EliteBook 8460p "factorycontrolcommand set: 5 "Pxe boot enabled, wwan override mode""

A message appears on screen during post "factorycontrolcommand set: 5 "Pxe boot enabled, wwan override mode"".
What does it mean, how can I fix it, please help! I disabled pxe boot option in bios, but it doesn't help!
This question was solved.
View Solution.

Bios update solved the problem. Thanks to hp instant support!!!!

Similar Messages

  • Set PXE boot image

    I'm having a problem similar to what's described at https://social.technet.microsoft.com/Forums/en-US/1398dc34-1672-4336-92fc-5cb72de031d5/locking-selected-pxe-boot-image?forum=configmanagerosd
    We are running SCCM 2012 R2 (upgraded from SP1) We have a 64 bit and and a 32 bit boot image. The 64 bit has "Deploy this boot image from the PXE-enabled distribution point" unchecked. The 32 bit image is checked. Clients are still trying to boot
    64 bit. We had using the 32 bit image for months (before and after R2 upgrade) I was making changes to the 64 bit image and suddenly it decided it was the PXE boot image. How can I get SCCM to go back the the 32bit boot.wim?
    Here's what I've tried:
    1) Right click 32 bit boot wim and update distribution points
    2) Deploy a new TS that is set to use the 32 bit boot.wim.
    3) Reboot the SCCM server (we have a single server, single distribution point)
    What else can we do to get back to a working state with PXE boot?

    In addition to the other comments, 1 and 3 are effectively meaningless in this context.
    #2 will work per Jorgen's and Doug's comments -- this comes down to the fact that if there is any ambiguity as to which boot image should be used (usually because the system has multiple possible task sequences targeted to it that have different boot images),
    then the boot image associated with the task sequence having a deployment with the highest ID is used; i.e., the boot image for the most recently deployed TS (as Doug stated also).
    Because you've already seemingly addressed this, it sounds like you may have simply switched the boot image associated with the TS on accident and you should verify this first.
    Jason | http://blog.configmgrftw.com | @jasonsandys

  • Windows server 2012 R2 PXE boot is unworkable slow, I have this exact same set-up working in 2008 R2 What can I do?

    Hi there
    I'm trying to deploy a windows 7 image through Windows deployment services via PXE boot from a 2012 R2 server.
    Issue:    PXE boot is extremely slow, it takes up to more than 60 minutes for the device to download download the PXE boot
    Things I already tried to get this up and running:
    I've tried to change the TFTP block size via command prompt and via regedit
    I've changed the settings on the tab of the WDS role (go to WDS role -> properties on server -> Tab "tftp")
    Both actions resulted in PXE boot being even slower than it already was.
    To make sure this is not because of our environment I’ve set up the same configuration on a windows server 2008 R2, here PXE boot image is downloaded to the machine within 3 minutes.
    Both servers are set up through Hyper-V this is the configuration:
    2008 R2:
    Memory: 4096 MB
    1 Virtual processor
    IDE controller 2 hard drives
    Network adapter
    2012 R2:
    Memory: 4096 MB
    32 virtual processors
    SCSI controller 2 hard drives
    Network adapter
    I can’t imagine that PXE boot is not working because of the differences of the Hard drives controllers or because of the amount of the virtual processors.
    Windows server 2012 R2 seems to handle PXE boot TFTP differently in comparison to 2008 R2.
    Do you guys know what I can do/try to get this working?

    Hi Jacques Rodrigues,
    You can run Windows Deployment Services on Hyper-V virtual machines,
    that the performance will often be degraded, particularly during the Trivial File Transfer Protocol (TFTP) download phase. This phase is very resource-intensive and may
    fail if insufficient resources are available on your server running Hyper-V.
    If you are using multicast, Check if IGMP Snooping is enabled i.e. Routers that support multicasting. In particular, Internet Group Membership Protocol (IGMP) snooping should
    be enabled on all devices. This will cause your network hardware to forward multicast packets only to those devices that are requesting data. If IGMP snooping is turned off, multicast packets are treated as broadcast packets, and will be sent to every device
    in the subnet.
    The related KB:
    Windows Deployment Services Overview
    http://technet.microsoft.com/en-us/library/hh831764.aspx
    I’m glad to be of help to you!
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Elitebook 8460p only boots from two specific USB sticks

    My Elitebook 8460p boots perfectly normally from HDD but will ONLY boot from two specific USB sticks - 1. A Windows Recovery USB and 2. A Parted Magic USB stick which is a commercial partition recovery/imaging utility - it will NOT boot from ANY OTHER USB stick at all.It'll boot from a CD/DVD. What I would like to know is why it won't boot from any other bootable USB stick at all other than those two?

    That is because the other usb sticks you have tried have not been made properly bootable. Check the partition type on the sticks that work. Do they have a uefi partition or are they just MBR partitions that are active? Use Windows own disk management snapin to investigate the usb sticks.

  • Elitebook 8460p

    Hi all,
    I have a damaged screen on my Elitebook 8460p and I have it connected to an external display. The display works fine when windows loads but I am unable to get into the bios as it does not show anything until the Windows loading screen.
    Is there a setting I am missing?
    Thanks
    Arthur

    Dear Customer,
    Welcome to the HP Consumer Support Forum!!
    Please boot the unit to BIOS. To boot to BIOS, restart the unit and keep tapping F10. Once you are in BIOS, go to system configuration > Built in Device options > Enable Integrated Camera  by check mark in the box > save the changes and exit.
    Now go to device manager and check if the webcam is listed under Imaging devices.
    If the webcam is listed in device manager, please try and install the following driver:
    HP Webcam Software (International):
    http://h20564.www2.hp.com/hpsc/swd/public/detail?sp4ts.oid=5056901&swItemId=ob_97559_1&swEnvOid=4059
    Hope this helps, for any further queries reply to the post and feel free to join us again.
    **Click the KUDOS star on left to say Thanks**
    Make it easier for other people to find solutions by marking a Reply 'Accept as Solution' if it solves your problem.
    Thank You,
    GR1
    Although I am an HP employee, I am speaking for myself and not for HP

  • Can't PXE boot a Surface Pro 3 after already successfully imaging it

    hey guys. To try to eliminate a lot of the initial question that come up with this issue, I figure I will start with established info.  Our SCCM environment is healthy, and all images, drivers and apps are distributed to all of our DP's. We can image
    PC's and laptops with no issue at all. We use network PXE booting.  Using a 64 bit boot image. Needed drivers are injected into the boot image. Firmware on the Surface was updated.  Using the Surface NIC dongle. THis dongle was only used to image
    this Surface Pro 3 tablet one time. There is no record of the MAC of the dongle in SCCM since I deleted the Surface out, to make it an unknown again.
    So, with a lot of trial and error, I was finally able to get this tab to PXE boot, and then successfully image. Was testing out the new windows 8.1 image I had built.
    Since it ewas successful I wanted to add all of our apps to the TS and test them out in imaging. Well, I can no longer get this thing to PXE boot. It shows trying to Start PXE over IPv4, then just skips to IPv6, then boots up into windows.
    I have delted the secure keys form ther BIOS, then reloaded them.  I have tried hte full shut down method (Holding Volume Up and Power for 15 seconds, then waiting for 10 seconds or longer, then trying to PXE boot. I am getting a valid connection fro
    mthe dongle.
    Nothinhg I try works. Its tries to PXE boot over IPv4, but never gets there.  But I can PXE boot any of our PC's or Laptops,m so its just an issue with this damn Surface Pro 3.
    ANy advice?

    So I finally got our server guy to enable the logging and get that smspxe.log file to be accessible. So here is the info from the log, when I attempt to PXE boot the Surface. I see the last 2 lines where it ignores the request, I just don't know why its
    ignoring it.
    PXE::CNotifyTimer::TimerSignalFunc SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    PXE::CNotifyTimer::ProcessTimer SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    Potentially missed device 50:1A:C5:FE:D6:E9 SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    Cleared Old Devices: 1 / 1 SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    PXE::CBootImageManager::PerformMaintenenceTasks SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    PXE::CBootImageManager::PurgeOldImages SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    Purging old images: 0 SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    PXE::CNotifyTimer::Init SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    PXE::CNotifyTimer::CancelTimer SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    PXE::CNotifyTimer::RegisterTimeout SMSPXE 4/14/2015 3:04:18 PM 8896 (0x22C0)
    [172.028.000.223:67] Recv From:[172.028.011.002:67] Len:347 1ad0230 SMSPXE 4/14/2015 3:04:37 PM 5928 (0x1728)
    ============> Received from client: SMSPXE 4/14/2015 3:04:37 PM 5928 (0x1728)
    DHCP message:
     Operation: BootRequest (1)
     Hardware Address type: 1
     Hardware Address Length: 6
     Hop Count: 1
     Transaction ID: 24038353
     Seconds Since Boot: 0
     Client IP Address: 000.000.000.000
     Your IP Address: 000.000.000.000
     Server IP Address: 000.000.000.000
     Relay Agent IP Address: 172.028.011.002
     Hardware Address: 50:1a:c5:fe:d6:e9:
     Magic Cookie: 63538263
     Options:
        Type = 53 DHCP Message Type: 1=DHCPDiscover
        Type = 57 Max DHCP Message Size: 05b8
        Type = 55 Paramerter Request List: 0102030405060c0d0f111216171c28292a2b3233363a3b3c4243618081828384858687
        Type = 97 UUID: 0068745ee6b94c0e21b76054522b6a7e02
        Type = 94 UNDI: 010310
        Type = 93 Client system Arch: 0007
        Type = 60 ClassIdentifier: PXEClient:Arch:00007:UNDI:003016 SMSPXE 4/14/2015 3:04:37 PM 5928 (0x1728)
    <============ SMSPXE 4/14/2015 3:04:37 PM 5928 (0x1728)
    ProcessMessage: Context:0241DF40  dTime:0 SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    50:1A:C5:FE:D6:E9, E65E7468-4CB9-210E-B760-54522B6A7E02: DHCP Discover received. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    [172.028.000.223:67] Recv From:[172.028.011.003:67] Len:347 159d1f0 SMSPXE 4/14/2015 3:04:37 PM 5928 (0x1728)
    ============> Received from client: SMSPXE 4/14/2015 3:04:37 PM 5928 (0x1728)
    DHCP message:
     Operation: BootRequest (1)
     Hardware Address type: 1
     Hardware Address Length: 6
     Hop Count: 1
     Transaction ID: 24038353
     Seconds Since Boot: 0
     Client IP Address: 000.000.000.000
     Your IP Address: 000.000.000.000
     Server IP Address: 000.000.000.000
     Relay Agent IP Address: 172.028.011.003
     Hardware Address: 50:1a:c5:fe:d6:e9:
     Magic Cookie: 63538263
     Options:
        Type = 53 DHCP Message Type: 1=DHCPDiscover
        Type = 57 Max DHCP Message Size: 05b8
        Type = 55 Paramerter Request List: 0102030405060c0d0f111216171c28292a2b3233363a3b3c4243618081828384858687
        Type = 97 UUID: 0068745ee6b94c0e21b76054522b6a7e02
        Type = 94 UNDI: 010310
        Type = 93 Client system Arch: 0007
        Type = 60 ClassIdentifier: PXEClient:Arch:00007:UNDI:003016 SMSPXE 4/14/2015 3:04:37 PM 5928 (0x1728)
    <============ SMSPXE 4/14/2015 3:04:37 PM 5928 (0x1728)
    ProcessMessage: Context:0241DE50  dTime:0 SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    50:1A:C5:FE:D6:E9, E65E7468-4CB9-210E-B760-54522B6A7E02: DHCP Discover received. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Initialized CStringStream object with string: c7c22c7d-4f40-49f1-b7ed-871c18a07b05;2015-04-14T19:04:37Z. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Initialized CStringStream object with string: c7c22c7d-4f40-49f1-b7ed-871c18a07b05;2015-04-14T19:04:37Z. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Set enterpirse certificate in transport SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Set enterpirse certificate in transport SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Set media certificate in transport SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Set authenticator in transport SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    CLibSMSMessageWinHttpTransport::Send: URL: JAG-SCCM-01E.jonesapparel.com:443  GET /SMS_MP_AltAuth/.sms_aut?MPKEYINFORMATIONEX SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    In SSL, but with no client cert SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Set media certificate in transport SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Set authenticator in transport SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    CLibSMSMessageWinHttpTransport::Send: URL: JAG-SCCM-01E.jonesapparel.com:443  GET /SMS_MP_AltAuth/.sms_aut?MPKEYINFORMATIONEX SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    In SSL, but with no client cert SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Request was successful. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Request was successful. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Set authenticator in transport SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Set authenticator in transport SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Setting message signatures. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Setting the authenticator. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    CLibSMSMessageWinHttpTransport::Send: URL: JAG-SCCM-01E.jonesapparel.com:443  CCM_POST /ccm_system_AltAuth/request SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    In SSL, but with no client cert SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Setting message signatures. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Setting the authenticator. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    CLibSMSMessageWinHttpTransport::Send: URL: JAG-SCCM-01E.jonesapparel.com:443  CCM_POST /ccm_system_AltAuth/request SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    In SSL, but with no client cert SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Request was successful. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    ::DecompressBuffer(65536) SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Decompression (zlib) succeeded: original size 148, uncompressed size 298. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Client lookup reply: <ClientIDReply><Identification Unknown="0" ItemKey="0" ServerName=""><Machine><ClientID/><NetbiosName/></Machine></Identification></ClientIDReply>
     SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    MP_LookupDevice succeeded: 0 1 0 1 0 SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    50:1A:C5:FE:D6:E9, E65E7468-4CB9-210E-B760-54522B6A7E02: device is not in the database. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Getting boot action for unknown machine: item key: 2046820352 SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Request was successful. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    ::DecompressBuffer(65536) SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Decompression (zlib) succeeded: original size 148, uncompressed size 298. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Client lookup reply: <ClientIDReply><Identification Unknown="0" ItemKey="0" ServerName=""><Machine><ClientID/><NetbiosName/></Machine></Identification></ClientIDReply>
     SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    MP_LookupDevice succeeded: 0 1 0 1 0 SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    50:1A:C5:FE:D6:E9, E65E7468-4CB9-210E-B760-54522B6A7E02: device is not in the database. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Getting boot action for unknown machine: item key: 2046820352 SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Initialized CStringStream object with string: c7c22c7d-4f40-49f1-b7ed-871c18a07b05;2015-04-14T19:04:37Z. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Set enterpirse certificate in transport SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Initialized CStringStream object with string: c7c22c7d-4f40-49f1-b7ed-871c18a07b05;2015-04-14T19:04:37Z. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Set enterpirse certificate in transport SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Set media certificate in transport SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Set authenticator in transport SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    CLibSMSMessageWinHttpTransport::Send: URL: JAG-SCCM-01E.jonesapparel.com:443  GET /SMS_MP_AltAuth/.sms_aut?MPKEYINFORMATIONEX SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    In SSL, but with no client cert SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Set media certificate in transport SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Set authenticator in transport SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    CLibSMSMessageWinHttpTransport::Send: URL: JAG-SCCM-01E.jonesapparel.com:443  GET /SMS_MP_AltAuth/.sms_aut?MPKEYINFORMATIONEX SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    In SSL, but with no client cert SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Request was successful. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Request was successful. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Set authenticator in transport SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Set authenticator in transport SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Setting message signatures. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Setting the authenticator. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    CLibSMSMessageWinHttpTransport::Send: URL: JAG-SCCM-01E.jonesapparel.com:443  CCM_POST /ccm_system_AltAuth/request SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    In SSL, but with no client cert SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Setting message signatures. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Setting the authenticator. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    CLibSMSMessageWinHttpTransport::Send: URL: JAG-SCCM-01E.jonesapparel.com:443  CCM_POST /ccm_system_AltAuth/request SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    In SSL, but with no client cert SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Request was successful. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    ::DecompressBuffer(65536) SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Decompression (zlib) succeeded: original size 409, uncompressed size 950. SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Client boot action reply: <ClientIDReply><Identification Unknown="0" ItemKey="2046820352" ServerName=""><Machine><ClientID>c70485df-9130-4b41-b61b-6c9e11b2f69a</ClientID><NetbiosName/></Machine></Identification><PXEBootAction
    LastPXEAdvertisementID="" LastPXEAdvertisementTime="" OfferID="10020125" OfferIDTime="4/2/2015 11:12:00 AM" PkgID="100000D0" PackageVersion="" PackagePath BootImageID="10000087" Mandatory="0"/></ClientIDReply>
     SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Client Identity: c70485df-9130-4b41-b61b-6c9e11b2f69a SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    50:1A:C5:FE:D6:E9, E65E7468-4CB9-210E-B760-54522B6A7E02: SMSID=c70485df-9130-4b41-b61b-6c9e11b2f69a OfferID=10020125, PackageID=100000D0, PackageVersion=, BootImageID=10000087, PackagePath=http://JAG-SCCM-01E.jonesapparel.com/SMS_DP_SMSPKG$/10000087, Mandatory=0 SMSPXE 4/14/2015
    3:04:37 PM 7484 (0x1D3C)
    50:1A:C5:FE:D6:E9, E65E7468-4CB9-210E-B760-54522B6A7E02: found optional advertisement 10020125 SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    ============> Reply to client (DHCPDISCOVER): SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    DHCP message:
     Operation: BootReply (2)
     Hardware Address type: 1
     Hardware Address Length: 6
     Hop Count: 0
     Transaction ID: 24038353
     Seconds Since Boot: 0
     Client IP Address: 000.000.000.000
     Your IP Address: 000.000.000.000
     Server IP Address: 172.028.000.223
     Relay Agent IP Address: 172.028.011.002
     Hardware Address: 50:1a:c5:fe:d6:e9:
     Magic Cookie: 63538263
     Options:
        Type = 53 DHCP Message Type: 2=DHCPOffer
        Type = 54 Server idenitifier: 172.028.000.223
        Type = 97 UUID: 0068745ee6b94c0e21b76054522b6a7e02
        Type = 60 ClassIdentifier: PXEClient SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    <============ SMSPXE 4/14/2015 3:04:37 PM 7484 (0x1D3C)
    Request was successful. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    ::DecompressBuffer(65536) SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Decompression (zlib) succeeded: original size 409, uncompressed size 950. SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Client boot action reply: <ClientIDReply><Identification Unknown="0" ItemKey="2046820352" ServerName=""><Machine><ClientID>c70485df-9130-4b41-b61b-6c9e11b2f69a</ClientID><NetbiosName/></Machine></Identification><PXEBootAction
    LastPXEAdvertisementID="" LastPXEAdvertisementTime="" OfferID="10020125" OfferIDTime="4/2/2015 11:12:00 AM" PkgID="100000D0" PackageVersion="" PackagePath="xx
    BootImageID="10000087" Mandatory="0"/></ClientIDReply>
     SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    Client Identity: c70485df-9130-4b41-b61b-6c9e11b2f69a SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    50:1A:C5:FE:D6:E9, E65E7468-4CB9-210E-B760-54522B6A7E02: SMSID=c70485df-9130-4b41-b61b-6c9e11b2f69a OfferID=10020125, PackageID=100000D0, PackageVersion=, BootImageID=10000087, PackagePath=http://JAG-SCCM-01E.jonesapparel.com/SMS_DP_SMSPKG$/10000087, Mandatory=0 SMSPXE 4/14/2015
    3:04:37 PM 7480 (0x1D38)
    50:1A:C5:FE:D6:E9, E65E7468-4CB9-210E-B760-54522B6A7E02: found optional advertisement 10020125 SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    ============> Reply to client (DHCPDISCOVER): SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    DHCP message:
     Operation: BootReply (2)
     Hardware Address type: 1
     Hardware Address Length: 6
     Hop Count: 0
     Transaction ID: 24038353
     Seconds Since Boot: 0
     Client IP Address: 000.000.000.000
     Your IP Address: 000.000.000.000
     Server IP Address: 172.028.000.223
     Relay Agent IP Address: 172.028.011.003
     Hardware Address: 50:1a:c5:fe:d6:e9:
     Magic Cookie: 63538263
     Options:
        Type = 53 DHCP Message Type: 2=DHCPOffer
        Type = 54 Server idenitifier: 172.028.000.223
        Type = 97 UUID: 0068745ee6b94c0e21b76054522b6a7e02
        Type = 60 ClassIdentifier: PXEClient SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    <============ SMSPXE 4/14/2015 3:04:37 PM 7480 (0x1D38)
    [172.028.000.223:67] Recv From:[172.028.011.003:67] Len:359 1acbeb0 SMSPXE 4/14/2015 3:04:40 PM 5928 (0x1728)
    [172.028.000.223:67] Recv From:[172.028.011.002:67] Len:359 15a41f0 SMSPXE 4/14/2015 3:04:40 PM 5972 (0x1754)
    ============> Received from client: SMSPXE 4/14/2015 3:04:40 PM 5928 (0x1728)
    ============> Received from client: SMSPXE 4/14/2015 3:04:40 PM 5972 (0x1754)
    DHCP message:
     Operation: BootRequest (1)
     Hardware Address type: 1
     Hardware Address Length: 6
     Hop Count: 1
     Transaction ID: 24038353
     Seconds Since Boot: 0
     Client IP Address: 000.000.000.000
     Your IP Address: 000.000.000.000
     Server IP Address: 000.000.000.000
     Relay Agent IP Address: 172.028.011.003
     Hardware Address: 50:1a:c5:fe:d6:e9:
     Magic Cookie: 63538263
     Options:
        Type = 53 DHCP Message Type: 3=DHCPRequest
        Type = 54 Server idenitifier: 172.028.000.015
        Type = 50 Requested IP: 172.028.011.052
        Type = 57 Max DHCP Message Size: ff00
        Type = 55 Paramerter Request List: 0102030405060c0d0f111216171c28292a2b3233363a3b3c4243618081828384858687
        Type = 97 UUID: 0068745ee6b94c0e21b76054522b6a7e02
        Type = 94 UNDI: 010310
        Type = 93 Client system Arch: 0007
        Type = 60 ClassIdentifier: PXEClient:Arch:00007:UNDI:003016 SMSPXE 4/14/2015 3:04:40 PM 5928 (0x1728)
    DHCP message:
     Operation: BootRequest (1)
     Hardware Address type: 1
     Hardware Address Length: 6
     Hop Count: 1
     Transaction ID: 24038353
     Seconds Since Boot: 0
     Client IP Address: 000.000.000.000
     Your IP Address: 000.000.000.000
     Server IP Address: 000.000.000.000
     Relay Agent IP Address: 172.028.011.002
     Hardware Address: 50:1a:c5:fe:d6:e9:
     Magic Cookie: 63538263
     Options:
        Type = 53 DHCP Message Type: 3=DHCPRequest
        Type = 54 Server idenitifier: 172.028.000.015
        Type = 50 Requested IP: 172.028.011.052
        Type = 57 Max DHCP Message Size: ff00
        Type = 55 Paramerter Request List: 0102030405060c0d0f111216171c28292a2b3233363a3b3c4243618081828384858687
        Type = 97 UUID: 0068745ee6b94c0e21b76054522b6a7e02
        Type = 94 UNDI: 010310
        Type = 93 Client system Arch: 0007
        Type = 60 ClassIdentifier: PXEClient:Arch:00007:UNDI:003016 SMSPXE 4/14/2015 3:04:40 PM 5972 (0x1754)
    <============ SMSPXE 4/14/2015 3:04:40 PM 5928 (0x1728)
    <============ SMSPXE 4/14/2015 3:04:40 PM 5972 (0x1754)
    Ignoring req from [172.028.011.003:67] Dest Server:[172.028.000.015] SMSPXE 4/14/2015 3:04:40 PM 5928 (0x1728)
    Ignoring req from [172.028.011.002:67] Dest Server:[172.028.000.015] SMSPXE 4/14/2015 3:04:40 PM 5972 (0x1754)

  • Machines cannot PXE boot using SCCM 2012 DP

    There are a lot of posts about PXE boot, but I can't find the common thread to tie them all together.  My test machines cannot PXE boot.
    My lab environment is very simple:
    10.10.0.0/24 subnet
    10.10.0.10 = W2k8 R2 DC, DHCP, DNS
    10.10.0.11 = SCCM2012 (on W2k8R2 with SQL Server 2008 SP3 and CU4)
    All machines are Hyper-V virtual machines connecting through the same virtual network.
    Setup the PXE service from DP properties.  I let SCCM install WDS.  WDS in Server Manager does not have a server node, but the WDS service is running.  DP PXE tab is configured as follows:
    "Enable PXE support for clients" is checked
    "Allow this distribution point to resond to incoming PXE requests" is checked
    "Enable unknown computer support" is checked
    "Require a password when computers use PXE" is not checked
    "User device affinity" is set to "Allow user device affinity with automatic approval"
    PXE is configured to respond on all network interfaces
    The PXE server response delay is 0 seconds
    The DHCP server has options configured as follows:
    Option 66: 10.10.0.11
    Option 67: smsboot\x86\wdsnbp.com
    Both DP and MP on SCCM server are configured for HTTP.
    Both x86 and x64 boot images have been distributed to DP.  The media was updated after PXE was enabled on the DP.
    Both x86 and x64 boot images have "Deploy this image from the PXE service point" enabled on the Data Source tab of their properties.
    I have tried both unknown computer task sequence and a computer import task sequence (old computer association).  They all end in abortpxe.com
    Complete PXE response is as follows:
    =================================================================
    PXE Network Boot 03.23.2009
    (C) Copyright 2009 Microsoft Corporation, All Rights Reserved
    CLIENT MAC ADDR: 00 DD CC BB AA 00  GUID: 532D27E3-A184-4D27-A822-30A8B6F4A39D
    CLIENT IP: 10.10.0.106    MASK: 255.255.255.0    DHCP IP: 10.10.0.10
    GATEWAY IP: 10.10.0.5
    Download WDSNBP...
    Architecture: x64
    WDSNBP started using DHCP Referral.
    Contacting Server: 10.10.0.11 (Gateway: 0.0.0.0)
    The detalis below show the information relating to the PXE boot request for
    this computer.  Please provide these details to your Windows Deployment Services
    Administrator so that this request can be approved.
    Pending Request ID: 6
    Contacting Server: 10.10.0.11
    TFTP Download: smsboot\x64\abortpxe.com
    PXE Boot aborted.  Booting to next device
    =========================================================== 
    From the smspxe.log:
    ]LOG]!><time="16:31:39.445+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:6402">
    <![LOG[Client Identity: {C9929C4D-735A-4973-8659-4D3D5D5E4F92}]LOG]!><time="16:31:39.445+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:6428">
    <![LOG[Set enterpirse certificate in transport]LOG]!><time="16:31:39.480+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:9207">
    <![LOG[Set media certificate in transport]LOG]!><time="16:31:39.505+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:9220">
    <![LOG[Set authenticator in transport]LOG]!><time="16:31:39.505+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:7592">
    <![LOG[Set authenticator in transport]LOG]!><time="16:31:39.533+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:7592">
    <![LOG[PXE::CBootImageManager::FindMatchingArchitectureBootImage]LOG]!><time="16:31:39.553+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="bootimagemgr.cpp:1736">
    <![LOG[PXE::CBootImageManager::FindMatchingArchitectureBootImage]LOG]!><time="16:32:00.963+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="bootimagemgr.cpp:1736">
    <![LOG[Set enterpirse certificate in transport]LOG]!><time="16:32:01.008+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:9207">
    <![LOG[Set media certificate in transport]LOG]!><time="16:32:01.027+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:9220">
    <![LOG[Set authenticator in transport]LOG]!><time="16:32:01.027+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:7592">
    <![LOG[Set authenticator in transport]LOG]!><time="16:32:01.084+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:7592">
    <![LOG[Client boot action reply: <ClientIDReply><Identification Unknown="0" ItemKey="16777218" ServerName="" ServerRemoteName=""><Machine><ClientID/><NetbiosName/></Machine></Identification><PXEBootAction LastPXEAdvertisementID=""
    LastPXEAdvertisementTime="" OfferID="" OfferIDTime="" PkgID="" PackageVersion="" PackagePath="" BootImageID="" Mandatory=""/></ClientIDReply>
    ]LOG]!><time="16:32:01.108+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:6402">
    <![LOG[Client Identity: {C9929C4D-735A-4973-8659-4D3D5D5E4F92}]LOG]!><time="16:32:01.108+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:6428">
    <![LOG[Set enterpirse certificate in transport]LOG]!><time="16:32:01.151+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:9207">
    <![LOG[Set media certificate in transport]LOG]!><time="16:32:01.174+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:9220">
    <![LOG[Set authenticator in transport]LOG]!><time="16:32:01.174+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:7592">
    <![LOG[Set authenticator in transport]LOG]!><time="16:32:01.209+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:7592">
    <![LOG[PXE::CBootImageManager::FindMatchingArchitectureBootImage]LOG]!><time="16:32:05.230+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="bootimagemgr.cpp:1736">
    <![LOG[Set enterpirse certificate in transport]LOG]!><time="16:32:05.290+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:9207">
    <![LOG[Set media certificate in transport]LOG]!><time="16:32:05.325+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:9220">
    <![LOG[Set authenticator in transport]LOG]!><time="16:32:05.325+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:7592">
    <![LOG[Set authenticator in transport]LOG]!><time="16:32:05.366+240" date="05-06-2012" component="SMSPXE" context="" type="1" thread="3600" file="libsmsmessaging.cpp:7592">
    <![LOG[Client boot action reply: <ClientIDReply><Identification Unknown="0" ItemKey="16777218" ServerName="" ServerRemoteName=""><Machine><ClientID/><NetbiosName/></Machine></Identification><PXEBootAction LastPXEAdvertisementID=""
    LastPXEAdvertisementTime="" OfferID="" OfferIDTime="" PkgID="" PackageVersion="" PackagePath="" BootImageID="" Mandatory=""/></ClientIDReply>
    =============================================================================================
    I've been hammering this for about 10 hours now (or to be honest, it's been hammering me) and it must be something very simple I'm missing.  I have a feeling that I'm doing something I used to do in 2007 and whatever that is, it does not work in
    2012.
    If I connect using boot media, Task Sequences execute perfectly.
    TIA,
    Tom

    Option 66: 10.10.0.11
    Option 67: smsboot\x86\wdsnbp.com
    Pending Request ID: 6
    Contacting Server: 10.10.0.11
    TFTP Download: smsboot\x64\abortpxe.com
    PXE Boot aborted.  Booting to next device
    <![LOG[Client boot action reply: <ClientIDReply><Identification Unknown="0" ItemKey="16777218" ServerName="" ServerRemoteName=""><Machine><ClientID/><NetbiosName/></Machine></Identification><PXEBootAction
    LastPXEAdvertisementID="" LastPXEAdvertisementTime="" OfferID="" OfferIDTime="" PkgID="" PackageVersion="" PackagePath="" BootImageID="" Mandatory=""/></ClientIDReply>
    Those options are fine when using DHCP options. They must be configured right because ConfigMgr does send a reply to the client ("abortpxe"). It basically tells you that ConfigMgr knows the MAC address and/or SMBIOSGUID of the client, but cannot find
    a deployment for it.
    Just find ResourceID 16777218 in the console (you might have to add the ResourceID column) and double check if there's an deployment available (properties of the client with resourceID 16777218).
    Torsten Meringer | http://www.mssccmfaq.de
    Your answer really helped me. I was searching for 2 days trying to find a computer in Config Manager. Your suggestion to "Just
    find ResourceID 16777218 in the console (you might have to add the ResourceID column) and double check if there" was the trick to finding the computer in Config Manager. Thanks for all of your help
    Gregory Campbell System Administrator

  • SCCM 2012 pxe boot issue

    My test machines cannot PXE boot.
    My lab environment is very simple:
    10.10.0.0/24 subnet
    10.10.0.5 = Server2012, DHCP, DNS, SQL Server 2008 R2 Sp2
    10.10.0.7 = Server2012, SCCM2012
    All machines are Oracle VM Box virtual machines connecting through the same virtual network.
    Setup the PXE service from DP properties.  I let SCCM install WDS.  WDS in Server
    Manager does not have a server node, but the WDS service is running.  DP PXE tab is configured as follows:
    "Enable PXE support for clients" is checked
    "Allow this distribution point to respond to incoming PXE requests" is checked
    "Enable unknown computer support" is checked
    "Require a password when computers use PXE" is not checked
    "User device affinity" is set to "Allow user device affinity with automatic approval"
    PXE is configured to respond on all network interfaces
    The PXE server response delay is 0 seconds
    The DHCP server has options configured as follows:
    Option 66: 10.10.0.7
    Option 67: smsboot\x86\wdsnbp.com
    Both DP and MP on SCCM server are configured for HTTP.
    Both x86 and x64 boot images have been distributed to DP.  The media was updated after
    PXE was enabled on the DP.
    Both x86 and x64 boot images have "Deploy this image from the PXE service point" enabled on the Data Source tab of their properties
    SMSPXE.Log
    <![LOG[Client boot action reply: <ClientIDReply><Identification Unknown="0" ItemKey="16777219" ServerName=""><Machine><ClientID/><NetbiosName/></Machine></Identification><PXEBootAction
    LastPXEAdvertisementID="" LastPXEAdvertisementTime="" OfferID="" OfferIDTime="" PkgID="" PackageVersion="" PackagePath="" BootImageID="" Mandatory=""/></ClientIDReply>
    ]LOG]!><time="15:05:09.346-330" date="07-07-2014" component="SMSPXE" context="" type="1" thread="13592" file="libsmsmessaging.cpp:6544">
    <![LOG[08:00:27:61:59:79, BF2ACCDD-1455-E149-963C-9A845B9C111E: no advertisements found]LOG]!><time="15:05:09.346-330" date="07-07-2014" component="SMSPXE" context="" type="1" thread="13592"
    file="database.cpp:483">
    <![LOG[08:00:27:61:59:79, BF2ACCDD-1455-E149-963C-9A845B9C111E: No boot action. Aborted.]LOG]!><time="15:05:09.441-330" date="07-07-2014" component="SMSPXE" context="" type="1" thread="13592"
    file="database.cpp:483">
    <![LOG[08:00:27:61:59:79, BF2ACCDD-1455-E149-963C-9A845B9C111E: Not serviced.]LOG]!><time="15:05:09.441-330" date="07-07-2014" component="SMSPXE" context="" type="1" thread="13592" file="database.cpp:483">
    <![LOG[Client boot action reply: <ClientIDReply><Identification Unknown="0" ItemKey="16777219" ServerName=""><Machine><ClientID/><NetbiosName/></Machine></Identification><PXEBootAction
    LastPXEAdvertisementID="" LastPXEAdvertisementTime="" OfferID="" OfferIDTime="" PkgID="" PackageVersion="" PackagePath="" BootImageID="" Mandatory=""/></ClientIDReply>
    ]LOG]!><time="15:05:09.705-330" date="07-07-2014" component="SMSPXE" context="" type="1" thread="13592" file="libsmsmessaging.cpp:6544">
    <![LOG[08:00:27:61:59:79, BF2ACCDD-1455-E149-963C-9A845B9C111E: no advertisements found]LOG]!><time="15:05:09.705-330" date="07-07-2014" component="SMSPXE" context="" type="1" thread="13592"
    file="database.cpp:483">

    Resource ID is already present in the Unknown Computer (Windows 7) Properties please look into it and
    OSD Task Sequences is there :(.

  • Server 2008 configured for PXE boot with UIU and GhostCast

    Right now, I am in the process of switching over from UIU 4, to UIU 5, and the implementation is completely different.  We used GhostCast to push images out before, but the new UIU uses WIM files to pull the drivers off the server.  I had a few
    questions about reconfiguring the new server.
    Currently, we have a server 2003 machine running ghost cast.  It pulls its images off of a server 2008 machine.  The server 2008 machine can be accessed remotely.  So my first question is, can this be configured to allow remote connections
    with the new setup?
    The things I have been reading have said that you need to enable DNS, AD, and DHCP, however if we connect this to a WAN, will it conflict with that?  Or can we configure only one of the ethernet ports to see this?  Sorry kind of new to this.
    I guess my main concern is, can we set up a separate domain for GhostCasting, while still being connected to an external domain?

    Hi,
    I’m not sure what you really want to do. For PXE boot, I think DHCP is always required just like Microsoft deployment solution WDS and MDT.
    The two products are third products, so I don’t know the detail information about how they work. Based on my experience, they should be based on broadcast or multicast.
    If so it could be a bad idea if you install it on a server facing the internet.
    I think you can also ask in the third party forums that provide the products.
    Thanks for understanding.

  • Wds pxe boot - tftp download loop - 4 times F12

    Hi
    I just set up a new wds server 2012
    When trying to pxe boot a client, it loops like this:
    Downloaded WDSNBP from...
    WDSNBP started using DHCP referral.
    Contacting server...
    Architecture...
    Contacting server...
    TFTP download: boot\x86\wdsnbp.com
    Downloaded WDSNBP from ...
    Architecture...
    Contacting Server...
    TFTP download: boot\x86\wdsnbp.com
    Then it goes on 4 times in a row:
    "TFTP Download: Boot\x86\wdsnbp.com"
    With Option "Require the user to press the F12 key..." enabled,
    I have to press F12 4 times, which is 3 times too many.After the x-th download of wdsnbp.com the client continues the boot process
    normally and the rest works fine.
    Any help is greatly appreciated.
    Michael

    We are experiencing the same thing.
    This started after enabling scope option 67 to solve this error: PXE-E53: No Boot filename received.
    This only occurs on selected machines. We do employ IP Helpers and are thinking this could be an issue.

  • SCCM 2012R2 OSD PXE-boot-smstftp .var file download times out errorcode 0x00000001- at this point: "Preparing Network" and Reboots

     
    Hello All,
    Please I need help! I have not seen the above error without relationship to two of the  known causes for sometime during a Windows 7 osd in an SCCM 2012 R2 environment with a remote DP/PXE server. I understand this error: to occur when the boot images
    does not have "Network drivers in the past Winpe version ( i.e. 3.0, 4.0), not Winpe 5.0 which has all the Network and storage drivers for Windows 7" or when Port fast is not enabled on the switch port the pxe device is plugged into. These two causes
    stated here have been verified and confirmed not to be the cause in this case within the environment. The PXE boot device has ip-address (verified using ip-config, diskpart as well reveals the disk is online) and can ping the wds/pxe server and the sccm server.
    Port fast is enabled on the switch port the device is plugged into. I am stuck on this one; as I could not ascertain the cause on this occasion. 
    Please see details below and I welcome any help any body can offer, thanks in advance guys!
    Client – Winpe x64
    Server - Windows Server 2008 R2 configured as a PXE / WDS / SCCM DP
    Network - both devices on the same subnet
    Problem: Client performs PXE boot, downloads Winpe without problems.  Client then tries to download .var file.  This is not successful and TFTP timeout is received.  Error code in
    smsts.log states:
    <![LOG[Executing: X:\sms\bin\x64\smstftp.exe -i PXE-Server get \SMSTemp\2014.07.01.14.09.09.0001.{46173825-3EDA-4352-8947-3549830D77A7}.boot.var X:\sms\data\variables.dat]LOG]!><time="14:13:57.285+480"
    date="07-01-2014" component="TSPxe" context="" type="0" thread="376" file="tspxe.cpp:177">
    <![LOG[Command line for extension .exe is "%1" %*]LOG]!><time="14:13:57.332+480" date="07-01-2014" component="TSPxe" context="" type="0"
    thread="376" file="commandline.cpp:228">
    <![LOG[Set command line: "X:\sms\bin\x64\smstftp.exe" -i PXE-Server get \SMSTemp\2014.07.01.14.09.09.0001.{46173825-3EDA-4352-8947-3549830D77A7}.boot.var X:\sms\data\variables.dat]LOG]!><time="14:13:57.332+480"
    date="07-01-2014" component="TSPxe" context="" type="0" thread="376" file="commandline.cpp:731">
    <![LOG[Executing command line: "X:\sms\bin\x64\smstftp.exe" -i PXE-Server get \SMSTemp\2014.07.01.14.09.09.0001.{46173825-3EDA-4352-8947-3549830D77A7}.boot.var X:\sms\data\variables.dat]LOG]!><time="14:13:57.332+480"
    date="07-01-2014" component="TSPxe" context="" type="1" thread="376" file="commandline.cpp:827">
    <![LOG[Process completed with exit code 1]LOG]!><time="14:14:45.379+480" date="07-01-2014" component="TSPxe" context="" type="1" thread="376"
    file="commandline.cpp:1123">
    Network trace is detailed below:
    324994  11:47:35 04/07/2014        166.7634594                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:320, UDP:319, IPv4:72}
    325069  11:47:36 04/07/2014        167.7554047       svchost.exe        Client    Server  
    TFTP      TFTP: Read Request - File: \SMSTemp\2014.07.03.15.45.31.0001.{549002A3-C9C9-4189-8AFE-9F8B272BECC1}.boot.var, Transfer Mode: octet                
    {UDP:321, IPv4:72}
    325070  11:47:36 04/07/2014        167.7556504                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:320, UDP:319, IPv4:72}
    325071  11:47:36 04/07/2014        167.7598345                      
    Server   Client    TFTP      TFTP: Data - Block Number: 1                {UDP:322, IPv4:72}
    325072  11:47:36 04/07/2014        167.7607151                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 1          {UDP:322, IPv4:72}
    325073  11:47:36 04/07/2014        167.7608240                      
    Server   Client    TFTP      TFTP: Data - Block Number: 2                {UDP:322, IPv4:72}
    325074  11:47:36 04/07/2014        167.7615948                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 2          {UDP:322, IPv4:72}
    325075  11:47:36 04/07/2014        167.7616991                      
    Server   Client    TFTP      TFTP: Data - Block Number: 3                {UDP:322, IPv4:72}
    325076  11:47:36 04/07/2014        167.7624602                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 3          {UDP:322, IPv4:72}
    325077  11:47:36 04/07/2014        167.7625635                      
    Server   Client    TFTP      TFTP: Data - Block Number: 4                {UDP:322, IPv4:72}
    325078  11:47:36 04/07/2014        167.7629426                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 4          {UDP:322, IPv4:72}
    325079  11:47:36 04/07/2014        167.7630452                      
    Server   Client    TFTP      TFTP: Data - Block Number: 5                {UDP:322, IPv4:72}
    325080  11:47:36 04/07/2014        167.7637927                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 5          {UDP:322, IPv4:72}
    325081  11:47:36 04/07/2014        167.7638947                      
    Server   Client    TFTP      TFTP: Data - Block Number: 6                {UDP:322, IPv4:72}
    325082  11:47:36 04/07/2014        167.7643324                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 6          {UDP:322, IPv4:72}
    325083  11:47:36 04/07/2014        167.7644367                      
    Server   Client    TFTP      TFTP: Data - Block Number: 7                {UDP:322, IPv4:72}
    325084  11:47:36 04/07/2014        167.7652140                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 7          {UDP:322, IPv4:72}
    325085  11:47:36 04/07/2014        167.7653183                      
    Server   Client    TFTP      TFTP: Data - Block Number: 8                {UDP:322, IPv4:72}
    325086  11:47:36 04/07/2014        167.7660907                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 8          {UDP:322, IPv4:72}
    325087  11:47:36 04/07/2014        167.7661940                      
    Server   Client    TFTP      TFTP: Data - Block Number: 9                {UDP:322, IPv4:72}
    325088  11:47:36 04/07/2014        167.7669372                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 9          {UDP:322, IPv4:72}
    325089  11:47:36 04/07/2014        167.7670323                      
    Server   Client    TFTP      TFTP: Data - Block Number: 10                {UDP:322, IPv4:72}
    325090  11:47:36 04/07/2014        167.7674067                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 10        {UDP:322, IPv4:72}
    325091  11:47:36 04/07/2014        167.7674809                      
    Server   Client    TFTP      TFTP: Data - Block Number: 11                {UDP:322, IPv4:72}
    325092  11:47:36 04/07/2014        167.7681308                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 11        {UDP:322, IPv4:72}
    325093  11:47:36 04/07/2014        167.7682056                      
    Server   Client    TFTP      TFTP: Data - Block Number: 12                {UDP:322, IPv4:72}
    325094  11:47:36 04/07/2014        167.7685383                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 12        {UDP:322, IPv4:72}
    325095  11:47:36 04/07/2014        167.7686108                      
    Server   Client    TFTP      TFTP: Data - Block Number: 13                {UDP:322, IPv4:72}
    325096  11:47:36 04/07/2014        167.7692475                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 13        {UDP:322, IPv4:72}
    325097  11:47:36 04/07/2014        167.7693216                      
    Server   Client    TFTP      TFTP: Data - Block Number: 14                {UDP:322, IPv4:72}
    325098  11:47:36 04/07/2014        167.7696477                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 14        {UDP:322, IPv4:72}
    325099  11:47:36 04/07/2014        167.7697202                      
    Server   Client    TFTP      TFTP: Data - Block Number: 15                {UDP:322, IPv4:72}
    325100  11:47:36 04/07/2014        167.7703651                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 15        {UDP:322, IPv4:72}
    325101  11:47:36 04/07/2014        167.7704386                      
    Server   Client    TFTP      TFTP: Data - Block Number: 16                {UDP:322, IPv4:72}
    325102  11:47:36 04/07/2014        167.7707479                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 16        {UDP:322, IPv4:72}
    325103  11:47:36 04/07/2014        167.7708214                      
    Server   Client    TFTP      TFTP: Data - Block Number: 17                {UDP:322, IPv4:72}
    325104  11:47:36 04/07/2014        167.7714862                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 17        {UDP:322, IPv4:72}
    325105  11:47:36 04/07/2014        167.7715603                      
    Server   Client    TFTP      TFTP: Data - Block Number: 18                {UDP:322, IPv4:72}
    325106  11:47:36 04/07/2014        167.7718715                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 18        {UDP:322, IPv4:72}
    325107  11:47:36 04/07/2014        167.7719450                      
    Server   Client    TFTP      TFTP: Data - Block Number: 19                {UDP:322, IPv4:72}
    325108  11:47:36 04/07/2014        167.7726029                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 19        {UDP:322, IPv4:72}
    325109  11:47:36 04/07/2014        167.7726800                      
    Server   Client    TFTP      TFTP: Data - Block Number: 20                {UDP:322, IPv4:72}
    325110  11:47:36 04/07/2014        167.7733471                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 20        {UDP:322, IPv4:72}
    325111  11:47:36 04/07/2014        167.7734203                      
    Server   Client    TFTP      TFTP: Data - Block Number: 21                {UDP:322, IPv4:72}
    325112  11:47:36 04/07/2014        167.7737411                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 21        {UDP:322, IPv4:72}
    325113  11:47:36 04/07/2014        167.7738142                      
    Server   Client    TFTP      TFTP: Data - Block Number: 22                {UDP:322, IPv4:72}
    325114  11:47:36 04/07/2014        167.7744648                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 22        {UDP:322, IPv4:72}
    325115  11:47:36 04/07/2014        167.7745386                      
    Server   Client    TFTP      TFTP: Data - Block Number: 23                {UDP:322, IPv4:72}
    325116  11:47:36 04/07/2014        167.7748657                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 23        {UDP:322, IPv4:72}
    325117  11:47:36 04/07/2014        167.7749395                      
    Server   Client    TFTP      TFTP: Data - Block Number: 24                {UDP:322, IPv4:72}
    325118  11:47:36 04/07/2014        167.7755914                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 24        {UDP:322, IPv4:72}
    325119  11:47:36 04/07/2014        167.7756649                      
    Server   Client    TFTP      TFTP: Data - Block Number: 25                {UDP:322, IPv4:72}
    325120  11:47:36 04/07/2014        167.7760109                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 25        {UDP:322, IPv4:72}
    325277  11:47:37 04/07/2014        168.7554246                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:320, UDP:319, IPv4:72}
    325278  11:47:37 04/07/2014        168.7709396                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 25        {UDP:322, IPv4:72}
    325397  11:47:39 04/07/2014        170.7708892                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 25        {UDP:322, IPv4:72}
    326185  11:47:40 04/07/2014        171.7552905                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:320, UDP:319, IPv4:72}
    327030  11:47:43 04/07/2014        174.7588879                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    327031  11:47:43 04/07/2014        174.7707730                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 25        {UDP:322, IPv4:72}
    327178  11:47:44 04/07/2014        175.7552028                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    327510  11:47:45 04/07/2014        176.7551962                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    328598  11:47:48 04/07/2014        179.7552497                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    328630  11:47:51 04/07/2014        182.7551309                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    328631  11:47:51 04/07/2014        182.7707620                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 25        {UDP:322, IPv4:72}
    328658  11:47:54 04/07/2014        185.7550375                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    328669  11:47:57 04/07/2014        188.7709719                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    328677  11:47:59 04/07/2014        190.7862445                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 25        {UDP:322, IPv4:72}
    328690  11:48:00 04/07/2014        191.7708666                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    328717  11:48:03 04/07/2014        194.7706918                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    328730  11:48:06 04/07/2014        197.7704623                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    328736  11:48:07 04/07/2014        198.7861669                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 25        {UDP:322, IPv4:72}
    329217  11:48:09 04/07/2014        200.7705229                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    329420  11:48:12 04/07/2014        203.7704633                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    329795  11:48:15 04/07/2014        206.7704298                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    329796  11:48:15 04/07/2014        206.7858646                      
    Client    Server   TFTP      TFTP: Acknowledgement - Block Number: 25        {UDP:322, IPv4:72}
    329990  11:48:18 04/07/2014        209.7704360                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    330005  11:48:21 04/07/2014        212.7703291                      
    Client    Server   AuthIP  AuthIP:version 1.0, Main Mode, Initiator, First Exchange with Unknown peer SPN, Initiator provide proposal Anonymous for negotiation ,Payloads = HDR, CRYPTO, SA, AUTH, Ni, VID, KE, NAT-D, Flags = ..., Length =
    440       {AuthIP:419, UDP:319, IPv4:72}
    330014  11:48:23 04/07/2014        214.7862410                      
    Client    Server   TFTP      TFTP: Error - ErrorCode: 0, ErrorMessage: timeout on receive           {UDP:322, IPv4:72}

    Hi,
    According to the logs, this issue still should be related to network driver. It failed after network driver initialized. Please try to use another network driver.
    Best Regards,
    Joyce
    We
    are trying to better understand customer views on social support experience, so your participation in this
    interview project would be greatly appreciated if you have time.
    Thanks for helping make community forums a great place.

  • Generation 2 vms pxe boot

    Hi All,
    can anyone please confirm if pxe boot works with gen 2 vms in hyperv? I have wds installed in standalone mode. When ever I create new gen 2 vm, it takes ip, downloads some file and it says 
    Station
    IP address is x.x.x.x
    Server
    IP address is x.x.x.x
    NBP filename is boot\x64\wdsmgfw.efi
    NBP
    filesize is 1459552 Bytes
    Downloading
    NBP file...
    PXE-E18: Server response timeout.
    Boot
    Failed. EFI SCSI Device
    Boot
    Failed. EFI Network.
    No
    Operating System was Loaded. Press a key to retry the boot sequence
    I have tried with and without enabling secure boot option. I have wds(standalone mode), MDT and gen 2 vms. Can anyone please guide me how to make gen 2 vms boot over pxe?
    Chaitanya.
    Chaitanya.

    Hi,
    You might need to set DHCP options 60, 66, 67 and 4011:
    60: set the identifier to "PXEClient" (without the quotes) - pop it in all the active (I put it in the inactive scopes as well, for over-zealous safety) DHCP scopes, just in case the request is picked up by another zone/scope (ensure there are
    sufficient IP addresses within the scope[s] - bit of daft point, but it wouldn't be the first time I have seen a PXE boot fail because there aren't any available IPv4 addresses)
    66: set the Boot Server Host Name "<boot_server_name>.<...>.<CN>.<CN>" or by IPv4 address
    67: set the Boot File Name; stop WDS from listening on UDP Port 67 - it will be used by DHCP:: ensure the full path is listed (verify this before running the PXEboot) - Just as side note, I tend to make the folder containing the file read/write - not sure
    it actually does anything, but it frequently makes things a bit "smoother".
    4011: ensure that PXE broadcasts from the clients are routed by WDS properly i.e.: the traffic should go to the appropriate server (DHCP, WDS and possibly BootTP if configured)
    Also, and don't take this wrong way, but check, check and check again that the boot order settings are set in the Hyper-V Manager correctly.  Time and time again I have come up against this one.  Sometimes, for whatever reason, Hyper-v will put
    the defaults back in, so you think you are booting off the network, and will be told as such, but will actually be booting off DVD/CD...
    Create a VM, open the settings and then start the VM; watch the settings in the left hand pane.   If all is well, there will no change, if all is not well, there may be a slight "jump" as the VM starts up.  
    Could be an idea to start DHCP from the command line - if you have access to it and there are no impediments, there isn't (shouldn't be) any problem with ensuring it has started. 
    Hope this helps
    - quick note, I'm not available for a couple of days but hopefully one of the other kind and generous souls on this site will assist you if you run into any problems.
    have a good one! :D
    Cheers
    Andrew
    Oh, just had thought, check that you are utilizing only one IP address per network adapter on the client, DHCP and WDS servers.  There's a conflict between DHCP and RIS - or at least used to be, not sure if it has been fixed/sorted. 
    Cheers! Andrew

  • Slow PXE boot. TFTP windowing issue

    Hi
    we have just set up SCCM 2012 and have configured OSD. It works well apart form the length of time it takes to download the boot.wim on a PXE boot. 
    We took some network traces and noticed that TFTP was behaving as if the Windowing was set to 1 so every block was being ACK'ed before another was sent.
    I checked the Windowing size on the bcd file of the boot image and the setting was
    ramdisktftpwindowsize   4
    Any ideas why TFTP doesn;t seem to be picking this up?

    The Microsoft article would suggest that the Window Size options should be available in the latest implementations of PXE
    http://technet.microsoft.com/en-us/library/hh974416.aspx
    TFTP enhancements
    What value does this change add?
    Trivial File Transfer Protocol (TFTP) enhancements result in improved performance.
    What works differently?
    TFTP (Trivial File Transfer Protocol) has been enhanced and delivers improved results in performance.
    You use the Windows Deployment Services Trivial File Transfer Protocol (TFTP) server to download the files
    that are needed to do a network boot using the Pre-Boot Execution Environment (PXE). PXE technology is a standard created by Intel that establishes a common and consistent set of pre-boot services within the boot firmware. The end goal is to enable a client
    to do a network boot and receive a network boot program (NBP) from a network boot server.
    TFTP enhancements include:
    Scalable buffer management Provides
    support for a shared client buffer; allows buffering an entire file instead of a fixed size buffer for each client. Scalable TFTP buffer feature allows maintaining a single buffer per file in the server. When the server is buffering a file in shared mode,
    different sessions can read from the same shared buffer.
    Scalable port management Ability
    to use a dynamic or a fixed range of UDP ports to service clients with shared UDP port allocation. Sharing the same server port among different TFTP sessions improves scalability because there are sufficient ports when more clients are actively using the server.
    Variable-size transmission window Allows
    the client and server to determine the largest workable window size, resulting in improved TFTP performance. Provides the ability to dynamically determine the optimal window size.
    Maximum TFTP block size Previously implemented
    as a registry setting, this is now exposed to users through WDSUTIL and the WDS MMC snap-in.

  • OSD to Surface fails to PXE Boot and returns PXEGetPXEData Failed with 0x80004005

    Scenario: When trying to Image Windows 8.1 to a Surface Pro, Surface Pro 2 and Surface Pro 3 I have downloaded the latest Surface Firmware and Drivers (August 18th 2014 I believe), the NIC's are in the x64 PXE Boot Image. I have verified that no DHCP Option
    67 is set, and that SpanningTree PortFast is enabled. All other Images function correctly, Windows 7 Sp1 works. We use the Microsoft USB NIC, and we PXE boot and download the PXE Image fine, then it comes into windows and goes to detect the NIC, at which point
    it fails and reboots.
    The Surface has had Firmware update on it to the latest.
    It appears the NIC just stops working, which makes me think that the latest Driver pack for Surface does not contain the PXE boot versions for their NIC.
    Trying the Docking Station (which utilizes NIC ASIX AX888772) exhibits the same problem.
    The NIC stays active until the OSD Screen comes up, it fails trying to load the Surface NIC though (or the NICs in the Driver pack they just released do not include a PXE Boot Driver...the Drivers once imported do not show any as being Boot Critical...which
    make me think this is the case even more so.
    Doing a USB PXE Boot also fails to load the NIC.
    Going to F8 and doing IPCONFIG /RENEW verifies the NIC is not active.
    I see tons of postings on the Surface being a nightmare to image.
    Errors:
    Failed to Download pxe variable file. Code (0x0000001)
    PXEGetPXEData Failed with 0x80004005
    Anybody having any other experiences out there, or have anything else they could think to try?
    David Baur

    (or the NICs in the Driver pack they just released do not include a PXE Boot Driver...the Drivers once imported do not show any as being Boot Critical...which make me think this is the case even more so.
    There are no "PXE boot versions" of drivers at all. What you described just indicates that there is no driver in winpe that matches the hardware. WinPe is based on the respective version of the full os so you have to add Win8.x drivers to the boot image.
    The architecture also has to match. Have you added NIC drivers to the boot image at all?
    NIC drivers are never boot critical if I am not mistaken.
    Torsten Meringer | http://www.mssccmfaq.de

  • PXE Boot an iMac

    I have been talking with apple support for over 1 hours... and they don't know what a PXE boot is!
    Can someone please help me! How would I enable PXE boot at boot time without needing to install the OS first!
    Cheers
    DK

    Apple doesn't support PXE... as a "normal" BIOS system would see it...
    As Apple is a closed system you must use a Netboot which is compatible for Apple Proprietary Hardware and is detected at boot time if the "Option" Key is held down.
    In my case, this software would need to be set-up on another server to run this "Apple" Proprietary PXE Boot... which is pointless and non-standard....
    Not to worry the OS X's will stay standalone...
    The more I use OS X's, the more I realise Apple are just as Proprietary and closed as Microsoft... Hopefully the Linux Community can be a man in the middle to resolve these issues... again! :P

Maybe you are looking for

  • How to change the title of an object in the build order window?

    In Keynote '09 v5.1.1 (1034)... How to change the title of an object in the build order window from the default "dropped image" to a specific title? I'm running the following:   Model Name: MacBook Pro   Model Identifier: MacBookPro2,1   Processor Na

  • I have an iPod touch 4th gen,

    I have an iPod touch version 4.3.5 and it won't charge unless I plug it in and turn it of while it's plugged in, and it won't connect to iTunes when I plug it into the computer I also can't update it because I don't have internet on my computer, what

  • Error in brconnect

    Hi Michael, When I am checking database through db13 its giving the below error : ******************error log*****************************************                                                                                 Detail log:        

  • ORA-12571 TNS PACKET WRITER FAILURE --urgent help required

    I'm facing ORA-12571 TNS PACKET WRITER FAILURE error Platform is windows 2000/ tomcat / appache server / oracle 8.1.7 This is not frequently happening. When the load increases, I'm facing this error? What type of parameters should I concentrate. DB i

  • Setting the buffer size centrally

              Is there a way to set the buffer size to a specific value for           multiple JSPs without having to use the @page buffer...           directive on every page?           I have a JSP/EJB application with many JSPs and want to allow