<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: How to Setup IP Helpers on PAN Firewall for PXE Services in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/324125#M82767</link>
    <description>&lt;P&gt;For what it's worth, I don't &lt;EM&gt;need/want&amp;nbsp;&lt;/EM&gt;to have this specific setup:&amp;nbsp; I don't &lt;EM&gt;need/want&lt;/EM&gt;&amp;nbsp;a DHCP server and different IP range/pool on each interface.&amp;nbsp; I would much prefer a single 1 DHCP service that serves up IP's from a single IP range/pool across all three interfaces (ethernet 1/2, ethernet 1/3 &amp;amp; ethernet 1/4) so that PXE works across all three.&amp;nbsp; The team that manages these devices does not seem to know how to do this so their solution is to plug in a switch in interface ethernet 1/2 and plug everything (PXE server, clients etc.) in there.&amp;nbsp; This is not ideal but it will allow me to do what I need.&lt;/P&gt;</description>
    <pubDate>Tue, 21 Apr 2020 19:34:26 GMT</pubDate>
    <dc:creator>JuliusPIV</dc:creator>
    <dc:date>2020-04-21T19:34:26Z</dc:date>
    <item>
      <title>How to Setup IP Helpers on PAN Firewall for PXE Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/322204#M82438</link>
      <description>&lt;DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;I'll start off by waving the "&lt;/SPAN&gt;&lt;SPAN&gt;I'm not as strong in networking &amp;amp; network security as I probably should be&lt;/SPAN&gt;&lt;SPAN&gt;" flag so I apologize in advance for my lack of expertise in these areas and products.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;In short, I need assistance getting PXE to work on devices connected to a PA-820. In this particular case the PA-820 is the DHCP server which is different than our standard office configuration*.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&amp;nbsp;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;That said, the setup here is fairly basic:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;ethernet 1/1 is the WAN port&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;ethernet 1/2, 1/3 &amp;amp; 1/4 are up &amp;amp; configured for use&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;The PA-820 is the DHCP server&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Under Network &amp;gt; DHCP &amp;gt; DHCP Server each ethernet interface has its own DHCP configuration. (I couldn't figure out if there was a better way to get DHCP working on all ports with the same IP range.)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;ethernet 1/2 &amp;gt; 192.168.1.0/26&lt;/SPAN&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;IP Pool: 192.168.1.20-62&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Broadcast: 10.199.155.63&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Subnet Mask: 255.255.255.192 (255.255.255.192/26)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;ethernet 1/3 &amp;gt; 192.168.1.64/26&lt;/SPAN&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;IP Pool: 192.168.1.65-126&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Broadcast: 10.199.155.127&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Subnet Mask: 255.255.255.192 (255.255.255.192/26)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;ethernet 1/4 &amp;gt; 192.168.1.128/26&lt;/SPAN&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;IP Pool: 192.168.1.129-190&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Broadcast: 10.199.155.191&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Subnet Mask: 255.255.255.192 (255.255.255.192/26)&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;No additional subnets&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;No VLANs&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;The imaging server that provides PXE services plugged into ethernet 1/2&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;The clients I need to image are plugged into ethernet 1/3 &amp;amp; 1/4&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Server and clients can communicate with each other.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;DHCP works on interfaces ethernet 1/2, 1/3 &amp;amp; 1/4&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;PXE doesn't work on any interface; not even ethernet 1/2 where I have the imaging server and a VM connected.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Here's what [I think] I know:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;OL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;When I attempt to PXE boot, it doesn't work and on the clients I'm seeing errors like:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;OL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;PXE-E16: No valid offer received&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;PXE-E18: Server response timeout&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;On the PXE server, I'm not seeing &lt;/SPAN&gt;&lt;SPAN&gt;any&lt;/SPAN&gt;&lt;SPAN&gt; PXE requests in the log which seems to suggest the client's discover request isn't reaching the PXE server&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;I've tried two different clients in each port to confirm it wasn't a client/port specific issue&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;I setup a VM on the imaging server to the same NIC as the imaging server and PXE fails there as well for the same reason as above.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;If I use boot media I can confirm IP's are issued and the imaging process works; just not PXE&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;If I plug in a standard consumer switch into ethernet 1/2 then plug the imaging server and one of the clients into the consumer switch, DHCP works but not PXE.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/OL&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;I did find a &lt;/SPAN&gt;&lt;SPAN&gt;&lt;A href="https://www.itninja.com/question/pxe-boot-setup-on-palo-alto-pa-3020" target="_blank" rel="noopener"&gt;post&lt;/A&gt;&lt;/SPAN&gt;&lt;SPAN&gt; that suggested creating a NAT rule to translate incoming TFTP connections sent to the firewall IP to the IP address of the actual TFTP server. I'm skeptical because of my current understanding of how the DHCP/PXE process works, which admittedly might be incomplete and accurate. That said, I'm open to trying that if there isn't a better solution.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;Thank you for taking the time to review this. I&lt;/SPAN&gt; &lt;EM&gt;&lt;U&gt;really appreciate&lt;/U&gt;&lt;/EM&gt; &lt;SPAN&gt;any suggestions you might have not just about getting PXE working but also the setup.&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;DIV class=""&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;*Standard Office Configuration: For what it's worth, in all of our offices, Domain Controllers serve up IP's via DHCP and we get the networking team to configure ip helpers on the Cisco switches that point to the PXE server which allows machines on all VLANs to PXE boot. We don't use DHCP options and I don't want to use them since Microsoft doesn't support using DHCP options and the MVP Community agrees:&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/DIV&gt;&lt;UL&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;A href="https://support.microsoft.com/en-us/help/259670/pxe-clients-computers-do-not-start-when-you-configure-the-dynamic-host" target="_blank" rel="noopener"&gt;https://support.microsoft.com/en-us/help/259670/pxe-clients-computers-do-not-start-when-you-configure-the-dynamic-host&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;A href="https://techcommunity.microsoft.com/t5/configuration-manager-blog/you-want-to-pxe-boot-don-t-use-dhcp-options/ba-p/275562" target="_blank" rel="noopener"&gt;https://techcommunity.microsoft.com/t5/configuration-manager-blog/you-want-to-pxe-boot-don-t-use-dhcp-options/ba-p/275562&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;LI&gt;&lt;DIV class="public-DraftStyleDefault-block public-DraftStyleDefault-ltr"&gt;&lt;SPAN&gt;&lt;A href="https://deploymentbunny.com/2016/02/29/osd-how-make-pxe-work-in-configmgr-osd-mdt-and-wds-work-perfectly-fine-stop-using-dhcp-option-66-67/" target="_blank" rel="noopener"&gt;https://deploymentbunny.com/2016/02/29/osd-how-make-pxe-work-in-configmgr-osd-mdt-and-wds-work-perfectly-fine-stop-using-dhcp-option-66-67/&lt;/A&gt;&lt;/SPAN&gt;&lt;/DIV&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/DIV&gt;</description>
      <pubDate>Sun, 12 Apr 2020 18:16:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/322204#M82438</guid>
      <dc:creator>JuliusPIV</dc:creator>
      <dc:date>2020-04-12T18:16:01Z</dc:date>
    </item>
    <item>
      <title>Re: How to Setup IP Helpers on PAN Firewall for PXE Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/322298#M82450</link>
      <description>&lt;P&gt;for your clients connected to ports 1/3 &amp;amp; 1/4.&amp;nbsp;&amp;nbsp; where on those 2 subnets is your IP helper?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Oh just noticed that this is your question... &amp;nbsp; are the cliients not connected to a switch that could have the helper address?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;are you also saying that pxe failed on the same lan? If devices are within the same broadcast domain as the image server you do not need a helper...&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have never tried this but just trying to work out why it would fail.&lt;/P&gt;</description>
      <pubDate>Sat, 11 Apr 2020 08:23:37 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/322298#M82450</guid>
      <dc:creator>Mick_Ball</dc:creator>
      <dc:date>2020-04-11T08:23:37Z</dc:date>
    </item>
    <item>
      <title>Re: How to Setup IP Helpers on PAN Firewall for PXE Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/322444#M82480</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/9981"&gt;@Mick_Ball&lt;/a&gt;&amp;nbsp;- thank you for taking the time to reply!&lt;/P&gt;&lt;P&gt;Under Network &amp;gt; DHCP &amp;gt; DHCP Server each ethernet interface has its own DHCP configuration. (I couldn't figure out if there was a better way to get DHCP working on all ports with the same IP range.)&lt;/P&gt;&lt;UL class="_33MEMislY0GAlB78wL1_CR"&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;ethernet 1/2 &amp;gt; 192.168.1.0/26&lt;/P&gt;&lt;UL class="_33MEMislY0GAlB78wL1_CR"&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;IP Pool: 192.168.1.20-62&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Broadcast: 10.199.155.63&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Subnet Mask: 255.255.255.192 (255.255.255.192/26)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;ethernet 1/3 &amp;gt; 192.168.1.64/26&lt;/P&gt;&lt;UL class="_33MEMislY0GAlB78wL1_CR"&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;IP Pool: 192.168.1.65-126&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Broadcast: 10.199.155.127&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Subnet Mask: 255.255.255.192 (255.255.255.192/26)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;ethernet 1/4 &amp;gt; 192.168.1.128/26&lt;/P&gt;&lt;UL class="_33MEMislY0GAlB78wL1_CR"&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;IP Pool: 192.168.1.129-190&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Broadcast: 10.199.155.191&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Subnet Mask: 255.255.255.192 (255.255.255.192/26)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;Yesterday I made progress on this by doing the following&lt;/P&gt;&lt;UL class="_33MEMislY0GAlB78wL1_CR"&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Deleted a vlan that showed up in Network &amp;gt; VLANs.&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Deleted the DHCP relay I created that referenced this VLAN&lt;/P&gt;&lt;/LI&gt;&lt;LI&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;Deleted a NAT rule to translate incoming TFTP connections to the PXE server (I had forgotten I set this.)&lt;/P&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P class="_1qeIAgB0cPwnLhDF9XSiJM"&gt;After committing the changes, PXE works only for devices plugged into the same interface as the PXE server (so ethernet 1/2). Unfortunately PXE does not work on interfaces 1/3 or 1/4.&lt;/P&gt;</description>
      <pubDate>Mon, 13 Apr 2020 12:33:46 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/322444#M82480</guid>
      <dc:creator>JuliusPIV</dc:creator>
      <dc:date>2020-04-13T12:33:46Z</dc:date>
    </item>
    <item>
      <title>Re: How to Setup IP Helpers on PAN Firewall for PXE Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/324125#M82767</link>
      <description>&lt;P&gt;For what it's worth, I don't &lt;EM&gt;need/want&amp;nbsp;&lt;/EM&gt;to have this specific setup:&amp;nbsp; I don't &lt;EM&gt;need/want&lt;/EM&gt;&amp;nbsp;a DHCP server and different IP range/pool on each interface.&amp;nbsp; I would much prefer a single 1 DHCP service that serves up IP's from a single IP range/pool across all three interfaces (ethernet 1/2, ethernet 1/3 &amp;amp; ethernet 1/4) so that PXE works across all three.&amp;nbsp; The team that manages these devices does not seem to know how to do this so their solution is to plug in a switch in interface ethernet 1/2 and plug everything (PXE server, clients etc.) in there.&amp;nbsp; This is not ideal but it will allow me to do what I need.&lt;/P&gt;</description>
      <pubDate>Tue, 21 Apr 2020 19:34:26 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/324125#M82767</guid>
      <dc:creator>JuliusPIV</dc:creator>
      <dc:date>2020-04-21T19:34:26Z</dc:date>
    </item>
    <item>
      <title>Re: How to Setup IP Helpers on PAN Firewall for PXE Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/360701#M88126</link>
      <description>&lt;P&gt;Hi, I am just wondering if you have found any resolution about this issue.&amp;nbsp; I have a very similar situation here.&amp;nbsp; We have a PAN 820 in the office.&amp;nbsp; The DHCP is configured on firewall.&amp;nbsp; I have defined a server network in this case which has the routing sub-interface on 820.&amp;nbsp; I also defined PXE option 66 and 67, plus a policy based forwarded on TFTP service to the server IP if the request is hitting on the gateway from the same network range.&amp;nbsp;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 04 Nov 2020 18:52:38 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/360701#M88126</guid>
      <dc:creator>johneyboy</dc:creator>
      <dc:date>2020-11-04T18:52:38Z</dc:date>
    </item>
    <item>
      <title>Re: How to Setup IP Helpers on PAN Firewall for PXE Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/360933#M88156</link>
      <description>&lt;P&gt;Are the clients and PXE server in different zones? If so, you'll need to have security policies allowing the traffic from client to server.&lt;/P&gt;&lt;P&gt;Have you taken any captures on the interfaces to see what the traffic is doing?&lt;/P&gt;</description>
      <pubDate>Thu, 05 Nov 2020 19:45:59 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/360933#M88156</guid>
      <dc:creator>rmfalconer</dc:creator>
      <dc:date>2020-11-05T19:45:59Z</dc:date>
    </item>
    <item>
      <title>Re: How to Setup IP Helpers on PAN Firewall for PXE Services</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/466616#M102699</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I know this thread is quite old, but I thought I'd share my resolution to the same issue. Of course, it can obviously be different on a case-by-case situation.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My test set-up I created today....&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Physical Site A VLAN 1&lt;/P&gt;&lt;P&gt;Physical Site A Net 192.168.1.0/24.&lt;/P&gt;&lt;P&gt;Physical Site A PXE 192.168.1.1/32&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Physical Site B VLAN 2&lt;/P&gt;&lt;P&gt;Physical Site B Net 192.168.2.0/24&lt;/P&gt;&lt;P&gt;Physical Site B DHCP 192.168.2.1/32 (Palo Alto FW)&lt;/P&gt;&lt;P&gt;Physical Site B "IP helper-address 192.168.1.1" (Set on Cisco Switch for VLAN 2)&lt;/P&gt;&lt;P&gt;Physical Site B "IP helper-address&amp;nbsp;192.168.2.1" (Set on Cisco Switch for VLAN 2)&lt;/P&gt;&lt;P&gt;Physical Site B client laptop patched into VLAN 2&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I built up a test network with physical site A hosting the PXE server on VLAN 1, and site B with the DHCP server running on the Palo Firewall on the interface for VLAN 2. A site-site VPN was configured between the two sites using two Palo FW's.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Both sites have Cisco switches with L3 routing.&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The trick was looking at the &lt;STRONG&gt;ip default-gateway&lt;/STRONG&gt; set on the Cisco switch. - Basically, the DHCP broadcast comes from the laptop performing a Network boot. The Cisco switch will pick-up these broadcasts and convert them to Unicast and send to both IP helpers on behalf of the client.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If your routing on the L3 switch sends its packets out on the wrong route then the DHCP and PXE requests wont get to the PXE server. In my case I had to ensure that the default gateway set on the Cisco was set to the internal FW interface 192.168.2.1 that is allowed to traverse the site-site VPN.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Once I set this up everything fell into place and the laptop in Site B PXE booted to the PXE server in site A.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;CISCO CONFIG:&lt;/P&gt;&lt;P&gt;show run int vlan 2&lt;/P&gt;&lt;P&gt;interface Vlan2&lt;BR /&gt;ip address 192.168.2.253 255.255.255.0&lt;BR /&gt;ip helper-address 192.168.1.1&lt;BR /&gt;ip helper-address 192.168.2.1&lt;BR /&gt;end&lt;/P&gt;&lt;P&gt;ip default-gateway 192.168.2.1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;My next step is to look into iPXE as PXE on a site-site VPN is far too slow.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Anyhow, I hope that this helps someone in the future.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Feb 2022 22:53:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/how-to-setup-ip-helpers-on-pan-firewall-for-pxe-services/m-p/466616#M102699</guid>
      <dc:creator>RLJFRY</dc:creator>
      <dc:date>2022-02-17T22:53:53Z</dc:date>
    </item>
  </channel>
</rss>

