Created on
10-24-2023
11:44 PM
Edited on
06-24-2025
12:07 AM
By
Jean-Philippe_P
Description | This article describes a case where the messages from a DHCP server (OFFER and ACK) to the clients are unicast and explains the necessity of focusing on the broadcast messages that arrive on FortiGate. |
Scope |
FortiOS, DHCP Service.
Topology:
|
Solution |
This article presents 3 options to confirm the presence of a ROGUE DHCP Server (not expected Server) on the network.
Note: Packet capture can be done in 2 ways:
The 'interface' part here is referring to the interface where the ROGUE DHCP server is hosted. Here the ports 67 and 68 are being used, as the DHCP uses ports 67 and 68(By default).
As per the image:
From the packet captured on the FortiGate, open the DHCP Request message (broadcasted from the client) and look for the option 'Server Identifier' as shown below.
From RFC 2131, this option should exist on the message, or at least the Vendor Class Identifier.
This option is simpler than the first option: disable the status of the DHCP Server on the interface, and retry obtaining an IP from the client
Example: Get a new DHCP address on a Windows client. Open CMD and type 'ipconfig /all', and it will be possible to check the DHCP server IP address. Now run the command 'arp -a' it will be possible to check the ARP table of the Windows client, and what is the MAC address of the server found with the command 'ipconfig /all'. With this information, it will now be possible to discover which switchport the rogue DHCP server is directly connected to.
Related articles: Technical Tip: Understanding DHCP Server and DHCP Relay functionality on FortiGate Troubleshooting Tip: Check DHCP Messages with VLAN Tag using Wireshark Packet Capture |
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.