The file is here: /etc/dhcp/dhcpd.conf
Here is my reference: [url]http://askubuntu.com/questions/221329/how-do-i-configure-dhcpd[/url]
If FOG has configured DHCP for itself, it’s almost surely correct. Also, if FOG is doing DHCP, you only need option 67 configured for it, which should already be done.
Please do a TCP dump on your FOG server.
Taken from another post by Uncle Frank:
[CODE]sudo tcpdump -w issue.pcap -i eth0[/CODE]
You might need to change the interface name in the above command, seems like I have never had an interface named eth0 in Linux… This command will list all available interfaces. Pick the right one.
[CODE]ip link show[/CODE]
Run the above capture command on the FOG machine, then start the remote target host. Wait till it fails, then stop tcpdump (ctrl+c), transfer the PCAP file to your PC and examine it using wireshark. After the capture is completed, please use the MAC address of the target host as the filter for sender & receiver. This address will filter out ALL traffic that isn’t coming from or going to the target client.
Example Filter (change the MAC addresses):
[CODE]eth.dst == 00:0C:CC:76:4E:07 || eth.src==00:0C:CC:76:4E:07[/CODE]
Please also post this PCAP file so we can look at it and see what’s going on. And if you don’t filter the file for us, we will need the target host’s MAC as well so we can filter it.
#LetsMakeScripts