<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How do I prevent wireless (android) clients from overstaying DHCP leases? in ZoneDirector</title>
    <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-do-I-prevent-wireless-android-clients-from-overstaying-DHCP/m-p/20416#M4253</link>
    <description>I think force DHCP will work, though without a lab test can't be sure. The feature is intended to prevent clients that did not obtain an address via DHCP from connecting (to prevent someone setting a static IP for example). We snoop the DHCP traffic for client fingerprinting, and I believe that's the enforcement mechanism as well (in other words, we don't have to be the DHCP server for it to work).</description>
    <pubDate>Thu, 27 Mar 2014 15:42:43 GMT</pubDate>
    <dc:creator>keith_redfield</dc:creator>
    <dc:date>2014-03-27T15:42:43Z</dc:date>
    <item>
      <title>How do I prevent wireless (android) clients from overstaying DHCP leases?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-do-I-prevent-wireless-android-clients-from-overstaying-DHCP/m-p/20415#M4252</link>
      <description>I've got a wireless subnet w/ about 2000 IPs available but my DHCP server considers about 1 in 4 addresses "abandoned" because it detected IP Address conflicts.
&lt;BR /&gt;&lt;BR /&gt;
It turns out that almost all of the conflicts are due to Android devices that either overstayed their leases, re-used the last IP they had when they re-associated or otherwise used an IP address they did not have a lease for.
&lt;BR /&gt;&lt;BR /&gt;
Apparently this is a common issue for "older" Android devices.
&lt;BR /&gt;
(and I seem to recall issues like this for early iOS devices)
&lt;BR /&gt;&lt;BR /&gt;
When creating an SSID, will enabling the "Force DHCP" option prevent (some of) these problems?
&lt;BR /&gt;
If not, is it possible to add a Ruckus feature to only allow clients to use IP addresses that they have legitimate DHCP leases for?</description>
      <pubDate>Wed, 26 Mar 2014 19:06:21 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-do-I-prevent-wireless-android-clients-from-overstaying-DHCP/m-p/20415#M4252</guid>
      <dc:creator>bill_burns_6069</dc:creator>
      <dc:date>2014-03-26T19:06:21Z</dc:date>
    </item>
    <item>
      <title>Re: How do I prevent wireless (android) clients from overstaying DHCP leases?</title>
      <link>https://community.ruckuswireless.com/t5/ZoneDirector/How-do-I-prevent-wireless-android-clients-from-overstaying-DHCP/m-p/20416#M4253</link>
      <description>I think force DHCP will work, though without a lab test can't be sure. The feature is intended to prevent clients that did not obtain an address via DHCP from connecting (to prevent someone setting a static IP for example). We snoop the DHCP traffic for client fingerprinting, and I believe that's the enforcement mechanism as well (in other words, we don't have to be the DHCP server for it to work).</description>
      <pubDate>Thu, 27 Mar 2014 15:42:43 GMT</pubDate>
      <guid>https://community.ruckuswireless.com/t5/ZoneDirector/How-do-I-prevent-wireless-android-clients-from-overstaying-DHCP/m-p/20416#M4253</guid>
      <dc:creator>keith_redfield</dc:creator>
      <dc:date>2014-03-27T15:42:43Z</dc:date>
    </item>
  </channel>
</rss>

