Dynamic Host Configuration Protocol (DHCP)
GPTKB entity
Statements (49)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:XMPP_Extension_Protocol
|
gptkbp:bfsLayer |
4
|
gptkbp:bfsParent |
gptkb:Juniper_Junos
gptkb:RFC_2138 |
gptkbp:based_on |
client-server model
|
gptkbp:can_be_extended_by |
IP leases
|
gptkbp:can_be_used_with |
I Pv6
I Pv4 |
gptkbp:can_create |
IP addresses
|
gptkbp:can_provide |
WINS server information
hostname information time server information |
gptkbp:developed_by |
gptkb:Internet_Engineering_Task_Force
|
gptkbp:first_introduced |
gptkb:1993
|
https://www.w3.org/2000/01/rdf-schema#label |
Dynamic Host Configuration Protocol (DHCP)
|
gptkbp:includes |
DHCP Acknowledgment message
DHCP Discover message DHCP Offer message DHCP Request message |
gptkbp:is_implemented_in |
operating systems
routers switches firewalls |
gptkbp:is_monitored_by |
network management systems
|
gptkbp:is_part_of |
network management
TCP/ IP suite |
gptkbp:is_related_to |
BOOTP
|
gptkbp:is_subject_to |
gptkb:RFC_2132
gptkb:RFC_2131 |
gptkbp:is_used_for |
automating network configuration
|
gptkbp:is_used_in |
home networks
enterprise networks local area networks (LA Ns) |
gptkbp:is_vulnerable_to |
Denial of Service attacks
DHCP spoofing |
gptkbp:operates |
port 67
|
gptkbp:participated_in |
DNS server
default gateway subnet mask |
gptkbp:provides |
IP address assignment
|
gptkbp:restoration |
unused IP addresses
|
gptkbp:security_features |
IP address filtering
DHCP snooping |
gptkbp:setting |
gptkb:DHCP_server
DHCP client static IP addresses dynamic IP addresses |
gptkbp:supports |
dynamic IP addressing
|
gptkbp:uses |
gptkb:UDP
|