webinar register page

Banner with the words ISC Webinar and a photo of a person typing on a laptop
Using the Kea DHCP Server - series
This series of six 1-hour webinars will enable a LINUX or UNIX system administrator to successfully deploy the open source Kea DHCP server. We will begin with a review of DHC protocol basics. Attendees will learn how to install, configure and monitor a DHCP server to assign dynamic and static IP addresses and IPv6 prefixes and configure appropriate client options, such as the default gateway and dns server.

Register once for the entire series: all sessions will be recorded and the recordings posted within a few days, so you can easily review any sessions you miss. Each session will be approximately one hour, including Q&A as time permits.

September 16: Session 1. DHCP fundamentals, DHCPv4 vs DHCPv6 differences
September 30: Session 2. Kea installation and configuration
October 14: Session 3. Kea lease allocation, client classification, and option assignment
October 28: Session 4. High Availability and DB Backends

< Note that here we skip a week. There is also a Daylight Savings Time disconnect between US and Europe. Please check your invite from Zoom for the correct time in your timezone.>

November 18: Session 5. Monitoring, Logging and Stork
December 2: Session 6. Migrating to Kea from ISC DHCP

ISC is the developer and maintainer of the ISC DHCP and Kea DHCP software systems. This work is supported by the sale of hook libraries that extend the management capabilities of Kea, and by software support contracts. No purchase is required to attend these training sessions or to download and use the open source.
Sep 30, 2020 10:00 AM
Oct 14, 2020 10:00 AM
Oct 28, 2020 10:00 AM
Nov 18, 2020 10:00 AM
Dec 2, 2020 10:00 AM
Time shows in
Webinar logo
* Required information


Carsten Strotmann
Carsten Strotmann has 20 years of professional experience working in open source networking. He has delivered many webinars and training classes on open source solutions and DNS/DHCP/IPv6/Linux/Unix security. He also is the author of various articles on IT security topics in computer magazines.