SlideShare a Scribd company logo
Protect Your DHCP
Infrastructure from
Cyberattacks
JJ Sun
PSM
Agenda
• IEC62443 IACS standard
• Scope and why
• DHCP protocol and how it works
• DHCP’s Vulnerabilities
• Types of Cyberattacks to DHCP
• Defense by network security – DHCP Snooping
• Korenix products with advanced security features
IEC62443
Fundamental But Insecure
MAC
IP
TCP / UDP
Applications
Dynamic Host Configuration Protocol
PLC I/O Drive Sensor
HMI IPCAdmin station
Camera Reader
DHCP Server
DHCP Architecture
DHCP Client
(MAC bbb.bbb.bbb)
DHCP Client
(MAC ccc.ccc.ccc)
DHCP Server
DHCP Client
(MAC aaa.aaa.aaa)
IP Address Pool / Binding Table
192.168.10.1 aaa.aaa.aaa
192.168.10.2 bbb.bbb.bbb
192.168.10.3 (available)
…
192.168.10.100 (available)
Policy
IP
Subnet mask
Gateway
DNS
DHCP Client (MAC aaa.aaa.aaa)DHCP Server
DHCP Transaction
DISCOVER
(Broadcast)
I am MAC aaa.aaa.aaa. Please
assign network configuration
for me.
REQUEST
(Broadcast) Yes, please lease it to me.
OFFER
(Broadcast)
I’m the DHCP server and how
about this IP address for you?
ACK
(Unicast)
Done, you can use the IP
address now.
Vulnerabilities and Attacks
• DHCP spoofing from client
• DHCP spoofing from server
• DHCP starvation and DoS
• Man-In-The-Middle or Hijacking
• Broadcasting
• No authentication
• No validation
Malicious Client (MAC ccc.ccc.ccc)DHCP Server
OFFER
How about this IP address?
ACK
Done, you can use it now.
DISCOVER I am MAC aaa.aaa.aaa. Please assign
IP and network configuration for me.
REQUEST Yes, please lease it to me.
Spoofing From Malicious Client
DHCP Client (MAC ccc.ccc.ccc)DHCP Server
DISCOVER I am MAC aaa.aaa.aaa. please assign
IP and network configuration for me.
…DISCOVER I am MAC bbb.bbb.bbb. please assign
IP and network configuration for me.
…
DISCOVER I am MAC zzz.zzz.zzz. please assign
IP and network configuration for me.
…
DHCP Starvation
Malicious Client (MAC ccc.ccc.ccc)DHCP Server
DISCOVER I am MAC ccc.ccc.ccc. please assign
IP and network configuration for me.
…DISCOVER I am MAC ccc.ccc.ccc. please assign
IP and network configuration for me.
…
DISCOVER I am MAC ccc.ccc.ccc. please assign
IP and network configuration for me.
…
Denial Of Service
DHCP ClientDHCP Server
DISCOVER
The OFFER from the rogue
DHCP server arrives client
before the one from
legitimate DHCP server. The
transcation is scrambled and
the network configuration
goes wrong.
OFFER
Rogue DHCP Server
Spoofing From Rogue Server
More Than DHCP Attacks
DHCP Client
DHCP Server
DHCP Client
Rogue DHCP Server
Gateway
IP address
Gateway
DNS
Defense By Network Security
Goal:
• Avoid invalid DHCP messages
coming into the network
• Make sure that network
configurations are given from
the trusted DHCP server
DHCP Client
DHCP Server
DHCP Client
Rogue DHCP Server
Malicious DHCP Client
DHCP Snooping
• A network security technology protects DHCP infrastructure against malicious DHCP
sources, either from clients or servers, and to block fake DHCP messages
• Network (LAN) switches with this feature snoop DHCP messages to ensure the
incoming DHCP messages are valid, it also helps to ensure network configuration
are given from the trusted DHCP server
• More importantly, beyond guarding DHCP infrastructure, DHCP snooping generates
an table including information about a trusted network, which can be further used by
other security features
How DHCP Snooping Works
DHCP Client
DHCP Server
DHCP Client DHCP Client
TRUSTED
? ? ?UNTRUSTED
DHCP Client (MAC ccc.ccc.ccc)DHCP Server
I am MAC aaa.aaa.aaa. please
assign an IP for me.
I am MAC ccc.ccc.ccc. please
assign an IP for me.
Switch
Validate Messages
DISCOVER
I am a server and here is the IP
for you.
DISCOVER
OFFER
?
Rogue DHCP Server
Fix On Trusted Sources
DHCP Client
DHCP Server
DHCP Client
Rogue DHCP Server
DHCP Client
? ? ?
Rogue DHCP Server
JetNet with DHCP Snooping
Din-Rail switches
Layer 2
• JetNet 5612G
• JetNet 5620G
Rackmount switches
Layer 2
• JetNet 5428G
• JetNet 6528G
• JetNet 6628G
• JetNet 6628X
Layer 3
• JetNet 7014G
• JetNet 7020G
Layer 3
• JetNet 6828G
• JetNet 7628X
JetPoE with DHCP Snooping
Din-Rail switches
Layer 2
• JetNet 5612GP
• JetNet 5620GP
Rackmount switches
Layer 2
• JetNet 5728G-16P
• JetNet 5728G-24P
• JetNet 6628XP
Layer 3
• JetNet 7310G
• JetNet 7714G
Layer 3
• JetNet 6728G-16P
• JetNet 6728G-24P
• JetNet 7628XP
Configuration
Web
Configuration
Enable
DHCP Snooping
Assign
Trusted Ports
Enable
Event Warning
Statistics and Binding Table
Address
Binding Table
Snooping
Statistics
Summary
• DHCP infrastructure is insecure by nature. It is crucial and strongly recommended to
apply security protection if DHCP is used in an industrial network
• Network switches play an important role to protect an DHCP infrastructure. DHCP
snooping should be enabled to against different type of spoofing attacks, either from
rogue DHCP servers or malicious clients
• Addressing IEC62443 the security standard, Korenix has implemented DHCP
snooping on both its din-rail switches or rackmount switches, which fit for different
level of networks for mission-critical industrial applications
To Be Continued
• Korenix Network Security Webinar – Part 2
MAC
IP
DHCP
APPLICATION
Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training (1)  2019

More Related Content

PDF
Make The Impossible Possible - Industrial PoE Brochure 2014
PDF
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
PDF
A Better Connected World - IDC Product Catalogue 2018
PDF
IGS-10020MT Industrial Managed Gigabit Switch
PDF
"Morphology of Modern Data Center Networks: Overview". Dinesh Dutt, Cumulus N...
DOCX
Compare cisco asa 5505, asa 5512 x and asa 5515-x
DOCX
C6800 sup6 t vs. c6800-sup6t-xl
PPT
Icnd210 s08l02
Make The Impossible Possible - Industrial PoE Brochure 2014
A More Reilable LAN by MSR Redundant Ring - Redundant Technology 2018
A Better Connected World - IDC Product Catalogue 2018
IGS-10020MT Industrial Managed Gigabit Switch
"Morphology of Modern Data Center Networks: Overview". Dinesh Dutt, Cumulus N...
Compare cisco asa 5505, asa 5512 x and asa 5515-x
C6800 sup6 t vs. c6800-sup6t-xl
Icnd210 s08l02

What's hot (20)

PDF
Catalyst Backbone and Instant Access Technologies
PDF
GSW-2824P Combo Ethernet Switch
PDF
Next Generation Campus Switching: Are You Ready
PDF
Market Trend And Korenix IIoT Vision - 2018
PPT
Icnd210 s06l02
PPT
Icnd210 cag
PPT
Icnd210 s08l04
PDF
Y packet Microwave point to point
PPT
Icnd210 lg
PDF
SDS_SSL_MPM_UN_A4
PDF
IGS-6325-8UP2S Industrial Managed Ethernet Switch
PDF
ComNet CWGE26FX2TX24MSPOE Data Sheet
PPT
Icnd210 s08l01
PPT
Icnd210 s02l05
PDF
Unified Access Update - 11AC and Switching Platform
PPT
Icnd210 s08l03
PDF
Arduino: Ethernet Shield para Arduino
PPT
Icnd210 s02l04
PDF
IVC-234GT Industrial 1-Port BNC/RJ11 to 4-Port Gigabit Ethernet Extender
PPT
Icnd210 s06l01
Catalyst Backbone and Instant Access Technologies
GSW-2824P Combo Ethernet Switch
Next Generation Campus Switching: Are You Ready
Market Trend And Korenix IIoT Vision - 2018
Icnd210 s06l02
Icnd210 cag
Icnd210 s08l04
Y packet Microwave point to point
Icnd210 lg
SDS_SSL_MPM_UN_A4
IGS-6325-8UP2S Industrial Managed Ethernet Switch
ComNet CWGE26FX2TX24MSPOE Data Sheet
Icnd210 s08l01
Icnd210 s02l05
Unified Access Update - 11AC and Switching Platform
Icnd210 s08l03
Arduino: Ethernet Shield para Arduino
Icnd210 s02l04
IVC-234GT Industrial 1-Port BNC/RJ11 to 4-Port Gigabit Ethernet Extender
Icnd210 s06l01
Ad

Similar to Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training (1) 2019 (20)

PDF
Configure DHCP Server and DHCP-Relay
PPT
Wintel ppt for dhcp
PPTX
Dhc pv4
PDF
dhcp.pdf
PPTX
Modul dhcp server menggunakan mikrotik os
PDF
Fedv6tf-fhs
PPT
Client server
PPTX
162 15-768
PPTX
CCNA DHCP (Dynamic Host Control Protocol)
PDF
R bernardino hand_in_assignment_week_1
PPTX
Module (8) DHCP Server.pptx
PPTX
EMEA Airheads- Manage Devices at Branch Office (BOC)
PPT
Dynamic Host Configuration Protocol
PPTX
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
PPT
Chapter14ccna
PDF
Web Security Deployment
PPTX
DOCX
DHCP and Nat
PPT
Moac291 Week02
PPTX
Basic Cisco ASA 5506-x Configuration (Firepower)
Configure DHCP Server and DHCP-Relay
Wintel ppt for dhcp
Dhc pv4
dhcp.pdf
Modul dhcp server menggunakan mikrotik os
Fedv6tf-fhs
Client server
162 15-768
CCNA DHCP (Dynamic Host Control Protocol)
R bernardino hand_in_assignment_week_1
Module (8) DHCP Server.pptx
EMEA Airheads- Manage Devices at Branch Office (BOC)
Dynamic Host Configuration Protocol
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
Chapter14ccna
Web Security Deployment
DHCP and Nat
Moac291 Week02
Basic Cisco ASA 5506-x Configuration (Firepower)
Ad

More from Jiunn-Jer Sun (20)

PDF
Transformation From Today To Tomorrow - Market and Product Strategy 2018
PDF
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
PDF
Secure Reliable Quality Networking Solutions for Railway 2019
PDF
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
PDF
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
PDF
Power Distribution Feeder Automation - Application Story 2012
PDF
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
PDF
Enhancing Network Quality for Video Transmission 2012
PDF
Beijer Korenix Connected - Beijer Sales Kit 2019
PDF
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
PDF
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
PDF
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
PDF
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
PDF
Protect The Fundamental of IP Networking - Network Security Features 2019
PDF
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
PPSX
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
PDF
Wireless AP and Antenna Quick Selection Guide 2013
PDF
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
PDF
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
PDF
Flying You From Wired To Wireless - Product Brochure 2013
Transformation From Today To Tomorrow - Market and Product Strategy 2018
Industrial Wireless for Transportation - Korenix Wireless Solution 2016
Secure Reliable Quality Networking Solutions for Railway 2019
Effective Network Security Against Cyber Threats - Network Segmentation Techn...
Outstanding In Redundancy And Security - Korenix Ethernet Switches Brochure ...
Power Distribution Feeder Automation - Application Story 2012
Ensuring Network Reliabilty And Quality For IP Surveillance 2012
Enhancing Network Quality for Video Transmission 2012
Beijer Korenix Connected - Beijer Sales Kit 2019
Defend Your DHCP Infrastructure Against Cyber Attacks - Network Security Feat...
Build A Solid Foundation For Industrial Network Security - Cybersecurity Webi...
Essential Protection for The Fundamental of IP Networking - Cybersecurity Tra...
A Big Picture of IEC 62443 - Cybersecurity Webinar (2) 2020
Protect The Fundamental of IP Networking - Network Security Features 2019
Levels Up Your Redundant Network By ERPS - Redundant Technology 2019
Broadcast Storm - The Root Causes And The Solutions - Whitepaper 2012
Wireless AP and Antenna Quick Selection Guide 2013
Making Your Heavy Chores Easy - Industrial PoE Handbook 2008
Get Inspired By Beijer's Wireless Solution - Wireless Brochure 2016
Flying You From Wired To Wireless - Product Brochure 2013

Recently uploaded (20)

PPTX
sap open course for s4hana steps from ECC to s4
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPT
Teaching material agriculture food technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Electronic commerce courselecture one. Pdf
PPTX
Spectroscopy.pptx food analysis technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
sap open course for s4hana steps from ECC to s4
Mobile App Security Testing_ A Comprehensive Guide.pdf
Teaching material agriculture food technology
Machine learning based COVID-19 study performance prediction
Diabetes mellitus diagnosis method based random forest with bat algorithm
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Reach Out and Touch Someone: Haptics and Empathic Computing
Electronic commerce courselecture one. Pdf
Spectroscopy.pptx food analysis technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles - August'25 Week I
Understanding_Digital_Forensics_Presentation.pptx
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Unlocking AI with Model Context Protocol (MCP)
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
Review of recent advances in non-invasive hemoglobin estimation

Protect Your DHCP Infrastructure from Cyber Attacks - Cybersecurity Training (1) 2019

  • 1. Protect Your DHCP Infrastructure from Cyberattacks JJ Sun PSM
  • 2. Agenda • IEC62443 IACS standard • Scope and why • DHCP protocol and how it works • DHCP’s Vulnerabilities • Types of Cyberattacks to DHCP • Defense by network security – DHCP Snooping • Korenix products with advanced security features
  • 5. Dynamic Host Configuration Protocol PLC I/O Drive Sensor HMI IPCAdmin station Camera Reader DHCP Server
  • 6. DHCP Architecture DHCP Client (MAC bbb.bbb.bbb) DHCP Client (MAC ccc.ccc.ccc) DHCP Server DHCP Client (MAC aaa.aaa.aaa) IP Address Pool / Binding Table 192.168.10.1 aaa.aaa.aaa 192.168.10.2 bbb.bbb.bbb 192.168.10.3 (available) … 192.168.10.100 (available) Policy IP Subnet mask Gateway DNS
  • 7. DHCP Client (MAC aaa.aaa.aaa)DHCP Server DHCP Transaction DISCOVER (Broadcast) I am MAC aaa.aaa.aaa. Please assign network configuration for me. REQUEST (Broadcast) Yes, please lease it to me. OFFER (Broadcast) I’m the DHCP server and how about this IP address for you? ACK (Unicast) Done, you can use the IP address now.
  • 8. Vulnerabilities and Attacks • DHCP spoofing from client • DHCP spoofing from server • DHCP starvation and DoS • Man-In-The-Middle or Hijacking • Broadcasting • No authentication • No validation
  • 9. Malicious Client (MAC ccc.ccc.ccc)DHCP Server OFFER How about this IP address? ACK Done, you can use it now. DISCOVER I am MAC aaa.aaa.aaa. Please assign IP and network configuration for me. REQUEST Yes, please lease it to me. Spoofing From Malicious Client
  • 10. DHCP Client (MAC ccc.ccc.ccc)DHCP Server DISCOVER I am MAC aaa.aaa.aaa. please assign IP and network configuration for me. …DISCOVER I am MAC bbb.bbb.bbb. please assign IP and network configuration for me. … DISCOVER I am MAC zzz.zzz.zzz. please assign IP and network configuration for me. … DHCP Starvation
  • 11. Malicious Client (MAC ccc.ccc.ccc)DHCP Server DISCOVER I am MAC ccc.ccc.ccc. please assign IP and network configuration for me. …DISCOVER I am MAC ccc.ccc.ccc. please assign IP and network configuration for me. … DISCOVER I am MAC ccc.ccc.ccc. please assign IP and network configuration for me. … Denial Of Service
  • 12. DHCP ClientDHCP Server DISCOVER The OFFER from the rogue DHCP server arrives client before the one from legitimate DHCP server. The transcation is scrambled and the network configuration goes wrong. OFFER Rogue DHCP Server Spoofing From Rogue Server
  • 13. More Than DHCP Attacks DHCP Client DHCP Server DHCP Client Rogue DHCP Server Gateway IP address Gateway DNS
  • 14. Defense By Network Security Goal: • Avoid invalid DHCP messages coming into the network • Make sure that network configurations are given from the trusted DHCP server DHCP Client DHCP Server DHCP Client Rogue DHCP Server Malicious DHCP Client
  • 15. DHCP Snooping • A network security technology protects DHCP infrastructure against malicious DHCP sources, either from clients or servers, and to block fake DHCP messages • Network (LAN) switches with this feature snoop DHCP messages to ensure the incoming DHCP messages are valid, it also helps to ensure network configuration are given from the trusted DHCP server • More importantly, beyond guarding DHCP infrastructure, DHCP snooping generates an table including information about a trusted network, which can be further used by other security features
  • 16. How DHCP Snooping Works DHCP Client DHCP Server DHCP Client DHCP Client TRUSTED ? ? ?UNTRUSTED
  • 17. DHCP Client (MAC ccc.ccc.ccc)DHCP Server I am MAC aaa.aaa.aaa. please assign an IP for me. I am MAC ccc.ccc.ccc. please assign an IP for me. Switch Validate Messages DISCOVER I am a server and here is the IP for you. DISCOVER OFFER ?
  • 18. Rogue DHCP Server Fix On Trusted Sources DHCP Client DHCP Server DHCP Client Rogue DHCP Server DHCP Client ? ? ? Rogue DHCP Server
  • 19. JetNet with DHCP Snooping Din-Rail switches Layer 2 • JetNet 5612G • JetNet 5620G Rackmount switches Layer 2 • JetNet 5428G • JetNet 6528G • JetNet 6628G • JetNet 6628X Layer 3 • JetNet 7014G • JetNet 7020G Layer 3 • JetNet 6828G • JetNet 7628X
  • 20. JetPoE with DHCP Snooping Din-Rail switches Layer 2 • JetNet 5612GP • JetNet 5620GP Rackmount switches Layer 2 • JetNet 5728G-16P • JetNet 5728G-24P • JetNet 6628XP Layer 3 • JetNet 7310G • JetNet 7714G Layer 3 • JetNet 6728G-16P • JetNet 6728G-24P • JetNet 7628XP
  • 22. Statistics and Binding Table Address Binding Table Snooping Statistics
  • 23. Summary • DHCP infrastructure is insecure by nature. It is crucial and strongly recommended to apply security protection if DHCP is used in an industrial network • Network switches play an important role to protect an DHCP infrastructure. DHCP snooping should be enabled to against different type of spoofing attacks, either from rogue DHCP servers or malicious clients • Addressing IEC62443 the security standard, Korenix has implemented DHCP snooping on both its din-rail switches or rackmount switches, which fit for different level of networks for mission-critical industrial applications
  • 24. To Be Continued • Korenix Network Security Webinar – Part 2 MAC IP DHCP APPLICATION