On 03/25/2012 06:20 PM, Devon Gleeson wrote:

> GATEWAY IP: 192.168.2.1
> TFTP..
> PXE-M0F: Exiting Intel Boot Agent.

First - take a look at the various log files, particularly the TFTP log
file on the TFTP server host to see if there is any indication that you
are actually seeing packets.

You might see something interest - like the very common issue in which
the TFTP server is root-jailed (chroot) so that the pathname of the file
the client is asking for isn't consistent with the chroot-ed file system
seen by the server.  That problem bites me all the time with Linux based
TFTP servers.

And don't forget to make sure that the Selinux permissions are OK on
those servers that run Selinux.

Use a manual TFTP client tool to make sure that the server is actually
able to deliver the requested file.

If not then dig deeper:

- Grab a switch with a monitor port - I know that there's an inexpensive
Netgear one (less than $40) that can be configured to have a monitor port.

- Wire up the Net6501 to the non-monitor ports on that switch so that
everything going in/out on the ethernet goes via that switch.

- Fire up Wireshark on a handy computer (and use a spare interface - I
often use USB based ethernet widgets to get a spare interface) and take
a look at the traffic to/from the Net6501.  You should see the DHCP and
TFTP activity.  Dig into it to see what's going on.

(If you can fire-up Wireshark on your machine with the TFTP server, it's
all the easier and you don't need the switch with the monitor port.)

        --karl--



_______________________________________________
Soekris-tech mailing list
[email protected]
http://lists.soekris.com/mailman/listinfo/soekris-tech

Reply via email to