Network & Security Consultant

Learn from network & security consultant, wednesday, may 30, 2018, what is dhcp addr. assignment required feature in wlc.

dhcp addr. assignment required wlc

  • Share This:  
  •  Facebook
  •  Twitter
  •  Google+
  •  Stumble

2 comments:

dhcp addr. assignment required wlc

Thanks bro, very informative

Follow me on Linkedin

  • Terms & Conditions
  • PRIVACY Page

Popular Posts

' border=

  • What is the difference between VSS and vPC? Basically VSS and Vpc both are used to create multi chasis etherchannel 1) vPC is Nexus switch specific feature,however,VSS is created u...
  • Etherchannel Interview Questions Q) What is Etherchannel? Etherchannel is a method of logical bundling of two or more physical links. Q) What are the types of Etherchan...

' border=

  • Cisco ACI Interview Questions and Answers  1) What are the benefits of Nexus ACI compared to traditional network solution/architecture? A:   i) Central Management Solution to manage ...

' border=

  • Data Center
  • Interview Questions
  • Troubleshooting
  • 802.11 Client Labs
  • 802.11 Frame Labs
  • 802.11 RF Fundamentals
  • 802.1X Security Labs
  • Security Labs / Videos
  • Site Survey
  • Did You Know?
  • Product Reviews
  • My80211 In The News

MY80211.com

  • Intel WiFi Blogs
  • CCIE Wireless Syllabus v3
  • CCIE Wireless v3 Written
  • CCIE Wireless v3 LAB
  • Troubleshooting
  • Configuration Examples
  • CCIE Wireless v3 AnyConnect
  • CCIE Wireless v3 ISE
  • CCIE Wireless V3 Prime
  • Enterprise Mobility 7.3 Design Guide
  • ISE Cisco Unified Access (UA) BYOD
  • Wireless Security Design Guide
  • Enterprise Mobility 4.1 Design Guide
  • Location Services 4.1 Design Guide
  • Voice Wireless LAN 4.1 Design Guide
  • Outdoor Mobility Design Guide
  • Mesh 7.0 Design Guide
  • Cisco Wireless
  • Cisco AnyConnect
  • Cisco WLC Labs / Videos
  • Cisco WLC CLI Commands
  • Cisco Autonomous Labs / Videos
  • Cisco Autonomous. CLI Commands
  • Cisco WiFi VoIP
  • Cisco Bridging
  • Cisco Field Alerts
  • Cisco WLAN Videos
  • Cisco WLC Config Guides
  • CISCO 802.11A/B/G CLIENT
  • Cisco WLAN Troubleshooting
  • Voice Over Wireless Design
  • Enterprise Mobility Design
  • Config Examples / TechNotes
  • Cisco Medical-Grade Network (MGN) 2.0
  • CCIE Wireless Syllabus
  • Written Exam - Overview
  • Written Exam - Study/Learn
  • Written Exam - Take Your Exam
  • Written Exam - Topics
  • Lab Exam - Overview
  • Lab Exam - Study/Learn
  • Lab Exam - Take Your Lab
  • Lab Exam - Topics
  • Lab Exam - Blue Print List
  • Apple iDevices
  • Wavelink Avalanche / 79xx
  • AirMagnet WiFi Analyzer
  • AirMagnet Surveyor
  • CWNA - Rick Todd
  • CWNA - John Bogard
  • CWNA - Darby Weaver
  • CWSP - George Stefanick
  • which antenna gets deactivated when you provide less than full power to a Cisco 3700 ?
  • Client Debug Macro Change - Cisco code: 7.6.130.0 - 8.0.110.0
  • Cisco client debug - 802.11 Association Status Code
  • How To - WISM1 to WISM2 Migration
  • WLC: AP Managers Are Pingable - 7.x onwards
  • Recover WEP, Admin, Guest account Password from WLC
  • WLC: Configuring Dynamic Anchoring for Clients with Static IP Addresses
  • WLC: How Cisco Virtualizes The Base Radio MAC ADDRESS On The WLC – Did you know?
  • WLC: Radius Statistics Command
  • WLC: Management via Wireless – Did you know ?
  • October 2015 (1)
  • June 2015 (1)
  • May 2013 (1)
  • March 2013 (1)
  • January 2012 (1)
  • December 2011 (1)
  • May 2011 (2)
  • March 2011 (2)
  • February 2011 (1)
  • January 2011 (1)
  • October 2010 (2)
  • September 2010 (1)
  • July 2010 (1)
  • May 2010 (1)
  • March 2010 (1)
  • February 2010 (3)
  • January 2010 (4)
  • December 2009 (8)
  • November 2009 (5)

Cisco: 802 11 frames with Cisco VIP George Stefanick

Fluke Networks: Minimize Wi Fi Network Downtime

Aruba: Packets never lie: An in-depth overview of 802.11 frames

ATM15 Ten Talk “Wifi drivers and devices”

Houston Methodist Innovates with Wireless Technology

Bruce Frederick Antennas (1/2)

Bruce Frederick dB,dBi,dBd (2/2)

Cisco AP Group Nugget

  • Certifications
  • Site Search
  • Revolution Wi-Fi
  • jenniferhuber
  • wirelesslanprofessionals
  • jeromehenry
  • packetlife.net
  • wlan iconoclast
  • sniff wifi
  • AlwaysTheNetwork
  • Cisco CCNA Wireless
  • Cisco CCIE Wireless
  • 802.11 Fundamentals
  • 802.11 Security Books
  • 802.11 Hacking Books
  • IEEE 802.11-2007
  • IEEE 802.11k-2008
  • IEEE 802.11n-2009
  • IEEE 802.11r-2008

See inside Cisco's latest wireless gear!

Shawn Jackman (Jack) CWNE#54 is a personal friend and has been a mentor to me for many years.  I've had the pleasure and opportunity to work with Jack for 4 years. Jack is a great teacher who takes complex 802.11 standards and breaks them down so almost anyone can understand the concept at hand. I'm excited for you brother. Great job and job well done! Put another notch in the belt!

WLC "DHCP Address Assignment Required" Option 

Dhcp address assignment required is one of those check boxes that make you go huh, while you scratch your head, if you don't know how it works. cisco's best pratice for voice is to disable this feature. however, keep in mind,   if dhcp addr. assignment required is selected, clients must obtain an ip address via dhcp. any client with a static ip address is not allowed on the network., l2 and l3 roaming.

L2 - Roam —If the client has a valid DHCP lease and performs a L2 roam between two different controllers on the same L2 network, the client should not need to re-dhcp and the client entry should be completely moved to the new controller from the original controller. Then if the client does need to DHCP again, the DHCP bridging or proxy process on the current controller would transparently bridge the packet again. L3 – Roam —In a L3 roam scenario the client is moving between 2 different controllers in different L3 networks. In this situation the client is anchored to the original controller and listed in the client table on the new foreign controller. During the anchoring scenario the client’s DHCP is handled by the anchor controller as the client data is tunneled within an EoIP tunnel between the foreign and anchor controllers.

Reader Comments (2)

Thx, I need this informatioon. Coz I get trouble with my WFi.... GBU

How i can disable the "DHCP Address Assignment" via command line?

Post a New Comment

Notify me of follow-up comments via email.

Link an External Response

ExamTopics Logo

Unlimited Access

exam questions

Exam 200-301 All Questions

View all questions & answers for the 200-301 exam, exam 200-301 topic 1 question 842 discussion.

dhcp addr. assignment required wlc

  • A. Enable the Static IP Tunneling option.
  • B. Disable the Coverage Hole Detection option.
  • C. Set the P2P Blocking Action option to Forward-UpStream.
  • D. Check the DHCP Addr. Assignment check box.

BarkingSpider

Stevens0103, ciscoman021, get it certification.

Unlock free, top-quality video courses on ExamTopics with a simple registration. Elevate your learning journey with our expertly curated content. Register now to access a diverse range of educational resources designed for your success. Start learning today with ExamTopics!

Log in to ExamTopics

Report comment.

  • Skip to content
  • Skip to search
  • Skip to footer

Troubleshoot DHCP Client Connectivity Issue on a Cisco 9800 WLC

dhcp addr. assignment required wlc

Available Languages

Download options.

  • PDF (2.8 MB) View with Adobe Reader on a variety of devices
  • ePub (2.9 MB) View in various apps on iPhone, iPad, Android, Sony Reader, or Windows Phone
  • Mobi (Kindle) (1.8 MB) View on Kindle device or Kindle app on multiple devices

Bias-Free Language

The documentation set for this product strives to use bias-free language. For the purposes of this documentation set, bias-free is defined as language that does not imply discrimination based on age, disability, gender, racial identity, ethnic identity, sexual orientation, socioeconomic status, and intersectionality. Exceptions may be present in the documentation due to language that is hardcoded in the user interfaces of the product software, language used based on RFP documentation, or language that is used by a referenced third-party product. Learn more about how Cisco is using Inclusive Language.

Introduction

This document will describe various Dynamic Host Configuration Protocol ( DHCP)-related issues encountered by wireless clients when connected to a Cisco 9800 Wireless LAN Controller (WLC) and how to troubleshoot them.

Prerequisites

Cisco recommends that you have knowledge of these topics:

  • Basic knowledge of Cisco WLC 9800
  • Basic knowledge of DHCP Flow
  • Basic knowledge of local and flex connect mode AP

Understanding the Flow of DHCP Traffic with Wireless Clients

When the wireless client connects, it does the usual DHCP exchange by sending a broadcast DHCP discovery frame to find a DHCP server to the associated AP. Depending on the AP's mode of operation, it will either forward the request to the WLC via the CAPWAP tunnel or pass it directly to the next hop. If a DHCP server is available within the local Layer 2 domain, it will respond, facilitating a successful connection. In the absence of a local subnet DHCP server, the router (configured with the client's SVI) must be set up to route the DHCP discovery to the appropriate server. This is typically done by configuring an IP Helper Address on the router, which instructs it to forward specific broadcast UDP traffic (such as DHCP requests) to a predetermined IP address.

The behavior of client DHCP traffic is entirely dependent on the mode in which your access point (AP) is operating. Let's examine each of these scenarios separately:

Scenario 1. The Access Point (AP) is Operating in Local Mode

When an AP is set up in Local Mode, client DHCP traffic is centrally switched, meaning that the DHCP requests from clients are sent through a CAPWAP tunnel from the AP to the WLC, where they are then processed and forwarded accordingly. In this case, you have two choices: you can either utilize an Internal DHCP server or opt for an External DHCP server.

Topology (Local Mode AP) Network Topology : Local Mode AP

Case study 1. when wlc is configured as an internal dhcp server.

The controller is capable of offering an internal DHCP server through the integrated features of the Cisco IOS XE software. However, it is considered best practice to use an external DHCP server. Before setting up the WLC as an Internal DHCP server, several prerequisites must be addressed which are as follows:

  • Ensure to configure a Switched Virtual Interface (SVI) for the client VLAN and assign the IP address of the DHCP server to it.
  • The IP address of the Internal DHCP server should be set on the server-facing interface, which could be a loopback interface, an SVI, or a Layer 3 physical interface.
  • Loopback interface is recommended to configure because, unlike physical interfaces that connect to actual network segments, the loopback interface is not tied to hardware and does not correspond to a physical port on the device. The primary purpose of a loopback interface is to provide a stable, always-up interface that is not subject to hardware failures or physical disconnections.

Working Setup: Here is an example of an internal DHCP server configuration where clients successfully received IP addresses. Here are the operational logs and the associated setup details.

Set up the WLC as the DHCP server for VLAN 10, with a DHCP scope ranging from 10.106.10.11/24 to 10.106.10.50/24.

Configured Loopback interface on WLC:

Client VLAN configured as SVI [L3 Interface] with helper address as loopback interface on WLC:

Alternatively, you can set the DHCP server's IP address within the policy profile, rather than configuring a helper address under the SVI. However, it is generally advised to configure this on a per-VLAN basis for best practices:

Radioactive Traces on WLC:

Embedded Packet Captures on WLC:

Embedded Packet Capture on WLC

Client Side Packet Capture:

Client End Packet Capture

In the operational logs provided, you can see that the WLC is receiving the DHCP Discover message from the wireless client, and the client's VLAN is relaying it to the helper address (which in the example provided is the internal loopback interface). Following this, the internal server issues a DHCP Offer, and subsequently, the client sends a DHCP Request, which is then acknowledged by the server with a DHCP ACK. Verification of Wireless Client IP: On WLC:

On Wireless Client:

IP verification on Client end

Note : 1. VRF is not supported in the internal DHCP servers. 2. DHCPv6 is not supported in the internal DHCP servers. 3. On C9800, SVI allows configuring multiple helper addresses but only the first 2 are used. 4. This has been tested and hence is supported across all platforms for a maximum of 20% of the box’s maximum client scale. For example, for a 9800-80 that supports 64,000 clients, the maximum DHCP bindings supported is around 14,000.

Case Study 2. When an External DHCP Server is Used

An external DHCP server refers to a DHCP server that is not integrated into WLC itself but configured on a different network device [Firewall, Routers] or a separate entity within the network infrastructure. This server is dedicated to managing the dynamic distribution of IP addresses and other network configuration parameters to clients on the network.

When utilizing an external DHCP server, the WLC's function is solely to receive and relay traffic. How the DHCP traffic is routed from the WLC, whether it's broadcast or unicast, will vary depending on your preference. Let's consider each of these methods separately.

DHCP Traffic Broadcast Across the Layer 2 Domain

In this setup, another network device, such as a firewall, uplink, or core switch, acts as a relay agent. When a client broadcasts a DHCP discovery request, the WLC's only job is to forward this broadcast via the Layer 2 interface. For this to work correctly, you must ensure that the client VLAN's Layer 2 interface is configured properly and permitted through the WLC's data port and the uplink device. Desired configuration on the WLC end for client VLAN 20 for this instance: Configured Layer 2 VLAN on WLC:

Configured Data port on WLC to allow the traffic of client VLAN:

Radioactive Traces on 9800 WLC:

Embedded Packet Capture Taken on 9800 WLC:

Embedded Packet Capture on WLC

AP Client Debugs:

Client End Packet Capture

9800 WLC is Serving as a Relay Agent

In this configuration, the WLC directly forwards the DHCP packets it receives from wireless clients to the DHCP server by unicast. To enable this, ensure that the VLAN SVI for the client is configured on the WLC. There are 2 ways to configure the DHCP server IP in 9800 WLC: 1. Configure DHCP server IP under policy profile under advanced setting. Via GUI: Navigate to   Configuration > Tags & Profile > Policy > Policy_name > Advanced . Under the DHCP section you can configure the DHCP server IP as shown:

Policy Profile Setting on WLC

2. Within the SVI configuration, you must specify the helper address. Setting up multiple DHCP servers in the helper address configuration is possible to provide redundancy. While setting the DHCP server address for each WLAN within the policy profile is possible, the recommended approach is to configure it on a per-interface basis. This can be accomplished by assigning a helper address to the corresponding SVI. When employing the relay feature, the source of the DHCP traffic will be the IP address of the client's Switched Virtual Interface (SVI). This traffic is then routed through the interface corresponding to the destination (the DHCP server's IP address) as determined by the routing table. Here's a sample of the working configuration on 9800 serving as a relay agent:

Configured Layer 3 Interface for Client VLAN on WLC with helper address:

RA Traces from WLC:

Embedded Packet Capture on WLC:

Embedded Packet Capture on WLC

In both the Radioactive Traces (RA) and the Embedded Packet Capture (EPC) on the WLC, you will notice that the WLC, acting as a relay agent, is directly unicasting the DHCP packets from the client to the DHCP server.

Client Side Capture:

Client End Packet Capture

Verification of Wireless Client IP: You can check the IP lease on the DHCP server and its corresponding status. On Wireless Client:

IP verification on Client End

DHCP Option 80 with Suboption 5/150 in 9800 WLC

In certain scenarios, you may prefer to explicitly define the source interface for DHCP traffic rather than depending on the routing table, to prevent potential network complications. This is particularly relevant when the next network device along the path, such as a Layer 3 switch or firewall, employs Reverse Path Forwarding (RPF) checks. Take, for instance, a situation where the wireless management interface is set on VLAN 50, while the client SVI is on VLAN 20 and is being used as a DHCP relay for client traffic. The default route is directed towards the gateway of the wireless management VLAN/subnet.

Starting with version 17.03.03 on the 9800 WLC, it is possible to choose the source interface for DHCP traffic to be either the client VLAN or another VLAN, such as the Wireless Management Interface (WMI), which guarantees connectivity to the DHCP server.

Here would be a snip of the config:

In this scenario, the traffic to the DHCP server 10.100.17.14  will be sourced from VLAN 50 (10.100.16.10), because the packet's exit interface is selected based on a lookup in the IP routing table, and typically, it would exit via the Wireless Management Interface (WMI) VLAN due to default route configured. However, if an uplink switch implements Reverse Path Forwarding (RPF) checks, it may discard a packet arriving from VLAN 50 but with an IP source address belonging to a different subnet [VLAN 20]. To prevent this, you should set a precise source interface for the DHCP packets with the IP DHCP relay source-interface command. In this particular case, you'd want the DHCP packets to originate from the WMI interface on VLAN 50:

When using  ip dhcp relay source-interface command, both the source interface of the DHCP packets and the GIADDR is set to the interface specified in the DHCP relay command (VLAN50, in this case). This is a problem, as this is not the client VLAN where you want to assign DHCP addresses.

How does the DHCP server know how to assign the IP from the right client pool? So the answer to this is when the  ip dhcp relay source-interface  the command is used, C9800 automatically adds the client subnet information in a proprietary sub-option 150 of option 82 called link selection, as you can see from the capture:

Option 182 suboption 150 on WLC Packet Capture

By default, it will add sub-option 150 (cisco proprietary). Ensure that the DHCP server used can interpret and act on this information. The recommendation is to change the C9800 configuration to use the standard option 82, sub-option 5 to send the link selection information. You can do this by configuring the following global command:

Once the specified command is applied, the system will replace suboption 150 with suboption 5 in the DHCP packets. Suboption 5 is more widely recognized by network devices, thus ensuring that the packets are less likely to be dropped. The application of this change is also evident in the capture provided:

Option 182 suboption 5 on WLC Packet Capture

With the implementation of suboption 5, your DHCP traffic should be acknowledged by other network devices. However, you may still encounter NAK (negative acknowledgement) messages especially when the Windows DHCP server is in use. This could be due to the DHCP server not authorizing the source IP address, possibly because it doesn't have a corresponding configuration for that source IP. What do you have to do on the DHCP server? For the Windows DHCP server, you have to create a dummy scope to authorize the IP of the relay agent.

Warning : All relay agent IP addresses (GIADDR) must be part of an active DHCP scope IP address range. Any GIADDR outside of the DHCP scope IP address ranges is considered a rogue relay and Windows DHCP Server will not acknowledge DHCP client requests from those relay agents. A special scope can be created to authorize relay agents. Create a scope with the GIADDR (or multiple if the GIADDRs are sequential IP addresses), exclude the GIADDR address(es) from distribution, and then activate the scope. This will authorize the relay agents while preventing the GIADDR addresses from being assigned.

Note : In a foreign-anchor setup, DHCP traffic is centrally processed with AP mode set as Local. Initially, the DHCP requests are sent to the foreign WLC, which then forwards them to the anchor WLC via a mobility tunnel. It is the anchor WLC that handles the traffic according to its configured settings. Therefore, any configurations related to DHCP should be implemented on the anchor WLC.

Scenario 2. The Access Point (AP) is Operating in Flex Mode

FlexConnect APs are designed for branches and remote offices, allowing them to operate in a standalone mode when they lose connectivity to the central Wireless LAN Controller (WLC). FlexConnect APs can locally switch traffic between a client and the network without having to backhaul the traffic to the WLC. This reduces latency and conserves WAN bandwidth. In flex mode AP the DHCP traffic can be either centrally switched or locally switched.

Topology (Flex Mode AP)

Network Topology: Flex Mode AP

FlexConnect Mode AP with Central DHCP

Regardless of the AP mode, the configuration, operational flow, and troubleshooting steps remain consistent when using a central DHCP server. However, for APs in FlexConnect mode, it's generally advised to use a local DHCP server unless you have a client SVI set up at the local site.

Note : If you don't have a client subnet available at the remote site, you can take advantage of FlexConnect NAT-PAT. FlexConnect NAT/PAT performs Network Address Translation (NAT) for the traffic originating from clients connected to the AP, mapping it to the AP's management IP address. For instance, if you have APs operating in FlexConnect mode at remote branches and the connected clients need to communicate with a DHCP server located at the headquarters where the controllers reside, you can activate FlexConnect NAT/PAT in conjunction with the Central DHCP setting in the Policy profile.

FlexConnect Mode AP with Local DHCP

When a FlexConnect AP is configured to use local DHCP, client devices that associate with the AP receive their IP address configuration from a DHCP server that is available within the same local network. This local DHCP server could be a router, a dedicated DHCP server, or any other network device providing DHCP services within the local subnet. With local DHCP, the DHCP traffic is switched within the local network, meaning that the AP relays DHCP requests from clients straight to the adjacent hop, such as the access switch. From there, the requests are handled according to the configuration of your network. Prerequisite:

1. Please consult the FlexConnect guide to ensure that your configuration aligns with the instructions and best practices outlined in the guide.

2. Client VLAN should be listed under the flex profile. 3. The AP needs to be set up in trunk mode, with the AP management VLAN designated as the native VLAN, and the VLANs for client traffic should be permitted on the trunk. Here's an example of AP connected switch port configuration with management VLAN as 58 and client VLAN as 20:

Working Setup: For reference sharing the operational logs with the Local DHCP server when AP is configured for flex mode: AP Client Debugs:

AP Uplink Capture:

AP Uplink Capture

IP Verification on Client End Troubleshooting of DHCP Issue

Troubleshooting DHCP issues involves identifying and resolving problems that prevent clients from obtaining an IP address from a DHCP server when connected to the wireless network. Here are some common steps and considerations when troubleshooting DHCP problems: 1. Verify Client Configuration

  • Ensure the client is configured to obtain an IP address automatically.
  • Confirm that the network adapter is enabled and functioning properly.

2. Check DHCP Server Status

  • Confirm that the DHCP server is operational and reachable from the client's network segment.
  • Check the DHCP server's IP address, subnet mask, and default gateway settings.

3. Review Scope Configuration

  • Inspect the DHCP scope to ensure it has a sufficient range of IP addresses available for clients.
  • Verify the scope's lease duration and options, such as DNS servers and default gateway
  • In some environments (like Active Directory), ensure the DHCP server is authorized to provide DHCP services within the network.

4. Review Configuration on 9800 WLC

  • Many issues have been seen due to misconfiguration, such as a missing loopback interface, Client SVI or the absence of a configured helper address. Before log collection, it is recommended to verify that the configuration has been correctly implemented.
  • When utilizing an internal DHCP server: Concerning the exhaustion of the DHCP scope, it's important to ensure, particularly when configuring DHCP via the CLI, that the lease timer is configured as per your requirements. By default, the lease timer is set to infinite on 9800 WLC.
  • Verify that client VLAN traffic is permitted on the WLC uplink port when using a central DHCP server. Conversely, when employing a local DHCP server, ensure the relevant VLAN is allowed on the AP uplink port.

5. Firewall and Security Settings

  • Ensure that firewalls or security software are not blocking DHCP traffic (port 67 for DHCP server and port 68 for DHCP client).

Log Collection

Logs from wlc.

1. Enable term exec prompt timestamp to have time reference for all the commands.

2. Use  show tech-support wireless  !!   to review the configuration

2. You can check the number of clients, client state distribution, and excluded clients. show wireless summary !!    Total number of APs and clients show wireless exclusionlist !!      In case any client is seen as excluded show wireless exclusionlist client mac-address MAC@ !! to get more details about concrete client excluded and check if the reason is listed as IP theft for any client.

3. Check IP address assignment for clients, look for incorrect addresses or unexpected static address learning, VLANs marked as dirty due to no response from DHCP server, or packets drops in SISF that is handling DHCP/ARP.

show wireless device-tracking database ip !!  Check by IP and see how address learning occurred: show wireless device-tracking database mac !! Check by Mac and see what IP client is assigned. show wireless vlan details !!   Check that VLAN is not marked as dirty due to DHCP failures in case of VLAN group in use. show wireless device-tracking feature drop !! Drops in SISF

4. Specific outputs from WLC for concrete client MAC@  show wireless device-tracking feature drop  Enable radioactive trace for client MAC address when the client is trying to connect wireless network. Via CLI:

Caution : The conditional debugging enables debug-level logging which in turn increases the volume of the logs generated. Leaving this running reduces how far back in time you can view logs from. So, it is recommended to always disable debugging at the end of the troubleshooting session.

In order to disable all debugging, run these commands:

Via GUI: Step 1. Navigate to   Troubleshooting > Radioactive Trace  .    Step 2. Click  Add   and enter a client Mac address that you want to troubleshoot. You can add several Mac addresses to track.

Step 3. When you are ready to start the radioactive tracing, click start. Once started, debug logging is written to disk about any control plane processing related to the tracked MAC addresses.

Step 4. When you reproduce the issue you want to troubleshoot, click  Stop  .

Step 5. For each mac address debugged, you can generate a log file collating all the logs pertaining to that mac address by clicking Generate  .

Step 6. Choose how long back you want your collated log file to go and click Apply to Device.

Step 7. You can now download the file by clicking the small icon next to the file name. This file is present in the boot flash drive of the controller and can also be copied out of the box through CLI.

!!Embedded Captures filtered by client MAC address in both directions, Client inner MAC filter available after 17.1.

Note : EPC on 9800 will be useful when central DHCP is enabled on 9800 WLC.

Via GUI: Step 1. Navigate to  Troubleshooting > Packet Capture > +Add  .

Step 2. Define the name of the packet capture. A maximum of 8 characters is allowed.

Step 3. Define filters, if any.

Step 4. Check the box to Monitor Control Traffic if you want to see traffic punted to the system CPU and injected back into the data plane.

Step 5. Define buffer size. A maximum of 100 MB is allowed.

Step 6. Define limit, either by duration which allows a range of 1 - 1000000 seconds or by number of packets which allows a range of 1 - 100000 packets, as desired.

Step 7. Choose the interface from the list of interfaces in the left column and select the arrow to move it to the right column.

Step 8. Save and Apply to Device.

Step 9. To start the capture, select Start.

Step 10. You can let the capture run to the defined limit. To manually stop the capture, select Stop.

Step 11. Once stopped, an Export button becomes available to click with the option to download the capture file (.pcap) on the local desktop via HTTP or TFTP server or FTP server or local system hard disk or flash.

Logs from the AP Side

Logs from dhcp server.

When using an external DHCP server, it's necessary to gather debug logs and packet captures on the server side to verify the flow of DHCP traffic.

If you observe that the DHCP discover messages are visible on the 9800 WLC in a Central DHCP setup, or within AP debug logs in a Local DHCP setup, you should proceed to gather capture data from the uplink to confirm that the packets are not dropping in the Ethernet port.Depending on the switch's capabilities, you have the option to perform an embedded packet capture or a SPAN (Switched Port Analyzer) capture on the uplink switch. It is advisable to trace the DHCP traffic flow step by step to determine the point at which the communication is interrupted, both from the DHCP client to the DHCP server and in the reverse direction.

Known Issues

Issue 1. The client is attempting to obtain an IP address from a VLAN that it previously retained. Situations can arise where a wireless client switches between two SSIDs associated with different client VLANs. In such cases, the client may persist in requesting an IP from the VLAN it previously connected to. Because this IP will not be within the current VLAN's DHCP scope, the DHCP server will issue a NAK (negative acknowledgement), and as a result, the client will be unable to acquire an IP address.

In the Radioactive trace logs, it is evident that the client continues to seek an IP from the VLAN it was formerly connected to, which is VLAN 10, despite the fact that the client VLAN for the current SSID is VLAN 20.

Embedded Packet Capture on WLC

Resolution: To ensure that a client completes the full DHCP process, you can enable the IPv4 DHCP Required option within the policy configuration. This setting should be enabled, especially when the client is switching between SSIDs, to allow the DHCP server to send an NAK to the client if it requests an IP address from a VLAN associated with the previous SSID. Otherwise, the client might continue to use or request the IP address it previously held, leading to disrupted communication. However, be aware that enabling this feature will impact wireless clients that are configured with a static IP address.

Here's the process to enable the desired option:

Via GUI: Navigate to  Configuration > Tags & Profile > Policy > Policy_name > Advanced .  Under the DHCP section enable ipv4 DHCP required.

Policy Profile Setting on WLC

Caution : For a foreign-anchor setup, it's important to align the DHCP settings across both WLCs. If you have IPV4 DHCP required enabled, it needs to be enabled on both the foreign and anchor WLCs. A discrepancy in the DHCP-related configuration under the policy profile between the two could cause clients to experience issues with their mobility roles.

Issue 2: Client getting deleted or excluded due to IP Theft issue. IP theft, in the context of networking, refers to a situation where more than one wireless client is trying to use the same IP address. It can be due to many reasons which are listed below:

1. Unauthorized Static IP Assignment: When a user sets a static IP address on their device that coincides with an IP already assigned or earmarked on the network, it can result in an IP conflict. This occurs when two devices attempt to operate with an identical IP address, which can disrupt network connections for either or both devices involved. To prevent such issues, it is essential to ensure that each client on the network is configured with a unique IP address.

2. Rogue DHCP Server: The presence of an unauthorized or rogue DHCP server on the network can lead to IP address allocation that clashes with the established IP addressing plan of the network. Such conflicts may result in several devices experiencing IP address collisions or obtaining incorrect network settings. To address this problem, efforts should be made to identify and eliminate the rogue DHCP server from the network to prevent further IP conflicts within the same subnet.

3. Stale Entry of client in 9800 WLC: Sometimes, the controller may retain outdated/stale entries of an IP address that a client is attempting to acquire. In these cases, it becomes necessary to manually remove these stale entries from the 9800 WLC. Here's how to go about it:

  • Run the radioactive trace for the mac address which is in the exclusion list and filter it with legit mac in the radioactive trace.
  • You will be able to see the error logs: %CLIENT_ORCH_LOG-5-ADD_TO_BLACKLIST_REASON: Client MAC: Affected_Client_MAC with IP: 10.37.57.24 was added to exclusion list, legit Client MAC: Legit_Client_MAC, IP: 10.37.57.24, reason: IP address theft
  • Then run these commands: show wireless device-tracking database mac | sec $Legit_Client_MAC   show wireless device-tracking database ip | sec $Legit_Client_MAC

(If there are any stale entries, you will be able to see more than one IP for a legit client Mac address: one is the original Ip while the other is the outdated/stale one].

Resolution: Delete the stale entries from 9800 WLC manually by using  clear wireless device-tracking mac-address $Legit-Client_MAC ip-address 10.37.57.24

4. In flex deployment with local DHCP server using the same subnet: In FlexConnect configurations, it is common for various remote locations to utilize a local DHCP server that assigns IP addresses from an identical subnet. This scenario may lead to wireless clients at different sites receiving the same IP address. Controllers within this network framework are programmed to detect when multiple client connections are using an identical IP address, interpreting this as potential IP theft. As a result, these clients are usually placed on a blocked list to prevent IP address conflicts.

Resolution: Enable the IP overlap feature within your FlexConnect profile. The 'Overlapping Client IP Address in Flex Deployment' functionality allows for the use of the same IP addresses across multiple FlexConnect sites while maintaining all the features and capabilities supported in FlexConnect deployments.

By default this feature is disabled. You can enable it by this procedure: Via CLI:

Via GUI: Select   Configuration > Tags & Profiles > Flex .  Click on Existing Flex Profile/Add to new Flex profile and under General tab enable IP Overlap.

Flex Profile Setting on WLC

Issue 3. Wireless clients are failing to receive an IP address from the intended VLAN. This problem often occurs when VLAN 1 is utilized or when the VLAN assigned to clients is the same as the VLAN used for AP management in a FlexConnect deployment. The root cause of this issue is typically incorrect VLAN assignments. To provide guidance, here are a few scenarios to consider when configuring VLAN IDs on the 9800 series:

1. When employing an AAA server with the AAA override feature activated, it is crucial to ensure that the appropriate VLAN ID is being sent from the AAA server. If a VLAN name is provided instead, confirm that it matches the VLAN name configured on the 9800 WLC.

2. When VLAN 1 is configured for wireless client traffic, the behavior may vary based on the mode of the access point (AP): For an AP in local mode/Central switching:

  • Specifying VLAN-name = default, the client is assigned to VLAN 1
  • Using VLAN-ID 1, a client is assigned to wireless management VLAN

For an AP in Flex mode/Local Switching:

  • Using VLAN-ID 1, a client is assigned to FlexConnect native VLAN

Here are a few more examples of scenarios that have been experimented with in the lab, along with their results:

1. By default, if the user does not configure anything under the policy profile, the WLC assigns VLAN-ID 1 so clients will use the wireless management VLAN in local mode and the AP native VLAN for FlexConnect.

2. If the Native-VLAN under flex-profile is configured with a native VLAN ID different from the one configured on the switch, you see the issue, the client gets IP from management VLAN (native VLAN) even if the policy-profile is configured with “default” VLAN name.

3. If Native-VLAN under flex-profile is configured with VLAN-ID the same as the native VLAN configured on the switch, then only the client will be able to get an IP from VLAN 1 with default configured under policy profile.

4. If you selected a VLAN name instead of a VLAN ID, ensure the VLAN name in the Flex Profile is the same one.

Related Information

  • Internal DHCP server on 9800
  • External DHCP server in use
  • DHCP option 82 Sub Option 5 in Windows DHCP server
  • NAT-PAT in Flex AP
  • VLAN 1 is used for Wireless Client
  • Cisco Technical Support & Downloads

Revision History

TAC Authored

Contributed by Cisco Engineers

  • Shalini Choubey Cisco TAC Engineer
  • Debashree Barat Cisco Technical Leader

Was this Document Helpful?

Feedback

Contact Cisco

login required

  • (Requires a Cisco Service Contract )

dhcp addr. assignment required wlc

COMMENTS

  1. Cisco Wireless Controller Configuration Guide, Release 8.5

    Cisco Wireless LAN Controller Software. Configuration Guides. Cisco Wireless Controller Configuration Guide, Release 8.5. ... To enforce this requirement, you can configure all WLANs with a DHCP Addr. Assignment Required setting, which disallows client static IP addresses. If DHCP Addr. Assignment Required is selected, clients must obtain an IP ...

  2. How can I configure the "DHCP Addr. Assignment" Required on a Cisco WLC

    (Cisco Controller) >config wlan dhcp_server 1 0.0.0.0 required 1 Note: DHCP server override is applicable only to the default AP group. (Cisco Controller) > To be clear, I don't care about a DHCP server override (that's the checkbox up to the top of "DHCP Addr. Assignment") - see screenshot below.

  3. Cisco Catalyst 9800 Series Wireless Controller Software Configuration

    If DHCP Address Assignment Required is selected, clients must obtain an IP address through DHCP. Any client with a static IP address is not allowed on the network. The controller monitors DHCP traffic because it acts as a DHCP proxy for the clients. Note. WLANs that support management over wireless must allow management (device-servicing ...

  4. Cisco Wireless LAN Controller Configuration Guide, Release 7.4

    To enforce this requirement, you can configure all WLANs with a DHCP Addr. Assignment Required setting, which disallows client static IP addresses. If DHCP Addr. Assignment Required is selected, clients must obtain an IP address via DHCP.

  5. What is DHCP Addr. Assignment Required feature in WLC?

    --> The DHCP Required option forces the wireless user to send a DHCP address request/renew messages every time they associate to the WLAN before they are allowed to send or receive other traffic to the network.--> This feature may have some problems in some client implementations which do not do a DHCP renew until the lease time expires.

  6. WLC "DHCP Address Assignment Required" Option

    Assignment Required is selected, clients must obtain an IP address via DHCP. Any client with a static IP address is not allowed on the network. The DHCP Required option in WLAN settings allows you to force clients to do a DHCP address. request/renew every time they associate to the WLAN before they are allowed to send or receive other.

  7. DHCP Addr Assignment Required

    The WLC will not move you back to DHCP_Required. The client may choose to reach out through DHCP again, but we do not require that they do. -Eric N. Cisco Wireless TAC. Selected as Best LikeLikedUnlike. All Answers. vinodhk2. DHCP request / renew for each roam is not a necessity. Unlike.

  8. Cisco

    (Cisco Controller) >config wlan dhcp_server 1 0.0.0.0 required 1 Note: DHCP server override is applicable only to the default AP group. (Cisco Controller) > To be clear, I don't care about a DHCP server override (that's the checkbox up to the top of "DHCP Addr. Assignment") - see screenshot below.

  9. Exam 200-301 topic 1 question 842 discussion

    Assignment check box. By checking the DHCP Addr. Assignment check box, the WLC will retain the assigned IP address for each client as they move between locations in the campus network. This is because the WLC will act as a DHCP server and assign the same IP address to the client each time they connect to the network, based on the client's MAC ...

  10. Troubleshoot DHCP Client Connectivity Issue on a Cisco 9800 WLC

    Via GUI: Navigate to Configuration > Tags & Profile > Policy > Policy_name > Advanced. Under the DHCP section enable ipv4 DHCP required. Policy Profile Setting on WLC. Caution: For a foreign-anchor setup, it's important to align the DHCP settings across both WLCs.