Solved

IP Conflict occurs on our Server Daily

Posted on 2008-10-27
3
460 Views
Last Modified: 2008-11-14
Were having a IP Conflict on our main server that is setup to run some important software applications and includes our printing server.

The Server log just states the following;
The system detected an address conflict for IP address

Some device is using this IP Address only for a a few minutes then it quits. How can I find out what device is doing this. I've checked all terminals and laptops in the buildings and everyone has an assigned IP Address through DHCP that were aware of.

Some device is trying to use our fixed IP Address that is already taken. How can I detect this issue?
I have a batch file running on the server that is doing "ping -a IP Address" to see if the other device connects and it gives me it's location.

Please help.

Thanks
0
Comment
Question by:jseaman12
3 Comments
 
LVL 14

Expert Comment

by:Hedley Phillips
ID: 22813588
Is the rogue IP within the DHCP scope?
0
 
LVL 16

Accepted Solution

by:
Wadski earned 500 total points
ID: 22813683
Sounds like someone is bringing in and plugging in a laptop from home.  The laptop will have the same IP and once your server is restarted it'll take the IP back and the laptop will DHCP via the 'alternative network connection settings'.

I'd issue a stern email to everyone in the company about plugging stuff into the network then look at changing the IP of the server so it is out of the way of day to day numbers.
0
 
LVL 10

Expert Comment

by:fm250
ID: 22814966
Check if you have another dhcp server enabled? make sure nobody have a static ip address.
you can use this simple tool to scan your network: http://www.angryziber.com/w/Download
0

Featured Post

PRTG Network Monitor: Intuitive Network Monitoring

Network Monitoring is essential to ensure that computer systems and network devices are running. Use PRTG to monitor LANs, servers, websites, applications and devices, bandwidth, virtual environments, remote systems, IoT, and many more. PRTG is easy to set up & use.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Usually shares are where we want them for our users and we tend to take them for granted. There are times, however, when those shares may disappear causing difficulty for your users. One of the first things to try is searching for files that shou…
Data center, now-a-days, is referred as the home of all the advanced technologies. In-fact, most of the businesses are now establishing their entire organizational structure around the IT capabilities.
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Although Jacob Bernoulli (1654-1705) has been credited as the creator of "Binomial Distribution Table", Gottfried Leibniz (1646-1716) did his dissertation on the subject in 1666; Leibniz you may recall is the co-inventor of "Calculus" and beat Isaac…

786 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question