![]() ![]() It makes sure hosts use only IP addresses assigned to them. Whenever it assigns an IP address to an untrusted host, it maintains the information in a database. ![]() These trusted hosts include the switches, routers, and servers in the network.Īny device which is beyond the firewall or outside the network is an untrusted host.ĭHCP Snooping, like a firewall, validates the DHCP messages and filters out the invalid ones. In an enterprise network, a trusted host is a device that is under your administrative control. ![]() DHCP Snooping is a security measure using which we can prevent these types of attacks.ĭHCP Snooping is basically a series of techniques applied on an existing DHCP infrastructure that works more like a firewall between untrusted hosts in the network and trusted DHCP servers. We have already discussed on attacks like ARP Spoofing Attack ( What is ARP Spoofing Attack?), where an attacker sends a falsified ARP message to link his IP address to the victim machine’s MAC address and intercepts the traffic of the victim machine to steal sensitive information. For example, when a network device in a network needs an IP address, it requests it to the DHCP server and automatically gets it, without the intervention of the network administrator. DHCP or Dynamic Host Configuration Protocol is a standardized network protocol that is used to dynamically distribute network parameters such as IP addresses to network devices.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |