wireless client is not getting ip address from dhcp server via CAS server,
here is the scenario,
1. inband cas network configuration:
Trusted Interface (to protected network)
Untrusted Interface (to managed network)
Set management VLAN ID:
Pass through VLAN ID to managed network
Set management VLAN ID:
Pass through VLAN ID to protected network
2. wireless clients are in untrusted vlan which is 104 and I've mapped the 104 vlan to 400 (trusted vlan)
untrusted vlan trusted vlan
3. Managed subent
ip subent vlan
10.161.136.5 / 255.255.248.0 140
10.161.136.5 is ip subnet for trusted vlan 400
4. ARP entry is not configured
in switch, untrusted and trusted ports are configured as trunk port and allowed untrusted and trusted vlans respectively.
when we move wireless client into vlan 400 manually its getting ip address but when wireless client is in vlan 140 its not getting ip address and in switch configuration both trusted and untrusted ports are trunk port and using native vlan is 1
from WLC to switch port is also trunk port and allowed for all vlans
do I need to configure ARP entries or what other configurations are needed to work CAS as a DHCP passthrough.
Thank you for your answer. DHCP passthrough is now working without changing anything in CAS. Some vlan configuration wasn't in switch so that I got the problem. we have configuration of CAS is in HA mode in HSRP environment. and current configuration which I have posted here is working smoothly. I want to know the impact of corrent configuration (different ip address of trusted interface and untrusted interface, passthrough VLAN ID to managed network is checked).
now I need to configure ADsso. can you please check the ktpass command and suggest me it is correct or not?
environment is here..
Number of DCs = 3 OS of DCs = windows 2008 standard (SP2) AD domain functionality = Mixed mode with 2003 Domain name = laxman.com
DocumentationCode download linksGoalRequirementLimitationsSupported ISR
and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationConfigure one of the connectivity
options to access the Cisco IMC from the n...
Firepower Threat Defense (NGFWv) on UCS E-series - Transparent Mode in
HA DocumentationCode download linksGoalRequirementLimitationsSupported
ISR and UCS-E ModelSupported ISRG2 and UCS-E Blades:Supported ISR4K and
UCS-E Blades:Step by Step ConfigurationCo...
Question I am currently unable to specify "crypto keyring" command when
configuring VPN connection on my cisco 2901 router. The following
licenses have been activated on my router :