Konfigurasi DHCP Snooping di Switch Cisco
Pada kali ini saya akan memberikan tutorial bagaimana caranya mengatasi dari serangan DHCP Starvation & Rogue DHCP Server... sebelumnnya saya sudah membagikan cara menyerang DHCP Server menggunakan Yersinia... Bisa lihat postingannya disini DHCP Starvation Attack Menggunakan Yersinia dan Rogue DHCP Server Attack Menggunakan Yersinia , Kita membutuhkan DHCP Snooping untuk mencegah serangan man-in-the middle di jaringan kita. Ada potensi bagi penyerang untuk berpura-pura (spoof) menjadi server DHCP dan menanggapi pesan DHCPDISCOVER sebelum server sebenarnya memiliki waktu untuk merespons. DHCP Snooping memungkinkan switch di jaringan untuk mempercayai port yang terhubung dengan server DHCP (ini bisa menjadi trunk) dan tidak mempercayai port lain. Ia juga memelihara daftar pengikatan alamat DHCP dengan memeriksa lalu lintas yang mengalir antara klien dan server DHCP, yang memberikan kepastian tentang siapa host sebenarnya. Informasi mengikat yang dikumpulkan oleh DHCP Snooping digunakan oleh fitur keamanan lain seperti IPSG dan DAI, Untuk topologi yang saya gunakan seperti gambar dibawah ini
L2#confL2(config)#ip dhcp snooping
L2(config)#ip dhcp snooping vlan 1L2(config)#do show run | i dhcpip dhcp snooping vlan 1ip dhcp snoopingL2(config)#
L2(config)#do show ip dhcp snoopingSwitch DHCP snooping is enabledSwitch DHCP gleaning is disabledDHCP snooping is configured on following VLANs:1DHCP snooping is operational on following VLANs:1DHCP snooping is configured on the following L3 Interfaces:Insertion of option 82 is enabledcircuit-id default format: vlan-mod-portremote-id: 0c33.7b52.a600 (MAC)Option 82 on untrusted port is not allowedVerification of hwaddr field is enabledVerification of giaddr field is enabledDHCP snooping trust/rate is configured on the following Interfaces:Interface Trusted Allow option Rate limit (pps)----------------------- ------- ------------ ----------------L2(config)#
L2(config)#int g0/0L2(config-if)#ip dhcp snooping trustL2(config-if)#int g0/1L2(config-if)#ip dhcp snooping limit rate 25L2(config-if)#exit
L2(config)#do show ip dhcp snoopingSwitch DHCP snooping is enabledSwitch DHCP gleaning is disabledDHCP snooping is configured on following VLANs:1DHCP snooping is operational on following VLANs:1DHCP snooping is configured on the following L3 Interfaces:Insertion of option 82 is enabledcircuit-id default format: vlan-mod-portremote-id: 0c33.7b52.a600 (MAC)Option 82 on untrusted port is not allowedVerification of hwaddr field is enabledVerification of giaddr field is enabledDHCP snooping trust/rate is configured on the following Interfaces:Interface Trusted Allow option Rate limit (pps)----------------------- ------- ------------ ----------------GigabitEthernet0/0 yes yes unlimitedCustom circuit-ids:GigabitEthernet0/1 no no 25Custom circuit-ids:L2(config)#
*Oct 23 15:50:04.392: %SYS-5-CONFIG_I: Configured from console by consoleL2#*Oct 23 15:52:07.244: %DHCP_SNOOPING-4-DHCP_SNOOPING_ERRDISABLE_WARNING: DHCP Snooping received 25 DHCP packets on interface Gi0/1*Oct 23 15:52:07.246: %DHCP_SNOOPING-4-DHCP_SNOOPING_RATE_LIMIT_EXCEEDED: The interface Gi0/1 is receiving more than the threshold set*Oct 23 15:52:07.260: %PM-4-ERR_DISABLE: dhcp-rate-limit error detected on Gi0/1, putting Gi0/1 in err-disable stateL2#*Oct 23 15:52:08.264: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to downL2#*Oct 23 15:52:09.331: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to down
L2(config)#do show interfaces status err-disabledPort Name Status Reason Err-disabled VlansGi0/1 err-disabled dhcp-rate-limitL2(config-if)#shutdownL2(config-if)#no shutdown*Oct 23 16:27:20.663: %LINK-5-CHANGED: Interface GigabitEthernet0/1, changed stn*Oct 23 16:27:22.873: %LINK-3-UPDOWN: Interface GigabitEthernet0/1, changed state to up*Oct 23 16:27:23.873: %LINEPROTO-5-UPDOWN: Line protocol on Interface GigabitEthernet0/1, changed state to up