EDUCBA

EDUCBA

MENUMENU
  • Free Tutorials
  • Free Courses
  • Certification Courses
  • 600+ Courses All in One Bundle
  • Login

Configuring DHCP Server

By Priya PedamkarPriya Pedamkar

Home » Software Development » Software Development Tutorials » Network Security Tutorial » Configuring DHCP Server

Configuring DHCP Server

Introduction to Configuring DHCP Server

Dynamic Host Configuration Protocol or DHCP is a network management protocol. DHCP is used to assign an Internet protocol (IP) address to any device or any node on a network. A DHCP client uses the DHCP protocol. An IP address can be defined as a unique numeric identifier that is assigned to each computer. Manually we can assign the computers with the IP addresses, but there can be a lot amount of problems that can arise because of this, like the risk of duplicating the IP addresses and so many, and it is a time-consuming process also. To overcome these problems, DHCP is a service that takes care by automatically assigning IP addresses to DHCP clients. In this article, we will learn the process of how to configure a DHCP server.

Configure DHCP Server

  • Download the software from the official website.

Configuring DHCP Server-1.1

Start Your Free Software Development Course

Web development, programming languages, Software testing & others

 

  • After downloading the software from the official website, click on the dhcpwiz.exe program.

dhcpwiz.exe program-1.2

  • Click on the run.

Configuring DHCP Server-1.3

  • After clicking on the run, welcome to the DHCP configuration wizard will open. Click on next to proceed.

Configuring DHCP Server-1.4

  • Select the network interface card.
  • It is not recommended to run the DHCP server on a network card that already has DHCP enabled.
  • After selecting the network interface card, click on next to proceed further.

network interface card-1.5

  • It consists of two types of protocols. Select the supported protocols.

supported protocols-1.6

  • After selecting the protocols, click on next.
  • Configure DHCP for the interface.
  • Configure IP-Pool, lease duration, trace and so on and then click on Next.

Configuring DHCP Server-1.7

  • Writing the INI file.
  • The final result of the DHCP configuration wizard is an INI file. This file will contain all the configuration options.

INI file-1.8

  • The INI file is successfully written (we can see it in the below image).

Configuring DHCP Server-1.9

  • Click on next.

Configuring DHCP Server-1.10

  • Click on Admin and then Ok.
  • Click on Install, start and then click on configure.

Configuring DHCP Server-1.11

Configuring DHCP Server-1.12

  • Tick the checkbox Run DHCP server immediately and click ok, and then click on next.
  • Now the configuration of the DHCP server is completed.

Working of DHCP

Working of DHCP are:

  • DHCP works on a client-server model.
  • DHCP is an extension of the Bootstrap Protocol (BOOTP).
  • The difference between the BOOTP and DHCP is DHCP can acquire all IP (Internet Protocol) related configuration information.
  • DHCP supports three mechanisms for IP address allocation. They are automatic allocation, dynamic allocation, and manual allocation.
  • DHCP runs at the Transmission Control Protocol/Internet Protocol (TCP/IP) application layer, and both client and server use broadcast messages to communicate with each other.
  • The main important characteristics of the DHCP are centralized IP address administration, backward compatible with BOOTP, supports multiple servers, provides a dynamic assignment, allows static assignment and doesn’t interact with domain name service (DNS).

DHCP DISCOVER

  • The client connected to a local subnet requests the DHCP information.
  • The client sends out a DHCPDISCOVER message requesting an IP address.
  • The message is sent out as a broadcast.
  • This first datagram is known as a DHCPDISCOVER message, which is a request to any DHCP Server that receives the datagram for configuration information.
  • The purpose of a DHCPDISCOVER message is to discover a DHCP server.
  • The DHCPDISCOVER message contains an identifier unique to the client.
  • The message might also contain other requests, such as requested options (for example, subnet mask to identify the subnet space, domain name, or static route).
  • DHCPDISCOVER message is delivered to every connected computer in the Broadcast Domain.

DHCP OFFER

  • DHCPDISCOVER message was delivered to every connected computer in the Broadcast Domain.
  • If there are multiple servers on the network, the client device receives multiple DHCPOFFER messages. It is up to the client device to select a particular message.
  • The DHCP server offers information to the client.
  • Any DHCP server that receives the DHCPDISCOVER message might send a DHCPOFFER message in response.
  • In case if the DHCP client device received multiple DHCPOFFER, the DHCP client accepts the first DHCPOFFER message that arrives.
  • After the DHCP Server receives discover the message, it suggests the IP addressing offering to the client host. It also contains other configuration information that is defined in the DHCP setup like a proposed IP address for the client, subnet mask to identify the subnet space, IP of the default gateway for a subnet, IP of DNS server for name translations.

DHCP REQUEST

  • The client accepts the DHCP server offer.
  • The client responds via a broadcast message called a DHCPREQUEST.
  • The client compares the offers with the settings that it requested and then selects the server that it wants to use.
  • It sends a DHCPREQUEST message to accept the offer, indicating which server is selected.

DHCP Pack

  • The DHCPREQUEST, which the client sends after receiving it to the server, sends a response message by DHCP Server.
  • DHCP server acknowledges the client and leases the IP address.
  • The message is the DHCPACK message is an acknowledgement by sending this message; it indicates that it the end of the process which started from DHCPDISCOVER.
  • But if the selected server does not meet the requirements of the DHCPREQUEST, it sends a DHCPNAK (Negative Acknowledgement).
  • If the client does not either receive a DHCPACK or DHCPNAK before the timeout, it resends DHCPREQUEST.
  • The client now can use the IP address, subnet mask, and configuration parameters.
  • The client can use the setting until the lease expires or renew the lease by sending a DHCP REQUEST message to the client.
  • If the server does not respond, he can use the lease until it expires.
  • When the lease has expired, the client must start over with the DHCPDISCOVER process.
  • There are three types of address leases. They are a manual lease, automatic lease and dynamic lease.
  • The client can end the lease by sending a DHCPRELEASE message to the server to end the lease.

Conclusion – Configuring DHCP Server

The main advantage of using the DHCP is reusing a previously allocated address, and it even saves time by automatically allocating the IP addresses to the clients.

Recommended Articles

This is a guide to Configuring DHCP Server. Here we discuss how to configure the DHCP server along with the working of DHCP. You may also look at the following articles to learn more –

  1. DHCP Server in Linux
  2. How to Install Ubuntu Server
  3. Types of Proxy Servers
  4. Mac vs IP Addresses

Cyber Security Training (12 Courses, 3 Projects)

12 Online Courses

3 Hands-on Projects

77+ Hours

Verifiable Certificate of Completion

Lifetime Access

Learn More

0 Shares
Share
Tweet
Share
Primary Sidebar
Network Security Tutorial
  • Advanced
    • Cryptosystems
    • Configuring DHCP Server
    • Block Cipher modes of Operation
    • TCP/IP Model
    • Types of Network
    • Types of Network Devices
    • Types of Network Topology
    • Types of Intrusion Prevention System
    • Types of Proxy Servers
    • Types of Websites
    • Types of NAT 
    • Mobile IP
    • Career in Automobile Design
    • What is TFS
    • What is NAT
    • What is OSI Model
    • Data Link Layer OSI Model
    • What is Cross Site Scripting
    • Applications of Sensors
    • ARP Packet Format
    • Asymmetric Information
    • Autoencoders
    • What is FTP Server?
    • IPS Tools
    • IPv4 Header Format
    • IPv6 Header Format
    • Authentication Header
    • Kerberos
    • Network Mapper
    • Network Scanning Tools
    • Network Mapping Tools
    • Network Access Control
    • Vulnerability Assessment Tools
    • Network Sniffer
    • Networking Commands
    • Networking Devices
    • Networking Strategies
    • Digital Certificate
    • What is a Digital Signature?
    • Digital Signature Softwares
    • Digital Signature Types
    • Digital Signature vs Digital Certificate
    • PKCS
    • What is FTP
    • FTP Commands
    • What is MIME?
    • What is Smart Card?
    • Networking Ports
    • Mutual Authentication
    • Password Authentication
    • Data Masking 
    • Authentication Tokens
    • Biometric Authentication
    • What is IP?
    • IPSec
    • Secure Electronic Transaction
    • What is CIDR
    • Static Binding and Dynamic Binding
    • What is SSL
    • PKIX
    • Public Key Infrastructure
    • What is Wireshark
    • Daisy Chain Topology
    • Markov Logic Network
    • Security engineering
    • SNMP Monitoring Tools
    • Network Analysis Tools
    • Server Monitoring Tools
    • Network Discovery Tools
    • Network Management Tool
    • SIEM Tools
    • OSINT Tools
    • Multiple Ping Tool
  • Basics
    • Security Consultant Definition
    • Security Policies
    • What is Network Security
    • What is Data Security?
    • What is Cryptography
    • Cryptography Techniques
    • Cryptography Tools
    • Data Security Techniques and Privacy
    • Digital Signature Cryptography
    • Java Cryptography
    • Basics of Cybersecurity
    • What is Network Topology
    • Algorithms and Cryptography
    • HTTP Methods
    • Security Technologies
    • Security Architecture
    • Network Topologies
    • What is a Physical Address?
    • Logical Address
    • What is Storage Area Network?
    • Mobile Ad Hoc Network
    • What is Computer Networks?
    • Security Principles
    • What is Remote Access?
  • Protocols
    • What is TCP Protocol
    • What is TCP/IP
    • How do IP Addresses Work?
    • Routing Protocols Types
    • What is Telnet
    • What is TFTP
    • What is DHCP
    • What is SFTP
    • Address Resolution Protocol
    • Internet Control Message Protocol
    • Simple Mail Transfer Protocol
    • Internet Security Protocols
    • SMTP Protocol
    • Types of Networking Protocols
    • User Datagram Protocol
    • Data Link Layer
    • Data Link Layer Services
    • Network Layer
    • Transport Layer Protocols
    • What Is Networking Protocols
    • TFTP
    • What is ARP
    • Basic Fundamental Of Networking
    • What is IPv4
    • What is IPv6
    • CIFS Protocol
    • What is SMB?
    • What is EIGRP
    • What is LLDP?
  • Routing
    • What is Router
    • Types of Routers
    • Dynamic Routing
    • Routing Algorithms
    • Routing Protocol
    • What is Routing
    • What is Static Routing
    • Important Types of DNS Servers (Powerful)
  • Attacks
    • Types of Network Attacks
    • What is Trojan Horse Virus
    • What is DOS
    • Types of DOS Attacks
    • DDos Attack Mitigation
    • Ransomware Attack  
    • Types of Cyber Attack
    • What is a Brute Force Attack
    • What is a Phishing Attack
    • What is Cyber Attack
    • What is DDoS Attack
    • What is Man In The Middle Attack
    • What is Man In The Middle Attack
    • What is Ransomware
    • What is Pharming
    • What is Phishing
    • What is CSRF
    • DNS Amplification Attack
    • Denial of Service Attack
  • Algorithm
    • IDEA Algorithm
    • MD5 Algorithm
    • Symmetric Algorithms
    • Diffie Hellman Key Exchange Algorithm
    • Digital Signature Algorithm
    • Encryption Algorithm
    • Advanced Encryption Standard
    • Asymmetric Encryption
    • ElGamal Encryption
    • HMAC
    • DES Algorithm
    • Brute Force Algorithm
    • SHA Algorithm
    • RSA Algorithm
    • What is Digital Certificate?
    • Certificate Revocation
    • RC5
  • Encryption/ Decryption
    • Encryption process
    • Public Key Encryption
    • Symmetric Key Encryption
    • What is Encryption
    • What is Decryption
    • Types of Cipher
    • Transposition Techniques
    • What is Steganography
    • One Time Pad
    • Steganography Techniques
  • Hosting
    • Types of Web Hosting
    • Free Web Hosting Sites
    • What is Hosting
    • What is VPS Hosting
    • What is Web Hosting
    • Types of Domain
    • VPN Applications for PC
    • Why we use VPN?
    • What is Virtual Host?
  • Firewalls
    • What is a Firewall?
    • Types of Firewalls
    • Firewall Devices
    • Firewall Uses
  • Interview Questions
    • Network Security Interview Questions
    • Networking Interview Questions
    • EIGRP Interview Questions

Related Courses

CDN Training

OSPF Certification Training

Penetration Training Course

Footer
About Us
  • Blog
  • Who is EDUCBA?
  • Sign Up
  • Corporate Training
  • Certificate from Top Institutions
  • Contact Us
  • Verifiable Certificate
  • Reviews
  • Terms and Conditions
  • Privacy Policy
  •  
Apps
  • iPhone & iPad
  • Android
Resources
  • Free Courses
  • Java Tutorials
  • Python Tutorials
  • All Tutorials
Certification Courses
  • All Courses
  • Software Development Course - All in One Bundle
  • Become a Python Developer
  • Java Course
  • Become a Selenium Automation Tester
  • Become an IoT Developer
  • ASP.NET Course
  • VB.NET Course
  • PHP Course

© 2020 - EDUCBA. ALL RIGHTS RESERVED. THE CERTIFICATION NAMES ARE THE TRADEMARKS OF THEIR RESPECTIVE OWNERS.

EDUCBA Login

Forgot Password?

EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you
Book Your One Instructor : One Learner Free Class

Let’s Get Started

This website or its third-party tools use cookies, which are necessary to its functioning and required to achieve the purposes illustrated in the cookie policy. By closing this banner, scrolling this page, clicking a link or continuing to browse otherwise, you agree to our Privacy Policy

EDUCBA

*Please provide your correct email id. Login details for this Free course will be emailed to you
EDUCBA
Free Software Development Course

Web development, programming languages, Software testing & others

*Please provide your correct email id. Login details for this Free course will be emailed to you

Special Offer - Cyber Security Training (12 Courses, 3 Projects) Learn More