Grab the packet containing the dhcp request/reply that breaks the win7
client. Wireshark will help you analyze this properly. Sorry, cant help you
more then that.
Feel free to post a raw dump of the packets that breaks win7 and I'll take
a look.

-lsf
24. nov. 2014 14:21 skrev "Jean-Laurent Ivars" <jl.iv...@ipgenius.fr>
følgende:

> i’m so sorry but i don’t see the answer…
>
> 1. I put off 252 option from dhcp server
> 2. I made ipconfig /renew on the host then check the settings where
> corrects
> 3. launch i.e. then press random buttons, the close
> 4. i made ipconfig /all and can see parameter are back to bad ones
>
> If you can understand pore than me, please tell me witch line answer to
> the question…
>
> [2.1.5-RELEASE][r...@toto.tutu.fr]/root(5): tcpdump -i vtnet1 | grep -v
> ARP
> tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
> listening on vtnet1, link-type EN10MB (Ethernet), capture size 96 bytes
> 14:09:24.779450 IP IPG1.tutu.local.bootpc > firewall.ipgenius.fr.bootps:
> BOOTP/DHCP, Request from ee:b4:77:12:46:40 (oui Unknown), length 300
> 14:09:24.779680 IP firewall.ipgenius.fr.bootps > IPG1.tutu.local.bootpc:
> BOOTP/DHCP, Reply, length 300
> 14:09:24.782818 IP IPG1.tutu.local > all-routers.mcast.net: igmp leave
> 224.0.0.252
> 14:09:24.785573 IP IPG1.tutu.local > all-routers.mcast.net: igmp leave
> 224.0.0.252
> 14:09:24.788170 IP6 fe80::a8c6:c004:d018:251.49580 > ff02::1:3.5355: UDP,
> length 25
> 14:09:24.788446 IP IPG1.tutu.local.61967 > 224.0.0.252.5355: UDP, length 25
> 14:09:24.896913 IP6 fe80::a8c6:c004:d018:251.49580 > ff02::1:3.5355: UDP,
> length 25
> 14:09:24.896944 IP IPG1.tutu.local.61967 > 224.0.0.252.5355: UDP, length 25
> 14:09:42.189605 IP IPG1.tutu.local.59770 >
> google-public-dns-b.google.com.domain: 61225+ A? www.google.fr. (31)
> 14:09:42.194543 IP google-public-dns-b.google.com.domain >
> IPG1.tutu.local.59770: 61225 3/0/0 A 173.194.41.55,[|domain]
> 14:09:42.378885 IP IPG1.tutu.local.56421 >
> google-public-dns-b.google.com.domain: 49131+ A? wpad.tutu.local. (33)
> 14:09:42.381022 IP IPG1.tutu.local.bootpc > 255.255.255.255.bootps:
> BOOTP/DHCP, Request from ee:b4:77:12:46:40 (oui Unknown), length 300
> 14:09:42.381247 IP firewall.ipgenius.fr.bootps > IPG1.tutu.local.bootpc:
> BOOTP/DHCP, Reply, length 300
> 14:09:42.398465 IP IPG1.tutu.local.54954 >
> google-public-dns-b.google.com.domain: 20328+ A? ssl.gstatic.com. (33)
> 14:09:42.398756 IP IPG1.tutu.local.55282 >
> google-public-dns-b.google.com.domain: 34794+ A? www.google.com. (32)
> 14:09:42.399292 IP IPG1.tutu.local.62442 >
> google-public-dns-b.google.com.domain: 56847+ A? www.gstatic.com. (33)
> 14:09:42.400054 IP IPG1.tutu.local.58409 >
> google-public-dns-b.google.com.domain: 50690+ A? apis.google.com. (33)
> 14:09:42.402225 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [S], seq 1887194521, win 8192,
> options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
> 14:09:42.403387 IP google-public-dns-b.google.com.domain >
> IPG1.tutu.local.54954: 20328 2/0/0 A 74.125.133.94, (65)
> 14:09:42.403728 IP google-public-dns-b.google.com.domain >
> IPG1.tutu.local.55282: 34794 6/0/0 A 74.125.71.106,[|domain]
> 14:09:42.404148 IP google-public-dns-b.google.com.domain >
> IPG1.tutu.local.62442: 56847 4/0/0 A 173.194.41.55,[|domain]
> 14:09:42.404959 IP google-public-dns-b.google.com.domain >
> IPG1.tutu.local.58409: 50690 7/0/0 CNAME plus.l.google.com.[|domain]
> 14:09:42.414079 IP google-public-dns-b.google.com.domain >
> IPG1.tutu.local.56421: 49131 NXDomain 0/1/0 (108)
> 14:09:42.414202 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [S.], seq 888602616, ack 1887194522, win
> 42900, options [mss 1430,nop,nop,sackOK,nop,wscale 7], length 0
> 14:09:42.414342 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 1, win 32890, length 0
> 14:09:42.415316 IP6 fe80::a8c6:c004:d018:251.52455 > ff02::1:3.5355: UDP,
> length 22
> 14:09:42.415485 IP IPG1.tutu.local.63116 > 224.0.0.252.5355: UDP, length 22
> 14:09:42.424547 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 1, win 32890, length 180
> 14:09:42.436564 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 181, win 344, length 0
> 14:09:42.436780 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 181, win 344, length 1430
> 14:09:42.436886 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 181, win 344, length 1430
> 14:09:42.436926 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 181, win 344, length 1067
> 14:09:42.436970 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 1431, win 32890, length 0
> 14:09:42.437006 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 3928, win 32890, length 0
> 14:09:42.443820 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 3928, win 32890, length 126
> 14:09:42.455955 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 307, win 344, length 51
> 14:09:42.456626 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 3979, win 32877, length 0
> 14:09:42.484097 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 3979, win 32877, length 548
> 14:09:42.521885 IP6 fe80::a8c6:c004:d018:251.52455 > ff02::1:3.5355: UDP,
> length 22
> 14:09:42.521912 IP IPG1.tutu.local.63116 > 224.0.0.252.5355: UDP, length 22
> 14:09:42.535970 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 0
> 14:09:42.573992 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 855, win 353, length 1416
> 14:09:42.574084 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.574115 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 855, win 353, length 1402
> 14:09:42.574174 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.574199 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.574217 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.574249 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 855, win 353, length 1374
> 14:09:42.574270 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.574302 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.574322 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.574382 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 5395, win 32890, length 0
> 14:09:42.574414 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 8227, win 32890, length 0
> 14:09:42.574448 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 11087, win 32890, length 0
> 14:09:42.574476 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 13891, win 32890, length 0
> 14:09:42.574517 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 16751, win 32175, length 0
> 14:09:42.574564 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 18181, win 31817, length 0
> 14:09:42.576036 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 18181, win 32890, length 0
> 14:09:42.586323 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586426 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 19611, win 32890, length 0
> 14:09:42.586584 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586618 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586666 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586689 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586711 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586741 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586773 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 855, win 353, length 1430
> 14:09:42.586797 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586817 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586854 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586878 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586906 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 855, win 353, length 1430
> 14:09:42.586932 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 855, win 353, length 1039
> 14:09:42.586988 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 22471, win 32890, length 0
> 14:09:42.587024 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 25331, win 32890, length 0
> 14:09:42.587068 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 28191, win 32532, length 0
> 14:09:42.587108 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 31051, win 31817, length 0
> 14:09:42.587147 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 32481, win 31460, length 0
> 14:09:42.587187 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 35341, win 30745, length 0
> 14:09:42.587228 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 37810, win 30127, length 0
> 14:09:42.681305 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 37810, win 30995, length 0
> 14:09:42.681383 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 37810, win 32890, length 0
> 14:09:42.725225 IP IPG1.tutu.local.netbios-ns >
> 192.168.254.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
> 14:09:42.883913 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 37810, win 32890, length
> 1130
> 14:09:42.893028 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [S], seq 3004206825, win 8192,
> options [mss 1460,nop,wscale 2,nop,nop,sackOK], length 0
> 14:09:42.895926 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [.], ack 1985, win 370, length 0
> 14:09:42.905107 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [S.], seq 3703826050, ack 3004206826, win
> 42900, options [mss 1430,nop,nop,sackOK,nop,wscale 7], length 0
> 14:09:42.905255 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 1, win 32890, length 0
> 14:09:42.905482 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 1, win 32890, length 212
> 14:09:42.905756 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 1985, win 370, length 264
> 14:09:42.905891 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 38074, win 32824, length 0
> 14:09:42.906056 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 38074, win 32824, length
> 1017
> 14:09:42.917462 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 213, win 344, length 0
> 14:09:42.918605 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 213, win 344, length 1430
> 14:09:42.918687 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 213, win 344, length 1430
> 14:09:42.918713 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 213, win 344, length 1067
> 14:09:42.918789 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 1431, win 32890, length 0
> 14:09:42.918809 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 3928, win 32890, length 0
> 14:09:42.925292 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 3928, win 32890, length 126
> 14:09:42.926639 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 3002, win 388, length 264
> 14:09:42.926762 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 38338, win 32758, length 0
> 14:09:42.937551 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 339, win 344, length 51
> 14:09:42.937663 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 3979, win 32877, length 0
> 14:09:43.474994 IP IPG1.tutu.local.netbios-ns >
> 192.168.254.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
> 14:09:44.225166 IP IPG1.tutu.local.netbios-ns >
> 192.168.254.255.netbios-ns: NBT UDP PACKET(137): QUERY; REQUEST; BROADCAST
> 14:09:44.233400 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 38338, win 32758, length
> 791
> 14:09:44.263686 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 3793, win 406, length 990
> 14:09:44.263873 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 39328, win 32890, length 0
> 14:09:44.265555 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 3793, win 406, length 161
> 14:09:44.265662 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 39489, win 32849, length 0
> 14:09:44.314781 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 39489, win 32849, length
> 666
> 14:09:44.336461 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 4459, win 423, length 264
> 14:09:44.336636 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 39753, win 32783, length 0
> 14:09:44.339474 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 39753, win 32783, length
> 793
> 14:09:44.370144 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49184: Flags [P.], ack 5252, win 441, length 838
> 14:09:44.370298 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 40591, win 32574, length 0
> 14:09:44.471118 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 3979, win 32877, length 794
> 14:09:44.500381 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1133, win 356, length 912
> 14:09:44.500545 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 4891, win 32649, length 0
> 14:09:44.502196 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1133, win 356, length 139
> 14:09:44.502338 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 5030, win 32614, length 0
> 14:09:44.624278 IP IPG1.tutu.local.49184 >
> par03s14-in-f23.1e100.net.https: Flags [R.], seq 5252, ack 40591, win 0,
> length 0
> 14:09:44.625506 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 5030, win 32614, length 849
> 14:09:44.676831 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 1982, win 370, length 0
> 14:09:44.704497 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 1416
> 14:09:44.704534 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 234
> 14:09:44.704679 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 6680, win 32890, length 0
> 14:09:45.126141 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 1416
> 14:09:45.126177 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 1982, win 370, length 1430
> 14:09:45.126229 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 1402
> 14:09:45.126254 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 1982, win 370, length 1430
> 14:09:45.126280 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 1982, win 370, length 1430
> 14:09:45.126314 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 1388
> 14:09:45.126341 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 396
> 14:09:45.126445 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 9526, win 32890, length 0
> 14:09:45.126485 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 10928, win 32539, length 0
> 14:09:45.126536 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 13788, win 32890, length 0
> 14:09:45.126591 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 15176, win 32543, length 0
> 14:09:45.126636 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 15572, win 32890, length 0
> 14:09:45.137694 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 1416
> 14:09:45.137841 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 16988, win 32536, length 0
> 14:09:45.138466 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 1982, win 370, length 1430
> 14:09:45.138508 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 1275
> 14:09:45.138614 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 19693, win 32890, length 0
> 14:09:45.145145 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [P.], ack 1982, win 370, length 239
> 14:09:45.145281 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [.], ack 19932, win 32830, length 0
> 14:09:45.212081 IP IPG1.tutu.local.49185 >
> par03s14-in-f23.1e100.net.https: Flags [P.], ack 19932, win 32830, length
> 1143
> 14:09:45.224186 IP par03s14-in-f23.1e100.net.https >
> IPG1.tutu.local.49185: Flags [.], ack 3125, win 388, length 0
> ^C190 packets captured
> 190 packets received by filter
> 0 packets dropped by kernel
>
> ------------------------------
>     *Jean-Laurent Ivars *
> *Responsable Technique | Technical Manager*
> 22, rue Robert - 13007 Marseille
> Mobile: 06.52.60.86.47 - Tel: 09 84 56 64 30 - Fax: 09 89 56 64 30
> Linkedin <http://fr.linkedin.com/in/jlivars/>   |  Viadeo
> <http://www.viadeo.com/fr/profile/jean-laurent.ivars>   |  www.ipgenius.fr
>
> Le 24 nov. 2014 à 13:56, Espen Johansen <pfse...@gmail.com> a écrit :
>
> Tcpdump and you will know the answer to that.
> 24. nov. 2014 13:35 skrev "Jean-Laurent Ivars" <jl.iv...@ipgenius.fr>
> følgende:
>
>> Well thank you for your answer, this is exactly the same result that when
>> i set the option 252 with null parameters in the DHCP
>> (WindowsProxyAutodiscoveryDetection)
>>
>> But this is workaround, the real question is why the dhcp server is not
>> providing the rights settings ?
>>
>>
>> Jean-Laurent Ivars
>> Responsable Technique | Technical Manager
>> 22, rue Robert - 13007 Marseille
>> Mobile: 06.52.60.86.47 - Tel: 09 84 56 64 30 - Fax: 09 89 56 64 30
>> Linkedin   |  Viadeo   |  www.ipgenius.fr
>>
>> > Le 24 nov. 2014 à 13:24, Doug Lytle <supp...@drdos.info> a écrit :
>> >
>> >>> What happens (only for the win7 hosts, other are perfects, bad win7
>> nasty nasty) after a few second, and especially when you launch i.e. win7
>> seem to make some kind of new dhcp request
>> >
>> > Just a hunch,
>> >
>> > On the Windows 7 machine, go into Control Panel => Internet Options =>
>> Connections Tab => Lan Settings
>> >
>> > Uncheck 'Automatically Detect Settings'
>> >
>> > Doug
>> > _______________________________________________
>> > List mailing list
>> > List@lists.pfsense.org
>> > https://lists.pfsense.org/mailman/listinfo/list
>>
>>
>> _______________________________________________
>> List mailing list
>> List@lists.pfsense.org
>> https://lists.pfsense.org/mailman/listinfo/list
>
> _______________________________________________
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list
>
>
>
> _______________________________________________
> List mailing list
> List@lists.pfsense.org
> https://lists.pfsense.org/mailman/listinfo/list
>
_______________________________________________
List mailing list
List@lists.pfsense.org
https://lists.pfsense.org/mailman/listinfo/list

Reply via email to