<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic SecureStack/G/D-Series Configuration to Block Packets From a Rogue DHCP Server in FAQs</title>
    <link>https://community.extremenetworks.com/t5/faqs/securestack-g-d-series-configuration-to-block-packets-from-a/m-p/43125#M153</link>
    <description>Article ID: 12008 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
SecureStack C3, firmware 1.02.01.0004 and higher&lt;BR /&gt;
SecureStack C2, firmware 5.02.01.0006 and higher&lt;BR /&gt;
SecureStack B3, firmware 1.02.01.0004 and higher&lt;BR /&gt;
SecureStack B2, firmware 4.02.01.0006 and higher&lt;BR /&gt;
G-Series, firmware 1.02.00.0043 and higher&lt;BR /&gt;
D-Series, firmware 6.03.01.0008 and higher &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
Block packets from a rogue DHCP server.&lt;BR /&gt;
Configure DHCP Snooping.&lt;BR /&gt;
Sample configuration. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution/Workaround&lt;/B&gt;&lt;BR /&gt;
DHCP Snooping prevents DHCP server packets such as "offers" from being passed onto the network. This will stop rogue DHCP servers from supplying incorrect IP addresses to DHCP clients. &lt;BR /&gt;
&lt;BR /&gt;
For at least minimal/default functionality, here are the three commands required:&lt;UL&gt; 
&lt;LI&gt;Enable the feature globally:B2(su)-&amp;gt;set dhcpsnooping enable 
&lt;/LI&gt;&lt;LI&gt;Enable the feature on at least one VLAN:B2(su)-&amp;gt;set dhcpsnooping vlan &lt;I&gt; enable 
&lt;/I&gt;&lt;/LI&gt;&lt;LI&gt;&lt;I&gt;Configure the trusted ports through which valid DHCP server packets will be sourced (&lt;A href="http://bit.ly/1jlsrlL" target="_blank" rel="nofollow noreferrer noopener"&gt;12682&lt;/A&gt;). Typically these are uplinks that are in the data path to the actual DHCP server:B2(su)-&amp;gt;set dhcpsnooping trust port  enable&lt;/I&gt;&lt;/LI&gt;&lt;/UL&gt;
The full DHCP Snooping command set (here, from a B2 running firmware 4.02.06.0001) permits the network administrator a relatively fine degree of control over this feature: &lt;BR /&gt;
B2(su)-&amp;gt;set dhcpsnooping ?&lt;BR /&gt;
 &lt;BR /&gt;
binding             Add a static DHCP snooping binding              [default: none]&lt;BR /&gt;
database            Configure DHCP snooping bindings store interval in&lt;BR /&gt;
                    &amp;lt;15&amp;gt; to &amp;lt;86400&amp;gt; seconds range.                  [default: 300 seconds]&lt;BR /&gt;
disable             Disable DHCP snooping globally.                 [default: disable]&lt;BR /&gt;
enable              Enable DHCP snooping globally.&lt;BR /&gt;
limit               Configure rate limiting parameters on the port. [default: 15 pps]&lt;BR /&gt;
log-invalid         Enable logging of invalid packets.              [default: disable]&lt;BR /&gt;
trust               Configure the interface as trusted or untrusted for &lt;BR /&gt;
                    DHCP snooping.                                  [default: disable]&lt;BR /&gt;
verify              Configure DHCP snooping to filter on source MAC&lt;BR /&gt;
                    address.                                        [default: enable]&lt;BR /&gt;
vlan                Enable DHCP snooping on a range of VLANs.       [default: none]&lt;BR /&gt;
 &lt;BR /&gt;
B2(su)-&amp;gt;clear dhcpsnooping ?&lt;BR /&gt;
 &lt;BR /&gt;
binding             Clear DHCP snooping bindings&lt;BR /&gt;
database            Configure DHCP snooping bindings store interval in&lt;BR /&gt;
                    &amp;lt;15&amp;gt; to &amp;lt;86400&amp;gt; seconds range.&lt;BR /&gt;
limit               Set rate limiting and burst interval to defaults 15&lt;BR /&gt;
                    pps and 1 second respectivey .&lt;BR /&gt;
statistics          Clear DHCP snooping statistics&lt;BR /&gt;
 &lt;BR /&gt;
B2(su)-&amp;gt;show dhcpsnooping ?&lt;BR /&gt;
 &lt;BR /&gt;
&lt;CR&gt;                Press enter to execute the command.&lt;BR /&gt;
binding             Display DHCP snooping bindings.&lt;BR /&gt;
database            Display DHCP snooping Database persistency&lt;BR /&gt;
                    configuration.&lt;BR /&gt;
port                Display DHCP Snooping Interface configuration.&lt;BR /&gt;
statistics          Display DHCP snooping statistics.&lt;BR /&gt;
 &lt;BR /&gt;
B2(su)-&amp;gt;&lt;BR /&gt;
For more background regarding the use and configuration of DHCP Snooping, please refer to the &lt;A href="https://extranet.enterasys.com/downloads/" target="_blank" rel="nofollow noreferrer noopener"&gt;Configuration Guide or CLI Reference Guide&lt;/A&gt; for your product and firmware version. &lt;BR /&gt;
&lt;BR /&gt;
See also: &lt;A href="http://bit.ly/1bg7h44" target="_blank" rel="nofollow noreferrer noopener"&gt;11392&lt;/A&gt; and &lt;A href="http://bit.ly/1izh0ZC" target="_blank" rel="nofollow noreferrer noopener"&gt;12196&lt;/A&gt;. &lt;BR /&gt;
&lt;BR /&gt;
Workaround: &lt;BR /&gt;
&lt;BR /&gt;
For the A4-Series and A2-Series, which do not support DHCP Snooping or Policy, DiffServ (&lt;A href="http://bit.ly/18F0WPL" target="_blank" rel="nofollow noreferrer noopener"&gt;5848&lt;/A&gt;) provides a means to perform a similar function, albeit in a less sophisticated manner. This sample configuration denies DHCP traffic sourced from any DHCP Server (destination port 68 traffic is server-to-client) plugged into port ge.1.1. Add this service to all ports that you wish to disallow for DHCP server attachment/operation: &lt;BR /&gt;
#diffserv&lt;BR /&gt;
set diffserv adminmode enable&lt;BR /&gt;
set diffserv class create all classDHCP&lt;BR /&gt;
set diffserv class match dstl4port number classDHCP 68&lt;BR /&gt;
set diffserv policy create policyDropDHCP in&lt;BR /&gt;
set diffserv policy class add policyDropDHCP classDHCP&lt;BR /&gt;
set diffserv policy police style simple policyDropDHCP classDHCP 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyDropDHCP classDHCP&lt;BR /&gt;
set diffserv service add in ge.1.1 policyDropDHCP&lt;/CR&gt;</description>
    <pubDate>Wed, 04 Dec 2013 22:25:00 GMT</pubDate>
    <dc:creator>FAQ_User</dc:creator>
    <dc:date>2013-12-04T22:25:00Z</dc:date>
    <item>
      <title>SecureStack/G/D-Series Configuration to Block Packets From a Rogue DHCP Server</title>
      <link>https://community.extremenetworks.com/t5/faqs/securestack-g-d-series-configuration-to-block-packets-from-a/m-p/43125#M153</link>
      <description>Article ID: 12008 &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Products&lt;/B&gt;&lt;BR /&gt;
SecureStack C3, firmware 1.02.01.0004 and higher&lt;BR /&gt;
SecureStack C2, firmware 5.02.01.0006 and higher&lt;BR /&gt;
SecureStack B3, firmware 1.02.01.0004 and higher&lt;BR /&gt;
SecureStack B2, firmware 4.02.01.0006 and higher&lt;BR /&gt;
G-Series, firmware 1.02.00.0043 and higher&lt;BR /&gt;
D-Series, firmware 6.03.01.0008 and higher &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Goals&lt;/B&gt;&lt;BR /&gt;
Block packets from a rogue DHCP server.&lt;BR /&gt;
Configure DHCP Snooping.&lt;BR /&gt;
Sample configuration. &lt;BR /&gt;
&lt;BR /&gt;
&lt;B&gt;Solution/Workaround&lt;/B&gt;&lt;BR /&gt;
DHCP Snooping prevents DHCP server packets such as "offers" from being passed onto the network. This will stop rogue DHCP servers from supplying incorrect IP addresses to DHCP clients. &lt;BR /&gt;
&lt;BR /&gt;
For at least minimal/default functionality, here are the three commands required:&lt;UL&gt; 
&lt;LI&gt;Enable the feature globally:B2(su)-&amp;gt;set dhcpsnooping enable 
&lt;/LI&gt;&lt;LI&gt;Enable the feature on at least one VLAN:B2(su)-&amp;gt;set dhcpsnooping vlan &lt;I&gt; enable 
&lt;/I&gt;&lt;/LI&gt;&lt;LI&gt;&lt;I&gt;Configure the trusted ports through which valid DHCP server packets will be sourced (&lt;A href="http://bit.ly/1jlsrlL" target="_blank" rel="nofollow noreferrer noopener"&gt;12682&lt;/A&gt;). Typically these are uplinks that are in the data path to the actual DHCP server:B2(su)-&amp;gt;set dhcpsnooping trust port  enable&lt;/I&gt;&lt;/LI&gt;&lt;/UL&gt;
The full DHCP Snooping command set (here, from a B2 running firmware 4.02.06.0001) permits the network administrator a relatively fine degree of control over this feature: &lt;BR /&gt;
B2(su)-&amp;gt;set dhcpsnooping ?&lt;BR /&gt;
 &lt;BR /&gt;
binding             Add a static DHCP snooping binding              [default: none]&lt;BR /&gt;
database            Configure DHCP snooping bindings store interval in&lt;BR /&gt;
                    &amp;lt;15&amp;gt; to &amp;lt;86400&amp;gt; seconds range.                  [default: 300 seconds]&lt;BR /&gt;
disable             Disable DHCP snooping globally.                 [default: disable]&lt;BR /&gt;
enable              Enable DHCP snooping globally.&lt;BR /&gt;
limit               Configure rate limiting parameters on the port. [default: 15 pps]&lt;BR /&gt;
log-invalid         Enable logging of invalid packets.              [default: disable]&lt;BR /&gt;
trust               Configure the interface as trusted or untrusted for &lt;BR /&gt;
                    DHCP snooping.                                  [default: disable]&lt;BR /&gt;
verify              Configure DHCP snooping to filter on source MAC&lt;BR /&gt;
                    address.                                        [default: enable]&lt;BR /&gt;
vlan                Enable DHCP snooping on a range of VLANs.       [default: none]&lt;BR /&gt;
 &lt;BR /&gt;
B2(su)-&amp;gt;clear dhcpsnooping ?&lt;BR /&gt;
 &lt;BR /&gt;
binding             Clear DHCP snooping bindings&lt;BR /&gt;
database            Configure DHCP snooping bindings store interval in&lt;BR /&gt;
                    &amp;lt;15&amp;gt; to &amp;lt;86400&amp;gt; seconds range.&lt;BR /&gt;
limit               Set rate limiting and burst interval to defaults 15&lt;BR /&gt;
                    pps and 1 second respectivey .&lt;BR /&gt;
statistics          Clear DHCP snooping statistics&lt;BR /&gt;
 &lt;BR /&gt;
B2(su)-&amp;gt;show dhcpsnooping ?&lt;BR /&gt;
 &lt;BR /&gt;
&lt;CR&gt;                Press enter to execute the command.&lt;BR /&gt;
binding             Display DHCP snooping bindings.&lt;BR /&gt;
database            Display DHCP snooping Database persistency&lt;BR /&gt;
                    configuration.&lt;BR /&gt;
port                Display DHCP Snooping Interface configuration.&lt;BR /&gt;
statistics          Display DHCP snooping statistics.&lt;BR /&gt;
 &lt;BR /&gt;
B2(su)-&amp;gt;&lt;BR /&gt;
For more background regarding the use and configuration of DHCP Snooping, please refer to the &lt;A href="https://extranet.enterasys.com/downloads/" target="_blank" rel="nofollow noreferrer noopener"&gt;Configuration Guide or CLI Reference Guide&lt;/A&gt; for your product and firmware version. &lt;BR /&gt;
&lt;BR /&gt;
See also: &lt;A href="http://bit.ly/1bg7h44" target="_blank" rel="nofollow noreferrer noopener"&gt;11392&lt;/A&gt; and &lt;A href="http://bit.ly/1izh0ZC" target="_blank" rel="nofollow noreferrer noopener"&gt;12196&lt;/A&gt;. &lt;BR /&gt;
&lt;BR /&gt;
Workaround: &lt;BR /&gt;
&lt;BR /&gt;
For the A4-Series and A2-Series, which do not support DHCP Snooping or Policy, DiffServ (&lt;A href="http://bit.ly/18F0WPL" target="_blank" rel="nofollow noreferrer noopener"&gt;5848&lt;/A&gt;) provides a means to perform a similar function, albeit in a less sophisticated manner. This sample configuration denies DHCP traffic sourced from any DHCP Server (destination port 68 traffic is server-to-client) plugged into port ge.1.1. Add this service to all ports that you wish to disallow for DHCP server attachment/operation: &lt;BR /&gt;
#diffserv&lt;BR /&gt;
set diffserv adminmode enable&lt;BR /&gt;
set diffserv class create all classDHCP&lt;BR /&gt;
set diffserv class match dstl4port number classDHCP 68&lt;BR /&gt;
set diffserv policy create policyDropDHCP in&lt;BR /&gt;
set diffserv policy class add policyDropDHCP classDHCP&lt;BR /&gt;
set diffserv policy police style simple policyDropDHCP classDHCP 1000000 128&lt;BR /&gt;
set diffserv policy police action conform drop policyDropDHCP classDHCP&lt;BR /&gt;
set diffserv service add in ge.1.1 policyDropDHCP&lt;/CR&gt;</description>
      <pubDate>Wed, 04 Dec 2013 22:25:00 GMT</pubDate>
      <guid>https://community.extremenetworks.com/t5/faqs/securestack-g-d-series-configuration-to-block-packets-from-a/m-p/43125#M153</guid>
      <dc:creator>FAQ_User</dc:creator>
      <dc:date>2013-12-04T22:25:00Z</dc:date>
    </item>
  </channel>
</rss>

