- Configuring the Cisco IOS XE DHCP Server
- Configuring the DHCP Server On-Demand Address Pool Manager
- Configuring the Cisco IOS XE DHCP Relay Agent
- DHCP Relay Server ID Override and Link Selection Option 82 Suboptions
- DHCP Server RADIUS Proxy
- Configuring the Cisco IOS XE DHCP Client
- Configuring DHCP Services for Accounting and Security
- ISSU and SSO--DHCP High Availability Features
- DHCPv6 Relay and Server - MPLS VPN Support
- IPv6 Access Services: DHCPv6 Relay Agent
- IPv6 Access Services: Stateless DHCPv6
- IPv6 Access Services: DHCPv6 Prefix Delegation
- DHCP for IPv6 Broadband
- DHCPv6 Server Stateless Autoconfiguration
- DHCP Server MIB
- Finding Feature Information
- Prerequisites for Configuring the DHCP Server On-Demand Address Pool Manager
- Restrictions for Configuring the DHCP Server On-Demand Address Pool Manager
- Information About the DHCP Server On-Demand Address Pool Manager
- How to Configure the DHCP Server On-Demand Address Pool Manager
- How to Configure DHCP ODAP Subnet Allocation Server Support
- Configuration Examples for DHCP Server On-Demand Address Pool Manager
- Defining DHCP ODAPs as the Global Default Mechanism Example
- Defining DHCP ODAPs on an Interface Example
- Configuring the DHCP Pool as an ODAP Example
- Configuring the DHCP Pool as an ODAP for Non-MPLS VPNs Example
- Configuring AAA and RADIUS Example
- Configuring a Global Pool for a Subnet Allocation Server Example
- Configuring a VRF Pool for a Subnet Allocation Server Example
- Using a VPN ID to Configure a VRF Pool on a Subnet Allocation Server Example
- Verifying Local Configuration on a Subnet Allocation Server Example
- Verifying Address Pool Allocation Information Example
- Verifying Subnet Allocation and DHCP Bindings Example
- Additional References
- Feature Information for the DHCP Server On-Demand Address Pool Manager
- Glossary
Configuring the DHCP Server On-Demand Address Pool Manager
The Cisco IOS XE DHCP server on-demand address pool (ODAP) manager is used to centralize the management of large pools of addresses and simplify the configuration of large networks. ODAP provides a central management point for the allocation and assignment of IP addresses. When a Cisco IOS XE router is configured as an ODAP manager, pools of IP addresses are dynamically increased or reduced in size depending on the address utilization level. A DHCP pool configured in the router can also be used as an IP address pooling mechanism. The IP address pooling mechanism is configured in the router to specify the source of IP addresses for PPP peers.
- Finding Feature Information
- Prerequisites for Configuring the DHCP Server On-Demand Address Pool Manager
- Restrictions for Configuring the DHCP Server On-Demand Address Pool Manager
- Information About the DHCP Server On-Demand Address Pool Manager
- How to Configure the DHCP Server On-Demand Address Pool Manager
- How to Configure DHCP ODAP Subnet Allocation Server Support
- Configuration Examples for DHCP Server On-Demand Address Pool Manager
- Additional References
- Feature Information for the DHCP Server On-Demand Address Pool Manager
- Glossary
Finding Feature Information
Your software release may not support all the features documented in this module. For the latest caveats and feature information, see Bug Search Tool and the release notes for your platform and software release. To find information about the features documented in this module, and to see a list of the releases in which each feature is supported, see the feature information table.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Prerequisites for Configuring the DHCP Server On-Demand Address Pool Manager
Before you configure the ODAP manager, you should understand the concepts documented in the “DHCP Overview” module.
You must configure standard Multiprotocol Label Switching (MPLS) Virtual Private Networks (VPNs) unless you intend to use non-MPLS VPNs.
In order for the IP address pooling mechanism to work correctly, the VPN routing and forwarding instance (VRF) of the PPP session must match that configured on the pool. Typically this matching is done either by configuring the ip vrf forwarding vrf-name command on the virtual template interface, or if AAA is used to authorize the PPP user, it can be part of the user’s profile configuration.
Note | For a default session, you can apply access interface VRF and VRF service simultaneously. |
Restrictions for Configuring the DHCP Server On-Demand Address Pool Manager
The ip dhcp excluded-address global configuration command cannot be used to exclude addresses from VRF associated pools.
The vrf DHCP pool configuration command is currently not supported for host pools.
Attribute inheritance is not supported on VRF pools.
A router can be configured as a subnet allocation server and a DHCP server at the same time with one restriction: separate pools must be created for subnet allocation and IP address assignment. An address pool cannot be used by DHCP for both subnet allocation and IP address assignment.
Information About the DHCP Server On-Demand Address Pool Manager
ODAP Manager Operation
ODAPs enable pools of IP addresses to be dynamically increased or reduced in size depending on the address utilization level. Once configured, the ODAP is populated with one or more subnets leased from a source server and is ready to serve address requests from DHCP clients or from PPP sessions. The source server can be a remote DHCP server or a RADIUS server (via AAA). Currently, only the Cisco Access Registrar RADIUS server supports ODAPs. Subnets can be added to the pool when a certain utilization level (high utilization mark) is achieved. When the utilization level falls below a certain level (low utilization mark), a subnet can be returned to the server from which it was originally leased. Summarized routes for each leased subnet must be inserted or removed from the related VRF with each addition or removal of subnets into the ODAP.
ODAPs support address assignment using DHCP for customers using private addresses such as in MPLS VPNs. VPNs allow the possibility that two pools in separate networks can have the same address space, with private network addresses, served by the same DHCP server. These IP addresses can be distinguished by a VPN identifier to help select the VPN to which the client belongs.
Each ODAP is configured and associated with a particular MPLS VPN. Cisco IOS XE software also supports non-MPLS VPN address pools by adding pool name support to the peer default ip address dhcp-pool pool-namecommand.
For MPLS VPNs, each VPN is associated with one or more VRFs. The VRF is a key element in the VPN technology because it maintains the routing information that defines a customer VPN site. This customer site is attached to a provider edge (PE) router. A VRF consists of an IP routing table, a derived Cisco Express Forwarding (CEF) table, a set of interfaces that use the forwarding table, and a set of rules and routing protocol parameters that control the information that is included in the routing table.
A PPP session belonging to a specific VPN is only allocated an address from the ODAP associated with that VPN. These PPP sessions are terminated on a Virtual Home Gateway (VHG)/PE router where the ODAP is configured. The VHG/PE router maps the remote user to the corresponding MPLS VPNs.
For PPP sessions, individual address allocation from an ODAP follows a First Leased subnet First (FLF) policy. FLF searches for a free address beginning on the first leased subnet, followed by a search on the second leased subnet if no free address is available in the first subnet, and so on. This policy provides the benefit of grouping the leased addresses over time to a set of subnets, which allows an efficient subnet release and route summarization.
However, the FLF policy differs from the normal DHCP address selection policy. Normal DHCP address selection takes into account the IP address of the receiving interface or the gateway address if it is nonzero. To support both policies, the DHCP server needs to be able to distinguish between a normal DHCP address request and an address request for a PPP client. The ODAP manager uses an IP address pooling mechanism for PPP that allows the DHCP server to distinguish between a normal DHCP address request and a request from a PPP client.
Subnet release from an ODAP follows a Last Leased subnet First (LLF) policy, which prefers the last leased subnet to be released first. This LLF policy searches for a releasable subnet (a subnet with no addresses currently being leased) starting with the last leased subnet. If a releasable subnet is found (candidate subnet), it is released, and the summarized route for that subnet is removed. If more than one releasable subnet exists at that time, only the most recently allocated is released. If there are no releasable subnets, no action is taken. If by releasing the candidate subnet, the high utilization mark is reached, the subnet is not released. The first leased subnet is never released (regardless of the instantaneous utilization level) until the ODAP is disabled.
When a DHCP pool receives multiple subnets from an upstream DHCP server, an address from each subnet is automatically configured on the client connected interface so that the addresses within the subnets can be requested by DHCP clients.
The first address in the first subnet is automatically assigned to the primary address on the interface. The first address of each subsequent subnet is assigned to secondary addresses on the interface. In addition, as client addresses are reclaimed, the count of lease addresses for that subnet is decremented. Once a lease counter for a subnet reaches zero (that is, lease expiry), the subnet is returned to the pool. The previous address on the interface is removed and the first secondary address on the interface is promoted as the primary address of the interface.
The figure below shows an ODAP manager configured on the Cisco IOS XE DHCP server. The ODAP requests an initial pool from the AAA server. Clients make DHCP requests and the DHCP server fulfills requests from the pool. When the utilization rate meets 90 percent, the ODAP manager requests an expansion and the AAA server allocates another subnet from which the ODAP manager can allocate addresses.
Subnet Allocation Server Operation
You can also configure the ODAP manager to allocate subnets instead of individual IP addresses.
This capability allows the network operator to configure a Cisco IOS XE router as a subnet allocation server. The operation of a subnet allocation server is similar to the operation of a DHCP server, except that pools of subnets are created and assigned instead of pools of IP addresses. Subnet allocation pools are created and configured by using the subnet prefix-length command in DHCP pool configuration mode. The size of each assigned or allocated subnet is set by the prefix-length argument, using standard Common InterDomain Routing (CIDR) bit count notation to determine the number of addresses that are configured in each subnet lease.
When a DHCP server is configured as a subnet allocation server, it provides subnet allocation pools for ODAP manager allocation. In the figure below, Router B is the subnet allocation server and allocates subnets to the ODAP manager based on the demand for IP addresses and subnet availability. Router B is configured to allocate an initial amount of address space in the form of subnets to the ODAP manager. The size of the subnet allocated by the ODAP manager is determined by the subnet size that is configured on the subnet allocation server. The ODAP manager will then assign addresses to clients from these subnets and allocate more subnets as the need for address space increases.
When the ODAP manager allocates a subnet, the subnet allocation server creates a subnet binding. This binding is stored in the DHCP database for as long as the ODAP manager requires the address space. The binding is removed and the subnet is returned to the subnet pool only when the ODAP manager releases the subnet as address space utilization decreases.
The subnet allocation server can also be associated with a VRF. A VRF consists of an IP routing table, a derived CEF table, a set of interfaces that use the forwarding table, and a set of rules and routing protocol parameters that control the information that is included in the routing table.
Benefits of Using ODAPs
Efficient Address Management
The ODAP manager allows customers to optimize their use of IP addresses, thus conserving address space.
Efficient Route Summarization and Update
The ODAP manager inserts a summarized route when a subnet is added to the ODAP.
Multiple VRF and Independent Private Addressing Support
The ODAP manager automatically injects subnet routing information into the appropriate VRF.
How to Configure the DHCP Server On-Demand Address Pool Manager
- Defining DHCP ODAPs as the Global Default Mechanism
- Defining DHCP ODAPs on an Interface
- Configuring the DHCP Pool as an ODAP
- Configuring ODAPs to Obtain Subnets Through IPCP Negotiation
- Configuring AAA
- Configuring RADIUS
- Disabling ODAPs
- Verifying ODAP Operation
- Monitoring and Maintaining the ODAP
Defining DHCP ODAPs as the Global Default Mechanism
Perform this task to specify that the global default mechanism to use is on-demand address pooling.
IP addressing allows configuration of a global default address pooling mechanism. The DHCP server needs to be able to distinguish between a normal DHCP address request and an address request for a PPP client.
1.
enable
2.
configure
terminal
3.
ip
address-pool
dhcp-pool
DETAILED STEPS
Defining DHCP ODAPs on an Interface
Perform this task to configure on-demand address pools on an interface.
The interface on-demand address pooling configuration overrides the global default mechanism on that interface.
1.
enable
2.
configure
terminal
3.
interface
type
number
4.
peer
default
ip
address
dhcp-pool
[pool-name]
DETAILED STEPS
Configuring the DHCP Pool as an ODAP
Perform this task to configure a DHCP address pool as an ODAP pool.
1.
enable
2.
configure
terminal
3.
ip
dhcp
pool
pool-name
4.
vrf
name
5.
origin
{dhcp | aaa| ipcp} [subnet size initial size [autogrow size]]
6.
utilization
mark
low
percentage-number
7.
utilization
mark
high
percentage-number
8.
end
9.
show
ip
dhcp
pool
[pool-name]
DETAILED STEPS
Configuring ODAPs to Obtain Subnets Through IPCP Negotiation
Perform this task to configure your router to use subnets obtained through IP Control Protocol (IPCP) negotiation.
You can assign IP address pools to customer premises equipment (CPE) devices, which, in turn, assign IP addresses to the CPE and to a DHCP pool. This functionality has three requirements:
The Cisco IOS XE CPE device must be able to request and use the subnet.
The RADIUS server (via AAA) must be able to provide that subnet and insert the framed route into the proper VRF table.
The PE router must be able to facilitate providing the subnet through (IPCP) negotiation.
1.
enable
2.
configure
terminal
3.
ip
dhcp
pool
pool-name
4.
import
all
5.
origin
ipcp
6.
exit
7.
interface
type
number
8.
ip
address
pool
pool-name
DETAILED STEPS
Configuring AAA
Perform this task to configure AAA.
To allow ODAP to obtain subnets from the AAA server, the AAA client must be configured on the VHG/PE router.
- aaa accounting network default start-stop group radius
- or
- aaa accounting network default stop-only group radius
1.
enable
2.
configure
terminal
3.
aaa
new-model
4.
aaa
authorization
configuration
default
group
radius
5.
Do one of the following:
6.
aaa
session-id
common
DETAILED STEPS
Configuring RADIUS
ODAP AAA Profile
The AAA server sends the RADIUS Cisco AV pair attributes “pool-addr” and “pool-mask” to the Cisco IOS XE DHCP server in the access request and access accept. The pool-addr attribute is the IP address and the pool-mask attribute is the network mask (for example, pool-addr=192.168.1.0 and pool-mask=255.255.0.0). Together, these attributes make up a network address (address/mask) that is allocated by the AAA server to the Cisco IOS XE DHCP server.
1.
enable
2.
configure
terminal
3.
ip
radius
source-interface
subinterface-name
4.
radius-server
host
ip-address
auth-port
port-number
acct-port
port-number
5.
radius
server
attribute
32
include-in-access-req
6.
radius
server
attribute
44
include-in-access-req
7.
radius-server
vsa
send
accounting
8.
radius-server
vsa
send
authentication
DETAILED STEPS
Disabling ODAPs
This task shows how to disable an ODAP from a DHCP pool.
When an ODAP is disabled, all leased subnets are released. If active PPP sessions are using addresses from the released subnets, those sessions will be reset. DHCP clients leasing addresses from the released subnets will not be able to renew their leases.
1.
enable
2.
configure
terminal
3.
ip
dhcp
pool
pool-name
4.
no
origin
{dhcp| aaa| ipcp}
DETAILED STEPS
Verifying ODAP Operation
Perform this task to verify ODAP operation.
1.
enable
2.
show
ip
dhcp
pool
[pool-name]
The following output is for two DHCP pools: Green and Global. Pool Green is configured with a high utilization mark of 50 and a low utilization mark of 30. The pool is also configured to obtain more subnets when the high utilization mark is reached (autogrow). The Subnet size field indicates the values configured in the origin command as the initial and incremental subnet sizes that would be requested by the pool named Green. The Total addresses field is a count of all the usable addresses in the pool. The Leased addresses field is a total count of how many bindings were created from the pool. The Pending event field shows subnet request, which means that a subnet request is pending for the pool. The subnet request was scheduled because the Leased addresses count has exceeded the high utilization level of the pool. Subnets currently added to pool Green are shown in sequence. The Current index column shows the address that would be allocated next from this subnet. The IP address range column shows the range of usable addresses from the subnet. The Leased addresses column shows individual count of bindings created from each subnet. Three subnets are currently added to pool Green. The first two subnets have used all their addresses and thus the Current index is showing 0.0.0.0.
Notice that pool Green and pool Global can have the same subnet (172.16.0.1-172.16.0.6) because pool Green is configured to be in VRF Green, while pool Global is configured to be in the global address space.
3.
show
ip
dhcp
binding
The following output shows the bindings from pool Green. The Type field shows On-demand, which indicates that the address binding was created for a PPP session. The Lease expiration field shows Infinite, which means that the binding is valid as long as the session is up. If a subnet must be released back to the leasing server while the session is still up, the session is reset so that it will be forced to obtain a new IP address. The Hardware address column for an On-demand entry shows the identifier for the session as detected by PPP. There are no bindings shown under the Bindings from all pools not associated with VRF field because the Global pool has not allocated any addresses.
DETAILED STEPS
Step 1 |
enable
Enables privileged EXEC mode. Enter your password if prompted. Example: Router> enable |
Step 2 |
show
ip
dhcp
pool
[pool-name]
The following output is for two DHCP pools: Green and Global. Pool Green is configured with a high utilization mark of 50 and a low utilization mark of 30. The pool is also configured to obtain more subnets when the high utilization mark is reached (autogrow). The Subnet size field indicates the values configured in the origin command as the initial and incremental subnet sizes that would be requested by the pool named Green. The Total addresses field is a count of all the usable addresses in the pool. The Leased addresses field is a total count of how many bindings were created from the pool. The Pending event field shows subnet request, which means that a subnet request is pending for the pool. The subnet request was scheduled because the Leased addresses count has exceeded the high utilization level of the pool. Subnets currently added to pool Green are shown in sequence. The Current index column shows the address that would be allocated next from this subnet. The IP address range column shows the range of usable addresses from the subnet. The Leased addresses column shows individual count of bindings created from each subnet. Three subnets are currently added to pool Green. The first two subnets have used all their addresses and thus the Current index is showing 0.0.0.0.
Notice that pool Green and pool Global can have the same subnet (172.16.0.1-172.16.0.6) because pool Green is configured to be in VRF Green, while pool Global is configured to be in the global address space.
Example: Router# show ip dhcp pool Pool Green : Utilization mark (high/low) : 50 / 30 Subnet size (first/next) : 24 / 24 (autogrow) VRF name : Green Total addresses : 18 Leased addresses : 13 Pending event : subnet request 3 subnets are currently in the pool : Current index IP address range Leased addresses 0.0.0.0 172.16.0.1 - 172.16.0.6 6 0.0.0.0 172.16.0.9 - 172.16.0.14 6 172.16.0.18 172.16.0.17 - 172.16.0.22 1 Pool Global : Utilization mark (high/low) : 100 / 0 Subnet size (first/next) : 24 / 24 (autogrow) Total addresses : 6 Leased addresses : 0 Pending event : none 1 subnet is currently in the pool : Current index IP address range Leased addresses 172.16.0.1 172.16.0.1 - 172.16.0.6 0 |
Step 3 |
show
ip
dhcp
binding
The following output shows the bindings from pool Green. The Type field shows On-demand, which indicates that the address binding was created for a PPP session. The Lease expiration field shows Infinite, which means that the binding is valid as long as the session is up. If a subnet must be released back to the leasing server while the session is still up, the session is reset so that it will be forced to obtain a new IP address. The Hardware address column for an On-demand entry shows the identifier for the session as detected by PPP. There are no bindings shown under the Bindings from all pools not associated with VRF field because the Global pool has not allocated any addresses. Example: Router# show ip dhcp binding Bindings from all pools not associated with VRF: IP address Hardware address Lease expiration Type Bindings from VRF pool Green: IP address Hardware address Lease expiration Type 172.16.0.1 5674.312d.7465.7374. Infinite On-demand 2d38.3930.39 172.16.0.2 5674.312d.7465.7374. Infinite On-demand 2d38.3839.31 172.16.0.3 5674.312d.7465.7374. Infinite On-demand 2d36.3432.34 172.16.0.4 5674.312d.7465.7374. Infinite On-demand 2d38.3236.34 172.16.0.5 5674.312d.7465.7374. Infinite On-demand 2d34.3331.37 172.16.0.6 5674.312d.7465.7374. Infinite On-demand 2d37.3237.39 172.16.0.9 5674.312d.7465.7374. Infinite On-demand 2d39.3732.36 172.16.0.10 5674.312d.7465.7374. Infinite On-demand 2d31.3637 172.16.0.11 5674.312d.7465.7374. Infinite On-demand 2d39.3137.36 172.16.0.12 5674.312d.7465.7374. Infinite On-demand 2d37.3838.30 172.16.0.13 5674.312d.7465.7374. Infinite On-demand 2d32.3339.37 172.16.0.14 5674.312d.7465.7374. Infinite On-demand 2d31.3038.31 172.16.0.17 5674.312d.7465.7374. Infinite On-demand 2d38.3832.38 172.16.0.18 5674.312d.7465.7374. Infinite On-demand 2d32.3735.31 |
Troubleshooting Tips
You can determine the client identifier by using the debug ip dhcp server packet command. In the following sample output, the client is identified by the value 0b07.1134.a029:
Device# debug ip dhcp server packet DHCPD:DHCPDISCOVER received from client 0b07.1134.a029 through relay 10.1.0.253. DHCPD:assigned IP address 10.1.0.3 to client 0b07.1134.a029. . . .
Monitoring and Maintaining the ODAP
This task shows how to monitor and maintain the ODAP.
Note the following behavior for the clear ip dhcp binding, clear ip dhcp conflict, and clear ip dhcp subnet commands:
If you do not specify the pool pool-name option and an IP address is specified, it is assumed that the IP address is an address in the global address space and will look among all the non-VRF DHCP pools for the specified binding/conflict/subnet.
If you do not specify the pool pool-name option and the * option is specified, it is assumed that all automatic/ or on-demand bindings/conflicts/subnets in all VRF and non-VRF pools are to be deleted.
If you specify both the pool pool-name option and the * option, all automatic or on-demand bindings/conflicts/subnets in the specified pool only will be cleared.
If you specify the pool pool-name option and an IP address, the specified binding/conflict or the subnet containing the specified IP address will be deleted from the specified pool.
1.
enable
2.
clear
ip
dhcp
[pool pool-name] binding {* | address}
3.
clear
ip
dhcp
[pool pool-name] conflict {* | address}
4.
clear
ip
dhcp
[pool pool-name] subnet{*| address}
5.
debug
dhcp
details
6.
debug
ip
dhcp
server
events
7.
show
ip
dhcp
import
8.
show
ip
interface
[type number]
9.
show
ip
dhcp
pool
pool-name
DETAILED STEPS
How to Configure DHCP ODAP Subnet Allocation Server Support
- Configuring a Global Pool on a Subnet Allocation Server
- Configuring a VRF Subnet Pool on a Subnet Allocation Server
- Using a VPN ID to Configure a VRF Subnet Pool on a Subnet Allocation Server
- Verifying the Subnet Allocation and DHCP Bindings
- Troubleshooting the DHCP ODAP Subnet Allocation Server
Configuring a Global Pool on a Subnet Allocation Server
Perform this task to configure a global subnet pool on a subnet allocation server.
Global Subnet Pools
Global subnet pools are created in a centralized network. The ODAP manager allocates subnets from the subnet allocation server based on subnet availability. When the ODAP manager allocates a subnet, the subnet allocation server creates a subnet binding. This binding is stored in the DHCP database for as long as the ODAP manager requires the address space. The binding is destroyed and the subnet is returned to the subnet pool only when the ODAP manager releases the subnet as address space utilization decreases.
1.
enable
2.
configure
terminal
3.
ip
dhcp
pool
pool-name
4.
network
network-number
[mask|
/
prefix-length]
5.
subnet
prefix-length
prefix-length
DETAILED STEPS
Configuring a VRF Subnet Pool on a Subnet Allocation Server
VRF Subnet Pools
A subnet allocation server can be configured to assign subnets from VRF subnet allocation pools for MPLS VPN clients. VPN routes between the ODAP manager and the subnet allocation server are configured based on VRF name or VPN ID configuration. The VRF and VPN ID are configured to maintain routing information that defines customer VPN sites. The VPN customer site (or Customer Equipment [CE]) is attached to a provider edge (PE) router. The VRF is used to specify the VPN and consists of an IP routing table, a derived Cisco Express Forwarding (CEF) table, a set of interfaces that use the forwarding table, and a set of rules and routing protocol parameters that control the information that is included in the routing table.
The VRF name and VPN ID can be configured on the ODAP manager and subnet allocation server prior to the configuration of the subnet allocation pool.
1.
enable
2.
configure
terminal
3.
ip
dhcp
pool
pool-name
4.
vrf
vrf-name
5.
network
network-number
[mask |/prefix-length]
6.
subnet
prefix-length
prefix-length
DETAILED STEPS
Using a VPN ID to Configure a VRF Subnet Pool on a Subnet Allocation Server
Perform this task to configure a VRF subnet pool, using a VPN ID, on a subnet allocation server.
VRF Pools and VPN IDs
A subnet allocation server can also be configured to assign subnets from VPN subnet allocation pools based on the VPN ID of a client. The VPN ID (or Organizational Unique Identifier [OUI]) is a unique identifier assigned by the IEEE.
The VRF name and VPN ID can be configured on the ODAP manager and subnet allocation server prior to the configuration of the subnet allocation pool.
1.
enable
2.
configure
terminal
3.
ip
vrf
vrf-name
4.
rd
route-distinguisher
5.
route-target
both
route-target-number
6.
vpn
id
vpn-id
7.
exit
8.
ip
dhcp
pool
pool-name
9.
vrf
vrf-name
10.
network
network-number
[mask |/prefix-length]
11.
subnet
prefix-length
prefix-length
DETAILED STEPS
Verifying the Subnet Allocation and DHCP Bindings
Perform this task to verify subnet allocation and DHCP bindings.
The show ip dhcp pool and show ip dhcp bindingcommands do not need to be issued together or even in the same session as there are differences in the information that is provided. These commands, however, can be used to display and verify subnet allocation and DHCP bindings. The show running-config | begin dhcp command is used to display the local configuration of DHCP and the configuration of the subnet prefix-length command.
1.
enable
2.
show
running-config
| begin dhcp
3.
show
ip
dhcp
pool
[pool-name]
4.
show
ip
dhcp
binding
[ip-address]
DETAILED STEPS
Troubleshooting the DHCP ODAP Subnet Allocation Server
Perform this task to troubleshoot the DHCP ODAP subnet allocation server.
1.
enable
2.
debug
dhcp
[detail]
3.
debug
ip
dhcp
server
{events | packets | linkage}
DETAILED STEPS
Configuration Examples for DHCP Server On-Demand Address Pool Manager
- Defining DHCP ODAPs as the Global Default Mechanism Example
- Defining DHCP ODAPs on an Interface Example
- Configuring the DHCP Pool as an ODAP Example
- Configuring the DHCP Pool as an ODAP for Non-MPLS VPNs Example
- Configuring AAA and RADIUS Example
- Configuring a Global Pool for a Subnet Allocation Server Example
- Configuring a VRF Pool for a Subnet Allocation Server Example
- Using a VPN ID to Configure a VRF Pool on a Subnet Allocation Server Example
- Verifying Local Configuration on a Subnet Allocation Server Example
- Verifying Address Pool Allocation Information Example
- Verifying Subnet Allocation and DHCP Bindings Example
Defining DHCP ODAPs as the Global Default Mechanism Example
The following example shows how to configure the on-demand address pooling mechanism to be used to serve an address request from a PPP client.
ip address-pool dhcp-pool ! ip dhcp pool Green-pool
Defining DHCP ODAPs on an Interface Example
The following example shows how to configure an interface to retrieve an IP address from an on-demand address pool:
interface Virtual-Template1 ip vrf forwarding green ip unnumbered loopback1 ppp authentication chap peer default ip address dhcp-pool !
Configuring the DHCP Pool as an ODAP Example
The following example shows two ODAPs configured to obtain their subnets from an external DHCP server:
Router# show run Building configuration... Current configuration : 3943 bytes ! version 12.2 service timestamps debug uptime service timestamps log uptime no service password-encryption ! hostname Router ! no logging console enable password lab ! username vpn_green_net1 password 0 lab username vpn_red_net1 password 0 lab ip subnet-zero ! ip dhcp pool green_pool vrf Green utilization mark high 60 utilization mark low 40 origin dhcp subnet size initial /24 autogrow /24 ! ip dhcp pool red_pool vrf Red origin dhcp ! ip vrf Green rd 200:1 route-target export 200:1 route-target import 200:1 ! ip vrf Red rd 300:1 route-target export 300:1 route-target import 300:1 ip cef ip address-pool dhcp-pool ! no voice hpi capture buffer no voice hpi capture destination ! interface Loopback0 ip address 1.1.1.1 255.255.255.255 ! interface Loopback1 ip vrf forwarding Green ip address 100.10.10.1 255.255.255.255 ! interface Loopback2 ip vrf forwarding Red ip address 110.10.10.1 255.255.255.255 ! interface ATM2/0/0 no ip address shutdown no atm ilmi-keepalive ! interface ATM3/0/0 no ip address no atm ilmi-keepalive ! interface GigabitEthernet0/0/0 ip address 10.0.105.12 255.255.255.224 duplex half ! interface GigabitEthernet0/0/1 ip address 150.10.10.1 255.255.255.0 duplex half ! interface GigabitEthernet0/0/2 ip address 120.10.10.1 255.255.255.0 duplex half tag-switching ip ! interface Virtual-Template1 ip vrf forwarding Green ip unnumbered Loopback1 ppp authentication chap ! interface Virtual-Template2 ip vrf forwarding Green ip unnumbered Loopback1 ppp authentication chap ! interface Virtual-Template3 ip vrf forwarding Green ip unnumbered Loopback1 ppp authentication chap ! interface Virtual-Template4 ip vrf forwarding Red ip unnumbered Loopback2 ppp authentication chap ! interface Virtual-Template5 ip vrf forwarding Red ip unnumbered Loopback2 ppp authentication chap ! interface Virtual-Template6 ip vrf forwarding Red ip unnumbered Loopback2 ppp authentication chap ! router ospf 100 log-adjacency-changes redistribute connected network 1.1.1.1 0.0.0.0 area 0 network 120.10.10.0 0.0.0.255 area 0 network 150.10.10.0 0.0.0.255 area 0 ! router bgp 100 no synchronization bgp log-neighbor-changes neighbor 3.3.3.3 remote-as 100 neighbor 3.3.3.3 update-source Loopback0 ! address-family ipv4 vrf Red redistribute connected redistribute static no auto-summary no synchronization network 110.0.0.0 exit-address-family ! address-family ipv4 vrf Green redistribute connected redistribute static no auto-summary no synchronization network 100.0.0.0 exit-address-family ! address-family vpnv4 neighbor 3.3.3.3 activate neighbor 3.3.3.3 send-community extended exit-address-family ! ip classless ip route 172.19.0.0 255.255.0.0 10.0.105.1 no ip http server ip pim bidir-enable ! call rsvp-sync ! mgcp profile default ! dial-peer cor custom ! gatekeeper shutdown ! line con 0 exec-timeout 0 0 line aux 0 line vty 0 4 password lab login ! end
Configuring the DHCP Pool as an ODAP for Non-MPLS VPNs Example
The following example shows how to configure an interface to retrieve an IP address from an on-demand address pool. In this example, two non-VRF ODAPs are configured. There are two virtual-templates and two DHCP address pools, usergroup1 and usergroup2. Each virtual-template interface is configured to obtain IP addresses for the peer from the associated address pool.
! ip dhcp pool usergroup1 origin dhcp subnet size initial /24 autogrow /24 lease 0 1 ! ip dhcp pool usergroup2 origin dhcp subnet size initial /24 autogrow /24 lease 0 1 ! interface virtual-template1 ip unnumbered loopback1 peer default ip address dhcp-pool usergroup1 ! interface virtual-template2 ip unnumbered loopback1 peer default ip address dhcp-pool usergroup2
Configuring AAA and RADIUS Example
The following example shows one pool “Green” configured to obtain its subnets from the AAA (RADIUS) server located at IP address 172.16.1.1:
! aaa new-model ! aaa authorization configuration default group radius aaa accounting network default start-stop group radius aaa session-id common ! ip subnet-zero ! ip dhcp ping packets 0 ! ip dhcp pool Green vrf Green utilization mark high 50 utilization mark low 30 origin aaa subnet size initial /28 autogrow /28 ! ip vrf Green rd 300:1 route-target export 300:1 route-target import 300:1 ! interface GigabitEthernet0/1/1 ip address 172.16.1.12 255.255.255.0 duplex half ! interface Virtual-Template1 ip vrf forwarding Green no ip address ! ip radius source-interface GigabitEthernet0/1/1 ! !IP address of the RADIUS server host radius-server host 172.16.1.1 auth-port 1645 acct-port 1646 radius-server retransmit 3 radius-server attribute 32 include-in-access-req radius-server attribute 44 include-in-access-req radius-server key cisco radius-server vsa send accounting radius-server vsa send authentication
Configuring a Global Pool for a Subnet Allocation Server Example
The following example shows how to configure a router to be a subnet allocation server and create a global subnet allocation pool named “GLOBAL-POOL” that allocates subnets from the 10.0.0.0/24 network. The configuration of the subnet prefix-length command in this example configures the size of each subnet that is allocated from the subnet pool to support 254 host IP addresses.
ip dhcp pool GLOBAL-POOL network 10.0.0.0 255.255.255.0 subnet prefix-length 24 !
Configuring a VRF Pool for a Subnet Allocation Server Example
The following example shows how to configure a router to be a subnet allocation server and create a VRF subnet allocation pool named “VRF-POOL” that allocates subnets from the 172.16.0.0/16 network and configures the VPN to match the VRF named “RED.” The configuration of the subnet prefix-length command in this example configures the size of each subnet that is allocated from the subnet pool to support 62 host IP addresses.
ip dhcp pool VRF-POOL vrf RED network 172.16.0.0 /16 subnet prefix-length 26 !
Using a VPN ID to Configure a VRF Pool on a Subnet Allocation Server Example
The following example shows how to configure a router to be a subnet allocation server and create a VRF subnet allocation pool named “VRF-POOL” that allocates subnets from the 192.168.0.0/24 network and configures the VRF named “RED.” The VPN ID must match the unique identifier that is assigned to the client site. The route target and route distinguisher are configured in the as-number:network-number format. The route target and route distinguisher must match. The configuration of the subnet prefix-length command in this example configures the size of each subnet that is allocated from the subnet pool to support 30 host IP addresses.
ip vrf RED rd 100:1 route-target both 100:1 vpn id 1234:123456 exit ip dhcp pool VPN-POOL vrf RED network 192.168.0.0 /24 subnet prefix-length /27 exit
Verifying Local Configuration on a Subnet Allocation Server Example
The following example is output from the show running-configcommand. This command can be used to verify the local configuration on a subnet allocation server. The output from this command displays the configuration of the subnet prefix-length command under the DHCP pool named “GLOBAL-POOL.” The total size of the subnet allocation pool is set to 254 addresses with the network command. The configuration of the subnet prefix-length command configures this pool to allocate a subnet that will support 254 host IP addresses. Because the total pool size supports only 254 addresses, only one subnet can be allocated from this pool.
Router# show running-config | begin dhcp ip dhcp pool GLOBAL-POOL network 10.0.0.0 255.255.255.0 subnet prefix-length 24 !
Verifying Address Pool Allocation Information Example
The following examples are output from the show ip dhcp poolcommand. This command can be used to verify subnet allocation pool configuration on the subnet allocation server and the ODAP manager. The output from this command displays information about the address pool name, utilization level, configured subnet size, total number of addresses (from subnet), pending events, and specific subnet lease information.
The following sample output shows that the configured subnet allocation size is /24 (254 IP addresses), that there is a pending subnet allocation request, and there are no subnets in the pool:
Router> show ip dhcp pool ISP-1 Pool ISP-1 : Utilization mark (high/low) :100 / 0 Subnet size (first/next) :24 / 24 (autogrow) Total addresses :0 Leased addresses :0 Pending event :subnet request 0 subnet is currently in the pool
The next example shows that the configured subnet allocation size is /24 (254 IP address), the configured VRF name is “RED”, and a subnet containing 254 IP addresses has been allocated but no IP addresses have been leased from the subnet:
Router> show ip dhcp pool SUBNET-ALLOC Pool SUBNET-ALLOC : Utilization mark (high/low) :100 / 0 Subnet size (first/next) :24 / 24 (autogrow) VRF name :RED Total addresses :254 Leased addresses :0 Pending event :none 1 subnet is currently in the pool : Current index IP address range Leased addresses 10.0.0.1 10.0.0.1 - 10.0.0.254 0
Verifying Subnet Allocation and DHCP Bindings Example
The following example is from the show ip dhcp binding command. This command can be used to display subnet allocation to DHCP binding mapping information. The output of this command shows the subnet lease to MAC address mapping, the lease expiration, and the lease type (subnet lease bindings are configured to be automatically created and released by default). The output that is generated for DHCP IP address assignment and subnet allocation is almost identical, except that subnet leases display an IP address followed by the subnet mask (which shows the size of the allocated subnet) in CIDR bit count notation. Bindings for individual IP address only display an IP address and are not followed by a subnet mask.
Router# show ip dhcp binding Bindings from all pools not associated with VRF: IP address Client-ID/ Lease expiration Type Hardware address/ User name 10.0.0.0/26 0063.6973.636f.2d64. Mar 29 2009 04:36 AM Automatic 656d.6574.6572.2d47. 4c4f.4241.4c
Additional References
The following sections provide references related to configuring the DHCP ODAP manager.
Related Documents
Related Topic |
Document Title |
---|---|
DHCP commands: complete command syntax, command modes, command history, defaults, usage guidelines, and examples |
Cisco IOS IP Addressing Services Command Reference |
DHCP conceptual information |
“DHCP Overview” module |
DHCP server configuration |
“Configuring the Cisco IOS XE DHCP Server” module |
DHCP client configuration |
“Configuring the Cisco IOS XE DHCP Client” module |
DHCP relay agent configuration |
“Configuring the Cisco IOS XE DHCP Relay Agent” module |
DHCP advanced features |
“Configuring DHCP Services for Accounting and Security” module |
Standards
Standards |
Title |
---|---|
No new or modified standards are supported by this functionality. |
-- |
MIBs
MIBs |
MIBs Link |
---|---|
No new or modified MIBs are supported by this feature. |
To locate and download MIBs for selected platforms, Cisco IOS XE software releases, and feature sets, use Cisco MIB Locator found at the following URL: |
RFCs
RFCs |
Title |
---|---|
RFC 951 |
Bootstrap Protocol (BOOTP) |
RFC 1542 |
Clarifications and Extensions for the Bootstrap Protocol |
RFC 2131 |
Dynamic Host Configuration Protocol |
RFC 2685 |
Virtual Private Networks Identifier |
RFC 3046 |
DHCP Relay Information Option |
Technical Assistance
Description |
Link |
---|---|
The Cisco Support website provides extensive online resources, including documentation and tools for troubleshooting and resolving technical issues with Cisco products and technologies. To receive security and technical information about your products, you can subscribe to various services, such as the Product Alert Tool (accessed from Field Notices), the Cisco Technical Services Newsletter, and Really Simple Syndication (RSS) Feeds. Access to most tools on the Cisco Support website requires a Cisco.com user ID and password. |
Feature Information for the DHCP Server On-Demand Address Pool Manager
The following table provides release information about the feature or features described in this module. This table lists only the software release that introduced support for a given feature in a given software release train. Unless noted otherwise, subsequent releases of that software release train also support that feature.
Use Cisco Feature Navigator to find information about platform support and Cisco software image support. To access Cisco Feature Navigator, go to www.cisco.com/go/cfn. An account on Cisco.com is not required.
Feature Name |
Releases |
Feature Configuration Information |
---|---|---|
DHCP Server On-Demand Address Pool Manager for Non-MPLS VPNs |
Cisco IOS XE Release 2.3 Cisco IOS XE Release 3.9S |
This feature was enhanced to provide ODAP support for non-MPLS VPNs. The following command was modified by this feature: peer default ip address |
DHCP ODAP Server Support |
Cisco IOS XE Release 2.3 Cisco IOS XE Release 3.9S |
This feature introduces the capability to configure a DHCP server (or router) as a subnet allocation server. This capability allows the Cisco IOS DHCP server to be configured with a pool of subnets for lease to ODAP clients. The following commands were introduced or modified by this feature: subnet prefix-length and show ip dhcp binding |
DHCP Server On-Demand Address Pool Manager |
Cisco IOS XE Release 2.3 |
The ODAP manager is used to centralize the management of large pools of addresses and simplify the configuration of large networks. ODAP provides a central management point for the allocation and assignment of IP addresses. When a Cisco IOS router is configured as an ODAP manager, pools of IP addresses are dynamically increased or reduced in size depending on the address utilization level. The following commands were introduced by this feature: aaa session-id, clear ip dhcp subnet, ip address pool, ip dhcp aaa default username, origin, show ip dhcp pool, utilization mark high, utilization mark low, vrf. The following commands were modified by this feature: clear ip dhcp binding, clear ip dhcp conflict, ip address-pool, peer default ip address. |
Glossary
AAA --authentication, authorization, and accounting. Suite of network security services that provide the primary framework through which access control can be set up on your Cisco router or access server.
Cisco Access Registrar --A RADIUS server that supports service provider deployment of access services by centralizing AAA information and simplifying provisioning and management.
client --A host trying to configure its interface (obtain an IP address) using DHCP or BOOTP protocols.
DHCP --Dynamic Host Configuration Protocol.
incremental subnet size --The desired size of the second and subsequent subnets requested for an on-demand pool.
initial subnet size --The desired size of the first subnet requested for an on-demand pool.
IPCP --IP Control Protocol. Protocol that establishes and configures IP over PPP.
MPLS --Multiprotocol Label Switching. Emerging industry standard upon which tag switching is based.
ODAP --on-demand address pool.
PE router --provider edge router.
PPP --Point-to-Point Protocol.
RADIUS -- Remote Authentication Dial-In User Service. Database for authenticating modem and ISDN connections and for tracking connection time.
relay agent --A router that forwards DHCP and BOOTP messages between a server and a client on different subnets.
releasable subnet --A leased subnet that has no address leased from it.
server --DHCP or BOOTP server.
VHG --Virtual Home Gateway. A Cisco IOS software component that terminates PPP sessions. It is owned and managed by the service provider on behalf of its customer to provide access to remote users of that customers network. A single service provider device (router) can host multiple VHGs of different customers. A VHG can be dynamically brought up and down based on the access pattern of the remote users. Note that there is no single IOS feature called the VHG; it is a collection of function and features.
VHG/PE router--A device that terminates PPP sessions and maps the remote users to the corresponding MPLS VPNs.
VPN --Virtual Private Network. Enables IP traffic to use tunneling to travel securely over a public TCP/IP network.
VPN information --In this document, VPN information refers to VRF name or VPN ID.
VRF --VPN routing and forwarding instance. A VRF consists of an IP routing table, a derived forwarding table, a set of interfaces that use the forwarding table, and a set of rules and routing protocols that determine what goes into the forwarding table. In general, a VRF includes the routing information that defines a customer VPN site that is attached to a PE router. Each VPN instantiated on the PE router has its own VRF.