Keywords: intranet management, network security, wireless LAN, DHCP, MAC bridges, IP spoofing
نویسنده
چکیده
DHCP (Dynamic Host Configuration Protocol) [1, 2] is widely deployed in resource allocation and intranet management. However, DHCP mechanism is not mandatory, and DHCP server can neither force DHCP clients to release their leases, nor enforce cooperation from externally configured hosts that are DHCP-unaware. Although new DHCP options such as DHCP reconfigure extension [3] have been proposed, the basic problems inherent in DHCP mechanism cannot be solved without first strengthening its operations. In this paper, a DHCP-based infrastructure for intranet management was proposed by combining the resource allocation functions of DHCP server with the packet filtering features of MAC (Medium Access Control) bridges [4] such as Ethernet switches and wireless access points. DHCP clients that do not follow DHCP mechanism as well as DHCP-unaware hosts that do not abide by our management policy will be denied network accesses by MAC bridges. Through the cooperation of DHCP server and MAC bridges, resource allocation and access control can be integrated and local configuration conflicts can be reduced to the minimum.
منابع مشابه
Enhanced Intranet Management in a DHCP-Enabled Environment
DHCP (Dynamic Host Configuration Protocol) is widely deployed in resource allocation and intranet management. However, DHCP mechanism is not mandatory, and DHCP server can neither force DHCP clients to release their leases, nor enforce cooperation from externally configured hosts that are DHCP-unaware. Although new DHCP options such as DHCP reconfigure extension have been proposed, the basic pr...
متن کاملRFC 4363 Bridge MIB Extensions January 2006 1 . The Internet - Standard Management Framework
This memo defines a portion of the Management Information Base (MIB) for use with network management protocols in TCP/IP-based internets. In particular, it defines two MIB modules for managing the capabilities of MAC bridges defined by the IEEE 802.1D-1998 (TM) MAC Bridges and the IEEE 802.1Q-2003 (TM) Virtual LAN (VLAN) standards for bridging between Local Area Network (LAN) segments. One MIB ...
متن کاملComprehensive Security Mechanism for Defending Cyber Attacks based upon Spoofing and Poisoning
Much attention needs to be paid to different types of security threats and related attacks in the LAN and the interconnected environment. A variety of controls and counter mechanisms covering different layers of TCP/IP protocol suite are already available. But most of them have several issues related to cost, compatibility, interoperability, manageability, effectiveness etc. and hence multiple ...
متن کاملA NEW DYNAMIC-AUTO-STATIC TECHNIQUE FOR DHCPv4 IP ADDRESS ALLOCATION
One feature of Dynamic Host Configuration Protocol (DHCP) servers is the ability to assign static (fixed) IP Addresses for well-known clients in the Local Area Network (LAN) based on their Medium Access Control (MAC) addresses. This typically involves manual intervention by the network administrator to enter the correct MAC address and IP address information into the DHCP server configuration f...
متن کاملUnderstanding and Preventing Attacks at Layer 2 of the OSI Reference Model
This session focuses on the security issues surrounding Layer 2, the data-link layer. With a significant percentage of network attacks originating inside the corporate firewall, exploring this soft underbelly of data networking is critical for any secure network design. Security issues addressed in this session include ARP spoofing, MAC flooding, VLAN hopping, DHCP attacks, and Spanning Tree Pr...
متن کامل