Solved

DHCP3.0 on Linux RED HAT

Posted on 2002-03-28
3
202 Views
Last Modified: 2012-05-04
I got a very specific question about the configuration of the DHCP 3.0, I encontered an error who says "to get the same behaviour as in 3.0b2pl11 and previous versions, add a line that says "ddns-update-style ad-hoc;"

What should I add to the folder etc/dhcpd.conf to consider this new parameters.

I had already try :
Something like "ddns-hostname = binary-to-ascii (16,
                                   8,
                                   "-",

                                   
substring     (hardware, 1,      6,));
0
Comment
Question by:crichen
3 Comments
 
LVL 40

Expert Comment

by:jlevie
ID: 6902716
The default DDNS style in DHCP 3.0 is now interim. Previous versions used the ad-hoc style, hence the warning if your dhcpd.conf file doesn't include either 'ddns-update-style ad-hoc' or ddns-update-style interim'.

Which method do you need to use? The man pages do a good job of explaining the differences.
0
 

Author Comment

by:crichen
ID: 6902853
Can you give me an example of configuration because when I try to use the interim mode in my dhcpd.conf : "ddns-update-style interim" it doesn't work and the man doesn't help me very much
0
 
LVL 5

Accepted Solution

by:
Nisus091197 earned 20 total points
ID: 6903082
Here is an example:

dhcpd.conf (partly)
 ### global data, generated at 2002-01-21 23:30:01+01
 ### for Primary DHCP server

 ddns-update-style interim;
 ddns-domainname "nl.scania.com";
 ddns-rev-domainname "in-addr.arpa";
 client-updates ignore;
 option domain-name "nl.scania.com";
 default-lease-time 86400;
 option domain-name-servers ns1-a.nl.scania.com, ns2-a.nl.scania.com

Regards, Nisus
http://www.omnimodo.com

Notice the semicolons.
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
url shaping application 8 49
how does facebook / twitter store data? 3 121
Cant reach dockers repository (pull command) 11 85
IPA client Config problems 2 161
I have seen several blogs and forum entries elsewhere state that because NTFS volumes do not support linux ownership or permissions, they cannot be used for anonymous ftp upload through the vsftpd program.   IT can be done and here's how to get i…
Note: for this to work properly you need to use a Cross-Over network cable. 1. Connect both servers S1 and S2 on the second network slots respectively. Note that you can use the 1st slots but usually these would be occupied by the Service Provide…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

914 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

14 Experts available now in Live!

Get 1:1 Help Now