Hi Thanks,
i did'nt know about packet capture inside Pfsense. Great tool.
16:11:59.654405 00:0c:29:4f:xx:xx > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 342: (tos 0x10, ttl 128, id 0, offset 0, flags [none], proto UDP (17), length 328)
185.45.xx.xx.68 > 255.255.255.255.67: [udp sum ok] BOOTP/DHCP, Request from 00:0c:29:4f:bf:8a, length 300, xid 0x713f4345, Flags [none] (0x0000)
Client-Ethernet-Address 00:0c:29:4f:xx:xx
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: Request
Requested-IP Option 50, length 4: 185.45.xx.xx
Client-ID Option 61, length 7: ether 00:0c:29:4f:xx:xx
Hostname Option 12, length 7: "pfsense"
Parameter-Request Option 55, length 9:
Subnet-Mask, BR, Time-Zone, Classless-Static-Route
Default-Gateway, Domain-Name, Domain-Name-Server, Hostname
Option 119
16:11:59.770129 e0:97:96:a2:xx:xx > 00:0c:29:4f:xx:xx, ethertype IPv4 (0x0800), length 342: (tos 0x0, ttl 63, id 50246, offset 0, flags [DF], proto UDP (17), length 328)
172.16.100.xx.67 > 185.45.xx.xx.68: [udp sum ok] BOOTP/DHCP, Reply, length 300, hops 1, xid 0x713f4345, Flags [none] (0x0000)
Your-IP 185.45.xx.xx
Gateway-IP 172.16.102.xx
Client-Ethernet-Address 00:0c:29:4f:xx:xx
Vendor-rfc1048 Extensions
Magic Cookie 0x63825363
DHCP-Message Option 53, length 1: ACK
Server-ID Option 54, length 4: 172.16.100.xx
Lease-Time Option 51, length 4: 150000
Subnet-Mask Option 1, length 4: 255.255.255.255
Default-Gateway Option 3, length 4: 185.4.79.254
Domain-Name-Server Option 6, length 8: 178.250.xx.xx,178.250.xx.xx
I am going to get some full wireshark log at up and down time and try to find some clue..