Solved

How to configure a linux router to forward DHCP and TFTP for PXE boot

Posted on 2009-05-14
1
1,500 Views
Last Modified: 2013-12-06
I am setting up pxe boot in a lab environment.  
One one side I have a commercial PXE server, on the other side in separate subnets I have the client machines.  The PXE server side is behind NAT/PAT.

In between I have a Linux 2.4 based router with iptables, conntrack etc. based off debian (Sarge if I recall correctly)  I have not figured out where to run DHCP from (I can do it at this router, or on the PXE server)

I can probably figure out the TFTP udp settings, but I'm not clear on what is the iptables equivalent of cisco's "IP helper".

My understanding of the problem for PXE, is simply DHCP and TFTP traffic need to make it to the PXE server/DHCP server.  
I can provide exact versions of kernel modules etc if needed.  
0
Comment
Question by:akameswaran
1 Comment
 
LVL 29

Accepted Solution

by:
Michael W earned 500 total points
Comment Utility
What you are asking for is called DHCP Relay...

Pre-Boot Execution Environment (PXE) clients require an Internet Protocol (IP) address from a Dynamic Host Configuration Protocol (DHCP) server to begin the installation process from a Remote Installation Services (RIS) server. If the PXE client is located across a router from the DHCP server and/or the RIS server, the client may not receive an IP address from the DHCP server or configuration information from the RIS server.

DHCP clients located across a router from a DHCP server require that the router be configured to forward DHCP traffic to a DHCP server on a remote subnet. This traffic is broadcast traffic and routers do not normally forward broadcast traffic unless configured to do so.

Man Page: http://www.digipedia.pl/man/dhcrelay.8.html

---

Also if you have two DHCP systems, I recommend this EE PAQ'd solution as well...

Can DHCP for PXE co-exist on the same network with another DHCP server?
http://www.experts-exchange.com/Networking/Protocols/DHCP/Q_24402692.html
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

In order for businesses to be compliant with certain information security laws in some countries, you need to be able to prove that a user (which user it was becomes important to the business to take action against the user after an event has occurr…
​Being a Managed Services Provider (MSP) has presented you  with challenges in the past— and by meeting those challenges you’ve reaped the rewards of success.  In 2014, challenges and rewards remain; but as the Internet and business environment evol…
In this seventh video of the Xpdf series, we discuss and demonstrate the PDFfonts utility, which lists all the fonts used in a PDF file. It does this via a command line interface, making it suitable for use in programs, scripts, batch files — any pl…
This demo shows you how to set up the containerized NetScaler CPX with NetScaler Management and Analytics System in a non-routable Mesos/Marathon environment for use with Micro-Services applications.

763 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

8 Experts available now in Live!

Get 1:1 Help Now