How to detect rogue DHCP servers on the internal network?
-
Hi,
I run the network at a dormitory where we from time to time see people install their wifi routers incorrectly, causing a rogue DHCP server to show up on the network, causing mischief for us.
Is it possible to set-up a service on pfSense that automatically detects if rogue DHCP servers are present on the network?
Regards, Egil.
-
If you have windows here is a older tool that still works
http://blogs.technet.com/b/teamdhcp/archive/2009/07/03/rogue-dhcp-server-detection.aspx
But it would be better to prevent than detect wouldn't it - what switches are you using?
http://en.wikipedia.org/wiki/DHCP_snooping
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/snoodhcp.htmlin linux use dhcp probe
-
Hi John,
Unfortunately, the network topology is the worst kind of homemade, with only a few managed switches here and there, and bad cabling to top it of.
The switches that can best be described as being the backbone are two ZyXEL GS2200-24P and a Dell PowerConnect 2724.I don't know much about DHCP snooping, how to set it up etc., so any advice is welcome indeed. Is it possible on a switch level to block DHCP ACK's that are not coming from a specific MAC address?
-
Well your not going to be able to run dhcp snooping unless your switches support it. And all the switches would need to be able to do it, not just a couple of them. Or you still would have problems with people connected to the same switch that is down stream from your managed switch..
I can not believe a school network would run on such crap?
I would think a school would run decent hardware? How does tuition not cover a decent network - shit doesn't the school have a computer science program? This would all be hand on stuff that should be talk in the classes..