/build/static/layout/Breadcrumb_cap_w.png

PXE Boot setup on Palo Alto PA-3020

Hello,

Non-network IT type here trying to figure out how to configure our Palo Alto PA-3020 (which we use for DHCP services) to allow PXE boot from our K2000 to image new Windows laptops.

Booting from the USB stick has always worked. Now with the new release of the K2000 (v7) we're looking to move beyond the USB stick to direct network boot from the K2000.

I have looked at multiple documentation (from KACE, Quest, and general internet googling) that talks about using DHCP Options 66 and 67 (perhaps 43 for the vendor ID or even 244 if the others don't work). However the instructions to create these entries are generally written for an MS DHCP server and no other brands. While I understand KACE can't provide info for each type of server out there, I have been unable to find anything that even remotely comes close to how this Palo Alto looks and works.

From a standalone PC, I do not see anything on boot-up (F12) that relates to our network or the K2000. It's always Windows Boot Manager and the UEFI internal drive. UEFI is on; Secure boot if off. When I've tried F12 on a blank VM (Virtual Box) I can obtain a DHCP IP address from the network, but the process always times out on TFTP Server not found -- timeout after three attempts. Using other VM products (VMware Fusion, Parallels) did not get that far into the process (though, that could be my configuration of each).

I have attached several screen shots of the Palo Alto interface and the option changes we've done. I'm hoping there's someone else out there using a K2000 with a Palo Alto PA-3020 that might have some insight as to what might be going on (or going wrong!).

Appreciation in advance!
Steve


(sorry for the sideways pictures; must be this portal)
nBccTa.jpeg 5dc7gs.jpeg ZDoYNq.jpeg nzpNtU.jpeg

1 Comment   [ + ] Show comment
  • Have you got this issue solved? We are experiencing the same challenge with K2000 and Palo Alto DHCP server. - mssvalenca 7 years ago

Answers (2)

Posted by: bitanalyst 6 years ago
White Belt
3
 PANOS does not currently support the ability to set the next-server (siaddr) field within the DHCP server.  The PXE clients are looking for the next-server field and not option 66 (TFTP server name).  As a result the PXE clients end up sending their TFTP request to the IP address of the DHCP server which in this case is the Palo Alto Firewall.

As a workaround for this I created a NAT rule to translate incoming TFTP connections sent to the firewall IP to the  IP address of the actual TFTP server.  It doesn't fix the root problem but it does solve the issue. 


Here is what my NAT rule looks like:






Comments:
  • I think your solution will solve the issue I'm having, but I can't make make out the image at that resolution. Do you mind posting another screenshot? - BirdOP 5 years ago
    • Here is a link to a better photo.
      https://postimg.cc/1n0FzMvC

      Basically service TFTP where the destination address is the firewall/gateway address. Using destination translation to send the packets to the IP address of the TFTP server on port 69. - bitanalyst 5 years ago
      • Awesome. Thanks! Just out for confirmation, your TFTP service is set up like this, correct? https://i.postimg.cc/jj4VXg0g/Capture.png - BirdOP 5 years ago
  • @BirdOP Yes except for one difference. I have the source port set to 1-65535 in my TFTP service object. - bitanalyst 5 years ago
    • Thanks for the quick responses. You've been a huge help. - BirdOP 5 years ago
Posted by: TheAustinDave 7 years ago
Third Degree Brown Belt
1
Since this is a non-Microsoft server I would recommend updating the file direct rather than setting option codes. If the system has pfsense you might be able to add the code or may have to contact Palo Alto support for how to configure. 

Should look something like this to set options on PXE boot if its a feature supported with the service.

option arch code 93 = unsigned integer 16; # RFC4578
option custom-lan-0 code 244 = ip-address;
[...]
subnet 172.16.2.0 netmask 255.255.255.0 {
    pool {
        range 172.16.2.50 172.16.2.99;
    }
    option routers 172.16.2.5;
    option domain-name-servers 172.16.2.5;
    option custom-lan-0 172.16.2.174;
    next-server 172.16.2.174;
    if option arch = 00:06 {      # This entry is for PXE booting systems with 
        filename "ipxe.efi";        # 32-bit UEFI firmware, which isn't supported
    } else if option arch = 00:07 {
        filename "ipxe.efi";
    } else if option arch = 00:09 {
        filename "ipxe.efi";
    } else {
        filename "undionly.kpxe";
    }
 
This website uses cookies. By continuing to use this site and/or clicking the "Accept" button you are providing consent Quest Software and its affiliates do NOT sell the Personal Data you provide to us either when you register on our websites or when you do business with us. For more information about our Privacy Policy and our data protection efforts, please visit GDPR-HQ