7.9. Configuring Satellite 6 with External Services
TFTP service available in Red Hat Enterprise Linux. It can optionally install DNS and DHCP services. If required to use Capsule with external services, prevent installation of the unwanted services by running the installer with the relevant options set to false.
Example 7.1. Installing Capsule Without Services
TFTP, enter a command as follows:
#katello-installer \--capsule-tftp false
false to reset the configuration files back to the desired state. This will not uninstall the packages for the services, such as bind or tftp-server. If required, uninstall the unused packages manually.
Example 7.2. Reinstalling Capsule Without Services
DNS, DHCP, and TFTP, enter a command as follows:
#katello-installer \--capsule-dns false \--capsule-dns-managed false \--capsule-dhcp false \--capsule-dhcp-managed false \--foreman-proxy-tftp false
Important
NFSv3. The procedures should work for other releases, such as Red Hat Enterprise Linux 6 or Red Hat Enterprise Linux 7.0, but note there may be differences in NFS exporting. See the Red Hat Enterprise Linux 7 Storage Administration Guide and Red Hat Enterprise Linux 6 Storage Administration Guide for more information on exporting file systems using NFS.
192.168.38.0/24, the domain is called virtual.lan, the server for the external services is 192.168.38.2/24, and the Capsule Server is at 192.168.38.1/24.
7.9.1. Configuring an External DNS Service
# yum install bind bind-utils
Procedure 7.7. Configuring the External DNS Server
DNS server as follows:
- Create the configuration for the domain with a configuration similar to the following:
#
Note that thecat /etc/named.confinclude "/etc/rndc.key"; controls { inet 192.168.38.2 port 953 allow { 192.168.38.1; 192.168.38.2; } keys { "capsule"; }; }; options { directory "/var/named"; forwarders { 8.8.8.8; 8.8.4.4; }; }; include "/etc/named.rfc1912.zones"; zone "38.168.192.in-addr.arpa" IN { type master; file "dynamic/38.168.192-rev"; update-policy { grant "capsule" zonesub ANY; }; }; zone "virtual.lan" IN { type master; file "dynamic/virtual.lan"; update-policy { grant "capsule" zonesub ANY; }; };inetline must be entered as one line in the configuration file.The example above configures a domainvirtual.lanas one subnet192.168.38.0/24, a security key namedforeman, and sets forwarders to Google's publicDNSaddresses (8.8.8.8and8.8.4.4). - Create a key file:
#
ddns-confgen -k capsuleThe above command can take a long time as the program is reading a pseudo random device. For testing or proof-of-concept deployments, an insecure non-blocking device can be used as follows:#
ddns-confgen -k capsule -r /dev/urandom - The above command will print the key section with some instructions as comments. Copy and paste the key section into a separate file named
/etc/rndc.key, which is included by a statement innamed.conf, so that the file looks as follows:#
cat /etc/rndc.keykey "capsule" { algorithm hmac-sha256; secret "GeBbgGoLedEAAwNQPtPh3zP56MJbkwM84UJDtaUS9mw="; };This is the secret key that is used to changeDNSserver configuration, keep it safe and make sure onlyrootcan read and write it. This file will be copied over to Capsule server in a later step. - Create zone files as follows:
#
cat /var/named/dynamic/virtual.lan$ORIGIN . $TTL 10800 ; 3 hours virtual.lan IN SOA service.virtual.lan. root.virtual.lan. ( 9 ; serial 86400 ; refresh (1 day) 3600 ; retry (1 hour) 604800 ; expire (1 week) 3600 ; minimum (1 hour) ) NS service.virtual.lan. $ORIGIN virtual.lan. $TTL 86400 ; 1 day capsule A 192.168.38.1 service A 192.168.38.2 - Create the reverse zone file:
#
cat /var/named/dynamic/38.168.192-rev$ORIGIN . $TTL 10800 ; 3 hours 38.168.192.in-addr.arpa IN SOA service.virtual.lan. root.38.168.192.in-addr.arpa. ( 4 ; serial 86400 ; refresh (1 day) 3600 ; retry (1 hour) 604800 ; expire (1 week) 3600 ; minimum (1 hour) ) NS service.virtual.lan. $ORIGIN 38.168.192.in-addr.arpa. $TTL 86400 ; 1 day 1 PTR capsule.virtual.lan. 2 PTR service.virtual.lan.Important
Make sure there are no extra non-US-ASCII characters as BIND is sensitive to this.
Procedure 7.8. Testing and Starting the DNS Service
DNS service, proceed as follows:
- Validate the syntax as follows:
#
named-checkconf -z /etc/named.conf - Start the server:
- On Red Hat Enterprise Linux 7:
#
systemctl restart named - On Red Hat Enterprise Linux 6:
#
service named restart
- Try to add a new host dynamically:
#
echo -e "server 192.168.38.2\n \update add aaa.virtual.lan 3600 IN A 192.168.38.10\n \send\n" | nsupdate -k /etc/rndc.key - Test that the
DNSservice can resolve the new host added in the previous step:#
nslookup aaa.virtual.lan 192.168.38.2 - If required, delete the new entry:
#
echo -e "server 192.168.38.2\n \update delete aaa.virtual.lan 3600 IN A 192.168.38.10\n \send\n" | nsupdate -k /etc/rndc.key - Configure the firewall for external access to the
DNSservice (UDPandTCPon port 53):- On a Red Hat Enterprise Linux 6 Satellite, execute as root:
#
iptables -A INPUT -m state --state NEW -p udp --dport 53 -j ACCEPT \&& iptables -A INPUT -m state --state NEW -p tcp --dport 53 -j ACCEPT \&& service iptables saveMake sure theiptablesservice is started and enabled:#
service iptables start#chkconfig iptables on - On a Red Hat Enterprise Linux 7 Satellite, execute as root:
#
firewall-cmd --add-port="53/udp" --add-port="53/tcp" \&& firewall-cmd --permanent --add-port="53/udp" --add-port="53/tcp"
Procedure 7.9. Configuring a Capsule Server to Use an External DNS Service
DNS service, proceed as follows:
- Ensure that the nsupdate utility, from the bind-utils package, is installed:
#
yum install bind-utils - Copy the
/etc/rndc.keyfile from the services server to the Capsule Server. For example:- On the services server:
scp localfile username@hostname:remotefile
- Alternatively, on the Capsule Server:
scp username@hostname:remotefile localfile
- Make sure the key file has the correct owner, permissions, and SELinux label:
#
ls /etc/rndc.key -Zla-rw-r-----. root named system_u:object_r:dnssec_t:s0 /etc/rndc.key - The Capsule uses the nsupdate utility to update
DNSrecords on the remote server. Before configuring it, test adding one additional host remotely as follows:#
echo -e "server 192.168.38.2\n \update add aaa.virtual.lan 3600 IN A 192.168.38.10\n \send\n" | nsupdate -k /etc/rndc.key#nslookup aaa.virtual.lan 192.168.38.2#echo -e "server 192.168.38.2\n \update delete aaa.virtual.lan 3600 IN A 192.168.38.10\n \send\n" | nsupdate -k /etc/rndc.key - Run the
katello-installerscript to make the following persistent changes to the/etc/foreman-proxy/settings.d/dns.ymlfile. Enable the smart-proxy module setting provider to bensupdate, add the address to theDNSserver, and set the default time to live for records created by this Capsule. For example:#
katello-installer --foreman-proxy-dns=true --foreman-proxy-dns-managed=false --foreman-proxy-dns-provider=nsupdate --foreman-proxy-dns-server="192.168.38.2" --foreman-proxy-keyfile=/etc/rndc.key --foreman-proxy-dns-ttl=86400 - Restart foreman-proxy service:
- On Red Hat Enterprise Linux 7:
#
systemctl restart foreman-proxy - On Red Hat Enterprise Linux 6:
#
service foreman-proxy restart
- View the Satellite Server GUI in your browser;
https://satellite_host.example.com. - Select → . Locate the Capsule being configured and select from the drop-down list. The
DNSfeature should appear. - Select → and associate the
DNSservice with the appropriate subnets and domain.
7.9.2. Configuring an External DHCP Service
# yum install dhcp
Note
Procedure 7.10. Configuring the External DHCP Server
DHCP server as follows:
- Generate a security token in an empty directory as follows:
#
The above command can take a long time, for less-secure proof-of-concept deployments you can use a non-blocking random number generator:dnssec-keygen -a HMAC-MD5 -b 512 -n HOST omapi_key#
This will create the key pair in two files in the current directory.dnssec-keygen -r /dev/urandom -a HMAC-MD5 -b 512 -n HOST omapi_key - Copy the secret hash from the key:
#
cat Komapi_key.+*.private |grep ^Key|cut -d ' ' -f2 - Edit the
dhcpdconfiguration file for all the subnets, and add the secret key from the previous step:#
cat /etc/dhcp/dhcpd.confdefault-lease-time 604800; max-lease-time 2592000; log-facility local7; subnet 192.168.38.0 netmask 255.255.255.0 { range 192.168.38.10 192.168.38.100; option routers 192.168.38.1; option subnet-mask 255.255.255.0; option domain-search "virtual.lan"; option domain-name "virtual.lan"; option domain-name-servers 8.8.8.8; } omapi-port 7911; key omapi_key { algorithm HMAC-MD5; secret "jNSE5YI3H1A8Oj/tkV4...A2ZOHb6zv315CkNAY7DMYYCj48Umw=="; }; omapi-key omapi_key; - Delete the two key files from the directory where you created them.
- For each subnet defined (
192.168.38.0in this example) defineSubneton the Satellite server. It is recommended to set up a lease range and reservation range separately to prevent conflicts. In this example, the lease range is192.168.38.10to192.168.38.100so the reservation range (defined in Satellite GUI) would be192.168.38.101to192.168.38.250. Do not setDHCP Capsulefor the definedSubnetyet.Note that ISC DHCP listens only on interfaces that match defined subnets. In this example, the server has an interface that routes to192.168.38.0subnet directly. - Configure the firewall for external access to the
DHCPservice:- On a Red Hat Enterprise Linux 7:
#
firewall-cmd --add-service dhcp \&& firewall-cmd --permanent --add-service dhcp - On a Red Hat Enterprise Linux 6:
#
iptables -A INPUT -m state --state NEW -p tcp --dport 67 -j ACCEPT \&& service iptables saveMake sure theiptablesservice is started and enabled:#
service iptables start#chkconfig iptables on
- Configuration files are read by
foreman-proxyuser, first determine the UID and GID numbers of theforeman-proxyuser on the Capsule Server, then create the same user and group with same IDs on this server:#
groupadd -g 990 foreman-proxy#useradd -u 992 -g 990 -s /sbin/nologin foreman-proxy - Configuration files must be readable for this user. Recent dhcp package updates removed read and execute flags from the configuration directory which prevents that. To restore the required flags and prevent this change in behavior on the next package update, enter the following commands:
#
chmod o+rx /etc/dhcp/#chmod o+r /etc/dhcp/dhcpd.conf#chattr +i /etc/dhcp/ /etc/dhcp/dhcpd.conf - Start the
DHCPservice:- On Red Hat Enterprise Linux 7:
#
systemctl start dhcpd - On Red Hat Enterprise Linux 6:
#
service dhcpd start
- Export
DHCPconfiguration and leases file usingNFS, so that the Capsule Server can read it:#
yum install nfs-utils#systemctl enable rpcbind nfs-server#systemctl start rpcbind nfs-server nfs-lock nfs-idmapd - Create the
DHCPconfiguration and leases files to be exported usingNFS:#
mkdir -p /exports/var/lib/dhcpd /exports/etc/dhcp - Add the newly created mount point to
/etc/fstabfile:/var/lib/dhcpd /exports/var/lib/dhcpd none bind,auto 0 0 /etc/dhcp /exports/etc/dhcp none bind,auto 0 0
- Mount the file systems in
/etc/fstab:#
mount -a - Ensure the following lines are present in
/etc/exports:/exports 192.168.38.1(rw,async,no_root_squash,fsid=0,no_subtree_check)
/exports/etc/dhcp 192.168.38.1(ro,async,no_root_squash,no_subtree_check,nohide)
/exports/var/lib/dhcpd 192.168.38.1(ro,async,no_root_squash,no_subtree_check,nohide)
- Reload the
NFSserver:#
exportfs -rva - Configure the firewall for the
DHCPomapiport7911for the Capsule Server:- On a Red Hat Enterprise Linux 7:
#
firewall-cmd --add-port="7911/tcp" \&& firewall-cmd --permanent --add-port="7911/tcp" - On a Red Hat Enterprise Linux 6:
#
iptables -A INPUT -m state --state NEW -p tcp --dport 7911 -j ACCEPT \&& service iptables saveMake sure theiptablesservice is started and enabled:#
service iptables start#chkconfig iptables on
- This step is common to both the
DHCPandTFTPprocedures and need only be carried out once per system. If required, follow this step to configure the firewall for external access to theNFSservice.Note
In this guide the clients are configured to useNFSv3and this step is thereforeNFSv3specific.- On Red Hat Enterprise Linux 7:It is recommended to use
firewallddaemon'sNFSservice option becauseNFSuses multiple ports to initiate connections. To do so, enter the following commands:#
For additional information on usingfirewall-cmd --zone public --add-service mountd \&& firewall-cmd --zone public --add-service rpc-bind \&& firewall-cmd --zone public --add-service nfs \&& firewall-cmd --permanent --zone public --add-service mountd \&& firewall-cmd --permanent --zone public --add-service rpc-bind \&& firewall-cmd --permanent --zone public --add-service nfsNFSv3behind a firewall on Red Hat Enterprise Linux 7, see the “Running NFS Behind a Firewall” section in the Red Hat Enterprise Linux 7 Storage Administration Guide and the “Securing NFS” section in the Red Hat Enterprise Linux 7 Security Guide. - On Red Hat Enterprise Linux 6:Configure ports for
NFSv3in the/etc/sysconfig/nfsfile as follows:LOCKD_TCPPORT=32803 LOCKD_UDPPORT=32769 MOUNTD_PORT=892 RQUOTAD_PORT=875 STATD_PORT=662 STATD_OUTGOING_PORT=2020
Restart the service for the changes to take effect:#
service nfs restartAdd the following rules to the/etc/sysconfig/iptablesfile by entering commands as follows:#
Restart the firewall for the changes to take effect:iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 111 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 111 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 2049 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 2049 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 32803 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 32769 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 892 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 892 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 875 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 875 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 662 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 662 -j ACCEPT \&& service iptables save#
service iptables restartFor additional information on usingNFSv3behind a firewall on Red Hat Enterprise Linux 6, see the Red Hat Enterprise Linux 6 Storage Administration Guide and the “Running NFS Behind a Firewall” section in the “Securing NFS” section in the Red Hat Enterprise Linux 6 Security Guide.
Procedure 7.11. Configuring a Capsule Server to Use an External DHCP Service
DHCP service, proceed as follows:
- Install the
NFSclient:#
yum install nfs-utils - Create the
DHCPdirectories to prepare forNFS:#
mkdir -p /mnt/nfs/etc/dhcp /mnt/nfs/var/lib/dhcpd - Change the file owner as follows:
#
chown -R foreman-proxy /mnt/nfs - Try to reach the
NFSserver and verify RPC communication paths:#
showmount -e 192.168.38.2#rpcinfo -p 192.168.38.2 - Add these two lines to the
/etc/fstabfile:192.168.38.2:/exports/etc/dhcp /mnt/nfs/etc/dhcp nfs ro,vers=3,auto,nosharecache,context="system_u:object_r:dhcp_etc_t:s0" 0 0
192.168.38.2:/exports/var/lib/dhcpd /mnt/nfs/var/lib/dhcpd nfs ro,vers=3,auto,nosharecache,context="system_u:object_r:dhcpd_state_t:s0" 0 0
- Mount the file systems in
/etc/fstab:#
mount -a - Try to read the relevant files:
#
In case of problems, investigate thesu foreman-proxy -s /bin/bashbash-4.2$cat /mnt/nfs/etc/dhcp/dhcpd.confbash-4.2$cat /mnt/nfs/var/lib/dhcpd/dhcpd.leasesbash-4.2$exitNFSconfiguration, logs, and firewall rules. - On the Capsule Server, run the
katello-installerscript to make the following persistent changes to the/etc/foreman-proxy/settings.d/dhcp.ymlfile:#
Ensure thekatello-installer --foreman-proxy-dhcp=true --foreman-proxy-dhcp-provider=isc --foreman-proxy-dhcp-config /mnt/nfs/etc/dhcp/dhcpd.conf --foreman-proxy-dhcp-leases /mnt/nfs/var/lib/dhcpd/dhcpd.leases --foreman-proxy-dhcp-key-name=omapi_key --foreman-proxy-dhcp-key-secret=jNSE5YI3H1A8Oj/tkV4...A2ZOHb6zv315CkNAY7DMYYCj48Umw== --foreman-proxy-dhcp-server dhcp.example.comdhcp_key_secretvalue is correctly entered without quotes. The trailing=character is optional. - Restart the proxy:
- On Red Hat Enterprise Linux 7:
#
systemctl restart foreman-proxy - On Red Hat Enterprise Linux 6:
#
service foreman-proxy restart
- View the Satellite Server GUI in your browser;
https://satellite_host.example.com. - Select → . Locate the Capsule and select from the drop-down list. The
DHCPfeature should appear. - Select → and associate the
DHCPservice with the appropriate subnets and domain.
7.9.3. Configuring an External TFTP Service
Procedure 7.12. Configuring the TFTP Server
TFTP server as follows:
- Install and enable the
TFTPserver:#
yum install tftp-server syslinux- On Red Hat Enterprise Linux 7, enable and activate the
tftp.socketunit:#
systemctl enable tftp.socket#systemctl start tftp.socket - On Red Hat Enterprise Linux 6, enable and start the
xinetdservice:#
service xinetd enable#service xinetd start
- Configure the PXELinux environment as follows:
#
mkdir -p /var/lib/tftpboot/{boot,pxelinux.cfg}#cp /usr/share/syslinux/{pxelinux.0,menu.c32,chain.c32} /var/lib/tftpboot/ - Restore SELinux file contexts:
#
restorecon -RvF /var/lib/tftpboot/ - Create the
TFTPdirectory to be exported usingNFS:#
mkdir -p /exports/var/lib/tftpboot - Add the newly created mount point to the
/etc/fstabfile:/var/lib/tftpboot /exports/var/lib/tftpboot none bind,auto 0 0
- Mount the file systems in
/etc/fstab:#
mount -a - Ensure the following lines are present in
/etc/exports:/exports 192.168.38.1(rw,async,no_root_squash,fsid=0,no_subtree_check)
/exports/var/lib/tftpboot 192.168.38.1(rw,async,no_root_squash,no_subtree_check,nohide)
The first line is common to theDHCPconfiguration and therefore should already be present if the previous procedure was completed on this system. - Reload the
NFSserver:#
exportfs -rva - This step is common to both the
DHCPandTFTPprocedures and need only be carried out once per system. If required, follow this step to configure the firewall for external access to theNFSservice.Note
In this guide the clients are configured to useNFSv3and this step is thereforeNFSv3specific.- On Red Hat Enterprise Linux 7:It is recommended to use
firewallddaemon'sNFSservice option becauseNFSuses multiple ports to initiate connections. To do so, enter the following commands:#
For additional information on usingfirewall-cmd --zone public --add-service mountd \&& firewall-cmd --zone public --add-service rpc-bind \&& firewall-cmd --zone public --add-service nfs \&& firewall-cmd --permanent --zone public --add-service mountd \&& firewall-cmd --permanent --zone public --add-service rpc-bind \&& firewall-cmd --permanent --zone public --add-service nfsNFSv3behind a firewall on Red Hat Enterprise Linux 7, see the “Running NFS Behind a Firewall” section in the Red Hat Enterprise Linux 7 Storage Administration Guide and the “Securing NFS” section in the Red Hat Enterprise Linux 7 Security Guide. - On Red Hat Enterprise Linux 6:Configure ports for
NFSv3in the/etc/sysconfig/nfsfile as follows:LOCKD_TCPPORT=32803 LOCKD_UDPPORT=32769 MOUNTD_PORT=892 RQUOTAD_PORT=875 STATD_PORT=662 STATD_OUTGOING_PORT=2020
Restart the service for the changes to take effect:#
service nfs restartAdd the following rules to the/etc/sysconfig/iptablesfile by entering commands as follows:#
Restart the firewall for the changes to take effect:iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 111 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 111 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 2049 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 2049 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 32803 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 32769 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 892 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 892 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 875 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 875 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p udp --dport 662 -j ACCEPT \&& iptables -A INPUT -s 192.168.1.0/24 -m state --state NEW -p tcp --dport 662 -j ACCEPT \&& service iptables save#
service iptables restartFor additional information on usingNFSv3behind a firewall on Red Hat Enterprise Linux 6, see the Red Hat Enterprise Linux 6 Storage Administration Guide and the “Running NFS Behind a Firewall” section in the “Securing NFS” section in the Red Hat Enterprise Linux 6 Security Guide.
Procedure 7.13. Configure the Firewall for External access to the TFTP service
- Configure the firewall for external access to the
TFTPservice (UDPon port 69):- On a Red Hat Enterprise Linux 7:
#
firewall-cmd --add-port="69/udp" \&& firewall-cmd --permanent --add-port="69/udp" - On a Red Hat Enterprise Linux 6:
#
iptables -A INPUT -m state --state NEW -p tcp --dport 69 -j ACCEPT \&& service iptables saveMake sure theiptablesservice is started and enabled:#
service iptables start#chkconfig iptables on
Procedure 7.14. Configuring a Capsule Server to Use an External TFTP Service
TFTP service, proceed as follows:
- Create the
TFTPdirectory to prepare forNFS:#
mkdir -p /mnt/nfs/var/lib/tftpboot - In the
/etc/fstab, add a line as follows:192.168.38.2:/exports/var/lib/tftpboot /mnt/nfs/var/lib/tftpboot nfs rw,vers=3,auto,nosharecache,context="system_u:object_r:tftpdir_rw_t:s0" 0 0
- Mount the file systems in
/etc/fstab:#
mount -a - Run the
katello-installerscript to make the following persistent changes to the/etc/foreman-proxy/settings.d/tftp.ymlfile:#
katello-installer --foreman-proxy-tftp=true --foreman-proxy-tftp-root /mnt/nfs/var/lib/tftpbootIf theTFTPservice is running on a different server than theDHCPservice, update thetftp_servernamesetting with the FQDN orIPaddress of that server.#
katello-installer --foreman-proxy-tftp-servername=new_FQDN - View the Satellite Server GUI in your browser;
https://satellite_host.example.com. - Select → in the user interface. Locate the Capsule and select from the drop-down list. The
TFTPfeature should appear. - Select → and associate the
TFTPservice with the appropriate subnets and domain.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.