Solved

dhcp-snooping with HP Procurve 2530

Posted on 2014-03-04
12
1,391 Views
Last Modified: 2014-03-20
I have HP Procurve 2530, dhcp-snooping is not available. I type dhcp-? it returns with no such command. Does this option  not support with this model?
0
Comment
Question by:officertango
  • 5
  • 5
  • 2
12 Comments
 
LVL 28

Expert Comment

by:asavener
ID: 39906298
I do not see DHCP snooping listed in the available features for that series.

http://h17007.www1.hp.com/us/en/networking/products/switches/HP_2530_Switch_Series/index.aspx#Security
0
 
LVL 17

Assisted Solution

by:TimotiSt
TimotiSt earned 250 total points
ID: 39906406
That sounds a bit unusual, I think the 2520 series had the feature.
The release note definitely mentions DHCP snooping fixes in several releases.
What firmware version are you running?

Tamas
0
 

Author Comment

by:officertango
ID: 39906936
I am running YA.15.10.0003 and it is a Procurve 2530.
0
 
LVL 28

Accepted Solution

by:
asavener earned 250 total points
ID: 39906983
0
 

Author Comment

by:officertango
ID: 39907108
I guess I am out off luck with these model, is there anything equivalent to dhcp-snooping?
0
 
LVL 28

Expert Comment

by:asavener
ID: 39907137
A combination of physical and port security to keep rogue devices off of your network.  Still wouldn't block a trusted device from offering DHCP, though.
0
Give your grad a cloud of their own!

With up to 8TB of storage, give your favorite graduate their own personal cloud to centralize all their photos, videos and music in one safe place. They can save, sync and share all their stuff, and automatic photo backup helps free up space on their smartphone and tablet.

 

Author Comment

by:officertango
ID: 39907155
I just want to make that my usersr does not plug in a home router on Lan and hand out wrong IP on the network. I know dhcp-snooping stops that. If I can't use that than is there something equivalent to that?
0
 
LVL 28

Expert Comment

by:asavener
ID: 39907239
I don't know the Procurve product line that well, unfortunately.

The suggestions I can think of, like port security and sticky MACs, require administrative engagement whenever a device changes ports.
0
 

Author Comment

by:officertango
ID: 39907252
I am not familiar with sticky MAC? what can I do with port security?

thanks in advance
0
 
LVL 17

Expert Comment

by:TimotiSt
ID: 39907275
Well, the 25xx series are supposed to be the layer2 switches, and the 26xx is the "light layer3" line.
The 2500 and 2510 series couldn't do dhcp snooping, it's possible that even the 2530 won't be able to do layer3 level protection, in which case you're out of luck with it...
0
 
LVL 28

Expert Comment

by:asavener
ID: 39907345
Again, I'm not sure if these features are available on this model.

Port security lets you limit how many MAC addresses are associated with a port.  So you can limit it to two, for example, if you have a phone and a desktop system at the same desk.  The sticky command makes the switch remember the MACs if the port goes down and up, so that someone can't just unplug what's there and plug in another device.

The problem is when systems are moved around.  The port blocks the traffic until an administrator clears the sticky MAC address(es).

Also, it doesn't keep someone from connecting to a previously unused port, which is where your physical security comes into play.  You have to physically connect and disconnect the patch cables, to keep someone from going to an unused desk and just plugging in.


This all presupposes that you aren't going full Network Access Control, and implementing some kind of pre-admission controls.
0
 

Author Closing Comment

by:officertango
ID: 39943950
na
0

Featured Post

IT, Stop Being Called Into Every Meeting

Highfive is so simple that setting up every meeting room takes just minutes and every employee will be able to start or join a call from any room with ease. Never be called into a meeting just to get it started again. This is how video conferencing should work!

Join & Write a Comment

Suggested Solutions

Broadband over Power Lines Broadband over Power Lines is the technology of transmitting computer data through power lines. This method of connectivity allows the user to have access to the internet without having to rely on additional cables, suc…
Every server (virtual or physical) needs a console: and the console can be provided through hardware directly connected, software for remote connections, local connections, through a KVM, etc. This document explains the different types of consol…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This video shows how to remove a single email address from the Outlook 2010 Auto Suggestion memory. NOTE: For Outlook 2016 and 2013 perform the exact same steps. Open a new email: Click the New email button in Outlook. Start typing the address: …

760 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

21 Experts available now in Live!

Get 1:1 Help Now