<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Stopping cients acting as rogue DHCP servers on VLAN's in Switches, Hubs, and Modems</title>
    <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806903#M8132</link>
    <description>DHCP snooping is now available on some of the ProCurve switches, although the documentation on how to use it isn't currently published - it's quite straight forward to use. In the meantime you can contact your HP customer care centre for more details on using this feature.&lt;BR /&gt;&lt;BR /&gt;To check if your model switch supports this enhancement, check the current release notes.</description>
    <pubDate>Fri, 03 Nov 2006 01:19:27 GMT</pubDate>
    <dc:creator>Matt Hobbs</dc:creator>
    <dc:date>2006-11-03T01:19:27Z</dc:date>
    <item>
      <title>Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806896#M8125</link>
      <description>We have a 5300 switched environment. If on a VLAN, we are providing DHCP via a server is there a way to stop any client that connects on that VLAN from setting up as rogue DHCP server, we can’t lock the down the ports by Mac addresses or IDM as it open network.</description>
      <pubDate>Fri, 16 Jun 2006 00:33:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806896#M8125</guid>
      <dc:creator>Sydney</dc:creator>
      <dc:date>2006-06-16T00:33:12Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806897#M8126</link>
      <description>Hi Sydney&lt;BR /&gt;Use the Extended Access Control List ACL, to allow DHCP only form your DHCP server and prevent other Rogue ones, and implement it in this particular Vlan.&lt;BR /&gt;&lt;BR /&gt;Good Luck!</description>
      <pubDate>Fri, 16 Jun 2006 02:03:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806897#M8126</guid>
      <dc:creator>Mohieddin Kharnoub</dc:creator>
      <dc:date>2006-06-16T02:03:15Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806898#M8127</link>
      <description>You can't currently do this. The feature that would allow you to do this would be 'dhcp snooping'. I would recommend you contact your reseller or ProCurve sales rep to express your interest regarding this type of feature. &lt;BR /&gt;&lt;BR /&gt;Don't forget to assign points to any replies that you receive.</description>
      <pubDate>Fri, 16 Jun 2006 02:21:42 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806898#M8127</guid>
      <dc:creator>Matt Hobbs</dc:creator>
      <dc:date>2006-06-16T02:21:42Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806899#M8128</link>
      <description>That's a good idea with the ACL method... some good reading about that at: &lt;A href="http://www.ciscopress.com/articles/article.asp?p=174313&amp;amp;seqNum=2&amp;amp;rl=1" target="_blank"&gt;http://www.ciscopress.com/articles/article.asp?p=174313&amp;amp;seqNum=2&amp;amp;rl=1&lt;/A&gt;</description>
      <pubDate>Fri, 16 Jun 2006 02:28:25 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806899#M8128</guid>
      <dc:creator>Matt Hobbs</dc:creator>
      <dc:date>2006-06-16T02:28:25Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806900#M8129</link>
      <description>Does the 5400zl switch have the ability to black rogue DHCP servers? &lt;BR /&gt;&lt;BR /&gt;Does HP have any options here?</description>
      <pubDate>Mon, 11 Sep 2006 18:48:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806900#M8129</guid>
      <dc:creator>Glen Willms</dc:creator>
      <dc:date>2006-09-11T18:48:48Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806901#M8130</link>
      <description>&lt;BR /&gt;I have tested the following on a 3400cl&lt;BR /&gt;to block rogue dhcp servers, and it worked:&lt;BR /&gt;&lt;BR /&gt;ip access-list extended "roguedhcp" &lt;BR /&gt;   deny udp 0.0.0.0 255.255.255.255 eq 67 0.0.0.0 255.255.255.255 eq 68 &lt;BR /&gt;   permit ip 0.0.0.0 255.255.255.255 0.0.0.0 255.255.255.255 &lt;BR /&gt;   exit &lt;BR /&gt;&lt;BR /&gt;Then apply to all port(s) where rogues&lt;BR /&gt;may be (apply to ports connected to&lt;BR /&gt;edge devices, or ports going to hubs or&lt;BR /&gt;switches which don't support access&lt;BR /&gt;lists themselves), example...&lt;BR /&gt;&lt;BR /&gt;int 20 access-group roguedhcp in &lt;BR /&gt;&lt;BR /&gt;The above will block a dhcp reply coming&lt;BR /&gt;from anything on port 20.   This&lt;BR /&gt;should work on the 5300xl too.  Remember&lt;BR /&gt;to not apply the the ports containing your&lt;BR /&gt;real DHCP servers.&lt;BR /&gt;&lt;BR /&gt;Unfortunately, the above method cannot be&lt;BR /&gt;applied on 5400zl or 3500yl, as their&lt;BR /&gt;access lists apply to traffic crossing&lt;BR /&gt;vlans, as opposed to physical ports.  DHCP&lt;BR /&gt;traffic stays within the vlan (layer 2), and&lt;BR /&gt;the ACLs on the 5400zl/3500yl won't work there.&lt;BR /&gt;&lt;BR /&gt;However, 5400zl boasts of Layer 3 services:&lt;BR /&gt;&lt;BR /&gt;    * UDP helper function: UDP broadcasts can be directed across router interfaces to specific IP unicast or subnet broadcast addresses and prevent server spoofing for UDP services such as DHCP&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Suggesting it can block rogues somehow.&lt;BR /&gt;Unfortunately,  I can find nothing&lt;BR /&gt;in the manuals on how this blocks rogues,&lt;BR /&gt;it is just listed as a feature on the product&lt;BR /&gt;web page.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Thu, 02 Nov 2006 14:34:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806901#M8130</guid>
      <dc:creator>Bruce Campbell_3</dc:creator>
      <dc:date>2006-11-02T14:34:21Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806902#M8131</link>
      <description>You might scan your subnets to search for DHCP servers (say a full network scan every 15 minutes or more; or half an hour before the users start their computers), and block the switch ports of the DHCP servers not under your administration.&lt;BR /&gt;&lt;BR /&gt;Usually DHCP clients keep their leases for some time until their lease expires, so if a rogue DHCP server appears on your network it is likely that only a very small portion of your hosts will get rogue DHCP leases. In the mean time you might isolate the rogues.</description>
      <pubDate>Fri, 03 Nov 2006 01:07:55 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806902#M8131</guid>
      <dc:creator>OLARU Dan</dc:creator>
      <dc:date>2006-11-03T01:07:55Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806903#M8132</link>
      <description>DHCP snooping is now available on some of the ProCurve switches, although the documentation on how to use it isn't currently published - it's quite straight forward to use. In the meantime you can contact your HP customer care centre for more details on using this feature.&lt;BR /&gt;&lt;BR /&gt;To check if your model switch supports this enhancement, check the current release notes.</description>
      <pubDate>Fri, 03 Nov 2006 01:19:27 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806903#M8132</guid>
      <dc:creator>Matt Hobbs</dc:creator>
      <dc:date>2006-11-03T01:19:27Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806904#M8133</link>
      <description>i'm also interested in configuring this. any information on this.(our clients are on 2848 switches, our core chassis is a 5312zl, no routing on the switches)</description>
      <pubDate>Fri, 03 Nov 2006 02:16:19 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806904#M8133</guid>
      <dc:creator>stieven struyf</dc:creator>
      <dc:date>2006-11-03T02:16:19Z</dc:date>
    </item>
    <item>
      <title>Re: Stopping cients acting as rogue DHCP servers on VLAN's</title>
      <link>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806905#M8134</link>
      <description>&lt;BR /&gt;Spiffy.  Release notes refer to the feature&lt;BR /&gt;as "DHCP Protection" and it is on&lt;BR /&gt;the latest firmware for 3400cl, 2800,&lt;BR /&gt;2600, 3500yl, 5400zl (at least).&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I installed on 5400zl, cli output&lt;BR /&gt;as follows:&lt;BR /&gt;&lt;BR /&gt; dhcp-snooping help&lt;BR /&gt;Usage: [no] dhcp-snooping &lt;BR /&gt;&lt;BR /&gt;Description: Enable/Disable the global administrative status of&lt;BR /&gt;             DHCP snooping. No snooping will be performed on&lt;BR /&gt;             any VLAN if the global administrative status is disabled.&lt;BR /&gt;             The default state is disabled.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;dhcp-snooping &lt;BR /&gt; authorized-server     Configure valid DHCP Servers.&lt;BR /&gt; database              Configure lease database transfer options.&lt;BR /&gt; option                Configure DHCP snooping operational behavior.&lt;BR /&gt; trust                 Configure trusted interfaces.&lt;BR /&gt; verify                Enable/Disable DHCP packet validation.&lt;BR /&gt; vlan                  Enable/Disable snooping on a VLAN.&lt;BR /&gt; &lt;CR&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;I haven't tried it yet.&lt;BR /&gt;&lt;BR /&gt;&lt;/CR&gt;</description>
      <pubDate>Fri, 03 Nov 2006 11:02:14 GMT</pubDate>
      <guid>https://community.hpe.com/t5/switches-hubs-and-modems/stopping-cients-acting-as-rogue-dhcp-servers-on-vlan-s/m-p/3806905#M8134</guid>
      <dc:creator>Bruce Campbell_3</dc:creator>
      <dc:date>2006-11-03T11:02:14Z</dc:date>
    </item>
  </channel>
</rss>

