<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0"><channel><title><![CDATA[How to detect rogue DHCP servers on the internal network?]]></title><description><![CDATA[<p dir="auto">Hi,</p>
<p dir="auto">I run the network at a dormitory where we from time to time see people install their wifi routers incorrectly, causing a rogue DHCP server to show up on the network, causing mischief for us.</p>
<p dir="auto">Is it possible to set-up a service on pfSense that automatically detects if rogue DHCP servers are present on the network?</p>
<p dir="auto">Regards, Egil.</p>
]]></description><link>https://forum.netgate.com/topic/61647/how-to-detect-rogue-dhcp-servers-on-the-internal-network</link><generator>RSS for Node</generator><lastBuildDate>Tue, 17 Mar 2026 03:10:42 GMT</lastBuildDate><atom:link href="https://forum.netgate.com/topic/61647.rss" rel="self" type="application/rss+xml"/><pubDate>Sun, 13 Oct 2013 10:16:25 GMT</pubDate><ttl>60</ttl><item><title><![CDATA[Reply to How to detect rogue DHCP servers on the internal network? on Mon, 14 Oct 2013 02:07:46 GMT]]></title><description><![CDATA[<p dir="auto">Well your not going to be able to run dhcp snooping unless your switches support it.  And all the switches would need to be able to do it, not just a couple of them.  Or you still would have problems with people connected to the same switch that is down stream from your managed switch..</p>
<p dir="auto">I can not believe a school network would run on such crap?</p>
<p dir="auto">I would think a school would run decent hardware?  How does tuition not cover a decent network - shit doesn't the school have a computer science program?  This would all be hand on stuff that should be talk in the classes..</p>
]]></description><link>https://forum.netgate.com/post/424583</link><guid isPermaLink="true">https://forum.netgate.com/post/424583</guid><dc:creator><![CDATA[johnpoz]]></dc:creator><pubDate>Mon, 14 Oct 2013 02:07:46 GMT</pubDate></item><item><title><![CDATA[Reply to How to detect rogue DHCP servers on the internal network? on Sun, 13 Oct 2013 15:59:00 GMT]]></title><description><![CDATA[<p dir="auto">Hi John,</p>
<p dir="auto">Unfortunately, the network topology is the worst kind of homemade, with only a few managed switches here and there, and bad cabling to top it of.<br />
The switches that can best be described as being the backbone are two ZyXEL GS2200-24P and a Dell PowerConnect 2724.</p>
<p dir="auto">I don't know much about DHCP snooping, how to set it up etc., so any advice is welcome indeed. Is it possible on a switch level to block DHCP ACK's that are not coming from a specific MAC address?</p>
]]></description><link>https://forum.netgate.com/post/424530</link><guid isPermaLink="true">https://forum.netgate.com/post/424530</guid><dc:creator><![CDATA[egil]]></dc:creator><pubDate>Sun, 13 Oct 2013 15:59:00 GMT</pubDate></item><item><title><![CDATA[Reply to How to detect rogue DHCP servers on the internal network? on Sun, 13 Oct 2013 13:38:01 GMT]]></title><description><![CDATA[<p dir="auto">If you have windows here is a older tool that still works</p>
<p dir="auto">http://blogs.technet.com/b/teamdhcp/archive/2009/07/03/rogue-dhcp-server-detection.aspx</p>
<p dir="auto">But it would be better to prevent than detect wouldn't it - what switches are you using?<br />
http://en.wikipedia.org/wiki/DHCP_snooping<br />
http://www.cisco.com/en/US/docs/switches/lan/catalyst6500/ios/12.2SX/configuration/guide/snoodhcp.html</p>
<p dir="auto">in linux use dhcp probe</p>
]]></description><link>https://forum.netgate.com/post/424518</link><guid isPermaLink="true">https://forum.netgate.com/post/424518</guid><dc:creator><![CDATA[johnpoz]]></dc:creator><pubDate>Sun, 13 Oct 2013 13:38:01 GMT</pubDate></item></channel></rss>