Skip to main content
Skip table of contents

2564 - Configuring DHCP Fingerprint Filters in NIOS

Scenario

You have been approached by the Network Security Manager, who has identified a specific brand of Linux-based network cameras that are either at risk or have been breached. As the network and DHCP administrator, you are tasked with preventing these cameras from accessing the network.

The Network Security Manager has provided a packet capture showing one of these network cameras requesting and receiving DHCP leases. Your task is to use this information to block them from obtaining DHCP leases on the network.

Start by analyzing the DHCP capture with Wireshark. Once you have identified the fingerprint, create a corresponding DHCP fingerprint in NIOS and apply a filter to block the device from receiving any further DHCP leases. A Linux machine named ‘testing-linux' has been configured to mimic the behavior of these network cameras. You may use the Linux machine to verify your DHCP filter is working.

Estimate Completion Time

  • 15 to 20 minutes

Credentials

Description

Username

Password

URL or IP

Grid Manager UI

admin

infoblox

https://10.100.0.100/

Requirements

  • Administrative DNS access to the Grid

Course References

  • 2039: Exploring DHCP Filters in NIOS

Lab Initiation

Access jump-desktop

Once the lab is deployed, you can access the virtual machines required to complete this lab activity. To initiate the lab, click on the jump-desktop tile and login to the Linux UI:

Username: training

Password: infoblox

Initiate lab

To initiate the lab, double-click the Launch Lab icon on the Desktop.

Launch Lab

Launch Lab

Choose the lab number from the list and click OK.

After clicking OK, you will see a pop-up message with a brief description of the lab task. If the description looks correct, click Yes to continue lab initiation.

Lab initiation will take a couple of minutes to finish.

Once complete, you will see another pop-up message with the login credentials and the URL for the Grid Manager’s User Interface. Note that the credentials may differ from those from prior labs.

Screenshot 2024-05-06 at 3.16.57 PM.png

Tasks

Task 1: Identify the DHCP Fingerprint from the Packet Capture

Once the lab is deployed, the 2564-task1.pcap file will be located on the jump-desktop for you to analyze. This file contains the DHCP traffic for the client that needs to be blocked based on the DHCP fingerprint.

  • From the jump-desktop, double-click the 2564-task1.pcap file to open it in Wireshark.

  • The network manager has provided the MAC address of one of the network cameras, it is 00:50:56:00:1a:2b. Apply the following filter to locate the client’s DHCPDISCOVER packet: dhcp and dhcp.hw.mac_addr == 00:50:56:00:1a:2b

  • Identify the Options specified in the Parameter Request List (Option 55).

Task 2: Create a DHCP Fingerprint in NIOS

  • Create a new DHCP Fingerprint in the Grid Manager UI using the options identified from the Parameter Request List (Option 55), with the name Bad-Network-Cameras

Task 3: Create and Apply a New IPv4 Fingerprint Filter

  • In the Grid Manager UI, create a new IPv4 Fingerprint Filter named Device_ban that utilizes the previously created fingerprint Bad-Network-Cameras.

  • Once created, apply this Fingerprint Filter to the DHCP range 172.31.101.75-172.31.101.85 to prevent the concerned devices from obtaining a DHCP lease.

Task 4: Confirm the Client Does Not Receive a DHCP Lease

  • Open Terminal on the testing-linux VM to release the IP address using the command:set-network-disable

  • Then, attempt to renew the IP address using the command:set-network-dhcp

  • Confirm that there is no IP address assigned to the interface using ifconfig ens160 command.


Solutions

Task 1 Solution: Identify the DHCP Fingerprint from the Packet Capture

To complete this task, follow these steps:

  1. From the jump-desktop, double-click the 2564-task1.pcap file to open it in Wireshark.

  2. Apply the following filter to view DHCP packets: dhcp and dhcp.hw.mac_addr == 00:50:56:00:1a:2b

  3. Find the DHCPDISCOVER packet in the filtered packet list.

  4. Click on the DHCPDISCOVER packet to highlight it.

  5. In the Packet Details pane, expand the Dynamic Host Configuration Protocol section.

  6. Scroll down to Option 55 (Parameter Request List) and expand it by clicking the arrow to view the list of options requested by the client.

    tcpimage-20240918-080548.png

  7. This will reveal the specific DHCP options the client requests in the DHCPDISCOVER message. Make a note of the options listed in the PRL for use in Task 2.

Task 2 Solution: Create a DHCP Fingerprint in NIOS

  1. Access the Grid Manager UI from the jump-desktop VM.

  2. Navigate to Data Management > DHCP > Fingerprint.

  3. Click (plus) to open Add DHCP Fingerprint Wizard.

  4. In the Add DHCP Fingerprint Wizard:

    • In the Name field, enter: Bad-Network-Cameras

    • In the Device Class drop-down, select: Linux OS.

    • Under Option Number, click the (plus) icon to add a new protocol option.

    • Select Protocol as IPV4, and enter the Option Number Sequence: 1,28,2,3,15,6,119,12,44,46,26,121,42,150,43,40,41,249,33,252,17 (Options identified in the Parameter Request List (Option 55) from the packet capture in Task 1).

      Screenshot_2024-09-19_07-47-40-20240919-075307.png

    • Click Save & Close

Task 3 Solution: Create and Apply a New IPv4 Fingerprint Filter

To create and apply the IPv4 Fingerprint Filter, follow these steps:

  1. Navigate to Data Management > DHCP > Filters.

  2. From the Toolbar click Add -> IPv4 Fingerprint Filter.

  3. In the Add IPv4 MAC Filter Wizard:

    • For Name, enter: Device_Ban.

    • Click Next.

    • Click the (plus) icon next to SELECT FINGERPRINTS.

    • In the Fingerprint Selector window, use Find to locate the previously created fingerprint Bad-Network-Cameras.

      Screenshot_2024-09-19_07-50-13-20240919-075335.png
    • Select the fingerprint and click Save & Close.

  1. Navigate to Data Management > DHCP > Networks > 172.31.101.0/24.

  2. Select the range 172.31.101.75-172.31.101.85 and click Edit.

    • Toggle Advanced Mode if it's not already enabled.

    • Go to Filters > Basic, and in the CLASS FILTER LIST, click the (plus) icon.

    • Select the Device_Ban Fingerprint Filter and change the action to Deny Lease from the drop-down menu.

      Screenshot_2024-09-18_07-55-27-20240918-080022.png
    • Click Save & Close.

  3. Restart services when prompted.

In an ideal scenario, the filter would need to be applied to all relevant DHCP ranges to prevent the identified devices from receiving DHCP leases. For the purpose of this lab, the Device_Ban filter is applied only to the range 172.31.101.75-172.31.101.85, as that is the only DHCP range in the lab, to block the identified Linux-based network cameras.

Task 4 Solution: Confirm the Client Does Not Receive a DHCP Lease

To verify that the client does not receive a lease from the DHCP range, perform the following steps:

  1. On the testing-linux VM, open Terminal to release the IP address with the following command: sudo set-network-disable

    • If prompted for a password, enter: infoblox.

  2. Attempt to renew the IP address using the command:sudo set-network-dhcp

  3. Verify that the client does not receive an IP address by using the command: ifconfig ens160

Expected Output
After executing the sudo set-network-dhcp command, the system will attempt to obtain an IP address from the DHCP server. However, due to the Fingerprint filter, the DHCP server will not assign an IP address to the client from the DHCP range.

The output of the ifconfig ens160 command will display the ens160 interface details without an IP address, as seen below:

CODE
$ ifconfig ens160
ens160: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        ether 00:50:56:00:1a:2b  txqueuelen 1000  (Ethernet)
        RX packets 5501  bytes 635488 (635.4 KB)
        RX errors 0  dropped 1  overruns 0  frame 0
        TX packets 16297  bytes 1592199 (1.5 MB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0

JavaScript errors detected

Please note, these errors can depend on your browser setup.

If this problem persists, please contact our support.