A DHCP / DNS / PXE / iPXE server driven by MCP 2.0 server metadata (from Dimension Data CloudControl)
Config is the same across clients — only the file and path differ.
{
"mcpServers": {
"mcp2-dhcp-server": {
"command": "<see-readme>",
"args": []
}
}
}Are you the author?
Add this badge to your README to show your security score and help users find safe servers.
A DHCP / DNS / PXE / iPXE server driven by MCP 2.0 server metadata (from Dimension Data CloudControl)
No automated test available for this server. Check the GitHub README for setup instructions.
Five weighted categories — click any category to see the underlying evidence.
No known CVEs.
No package registry to scan.
This server is missing a description. Tools and install config are also missing.If you've used it, help the community.
Add informationBe the first to review
Have you used this server?
Share your experience — it helps other developers decide.
Sign in to write a review.
Others in cloud / devops
MCP server for using the GitLab API
MCP Server for GCP environment for interacting with various Observability APIs.
Yunxiao MCP Server provides AI assistants with the ability to interact with the Yunxiao platform. It provides a set of tools that interact with Yunxiao's API, allowing AI assistants to manage Codeup repository, Project, Pipeline, Packages etc.
Enhanced MCP server for GitLab: group projects listing and activity tracking
MCP Security Weekly
Get CVE alerts and security updates for Mcp2 Dhcp Server and similar servers.
Start a conversation
Ask a question, share a tip, or report an issue.
Sign in to join the discussion.
A DHCP / DNS / PXE / iPXE server driven server driven by MCP 2.0 server metadata (from Dimension Data CloudControl).
The primary purpose of this service is to enable you (via PXE / iPXE) to boot operating systems that require the use of cloud-init (e.g. RancherOS, CoreOS / Container Linux). It can also be configured to provide only simple DHCP / DNS facilities if PXE / iPXE is not required.
Create mcp2-dhcp-server.yml:
mcp:
user: "my_mcp_user"
password: "my_mpc_password"
region: "AU"
network:
# Specify the interface to listen on (for now, only a single interface is supported).
interface: eth0
vlan_id: "42837f37-a0fd-4544-a800-416a1d33f672"
service_ip: 192.168.70.12
The service can also answer DNS queries for a pseudo-zone whose records come from server metadata in CloudControl. It can answer queries for the following record types:
A (name -> IPv4 address)AAAA (name -> IPv6 address)PTR (IPv4 / IPv6 address -> name)All other query types (and PTR queries that cannot be answered locally) will be forwarded to the fallback server.
If you want to enable DNS, add the following to mcp2-dhcp-server.yml:
dns:
enable: true
# The port to listen on.
port: 53
# The suffix for the pseudo-zone containing MCP servers
# For example, if your server is named "server1", then this can be resolved as "server1.my-environment.mcp".
#
# Any suffix will do, but preferably one that's not a real domain name.
domain_name: my-environment.mcp
# The time-to-live (TTL), in seconds, for records in the the pseudo-zone containing MCP servers.
default_ttl: 60
# This is the fallback DNS server; any queries that cannot be answered locally will be forwarded to
forwarding:
to_address: 8.8.8.8
to_port: 53
The values above (apart from enable) are the default values and can be omitted unless they differ.
Note that (for now) the service will only listen for DNS queries on the first IP address assigned to the network interface defined above in the network section.
If you're using iPXE, add the following to mcp2-dhcp-server.yml:
ipxe:
enable: true
port: 4777 # The TCP port used by the IPXE server (e.g. coreos-ixpe-server). Usually matches boot_script below.
boot_image: "undionly.kpxe"
boot_script: "http://192.168.220.10:4777/?profile=development"
boot_image is the name of the initial iPXE boot image file (relative to /var/lib/tftpboot) sent to regular PXE clients.mcp2-dhcp-server is running).iPXE.boot_script is the URL of the iPXE script (HTTP or TFTP) sent to iPXE clients.If you're trying to boot CoreOS, consider using coreos-ipxe-server.
You can customise PXE / iPXE behaviour in CloudControl by giving a server one or more of the following tags:
pxe_boot_image (optional) - if specified, overrides the name of the initial PXE boot image to use (relative to /var/lib/tftpboot on the TFTP server).ipxe_profile (optional) - if specified, overrides the name of the iPXE profile to use (equivalent to specifying ipxe_boot_script = http://{network.service_ip}:{ipxe.port}:4777/?profile={ipxe_profile}).ipxe_boot_script (optional) - if specified, overrides the URL of the iPXE boot script to use (also overrides ipxe_profile).See here for instructions.