Cisco Support Community
Showing results for 
Search instead for 
Did you mean: 

Welcome to Cisco Support Community. We would love to have your feedback.

For an introduction to the new site, click here. And see here for current known issues.

New Member

Create ACL for DHCP Server

After repeated calls from users complaining about duplicate IP address messages we set out to find the rogue DHCP server that is giving out IP addresses in the same scope that our Windows DHCP server is configured to hand out.  ( to  Using a Microsoft approved utility called DHCPFind  to locate the rogue DHCP server.  The utility  shows both our DHCP server ( and another device  with IP address of responding to DHCP requests from our inside clients offering ip addresses in the same ip range. Note that the device is giving out addresses in the to range as well, despite the fact that range is excluded and used as reserved static ip addresses to assign.  This is causing issues with internet access from servers that have static addresses when a duplicate address is handed out by rogue DHCP device.  If there is a way to block that ip address from getting and responding to the clients requesting IP addresses we could focus on finding where the rogue device is plugged in. It could be a port on one of the 22 switches or it could be connected wirelessly to any of the 74 APs we have that are giving out addresses from our Windows DHCP server.  We are puzzled over how a device with that address could intercept  Dhcp requests in the first place.  Could the rogue device's ip address be user as an alias for an IP address it was given by our DHCP server when it connected?  We thought Windows policy restrictions would keep windows clients from accepting DHCP addresses from anything  but the Window DHCP server but that doesn't matter.  The rogues device is handing out  IP address to iphones, android phones, MacBooks, IPads, and Windows workstations. Our efforts would be focused on finding and eliminating the device but we just deployed the new Cisco 4500 core switches and the 3650, 3560, and 2950's switches scattered throughout 14 buildings last year but we unexpectantly lost our Cisco guru to illness and have just begun to advertise the open position on Monday.  So we are basically beginners with Cisco IOS commands and current staff have had limited training using Firesight and can only do specific tasks using ASDM. If anyone has any ideas or can give us some direction on blocking this device or even suggestions on how we can find where it is on the network it would be greatly appreciated.  Thanks in advance.I have attached the information that the DHCP Find utility revealed.


Hi,try use DHCP snooping

try use DHCP snooping feature. It should solve your issue without need to find rogue DHCP.
Only your DHCP server will be on trusted port. And replies from rogue DHCP (on untrusted port) will be dropped.

New Member

tried following the

tried following the instructions from the link to enable dhcp snooping however after typing in

config t  I got to the Switch(config)# prompt but none of the other commands were recognized.

example Show running-config dhcp had the syntax being incorrect at

Show running-config dhcp     then feature dhcp  showed it was incorrect here  feature dhcp

    ^                                                                                                                ^

I used putty to access the switch what am I doing wrong or is it something that doesn't work with


catalyst 4500 core  or  ASA 5505 Firewall


sorry, this is good

sorry, this is good configuration example:

Also if you are in "Switch(config)#" dialog, you must enter "do" command before any "show" command.
And you don´t need "feature dhcp..." command. You enable it with "ip dhcp snooping" command, but another configuration is then required for proper working.