How to Identify Rogue DHCP Servers on MikroTik router



How to Identify Rogue DHCP Servers on MikroTik router

How to Identify Rogue DHCP Servers on MikroTik router


00:00 How to Identify Rogue DHCP Servers on MikroTik router
00:26 1. Basic Configuration MikroTik Router (R1)
00:38 1.1. Login to MikroTik use WinBox
00:52 1.2. Reset Configuration – No Default Configuration
01:26 1.3. Set MikroTik router name (R1)
01:44 1.4. Set interface name (R1)
02:16 1.5. Configure PPPoE Client on WAN interface (R1)
03:12 1.6. Configure DNS (R1)
03:38 1.7. Configure NAT for LAN (Source NAT) (R1)
04:10 1.8. Set the IP address on interface ether3-LAN (R1)
04:40 1.9. Configure DHCP Server, ether3-LAN interface
05:08 1.10. Testing (R1)
05:38 2. MikroTik Router (R1) – Configuration Alerts Rogue DHCP Servers
05:50 2.1. Configure DHCP Alerts
06:44 2.2. Write script Rogue_DHCP
07:32 2.3. E-mail Settings
08:42 3. Basic Configuration MikroTik Router (R2)
08:54 3.1. Login to MikroTik use WinBox (R2)
09:08 3.2. Reset Configuration – No Default Configuration
09:42 3.3. Set MikroTik router name (R2)
10:02 3.4. Set interface name (R2)
10:54 3.5. Set WAN – DHCP Client (R2)
11:14 4. MikroTik Router (R2) – Configuration Rogue DHCP Servers
11:26 4.1. Configure DHCP Server, ether1-WAN interface
11:52 5.1. Alerts verification Identify Rogue DHCP – Log viewing
12:16 5.2. Alerts verification Identify Rogue DHCP – E-mail viewing .