Hello
I configured my two hap ac2s like this link: https://wiki.mikrotik.com/wiki/Manual:Interface/Bridge#DHCP_Snooping_and_DHCP_Option_82
(F)First hap ac2 : capsman, dhcp server, firewall,pppoe client and bridge with dhcp snooping and op82
(S)Second hap ac2: only bridge and dhcp client for bridge.
my problem: When enable dhcp snooping on S, client can not get ip. And i disable dhcp snooping then client can get ip on S
F is not have a problem. All client can get ip.
Clients connect with wireless. I using capsman. Firmwares are up to date.
I think somethink is blocking. The F my main router is working well. Because dhcp server on this bridge. Don’t need to passing request on trust interface. Then on my cpe S need to passing request on trust interface. Requests are blocking. Clients can not get ip.
My config:
GPON ONT to eth1 F(first hap ac2)
eth5 F to eth1 S(second hap ac2) like CPE
S:
Flags: X - disabled, R - running
0 R name="Local bridge 2" mtu=auto actual-mtu=1500 l2mtu=1598 arp=enabled
arp-timeout=auto mac-address=48:8F:5A:EF:D0:49 protocol-mode=none
fast-forward=yes igmp-snooping=no auto-mac=no admin-mac=48:8F:5A:EF:D0:49
ageing-time=5m vlan-filtering=no dhcp-snooping=no
# jan/16/2021 22:49:34 by RouterOS 6.48
# software id = x
#
# model = RBD52G-5HacD2HnD
# serial number = x
/interface bridge
add admin-mac=48:8F:5A:EF:D0:49 auto-mac=no name="Local bridge 2" \
protocol-mode=none dhcp-snooping=yes add-dhcp-option82=yes
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa2-psk eap-methods="" mode=dynamic-keys name=Apo \
supplicant-identity="" wpa2-pre-shared-key=x
/interface wireless
# managed by CAPsMAN
# channel: 2452/20-Ce/gn(10dBm), SSID: x, local forwarding
set [ find default-name=wlan1 ] antenna-gain=0 band=2ghz-b/g/n channel-width=\
20/40mhz-XX country=no_country_set disabled=no frequency=auto \
frequency-mode=manual-txpower installation=indoor mode=ap-bridge name=\
"wlan 2.4GHz" security-profile=Apo ssid=Apo tx-power-mode=all-rates-fixed
# managed by CAPsMAN
# channel: 5180/20-Ceee/ac(16dBm), SSID: x, local forwarding
set [ find default-name=wlan2 ] antenna-gain=0 band=5ghz-a/n/ac channel-width=\
20/40/80mhz-XXXX country=no_country_set disabled=no frequency=auto \
frequency-mode=manual-txpower installation=indoor mode=ap-bridge name=\
"wlan 5GHz" security-profile=Apo ssid=Apo tx-pow
/interface bridge port
add bridge="Local bridge 2" interface=ether1 trusted=yes
add bridge="Local bridge 2" interface=ether2
add bridge="Local bridge 2" interface=ether3
add bridge="Local bridge 2" interface=ether4
add bridge="Local bridge 2" interface=ether5
add bridge="Local bridge 2" interface="wlan 2.4GHz"
add bridge="Local bridge 2" interface="wlan 5GHz"
/interface wireless cap
#
set bridge="Local bridge 2" discovery-interfaces="Local bridge 2" enabled=yes \
interfaces="wlan 5GHz,wlan 2.4GHz"
/ip dhcp-client
add disabled=no interface="Local bridge 2"
/ip service
set www-ssl disabled=no
/system clock
set time-zone-autodetect=no time-zone-name=Europe/Istanbul
/system identity
set name="hAP ac22"
/system routerboard settings
set cpu-frequency=auto
/system routerboard reset-button
set enabled=yes hold-time=0s..5s on-event="system shutdown"
F:
Flags: X - disabled, R - running
0 R name="Local Bridge" mtu=auto actual-mtu=1500 l2mtu=1598 arp=reply-only
arp-timeout=auto mac-address=C4:AD:34:01:40:59 protocol-mode=none
fast-forward=yes igmp-snooping=no auto-mac=no admin-mac=C4:AD:34:01:40:59
ageing-time=5m vlan-filtering=no dhcp-snooping=yes add-dhcp-option82=yes
# jan/16/2021 22:51:53 by RouterOS 6.48
# software id = x
#
# model = RBD52G-5HacD2HnD
# serial number = x
/caps-man channel
add band=5ghz-n/ac extension-channel=Ceee frequency=5180 name="5 GHz " \
skip-dfs-channels=yes tx-power=16
add band=2ghz-g/n extension-channel=Ce frequency=2412,2452 name="2.4 GHz" \
save-selected=yes skip-dfs-channels=no tx-power=10
/interface bridge
add add-dhcp-option82=yes admin-mac=C4:AD:34:01:40:59 arp=reply-only auto-mac=\
no dhcp-snooping=yes name="Local Bridge" protocol-mode=none
/interface vlan
add interface=ether1 name="PPPoE VLAN" vlan-id=35
/caps-man datapath
add bridge="Local Bridge" client-to-client-forwarding=yes local-forwarding=yes \
name="local forward"
/caps-man security
add authentication-types=wpa2-psk disable-pmkid=yes encryption=aes-ccm \
group-encryption=aes-ccm name=x passphrase=x
/caps-man configuration
add country=no_country_set datapath.local-forwarding=yes installation=indoor \
mode=ap name=x security=x ssid=x
add channel="2.4 GHz" channel.skip-dfs-channels=yes country=turkey datapath=\
"local forward" installation=indoor mode=ap name="x 2.4GHz" security=Apo \
ssid=x
add channel="5 GHz " country="united states" datapath="local forward" \
installation=indoor mode=ap name="x 5GHz" security=Apo ssid=x
add channel="2.4 GHz" country=turkey datapath="local forward" installation=\
indoor mode=ap name="slave x 2.4GHz" security=Apo ssid="x 2.4GHz"
add channel="5 GHz " country="united states" datapath="local forward" \
installation=indoor mode=ap name="slave Apo 5 GHz" security=x ssid=\
"x 5GHz"
/interface list
add name=WAN
add name=LAN
/interface wireless security-profiles
set [ find default=yes ] supplicant-identity=MikroTik
add authentication-types=wpa2-psk eap-methods="" management-protection=allowed \
mode=dynamic-keys name=Apo supplicant-identity="" wpa-pre-shared-key=\
x wpa2-pre-shared-key=x
/interface wireless
# managed by CAPsMAN
# channel: 2412/20-Ce/gn(10dBm), SSID: x, local forwarding
set [ find default-name=wlan1 ] antenna-gain=0 band=2ghz-b/g/n channel-width=\
20/40mhz-XX country=no_country_set disabled=no frequency=auto \
frequency-mode=manual-txpower installation=indoor mode=ap-bridge name=\
"wlan 2.4GHz" security-profile=x ssid=x station-roaming=enabled \
tx-power-mode=all-rates-fixed
# managed by CAPsMAN
# channel: 5180/20-Ceee/ac(16dBm), SSID: x, local forwarding
set [ find default-name=wlan2 ] antenna-gain=0 band=5ghz-a/n/ac channel-width=\
20/40/80mhz-XXXX country=no_country_set disabled=no frequency=auto \
frequency-mode=manual-txpower installation=indoor mode=ap-bridge name=\
"wlan 5GHz" security-profile=x ssid=x station-roaming=enabled \
tx-power-mode=all-rates-fixed
/ip pool
add name=DHCP ranges=192.168.8.100-192.168.8.254
/ip dhcp-server
add add-arp=yes address-pool=DHCP disabled=no interface="Local Bridge" \
lease-time=3d name="Local DHCP"
/ppp profile
set *0 change-tcp-mss=default use-ipv6=default
add name="CGNat not" on-up=":global if \"PPPoE\"\r\
\n:global targetip 100.0.0.0/8\r\
\n:global currentip [/ip address get [/ip address find interface=\$if ] addr\
ess]\r\
\n:global ip \$currentip\r\
\n:global pppoedelay 3s\r\
\n:log info \"PPPoE \$currentip\"\r\
\n:while ((\$currentip in \$targetip)) do={\r\
\n /interface disable \$if\r\
\n :delay \$pppoedelay\r\
\n /interface enable \$if\r\
\n :do {delay 1s}\r\
\n :set currentip [/ip address get [/ip address find interface=\$if ] ad\
dress]\r\
\n :set currentip ([[:parse \":return \$currentip\"]])\r\
\n :set ip \$currentip\r\
\n }" use-ipv6=default
/interface pppoe-client
add add-default-route=yes disabled=no interface="PPPoE VLAN" keepalive-timeout=\
60 name=PPPoE password=x profile="CGNat not" user=\
x @x
/queue type
add kind=none name=none
add kind=pfifo name=pfifo pfifo-limit=2000
add kind=pcq name=PCQD pcq-classifier=dst-address pcq-dst-address6-mask=64 \
pcq-limit=100KiB pcq-src-address6-mask=64
add kind=pcq name=pcqd pcq-classifier=dst-address pcq-dst-address6-mask=64 \
pcq-src-address6-mask=64
add kind=pcq name=PCQU pcq-classifier=src-address pcq-dst-address6-mask=64 \
pcq-limit=100KiB pcq-src-address6-mask=64
add kind=pcq name=pcqu pcq-classifier=src-address pcq-dst-address6-mask=64 \
pcq-src-address6-mask=64
add kind=pfifo name="PF\DDFO" pfifo-limit=6000
add kind=pcq name=PCqu pcq-classifier=src-address pcq-dst-address6-mask=64 \
pcq-src-address6-mask=64
add kind=pcq name=PCqd pcq-classifier=dst-address pcq-dst-address6-mask=64 \
pcq-src-address6-mask=64
/user group
set full policy="local,telnet,ssh,ftp,reboot,read,write,policy,test,winbox,passw\
ord,web,sniff,sensitive,api,romon,dude,tikapp"
/caps-man manager
set enabled=yes
/caps-man manager interface
set [ find default=yes ] forbid=yes
add disabled=no interface="Local Bridge"
/caps-man provisioning
add action=create-dynamic-enabled disabled=yes master-configuration=x\
name-format=identity
add action=create-dynamic-enabled hw-supported-modes=gn,g,b \
master-configuration="x2.4GHz" name-format=prefix-identity name-prefix=\
"Wlan 2.4GHz" slave-configurations="slave x 2.4GHz"
add action=create-dynamic-enabled hw-supported-modes=ac,an,a \
master-configuration="x 5GHz" name-format=prefix-identity name-prefix=\
"Wlan 5GHz" slave-configurations="slave x 5 GHz"
/interface bridge port
add bridge="Local Bridge" interface=ether2
add bridge="Local Bridge" interface=ether3
add bridge="Local Bridge" interface=ether4
add bridge="Local Bridge" interface=ether5 trusted=yes
add bridge="Local Bridge" disabled=yes interface=ether1
add bridge="Local Bridge" interface="wlan 2.4GHz"
add bridge="Local Bridge" interface="wlan 5GHz"
/ip neighbor discovery-settings
set discover-interface-list=!dynamic
/interface list member
add interface="Local Bridge" list=LAN
add interface=PPPoE list=WAN
add interface=ether1 list=WAN
add interface="PPPoE VLAN" list=WAN
/interface wireless cap
#
set bridge="Local Bridge" discovery-interfaces="Local Bridge" enabled=yes \
interfaces="wlan 5GHz,wlan 2.4GHz"
/ip address
add address=192.168.8.59/24 interface="Local Bridge" network=192.168.8.0
/ip dhcp-server config
set store-leases-disk=immediately
/ip dhcp-server network
add address=192.168.8.0/24 dns-server="1.0.0.1,1.1.1.1,9.9.9.9,209.244.0.3,209.2\
44.0.4,4.2.2.3,4.2.2.5,4.2.2.6,4.2.2.1,4.2.2.2,4.2.2.4,8.8.8.8,8.8.4.4" \
gateway=192.168.8.59 ntp-server=195.50.171.101,131.211.8.244
/ip dns
set servers=1.0.0.1,1.1.1.1,9.9.9.9,209.244.0.3,209.244.0.4,4.2.2.3,4.2.2.5
/ip firewall address-list
add address=192.168.8.0/24 list=DNS_Accept
add address=1.0.0.1 list=DNS_Accept
add address=1.1.1.1 list=DNS_Accept
add address=209.244.0.3 list=DNS_Accept
add address=209.244.0.4 list=DNS_Accept
add address=4.2.2.1 list=DNS_Accept
add address=4.2.2.2 list=DNS_Accept
add address=4.2.2.3 list=DNS_Accept
add address=4.2.2.4 list=DNS_Accept
add address=4.2.2.5 list=DNS_Accept
add address=4.2.2.6 list=DNS_Accept
add address=9.9.9.9 list=DNS_Accept
add address=8.8.8.8 list=DNS_Accept
add address=8.8.4.4 list=DNS_Accept
add address=0.0.0.0/8 comment=RFC6890 list=NotPublic
add address=10.0.0.0/8 comment=RFC6890 list=NotPublic
add address=100.64.0.0/10 comment=RFC6890 list=NotPublic
add address=127.0.0.0/8 comment=RFC6890 list=NotPublic
add address=169.254.0.0/16 comment=RFC6890 list=NotPublic
add address=172.16.0.0/12 comment=RFC6890 list=NotPublic
add address=192.0.0.0/24 comment=RFC6890 list=NotPublic
add address=192.0.2.0/24 comment=RFC6890 list=NotPublic
add address=192.168.0.0/16 comment=RFC6890 list=NotPublic
add address=192.88.99.0/24 comment=RFC3068 list=NotPublic
add address=198.18.0.0/15 comment=RFC6890 list=NotPublic
add address=198.51.100.0/24 comment=RFC6890 list=NotPublic
add address=203.0.113.0/24 comment=RFC6890 list=NotPublic
add address=224.0.0.0/4 comment=RFC4601 list=NotPublic
add address=240.0.0.0/4 comment=RFC6890 list=NotPublic
/ip firewall filter
add action=drop chain=input comment="d\FD\FEardan ping" in-interface-list=WAN \
protocol=icmp
add action=drop chain=input comment="PPPoE ftp ssh telnet api winbox cwmp acs" \
in-interface-list=WAN port=21,22,23,8291,8728,8729,7547 protocol=tcp
add action=drop chain=input comment="PPPoE ftp ssh telnet api winbox cwmp acs" \
in-interface-list=WAN port=21,22,23,8291,8728,8729,7547 protocol=udp
add action=drop chain=input comment="Drop Invalid connections" \
connection-state=invalid
add action=accept chain=input comment=\
"Accept Established and related connections" connection-state=\
established,related
add action=accept chain=input comment=\
"Accept all connections from local network" in-interface-list=!WAN
add action=drop chain=input comment="Drop everything else"
add action=drop chain=forward comment="drop invalid connections" \
connection-state=invalid
add action=drop chain=forward comment=\
"Drop tries to reach not public addresses to WAN" dst-address-list=\
NotPublic out-interface-list=WAN
add action=drop chain=forward comment=\
"Drop new connections from internet which are not dst-natted" \
connection-nat-state=!dstnat connection-state=new in-interface-list=WAN
add action=drop chain=forward comment="Drop all packets from public internet whi\
ch should not exist in public network" in-interface-list=WAN \
src-address-list=NotPublic
add action=drop chain=forward comment="Drop all packets in local network which d\
oes not have local network address" in-interface-list=LAN src-address=\
!192.168.8.0/24
/ip firewall nat
add action=masquerade chain=srcnat out-interface=PPPoE
/ip service
set www-ssl disabled=no
/ip upnp
set enabled=yes
/ip upnp interfaces
add interface=PPPoE type=external
add interface="Local Bridge" type=internal
/system clock
set time-zone-name=Europe/Istanbul
/system identity
set name="hAP ac2"
/system ntp client
set enabled=yes primary-ntp=195.50.171.101 secondary-ntp=131.211.8.244
/system routerboard settings
set cpu-frequency=auto
/system routerboard reset-button
set enabled=yes hold-time=0s..5s on-event="system shutdown"
/system script
add dont-require-permissions=no name="cap on off" owner=x policy=\
ftp,reboot,read,write,policy,test,password,sniff,sensitive,romon source=":lo\
g info message=(\"mode button was pressed\");\r\
\n:local i\r\
\n\r\
\n:if ([/int wir cap get enabled] = true) do={\r\
\n /interface wireless cap set enabled=no;\r\
\n :global SlackMessage \"Mode button was presssed. CAP is now disabled.\";\
\r\
\n :if ( [/int wir get 0 disabled ] = false ) do={\r\
\n :foreach i in= [ /int wir find ] do={ :int wir disable \$i };\r\
\n }\r\
\n} else={\r\
\n /interface wireless cap set enabled=yes\r\
\n :global SlackMessage \"Mode button was presssed. CAP is now enabled.\";\
\r\
\n}\r\
\n/system script run message2slack"
/tool bandwidth-server
set authenticate=no
DHCP debug log with dhcp snooping (there is a problem)
jan/19 00:47:44 caps,info 48:60:5F:2D:C4:BB@Wlan 2.4GHz-hAP ac22-1-1 connected, signal strength -72
jan/19 00:47:44 dhcp,debug Local DHCP received request id 3514722315 from 0.0.0.0 '1:48:60:5f:2d:c4:bb'
jan/19 00:47:44 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:47:44 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:47:44 dhcp,debug,packet Msg-Type = request
jan/19 00:47:44 dhcp,debug,packet Client-Id = 01-48-60-5F-2D-C4-BB
jan/19 00:47:44 dhcp,debug,packet Address-Request = 192.168.8.62
jan/19 00:47:44 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:47:44 dhcp,debug,packet Max-DHCP-Message-Size = 1500
jan/19 00:47:44 dhcp,debug,packet Class-Id = "android-dhcp-9"
jan/19 00:47:44 dhcp,debug,packet Host-Name = "G6"
jan/19 00:47:44 dhcp,debug,packet Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific
jan/19 00:47:44 dhcp,debug,packet Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38
jan/19 00:47:44 dhcp,debug lease not found
jan/19 00:47:44 dhcp,debug , addressed to me, authorative or unicast
jan/19 00:47:44 dhcp,debug Local DHCP sending nak with id 3514722315 to 255.255.255.255
jan/19 00:47:44 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:47:44 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:47:44 dhcp,debug,packet Msg-Type = nak
jan/19 00:47:44 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:47:44 dhcp,debug,packet Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38
jan/19 00:47:46 dhcp,debug Local DHCP received request id 3514722315 from 0.0.0.0 '1:48:60:5f:2d:c4:bb'
jan/19 00:47:46 dhcp,debug,packet secs = 2
jan/19 00:47:46 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:47:46 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:47:46 dhcp,debug,packet Msg-Type = request
jan/19 00:47:46 dhcp,debug,packet Client-Id = 01-48-60-5F-2D-C4-BB
jan/19 00:47:46 dhcp,debug,packet Address-Request = 192.168.8.62
jan/19 00:47:46 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:47:46 dhcp,debug,packet Max-DHCP-Message-Size = 1500
jan/19 00:47:46 dhcp,debug,packet Class-Id = "android-dhcp-9"
jan/19 00:47:46 dhcp,debug,packet Host-Name = "G6"
jan/19 00:47:46 dhcp,debug,packet Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific
jan/19 00:47:46 dhcp,debug,packet Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38
jan/19 00:47:46 dhcp,debug lease not found
jan/19 00:47:46 dhcp,debug , addressed to me, authorative or unicast
jan/19 00:47:46 dhcp,debug Local DHCP sending nak with id 3514722315 to 255.255.255.255
jan/19 00:47:46 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:47:46 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:47:46 dhcp,debug,packet Msg-Type = nak
jan/19 00:47:46 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:47:46 dhcp,debug,packet Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38
jan/19 00:47:50 dhcp,debug Local DHCP received request id 3514722315 from 0.0.0.0 '1:48:60:5f:2d:c4:bb'
jan/19 00:47:50 dhcp,debug,packet secs = 6
jan/19 00:47:50 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:47:50 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:47:50 dhcp,debug,packet Msg-Type = request
jan/19 00:47:50 dhcp,debug,packet Client-Id = 01-48-60-5F-2D-C4-BB
jan/19 00:47:50 dhcp,debug,packet Address-Request = 192.168.8.62
jan/19 00:47:50 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:47:50 dhcp,debug,packet Max-DHCP-Message-Size = 1500
jan/19 00:47:50 dhcp,debug,packet Class-Id = "android-dhcp-9"
jan/19 00:47:50 dhcp,debug,packet Host-Name = "G6"
jan/19 00:47:50 dhcp,debug,packet Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific
jan/19 00:47:50 dhcp,debug,packet Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38
jan/19 00:47:50 dhcp,debug lease not found
jan/19 00:47:50 dhcp,debug , addressed to me, authorative or unicast
jan/19 00:47:50 dhcp,debug Local DHCP sending nak with id 3514722315 to 255.255.255.255
jan/19 00:47:50 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:47:50 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:47:50 dhcp,debug,packet Msg-Type = nak
jan/19 00:47:50 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:47:50 dhcp,debug,packet Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38
jan/19 00:47:59 dhcp,debug Local DHCP received request id 3514722315 from 0.0.0.0 '1:48:60:5f:2d:c4:bb'
jan/19 00:47:59 dhcp,debug,packet secs = 14
jan/19 00:47:59 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:47:59 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:47:59 dhcp,debug,packet Msg-Type = request
jan/19 00:47:59 dhcp,debug,packet Client-Id = 01-48-60-5F-2D-C4-BB
jan/19 00:47:59 dhcp,debug,packet Address-Request = 192.168.8.62
jan/19 00:47:59 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:47:59 dhcp,debug,packet Max-DHCP-Message-Size = 1500
jan/19 00:47:59 dhcp,debug,packet Class-Id = "android-dhcp-9"
jan/19 00:47:59 dhcp,debug,packet Host-Name = "G6"
jan/19 00:47:59 dhcp,debug,packet Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific
jan/19 00:47:59 dhcp,debug,packet Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38
jan/19 00:47:59 dhcp,debug lease not found
jan/19 00:47:59 dhcp,debug , addressed to me, authorative or unicast
jan/19 00:47:59 dhcp,debug Local DHCP sending nak with id 3514722315 to 255.255.255.255
jan/19 00:47:59 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:47:59 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:47:59 dhcp,debug,packet Msg-Type = nak
jan/19 00:47:59 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:47:59 dhcp,debug,packet Relay-Agent-Info = 01-11-68-41-50-20-61-63-32-32-20-65-74-68-20-30-2F-31-36-02-05-77-6C-61-6E-38
DHCP debug log without dhcp snooping (There is no problem)
jan/19 00:55:42 caps,info 48:60:5F:2D:C4:BB@Wlan 2.4GHz-hAP ac22-1-1 connected, signal strength -73
jan/19 00:55:43 dhcp,debug Local DHCP received request id 1946449499 from 0.0.0.0 '1:48:60:5f:2d:c4:bb'
jan/19 00:55:43 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:55:43 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:55:43 dhcp,debug,packet Msg-Type = request
jan/19 00:55:43 dhcp,debug,packet Client-Id = 01-48-60-5F-2D-C4-BB
jan/19 00:55:43 dhcp,debug,packet Address-Request = 192.168.8.254
jan/19 00:55:43 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet Max-DHCP-Message-Size = 1500
jan/19 00:55:43 dhcp,debug,packet Class-Id = "android-dhcp-9"
jan/19 00:55:43 dhcp,debug,packet Host-Name = "G6"
jan/19 00:55:43 dhcp,debug,packet Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific
jan/19 00:55:43 dhcp,debug,packet Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35
jan/19 00:55:43 dhcp,debug lease waiting, addressed to me, authorative or unicast
jan/19 00:55:43 dhcp,debug Local DHCP sending nak with id 1946449499 to 255.255.255.255
jan/19 00:55:43 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:55:43 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:55:43 dhcp,debug,packet Msg-Type = nak
jan/19 00:55:43 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35
jan/19 00:55:43 dhcp,debug Local DHCP received discover id 2695493332 from 0.0.0.0 '1:48:60:5f:2d:c4:bb'
jan/19 00:55:43 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:55:43 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:55:43 dhcp,debug,packet Msg-Type = discover
jan/19 00:55:43 dhcp,debug,packet Client-Id = 01-48-60-5F-2D-C4-BB
jan/19 00:55:43 dhcp,debug,packet Max-DHCP-Message-Size = 1500
jan/19 00:55:43 dhcp,debug,packet Class-Id = "android-dhcp-9"
jan/19 00:55:43 dhcp,debug,packet Host-Name = "G6"
jan/19 00:55:43 dhcp,debug,packet Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific
jan/19 00:55:43 dhcp,debug,packet Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35
jan/19 00:55:43 dhcp,debug lease found, waiting, acquire
jan/19 00:55:43 dhcp,debug Local DHCP sending offer with id 2695493332 to 192.168.8.62
jan/19 00:55:43 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:55:43 dhcp,debug,packet yiaddr = 192.168.8.62
jan/19 00:55:43 dhcp,debug,packet siaddr = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:55:43 dhcp,debug,packet Msg-Type = offer
jan/19 00:55:43 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet Address-Time = 259200
jan/19 00:55:43 dhcp,debug,packet Subnet-Mask = 255.255.255.0
jan/19 00:55:43 dhcp,debug,packet Router = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet Domain-Server = 1.0.0.1,1.1.1.1,9.9.9.9,209.244.0.3,209.244.0.4,4.2.2.3,4.2.2.5,4.2.2.6,4.2.2.1,4.2.2.2,4.2.2.4,8.8.8.8,8.8.4.4
jan/19 00:55:43 dhcp,debug,packet Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35
jan/19 00:55:43 dhcp,debug Local DHCP received request id 2695493332 from 0.0.0.0 '1:48:60:5f:2d:c4:bb'
jan/19 00:55:43 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:55:43 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:55:43 dhcp,debug,packet Msg-Type = request
jan/19 00:55:43 dhcp,debug,packet Client-Id = 01-48-60-5F-2D-C4-BB
jan/19 00:55:43 dhcp,debug,packet Address-Request = 192.168.8.62
jan/19 00:55:43 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet Max-DHCP-Message-Size = 1500
jan/19 00:55:43 dhcp,debug,packet Class-Id = "android-dhcp-9"
jan/19 00:55:43 dhcp,debug,packet Host-Name = "G6"
jan/19 00:55:43 dhcp,debug,packet Parameter-List = Subnet-Mask,Router,Domain-Server,Domain-Name,Interface-MTU,Broadcast-Address,Address-Time,Renewal-Time,Rebinding-Time,Vendor-Specific
jan/19 00:55:43 dhcp,debug,packet Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35
jan/19 00:55:43 dhcp,debug lease offered, addressed to me
jan/19 00:55:43 dhcp,debug add arp for 192.168.8.62 to 48:60:5F:2D:C4:BB
jan/19 00:55:43 dhcp,debug 192.168.8.62 entering bound
jan/19 00:55:43 dhcp,info Local DHCP assigned 192.168.8.62 to 48:60:5F:2D:C4:BB
jan/19 00:55:43 dhcp,debug Local DHCP sending ack with id 2695493332 to 192.168.8.62
jan/19 00:55:43 dhcp,debug,packet ciaddr = 0.0.0.0
jan/19 00:55:43 dhcp,debug,packet yiaddr = 192.168.8.62
jan/19 00:55:43 dhcp,debug,packet siaddr = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet chaddr = 48:60:5F:2D:C4:BB
jan/19 00:55:43 dhcp,debug,packet Msg-Type = ack
jan/19 00:55:43 dhcp,debug,packet Server-Id = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet Address-Time = 259200
jan/19 00:55:43 dhcp,debug,packet Subnet-Mask = 255.255.255.0
jan/19 00:55:43 dhcp,debug,packet Router = 192.168.8.59
jan/19 00:55:43 dhcp,debug,packet Domain-Server = 1.0.0.1,1.1.1.1,9.9.9.9,209.244.0.3,209.244.0.4,4.2.2.3,4.2.2.5,4.2.2.6,4.2.2.1,4.2.2.2,4.2.2.4,8.8.8.8,8.8.4.4
jan/19 00:55:43 dhcp,debug,packet Relay-Agent-Info = 01-0F-68-41-50-20-61-63-32-20-65-74-68-20-30-2F-37-02-06-65-74-68-65-72-35
Thanks