Sponsored Content
Top Forums UNIX for Dummies Questions & Answers Tools How to ignore requests in dhcpd? Post 302769837 by bakunin on Wednesday 13th of February 2013 02:54:34 PM
Old 02-13-2013
Quote:
Originally Posted by DGPickett
I wonder why the via hosts are configured to send requests to you?
They probably are configured to be "bootp-relay-agents", as per the definition of RFC 1542 (respectively "bootp forwarding agents", as they are called in RFC951). This is the way router hardware usually behaves, because larger corporate networks usually rely on DHCP (which is a superset of the original bootp protocol).

I hope this helps.

bakunin
 

9 More Discussions You Might Find Interesting

1. UNIX for Advanced & Expert Users

dhcpd

(GNU/Linux) Ain't it possible to force dhcpd to NOT send any DHCP Offers on a specific interface? I dont want dhcpd to answer on eth0 but do answer on eth1. best regards /Esaia (2 Replies)
Discussion started by: Esaia
2 Replies

2. Linux

dhcpd.conf

I have intall a REdhat 9.0 as a server and Ive configure to act as a DHCP however Im having technical problems b/c the file /etc/dhcpd.conf does not exists. I went to the text edit and I created : subnet 192.192.168.100.0 netmask 255.255.255.0 { range 192.168.100.10 192.168.100.150;... (1 Reply)
Discussion started by: keliy1
1 Replies

3. UNIX for Advanced & Expert Users

dhcpd password

I want to change the password for dhcpd so I can give it to the dhcp operator to handle dhcp server. however, when I use passwd to change the password, it prompt me with changing password for dhcpd. old password: my question is that I have never set dhcpd password before, so what is the old... (1 Reply)
Discussion started by: fredao
1 Replies

4. Linux

dhcpd - range parameter

Hi All, I'm curious about what this community would think about this portion of a dhcpd.conf file: subnet 192.168.1.0 netmask 255.255.255.0 { ... ...other parameters/options... ... range 192.168.1.3 192.168.1.253 range 172.16.0.2 172.16.0.50 } I tested this and... (1 Reply)
Discussion started by: Keene44
1 Replies

5. IP Networking

dhcpd - range parameter

Hi All, I'm curious about what this community would think about this portion of a dhcpd.conf file: subnet 192.168.1.0 netmask 255.255.255.0 { ... ...other parameters/options... ... range 192.168.1.3 192.168.1.253 range 172.16.0.2 172.16.0.50 } I tested this and dhcpd did not barf... (1 Reply)
Discussion started by: Keene44
1 Replies

6. UNIX for Advanced & Expert Users

dhcpd - range parameter

Hi All, I'm curious about what this community would think about this portion of a dhcpd.conf file: subnet 192.168.1.0 netmask 255.255.255.0 { ... ...other parameters/options... ... range 192.168.1.3 192.168.1.253 range 172.16.0.2 172.16.0.50 } I tested this and dhcpd did not barf... (2 Replies)
Discussion started by: Keene44
2 Replies

7. IP Networking

dhcpd-related questions

I have two items, only related because they are both regarding dhcpd. First of all, I keep seeing dhcpd responding to DHCPREQUESTs on eth1 which is my cable modem. For example: Sep 12 21:00:09 plague dhclient: DHCPREQUEST on eth1 to 204.186.xxx.xxx port 67 Sep 12 21:00:09 plague dhcpd:... (2 Replies)
Discussion started by: NESter
2 Replies

8. Linux

dhcpd failover with static IP

Hi I am a bit confused, I want to setup failover within dhcpd. There are multiple subnets and hosts with static IP's. however it seems I need to set up an IP range for the subnets for failover to work is this correct or am I missing something (1 Reply)
Discussion started by: eeisken
1 Replies

9. Shell Programming and Scripting

How to ignore requests in dhcpd?

Hi there, I setup a dhcp server on a debian. It is designed to only assign ip addresses to a list of known hosts. The config file looks like : log-facility local6; ignore unknown-clients; subnet 172.16.0.0 netmask 255.255.0.0 { } host 1 { hardware ethernet 00:03:2d:xx:xx:xx; fixed-address... (3 Replies)
Discussion started by: chebarbudo
3 Replies
dhcrelay(8)						      System Manager's Manual						       dhcrelay(8)

NAME
dhcrelay - Dynamic Host Configuration Protocol Relay Agent SYNOPSIS
dhcrelay [ -4 ] [ -dqaD ] [ -p port ] [ -c count ] [ -A length ] [ -pf pid-file ] [ --no-pid ] [ -m append | replace | forward | discard ] [ -i interface0 [ ... -i interfaceN ] ] server0 [ ...serverN ] dhcrelay -6 [ -dqI ] [ -p port ] [ -c count ] [ -pf pid-file ] [ --no-pid ] -l lower0 [ ... -l lowerN ] -u upper0 [ ... -u upperN ] DESCRIPTION
The Internet Systems Consortium DHCP Relay Agent, dhcrelay, provides a means for relaying DHCP and BOOTP requests from a subnet to which no DHCP server is directly connected to one or more DHCP servers on other subnets. It supports both DHCPv4/BOOTP and DHCPv6 protocols. OPERATION
The DHCP Relay Agent listens for DHCPv4 or DHCPv6 queries from clients or other relay agents on one or more interfaces, passing them along to ``upstream'' servers or relay agents as specified on the command line. When a reply is received from upstream, it is multicast or uni- cast back downstream to the source of the original request. COMMAND LINE
Protocol selection options: -6 Run dhcrelay as a DHCPv6 relay agent. Incompatible with the -4 option. -4 Run dhcrelay as a DHCPv4/BOOTP relay agent. This is the default mode of operation, so the argument is not necessary, but may be specified for clarity. Incompatible with -6. Specifying DHCPv4/BOOTP servers In DHCPv4 mode, a list of one or more server addresses must be specified on the command line, to which DHCP/BOOTP queries should be relayed. Options available for both DHCPv4 and DHCPv6: -c COUNT Maximum hop count. When forwarding packets, dhcrelay discards packets which have reached a hop count of COUNT. Default is 10. Maximum is 255. -d Force dhcrelay to run as a foreground process. Useful when running dhcrelay under a debugger, or running out of inittab on System V systems. -p PORT Listen and transmit on port PORT. This is mostly useful for debugging purposes. Default is port 67 for DHCPv4/BOOTP, or port 547 for DHCPv6. -q Quiet mode. Prevents dhcrelay6 from printing its network configuration on startup. -pf pid-file Path to alternate pid file. --no-pid Option to disable writing pid files. By default the program will write a pid file. Options available in DHCPv4 mode only: -a Append an agent option field to each request before forwarding it to the server. Agent option fields in responses sent from servers to clients will be stripped before forwarding such responses back to the client. The agent option field will contain two agent options: the Circuit ID suboption and the Remote ID suboption. Currently, the Circuit ID will be the printable name of the inter- face on which the client request was received. The client supports inclusion of a Remote ID suboption as well, but this is not used by default. -A LENGTH Specify the maximum packet size to send to a DHCPv4/BOOTP server. This might be done to allow sufficient space for addition of relay agent options while still fitting into the Ethernet MTU size. -D Drop packets from upstream servers if they contain Relay Agent Information options that indicate they were generated in response to a query that came via a different relay agent. If this option is not specified, such packets will be relayed anyway. -i ifname Listen for DHCPv4/BOOTP queries on interface ifname. Multiple interfaces may be specified by using more than one -i option. If no interfaces are specified on the command line, dhcrelay will identify all network interfaces, eliminating non-broadcast interfaces if possible, and attempt to listen on all of them. -m append|replace|forward|discard Control the handling of incoming DHCPv4 packets which already contain relay agent options. If such a packet does not have giaddr set in its header, the DHCP standard requires that the packet be discarded. However, if giaddr is set, the relay agent may handle the situation in four ways: It may append its own set of relay options to the packet, leaving the supplied option field intact; it may replace the existing agent option field; it may forward the packet unchanged; or, it may discard it. To use this option you must also enable the -a option. Options available in DHCPv6 mode only: -I Force use of the DHCPv6 Interface-ID option. This option is automatically sent when there are two or more downstream interfaces in use, to disambiguate between them. The -I option causes dhcrelay to send the option even if there is only one downstream interface. -l [address%]ifname[#index] Specifies the ``lower'' network interface for DHCPv6 relay mode: the interface on which queries will be received from clients or from other relay agents. At least one -l option must be included in the command line when running in DHCPv6 mode. The interface name ifname is a mandatory parameter. The link address can be specified by address%; if it isn't, dhcrelay will use the first non- link-local address configured on the interface. The optional #index parameter specifies the interface index. -u [address%]ifname Specifies the ``upper'' network interface for DHCPv6 relay mode: the interface to which queries from clients and other relay agents should be forwarded. At least one -u option must be included in the command line when running in DHCPv6 mode. The interface name ifname is a mandatory parameter. The destination unicast or multicast address can be specified by address%; if not specified, the relay agent will forward to the DHCPv6 All_DHCP_Relay_Agents_and_Servers multicast address. It is possible to specify the same interface with different addresses more than once, and even, when the system supports it, to use the same interface as both upper and lower interfaces. SEE ALSO
dhclient(8), dhcpd(8), RFC3315, RFC2132, RFC2131. BUGS
Using the same interface on both upper and lower sides may cause loops, so when running this way, the maximum hop count should be set to a low value. The loopback interface is not (yet) recognized as a valid interface. AUTHOR
dhcrelay(8) To learn more about Internet Systems Consortium, see https://www.isc.org dhcrelay(8)
All times are GMT -4. The time now is 08:24 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy