On 2016-09-28, Peer Janssen <p...@pjk.de> wrote:
> # tftpd -d /tftpboot
>
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: Operation timed out
> tftpd: 192.168.0.81: read request for 'pxeboot'
> tftpd: 192.168.0.81: Operation timed out

Check your firewall rules. The packets where the file is actually
transferred come from a high numbered source port:

Request $high_port_A -> port 69
First file packet $high_port_B -> $high_port_A
Ack $high_port_A -> $high_port_B
Second file packet $high_port_B -> $high_port_A
etc.

I suspect you might not be allowing the return packets. Adding "log"
to any "block" rules that you have and watch "tcpdump -neipflog0"
probably gives you some clues.

Reply via email to