• Recent
  • Unsolved
  • Tags
  • Popular
  • Users
  • Groups
  • Search
  • Register
  • Login
  • Recent
  • Unsolved
  • Tags
  • Popular
  • Users
  • Groups
  • Search
  • Register
  • Login

proxyDHCP Issue

Scheduled Pinned Locked Moved Unsolved
FOG Problems
proxydhcp issue
4
42
26.6k
Loading More Posts
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • E
    Exig3nci @Wayne Workman
    last edited by Jul 24, 2015, 10:59 PM

    @Wayne-Workman Yes.
    I’m running tcpdump on the Ubuntu vm, getting the file to my host machine through tftp, then opening it in Wireshark,

    W 1 Reply Last reply Jul 25, 2015, 12:26 AM Reply Quote 0
    • W
      Wayne Workman @Exig3nci
      last edited by Wayne Workman Jul 24, 2015, 10:38 PM Jul 25, 2015, 12:26 AM

      @Exig3nci said:

      @Wayne-Workman Yes.
      I’m running tcpdump on the Ubuntu vm, getting the file to my host machine through tftp, then opening it in Wireshark,

      If you’re only getting three packets from TCPDump for the entire time that you’re attempting to network boot the target host, then you have a network communications issue with your VM and the target host.

      Perhaps it’s a VM configuration, or a switch configuration, a DHCP Helper address configuration, or a DHCP configuration. But something is very wrong somewhere.

      You should be seeing TONs of traffic, you should be seeing hundreds of packets.

      To further troubleshoot this using TCPDump, we need to see what the target host is doing. For this, you will require a network hub (not a switch, a hub).

      Place the hub between the target host and whatever network device it connects to. Then attach a laptop or something to the hub and boot a Live Linux CD on that computer and run TCPDump as you have before. Because the hub replicates all packets to all ports, the extra computer on the hub will be able to see all traffic coming and going to the target host.

      If you use a graphical Live Linux distribution, you can even install wireshark directly on it and open the PCAP files right there or alternatively transfer them using a flash drive to a PC with wireshark on it.

      Doing this will allow us to see what the client is receiving from DHCP and what - if anything - from dnsmasq.

      Please help us build the FOG community with everyone involved. It's not just about coding - way more we need people to test things, update documentation and most importantly work on uniting the community of people enjoying and working on FOG!
      Daily Clean Installation Results:
      https://fogtesting.fogproject.us/
      FOG Reporting:
      https://fog-external-reporting-results.fogproject.us/

      1 Reply Last reply Reply Quote 0
      • 1
      • 2
      • 3
      • 3 / 3
      3 / 3
      • First post
        42/42
        Last post

      311

      Online

      12.0k

      Users

      17.3k

      Topics

      155.2k

      Posts
      Copyright © 2012-2024 FOG Project