Monday, September 21, 2020

DHCP-Snooping Configuration with Aruba Switch Series 2930, 2530.

 

DHCP-Snooping Configuration with Aruba Switch Series 2930, 2530.

DHCP Snooping is a Layer 2 security switch feature which blocks unauthorized (rogue) DHCP servers from distributing IP addresses to DHCP clients also call option 82 of this service.

This lab configuration with Aruba Switch Series 8320, 2930.

We need trusted DHCP server IP address to configure DHCP-snooping on your network.

 

DHCP Starvation attack is a common network attack that targets network DHCP servers. Its primary objective is to flood the organization’s DHCP server with DHCP REQUEST messages using spoofed source MAC addresses. The DHCP server will respond to all requests, not knowing this is a DHCP Starvation attack, and assign available IP addresses until its DHCP pool is depleted.

At this point the attacker has rendered the organization’s DHCP server useless and can now enable his own rogue DHCP server to serve network clients. DHCP Starvation is often accompanied by a Man-in-the-Middle attack as the rogue DHCP server distributes fake IP address parameters, including Gateway & DNS IP address, so that all client traffic passes through the attacker for inspection.

Typical Man-in-the-Middle attack. Client data streams flow through the attacker

Using packet capture and protocol analysis tools the attacker is able to fully reconstruct any data stream captured and export files from it. In fact the process so simple it only requires a basic level of understanding of these type of network tools.

In other cases the Man-in-the-Middle attack can be used as a reconnaissance attack with the objective to obtain information about the network infrastructure, services but also identify hosts of high interest such as financial or database servers.

It should be by now evident how a simple attack can become a major security threat for any organization. The above attacks are examples on how easy hackers can infiltrate the network and get access to valuable information by simply connecting an unauthorized/untrusted device to an available network port effectively bypassing firewalls and other levels of security.


ROGUE DHCP SERVERS – A MAJOR SECURITY THREAT & SOURCE OF NETWORK DISRUPTIONS

Rogue DHCP servers are a common problem within enterprise organizations and are not always directly related with an attack. Rogue DHCP Servers tend to appear out of nowhere thanks to users who connect consumer-grade network devices to the network infrastructure unaware that they have connected an unauthorized device with a rogue DHCP server enabled.

The Rogue DHCP server then begins assigning IP addresses to hosts within the network therefore causing network connectivity problems and in many cases – major service disruptions. In a best case scenario DHCP clients are served with an invalid IP address disconnecting them from the rest of the network. Worst case scenario would be the clients been assigned an IP address used by network infrastructure devices e.g the VLAN interface on the Core switch or a firewall interface, causing serious network disruptions and conflicts.

A rogue DHCP server in action, taking control of DHCP services

While many organizations enforce security policies that do not allow 3rd party or unauthorized devices to be connected to their network, there are still incidents where users who do not understand (or care about) the security implications continue to connect these devices to the network infrastructure without consulting their IT Department.

Educating users and enforcing security policies can be extremely challenging which is why security mechanisms need to be in place to help mitigate these incidents and is where DHCP Snooping comes into the picture.

DHCP SNOOPING SUPPORT FOR Aruba 2930M, 2930F, 2530M, 2530F etc.

DHCP Snooping is available for above switch series like 2930M, 2930F, 2530M, 2530F.

DHCP Snooping is considered a standard security feature and does not require any additional licensing for the older switch series and new IOS operating systems, therefore the feature is available and readily configurable on all switches.

Examples of  Aruba switch series like 2930M, 2930F, 2530M, 2530F

DHCP Snooping can be enabled globally and on a per-VLAN basis. This means you can enable it for all VLANs (globally) or only for specific including VLAN ranges e.g VLANs 1-20 & VLANs 45-50.

HOW DHCP SNOOPING WORKS – DHCP SNOOPING CONCEPTS – TRUSTED, UNTRUSTED PORTS/INTERFACES

DHCP Snooping is a Layer 2 security switch feature which blocks unauthorized (rogue) DHCP servers from distributing IP addresses to DHCP clients. In fact Cisco was the first vendor to implement DHCP Snooping as a security feature in its network switches and other vendors have since then followed with similar features.

Note-It is important to note that DHCP snooping is an access layer protection service. It does not belong in the core network.

The way DHCP Snooping works is fairly straight forward. DHCP Snooping categorizes all switch ports into two simple categories:

·         Trusted Ports

·         Untrusted Ports

Trusted Port, also known as a Trusted Source or Trusted Interface, is a port or source whose DHCP server messages are trusted because it is under the organization’s administrative control. For example, the port to which your organization’s DHCP server connects to consider a Trusted Port. This is also shown in the diagram below:

 


DHCP Snooping Concepts: Trusted and Untrusted Ports

An Untrusted Port, also known as an Untrusted Source or Untrusted Interface, is a port from which DHCP server messages are not trusted. An example on an untrusted port is one where hosts or PCs connect to from which DHCP OFFER, DHCP ACK or DHCPNAK messages should never be seen as these are sent only by DHCP Servers.

How to configure DHCP-Snooping in Aruba Switch?

Answer- We have to configure DHCP-snooping to avoid unauthorized (rogue) DHCP servers offering IP addresses to DHCP clients.

Kindly find the below configuration: -

Step1: Aruba-tech-(config)#dhcp-snooping authorized-server 10.20.62.11 # for Trusted DHCP Server.

Step2: Aruba-tech-(config)#dhcp-snooping trust (trunk port)         #Uplink port will be trust port other will be untrust.

Step3: Aruba-tech-(config)#dhcp-snooping vlan _____         #All vlan should be call in this cmd.

Step4: Aruba-tech-(config)#dhcp-snooping                #for enable DHCP-Snooping.

 

 

No comments:

Post a Comment