SlideShare une entreprise Scribd logo
1  sur  19
DHCP (Dynamic Host Configuration Protocol)
Hc/Ro. Tapan Kumar Khilar
DHCP - Introduction
 DHCP was created by the Dynamic Host Configuration
Working Group of the Internet Engineering Task Force(IETF)
 Runs over UDP
 Utilizing ports:
 67 – connections to server
 68 – connections to client
 Extension of BOOTP (protocol used for simple interaction)-
DHCP enhances the capabilities of BOOTP
 DHCP is basically used for dynamic configuration
 Uses client–server model
Objective of DHCP
 DHCP temporarily binds IP address & other configuration
parameters to DHCP client & provides framework for passing
configuration information to hosts
 DHCP was designed to provide computers with temporary
address
 DHCP is well adapted to situation where hosts move from one
location to another or are routinely connected and
disconnected
 Thus DHCP is mainly used to simplify the installation &
maintenance of networked computers.
Characteristics
 Centralized IP address administration
 Backward compatible with BOOTP – therefore a host running
the BOOTP client software can request a static configuration
from a DHCP server
 Supports multiple servers
 Provides dynamic assignment
 Allows static assignment
 DoesŶ’t iŶteract ǁith doŵaiŶ Ŷaŵe serǀice (DNS)
 Clients should require no manual configuration by
the user to connect to the network.
◦ Each client should be able to discover appropriate
configuration information dynamically.
RD-CSY2001-2008/09
 IP address, DNS servers, WINS servers, etc.
 This is normally accomplished through the use of a
Dynamic Host Configuration Protocol
◦ Uses UDP
◦ Ports 67 and 68
 DHCP
◦ Requires little or no administrative overhead,
after initial configurations of the DHCP
server.
◦ Dynamically maps IP addresses to MAC
addresses.
◦ Addresses can be leased for a predefined
amount of time before the lease expires and
must be renewed by the client.
◦ Allows 30 configuration parameters.
RD-CSY2001-2008/09
Client IP: ??
Gateway: ??
DNS: ??
Client IP: 192.168.1.10/24
Gateway: 192.168.1.1
DNS: 192.168.1.6
DHCPDISCOVER
Broadcast for a DHCP Server
Pool: 192.168.1.0/24
Gateway: 192.168.1.1
DNS Server: 192.168.1.6
DHCPOFFER
MAC unicast with configuration
information
DHCPREQUEST
Broadcast requesting
configuration information sent
in DHCPOFFER
DHCPACK
Acknowledge configuration
information and begins lease
RD-CSY2001-2008/09
 DHCP operates in a Client/Server environment and uses
the following messages


RD-CSY2001-2008/09
DHCPDISCOVER : Client request for server
DHCPOFFER: DHCP server replies to client with
configuration information
DHCPREQUEST: Client requests the use of configuration
information from one of the DHCP servers that sent an
offer

 DHCPNAK
◦ DHCP server declines Client request to use
configuration information
◦ DHCPACK:
◦ from DHCP server acknowledges that Client can now
begin to use configuration information
DHCPRELEASE
◦ Client requests a release of its DHCP configuration

 A Cisco router can be
configured as a DHCP
server.
◦ Cisco calls this IOS
feature “Easy IP”
◦ This feature is helpful
for small, remote LANs
such as home offices
with only one router
and a few clients.
◦ In a large, campus
network, you would not
want to use a router as a
DHCP server.
RD-CSY2001-2008/09
1. Configure a named DHCP pool
2. Configure network/subnet mask pool
RD-CSY2001-2008/09
3. Configure the default gateway
4. Configure addresses to exclude from the DHCP
address pool
5. Configure other needed information
◦ Such as DNS server, Domain Name, NetBIOS Server
 Like NAT, a DHCP pool must be named before you
can enter DHCP configuration mode.
◦ The argument name identifies the DHCP pool in the running
configuration and distinguishes this pool from other pools.
 More than one DHCP pool can be defined on a router.
RD-CSY2001-2008/09
Router(config)#ip dhcp pool name
 The net_address defines a network or subnet that
will be used as a pool of addresses to assign IP address
to clients.
◦ You must also define the subnet mask.
RD-CSY2001-2008/09
Router(dhcp-config)#network net_address
subnet_mask
 The ip_address is the address of the default
gateway clients will use to send packets destined for
remote networks.
◦ In a simple Easy IP configuration, this is the IP address of the
interface that is directly connected to the LAN with clients
needing DHCP service.
RD-CSY2001-2008/09
 You also need to exclude this IP address in the ip
excluded-address command.
dhcp
Router(dhcp-config)#default-router
ip_address
 The address(es) configured with this command will not
be assigned by Easy IP to clients.
◦ The argument address_1 is a single IP address that will be
excluded.
◦ If configured, the address_n optional argument defines a
range of excluded IP addresses between and including
argument_1 to argument_n.
RD-CSY2001-2008/09
Router(config)#ip dhcp excluded-address
address_1 [address_n]
Router(dhcp-config)#dns-server
ip_address
Router(dhcp-config)#netbios-name-server
ip_address
Router(dhcp-config)#domain-name name
RD-CSY2001-2008/09
RTA(config)#ip dhcp excluded-address 10.1.1.1
RTA(config)#ip dhcp pool RTA_LAN
10.1.1.0 255.255.255.0RTA(dhcp-
config)#networkRTA(dhcp-config)#default-router 10.1.1.1
RD-CSY2001-2008/09
 Routers normally block all broadcasts,
including a broadcasted DHCP message.
◦ If the router is not the DHCP server, you
must configure the router to forward the
DHCP messages to a dhcp_server_ip.
RD-CSY2001-2008/09
Router(config)#ip helper-address
dhcp_server_ip
 The ip helper-
address command
configures the router to
forward eight UDP services:
◦ Time
◦ TACACS
◦ DNS
◦ BOOTP/DHCP Server
◦ BOOTP/DHCP Client
◦ TFTP
◦ NetBIOS Name Service
◦ NetBIOS datagram
Service
RTA(config)#ip helper-address 10.2.2.5
RD-CSY2001-2008/09

RD-CSY2001-2008/09
Use the following commands to verify and troubleshoot
your DHCP configuration:
◦ show running-config
 view the DHCP configuration
◦ show ip dhcp binding
 displays IP to MAC address bindings and lease expiration date and
time
◦ show ip dhcp server statistics
 displays a count of the number and type of DHCP messages sent and
received
◦ debug ip dhcp server events
 watch interactions between the DHCP server and clients

Contenu connexe

Tendances (20)

DHCP Protocol
DHCP ProtocolDHCP Protocol
DHCP Protocol
 
Configuration DHCP
Configuration DHCPConfiguration DHCP
Configuration DHCP
 
dynamic host configuration protocol
dynamic host configuration protocoldynamic host configuration protocol
dynamic host configuration protocol
 
Intro to DNS
Intro to DNSIntro to DNS
Intro to DNS
 
6 understanding DHCP
6 understanding DHCP6 understanding DHCP
6 understanding DHCP
 
Domain name system
Domain name systemDomain name system
Domain name system
 
DHCP & DNS
DHCP & DNSDHCP & DNS
DHCP & DNS
 
Wintel ppt for dhcp
Wintel ppt for dhcpWintel ppt for dhcp
Wintel ppt for dhcp
 
DHCP
DHCPDHCP
DHCP
 
DNS (Domain Name System)
DNS (Domain Name System)DNS (Domain Name System)
DNS (Domain Name System)
 
Dns
DnsDns
Dns
 
Domain Name System DNS
Domain Name System DNSDomain Name System DNS
Domain Name System DNS
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
Domain name system
Domain name systemDomain name system
Domain name system
 
A very good introduction to IPv6
A very good introduction to IPv6A very good introduction to IPv6
A very good introduction to IPv6
 
Network address translation
Network address translationNetwork address translation
Network address translation
 
Basics about IP address, DNS and DHCP.
Basics about IP address, DNS and DHCP.Basics about IP address, DNS and DHCP.
Basics about IP address, DNS and DHCP.
 
Domain Name System
Domain Name SystemDomain Name System
Domain Name System
 
IP addressing seminar ppt
IP addressing seminar pptIP addressing seminar ppt
IP addressing seminar ppt
 
Internet control message protocol
Internet control message protocolInternet control message protocol
Internet control message protocol
 

Similaire à Dhcp

Similaire à Dhcp (20)

Dhcp
DhcpDhcp
Dhcp
 
Dhcp presentation
Dhcp presentationDhcp presentation
Dhcp presentation
 
DHCP in windows server 2012
DHCP in windows server 2012DHCP in windows server 2012
DHCP in windows server 2012
 
Networking DHCP server Setup Reports
Networking DHCP server Setup ReportsNetworking DHCP server Setup Reports
Networking DHCP server Setup Reports
 
DYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOLDYNAMIC HOST CONFIGURATION PROTOCOL
DYNAMIC HOST CONFIGURATION PROTOCOL
 
14047721
1404772114047721
14047721
 
Dhcp server configuration
Dhcp server configurationDhcp server configuration
Dhcp server configuration
 
Dhcp with cisco
Dhcp with ciscoDhcp with cisco
Dhcp with cisco
 
zuiqui_DHC.ppt
zuiqui_DHC.pptzuiqui_DHC.ppt
zuiqui_DHC.ppt
 
Configurar dhcp en router cisco
Configurar dhcp en router ciscoConfigurar dhcp en router cisco
Configurar dhcp en router cisco
 
dynamichost configuration protocol
dynamichost configuration protocoldynamichost configuration protocol
dynamichost configuration protocol
 
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
dhcp (dynamic host configuration protocol) very Cleare Explanation, Interview...
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
 
Dhcp confg
Dhcp confgDhcp confg
Dhcp confg
 
DHCP.pptx
DHCP.pptxDHCP.pptx
DHCP.pptx
 
Tutorial on dhcp
Tutorial on dhcp Tutorial on dhcp
Tutorial on dhcp
 
unit 2
unit 2unit 2
unit 2
 
DHCP
DHCPDHCP
DHCP
 
IPv6 DHCP
IPv6 DHCPIPv6 DHCP
IPv6 DHCP
 
Module (8) DHCP Server.pptx
Module (8) DHCP Server.pptxModule (8) DHCP Server.pptx
Module (8) DHCP Server.pptx
 

Plus de Tapan Khilar

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxTapan Khilar
 
SNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxSNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxTapan Khilar
 
cctv setup (2).pptx
cctv setup (2).pptxcctv setup (2).pptx
cctv setup (2).pptxTapan Khilar
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptxTapan Khilar
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxTapan Khilar
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptxTapan Khilar
 
Snmp network monitoring
Snmp  network monitoringSnmp  network monitoring
Snmp network monitoringTapan Khilar
 
Server operating system
Server operating systemServer operating system
Server operating systemTapan Khilar
 
Memory and storage
Memory and storageMemory and storage
Memory and storageTapan Khilar
 
Input and output device
Input and output deviceInput and output device
Input and output deviceTapan Khilar
 
I series processor
I series  processorI series  processor
I series processorTapan Khilar
 

Plus de Tapan Khilar (20)

CYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptxCYBER SECURITY AWARENESS.pptx
CYBER SECURITY AWARENESS.pptx
 
SNMP_ network monitoring.pptx
SNMP_ network monitoring.pptxSNMP_ network monitoring.pptx
SNMP_ network monitoring.pptx
 
cctv setup (2).pptx
cctv setup (2).pptxcctv setup (2).pptx
cctv setup (2).pptx
 
FIBER OPTICS .ppt
FIBER OPTICS .pptFIBER OPTICS .ppt
FIBER OPTICS .ppt
 
IDS VS IPS.pptx
IDS VS IPS.pptxIDS VS IPS.pptx
IDS VS IPS.pptx
 
cyber security.pptx
cyber security.pptxcyber security.pptx
cyber security.pptx
 
IT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptxIT ACT 2000 _ AA 2008_TAPAN.pptx
IT ACT 2000 _ AA 2008_TAPAN.pptx
 
mobile security.pptx
mobile security.pptxmobile security.pptx
mobile security.pptx
 
Acl cisco
Acl ciscoAcl cisco
Acl cisco
 
Data security
Data securityData security
Data security
 
Snmp network monitoring
Snmp  network monitoringSnmp  network monitoring
Snmp network monitoring
 
Server operating system
Server operating systemServer operating system
Server operating system
 
Operating systems
Operating systemsOperating systems
Operating systems
 
Network switch
Network switchNetwork switch
Network switch
 
Network devices
Network devicesNetwork devices
Network devices
 
Memory and storage
Memory and storageMemory and storage
Memory and storage
 
Ip addressing
Ip addressingIp addressing
Ip addressing
 
Internet security
Internet securityInternet security
Internet security
 
Input and output device
Input and output deviceInput and output device
Input and output device
 
I series processor
I series  processorI series  processor
I series processor
 

Dernier

Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionSolGuruz
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfCionsystems
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️anilsa9823
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 

Dernier (20)

Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Diamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with PrecisionDiamond Application Development Crafting Solutions with Precision
Diamond Application Development Crafting Solutions with Precision
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Active Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdfActive Directory Penetration Testing, cionsystems.com.pdf
Active Directory Penetration Testing, cionsystems.com.pdf
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online  ☂️
CALL ON ➥8923113531 🔝Call Girls Kakori Lucknow best sexual service Online ☂️
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 

Dhcp

  • 1. DHCP (Dynamic Host Configuration Protocol) Hc/Ro. Tapan Kumar Khilar
  • 2. DHCP - Introduction  DHCP was created by the Dynamic Host Configuration Working Group of the Internet Engineering Task Force(IETF)  Runs over UDP  Utilizing ports:  67 – connections to server  68 – connections to client  Extension of BOOTP (protocol used for simple interaction)- DHCP enhances the capabilities of BOOTP  DHCP is basically used for dynamic configuration  Uses client–server model
  • 3. Objective of DHCP  DHCP temporarily binds IP address & other configuration parameters to DHCP client & provides framework for passing configuration information to hosts  DHCP was designed to provide computers with temporary address  DHCP is well adapted to situation where hosts move from one location to another or are routinely connected and disconnected  Thus DHCP is mainly used to simplify the installation & maintenance of networked computers.
  • 4. Characteristics  Centralized IP address administration  Backward compatible with BOOTP – therefore a host running the BOOTP client software can request a static configuration from a DHCP server  Supports multiple servers  Provides dynamic assignment  Allows static assignment  DoesŶ’t iŶteract ǁith doŵaiŶ Ŷaŵe serǀice (DNS)
  • 5.  Clients should require no manual configuration by the user to connect to the network. ◦ Each client should be able to discover appropriate configuration information dynamically. RD-CSY2001-2008/09  IP address, DNS servers, WINS servers, etc.  This is normally accomplished through the use of a Dynamic Host Configuration Protocol ◦ Uses UDP ◦ Ports 67 and 68
  • 6.  DHCP ◦ Requires little or no administrative overhead, after initial configurations of the DHCP server. ◦ Dynamically maps IP addresses to MAC addresses. ◦ Addresses can be leased for a predefined amount of time before the lease expires and must be renewed by the client. ◦ Allows 30 configuration parameters. RD-CSY2001-2008/09
  • 7. Client IP: ?? Gateway: ?? DNS: ?? Client IP: 192.168.1.10/24 Gateway: 192.168.1.1 DNS: 192.168.1.6 DHCPDISCOVER Broadcast for a DHCP Server Pool: 192.168.1.0/24 Gateway: 192.168.1.1 DNS Server: 192.168.1.6 DHCPOFFER MAC unicast with configuration information DHCPREQUEST Broadcast requesting configuration information sent in DHCPOFFER DHCPACK Acknowledge configuration information and begins lease RD-CSY2001-2008/09
  • 8.  DHCP operates in a Client/Server environment and uses the following messages   RD-CSY2001-2008/09 DHCPDISCOVER : Client request for server DHCPOFFER: DHCP server replies to client with configuration information DHCPREQUEST: Client requests the use of configuration information from one of the DHCP servers that sent an offer   DHCPNAK ◦ DHCP server declines Client request to use configuration information ◦ DHCPACK: ◦ from DHCP server acknowledges that Client can now begin to use configuration information DHCPRELEASE ◦ Client requests a release of its DHCP configuration 
  • 9.  A Cisco router can be configured as a DHCP server. ◦ Cisco calls this IOS feature “Easy IP” ◦ This feature is helpful for small, remote LANs such as home offices with only one router and a few clients. ◦ In a large, campus network, you would not want to use a router as a DHCP server. RD-CSY2001-2008/09
  • 10. 1. Configure a named DHCP pool 2. Configure network/subnet mask pool RD-CSY2001-2008/09 3. Configure the default gateway 4. Configure addresses to exclude from the DHCP address pool 5. Configure other needed information ◦ Such as DNS server, Domain Name, NetBIOS Server
  • 11.  Like NAT, a DHCP pool must be named before you can enter DHCP configuration mode. ◦ The argument name identifies the DHCP pool in the running configuration and distinguishes this pool from other pools.  More than one DHCP pool can be defined on a router. RD-CSY2001-2008/09 Router(config)#ip dhcp pool name
  • 12.  The net_address defines a network or subnet that will be used as a pool of addresses to assign IP address to clients. ◦ You must also define the subnet mask. RD-CSY2001-2008/09 Router(dhcp-config)#network net_address subnet_mask
  • 13.  The ip_address is the address of the default gateway clients will use to send packets destined for remote networks. ◦ In a simple Easy IP configuration, this is the IP address of the interface that is directly connected to the LAN with clients needing DHCP service. RD-CSY2001-2008/09  You also need to exclude this IP address in the ip excluded-address command. dhcp Router(dhcp-config)#default-router ip_address
  • 14.  The address(es) configured with this command will not be assigned by Easy IP to clients. ◦ The argument address_1 is a single IP address that will be excluded. ◦ If configured, the address_n optional argument defines a range of excluded IP addresses between and including argument_1 to argument_n. RD-CSY2001-2008/09 Router(config)#ip dhcp excluded-address address_1 [address_n]
  • 16. RTA(config)#ip dhcp excluded-address 10.1.1.1 RTA(config)#ip dhcp pool RTA_LAN 10.1.1.0 255.255.255.0RTA(dhcp- config)#networkRTA(dhcp-config)#default-router 10.1.1.1 RD-CSY2001-2008/09
  • 17.  Routers normally block all broadcasts, including a broadcasted DHCP message. ◦ If the router is not the DHCP server, you must configure the router to forward the DHCP messages to a dhcp_server_ip. RD-CSY2001-2008/09 Router(config)#ip helper-address dhcp_server_ip
  • 18.  The ip helper- address command configures the router to forward eight UDP services: ◦ Time ◦ TACACS ◦ DNS ◦ BOOTP/DHCP Server ◦ BOOTP/DHCP Client ◦ TFTP ◦ NetBIOS Name Service ◦ NetBIOS datagram Service RTA(config)#ip helper-address 10.2.2.5 RD-CSY2001-2008/09
  • 19.  RD-CSY2001-2008/09 Use the following commands to verify and troubleshoot your DHCP configuration: ◦ show running-config  view the DHCP configuration ◦ show ip dhcp binding  displays IP to MAC address bindings and lease expiration date and time ◦ show ip dhcp server statistics  displays a count of the number and type of DHCP messages sent and received ◦ debug ip dhcp server events  watch interactions between the DHCP server and clients