Thread name: "Re: [Gutl-l] forza dhcp-server" 
Mail number: 3 
Date: Wed, Nov 19, 2014 
In reply to: Javier Santiesteban 
>
> ya lo he puesto en el mínimo pero quería saber si existe algun
> comando que puediera ejecutarse y forzar a toda la red
> 

Mira a ver si te juega esto:



lazaro@leviatan:~$ w3m -T text/html -dump 
http://wiki.nil.com/DHCP_client_address_change
DHCP client address change

From CT3

Jump to: navigation, search

By Ivan Pepelnjak

The DHCP protocol specifications do not specify the exact mechanisms a DHCP
server can use to force the address change on the DHCP client. It’s assumed
that once a DHCP client received the IP address from a DHCP server, the address
remains valid for the duration of the lease period. A DHCP server can influence
the client’s IP address only when the client asks the server for lease
extension or address validation using the DHCPREQUEST message.

A DHCP client asks for a lease extension when the T1 timer expires (usually at
half the lease period) but could verify its IP address at any time, for example
when the LAN interface becomes operational or when a workstation reboots or
wakes from suspended/hibernated state.

When a DHCP server does not want to extend the IP address lease, it can:

  • Acknowledge the IP address without extending the lease by responding with
    the DHCPACK packet.
  • Reject the client’s IP address with the DHCPNAK packet.
  • Ignore the DHCPREQUEST packet and wait for the client’s lease to expire.

Internet Systems Consortium has decided to use the term authoritative DHCP
server for the server that actively rejects client’s DHCPREQUEST packet with a
DHCPNAK packet.

Contents

  • 1 DHCP server behavior
      □ 1.1 Linux DHCP server
      □ 1.2 Cisco IOS DHCP server
  • 2 Cisco IOS DHCP client behavior
      □ 2.1 Lease expiration behavior
      □ 2.2 Address change behavior
  • 3 References

DHCP server behavior

Linux DHCP server

The ISC DHCP server available in most Linux distributions tries to accommodate
the client’s requests. When a server that lost its bindings receives a
DHCPREQUEST packet from a client, it responds with a DHCPACK message (and
stores the client-ID-to-IP-address binding in its database) if the client’s IP
address belongs to the correct subnet and is not already used by some other
client. In other cases, the server does not respond to the request unless it’s
configured to be authoritative. An authoritative ISC DHCP server rejects all
mismatched DHCPREQUEST messages with a DHCPNAK response, causing the client to
enter the INIT state immediately.

Cisco IOS DHCP server

Cisco IOS does not use the DHCPREQUEST packets to repopulate its DHCP binding
database. The DHCPREQUEST packets coming from clients that are not in the DHCP
binding database are ignored; the clients’ lease period has to expire before
its IP address can be changed.

The Cisco IOS DHCP server rejects all DHCPREQUEST packets with invalid IP
addresses (IP addresses not belonging to the subnet from which the DHCPREQUEST
packet was received) with a DHCPNAK packet, causing the DHCP client to
reacquire its IP address.

Requests with unexpected IP addresses coming from clients with known
(statically mapped) Client-IDs are also rejected immediately with the DHCPNAK
response.

Cisco IOS DHCP client behavior

Although the client DHCP state transition diagram treats lease expiration
(timeout) and lease extension rejection (indicated by the DHCPNAK response) in
an almost identical way (both events lead to the INIT state), the Cisco IOS
DHCP client reacts to them in a completely different manner:

  • If the lease expires, the interface is bounced, new address is acquired and
    reported in a syslog message (DHCP_6-ADDRESS_ASSIGN).
  • If the DHCP server rejects the IP address included in the lease extension
    request, the DHCP client quietly acquires a new address and does not report
    the event. The only noticeable change is a slight disruption in the IP
    routing table which you can [with EEM IP routing detector].

Both behaviors were tested with IOS release 12.4(24)T and several earlier
releases. The printouts included in the following sections were generated with
the debug dhcp and debug ip routing commands.

Lease expiration behavior

When a DHCP lease expires, the Cisco IOS DHCP client shuts down the interface,
resulting in route removal from the IP routing table.

DHCP lease expires

09:33:50.052: DHCP: SRequest attempt # 1 for entry:
09:33:50.052: DHCP: SRequest - ciaddr: 192.168.0.12
09:33:50.056: DHCP: SRequest placed lease len option: 60
09:33:50.056: DHCP: SRequest: 281 bytes
09:33:50.056: DHCP: SRequest: 281 bytes
09:33:50.056:             B'cast on FastEthernet0/0 interface from 192.168.0.12
09:33:59.052: DHCP: Address lease expired. Attempting Shutdown

Interface is shut down, connected and static routes are removed from the IP
routing table

09:33:59.052: %DHCP-5-RESTART: Interface FastEthernet0/0 is being restarted by 
DHCP
09:33:59.056: RAC: DHCP stopped on interface FastEthernet0/0
09:33:59.064: RT: Pruning routes for FastEthernet0/0 (1)
09:33:59.072: RT: delete route to 192.168.0.0 via 0.0.0.0, FastEthernet0/0
09:33:59.072: RT: no routes to 192.168.0.0, flushing
09:33:59.072: RT: NET-RED 192.168.0.0/24
09:34:01.072: %LINK-5-CHANGED: Interface FastEthernet0/0, changed state to 
administratively down
09:34:02.072: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, 
changed state to down

The interface is immediately re-enabled (although the corresponding syslog
messages appear after a few seconds) and the DHCP process is restarted:

DHCP is restarted

09:34:02.116: DHCP: DHCP client process started: 10
09:34:02.124: RAC: Starting DHCP discover on FastEthernet0/0

The DHCP client sends DHCPDISCOVER and DHCPREQUEST messages ...

Initial DHCP messages

09:34:02.124: DHCP: Try 1 to acquire address for FastEthernet0/0
09:34:02.136: DHCP: allocate request
09:34:02.136: DHCP: zapping entry in DHC_PURGING state for Fa0/0
09:34:02.136: DHCP: deleting entry 6808A734 192.168.0.12 from list
09:34:02.136: DHCP: new entry. add to queue, interface FastEthernet0/0
09:34:02.136: DHCP: SDiscover attempt # 1 for entry:
09:34:02.136: DHCP: SDiscover: sending 275 byte length DHCP packet
09:34:02.136: DHCP: SDiscover 275 bytes
09:34:02.136:             B'cast on FastEthernet0/0 interface from 0.0.0.0
09:34:04.092: %LINK-3-UPDOWN: Interface FastEthernet0/0, changed state to up
09:34:04.124: DHCP: Received a BOOTREP pkt
09:34:04.128: DHCP: offer received from 192.168.0.2
09:34:04.128: DHCP: SRequest attempt # 1 for entry:
09:34:04.132: DHCP: SRequest- Server ID option: 192.168.0.2
09:34:04.132: DHCP: SRequest- Requested IP addr option: 192.168.0.13
09:34:04.132: DHCP: SRequest placed lease len option: 60
09:34:04.132: DHCP: SRequest: 293 bytes
09:34:04.132: DHCP: SRequest: 293 bytes
09:34:04.132:             B'cast on FastEthernet0/0 interface from 0.0.0.0

... and sets the interface IP address once it receives the DHCPACK response:

IP address is set on the interface

09:34:04.136: DHCP: Received a BOOTREP pkt
09:34:05.092: %LINEPROTO-5-UPDOWN: Line protocol on Interface FastEthernet0/0, 
changed state to up
09:34:07.152: DHCP Client Pooling: ***Allocated IP address: 192.168.0.13

Once the interface has an IP address, the connected route is inserted in the IP
routing table, followed by a DHCP-generated default route:

Connected and static routes are inserted in the IP routing table

09:34:07.152: RT: is_up: FastEthernet0/0 1 state: 4 sub state: 1 line: 1 
has_route: True
09:34:07.152: RT: add 192.168.0.0/24 via 0.0.0.0, connected metric [0/0]
09:34:07.156: RT: NET-RED 192.168.0.0/24
09:34:07.156: RT: interface FastEthernet0/0 added to routing table
09:34:07.156: RT: is_up: FastEthernet0/0 1 state: 4 sub state: 1 line: 1 
has_route: True
09:34:07.260: Allocated IP address = 192.168.0.13  255.255.255.0

Last but not least, a syslog message reports the new IP address:

DHCP client reports the new IP address in a syslog message

09:34:07.264: %DHCP-6-ADDRESS_ASSIGN: Interface FastEthernet0/0 assigned DHCP 
address 192.168.0.13, →
              mask 255.255.255.0, hostname Client

Address change behavior

When the Cisco IOS DHCP client receives a DHCPNAK response to a lease extension
request, it removes the interface IP address, resulting in loss of IP routes
associated with the interface.

DHCP server sends a DHCPNAK response to the DHCPREQUEST message

09:37:49.604: DHCP: SRequest attempt # 1 for entry:
09:37:49.604: DHCP: SRequest - ciaddr: 10.17.1.30
09:37:49.604: DHCP: SRequest placed lease len option: 30
09:37:49.604: DHCP: SRequest: 281 bytes
09:37:49.604: DHCP: SRequest: 281 bytes
09:37:49.604: DHCP: Received a BOOTREP pkt

Connected and static routes are removed from the IP routing table

09:37:49.604: RT: del 0.0.0.0 via 10.17.1.2, static metric [254/0]
09:37:49.604: RT: delete network route to 0.0.0.0
09:37:49.604: RT: NET-RED 0.0.0.0/0
09:37:49.604: RT: NET-RED 0.0.0.0/0
09:37:49.640: RT: Pruning routes for FastEthernet0/1 (1)
09:37:49.648: RT: delete route to 10.17.1.0 via 0.0.0.0, FastEthernet0/1
09:37:49.648: RT: no routes to 10.17.1.0, flushing
09:37:49.648: RT: NET-RED 10.17.1.0/24

The DHCP client then starts the address acquisition process: it sends the
DHCPDISCOVER message followed by the DHCPREQUEST message.

DHCP address acquisition process

09:37:49.656: DHCP: SDiscover attempt # 1 for entry:
09:37:49.656: DHCP: SDiscover: sending 275 byte length DHCP packet
09:37:49.656: DHCP: SDiscover 275 bytes
09:37:49.656:             B'cast on FastEthernet0/1 interface from 0.0.0.0
09:37:50.468: DHCP: Received a BOOTREP pkt
09:37:50.472: DHCP: offer received from 10.17.1.2
09:37:50.472: DHCP: SRequest attempt # 1 for entry:
09:37:50.472: DHCP: SRequest- Server ID option: 10.17.1.2
09:37:50.472: DHCP: SRequest- Requested IP addr option: 10.17.1.17
09:37:50.472: DHCP: SRequest placed lease len option: 30
09:37:50.472: DHCP: SRequest: 293 bytes
09:37:50.472: DHCP: SRequest: 293 bytes
09:37:50.472:             B'cast on FastEthernet0/1 interface from 0.0.0.0
09:37:50.476: DHCP: Received a BOOTREP pkt

After the DHCP client receives IP address from the DHCP server, it sets the
interface IP address and inserts the DHCP-generated default route in the IP
routing table. The change of interface IP address triggers the insertion of
connected route in the IP routing table.

Connected and static default routes are inserted in the IP routing table

09:37:53.500: RT: is_up: FastEthernet0/1 1 state: 4 sub state: 1 line: 1 
has_route: True
09:37:53.500: RT: network 10.0.0.0 is now variably masked
09:37:53.500: RT: add 10.17.1.0/24 via 0.0.0.0, connected metric [0/0]
09:37:53.500: RT: NET-RED 10.17.1.0/24
09:37:53.500: RT: interface FastEthernet0/1 added to routing table
09:37:53.504: RT: is_up: FastEthernet0/1 1 state: 4 sub state: 1 line: 1 
has_route: True
09:37:54.496: DHCP Client Pooling: ***Allocated IP address: 10.17.1.17
09:37:54.504: RT: add 0.0.0.0/0 via 10.17.1.2, static metric [254/0]
09:37:54.508: RT: NET-RED 0.0.0.0/0
09:37:54.512: RT: default path is now 0.0.0.0 via 10.17.1.2
09:37:54.512: RT: new default network 0.0.0.0
09:37:54.512: RT: NET-RED 0.0.0.0/0

References

  • RFC 2131: State transition diagram for DHCP clients
  • DHCP client finite state machine from the TCP/IP guide

Retrieved from "http://wiki.nil.com/DHCP_client_address_change";
Category: DHCP

Views

  • Page
  • Discussion
  • View source
  • History

Personal tools

  • Log in / create account

CT^3

Main menu

  • Training
  • Community

 

Navigation

  • Main Page
  • Authors
  • Related blogs
  • Training
  • Contribute
  • Help

What's new

  • Recent changes
  • New pages
  • Random page

Search

[                    ] [Go]  [Search]
Toolbox

  • What links here
  • Related changes
  • Special pages
  • Printable version
  • Permanent link

Share This!

  • Add to BlogMarks BlogMarks
  • Add to del.icio.us del.icio.us
  • Add to digg digg
  • Add to Facebook Facebook
  • Add to LinkedIn LinkedIn
  • Add to Newsvine Newsvine
  • Add to reddit reddit
  • Add to Slashdot Slashdot

Powered by MediaWiki

  • This page was last modified on 13 November 2009, at 09:52.
  • This page has been accessed 19,475 times.
  • Privacy policy
  • About CT3
  • Disclaimers




-- 
Este mensaje ha sido analizado por MailScanner
en busca de virus y otros contenidos peligrosos,
y se considera que est� limpio.

______________________________________________________________________
Lista de correos del Grupo de Usuarios de Tecnologías Libres de Cuba.
Gutl-l@jovenclub.cu
https://listas.jovenclub.cu/cgi-bin/mailman/listinfo/gutl-l

Responder a