Created on
10-24-2023
11:44 PM
Edited on
01-22-2025
07:44 AM
By
Jean-Philippe_P
Description | This article describes a case where the messages from a DHCP server (OFFER and ACK) to the clients are unicast and explains the necessity of focusing on the broadcast messages that arrive on FortiGate. |
Scope |
FortiOS, DHCP Service.
Topology:
|
Solution |
This article presents 3 options to confirm the presence of a ROGUE DHCP Server (not expected Server) on the network.
From the packet captured on the FortiGate, open the DHCP Request message (broadcasted from the client) and look for the option 'Server Identifier' as shown below.
From the RFC 2131, this option should exist on the message, or at least the Vendor Class Identifier
This option is simpler than the first option: disable the status of the DHCP Server on the interface, and retry obtaining IP from the client
Example: Get a new DHCP address on a Windows client. Open CMD and type 'ipconfig /all', it will be possible to check the DHCP server IP address. Now run the command 'arp -a' it will be possible to check the ARP table of the Windows client, and what is the MAC address of the server found with the command 'ipconfig /all'. With this information it will now be possible to discover to which switchport the rogue DHCP server is directly connected to. |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.