{"id":729,"date":"2010-03-08T23:56:33","date_gmt":"2010-03-08T22:56:33","guid":{"rendered":"http:\/\/ccievoice.ksiazek.be\/?p=729"},"modified":"2025-01-11T18:28:02","modified_gmt":"2025-01-11T17:28:02","slug":"dhcp-snooping","status":"publish","type":"post","link":"https:\/\/collaboration.ksiazek.be\/?p=729","title":{"rendered":"DHCP Snooping"},"content":{"rendered":"<p>IP Phones as PC can use the DHCP to retrieve an IP configuration(IP Address, netmask, default gateway, DNS, TFTP, &#8230;). therefore, if an attacker is able to interfere with DHCP, he might be able to conduct a Denial-of-Service (DoS) attack and prevent IP Phones from operating correclty.<\/p>\n<p>DHCP snooping works to prevent an intruder from interfering with DHCP operations by filtering malicious DHCP messages and by creating a DHCP snooping binding table. The table contains information such as mac-address, IP addresses, DHCP lease time and VLAN port information for clients on untrusted ports.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IP Phones as PC can use the DHCP to retrieve an IP configuration(IP Address, netmask, default gateway, DNS, TFTP, &#8230;). therefore, if an attacker is able to interfere with DHCP, he might be able to conduct a Denial-of-Service (DoS) attack and prevent IP Phones from operating correclty. DHCP snooping works to prevent an intruder from [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1,24,33],"tags":[59,276,111],"class_list":["post-729","post","type-post","status-publish","format-standard","hentry","category-non-classe","category-uncategorized","category-written-theory","tag-ccie-voice-written","tag-dhcp-snooping","tag-security"],"_links":{"self":[{"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/posts\/729","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=729"}],"version-history":[{"count":1,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/posts\/729\/revisions"}],"predecessor-version":[{"id":4367,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=\/wp\/v2\/posts\/729\/revisions\/4367"}],"wp:attachment":[{"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=729"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=729"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/collaboration.ksiazek.be\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=729"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}