DHCP Snooping Flashcards

1
Q

What is DHCP Snooping?

A

DHCP Snooping only allows DHCP exchanges to take place across certain trusted ports, and prevents rogue DHCP servers.

DHCP Snooping prevents a malicious actor from pretending to be the DHCP server.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What is the default port state once DHCP snooping is enabled?

A

By default, all ports are considered un-trusted.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

What is the default action for DHCP snooping violations?

A

The offending port will be placed into err-disabled mode.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What are the three steps in configuring DHCP snooping?

A

1.Enable DHCP snooping globally. 2.Enable which VLANs DHCP snooping will enforce. 3.Specify your trusted ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What is the DHCP snooping validity check?

A

All DHCP discover/request packets will have the option 82 value replaced with the switch’s own value. If this value does not match on the DHCP replies, the packets are dropped.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is rate limiting?

A

Rate limiting sets how many DHCP packets are allowed across a trusted port per second.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What is DHCP snooping necessary for?

A

Dynamic arp inspection and IP source guard.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

What are three required steps to configure DHCP snooping on a switch? (Choose three)

A. Configure the switch to insert and remove DHCP relay information (option-82 field) in forwarded DHCP request messages.
B. Configure DHCP snooping globally.
C. Configure the switch as a DHCP sewer.
D. Configure DHCP snooping on an interface.
E. Configure all interfaces as DHCP snooping trusted interfaces.
F. Configure DHCP snooping on a VLAN or range of VLANs.

A

Answer: B D F

Explanation

To configure DHCP snooping feature, at least three steps must be done:

Sequence and Description Command
1. Configure global DHCP snooping Switch(config)# ip dhcp snooping
2. Configure trusted ports (as least on 1 port).
By default, all ports are untrusted Switch(config-if)# ip dhcp snooping trust
3. Configure DHCP snooping for the selected VLANs Switch(config)# ip dhcp snooping vlan {VLAN-ID | VLAN range}
Other steps are just optional:

+ Configure DHCP Option 82
Switch(config)# ip dhcp snooping information option

+ Configure the number of DHCP packets per second (pps) that are acceptable on the port:
Switch(config-if)# ip dhcp snooping limit rate {rate}

Reference: SWITCH Student Guide

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Refer to the exhibit. What type of attack is being defended against?

show_ip_dhcp_snooping.jpg

A. Snooping attack
B. Rogue device attack
C. STP attack
D. VLAN attack
E. Spoofing attack
F. MAC flooding attack

A

Answer: E

Explanation

DHCP snooping is a method used to defend DHCP spoofing.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Refer to the exhibit. DHCP snooping is enabled for selected VLANs to provide security on the network. How do the switch ports handle the DHCP messages?

show_ip_dhcp_snooping_2.jpg

A. Ports Fa2/1 and Fa2/2 source DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages and respond to DHCP requests.
B. Ports Fa2/1 and Fa2/2 respond to DHCP requests only. Port Fa3/1 is eligible to source all DHCP messages.
C. Ports Fa2/1 and Fa2/2 are eligible to source all DHCP messages and respond to DHCP requests. Port Fa3/1 can source DHCP requests only.
D. All three ports, Fa2/1, Fa2/2, and Fa3/1, are eligible to source all DHCP messages and respond to DHCP requests.

A

Answer: C

Explanation

Trusted ports are allowed to send all types of DHCP messages. Untrusted ports can send only DHCP requests. If a DHCP response is seen on an untrusted port, the port is shut down. In this case, Fa2/1 & Fa2/2 are trusted (can send all types of DHCP messages) while Fa3/1 is untrusted (can only send DHCP requests).

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Refer to the exhibit. An attacker is connected to interface Fa0/11 on switch A-SW2 and attempts to establish a DHCP server for a man-in-middle attack. Which recommendation, if followed, would mitigate this type of attack?

DHCP_Spoofing_untrusted_port.jpg

A. All switch ports in the Building Access block should be configured as DHCP untrusted ports.
B. All switch ports in the Building Access block should be configured as DHCP trusted ports.
C. All switch ports connecting to servers in the Server Farm block should be configured as DHCP untrusted ports.
D. All switch ports connecting to hosts in the Building Access block should be configured as DHCP trusted ports.
E. All switch ports in the Server Farm block should be configured as DHCP untrusted ports.
F. All switch ports connecting to hosts in the Building Access block should be configured as DHCP untrusted ports.

A

Answer: F

Explanation

All switch ports connecting to hosts should only send DHCP Requests and they are the ports that can be easily accessed by an attacker -> They should be configured as DHCP untrusted ports.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

An attacker is launching a DoS attack with a public domain hacking tool that is used to exhaust the IP address space available from the DHCP servers for a period of time. Which procedure would best defend against this type of attack?

A. Configure only trusted interfaces with root guard.
B. Implement private VLANs (PVLANs) to carry only user traffic.
C. Implement private VLANs (PVLANs) to carry only DHCP traffic.
D. Configure only untrusted interfaces with root guard.
E. Configure DHCP spoofing on all ports that connect untrusted clients.
F. Configure DHCP snooping only on ports that connect trusted DHCP servers.

A

Answer: F

Explanation

To defend DHCP spoofing attack, we only need to configure DHCP snooping on trusted interfaces because other ports are classified as untrusted ports by default.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What is an untrusted port under dhcp snooping?

A

any dhcp reply coming from an untrusted port is discarded and the offending port is put in errdisable

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A Cisco Catalyst switch that is prone to reboots continues to rebuild the DHCP snooping database. What is the solution to avoid the snooping database from being rebuilt after every device reboot?

A

A DHCP snooping database agent should be configured.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

A server with a statically assigned IP address is attached to a switch that is provisioned for DHCP snooping. For more protection against malicious attacks, the network team is considering enabling dynamic ARP inspection alongside DHCP snooping. Which solution ensures that the server maintains network reachability in the future?

A

ip dhcp snooping binding vlan interface expiry

Configure a static DHCP snooping binding entry on the switch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

DHCP snooping and IP Source Guard have been configured on a switch that connects to several client workstations. The IP address of one of the workstations does not match any entries found in the DHCP binding database. Which statement describes the outcome of this scenario?

A

he packets originating from the workstation are assumed to be spoofed and will be discarded.

18
Q

A DHCP configured router is connected directly to a switch that has been provisioned with DHCP snooping. IP Source Guard with the ip verify source port-security command is configured under the interfaces that connect to all DHCP clients on the switch. However, clients are not receiving an IP address via the DHCP server.
Which option is the cause of this issue?

A

The DHCP server does not support information option 82

19
Q

A switch is added into the production network to increase port capacity. A network engineer is configuring the switch for DHCP snooping and IP Source Guard, but is unable to configure ip verify source under several of the interfaces. Which option is the cause of the problem?

A

The interfaces are configured as Layer 3 using the no switchport command.

The following restrictions apply to IP source guard:
+ Supported only on ingress Layer 2 ports (including access and trunk ports)
+ Supported only in hardware; not applied to any traffic that is processed in software.
+ Does not support filtering of traffic based on MAC address.
+ Is not supported on private VLANs.

20
Q

Which type of information does the DHCP snooping binding database contain?

A

untrusted hosts with leased IP addresses

21
Q

Which command is needed to enable DHCP snooping if a switchport is connected to a DHCP server?

A

ip dhcp snooping trust

22
Q

Which database is used to determine the validity of an ARP packet based on a valid IP-to-MAC address binding?

A

DHCP snooping database

23
Q

What is an untrusted port in *DHCP Snooping*?

A

An untrusted port in DHCP Snooping are ports that are unable to respond to DHCP requests. This is enabled on all ports by default.

24
Q

What is a trusted port in *DHCP Snooping*?

A

A trusted port is allowed to respond to dhcp requests and must be manually configured.

25
Q

What is the *DHCP Snooping Binding Database*?

A

The DHCP Snooping Binding Database tracks DHCP requests and also tracks information about the client’s received address, MAC, and lease time. Other security features rely on DHCP Snooping Binding Database to operate.

26
Q

Why is DHCP Snooping only designed to be run on access layer switches?

A

The reason why DHCP Snooping is only designed to run on access layer switches is due to the GiAddr field. When DHCP Relay is used, the GiAddr field is set to a non-zero value, which would ultimate fail the DHCP Snooping checks and kill the request entirely even if it is from a trusted port. This is why having DHCP upstream is not a good idea.

27
Q

What configuration command rate limits messages in *DHCP Snooping*?

A

Sw1(config-if)# ip dhcp snooping limit rate <1 - 2048>

28
Q

What configuration command enables a trusted port in *DHCP Snooping*?

A

Sw1(config-if)# ip dhcp snooping trust

29
Q

What useful show commands displays information about *DHCP Snooping*?

A

Sw1# show ip dhcp snooping

Sw1# show ip dhcp binding

30
Q
A
31
Q

What configuration command enables *DHCP Snooping*?

A

Sw1(config)# ip dhcp snooping

Sw1(config)# ip dhcp snooping vlan <vlan-id></vlan-id>