
8
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
15
Problem:
– Malicious user pretends to
be the network DHCP
server
– Mis-configured user
starts up a DHCP server
incorrectly
– Malicious user can send
out bogus address,
deplete the address
space or spoof the default
gateway
DHCP Spoofing Attack
Rogue DHCP Offer
IP: 10.1.1.20/24
GW: 10.1.1.1
DNS: 192.168.1.122
DHCP
Discovery
Broadcast
Victim
DHCP
Server
User Ports
Untrusted
DHCP
Server
√
√
Solution
– Untrust user ports so only
DHCP Requests can be
sent
– Snoop DHCP information
for integrity
© 2006 Cisco Systems, Inc. All rights reserved. Cisco ConfidentialPresentation_ID
16
DHCP Snooping
DHCP
Client
DHCP
Server
Si
Si
Rogue
Server
Trusted
DHCP Snooping Enabled
√
√
D
H
C
P
R
e
q
u
e
s
t
X
X
D
H
C
P
A
C
K
What It Does:
Switch forwards only DHCP
requests from untrusted
access ports, drops all other
types of DHCP traffic. Allows
only designated DHCP ports or
uplink ports trusted to relay
DHCP Messages
Builds a DHCP binding table
containing client IP address,
client MAC address, port,
VLAN number
Benefit:
Eliminates rogue devices from
behaving as the DHCP server
Untrusted
Comentarios a estos manuales