Configure DHCP server on RHEL 9 / Rocky Linux 9
DHCP, or Dynamic Host Configuration Protocol, is a network protocol that automatically assigns IP addresses to client systems in a computer network. It assigns clients to the DHCP pool or IP address range specified in its configuration. While you can manually assign static IPs to client systems, a DHCP server simplifies the process and dynamically assigns IP addresses to client systems on your network.
In this article, we will demonstrate how to install and configure a DHCP server on RHEL 9/Rocky Linux 9.
prerequisites
- Pre-installed RHEL 9 or Rocky Linux 9
- Regular user with sudo administrator rights
- YUM/DNF repository or Red Hat subscription service configured locally for RHEL 9
- Can access the Internet
Without further delay, let’s get to the DHCP server installation steps.
1) Configure static IP address on RHEL 9/Rocky Linux 9
Before you begin, it is necessary to set up a static IP address on your RHEL or Rocky Linux system. There are several ways to accomplish this, but the simplest and most intuitive is to use the nmtui or nmcli utilities.
Reading can also set a static IP address on RHEL 9
To confirm the IP address of the linux system, run the ip command below.
$ ip a

2) Install and configure DHCP server
Once you have configured a static IP, the next step to take is to install a DHCP server. The RHEL 9 or Rocky Linux 9 repository (BaseOS) provides the dhcp-server package by default. You can install it as follows.
$ sudo dnf install dhcp-server -y

After installing the DHCP server, we need to further configure the settings. Therefore, open the DHCP configuration file.
$ sudo vi /etc/dhcp/dhcpd.conf
Paste the following lines of code into the configuration file. Be sure to configure the subnet to your desired value.
default-lease-time 3600; max-lease-time 86400; authoritative; subnet 192.168.10.0 netmask 255.255.255.0 { range 192.168.10.100 192.168.10.200; option routers 192.168.10.1; option subnet-mask 255.255.255.0; option domain-name-servers 192.168.10.1; }
Save and close the file.

Let’s take a look at some of the values:
- The default-lease-time value specifies how long the DHCP server will lease an address to a client. In this example, the default-lease-time value is 3600 seconds or 1 hour. max-lease-time is the maximum time an IP address is leased to a client. In our case it is set to 86400 seconds or 24 hours.
- The next part is the subnet configuration. In this setup, 192.168.10.0 is the subnet and 255.255.255.0 is the subnet mask. IP addresses range from 192.168.10.100 to 192.168.10.200.
- The option router option defines the default gateway. In this case, it's 192.168.10.1.
- The option subnet-mask option determines the subnet mask assigned to each client or host. In this case, it's 255.255.255.0.
- Finally, domain-name-servers specifies DNS servers. In this case 192.168.10.1.
When finished, save changes and exit. Then enable and start the DHCP service.
$ sudo systemctl enable --now dhcpd $ sudo systemctl status dhcpd

Please note
At this point, the DHCP service should be distributing IP addresses. If you have another DHCP server or router on your LAN, it's a good idea to turn it off to prevent IP address allocation conflicts. This will result in some clients getting their IP assignments from the RHEL or Rocky Linux server and others from the router, which is certainly not what you want. Therefore, remember to turn off any other DHCP servers in your LAN setup.
3) 测试 DHCP 服务器安装
在我们模拟的 LAN 设置中,您可以看到 Ubuntu 系统已从 RHEL 或 Rocky Linux DHCP 服务器上获取了一个 IP 地址。

回到我们的 DHCP 服务器,搜索 Ubuntu 机器的 IP 地址在 /var/log/message 文件中。
$ sudo tail -50 /var/log/messages | grep -i 192.168.10.100

很好,以上输出确认 Ubuntu 机器从我们的 DHCP 服务器获取了 IP。
结论
这篇文章就到这里了。在本指南中,您已学习了如何在 RHEL 9 / Rocky Linux 9 上安装和配置 DHCP 服务器。如有任何疑问或反馈,请在下面的评论区发布。
The above is the detailed content of Configure DHCP server on RHEL 9 / Rocky Linux 9. For more information, please follow other related articles on the PHP Chinese website!


For years, Linux software distribution relied on native formats like DEB and RPM, deeply ingrained in each distribution's ecosystem. However, Flatpak and Snap have emerged, promising a universal approach to application packaging. This article exami

The differences between Linux and Windows in handling device drivers are mainly reflected in the flexibility of driver management and the development environment. 1. Linux adopts a modular design, and the driver can be loaded and uninstalled dynamically. Developers need to have an in-depth understanding of the kernel mechanism. 2. Windows relies on the Microsoft ecosystem, and the driver needs to be developed through WDK and signed and certified. The development is relatively complex but ensures the stability and security of the system.

The security models of Linux and Windows each have their own advantages. Linux provides flexibility and customizability, enabling security through user permissions, file system permissions, and SELinux/AppArmor. Windows focuses on user-friendliness and relies on WindowsDefender, UAC, firewall and BitLocker to ensure security.

Linux and Windows differ in hardware compatibility: Windows has extensive driver support, and Linux depends on the community and vendors. To solve Linux compatibility problems, you can manually compile drivers, such as cloning RTL8188EU driver repository, compiling and installing; Windows users need to manage drivers to optimize performance.

The main differences between Linux and Windows in virtualization support are: 1) Linux provides KVM and Xen, with outstanding performance and flexibility, suitable for high customization environments; 2) Windows supports virtualization through Hyper-V, with a friendly interface, and is closely integrated with the Microsoft ecosystem, suitable for enterprises that rely on Microsoft software.

The main tasks of Linux system administrators include system monitoring and performance tuning, user management, software package management, security management and backup, troubleshooting and resolution, performance optimization and best practices. 1. Use top, htop and other tools to monitor system performance and tune it. 2. Manage user accounts and permissions through useradd commands and other commands. 3. Use apt and yum to manage software packages to ensure system updates and security. 4. Configure a firewall, monitor logs, and perform data backup to ensure system security. 5. Troubleshoot and resolve through log analysis and tool use. 6. Optimize kernel parameters and application configuration, and follow best practices to improve system performance and stability.

Learning Linux is not difficult. 1.Linux is an open source operating system based on Unix and is widely used in servers, embedded systems and personal computers. 2. Understanding file system and permission management is the key. The file system is hierarchical, and permissions include reading, writing and execution. 3. Package management systems such as apt and dnf make software management convenient. 4. Process management is implemented through ps and top commands. 5. Start learning from basic commands such as mkdir, cd, touch and nano, and then try advanced usage such as shell scripts and text processing. 6. Common errors such as permission problems can be solved through sudo and chmod. 7. Performance optimization suggestions include using htop to monitor resources, cleaning unnecessary files, and using sy


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

WebStorm Mac version
Useful JavaScript development tools

Dreamweaver CS6
Visual web development tools

SAP NetWeaver Server Adapter for Eclipse
Integrate Eclipse with SAP NetWeaver application server.

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

Safe Exam Browser
Safe Exam Browser is a secure browser environment for taking online exams securely. This software turns any computer into a secure workstation. It controls access to any utility and prevents students from using unauthorized resources.
