![]() ![]() ![]() Untrusted ports are the ports that is set as unverified at the beginning. Trusted ports are the ports that is set as verified at the beginning, This means that, any DHCP messages are accepted from this interface. Here, DHCP Snooping tracks all the DHCP Discover and DHCP Offer messages coming from “ untrusted” ports.Īccording to this DHCP security system, there are two port types. It Works as a firewall between DHCP Server and other part of the network. Whenever your DHCP pool exhaust, IP configurations in the network can not be done.ĭHCP Snooping is the inspector and a guardian of our network here. He/she can send a lot of DHCP Discover messages and get your IP addresses in DHCP Pool. This is one of the way that a man-in-the-middle attack occurs.Ī DHCP attacker can also manuplate your real DHCP Server’s pool. And then? Your all traffic o through his/her device. He/she can give his/her IP address as a gateway for you. He/She can do this by replying a DHCP Discover messages earlier than your real DHCP Server. Think about it, what if a malicious atttacker gives this IP addresses? If an attacker uses a DHCP software and take over your DHCP messaging, he/she can assign your IP addresses. Many things! As you know, DHCP Server gives IP configurations to our network devices. How can an Attacker Manuplate DHCP Messages? What if DHCP Snooping Detects a Malicious Attack?.How can an Attacker Manuplate DHCP Messages?.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |