Understand why a rogue Dynamic Host Configuration Protocol server can not only disrupt communications on a subnet, but can also pose a security risk. Learn the most common ways rogue DHCP servers form. Greg explains some common ways to detect a rogue, track it to the edge switch port, and shut it down. Observe common methods to prevent them from forming.
- [Narrator] I have personally maintained…department networks for over a decade, and nothing used…to wreak havoc like a rogue DHCP server.…A rogue is nothing more than an unauthorized DHCP server…on a network.…First, I'll cover techniques to trouble shoot and mitigate…a rogue.…Then I'll cover a couple of methods to prevent it.…A rogue DHCP server can show up for a couple of reasons.…A rogue can be used to perform a man-in-the-middle attack.…A malicious user can hand out IPs to other hosts,…becoming a default gateway for them.…
Traffic proxying through an attacker can be manipulated…or collected.…It's far more common for a user to incorrectly plug…in a device.…In apartment networks, it usually follows…a fairly predictable path.…I will receive a call from a user saying…"I can't get to the internet."…At this point, I'll ask when the issue started.…This will help me figure out if they are a brand new user…or if the service suddenly stopped working.…I'll determine if they are plugged straight into the wall…or if they are connecting wirelessly.…
Even if you're rusty on your OSI model knowledge, this course is invaluable if you're having trouble with your network. It offers a clear, practical troubleshooting guide to narrowing down and solving most problems related to network connectivity.
- Troubleshooting the physical layer: POTS, Ethernet, and more
- Troubleshooting the data link layer
- Troubleshooting the network layer
- Troubleshooting the transport layer
- Troubleshooting Wi-Fi
- Troubleshooting proactively