Solved

DHCP restrictions with User Class

Posted on 2009-04-02
5
247 Views
Last Modified: 2012-06-27
We do have similar question to restrict non-Domain Computers to lease IP address.

Although if we add a new User class we can restrict a machine not to have available options.
i.e. Router address, DNS and WINS etc. but still the machine can have the IP address. good thing is that machine cannot cross the router, hence narrowing down the vunlnerability impact.

what if the requirment is to restrict the IP address Lease for the Machine which is not authorized either by means of Domain, User or Vendor Class or any ohter way.

Focus is to restrict any un authorized Machine to connects to production Network.
0
Comment
Question by:Ovais60
  • 2
  • 2
5 Comments
 
LVL 70

Expert Comment

by:KCTS
ID: 24047934
Since the IP is issued before authentication can take place, then unless you impliment a 802.1x pre-authentication solution you have done just about everything you can do (its been made much simpler in Windows 2008).
0
 
LVL 27

Accepted Solution

by:
bluntTony earned 500 total points
ID: 24048482
Agree with KCTS - DHCP is a low level protocol which occurs without authentication.
You can, however, install a DLL which allows you to apply a MAC address filter in a text file. Set up a list of 'allowed' and/or 'denied' MAC addresses (which could be a pain depending on the size of your network)
See here: http://blogs.technet.com/teamdhcp/archive/2007/10/03/dhcp-server-callout-dll-for-mac-address-based-filtering.aspx
I have to say that while I am aware of this, I have never used it myself.
Maybe it is of interest to you....
0
 

Author Comment

by:Ovais60
ID: 24057181
Thanks for your comments and assistance.

MAC address base filter option i have already in queue, but we are stuck to gather MAC addresses for 5000 + clients.

have you check the Symantec Network Access Control -> DHCP enforcer.

Seems its also use the User Class for the isolation.
0
 
LVL 27

Expert Comment

by:bluntTony
ID: 24067975
The Symantec DHCP enforcer runs on the DHCP server and requires that all hosts have the enforcer client service running on them before handing out valid IP addresses.
A host performing a DHCP discovery is given a 'quarantine' configuration so that the DHCP enforcer can authenticate it. Like you say, it uses a User class to provide the quarantine configuration. If the client is authenticated it is then given the correct IP config - if it fails, it remains with the quarantine config.
For this you would have to deploy the client out to all machines on your network. Have a look at this for a bit of reference  : ftp://ftp.symantec.com/public/japanese/products/symantec_network_access_control/51/manuals/SSEP_5_1_Integrated_Enforcer_for_Microsoft_DHCP_Servers.pdf
0
 

Author Closing Comment

by:Ovais60
ID: 31565702
to Authenticate & Authorise DHCP requests is to use DHCP server Call out DLL. it can help you out to keep your network free from un-authorise requests! Thanks.
0

Featured Post

Best Practices: Disaster Recovery Testing

Besides backup, any IT division should have a disaster recovery plan. You will find a few tips below relating to the development of such a plan and to what issues one should pay special attention in the course of backup planning.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
DHCP lease duration / Migration 8 50
Problems with Microsoft.DHCP.PowerShell.Admin Module 4 52
Problem to setup GUI 11 31
Changing passwords 3 20
In this article, we will see the basic design consideration while designing a Multi-tenant web application in a simple manner. Though, many frameworks are available in the market to develop a multi - tenant application, but do they provide data, cod…
This article outlines the process to identify and resolve account lockout in an Active Directory environment.
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles from a Windows Server 2008 domain controller to a Windows Server 2012 domain controlle…
This tutorial will walk an individual through the process of transferring the five major, necessary Active Directory Roles, commonly referred to as the FSMO roles to another domain controller. Log onto the new domain controller with a user account t…

785 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question