Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    No DHCP offer accepted by clients

    Scheduled Pinned Locked Moved DHCP and DNS
    12 Posts 2 Posters 4.1k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • R
      Roofus
      last edited by

      I have two VLAN's, one as a management VLAN (2) and second as VLAN (11) for client traffic.

      All traffic goes through a Layer 2 switch that also has VLAN 2 and VLAN 11 set up. Switch is set up as 'Trunk' between switch and PFSense.

      The problem is: When a client makes a DHCP request to the PFSense box, the PFSense sees the request and makes an offer, but none of the clients seem to actually receive the offer/reply.  The process continues with request/offer cycle repeating.  If I wire up a Watchguard the client DOES receive the DHCP offer straight away.  I read somewhere to remove the LAN interface if using VLAN's but this has no affect on the DHCP.

      Any idea where to look, as I am baffled as to why DHCP works for the Watchgurad and not PFSense.  Part of me suspects the switch might be filtering certain types of traffic (TP-SG3424P)?

      Interfaces are 're'

      Thanks.

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by

        What switch are you using, and are you using tagging or physical port assignment for the vlans?

        Have you validated that the offers are going out with the right vlan tag on them?

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.7.2, 24.11

        1 Reply Last reply Reply Quote 0
        • R
          Roofus
          last edited by

          The switch is a TP-link layer2 switch (TP-SG3424P).

          I know that the request is coming from client on VLAN11 and DHCP is listening on VLAN 11.  Fairly sure the Offer is returned by PFSense also on VLAN 11 but will check.

          Edit: Yes tagged traffic

          1 Reply Last reply Reply Quote 0
          • johnpozJ
            johnpoz LAYER 8 Global Moderator
            last edited by

            so can we see the settings page on the switch - are you tagged on untagged on egress?

            for the ports in question

            Ah – looks like that switch supports dhcp snooping.. That could be causing you some grief.. check out section 12.1.4 of the manual

            vlanpage.png
            vlanpage.png_thumb

            An intelligent man is sometimes forced to be drunk to spend time with his fools
            If you get confused: Listen to the Music Play
            Please don't Chat/PM me for help, unless mod related
            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

            1 Reply Last reply Reply Quote 0
            • R
              Roofus
              last edited by

              I avoided the DHCP snooping, so that has remained off from the very beginning!

              I have two trunk ports, one for PFSense (port 9) and the other for Watchguard (Port 11).  Access points are currently on ports 17-20 as 'General' (tagged).  We will have a go at changing ports 17-20 to Trunk today, although all traffic should be tagged anyway.

              Started to think it's the 'General' config on ports 17-20, the only thing that makes me consider something on the PFSense box is that the Watchguard is working under the same configuration. :o

              (For clarity:  I am trying to remove the watchguard, but can't until the PFSense box is running.  When I run my test I switch off the DHCP on the Watchguard and use the PFSense box)

              2.jpg
              2.jpg_thumb

              1 Reply Last reply Reply Quote 0
              • johnpozJ
                johnpoz LAYER 8 Global Moderator
                last edited by

                so the clients ae connected to AP, and your vlans 2 and 11, wy aer 17-19 pvid 1??  And those should be trunk, if your wanting clients off those access point to be either 2 or 11?  If you just want them 11 then they would be access in 11

                I would have to read the details of the manual again for how they are using general ports, but I would read that they are in vlan 1, and 20 is in vlan 2

                what do you want?  Do you want clients off your AP to be in specific vlans or based upon SSID?

                An intelligent man is sometimes forced to be drunk to spend time with his fools
                If you get confused: Listen to the Music Play
                Please don't Chat/PM me for help, unless mod related
                SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                1 Reply Last reply Reply Quote 0
                • R
                  Roofus
                  last edited by

                  Hi JohnPoz

                  All traffic should be Tagged, PVID 1 is not actually used as we use PVID 2 as the management layer.  All hardware is operating at VLAN 2 and clients connecting via access point are on a WAN with VLAN11

                  There devices should poll across VLAN11 for an IP, which they can do with the Watchguard (VLAN11) but not PFSense (VLAN 11)

                  there should not be any untagged traffic.  The General was a hang up from originally getting the units to move from VLAN 1 to VLAN 2.

                  I was on site yesterday and moved some of the access points to Trunk, however this did not make a difference.

                  IMG_0061.PNG
                  IMG_0061.PNG_thumb

                  1 Reply Last reply Reply Quote 0
                  • R
                    Roofus
                    last edited by

                    Hmm,

                    A though.  Wondering I should be configuring routes in the Switches for DHCP for each VLAN?

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by

                      routes in your switches?  Are they layer 3?  You wouldn't be doing routes on a L2 switch, and if you were routing on it there would be a SVI on the switch I would assume.

                      What AP do you have?  There are many AP that do not allow you to tag the managment interface, you can only tag the SSIDs

                      From what you posted those AP were in PVID 1, not 11 and set to general so they would of been tagged with 1 not 11 from my quick read of the manual of that switch.  If you AP has managment interface is suppose to be in VLAN 2, but does not support tagging on the interface on the AP.  Then you would need vlan 2 to be the native vlan on your trunk port to the AP.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                      1 Reply Last reply Reply Quote 0
                      • R
                        Roofus
                        last edited by

                        Hi,

                        the AP's allow to set the management VLAN.  This is set to VLAN 2 and Wireless traffic from SSID is route over VLAN 11.

                        All 'management' traffic is tagged as VLAN 2

                        1 Reply Last reply Reply Quote 0
                        • R
                          Roofus
                          last edited by

                          Swapped the VLAN2 to the PFSense, all the AP's got their IP's OK from the DHCP.

                          All ports are now Trunk

                          It is odd that the clients connected to the AP's over VLAN 11 can push out a discover, but the offer never makes it to the client.  I think PFSense makes a unicast OFFER, perhaps the Watchguard makes a multicast and that's why it works?

                          I might look at DHCP routing to see if that helps.

                          Roofus

                          1 Reply Last reply Reply Quote 0
                          • johnpozJ
                            johnpoz LAYER 8 Global Moderator
                            last edited by

                            No it would not be a unicast offer, and no it wouldn't be multicast either.. Offers can not be unicast, since the client does not have an IP yet ;)

                            An offer would be to 255.255.255.255 dest port 67..  Now if your working with relays then sure stuff can happen over unicast during the relay.

                            An intelligent man is sometimes forced to be drunk to spend time with his fools
                            If you get confused: Listen to the Music Play
                            Please don't Chat/PM me for help, unless mod related
                            SG-4860 24.11 | Lab VMs 2.7.2, 24.11

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.