How DHCP Works // DHCP EXPLAINED

Поделиться
HTML-код
  • Опубликовано: 9 июн 2024
  • What is DHCP? How does it work?
    Let's dig into a pcap of a DHCP transaction. If you are in network engineering this is a service you will DEFINITELY troubleshoot at some point.
    Download the pcap here github.com/packetpioneer/yout...
    Got questions? Let's get in touch - packetpioneer@gmail.com
    == More On-Demand Training from Chris ==
    ▶Getting Started with Wireshark - bit.ly/udemywireshark
    ▶Getting Started with Nmap - bit.ly/udemynmap
    == Live Wireshark Training ==
    ▶TCP/IP Deep Dive Analysis with Wireshark - bit.ly/virtualwireshark
    == Private Wireshark Training ==
    Let's get in touch - packetpioneer.com/product/pri...
    Links above contain affiliate links where I will receive a small amount for any goods purchased. I thank you for clicking because it really helps to support me!!
    0:00 Intro
    0:19 DHCP Overview
    0:56 Discover
    4:39 DHCP Options
    5:59 Offer
    7:31 Request
    8:30 Ack
  • НаукаНаука

Комментарии • 105

  • @vyasG
    @vyasG 2 года назад +11

    Great Explanation of how DHCP works! Thank you for this Video.

  • @alandoran
    @alandoran 2 года назад +7

    I haven't watched this video yet but you have no idea how relevant this is to a thing I'm working on right now. Thanks Chris!!

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Glad it was helpful! Thanks for the comment.

  • @greob
    @greob 2 года назад +1

    Great demonstration, super clear and easy to understand. Thanks a lot!

  • @33t00p
    @33t00p 2 месяца назад

    Chris, thanks a lot. Short, clear & practical explanation. I have a feeling that all of your videos will be so useful to see. +1 subscriber. Thanks for your work.

  • @anitarajendran1097
    @anitarajendran1097 Год назад

    Learning Wireshark capture for the first time. Your teaching will help me to expertise the capture analysis. Thank you for such awesome tutorials

  • @laurenslabejof5898
    @laurenslabejof5898 Месяц назад

    this was fascinating and very informative, thanks

  • @tedsatim3555
    @tedsatim3555 7 месяцев назад

    Thank you for your channel. Especially for a simple explanation. Great job.

  • @paulodagraca3469
    @paulodagraca3469 Год назад

    New to the channel, try to binge the videos, this is a great one. Fantastic job, thank you.

  • @rivkas2224
    @rivkas2224 Год назад

    Wow perfectly explained!

  • @davdiaz24
    @davdiaz24 2 года назад +6

    Loving the videos Chris! Again I am super stoked I found this channel via David Bombal's channel. These videos work out great for me asI was just hired as a Jr system admin. These videos are great reinforcement's to what I already know and the vids are great for real world work environments. Maybe we can dive into some DNS issues that are common since we all know how DNS issues are very common.

    • @ChrisGreer
      @ChrisGreer  2 года назад +2

      Hey David, that is a great idea. I'll put it on my punch list! I appreciate these kinds of comments because it's great feedback about what you guys are seeing out there and what protocols you'd like some tips on troubleshooting.

    • @ChrisGreer
      @ChrisGreer  2 года назад +3

      By the way... check out the dns.time filter!! (dns.time>1) it will find all dns responses that took longer than a second.

  • @ohasis8331
    @ohasis8331 2 года назад

    Once more, simplified and excellent.

  • @paulphillips6170
    @paulphillips6170 2 года назад

    You make this so clear to me. I am relatively new to networking and have begun working with it at my work. Networking is so interesting and I can't get enough. Thanks.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Awesome Paul! Welcome to the networking world. 👍

  • @KRICHAN_Technologies
    @KRICHAN_Technologies 2 года назад

    Great content video as always from Chris.. Thank you so much 🙏🙏😎

  • @danielschuitemaker5208
    @danielschuitemaker5208 2 года назад

    i found you true john hammond and i am glad i did... you explain this so damn good thank you for your work i followed you and pressed the bell. it fits so perfect on this moment in my work. thank you for your time and effort for doing this. regards from holland....

  • @DavidMills1222
    @DavidMills1222 2 года назад

    I just can say your contents are amazing. Thanks!

  • @kelak1296
    @kelak1296 2 года назад

    Thanks for the video, Chris!

  • @mrbrown6421
    @mrbrown6421 Год назад

    Excellent as usual.

  • @faran4536
    @faran4536 2 года назад +1

    Thanks a lot Chris ! Keep it up ! 😄

  • @sri9277
    @sri9277 2 года назад

    Really great video Chris

  • @bojo8981
    @bojo8981 Год назад

    Thanks Chris!

  • @notnull01
    @notnull01 2 года назад

    Great videos! thanks 🙏

  • @christopherkushner2362
    @christopherkushner2362 2 года назад

    Great video!

  • @bierowns
    @bierowns 2 года назад

    Love the education you are giving for free! May I suggest an IPv6 video for the future?

    • @ChrisGreer
      @ChrisGreer  2 года назад +3

      Yes! Working on an IPv6 DHCP video now

  • @jiyaneren5019
    @jiyaneren5019 2 года назад

    Glad to have your voice and effort. Do you have plan to give lessons about Tacacs+ and Radius ? Thanks a lot

  • @Jonathan-jk7of
    @Jonathan-jk7of 2 года назад

    Thanks you for the video

  • @Jonathan-jk7of
    @Jonathan-jk7of 2 года назад +2

    Please do a video on Ipv 4 and 6

    • @ChrisGreer
      @ChrisGreer  2 года назад +3

      It's funny you mention that - DHCPv6 is next on my list. :-)

  • @benjaminolusola5559
    @benjaminolusola5559 2 года назад

    Thank you Chris

  • @AB-fj5wi
    @AB-fj5wi 2 года назад

    great stuff

  • @tomaschyla4111
    @tomaschyla4111 2 года назад +1

    This is exactly the way how DHCP should be explained. Great video, despite having experience in managing DHCP servers I've learned something new!

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Thanks for the comment!

    • @ashishsolanki86
      @ashishsolanki86 Год назад

      Hi Tomas,
      Can you please share one or two examples of issues you had faced in DHCP and what are the tshoot steps to follow in DHCP. Thanks

  • @VictorMoreno-xd7en
    @VictorMoreno-xd7en 2 года назад

    Thanks, I like the tattoo example, on how the client knows its MAC ;)

  • @billybuck2713
    @billybuck2713 Год назад

    Hello Chris, awesome video. One question, the server never gave the device an NTP server? Thank you, Billy

  • @majiddehbi9186
    @majiddehbi9186 2 года назад

    Great i was Just studying this your are gift sir thx and god bless u dont forget to thanks Mr Bombal

    • @ChrisGreer
      @ChrisGreer  2 года назад

      For sure! @davidbombal is so generous with all the knowledge he shares!

    • @majiddehbi9186
      @majiddehbi9186 2 года назад

      @@ChrisGreer as u do chris because when we share we live long and happier thata what i whish u chris

  • @themistoclesnelson2163
    @themistoclesnelson2163 2 года назад

    Thanks!

  • @BoniShadat
    @BoniShadat Год назад

    Nice

  • @arturk.2230
    @arturk.2230 2 года назад

    Dziękujemy.

  • @RedBlueLabs
    @RedBlueLabs 2 года назад

    Your likes on this video was at 404 I couldn't rest until it was at least one higher ;) Great videos by the way!

  • @dwaynesudduth1028
    @dwaynesudduth1028 2 года назад

    4:10 "Like it woke up, looks at it's arm and saw a tattoo of its' MAC Address" Brilliant Analogy!

  • @aba-nascu
    @aba-nascu 2 года назад

    Best explaination. Whats about 802.1x, can you make a video about this whole topic?

  • @loganwolf3524
    @loganwolf3524 Год назад

    Hey Chris I like your videos you are very informative. Could you maybe make a video explaining IO graphs and how to view use the graph under statistics tab in wireshark? Thank you for your videos

  • @akhildamodaran736
    @akhildamodaran736 9 месяцев назад

    Hi Chris,
    Could you confirm if the the sever to client communication is always a unicast?
    I believe all messages are broadcast.

  • @kmonet-wn9nf
    @kmonet-wn9nf 4 месяца назад

    You’re amazing

    • @ChrisGreer
      @ChrisGreer  4 месяца назад

      Thanks for watching!

  • @ashishsolanki86
    @ashishsolanki86 Год назад

    Hi Chris,
    Other than DORA process what are the other packets in DHCP process.
    Is it true that during request process garp will be sent by requester because we don't see that captures?
    What if there are more than 1 dhcp server in environment then what will be the process to get tha IP address?

  • @konstantinosprotopapas588
    @konstantinosprotopapas588 Год назад +1

    Very good explanation. Can you do a video for DHCPv6 and SLAAC? Thanks!

    • @ChrisGreer
      @ChrisGreer  Год назад +2

      I am working on a dhcpv6 one. Just gotta get a super clean pcap of it!

    • @konstantinosprotopapas588
      @konstantinosprotopapas588 Год назад

      @@ChrisGreer I am also VERY interested in dissections of routing protocols (especially OSPF, IS-IS and BGP). They would be super interesting and useful. I apologise for asking this again, but these will be really useful in really understanding how routing protocols work.

  • @snr7242
    @snr7242 3 месяца назад

    What might be the reason??
    I'm using one static IP in specific domain or workgroup why some times some desktop takes different ip even select option static.

  • @pivot3india
    @pivot3india 2 года назад

    Hi Chris, thanks for explaining it in so simple words. Luv your videos. Can you tell what happens in case static ip is configured on the client, would client still send a discover message or some other ? what happens with static arp ?

    • @scottkensai8179
      @scottkensai8179 2 года назад

      Clients CAN send discovers on statics. Lots of people don't do DHCP for statics, and most DHCP services can set the static reservation to non-allocable. I can't tell you how many times big customers that should know better were sending DHCP for years and didn't know it. I even had one major bank upset telling me their MAC was deadbeefcafe, until I read it back to them...

  • @baskarnataraj2042
    @baskarnataraj2042 4 дня назад

    Thanks, FYI to understand the DHCP flow.
    I'm new to this technology, If we use the password-enabled AP sometimes the DHCP/PING(ICMP) packets are not showing in the wireshark. I have enabled the decryption keys, but the packets are still not decrypted properly.
    I have added the key to the 802.11 protocol decryption column "password:ssid".
    How to get the all the time dhcp, icmp(ping) frames in the wireshark?
    I have tried two ways 1) I have used the airpcap in windows 2) i have used linux laptop in that i have configured the interface as monitor mode with the default wifi card.
    Both the ways are not helpful. please correct if i did anything wrong.

  • @intellectual.arguments
    @intellectual.arguments 2 года назад

    Awesomeeeeeeeeeeeeeeeeeeeeeeeeeeeeeee

  • @alimibrahem8120
    @alimibrahem8120 2 года назад

    Very thanksful Mr Chris..! All love and respect for you and your amazing video 🌹, But my question is how can i capture DHCP in network, i mean how you get this capture..?

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Honestly I just fired up Wireshark, started capturing, then I went out to my command line, typed in ipconfig /release then ipconfig /renew. That was on a windows system. Give it a try!

  • @sureshpararath
    @sureshpararath Год назад

    Hi Chris, thanks for explaining
    One doubt about DHCP offer in your wireshark .
    While the server sending an offer, clint doesnt carry any ip address. ( or client is yet to get an ip address )
    SO at this point how can your server send a unicast OFFER ?
    is it because "Requested ip " in Discover ?

    • @TheInnocentCriminals
      @TheInnocentCriminals Год назад

      "SO at this point how can your server send a unicast OFFER ?"
      "is it because "Requested ip " in Discover ?"
      The answer is no, doesn't matter if the client suggested the last ip that was used, the communication happens in layer 2, the client doesn't have yet the IP, but doens't matter, the most important thing in this offer packet is the unicast transmission in layer 2 specifying the client mac address, with this information the offer packet can reach the client.

  • @LasLars2
    @LasLars2 2 года назад

    Hi Chris! At 4:55 minutes "Option: (50) Requested IP Adress" what would it request if the client had never been on the network before? Would option 50 just be missing?

    • @ChrisGreer
      @ChrisGreer  2 года назад +2

      That is exactly it. It wouldn't use that option. Next time i will be sure to demo that too!

    • @scottkensai8179
      @scottkensai8179 2 года назад

      @@ChrisGreer pulls up rfc2131, calms down, and realizes this is just an intro vid :)

  • @franek4always
    @franek4always 2 года назад

    Good job Chris :)
    Is it possible to extend this video by PXE boot?

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Hey JFK! Thanks for the comment. Do you happen to have a pcap of it? Willing to share? I don't see it too often so it's tough to catch...

    • @franek4always
      @franek4always 2 года назад

      @@ChrisGreer No, I don't have. As you said it is hard to catch :(
      Maybe it could be done with two VirtualBox machines with host-only network. One VM: as eg. Clonezilla Live DRBL, second machine as a PXE client, and host as Wireshark monitor.

  • @christiangrenier9434
    @christiangrenier9434 2 года назад

    Ok so, if the discover request finds for example 3 DHCP servers, the client will receive 3 offers and it's only the client will choose one of them? Is that right Chris?

    • @ChrisGreer
      @ChrisGreer  2 года назад

      That is correct. The client will select one of them using the request function.

  • @paulstaf
    @paulstaf 2 года назад

    One other thing to look for is some user on the network brought a wireless router (Netgear, TP link, etc.) into the office and connected it to their network port so they could have their own wireless in the office but they don't know how to disable the DHCP service on their router... happened to me a few times back in the day.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      Totally! That is where looking for multiple offers can help. Or MACs that are registered to Netgear, etc. 👍

  • @techevangelist8373
    @techevangelist8373 2 года назад

    what was th reason for making it bcast at layer 3 and what advantage it is bringing in?

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      In the discover - because the client doesn't know who the DHCP server is. In the offer - the RFC states it can be either a bcast or unicast - some stations won't like to receive a layer 3 bcast offer. However this allows the server to alert any other DHCP servers that another offer is out there. It really just depends on the implementation. Maybe I can go deeper in another video?

    • @techevangelist8373
      @techevangelist8373 2 года назад

      About the discover- If the client doesnt know who the dhcp server is, it can still do a layer 2 broadcast and encapsulate the dhcp directly in ethernet (just like how ARP is)and the lets the DHCP server know about this discover? I am just trying to think why the original implementers did it the way it is today..

  • @paulstaf
    @paulstaf 2 года назад

    I am confused... How does the DHCP server unicast it back to the client if the client doesn't have an IP address already, or if the client has never been on that network before? You say the DHCP server sends it back to the IP that the client requested.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      If the client had never been there before, with no record of a previous IP, then it will use the broadcast flag and the offer and ack will be broadcasted. In the example, the station had a previous record.

    • @chetandurgavale5623
      @chetandurgavale5623 2 года назад

      Yeah I also have same query.

  • @thecandybeast
    @thecandybeast 2 года назад

    Does DHCP over IPv6 exist? What ports does it use? Different on Windows, Linux, and Mac?

    • @asd81907
      @asd81907 2 года назад

      RFC 8415 covers this:"Clients listen for DHCP messages on UDP port 546. Servers and relay
      agents listen for DHCP messages on UDP port 547".

    • @thecandybeast
      @thecandybeast 2 года назад +1

      @@asd81907 Thank you!

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Yep it sure does! Video coming soon. They tried initially to have all the config come from a local neighbor router - but that didn't work well with all the options DHCP can send along with the offer.

    • @scottkensai8179
      @scottkensai8179 2 года назад

      @@ChrisGreer Let's start with discussing PDs, and the other 50+ supporting RFCs. I still talk 3315, and have to push to 8415 some days.

    • @ChrisGreer
      @ChrisGreer  2 года назад

      @@scottkensai8179 Thanks for the comment. I know it is dizzying with the number of references out there. Thanks for the suggestion. I am going to keep it as simple as possible!

  • @scottkensai8179
    @scottkensai8179 2 года назад +1

    I've been enjoying the videos about Wireshark. I spend a good portion of my day setting up DHCP servers (DOCSIS Provisioning) for ISPs, and I didn't realize WHY there wasn't good documentation on filters until I saw you drag the item to the filter bar. Shared it with everyone in the office, makes me laugh I missed that. I have all kinds of grep commands on tcpdump -r with recursive find(s). I thought something fun to share would be my fav tcpdump filter, when looking for a MAC. You can't just look for the MAC in a DHCP packet in tcpdump, but you can find the last 4 bytes from the 38th. So say you are looking for MACs ending D2BF0032 or E24D33D2:
    tcpdump -nnvvi any -s0 port 67 and udp[38:4]=0xD2BF0032
    tcpdump -nnvvi any -s0 'port 67 and (udp[38:4]=0xD2BF0032 or udp[38:4]=0xE24D33D2)'

    • @ChrisGreer
      @ChrisGreer  2 года назад +1

      Hey Scott! Nice! glad you found the channel. Thank you for sharing the filters as well. Funny - I was just teaching a Wireshark class this morning and we dug into offset filtering like the one you just shared. I like that filter!