Blocking rogue DHCP servers
The reader who was concerned about making a loop while connecting a switch to itself was also facing “customer-installed” DHCP servers in his LAN. He wrote:
Some users have installed their own Linksys routers and plug our cable in router's LAN ports, so there is DHCP servers fight in our LAN. How can I sort this out (I cannot physically find the location of the Linsys routers)?
The ideal solution is DHCP snooping (assuming your switch supports it), well documented on www.cisco.com. The basic configuration takes only a few minutes:
- Enable the feature globally with the ip dhcp snooping global configuration command.
- Enable the feature for individual VLANs with the ip dhcp snooping vlan number global configuration command.
- Configure the trusted interfaces with the ip dhcp snooping trust interface configuration command.
- Rate-limit DHCP on untrusted interfaces with the ip dhcp snooping limit rate interface configuration command.
This article is part of You've asked for it series.
Still waiting for a fix to drop only dhcp traffic :(
i.e. a trunk interface where a vm or another switch (not managed by you, or not supporting dhcp snooping) is connected.
You want to snoop dhcp packets from a specific vlan on this interface, but you don't want to shut down the port if they exceed a limit, because there are other vlans passing through this interface too. You just want to drop those dhcp packets.