Tuesday, January 31, 2023
LetsAskBinu.com
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things
No Result
View All Result
LetsAskBinu.com
No Result
View All Result
Home Networking

How to configure a DHCP server on Rocky Linux

Researcher by Researcher
September 7, 2022
in Networking
0
How to configure a DHCP server on Rocky Linux
189
SHARES
1.5k
VIEWS
Share on FacebookShare on Twitter


Jack Wallen shows you how to configure Rocky Linux 9 as a DHCP server for your local area network.

Close-up Macro Shot: Person Plugs in RJ45 Internet Connector into LAN Router Switch. Information Communication Network with Data Cable Being Connected to Port with Blinking Lights. Blue Background
Image: Gorodenkoff/Adobe Stock

Rocky Linux has become one of the de facto standard replacements for CentOS. Not only is it a drop-in replacement for RHEL, but the maintainer Gregory Kurtzer has made it clear Rocky Linux will always be available and will never be owned by a company that could bring down the distribution.

And for anyone who’s used RHEL or CentOS, Rocky Linux will be instantly familiar and can serve you and your company with ease.

SEE: 40+ open source and Linux terms you need to know (TechRepublic Premium)

Let’s take a look at one way Rocky Linux can serve you as a DHCP server. I’m going to walk you through the process of installing and configuring the DHCP server on this open source operating system. It shouldn’t take you but a few minutes to get this up and running.

What you’ll need to deploy the DHCP server

The only things you’ll need to are a running instance of Rocky Linux and a user with sudo privileges. Ready? Let’s get to work.

Networking: Must-read coverage

How to install the DHCP server software

Rocky Linux doesn’t ship with the DHCP server installed, so we’ll take care of that now. Log in to your Rocky Linux instance, open a terminal window and issue the command:

sudo dnf install dhcp-server -y

Once that’s installed, you can now move on to the configuration.

How to configure the DHCP server on Rocky Linux

Before we start to configure the DHCP server, you’ll need to know the name of the interface you’ll be using. To discover that name, issue the command:

ip a

You should at least see two listings, one for the loopback — which will use the address 127.0.0.1 — and the other for your LAN-facing network device. For example, mine is enp0s3.

Next, open the DHCP server configuration file with the command:

sudo nano /etc/dhcp/dhcpd.conf

The section you need to concentrate on will look like this:

default-lease-time 900;
max-lease-time 10800;

authoritative;

subnet 192.168.200.0 netmask 255.255.255.0 {
range 192.168.200.50 192.168.200.99;
option routers 192.168.20.1;
option subnet-mask 255.255.255.0;
option domain-name-servers 192.168.20.1;
}

You’ll want to make sure to configure this section according to your network topology. After configuring this section, save and close the file.

How to open the firewall

We now have to open the firewall for the DHCP server. First, add the rule for the firewall with:

sudo firewall-cmd --add-port=67/udp --permanent

Now, reload the firewall to apply the new rule with:

sudo firewall-cmd --reload

How to start and enable the DHCP service

With everything taken care of, you can now start and enable the service with a single command:

sudo systemctl enable --now

At this point, your Rocky Linux server is capable of serving up DHCP addresses. One thing to keep in mind, however, is that you want to make sure the configuration of this DHCP server doesn’t conflict with any other device that hands out network addresses. Such a conflict would cause problems on your LAN, so either disable any other device that would do so or configure the IP address range for the Rocky Linux DHCP server beyond that of any other device handing out addresses.

And that’s all there is to it. You now have a DHCP server up and running, served up by a powerhouse OS. Enjoy those IP addresses.

Subscribe to TechRepublic’s How To Make Tech Work on YouTube for all the latest tech advice for business pros from Jack Wallen.



Source link

Related articles

Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023
Multicast Domain Name System (mDNS) – Still Flooding?

Multicast Domain Name System (mDNS) – Still Flooding?

January 27, 2023
Tags: configureDHCPLinuxRockyServer
Share76Tweet47

Related Posts

Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023
0

Part 2 of the 4-part series – Cloud monitoring for Cisco Catalyst switches series Welcome back to the second blog...

Multicast Domain Name System (mDNS) – Still Flooding?

Multicast Domain Name System (mDNS) – Still Flooding?

January 27, 2023
0

“Most likely”, said John with frustration and despair as he grappled with the daunting task of stabilizing the performance of...

Securing IoT with Microsoft Defender for IoT sensors

Securing IoT with Microsoft Defender for IoT sensors

January 27, 2023
0

Image: putilov_denis/Adobe Stock Securing the Internet of Things is increasingly important. IoT hardware is at the heart of much modern...

Common Database Infrastructure in Cisco IOS XE Software Simplifies 160+ Enterprise Devices

Common Database Infrastructure in Cisco IOS XE Software Simplifies 160+ Enterprise Devices

January 26, 2023
0

Developed by a global team of more than 3000 software engineers, Cisco IOS XE Software powers more than 160 Cisco...

How to force Portainer to use HTTPS and upload your SSL certificates

How to force Portainer to use HTTPS and upload your SSL certificates

January 26, 2023
0

If Portainer is your go-to GUI for Docker and Kubernetes, you should consider adding a bit of extra security to...

Load More
  • Trending
  • Comments
  • Latest
This Week in Fintech: TFT Bi-Weekly News Roundup 08/02

This Week in Fintech: TFT Bi-Weekly News Roundup 15/03

March 15, 2022
QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

QNAP Escalation Vulnerability Let Attackers Gain Administrator Privileges

March 15, 2022
Supply chain efficiency starts with securing port operations

Supply chain efficiency starts with securing port operations

March 15, 2022
A first look at threat intelligence and threat hunting tools

A first look at threat intelligence and threat hunting tools

March 15, 2022
Beware! Facebook accounts being hijacked via Messenger prize phishing chats

Beware! Facebook accounts being hijacked via Messenger prize phishing chats

0
Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

Shoulder surfing: Watch out for eagle‑eyed snoopers peeking at your phone

0
Remote work causing security issues for system and IT administrators

Remote work causing security issues for system and IT administrators

0
Elementor WordPress plugin has a gaping security hole – update now – Naked Security

Elementor WordPress plugin has a gaping security hole – update now – Naked Security

0
Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023
Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

Securing CI/CD. There are many organizations moving to… | by Binu Panicker | Jan, 2023

January 30, 2023

Recent Posts

Novel Malware Installed in VMware ESXi Attacks

VMware Fixes vRealize Log Insight RCE Bugs

January 31, 2023
KITMEK Launches $1 Digital Only School for Children Across MENA

KITMEK Launches $1 Digital Only School for Children Across MENA

January 31, 2023
Whole-Network Visualization With Meraki Dashboard

Whole-Network Visualization With Meraki Dashboard

January 31, 2023

Categories

  • Cyber Threats
  • Cybersecurity
  • Fintech
  • Hacking
  • Internet Of Things
  • Malware
  • Networking
  • Protection

Tags

Access attack Attacks banking BiWeekly bug Cisco cloud code critical Cybersecurity Data Digital exploited financial Finds Fintech Flaw flaws Google Group Hackers Krebs Latest launches malware Microsoft million Network News open patches Payments platform Ransomware RoundUp security Software TFT Threat Top vulnerabilities vulnerability warns Week

© 2022 Lets Ask Binu All Rights Reserved

No Result
View All Result
  • Home
  • Cybersecurity
  • Cyber Threats
  • Hacking
  • Protection
  • Networking
  • Malware
  • Fintech
  • Internet Of Things

© 2022 Lets Ask Binu All Rights Reserved