101 Labs - Wireshark WCNA by Browning Paul
Author:Browning, Paul [Browning, Paul]
Language: eng
Format: epub
Published: 2020-06-24T16:00:00+00:00
In this scenario, one or more hosts on the network have statically-assigned addresses and the DHCP server is unaware of this. In such a situation, the DHCP server may offer an address that is already in use in the network. This can cause a problem because two hosts with the same IP cannot exist on the same network. The figure below shows this problematic situation.
In the network, “Client 2” exists with a static IP1, while all other clients have dynamic IP. When “Client n+1” enters the network, the DHCP server offers the exact IP1 to the new client. The DHCP client can perform the duplicate address test. If the DHCP client locates another host with the same address, it must decline the IP address provided in the DHCP offer. It, however, remains with no IP address assigned.
Task 2:
A better alternative is that the DHCP server directly performs a duplicate address test (typically using ICMP Echo Requests) so that it offers only those IP addresses that are not currently not being used in the network.
The situation described above is not easy to understand, we should apply a DHCP approach based on “Capture Filter” instead of analyzing all the traffic.
Let’s suppose you capture traffic by using the capture filter port 67 or port 68 to capture only DHCP messages. In this situation, you cannot observe the duplicate address test (ICMP) made by the client or the duplicate ICMP test made by the DHCP server, thus, totally missing the problem.
The only thing you see is that the client declined the DHCP offer but you do not know why. The solution is to capture all the traffic and analyze it with display filters. The figure below shows some of the display filters available for DHCP. In the filter toolbar, type dhcp. The auto-complete feature displays a drop-down menu with all available DHCP filters, as shown in the figure below.
Download
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Sass and Compass in Action by Wynn Netherland Nathan Weizenbaum Chris Eppstein Brandon Mathis(7781)
Grails in Action by Glen Smith Peter Ledbrook(7696)
Configuring Windows Server Hybrid Advanced Services Exam Ref AZ-801 by Chris Gill(6565)
Azure Containers Explained by Wesley Haakman & Richard Hooper(6554)
Running Windows Containers on AWS by Marcio Morales(6083)
Kotlin in Action by Dmitry Jemerov(5066)
Microsoft 365 Identity and Services Exam Guide MS-100 by Aaron Guilmette(4916)
Combating Crime on the Dark Web by Nearchos Nearchou(4498)
Management Strategies for the Cloud Revolution: How Cloud Computing Is Transforming Business and Why You Can't Afford to Be Left Behind by Charles Babcock(4414)
Microsoft Cybersecurity Architect Exam Ref SC-100 by Dwayne Natwick(4337)
The Ruby Workshop by Akshat Paul Peter Philips Dániel Szabó and Cheyne Wallace(4172)
The Age of Surveillance Capitalism by Shoshana Zuboff(3950)
Python for Security and Networking - Third Edition by José Manuel Ortega(3740)
Learn Windows PowerShell in a Month of Lunches by Don Jones(3508)
The Ultimate Docker Container Book by Schenker Gabriel N.;(3407)
Mastering Python for Networking and Security by José Manuel Ortega(3344)
Mastering Azure Security by Mustafa Toroman and Tom Janetscheck(3330)
Blockchain Basics by Daniel Drescher(3294)
Learn Wireshark by Lisa Bock(3261)
