp snooping database timeout seconds or the ip dhcp snooping database write-delay seconds global configuration command.To renew the database, use the renew ip dhcp snooping database privileged EXEC command.

  • Current Agent Value in Program Exit Workflow

    Hi Gurus,
    we are using program exit to send mail to outlook on user decsion step and it is working fine for Sequential approval but when we have to send mail for parallel approval(have used block for parallel approval) we are not able to fetch current agent.
    - Have store agent in workflow container 'Agent' and used it in Block in workflow for implementing parallel appoaval.
    - Created class implementing inetrface IF_SWF_IFS_WORKITEM_EXIT and put it under program exit of user decsion in workflow
    - Now in this class I have created method at work item created to trigger email for which i require runtime work item id and agent for it.
    - We are getting workitem id at runtime and based on it picking up approval agent from workflow container and send mail to it.
    - this workfs fine for sequential one as there is only one approver at a time but in parallel where all approver are maintained in one multiline container, it is sending mail to first person maintained in multiline container.
    Please find steps below what i have tried:-
    - i tried with  FM RH_USERS_OF_WI_READ to get current agent for particular work item id  but it is throwing dump no value found at   runtime but stangely gives value if we run standalone for same work item id.
    - Then,  I tried putting wait upto to see if it helps, but then also above fm is unable to fetch agent.
    - Tried by putting select on   SWWUSERWI table but that also is not giving current agent
    Question is:
    Why we are not able to get value of current agent through above FM or select from userwi table? How do we get current agent value at the time of work item creation event is triggered which further hits our custom method.
    Please help...
    Regards
    Ajit C

    Hi Ajit,
    Here you go.
    You must be having a multiline container (probably of type WFSYST-AGENT) in your workflow which holds all the user ids to whom work item must be going parellely. e.g if the multiline container name is AGENT.
    The current agent from that multiline container is referred by &AGENT[_AGENT_line_]&. This you must hast have put in your user decision step/activity as an agent also.
    Now in your user decision step/activity, create one single line container element of type WFSYST-AGENT e.g. current_agent. in workflow to task binding, bind &AGENT[_AGENT_line_]& to CURRENT_AGENT. This way you will have current agent in that task container.
    Finally use function module SAP_WAPI_READ_CONTAINER using WORKITEM id to read the value of CURRENT_AGENT in your program exit.
    Regards,
    Ibrahim

  • IP DHCP snooping, IP source Guard, and DIA

    Hi All,
    I have Configured DHCP snooping and IP source guard and Dynamic arp inspection on my 3560 and 3750 Network Switches,
    on both of them I'm facing that issue. (the printers and access points are configured to get ip addresses via DHCP), but when the lease time expires, they don't get ip addresses, and become unreacheable.
    while all other clients get thier ip addresses normally
    below you can find the Configuration configuration
    ip dhcp snooping vlan 98,105,111
    no ip dhcp snooping information option
    ip dhcp snooping database flash:dhcpsnooping
    ip dhcp snooping database write-delay 15
    ip dhcp snooping
    ip arp inspection vlan 98,105,111
    ip verify trust on all access ports including printers and access point ports
    all access ports are DHCP snooping untrusted
    also when I create a static dhcp snooping binding record for these devices on the switch it resolves the Issue, but when I reload the switch it's removed automatically.
    any resolution will be much appreciated.
    regards,
    Maher

    check the following link for configuration of DHCP snooping
    http://packetlife.net/blog/2010/aug/18/dhcp-snooping-and-dynamic-arp-inspection/
    http://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst6500/ios/12-2SX/configuration/guide/book/snoodhcp.html

  • DHCP Snooping WLC

    Hi,
    I would like to DHCP snooping on the WLC.
    Or a method to block DHCP pirate and authorized my DHCP.
    Best Regards,
    Julien Hernandez.

    Here the client 192.168.0.0 :
    (Cisco Controller) >show client detail 1c:99:4c:6f:c6:96
    Client MAC Address............................... 1c:99:4c:6f:c6:96
    Client Username ................................. N/A
    AP MAC Address................................... 44:ad:d9:57:fd:20
    AP Name.......................................... AP-INDE-106
    AP radio slot Id................................. 0
    Client State..................................... Associated
    Client NAC OOB State............................. Access
    Wireless LAN Id.................................. 1
    Hotspot (802.11u)................................ Not Supported
    BSSID............................................ 44:ad:d9:57:fd:20
    Connected For ................................... 8127 secs
    Channel.......................................... 11
    IP Address....................................... 192.168.0.155
    Gateway Address.................................. Unknown
    Netmask.......................................... Unknown
    Association Id................................... 8
    Authentication Algorithm......................... Open System
    Reason Code...................................... 1
    Status Code...................................... 0
    Session Timeout.................................. 15000
    Client CCX version............................... No CCX support
    QoS Level........................................ Silver
    Avg data Rate.................................... 0
    Burst data Rate.................................. 0
    Avg Real time data Rate.......................... 0
    Burst Real Time data Rate........................ 0
    802.1P Priority Tag.............................. disabled
    CTS Security Group Tag........................... Not Applicable
    KTS CAC Capability............................... No
    WMM Support...................................... Enabled
      APSD ACs.......................................  BK  BE  VI  VO
    Power Save....................................... ON
    Current Rate..................................... m7
    Supported Rates.................................. 5.5,11.0,6.0,9.0,12.0,18.0,
        ............................................. 24.0,36.0,48.0,54.0
    Mobility State................................... Local
    Mobility Move Count.............................. 0
    Security Policy Completed........................ Yes
    Policy Manager State............................. RUN
    Policy Manager Rule Created...................... Yes
    Audit Session ID................................. none
    AAA Role Type.................................... none
    Local Policy Applied............................. none
    IPv4 ACL Name.................................... none
    FlexConnect ACL Applied Status................... Unavailable
    IPv4 ACL Applied Status.......................... Unavailable
    IPv6 ACL Name.................................... none
    IPv6 ACL Applied Status.......................... Unavailable
    Layer2 ACL Name.................................. none
    Layer2 ACL Applied Status........................ Unavailable
    mDNS Status...................................... Disabled
    mDNS Profile Name................................ none
    No. of mDNS Services Advertised.................. 0
    Policy Type...................................... N/A
    Encryption Cipher................................ None
    Protected Management Frame ...................... No
    Management Frame Protection...................... No
    EAP Type......................................... Unknown
    FlexConnect Data Switching....................... Local
    FlexConnect Dhcp Status.......................... Local
    FlexConnect Vlan Based Central Switching......... No
    FlexConnect Authentication....................... Central
    Quarantine VLAN.................................. 0
    Access VLAN...................................... 321
    Client Capabilities:
          CF Pollable................................ Not implemented
          CF Poll Request............................ Not implemented
          Short Preamble............................. Implemented
          PBCC....................................... Not implemented
          Channel Agility............................ Not implemented
          Listen Interval............................ 10
          Fast BSS Transition........................ Not implemented
    Client Wifi Direct Capabilities:
          WFD capable................................ No
          Manged WFD capable......................... No
          Cross Connection Capable................... No
          Support Concurrent Operation............... No
    Fast BSS Transition Details:
    Client Statistics:
          Number of Bytes Received................... 2526655
          Number of Bytes Sent....................... 2425132
          Total Number of Bytes Sent................. 2425132
          Total Number of Bytes Recv................. 2526655
          Number of Bytes Sent (last 90s)............ 64
          Number of Bytes Recv (last 90s)............ 6764
          Number of Packets Received................. 25105
          Number of Packets Sent..................... 5996
          Number of Interim-Update Sent.............. 0
          Number of EAP Id Request Msg Timeouts...... 0
          Number of EAP Id Request Msg Failures...... 0
          Number of EAP Request Msg Timeouts......... 0
          Number of EAP Request Msg Failures......... 0
          Number of EAP Key Msg Timeouts............. 0
          Number of EAP Key Msg Failures............. 0
          Number of Data Retries..................... 1018
          Number of RTS Retries...................... 0
          Number of Duplicate Received Packets....... 56
          Number of Decrypt Failed Packets........... 0
          Number of Mic Failured Packets............. 0
          Number of Mic Missing Packets.............. 0
          Number of RA Packets Dropped............... 0
          Number of Policy Errors.................... 0
          Radio Signal Strength Indicator............ -60 dBm
          Signal to Noise Ratio...................... 24 dB
    Client Rate Limiting Statistics:
          Number of Data Packets Recieved............ 0
          Number of Data Rx Packets Dropped.......... 0
          Number of Data Bytes Recieved.............. 0
          Number of Data Rx Bytes Dropped............ 0
          Number of Realtime Packets Recieved........ 0
          Number of Realtime Rx Packets Dropped...... 0
          Number of Realtime Bytes Recieved.......... 0
          Number of Realtime Rx Bytes Dropped........ 0
          Number of Data Packets Sent................ 0
          Number of Data Tx Packets Dropped.......... 0
          Number of Data Bytes Sent.................. 0
          Number of Data Tx Bytes Dropped............ 0
          Number of Realtime Packets Sent............ 0
          Number of Realtime Tx Packets Dropped...... 0
          Number of Realtime Bytes Sent.............. 0
          Number of Realtime Tx Bytes Dropped........ 0
    Nearby AP Statistics:
          AP-INDE-108(slot 0)
            antenna0: 5364 secs ago.................. -74 dBm
            antenna1: 5364 secs ago.................. -87 dBm
          AP-INDE-106(slot 0)
            antenna0: 5364 secs ago.................. -67 dBm
            antenna1: 5364 secs ago.................. -57 dBm
          AP-INDE-106(slot 1)
            antenna0: 5363 secs ago.................. -82 dBm
            antenna1: 5363 secs ago.................. -87 dBm
          AP-INDE-111(slot 0)
            antenna0: 5364 secs ago.................. -94 dBm
            antenna1: 5364 secs ago.................. -97 dBm
          AP-INDE-119(slot 0)
            antenna0: 5364 secs ago.................. -87 dBm
            antenna1: 5364 secs ago.................. -91 dBm
          AP-INDE-105(slot 0)
            antenna0: 5364 secs ago.................. -68 dBm
            antenna1: 5364 secs ago.................. -79 dBm
          AP-INDE-105(slot 1)
            antenna0: 5363 secs ago.................. -90 dBm
            antenna1: 5363 secs ago.................. -87 dBm
          AP-INDE-109(slot 0)
            antenna0: 5364 secs ago.................. -75 dBm
            antenna1: 5364 secs ago.................. -85 dBm
          AP-INDE-109(slot 1)
            antenna0: 5364 secs ago.................. -83 dBm
            antenna1: 5364 secs ago.................. -78 dBm
          AP-INDE-121(slot 0)
            antenna0: 14490 secs ago................. -91 dBm
            antenna1: 14490 secs ago................. -92 dBm
          AP-INDE-126(slot 0)
            antenna0: 8132 secs ago.................. -89 dBm
            antenna1: 8132 secs ago.................. -92 dBm
          AP-INDE-126(slot 1)
            antenna0: 38197 secs ago................. -93 dBm
            antenna1: 38197 secs ago................. -83 dBm
          AP-INDE-116(slot 0)
            antenna0: 5364 secs ago.................. -61 dBm
            antenna1: 5364 secs ago.................. -50 dBm
          AP-INDE-116(slot 1)
            antenna0: 5364 secs ago.................. -82 dBm
            antenna1: 5364 secs ago.................. -86 dBm
          AP-INDE-112(slot 0)
            antenna0: 5364 secs ago.................. -71 dBm
            antenna1: 5364 secs ago.................. -71 dBm
          AP-INDE-112(slot 1)
            antenna0: 5364 secs ago.................. -88 dBm
            antenna1: 5364 secs ago.................. -90 dBm
          AP-INDE-107(slot 0)
            antenna0: 8129 secs ago.................. -91 dBm
            antenna1: 8129 secs ago.................. -85 dBm
          AP-INDE-118(slot 0)
            antenna0: 5364 secs ago.................. -94 dBm
            antenna1: 5364 secs ago.................. -91 dBm
          AP-INDE-114(slot 0)
            antenna0: 5364 secs ago.................. -93 dBm
            antenna1: 5364 secs ago.................. -85 dBm
          AP-INDE-114(slot 1)
            antenna0: 38197 secs ago................. -93 dBm
            antenna1: 38197 secs ago................. -91 dBm
          AP-INDE-123(slot 0)
            antenna0: 5364 secs ago.................. -72 dBm
            antenna1: 5364 secs ago.................. -83 dBm
          AP-INDE-103(slot 0)
            antenna0: 5364 secs ago.................. -91 dBm
            antenna1: 5364 secs ago.................. -83 dBm
          AP-INDE-104(slot 0)
            antenna0: 5364 secs ago.................. -87 dBm
            antenna1: 5364 secs ago.................. -90 dBm
          AP-INDE-102(slot 0)
            antenna0: 5364 secs ago.................. -90 dBm
            antenna1: 5364 secs ago.................. -87 dBm
    DNS Server details:
          DNS server IP ............................. 0.0.0.0
          DNS server IP ............................. 0.0.0.0
    Assisted Roaming Prediction List details:
     Client Dhcp Required:     True
    Allowed (URL)IP Addresses
    (Cisco Controller) >show client detail ec:59:e7:e9:e5:68
    Client MAC Address............................... ec:59:e7:e9:e5:68
    Client Username ................................. N/A
    AP MAC Address................................... 44:ad:d9:57:fd:20
    AP Name.......................................... AP-INDE-106
    AP radio slot Id................................. 0
    Client State..................................... Associated
    Client NAC OOB State............................. Access
    Wireless LAN Id.................................. 1
    Hotspot (802.11u)................................ Not Supported
    BSSID............................................ 44:ad:d9:57:fd:20
    Connected For ................................... 3043 secs
    Channel.......................................... 11
    IP Address....................................... 192.168.0.162
    Gateway Address.................................. Unknown
    Netmask.......................................... Unknown
    Association Id................................... 4
    Authentication Algorithm......................... Open System
    Reason Code...................................... 1
    Status Code...................................... 0
    Session Timeout.................................. 15000
    Client CCX version............................... No CCX support
    QoS Level........................................ Silver
    Avg data Rate.................................... 0
    Burst data Rate.................................. 0
    Avg Real time data Rate.......................... 0
    Burst Real Time data Rate........................ 0
    802.1P Priority Tag.............................. disabled
    CTS Security Group Tag........................... Not Applicable
    KTS CAC Capability............................... No
    WMM Support...................................... Enabled
      APSD ACs.......................................  BK  BE  VI  VO
    Power Save....................................... ON
    Current Rate..................................... m7
    Supported Rates.................................. 5.5,11.0,6.0,9.0,12.0,18.0,
        ............................................. 24.0,36.0,48.0,54.0
    Mobility State................................... Local
    Mobility Move Count.............................. 0
    Security Policy Completed........................ Yes
    Policy Manager State............................. RUN
    Policy Manager Rule Created...................... Yes
    Audit Session ID................................. none
    AAA Role Type.................................... none
    Local Policy Applied............................. none
    IPv4 ACL Name.................................... none
    FlexConnect ACL Applied Status................... Unavailable
    IPv4 ACL Applied Status.......................... Unavailable
    IPv6 ACL Name.................................... none
    IPv6 ACL Applied Status.......................... Unavailable
    Layer2 ACL Name.................................. none
    Layer2 ACL Applied Status........................ Unavailable
    mDNS Status...................................... Disabled
    mDNS Profile Name................................ none
    No. of mDNS Services Advertised.................. 0
    Policy Type...................................... N/A
    Encryption Cipher................................ None
    Protected Management Frame ...................... No
    Management Frame Protection...................... No
    EAP Type......................................... Unknown
    FlexConnect Data Switching....................... Local
    FlexConnect Dhcp Status.......................... Local
    FlexConnect Vlan Based Central Switching......... No
    FlexConnect Authentication....................... Central
    Quarantine VLAN.................................. 0
    Access VLAN...................................... 321
    Client Capabilities:
          CF Pollable................................ Not implemented
          CF Poll Request............................ Not implemented
          Short Preamble............................. Implemented
          PBCC....................................... Not implemented
          Channel Agility............................ Not implemented
          Listen Interval............................ 1
          Fast BSS Transition........................ Not implemented
    Client Wifi Direct Capabilities:
          WFD capable................................ No
          Manged WFD capable......................... No
          Cross Connection Capable................... No
          Support Concurrent Operation............... No
    Fast BSS Transition Details:
    Client Statistics:
          Number of Bytes Received................... 13499
          Number of Bytes Sent....................... 7662
          Total Number of Bytes Sent................. 7662
          Total Number of Bytes Recv................. 13499
          Number of Bytes Sent (last 90s)............ 0
          Number of Bytes Recv (last 90s)............ 0
          Number of Packets Received................. 184
          Number of Packets Sent..................... 69
          Number of Interim-Update Sent.............. 0
          Number of EAP Id Request Msg Timeouts...... 0
          Number of EAP Id Request Msg Failures...... 0
          Number of EAP Request Msg Timeouts......... 0
          Number of EAP Request Msg Failures......... 0
          Number of EAP Key Msg Timeouts............. 0
          Number of EAP Key Msg Failures............. 0
          Number of Data Retries..................... 61
          Number of RTS Retries...................... 0
          Number of Duplicate Received Packets....... 2
          Number of Decrypt Failed Packets........... 0
          Number of Mic Failured Packets............. 0
          Number of Mic Missing Packets.............. 0
          Number of RA Packets Dropped............... 0
          Number of Policy Errors.................... 0
          Radio Signal Strength Indicator............ -70 dBm
          Signal to Noise Ratio...................... 18 dB
    Client Rate Limiting Statistics:
          Number of Data Packets Recieved............ 0
          Number of Data Rx Packets Dropped.......... 0
          Number of Data Bytes Recieved.............. 0
          Number of Data Rx Bytes Dropped............ 0
          Number of Realtime Packets Recieved........ 0
          Number of Realtime Rx Packets Dropped...... 0
          Number of Realtime Bytes Recieved.......... 0
          Number of Realtime Rx Bytes Dropped........ 0
          Number of Data Packets Sent................ 0
          Number of Data Tx Packets Dropped.......... 0
          Number of Data Bytes Sent.................. 0
          Number of Data Tx Bytes Dropped............ 0
          Number of Realtime Packets Sent............ 0
          Number of Realtime Tx Packets Dropped...... 0
          Number of Realtime Bytes Sent.............. 0
          Number of Realtime Tx Bytes Dropped........ 0
    Nearby AP Statistics:
          AP-INDE-120(slot 0)
            antenna0: 36159 secs ago................. -98 dBm
            antenna1: 36159 secs ago................. -97 dBm
          AP-INDE-115(slot 0)
            antenna0: 11075 secs ago................. -96 dBm
            antenna1: 11075 secs ago................. -96 dBm
          AP-INDE-108(slot 0)
            antenna0: 188 secs ago................... -96 dBm
            antenna1: 188 secs ago................... -95 dBm
          AP-INDE-106(slot 0)
            antenna0: 188 secs ago................... -78 dBm
            antenna1: 188 secs ago................... -67 dBm
          AP-INDE-111(slot 0)
            antenna0: 1451 secs ago.................. -98 dBm
            antenna1: 1451 secs ago.................. -95 dBm
          AP-INDE-119(slot 0)
            antenna0: 188 secs ago................... -87 dBm
            antenna1: 188 secs ago................... -95 dBm
          AP-INDE-122(slot 0)
            antenna0: 73165 secs ago................. -95 dBm
            antenna1: 73165 secs ago................. -95 dBm
          AP-INDE-105(slot 0)
            antenna0: 188 secs ago................... -85 dBm
            antenna1: 188 secs ago................... -86 dBm
          AP-INDE-109(slot 0)
            antenna0: 332 secs ago................... -91 dBm
            antenna1: 332 secs ago................... -89 dBm
          AP-INDE-121(slot 0)
            antenna0: 2708 secs ago.................. -98 dBm
            antenna1: 2708 secs ago.................. -96 dBm
          AP-INDE-126(slot 0)
            antenna0: 215 secs ago................... -84 dBm
            antenna1: 215 secs ago................... -86 dBm
          AP-INDE-116(slot 0)
            antenna0: 188 secs ago................... -61 dBm
            antenna1: 188 secs ago................... -61 dBm
          AP-INDE-112(slot 0)
            antenna0: 187 secs ago................... -83 dBm
            antenna1: 187 secs ago................... -85 dBm
          AP-INDE-107(slot 0)
            antenna0: 188 secs ago................... -89 dBm
            antenna1: 188 secs ago................... -90 dBm
          AP-INDE-118(slot 0)
            antenna0: 188 secs ago................... -95 dBm
            antenna1: 188 secs ago................... -98 dBm
          AP-INDE-114(slot 0)
            antenna0: 187 secs ago................... -83 dBm
            antenna1: 187 secs ago................... -85 dBm
          AP-INDE-113(slot 0)
            antenna0: 38981 secs ago................. -94 dBm
            antenna1: 38981 secs ago................. -95 dBm
          AP-INDE-123(slot 0)
            antenna0: 187 secs ago................... -73 dBm
            antenna1: 187 secs ago................... -65 dBm
          AP-INDE-117(slot 0)
            antenna0: 11013 secs ago................. -94 dBm
            antenna1: 11013 secs ago................. -97 dBm
          AP-INDE-103(slot 0)
            antenna0: 187 secs ago................... -70 dBm
            antenna1: 187 secs ago................... -80 dBm
          AP-INDE-104(slot 0)
            antenna0: 214 secs ago................... -95 dBm
            antenna1: 214 secs ago................... -91 dBm
          AP-INDE-102(slot 0)
            antenna0: 215 secs ago................... -87 dBm
            antenna1: 215 secs ago................... -88 dBm
          AP-INDE-100(slot 0)
            antenna0: 11014 secs ago................. -96 dBm
            antenna1: 11014 secs ago................. -96 dBm
          AP-INDE-101(slot 0)
            antenna0: 11013 secs ago................. -96 dBm
            antenna1: 11013 secs ago................. -95 dBm
    DNS Server details:
          DNS server IP ............................. 0.0.0.0
          DNS server IP ............................. 0.0.0.0
    Assisted Roaming Prediction List details:
     Client Dhcp Required:     True
    Allowed (URL)IP Addresses

  • Illegal dhcp (DHCP Snooping )

    hi,
    in my network , where there is a dhcp (i use dhcp relay on my layer 3 switch),
    often someone connect a pc with a service of dhcp service active , and this produces a problem.
    i read in cisco.com and i find the documentation about how to fix this problem.
    DHCP Snooping is the solution.
    The release on my cisco 6509 with msfc2 not support this feature.
    WHAT DO YOU THINK ABOUT IT ?
    HAVE YOU A LINK WITH AN EXAMPLE OF ALTERNATIVE METHODS?
    Thanks
    FC

    my version are:
    IOS (tm) MSFC2 Software (C6MSFC2-JSV-M), Version 12.1(11b)E4
    in CAT OS
    WS-C6509 Software, Version NmpSW: 7.6(8)
    Step 1. (Permit DHCP response from host 1.2.3.4). "set security acl ip SERVER permit udp host 1.2.3.4 any eq 68"
    Step 2. (Deny DHCP responses from any other host). "set security acl ip SERVER deny udp any any eq 68"
    Step 3. (Permit other IP traffic). "set security acl ip SERVER permit any any"
    Step 4.(Commit the VACL)."commit security acl SERVER"
    Step 5.(Map the VACL to VLAN 10 for example). "set security acl map SERVER 10"
    WHAT DO YOU THINK ABOUT MY CONFIGURATION?
    Thanks
    FC

  • Configuring DHCP snooping

    I am settting up DHCP snooping for the first time on an 3750. My DHCP server resides on another switch. The 3750 is connected through a Gig SFP fiber to a 3550 with DHCP relay.
    Is the following config correct? The client will not get a dhcp with the option 82 enabled.
    (config)#ip dhcp snooping
    (config)#ip dhcp snooping vlan 2-200
    (config)#no ip dhcp snooping info option
    !The client will not get an ip with
    !this option enabled.
    ! trusted interface connected to the 3550
    (config)#int gi1/0/4
    (config-if)#ip dhcp trust
    ! untrusted interface
    (config-if)#ip dhcp limit rate 100
    (config)#ip dhcp snooping database flash:/database1
    (config)#ip dhcp snooping database timeout 30
    (config)#ip dhcp snooping database write-delay 30

    Have you enabled option 82 on your DHCP server? Also, on your DHCP relay switch, configure the following under the VLAN interface in question and see if it makes any difference.
    Example:
    c3550-A(config)#int vlan 1
    c3550-A(config-if)#ip dhcp relay information trusted ?

  • [solved] DHCP snooping in environment with core and access switches

    Hello,
    I'd like to know what steps are needed to configure DHCP snooping in my environment:
    1) two core switches Catalyst 6500 (VSS): VLAN defined here, DHCP server connected here
    2) access switches Catalyst 3750: clients connected here
    Access switches are connected to core ones via trunk ports (fiber optics).
    How many snooping databases are required?  One for core and next for each stack?

    Hi Marian,
    If your network is properly designed and connected so that clients, including DHCP clients, are attached to the access layer switches, then the DHCP Snooping should be run only on access switches. Running DHCP Snooping on core switches is not going to increase the security because the DHCP communication has already been sanitized on the access layer.
    If you intend to save the DHCP Snooping database then each switch performing the DHCP Snooping needs to have its own database if you intend to use a persistent storage for it. However, you can always have the switch to save the database to its own FLASH, alleviating the need for a centralized networked storage.
    I am not sure if this answers your question so please feel welcome to ask further.
    Best regards,
    Peter

  • Enabling DHCP snooping

    Hello,
    We have a 2960 48 port switch in a remote office with a couple of VLANs (VOIP & Data).  The L3 routing is provided via the WAN router and acts as a 'router on a stick' and provides DHCP for both VLANs.
    I need to enable DHCP snooping and I have issued the 'ip dhcp snooping trust' on the router port but not for the access ports.  I have then added 'ip dhcp snooping' to the switch but not 'ip dhcp snooping vlan x , x' as I was hoping the ip dhcp snooping bindings database would start to fill up after a few days but it hasn't.
    If I add 'ip dhcp snooping vlan x , x' I think the users will get issues as there is no database, what should I do as the router is doing the DHCP.
    Thanks

    You need to identify the vlans where snooping should be implemented using:
    ip dhcp snooping vlan #
    The default allows dhcp requests on untrusted ports.

  • Help understanding DHCP Snooping and Dynamic ARP Inspection

    Please help me to understand DHCP Snooping and Dynamic ARP Inspection.

    HI Ezra,
    In simple words:
    DHCP Snooping is a feature which is available on switches. This feature is used to prevent rogue dhcp server attacks.
    In the diagram, a valid dhcp server is connected to the network. The computers are suppose to receive dynamic ip addresses from the valid server. An attacker implants a rogue dhcp server on the network as shown in the diagram. The following steps are followed for a client to receive an ip address from a dhcp server.
    When a client (computer) is connected to the switch and is configured to receive a dynamic ip address from a dhcp server, the dhcp service on the client, sends out a DHCP Discover packet, searching for servers on the network. This packet is broadcast in nature. DHCP servers on the network, would respond to the DHCP Discover packet sent from the client. In the example, both the DHCP servers would respond to the DHCP discover packet. The client would process the first packet it receives. If the response send by the rogue dhcp server reaches the client first, then the computer would have an ip address provided by the rogue dhcp server.
    To prevent this, dhcp snooping is configured on the port on which the valid dhcp server is connected to. After the configuration is performed, no other ports on the switch would be able to respond to DHCP Discover packets from the clients. So even through the attacker has set up a rogue dhcp server, the port on the switch to which the attacker has connected would not be allowed to respond to DHCP discover packets. Thus dhcp snooping thwarts the attempt from the attacker in setting up a rogue dhcp server.
    DAI:
    Please read the expalined version from here: http://ciscocertstudyblog.blogspot.de/2010/06/ciscoblogpics.html
    More about DHCP snooping and DAI: Please read this attached document with some detailed explanation.
    Hope it helps.
    Regards
    Please use rating system and mark athe question answered it may help others.

  • SGE2010P DHCP Snooping Bug

    In some cases with DHCP snooping enabled, the switch can cause a DHCP request to be blocked.
    This is appears to be a corner case but it has happened to me with two different pieces of hardware in two different scenarios.
    First, I have a printer on a VLAN where other computers can get an IP address fine but when DHCP snooping is enabled, the printer is unable to obtain an IP.
    Second, I created a separate VLAN for an isolated network and enabled DHCP snooping on that VLAN. A modem was hooked up to one port and added as a trusted interface. A computer was hooked up to another port and with DHCP snooping enabled, the computer was unable to obtain an IP address.
    In both cases, the DHCP snooping binding table shows an IP of 0.0.0.0 for the port with a very low renew time (~100sec). Also, as soon as I disabled DHCP snooping for either of the above VLANs, the devices are able to obtain IP address. It appears that the DHCP OFFER is never making its way back to the device with DHCP snooping enabled.

    Nah,
    I think it has something to do with MAC addresses that don't start with 00.
    Just a hunch though.
    I know they will never fix it and I have moved on.
    I guess it's the "quality" you should expect for Cisco Small Biz.

Maybe you are looking for

  • Strange Panel titlebar Error in Flashbuilder4

    I'm getting an error in Flashbuilder4 in the debug windows that says: Main Thread (Suspended: ReferenceError: Error #1069: Property titleBar not found on mx.containers.Panel and there is no default value.) But at the exact same time, in the same debu

  • What can I do if my CD or DVD drive doesn't work properly in Windows8?

    my computer is toshiba sattelite pro l300. It can not read CD, thought it can read DVD ok

  • ALTER TYPE MODIFY ATTRIBUTE cascade including table data

    Hi, does anybody know, why I get "ORA-00932: inconsistent datatypes: expected REF TYPE1_T got REF TYPE1_T" after ALTER TYPE MODIFY ATTRIBUTE cascade including table data when the altered type contains a nested table of type REFs. according to the doc

  • Address book messed up!

    My address book is messed up every since I upgraded to Marvick. It has doubled the group names. One works and one doesn't. Also it has the group name in the "to" but when I send it out it shows all the email in the group to the recipients. I have the

  • Logic doubling and tripling values in BPC 7 MS

    Experts, We are using BPC 7 MS and SP5, SQL2008 Server, Recently we are encountering the problems of doubling and tripling of numbers when running the Fx trans, Push logic. To fix this issue we have defined measures=periodic in the scope of the logic