Solved

Rogue Subnet

Posted on 2010-11-29
5
407 Views
Last Modified: 2012-05-10
Recently switched our network from 192.168.2.x to 10.2.1.x and I'm still getting a 192.168.2.0 subnet address that is causing some major headaches here. Anyone know of an easy way to locate this subnet and shut it down?
0
Comment
Question by:telstar_
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
5 Comments
 
LVL 10

Accepted Solution

by:
moon_blue69 earned 500 total points
ID: 34231878
0
 
LVL 10

Expert Comment

by:qbakies
ID: 34231882
What do you mean 'still getting"?  Are machines still getting DHCP in the 192.168.2.0 range?  
0
 

Author Comment

by:telstar_
ID: 34231892
The 192.168.2.0 range is causing routing issues with another one of our offices in another part of the country.
0
 
LVL 6

Expert Comment

by:fluk3d
ID: 34231919
Go to one of your machines that is getting the IP address (192.168.2.0) and run an ipconfig/all it will tell you the DHCP server IP address.

GO to the machine either RDP/VNC/Physically and disable the dhcp service/remove the scope or what not.
0
 
LVL 2

Expert Comment

by:frederi
ID: 34232161
If your switches supports that function you can also block any DHCP other than the one you specify.
I can't remember the exact name of the function in general. On procurve switches it's called DHCP-snooping.
0

Featured Post

Manage your data center from practically anywhere

The KN8164V features HD resolution of 1920 x 1200, FIPS 140-2 with level 1 security standards and virtual media transmissions at twice the speed. Built for reliability, the KN series provides local console and remote over IP access, ensuring 24/7 availability to all servers.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Setting up SSH Cisco We are all told that you should not use Telent for connecting to devices because it is unsecure and all clear text. Much better is to use SSH, but it can seem a bit of a challenge setting it all up and especially in a small n…
The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
In this tutorial you'll learn about bandwidth monitoring with flows and packet sniffing with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're interested in additional methods for monitoring bandwidt…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

626 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question