Overview
163
23
DHCP Filtering
This section describes the Dynamic Host Configuration Protocol (DHCP) Filtering feature.
Overview
DHCP filtering provides security by filtering untrusted DHCP messages. An untrusted
message is a message that is received from outside the network or firewall, and that can cause
traffic attacks within network.
You can use DHCP Filtering as a security measure against unauthorized DHCP servers. A
known attack can occur when an unauthorized DHCP server responds to a client that is
requesting an IP address. The unauthorized server can configure the gateway for the client to
be equal to the IP address of the server. At that point, the client sends all of its IP traffic
destined to other networks to the unauthorized machine, giving the attacker the possibility of
filtering traffic for passwords or employing a ‘man-in-the-middle’ attack.
DHCP filtering works by allowing the administrator to configure each port as a trusted or
untrusted port. The port that has the authorized DHCP server should be configured as a trusted
port. Any DHCP responses received on a trusted port will be forwarded. All other ports should
be configured as untrusted. Any DHCP (or BootP) responses received on the ingress side will
be discarded.
Limitations
•
Port Channels (LAGs) — If an interface becomes a member of a LAG, DHCP filtering is
no longer operationally enabled on the interface. Instead, the interface follows the config-
uration of the LAG port. End user configuration for the interface remains unchanged.
When an interface is no longer a member of a LAG, the current end user configuration for
that interface automatically becomes effective.
•
Mirroring — If an interface becomes a probe port, DHCP filtering can no longer become
operationally enabled on the interface. End user configuration for the interface remains
unchanged. When an interface no longer acts as a probe port, the current end user configu-
ration for that interface automatically becomes effective.
Summary of Contents for UNIFIED WIRED & WIRELESS ACCESS SYSTEM...
Page 2: ...2 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 12: ...12 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 14: ...14 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 32: ...32 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 40: ...40 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 44: ...44 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 56: ...56 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 66: ...66 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 84: ...84 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 90: ...90 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 103: ...Web Examples 103 15 Access Control Lists ACLs Figure 57 Attach IP ACL to an Interface ...
Page 110: ...110 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 123: ...Web Examples 123 18 Port Security Figure 70 Port Security Violation Status ...
Page 124: ...124 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 129: ...RADIUS Configuration Examples 129 19 RADIUS Figure 73 Configuring the RADIUS Server ...
Page 137: ...TACACS Configuration Example 137 20 TACACS Figure 82 Set the User Login TACACS ...
Page 138: ...138 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 146: ...146 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 176: ...176 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...
Page 184: ...184 2001 2011 D Link Corporation All Rights Reserved Configuration Guide ...