Hello @Wobaffet ,
Thank you for sharing the tcpdump logs - they are very helpful. It appears that the issue is not related to the TJA1103 itself; and no special configuration/protocols are required.
The camera repeatedly sends DHCP DISCOVER frames, a DHCP server responds with DHCP OFFER. However, we do not see the DHCP handshake completing: there are no DHCP REQUEST messages from the camera and no DHCP ACK from the server. Instead, the pattern repeats as DISCOVER → OFFER → (no follow-up) → DISCOVER → OFFER.
This strongly suggests the PHY or link is not the primary blocker. The issue is that the camera is not proceeding to DHCP REQUEST, which typically happens when the client does not receive the OFFER correctly or rejects it for some reason.
Recommendations
1) Verify DHCP server settings (especially lease time)
In both logs, the DHCP OFFER contains Lease-Time = 4294967295 (0xFFFFFFFF). Some embedded DHCP clients reject unusual lease values or specific option combinations, which can result in exactly the behavior we see (repeated DISCOVER with no REQUEST). So, try configure a “normal” lease time (e.g., 10 minutes or 1 hour) and retest.
2) Avoid multiple DHCP servers responding
Your logs show two different DHCP server identities in different captures (server 192.168.40.220 in one case and 192.168.40.1 in another). I would expect only one DHCP server.
Some automotive cameras operate on a specific VLAN. If frames are VLAN-tagged but the Linux interface is not configured for that VLAN, control traffic can behave unexpectedly. The provided logs focus on DHCP only and do not show VLAN fields explicitly, so this needs verification with a VLAN-aware capture/filter. Please try:
Best regards,
Pavel