안녕하세요 빛향기고운데입니다~*


 전산관리자라면 사내에 엉뚱한 DHCP서버들 때문에 Client들이 엉뚱한 IP를 부여받고 장애를 경험하신분들이

있으실 겁니다.

Cisco Switch 장비를 사용하고 계신다면 DHCP Snooping 설정을 적용하시면 원치않은 DHCP서버에서

BroadCast의 Request값을 차단하실 수 있습니다.

 

 



A DHCP server normally provides all the basic information a client PC needs to operate on a

network. For example, the client might receive an IP address, a subnet mask, a default gateway

address, DNS addresses, and so on.

Suppose that an attacker could bring up a rogue DHCP server on a machine in the same subnet as

that same client PC. Now when the client broadcasts its DHCP request, the rogue server could

send a carefully crafted DHCP reply with its own IP address substituted as the default gateway.

When the client receives the reply, it begins using the spoofed gateway address. Packets destined

for addresses outside the local subnet then go to the attacker’s machine first. The attacker can

forward the packets to the correct destination, but in the meantime, it can examine every packet

that it intercepts. In effect, this becomes a type of man-in-the-middle attack; the attacker is wedged

into the path and the client doesn’t realize it.

Cisco Catalyst switches can use the DHCP snooping feature to help mitigate this type of attack.

When DHCP snooping is enabled, switch ports are categorized as trusted or untrusted. Legitimate

DHCP servers can be found on trusted ports, whereas all other hosts sit behind untrusted ports.

http://www.cisco.com/en/US/docs/switches/lan/catalyst4500/12.1/13ew/configuration/guide/dhcp.html

 

 

사업자 정보 표시
(주)코레이즈 | 김창현 | 경기도 성남시 분당구 장미로42 5층 | 사업자 등록번호 : 144-81-08126 | TEL : 02-1833-5805 | Mail : sales@coraise.co.kr | 통신판매신고번호 : 호 | 사이버몰의 이용약관 바로가기

+ Recent posts