Two hap ac2s, Capsman and dhcp snooping. Client can't get ip on cpe

Hello
I configured my two hap ac2s like this link: https://wiki.mikrotik.com/wiki/Manual:Interface/Bridge#DHCP_Snooping_and_DHCP_Option_82
(F)First hap ac2 : capsman, dhcp server, firewall,pppoe client and bridge with dhcp snooping and op82
(S)Second hap ac2: only bridge and dhcp client for bridge.
my problem: When enable dhcp snooping on S, client can not get ip. And i disable dhcp snooping then client can get ip on S
F is not have a problem. All client can get ip.
Clients connect with wireless. I using capsman. Firmwares are up to date.
I think somethink is blocking. The F my main router is working well. Because dhcp server on this bridge. Don’t need to passing request on trust interface. Then on my cpe S need to passing request on trust interface. Requests are blocking. Clients can not get ip.
My config:

GPON ONT to eth1 F(first hap ac2)
eth5 F to eth1 S(second hap ac2) like CPE

S:

Flags: X - disabled, R - running 
 0 R name="Local bridge 2" mtu=auto actual-mtu=1500 l2mtu=1598 arp=enabled 
     arp-timeout=auto mac-address=48:8F:5A:EF:D0:49 protocol-mode=none 
     fast-forward=yes igmp-snooping=no auto-mac=no admin-mac=48:8F:5A:EF:D0:49 
     ageing-time=5m vlan-filtering=no dhcp-snooping=no 
     
     
# jan/16/2021 22:49:34 by RouterOS 6.48
# software id = x
#
# model = RBD52G-5HacD2HnD
# serial number = x
/interface bridge
add admin-mac=48:8F:5A:EF:D0:49 auto-mac=no name="Local bridge 2" \
    protocol-mode=none dhcp-snooping=yes add-dhcp-option82=yes
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa2-psk eap-methods="" mode=dynamic-keys name=Apo \
    supplicant-identity="" wpa2-pre-shared-key=x
/interface wireless
# managed by CAPsMAN
# channel: 2452/20-Ce/gn(10dBm), SSID: x, local forwarding
set [ find default-name=wlan1 ] antenna-gain=0 band=2ghz-b/g/n channel-width=\
    20/40mhz-XX country=no_country_set disabled=no frequency=auto \
    frequency-mode=manual-txpower installation=indoor mode=ap-bridge name=\
    "wlan 2.4GHz" security-profile=Apo ssid=Apo tx-power-mode=all-rates-fixed
# managed by CAPsMAN
# channel: 5180/20-Ceee/ac(16dBm), SSID: x, local forwarding
set [ find default-name=wlan2 ] antenna-gain=0 band=5ghz-a/n/ac channel-width=\
    20/40/80mhz-XXXX country=no_country_set disabled=no frequency=auto \
    frequency-mode=manual-txpower installation=indoor mode=ap-bridge name=\
    "wlan 5GHz" security-profile=Apo ssid=Apo tx-pow
/interface bridge port
add bridge="Local bridge 2" interface=ether1 trusted=yes
add bridge="Local bridge 2" interface=ether2
add bridge="Local bridge 2" interface=ether3
add bridge="Local bridge 2" interface=ether4
add bridge="Local bridge 2" interface=ether5
add bridge="Local bridge 2" interface="wlan 2.4GHz"
add bridge="Local bridge 2" interface="wlan 5GHz"
/interface wireless cap
# 
set bridge="Local bridge 2" discovery-interfaces="Local bridge 2" enabled=yes \
    interfaces="wlan 5GHz,wlan 2.4GHz"
/ip dhcp-client
add disabled=no interface="Local bridge 2"
/ip service
set www-ssl disabled=no
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Istanbul
/system identity
set name="hAP ac22"
/system routerboard settings
set cpu-frequency=auto
/system routerboard reset-button
set enabled=yes hold-time=0s..5s on-event="system shutdown"

F:

Flags: X - disabled, R - running 
 0 R name="Local Bridge" mtu=auto actual-mtu=1500 l2mtu=1598 arp=reply-only 
     arp-timeout=auto mac-address=C4:AD:34:01:40:59 protocol-mode=none 
     fast-forward=yes igmp-snooping=no auto-mac=no admin-mac=C4:AD:34:01:40:59 
     ageing-time=5m vlan-filtering=no dhcp-snooping=yes add-dhcp-option82=yes 
     
     
     # jan/16/2021 22:51:53 by RouterOS 6.48
# software id = x
#
# model = RBD52G-5HacD2HnD
# serial number = x
/caps-man channel
add band=5ghz-n/ac extension-channel=Ceee frequency=5180 name="5 GHz " \
    skip-dfs-channels=yes tx-power=16
add band=2ghz-g/n extension-channel=Ce frequency=2412,2452 name="2.4 GHz" \
    save-selected=yes skip-dfs-channels=no tx-power=10
/interface bridge
add add-dhcp-option82=yes admin-mac=C4:AD:34:01:40:59 arp=reply-only auto-mac=\
    no dhcp-snooping=yes name="Local Bridge" protocol-mode=none
/interface vlan
add interface=ether1 name="PPPoE VLAN" vlan-id=35
/caps-man datapath
add bridge="Local Bridge" client-to-client-forwarding=yes local-forwarding=yes \
    name="local forward"
/caps-man security
add authentication-types=wpa2-psk disable-pmkid=yes encryption=aes-ccm \
    group-encryption=aes-ccm name=x passphrase=x
/caps-man configuration
add country=no_country_set datapath.local-forwarding=yes installation=indoor \
    mode=ap name=x security=x ssid=x 
add channel="2.4 GHz" channel.skip-dfs-channels=yes country=turkey datapath=\
    "local forward" installation=indoor mode=ap name="x 2.4GHz" security=Apo \
    ssid=x 
add channel="5 GHz " country="united states" datapath="local forward" \
    installation=indoor mode=ap name="x 5GHz" security=Apo ssid=x 
add channel="2.4 GHz" country=turkey datapath="local forward" installation=\
    indoor mode=ap name="slave x 2.4GHz" security=Apo ssid="x 2.4GHz"
add channel="5 GHz " country="united states" datapath="local forward" \
    installation=indoor mode=ap name="slave Apo 5 GHz" security=x ssid=\
    "x 5GHz"
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa2-psk eap-methods="" management-protection=allowed \
    mode=dynamic-keys name=Apo supplicant-identity="" wpa-pre-shared-key=\
    x wpa2-pre-shared-key=x
/interface wireless
# managed by CAPsMAN
# channel: 2412/20-Ce/gn(10dBm), SSID: x, local forwarding
set [ find default-name=wlan1 ] antenna-gain=0 band=2ghz-b/g/n channel-width=\
    20/40mhz-XX country=no_country_set disabled=no frequency=auto \
    frequency-mode=manual-txpower installation=indoor mode=ap-bridge name=\
    "wlan 2.4GHz" security-profile=x ssid=x station-roaming=enabled \
    tx-power-mode=all-rates-fixed
# managed by CAPsMAN
# channel: 5180/20-Ceee/ac(16dBm), SSID: x, local forwarding
set [ find default-name=wlan2 ] antenna-gain=0 band=5ghz-a/n/ac channel-width=\
    20/40/80mhz-XXXX country=no_country_set disabled=no frequency=auto \
    frequency-mode=manual-txpower installation=indoor mode=ap-bridge name=\
    "wlan 5GHz" security-profile=x ssid=x station-roaming=enabled \
    tx-power-mode=all-rates-fixed
/ip pool
add name=DHCP ranges=192.168.8.100-192.168.8.254
/ip dhcp-server
add add-arp=yes address-pool=DHCP disabled=no interface="Local Bridge" \
    lease-time=3d name="Local DHCP"
/ppp profile
set *0 change-tcp-mss=default use-ipv6=default
add name="CGNat not" on-up=":global if \"PPPoE\"\r\
    \n:global targetip 100.0.0.0/8\r\
    \n:global currentip [/ip address get [/ip address find interface=\$if ] addr\
    ess]\r\
    \n:global ip \$currentip\r\
    \n:global pppoedelay 3s\r\
    \n:log info \"PPPoE \$currentip\"\r\
    \n:while ((\$currentip in \$targetip)) do={\r\
    \n     /interface disable \$if\r\
    \n     :delay \$pppoedelay\r\
    \n     /interface enable \$if\r\
    \n     :do {delay 1s}\r\
    \n     :set currentip [/ip address get [/ip address find interface=\$if ] ad\
    dress]\r\
    \n     :set currentip ([[:parse \":return \$currentip\"]])\r\
    \n     :set ip \$currentip\r\
    \n     }" use-ipv6=default
/interface pppoe-client
add add-default-route=yes disabled=no interface="PPPoE VLAN" keepalive-timeout=\
    60 name=PPPoE password=x profile="CGNat not" user=\
    x @x 
/queue type
add kind=none name=none
add kind=pfifo name=pfifo pfifo-limit=2000
add kind=pcq name=PCQD pcq-classifier=dst-address pcq-dst-address6-mask=64 \
    pcq-limit=100KiB pcq-src-address6-mask=64
add kind=pcq name=pcqd pcq-classifier=dst-address pcq-dst-address6-mask=64 \
    pcq-src-address6-mask=64
add kind=pcq name=PCQU pcq-classifier=src-address pcq-dst-address6-mask=64 \
    pcq-limit=100KiB pcq-src-address6-mask=64
add kind=pcq name=pcqu pcq-classifier=src-address pcq-dst-address6-mask=64 \
    pcq-src-address6-mask=64
add kind=pfifo name="PF\DDFO" pfifo-limit=6000
add kind=pcq name=PCqu pcq-classifier=src-address pcq-dst-address6-mask=64 \
    pcq-src-address6-mask=64
add kind=pcq name=PCqd pcq-classifier=dst-address pcq-dst-address6-mask=64 \
    pcq-src-address6-mask=64
/user group
set full policy="local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,passw\
    ord,web,sniff,sensitive,api,romon,dude,tikapp"
/caps-man manager
set enabled=yes
/caps-man manager interface
set [ find default=yes ] forbid=yes
add disabled=no interface="Local Bridge"
/caps-man provisioning
add action=create-dynamic-enabled disabled=yes master-configuration=x\
    name-format=identity
add action=create-dynamic-enabled hw-supported-modes=gn,g,b \
    master-configuration="x2.4GHz" name-format=prefix-identity name-prefix=\
    "Wlan 2.4GHz" slave-configurations="slave x 2.4GHz"
add action=create-dynamic-enabled hw-supported-modes=ac,an,a \
    master-configuration="x 5GHz" name-format=prefix-identity name-prefix=\
    "Wlan 5GHz" slave-configurations="slave x 5 GHz"
/interface bridge port
add bridge="Local Bridge" interface=ether2
add bridge="Local Bridge" interface=ether3
add bridge="Local Bridge" interface=ether4
add bridge="Local Bridge" interface=ether5 trusted=yes
add bridge="Local Bridge" disabled=yes interface=ether1
add bridge="Local Bridge" interface="wlan 2.4GHz"
add bridge="Local Bridge" interface="wlan 5GHz"
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/interface list member
add interface="Local Bridge" list=LAN
add interface=PPPoE list=WAN
add interface=ether1 list=WAN
add interface="PPPoE VLAN" list=WAN
/interface wireless cap
# 
set bridge="Local Bridge" discovery-interfaces="Local Bridge" enabled=yes \
    interfaces="wlan 5GHz,wlan 2.4GHz"
/ip address
add address=192.168.8.59/24 interface="Local Bridge" network=192.168.8.0
/ip dhcp-server config
set store-leases-disk=immediately
/ip dhcp-server network
add address=192.168.8.0/24 dns-server="1.0.0.1,1.1.1.1,9.9.9.9,209.244.0.3,209.2\
    44.0.4,4.2.2.3,4.2.2.5,4.2.2.6,4.2.2.1,4.2.2.2,4.2.2.4,8.8.8.8,8.8.4.4" \
    gateway=192.168.8.59 ntp-server=195.50.171.101,131.211.8.244
/ip dns
set servers=1.0.0.1,1.1.1.1,9.9.9.9,209.244.0.3,209.244.0.4,4.2.2.3,4.2.2.5
/ip firewall address-list
add address=192.168.8.0/24 list=DNS_Accept
add address=1.0.0.1 list=DNS_Accept
add address=1.1.1.1 list=DNS_Accept
add address=209.244.0.3 list=DNS_Accept
add address=209.244.0.4 list=DNS_Accept
add address=4.2.2.1 list=DNS_Accept
add address=4.2.2.2 list=DNS_Accept
add address=4.2.2.3 list=DNS_Accept
add address=4.2.2.4 list=DNS_Accept
add address=4.2.2.5 list=DNS_Accept
add address=4.2.2.6 list=DNS_Accept
add address=9.9.9.9 list=DNS_Accept
add address=8.8.8.8 list=DNS_Accept
add address=8.8.4.4 list=DNS_Accept
add address=0.0.0.0/8 comment=RFC6890 list=NotPublic
add address=10.0.0.0/8 comment=RFC6890 list=NotPublic
add address=100.64.0.0/10 comment=RFC6890 list=NotPublic
add address=127.0.0.0/8 comment=RFC6890 list=NotPublic
add address=169.254.0.0/16 comment=RFC6890 list=NotPublic
add address=172.16.0.0/12 comment=RFC6890 list=NotPublic
add address=192.0.0.0/24 comment=RFC6890 list=NotPublic
add address=192.0.2.0/24 comment=RFC6890 list=NotPublic
add address=192.168.0.0/16 comment=RFC6890 list=NotPublic
add address=192.88.99.0/24 comment=RFC3068 list=NotPublic
add address=198.18.0.0/15 comment=RFC6890 list=NotPublic
add address=198.51.100.0/24 comment=RFC6890 list=NotPublic
add address=203.0.113.0/24 comment=RFC6890 list=NotPublic
add address=224.0.0.0/4 comment=RFC4601 list=NotPublic
add address=240.0.0.0/4 comment=RFC6890 list=NotPublic
/ip firewall filter
add action=drop chain=input comment="d\FD\FEardan ping" in-interface-list=WAN \
    protocol=icmp
add action=drop chain=input comment="PPPoE ftp ssh telnet api winbox cwmp acs" \
    in-interface-list=WAN port=21,22,23,8291,8728,8729,7547 protocol=tcp
add action=drop chain=input comment="PPPoE ftp ssh telnet api winbox cwmp acs" \
    in-interface-list=WAN port=21,22,23,8291,8728,8729,7547 protocol=udp
add action=drop chain=input comment="Drop Invalid connections" \
    connection-state=invalid
add action=accept chain=input comment=\
    "Accept Established and related connections" connection-state=\
    established,related
add action=accept chain=input comment=\
    "Accept all connections from local network" in-interface-list=!WAN
add action=drop chain=input comment="Drop everything else"
add action=drop chain=forward comment="drop invalid connections" \
    connection-state=invalid
add action=drop chain=forward comment=\
    "Drop tries to reach not public addresses to WAN" dst-address-list=\
    NotPublic out-interface-list=WAN
add action=drop chain=forward comment=\
    "Drop new connections from internet which are not dst-natted" \
    connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
add action=drop chain=forward comment="Drop all packets from public internet whi\
    ch should not exist in public network" in-interface-list=WAN \
    src-address-list=NotPublic
add action=drop chain=forward comment="Drop all packets in local network which d\
    oes not have local network address" in-interface-list=LAN src-address=\
    !192.168.8.0/24
/ip firewall nat
add action=masquerade chain=srcnat out-interface=PPPoE
/ip service
set www-ssl disabled=no
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=PPPoE type=external
add interface="Local Bridge" type=internal
/system clock
set time-zone-name=Europe/Istanbul
/system identity
set name="hAP ac2"
/system ntp client
set enabled=yes primary-ntp=195.50.171.101 secondary-ntp=131.211.8.244
/system routerboard settings
set cpu-frequency=auto
/system routerboard reset-button
set enabled=yes hold-time=0s..5s on-event="system shutdown"
/system script
add dont-require-permissions=no name="cap on off" owner=x policy=\
    ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=":lo\
    g info message=(\"mode button was pressed\");\r\
    \n:local i\r\
    \n\r\
    \n:if ([/int wir cap get enabled] = true) do={\r\
    \n  /interface wireless cap set enabled=no;\r\
    \n  :global SlackMessage \"Mode button was presssed. CAP is now disabled.\";\
    \r\
    \n  :if ( [/int wir get 0 disabled ] = false ) do={\r\
    \n    :foreach i in= [ /int wir find ] do={ :int wir disable \$i };\r\
    \n  }\r\
    \n} else={\r\
    \n  /interface wireless cap set enabled=yes\r\
    \n  :global SlackMessage \"Mode button was presssed. CAP is now enabled.\";\
    \r\
    \n}\r\
    \n/system script run message2slack"
/tool bandwidth-server
set authenticate=no

DHCP debug log with dhcp snooping (there is a problem)

jan/19 00:47:44 caps,info 48:60:5F:2D:C4:BB@Wlan 2.4GHz-hAP ac22-1-1 connected, signal strength -72 
jan/19 00:47:44 dhcp,debug Local DHCP received request id 3514722315 from 0.0.0.0 '1:48:60:5f:2d:c4:bb' 
jan/19 00:47:44 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:47:44 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:47:44 dhcp,debug,packet     Msg-Type = request 
jan/19 00:47:44 dhcp,debug,packet     Client-Id = 01-48-60-5F-2D-C4-BB 
jan/19 00:47:44 dhcp,debug,packet     Address-Request = 192.168.8.62 
jan/19 00:47:44 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:47:44 dhcp,debug,packet     Max-DHCP-Message-Size = 1500 
jan/19 00:47:44 dhcp,debug,packet     Class-Id = "android-dhcp-9" 
jan/19 00:47:44 dhcp,debug,packet     Host-Name = "G6" 
jan/19 00:47:44 dhcp,debug,packet     Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific 
jan/19 00:47:44 dhcp,debug,packet     Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38 
jan/19 00:47:44 dhcp,debug lease not found 
jan/19 00:47:44 dhcp,debug , addressed to me, authorative or unicast 
jan/19 00:47:44 dhcp,debug Local DHCP sending nak with id 3514722315 to 255.255.255.255 
jan/19 00:47:44 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:47:44 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:47:44 dhcp,debug,packet     Msg-Type = nak 
jan/19 00:47:44 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:47:44 dhcp,debug,packet     Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38 
jan/19 00:47:46 dhcp,debug Local DHCP received request id 3514722315 from 0.0.0.0 '1:48:60:5f:2d:c4:bb' 
jan/19 00:47:46 dhcp,debug,packet     secs = 2 
jan/19 00:47:46 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:47:46 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:47:46 dhcp,debug,packet     Msg-Type = request 
jan/19 00:47:46 dhcp,debug,packet     Client-Id = 01-48-60-5F-2D-C4-BB 
jan/19 00:47:46 dhcp,debug,packet     Address-Request = 192.168.8.62 
jan/19 00:47:46 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:47:46 dhcp,debug,packet     Max-DHCP-Message-Size = 1500 
jan/19 00:47:46 dhcp,debug,packet     Class-Id = "android-dhcp-9" 
jan/19 00:47:46 dhcp,debug,packet     Host-Name = "G6" 
jan/19 00:47:46 dhcp,debug,packet     Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific 
jan/19 00:47:46 dhcp,debug,packet     Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38 
jan/19 00:47:46 dhcp,debug lease not found 
jan/19 00:47:46 dhcp,debug , addressed to me, authorative or unicast 
jan/19 00:47:46 dhcp,debug Local DHCP sending nak with id 3514722315 to 255.255.255.255 
jan/19 00:47:46 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:47:46 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:47:46 dhcp,debug,packet     Msg-Type = nak 
jan/19 00:47:46 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:47:46 dhcp,debug,packet     Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38 
jan/19 00:47:50 dhcp,debug Local DHCP received request id 3514722315 from 0.0.0.0 '1:48:60:5f:2d:c4:bb' 
jan/19 00:47:50 dhcp,debug,packet     secs = 6 
jan/19 00:47:50 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:47:50 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:47:50 dhcp,debug,packet     Msg-Type = request 
jan/19 00:47:50 dhcp,debug,packet     Client-Id = 01-48-60-5F-2D-C4-BB 
jan/19 00:47:50 dhcp,debug,packet     Address-Request = 192.168.8.62 
jan/19 00:47:50 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:47:50 dhcp,debug,packet     Max-DHCP-Message-Size = 1500 
jan/19 00:47:50 dhcp,debug,packet     Class-Id = "android-dhcp-9" 
jan/19 00:47:50 dhcp,debug,packet     Host-Name = "G6" 
jan/19 00:47:50 dhcp,debug,packet     Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific 
jan/19 00:47:50 dhcp,debug,packet     Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38 
jan/19 00:47:50 dhcp,debug lease not found 
jan/19 00:47:50 dhcp,debug , addressed to me, authorative or unicast 
jan/19 00:47:50 dhcp,debug Local DHCP sending nak with id 3514722315 to 255.255.255.255 
jan/19 00:47:50 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:47:50 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:47:50 dhcp,debug,packet     Msg-Type = nak 
jan/19 00:47:50 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:47:50 dhcp,debug,packet     Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38 
jan/19 00:47:59 dhcp,debug Local DHCP received request id 3514722315 from 0.0.0.0 '1:48:60:5f:2d:c4:bb' 
jan/19 00:47:59 dhcp,debug,packet     secs = 14 
jan/19 00:47:59 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:47:59 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:47:59 dhcp,debug,packet     Msg-Type = request 
jan/19 00:47:59 dhcp,debug,packet     Client-Id = 01-48-60-5F-2D-C4-BB 
jan/19 00:47:59 dhcp,debug,packet     Address-Request = 192.168.8.62 
jan/19 00:47:59 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:47:59 dhcp,debug,packet     Max-DHCP-Message-Size = 1500 
jan/19 00:47:59 dhcp,debug,packet     Class-Id = "android-dhcp-9" 
jan/19 00:47:59 dhcp,debug,packet     Host-Name = "G6" 
jan/19 00:47:59 dhcp,debug,packet     Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific 
jan/19 00:47:59 dhcp,debug,packet     Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38 
jan/19 00:47:59 dhcp,debug lease not found 
jan/19 00:47:59 dhcp,debug , addressed to me, authorative or unicast 
jan/19 00:47:59 dhcp,debug Local DHCP sending nak with id 3514722315 to 255.255.255.255 
jan/19 00:47:59 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:47:59 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:47:59 dhcp,debug,packet     Msg-Type = nak 
jan/19 00:47:59 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:47:59 dhcp,debug,packet     Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38

DHCP debug log without dhcp snooping (There is no problem)

jan/19 00:55:42 caps,info 48:60:5F:2D:C4:BB@Wlan 2.4GHz-hAP ac22-1-1 connected, signal strength -73 
jan/19 00:55:43 dhcp,debug Local DHCP received request id 1946449499 from 0.0.0.0 '1:48:60:5f:2d:c4:bb' 
jan/19 00:55:43 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:55:43 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:55:43 dhcp,debug,packet     Msg-Type = request 
jan/19 00:55:43 dhcp,debug,packet     Client-Id = 01-48-60-5F-2D-C4-BB 
jan/19 00:55:43 dhcp,debug,packet     Address-Request = 192.168.8.254 
jan/19 00:55:43 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     Max-DHCP-Message-Size = 1500 
jan/19 00:55:43 dhcp,debug,packet     Class-Id = "android-dhcp-9" 
jan/19 00:55:43 dhcp,debug,packet     Host-Name = "G6" 
jan/19 00:55:43 dhcp,debug,packet     Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific 
jan/19 00:55:43 dhcp,debug,packet     Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35 
jan/19 00:55:43 dhcp,debug lease waiting, addressed to me, authorative or unicast 
jan/19 00:55:43 dhcp,debug Local DHCP sending nak with id 1946449499 to 255.255.255.255 
jan/19 00:55:43 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:55:43 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:55:43 dhcp,debug,packet     Msg-Type = nak 
jan/19 00:55:43 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35 
jan/19 00:55:43 dhcp,debug Local DHCP received discover id 2695493332 from 0.0.0.0 '1:48:60:5f:2d:c4:bb' 
jan/19 00:55:43 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:55:43 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:55:43 dhcp,debug,packet     Msg-Type = discover 
jan/19 00:55:43 dhcp,debug,packet     Client-Id = 01-48-60-5F-2D-C4-BB 
jan/19 00:55:43 dhcp,debug,packet     Max-DHCP-Message-Size = 1500 
jan/19 00:55:43 dhcp,debug,packet     Class-Id = "android-dhcp-9" 
jan/19 00:55:43 dhcp,debug,packet     Host-Name = "G6" 
jan/19 00:55:43 dhcp,debug,packet     Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific 
jan/19 00:55:43 dhcp,debug,packet     Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35 
jan/19 00:55:43 dhcp,debug lease found, waiting, acquire 
jan/19 00:55:43 dhcp,debug Local DHCP sending offer with id 2695493332 to 192.168.8.62 
jan/19 00:55:43 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:55:43 dhcp,debug,packet     yiaddr = 192.168.8.62 
jan/19 00:55:43 dhcp,debug,packet     siaddr = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:55:43 dhcp,debug,packet     Msg-Type = offer 
jan/19 00:55:43 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     Address-Time = 259200 
jan/19 00:55:43 dhcp,debug,packet     Subnet-Mask = 255.255.255.0 
jan/19 00:55:43 dhcp,debug,packet     Router = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     Domain-Server = 1.0.0.1,1.1.1.1,9.9.9.9,209.244.0.3,209.244.0.4,4.2.2.3,4.2.2.5,4.2.2.6,4.2.2.1,4.2.2.2,4.2.2.4,8.8.8.8,8.8.4.4 
jan/19 00:55:43 dhcp,debug,packet     Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35 
jan/19 00:55:43 dhcp,debug Local DHCP received request id 2695493332 from 0.0.0.0 '1:48:60:5f:2d:c4:bb' 
jan/19 00:55:43 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:55:43 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:55:43 dhcp,debug,packet     Msg-Type = request 
jan/19 00:55:43 dhcp,debug,packet     Client-Id = 01-48-60-5F-2D-C4-BB 
jan/19 00:55:43 dhcp,debug,packet     Address-Request = 192.168.8.62 
jan/19 00:55:43 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     Max-DHCP-Message-Size = 1500 
jan/19 00:55:43 dhcp,debug,packet     Class-Id = "android-dhcp-9" 
jan/19 00:55:43 dhcp,debug,packet     Host-Name = "G6" 
jan/19 00:55:43 dhcp,debug,packet     Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific 
jan/19 00:55:43 dhcp,debug,packet     Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35 
jan/19 00:55:43 dhcp,debug lease offered, addressed to me 
jan/19 00:55:43 dhcp,debug add arp for 192.168.8.62 to 48:60:5F:2D:C4:BB 
jan/19 00:55:43 dhcp,debug 192.168.8.62 entering bound 
jan/19 00:55:43 dhcp,info Local DHCP assigned 192.168.8.62 to 48:60:5F:2D:C4:BB 
jan/19 00:55:43 dhcp,debug Local DHCP sending ack with id 2695493332 to 192.168.8.62 
jan/19 00:55:43 dhcp,debug,packet     ciaddr = 0.0.0.0 
jan/19 00:55:43 dhcp,debug,packet     yiaddr = 192.168.8.62 
jan/19 00:55:43 dhcp,debug,packet     siaddr = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     chaddr = 48:60:5F:2D:C4:BB 
jan/19 00:55:43 dhcp,debug,packet     Msg-Type = ack 
jan/19 00:55:43 dhcp,debug,packet     Server-Id = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     Address-Time = 259200 
jan/19 00:55:43 dhcp,debug,packet     Subnet-Mask = 255.255.255.0 
jan/19 00:55:43 dhcp,debug,packet     Router = 192.168.8.59 
jan/19 00:55:43 dhcp,debug,packet     Domain-Server = 1.0.0.1,1.1.1.1,9.9.9.9,209.244.0.3,209.244.0.4,4.2.2.3,4.2.2.5,4.2.2.6,4.2.2.1,4.2.2.2,4.2.2.4,8.8.8.8,8.8.4.4 
jan/19 00:55:43 dhcp,debug,packet     Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35

Thanks

Up up

I think dhcp nak packets are blocking on trusted interfaces. And why i see the ‘’ lease not found ‘’ before nak packet? İs nak packet receiving by client? Does anyone know?

I had to disable dhcp snooping