What is DHCP Snooping?

DHCP Snooping is a network security feature that ensures only trusted DHCP servers may hand out IP addresses within a network. It prevents rogue or incorrectly connected devices from assigning IP addresses, which can lead to Spoofing, eavesdropping or network outages.

In OT networks, DHCP Snooping prevents a laptop, rogue Switch or compromised field device from rerouting traffic from PLCs or SCADA servers via a forged IP configuration.


🧠 Why is DHCP Snooping important?

  1. Protects against rogue DHCP servers (such as improvised access points or laptops)
  2. Records IP ↔ MAC ↔ switch-port bindings
  3. Provides the basis for IP Source Guard and Dynamic ARP Inspection
  4. Improves network stability in OT — preventing duplicate IPs or misrouted traffic
  5. Essential for MAC Binding, Port Security and Zero Trust Architecture

⚙️ How does DHCP Snooping work?

Step Description
Switch ports are marked as trusted or untrusted Only trusted ports may send DHCP offers
DHCP requests from untrusted ports Are forwarded, but only accepted if the response comes from a trusted port
Switch records MAC, IP, VLAN, port These bindings are stored in a DHCP Snooping binding table
Other features such as IP Source Guard Build on this table to detect or block spoofing

🔐 Example applications in OT

Scenario Benefit of DHCP Snooping
Production network with a fixed IP range Prevents a fault leading to unwanted DHCP issuance
Connected maintenance laptop DHCP requests from unknown devices are checked
Rogue device tries to redirect traffic Request is blocked on the untrusted port
Integration with Asset Inventory Binding tables show which device received which IP on which port

🛡️ Security combinations

Measure What it adds
IP Source Guard Blocks packets with spoofed IP addresses
Dynamic ARP Inspection Verifies that ARP traffic matches the DHCP Snooping table
Port Security Limits the number of devices per port
802.1X Adds authentication before access is granted
VLAN isolation Isolates untrusted ports or unauthorised devices

⚠️ Considerations

  • Always configure the correct ports as trusted (e.g. uplink to your DHCP server)
  • Devices with static IPs are not logged in the snooping table
  • Support depends on the switch model (Hirschmann, Cisco IE, Moxa, etc.)
  • Some switches require NTP for binding timeouts

📌 In summary

DHCP Snooping protects your OT network against forged IP addresses and rogue DHCP servers. It forms the foundation for network integrity and spoofing protection in structured OT architectures.