We have one Meraki MS425 configured as an L3 switch to do routing with a transit VLAN so we can connect six buildings together. One building has the internet connection for the whole network. Right now we just have one fiber run going from each building to the Meraki MS425. Here is how we have routing configured on that MS425:
VLANs 10, 30, 40, 50, and 60 are all buildings that have just that one VLAN respectively (and associated subnets 10.1.x.x, 10.3.x.x, 10.4.x.x, 10.5.x.x, and 10.6.x.x), and this MS425 has the .1 virtual interfaces for each of those subnets. Each of those subnets has their own servers (DHCP, DNS, etc.) and all internet traffic passes through this MS425 and the transit VLAN of 172.16.100.0 to get to the building with the internet connection. The next hop IP of 172.16.100.1 is a virtual interface on the upstream switch (Cisco Catalyst) that has the firewall and internet connected to it (and it has it's own DHCP, DNS, etc. in the 10.2.x.x range). I've whitelisted the DHCP servers on VLANs 10, 30, 40, 50, and 60 and this is what this switch sees for DHCP:
What surprises me is what the VLAN 10, 30, 40, 50, and 60 Meraki switches are seeing in terms of DHCP - they are seeing DHCP traffic from other VLANs, and I'm not sure why this is. Here is the view from a switch on the VLAN 30 network:
The port on the MS425 with the transit VLAN that connects it to the VLAN 30 is configured this way:
Port status | Enabled |
Type | Trunk |
Native VLAN | 30 |
Allowed VLANs | all |
Access policy | Open |
Link negotiation | Auto negotiate (10 Gbps) |
RSTP | Enabled (Forwarding) |
STP guard | Root guard |
Port schedule | Unscheduled |
Port isolation | Disabled |
Trusted DAI | Disabled |
UDLD | Alert only |
Tags | none |
PoE | n/a |
Peer SGT capable | Disabled |
Storm control | Enabled |
Port mirroring | Not mirroring traffic |
Stacking port | Disabled |
Here's how the port on the other end of that fiber connection is configured on that VLAN 30 network that's connected to the transit VLAN:
Port status | Enabled |
Type | Trunk |
Native VLAN | 30 |
Allowed VLANs | all |
Access policy | Open |
Link negotiation | Auto negotiate (10 Gbps) |
RSTP | Enabled (Forwarding) |
Port schedule | Unscheduled |
Port isolation | Disabled |
Trusted DAI | Disabled |
UDLD | Alert only |
Tags | none |
PoE | n/a |
Peer SGT capable | Disabled |
Storm control | Enabled |
Port mirroring | Not mirroring traffic |
Stacking port | Disabled |
Why is DHCP traffic crossing VLANs with this setup, and what's the best way to deal with it?