You are in luck, sort of. In one of our previous tirades ;-) about DHCP, I sent the following message, which includes a DHCP Discover relayed by a router near the end. I can't send you the trace file, however, because it has some confidential stuff in it.
Here's my config. The client is on the 36.1.1.0 network. I was sitting with my EtherPeek protocol analyzer on the 10.10.0.0 network. I could see the DHCP Discover come through to 10.10.0.1 as long as I used "ip helper-address 10.10.0.1." charlotte#s run Building configuration... Current configuration: ! version 11.0 service udp-small-servers service tcp-small-servers ! hostname charlotte ! enable password xxxx ! interface Ethernet0 ip address 10.10.0.2 255.255.255.0 ! interface Ethernet1 ip address 36.1.1.1 255.255.255.0 ip helper-address 10.10.0.1 ! interface Serial0 ip address 192.168.40.2 255.255.255.0 no fair-queue ! interface Serial1 no ip address shutdown ! interface TokenRing1 no ip address shutdown ! interface TokenRing0 no ip address shutdown ! router ospf 100 network 192.168.0.0 0.0.255.255 area 2 network 10.10.0.0 0.0.255.255 area 0 network 36.1.1.0 0.0.0.255 area 2 ! line con 0 line aux 0 transport input all line vty 0 4 password cisco login ! end The DHCP Discover from the client that I captured might be informative for people learning about how DHCP Relay works. Notice that the packet is a unicast, rather than a broadcast. Also, notice at the IP layer that the source address is the router, not the client's 0.0.0.0 address that you normally see with DHCP. The router also put its address in the DHCP server under "Gateway IP Address." The DHCP server needs to see this to know which subnet the client's request came from. Ethernet Header Destination: 00:00:0C:05:3E:80 Source: 00:00:0C:00:2E:75 Protocol Type:0x0800 IP IP Header - Internet Protocol Datagram Version: 4 Header Length: 5 (20 bytes) Type of Service: %00000000 Precedence: Routine, Normal Delay, Normal Throughput, Normal Reliability Total Length: 328 Identifier: 12800 Fragmentation Flags: %000 May Fragment Last Fragment Fragment Offset: 0 (0 bytes) Time To Live: 127 Protocol: 17 UDP Header Checksum: 0xD998 Source IP Address: 36.1.1.1 Dest. IP Address: 10.10.0.1 No IP Options UDP - User Datagram Protocol Source Port: 68 Bootstrap (BOOTP Client) Destination Port: 67 Bootstrap Protocol Server Length: 308 Checksum: 0x3159 BootP - Bootstrap Protocol Operation: 1 Boot Request Hardware Address Type: 1 Ethernet (10Mb) Hardware Address Length: 6 bytes Hops: 0 Transaction ID: 678970121 Seconds Since Boot Start: 0 Flags: 0x0000 IP Address Known By Client: 0.0.0.0 IP Address Not Known By Client Client IP Addr Given By Srvr: 0.0.0.0 Server IP Address: 0.0.0.0 Gateway IP Address: 36.1.1.1 Client Hardware Address: 00:E0:98:89:52:FA Unused: 0x00000000000000000000 Server Host Name: ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Boot File Name: ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 DHCP - Dynamic Host Configuration Protocol DHCP Magic Cookie: 0x63825363 Message TypeDHCP Option Option Code: 53 Message Type Option Length: 1 Message Type: 1 Discover Client IdentifierDHCP Option Option Code: 61 Client Identifier Option Length: 7 Hardware Type: 1 Hardware Address: 00:E0:98:89:52:FA Requested IP AddressDHCP Option Option Code: 50 Requested IP Address Option Length: 4 Address: 36.1.1.2 Host Name AddressDHCP Option Option Code: 12 Host Name Address Option Length: 8 String: MACTEAM. Vendor Class IdentifierDHCP Option Option Code: 60 Vendor Class Identifier Option Length: 7 Option Data: MSFT 98 4D 53 46 54 20 39 38 Parameter Request ListDHCP Option Option Code: 55 Parameter Request List Option Length: 9 Requested Option: 1 Subnet Mask Requested Option: 15 Domain Name Requested Option: 3 Routers Requested Option: 6 Domain Name Servers Requested Option: 44 NetBIOS (TCP/IP) Name Servers Requested Option: 46 NetBIOS (TCP/IP) Node Type Requested Option: 47 NetBIOS (TCP/IP) Scope Requested Option: 43 Vendor Specific Information Requested Option: 77 User Class Information DHCP Option End Option Code: 255 End Extra bytes (Padding): ........... 00 00 00 00 00 00 00 00 00 00 00 Frame Check Sequence: 0x00000000 Priscilla At 05:44 PM 10/5/01, Lists Wizard wrote: >Hi Group, > >I am interested in the details (at the packet level) of DHCP communication >between the client and a DHCP server when there is a router in the middle. >Can any body provide me with sniffer trace of this kind of communication? I >use SnifferPro. > >Thanks > >Lists Wizard ________________________ Priscilla Oppenheimer http://www.priscilla.com Message Posted at: http://www.groupstudy.com/form/read.php?f=7&i=22292&t=22272 -------------------------------------------------- FAQ, list archives, and subscription info: http://www.groupstudy.com/list/cisco.html Report misconduct and Nondisclosure violations to [EMAIL PROTECTED]