Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

How to avoid rogue DHCP servers?

Posted on 2014-01-27
11
Medium Priority
?
414 Views
Last Modified: 2014-01-28
Hi,

I had a DHCP problem in my network right now and the reason was that someone had plugged in his private Wifi router that started giving out IP address from its own range ...

How could I prevent (on a technical level) something like this happening again?

(Windows 2008 Domain)

Thank you!
0
Comment
Question by:Xeronimo
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
  • 3
  • 2
  • +2
11 Comments
 
LVL 3

Expert Comment

by:Paul 1
ID: 39811642
The non-tech way is better, when you find the device disable it with a hammer!

here is the other way
http://technet.microsoft.com/en-us/library/cc754792.aspx
0
 

Author Comment

by:Xeronimo
ID: 39811663
Haha, yes!

As for authorization, my DHCP server (who's also a DC) has been authorized though ... and doesn't your link there only refer to DHCP servers that run on Windows servers? In my case it was a wifi router that started attributing IP addresses ... how would I prevent it from doing this?
0
 
LVL 15

Expert Comment

by:cwstad2
ID: 39811664
Are you able to configure you network switches to block DHCP on all ports except that of the server?
0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 

Author Comment

by:Xeronimo
ID: 39811667
cwstad: I guess I should be able to do that, it's a HP ProCurve. But if not yet done something like that ... Is it similar to restricting traffic on firewalls?
0
 
LVL 15

Expert Comment

by:cwstad2
ID: 39811677
I doubt if you can on that model. Our network guys have configured on CISCO equipment.
0
 

Author Comment

by:Xeronimo
ID: 39811713
Ok, I'll see what I can do!
0
 
LVL 11

Expert Comment

by:Miftaul
ID: 39811960
If you use cisco switches, configure dhcp snooping on switchports to stop rogue dhcp servers.
0
 
LVL 17

Expert Comment

by:TimotiSt
ID: 39812214
If you can post the exact model of your switch, I can check if it supports DHCP snooping.

Tamas
0
 

Author Comment

by:Xeronimo
ID: 39812240
Hi, it's a HP ProCurve 4240vl

Thanks!
0
 
LVL 15

Accepted Solution

by:
cwstad2 earned 1000 total points
ID: 39812269
Take a look here. Worth a try. We have a couple in IT but only for desktop Switches

http://integratingit.wordpress.com/2012/08/13/configuring-dhcp-snooping-on-hp-procurve-switches/
0
 
LVL 17

Assisted Solution

by:TimotiSt
TimotiSt earned 1000 total points
ID: 39812366
That's good, the 4200vl series supports DHCP snooping since firmware L.10.09.

Config example from a 3400 series box:
dhcp-snooping
no dhcp-snooping option 82
no dhcp-snooping verify mac
dhcp-snooping vlan 23 
!
interface 47
   mdix-mode mdix
   exit
interface 48
   mdix-mode mdix
   exit
interface 49
   dhcp-snooping trust
   exit
interface Trk4
   dhcp-snooping trust
   exit

Open in new window

0

Featured Post

New feature and membership benefit!

New feature! Upgrade and increase expert visibility of your issues with Priority Questions.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Getting to know the threat landscape in which DDoS has evolved, and making the right choice to get ourselves geared up to defend against  DDoS attacks effectively. Get the necessary preparation works done and focus on Doing the First Things Right.
Examines three attack vectors, specifically, the different types of malware used in malicious attacks, web application attacks, and finally, network based attacks.  Concludes by examining the means of securing and protecting critical systems and inf…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…
We’ve all felt that sense of false security before—locking down external access to a database or component and feeling like we’ve done all we need to do to secure company data. But that feeling is fleeting. Attacks these days can happen in many w…
Suggested Courses

604 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question