Forum Discussion

bojan_sukalo_20's avatar
bojan_sukalo_20
Icon for Nimbostratus rankNimbostratus
Jul 17, 2015

DHCP relay

Hello,

 

I want to make a dhcp relay on F5 box.

 

OS version is 11.6.

 

F5 is vCMP guest.

 

The problem is I can see on tcpdump that F5 is relaying request towards DHCP server but the problem is that source address in that request is outside address and not the vlan address request came originally from.

 

I've tried following the exact procedure described here:

 

https://support.f5.com/kb/en-us/products/big-ip_ltm/manuals/product/ltm-implementations-11-6-0/29.html

 

The equivalent would be, following the scheme in this document, to have request going from 10.10.0.1 instead from 10.20.0.1. And that, of course, is not good.

 

Please advise!

 

Bojan

 

2 Replies

  • did you also do this:

    Alternate configuration
    
    If the DHCP client subnet includes a BIG-IP system that serves as a hop to the BIG-IP relay agent, you must perform two additional configuration tasks:
    
    You must configure the BIG-IP relay agent to relay the client DHCP requests to the DHCP servers without losing the originating subnet (source) IP address. This originating source IP address is typically a self IP address of the BIG-IP system that resides on the client subnet. You configure the BIG-IP relay agent to preserve the originating source IP address by creating a SNAT that specifies the originating self IP address as both the origin address and the translation address. A SNAT configured in this way prevents the BIG-IP relay agent, before sending the DHCP broadcast message to the DHCP servers, from translating the source IP address of the incoming DHCP request to a different address.
    You must add a route (to the BIG-IP relay agent) that specifies the originating source IP address as the destination for DHCP responses. The DHCP servers use this route to send their responses back through the BIG-IP relay agent to the clients.
    
  • Thank You all, In the end, virtual server was set to drop the packet if there were no explicit allow policy. It was just the matter of adding allow policy under security tab.

     

    Thank You.

     

    Bojan