Can you edit an existing DHCP pool in a Cisco 2821 Router?

Apachecow

Reputable
Jul 14, 2015
5
0
4,510
I work for a small department within a technical college that has a dedicated internet connection. I was hired about 7 months ago to handle general tech support fresh out of a 2-year program. This is my first experience working with Cisco hardware, and a network of this size. I've learned a good bit as I go along, and understand how to poke around in the router to see various things, but do not have the extra equipment or software to let me play with settings in a safe environment.

Our Cisco 2821 router supports our internal network and 6 VPNs to sites across the state. The person who created the network left before I arrived, and did not document anything about the network. I've been told repeatedly that it is essential that the VPNs remain unchanged and functioning during the school year.

We are adding a new system to our network that will require a fair number of static IP addresses on the internal network. I have been asked to decrease our DHCP pool so we have more addresses to statically assign.

I've been researching how to increase the DHCP excluded-address list that is already set up for our internal network. So far, I have found no documentation on how to change or edit an existing DHCP setup, only how to create a new one. In all the forums I've searched, with the exception of 1-2 people, the general consensus seems to be that the excluded-addresses list cannot be edited because it needs to be established before you setup the DHCP pool. The whole DHCP pool needs to be recreated.

My Questions:

Can you edit an excluded-address list without starting over?

If I have to recreate the whole DHCP pool for the internal network, will it affect the VPNs in any way? (I am assuming not because the current router IP will remain the same)

If/When I recreate the DHCP pool, do I have to do anything special first like shut down the DHCP service?

I would greatly appreciate the help!
 
With something production like this hopefully it was kept under support from Cisco? I would certainly contact them to get advice on how to accomplish what you need to do regardless of what advice you are able to get here. It's likely worth paying for a single support call if it actually isn't covered.
 
After speaking with Cisco support, I found out that I can edit an existing DHCP excluded-address list without having to recreate the entire DHCP setup. Remove the existing DHCP excluded-address with the command:

no ip dhcp excluded-address x.x.x.x x.x.x.x

Once it is removed, you give the command for the new range you would like excluded from your DHCP pool.

 
I would recommend using McHenryB's solution for now until a time when an accidental mistype won't cost you your job (warning i always give people in live production enviroments)

but to continue. when you issue a "show run" this is more or less the output you see right?

!
!
ip dhcp excluded-address 10.0.0.100 10.0.0.254
!
ip dhcp pool TOMSHARDWARE
network 10.0.0.0 255.255.255.0
default-router 10.0.0.1
dns-server 8.8.8.8
!

this is how you create and edit the excluded addresses

There are two ways to create an entry
1. you can specify a range of addresses 10.0.0.100 through 10.0.0.254 like (i did above)
2. you can specify a single address like you default gateway 10.0.0.1

To "edit" you can either add a new range / single entry ( which gets messy )

!
ip dhcp excluded-address 10.0.0.100 10.0.0.254
ip dhcp excluded-address 10.0.0.50 10.0.0.99
!
ip dhcp pool TOMSHARDWARE
network 10.0.0.0 255.255.255.0
default-router 10.0.0.1
dns-server 8.8.8.8
!

or you can delete the existing entry (cisco's recommendation)

"no ip dhcp excluded-address 10.0.0.100 10.0.0.254 "

and then add the new entry

"ip dhcp excluded-address 10.0.0.50 10.0.0.254"


I would recommend doing what Cisco told you when you have an outage window. And remember any change made to the running config goes into effect Instantly, so when you delete the excluded address list and there is a user who just restarted their computer, there is a chance they end up with an address to a critical server.