This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
advanced-dhcpdns [2024/11/06 00:40] – [DHCP / DNS Server (LAN)] -Condense hogwild | advanced-dhcpdns [2025/03/29 20:57] (current) – [DHCP Client (WAN)] -Formatting hogwild | ||
---|---|---|---|
Line 1: | Line 1: | ||
====== DHCP/ | ====== DHCP/ | ||
- | This menu let you configure advanced settings for the DHCP, DNS and TFTP services for both the LAN and WAN. Most of this functionality is provided by [[https:// | + | Here, you can configure advanced settings for the DHCP, DNS and TFTP services for both LAN and WAN. Most of this functionality is provided by [[https:// |
Line 12: | Line 12: | ||
{{: | {{: | ||
- | **Enable DNSSEC support: ** Enables | + | **Enable DNSSEC support: **enables |
DNSSEC secures DNS by authenticating its servers. It prevents DNS hacking and poisoning. If the authoritative DNS server has DNSSEC, enabling it ensures DNS queries are answered by // | DNSSEC secures DNS by authenticating its servers. It prevents DNS hacking and poisoning. If the authoritative DNS server has DNSSEC, enabling it ensures DNS queries are answered by // | ||
Line 20: | Line 20: | ||
\\ | \\ | ||
- | **Use dnscrypt-proxy: | + | **Use dnscrypt-proxy: |
When a DNSCrypt-enabled server is chosen, a unique key pair is generated every hour. Queries are then encrypted using this key pair before being sent to the server, usually on TCP port 443. The reply is also encrypted. Checking //Use dnscrypt-proxy// | When a DNSCrypt-enabled server is chosen, a unique key pair is generated every hour. Queries are then encrypted using this key pair before being sent to the server, usually on TCP port 443. The reply is also encrypted. Checking //Use dnscrypt-proxy// | ||
Line 30: | Line 30: | ||
* Ephemeral Keys - if checked, a new key pair is generated for each \\ DNS query. Use this with care, as it's very cpu-intensive, | * Ephemeral Keys - if checked, a new key pair is generated for each \\ DNS query. Use this with care, as it's very cpu-intensive, | ||
- | * Manual Entry - if enabled, 3 more fields | + | * Manual Entry - if enabled, 3 more fields |
- | * Resolver Address - the IP address | + | * Resolver Address - the IP of the dnscrypt-enabled DNS server. |
- | * Provider Name - the name of the DNS provider, | + | * Provider Name - the DNS provider |
- | * Provider Public Key - the public key given by the DNSCRYPT-enabled \\ DNS provider | + | * Provider Public Key - the public key from the DNSCRYPT-enabled \\ DNS provider (to generate a key pair) |
- | * Resolver - a dropdown list currently containung | + | * Resolver - a dropdown list of about 200 DNS servers. |
* Some support DNSSEC. | * Some support DNSSEC. | ||
* Some don't log queries. | * Some don't log queries. | ||
* Some are filtered. | * Some are filtered. | ||
- | * Priority - should be left at // | + | * Priority - should be left at // |
- | * Local Port - the port on which dnscrypt-proxy | + | * Local Port - the port on which dnscrypt-proxy |
| | ||
Line 60: | Line 60: | ||
\\ | \\ | ||
- | **Upstream resolvers: | + | **Upstream resolvers: |
\\ | \\ | ||
Line 88: | Line 88: | ||
**WINS (for DHCP):** the IP address of a WINS Server to give to DHCP clients. | **WINS (for DHCP):** the IP address of a WINS Server to give to DHCP clients. | ||
- | This doesn' | + | This doesn' |
- | + | ||
- | Windows Internet Name Service | + | |
\\ | \\ | ||
Line 113: | Line 111: | ||
{{: | {{: | ||
- | **Use internal DNS: | + | **Use internal DNS: |
DHCP clients receive the router' | DHCP clients receive the router' | ||
Line 123: | Line 121: | ||
\\ | \\ | ||
- | **Use received DNS with user-entered DNS: **adds DNS servers from the DHCP Server | + | **Use received DNS with user-entered DNS: **adds DNS servers from the WAN' |
See the [[basic-network|Network]] menu for details. (Default: Disabled). | See the [[basic-network|Network]] menu for details. (Default: Disabled). | ||
Line 147: | Line 145: | ||
\\ | \\ | ||
- | **Generate a name for DHCP clients which do not otherwise have one**: if a hostname | + | **Generate a name for DHCP clients which do not otherwise have one**: if FreshTomato can't find a hostname |
\\ | \\ | ||
Line 223: | Line 221: | ||
\\ | \\ | ||
- | **Enable DNS Rebind protection: | + | **Enable DNS Rebind protection: |
Using this may have side effects. (Default: Enabled). | Using this may have side effects. (Default: Enabled). | ||
Line 237: | Line 235: | ||
**Enable multicast DNS: | **Enable multicast DNS: | ||
- | Avahi lets programs publish/ | + | Avahi lets programs publish/ |
\\ | \\ | ||
- | **Enable reflector: | + | **Enable reflector: |
+ | |||
+ | This makes Avahi re-transmit / re-multicast queries and responses via multiple interfaces. This allows the router to bridge multicast DNS networks. | ||
+ | |||
+ | For details, see this tutorial: [[https:// | ||
\\ | \\ | ||
- | **Custom configuration: | + | **Custom configuration: |
===== TFTP Server ===== | ===== TFTP Server ===== | ||
- | **Enable TFTP**: | + | **Enable TFTP**: starts dnsmasq' |
+ | |||
+ | This prevents dnsmasq issues, for example, if TFTP root becomes unavailable. | ||
\\ | \\ | ||
- | **TFTP root path**: | + | **TFTP root path**: |
\\ | \\ | ||
- | **PXE on LANx (brx)**: | + | **PXE on LANx (brx)**: |
+ | |||
+ | PXE was designed for diskless clients. A PXE client can obtain an IP address via DHCP, then download boot code via a TFTP source. Syslinux is an example of this. | ||
===== DHCP/ | ===== DHCP/ | ||
- | * Do not use results from Cloudflare' | + | Do not use results from Cloudflare' |
- | | + | * DNSSEC provides authentication. |
- | | + | * DNSCrypt provides encryption. |
- | * DNSCrypt provides encryption. | + | |