[SIZE=4][FONT=arial][COLOR=#222222]couldn’t resist[/COLOR] to install r3072, it seems my issues are solved…:)[/FONT][/SIZE]
[SIZE=4][FONT=arial]what a great support :)[/FONT][/SIZE]
[SIZE=4][FONT=arial]I am very very grateful…:)[/FONT][/SIZE]
What are the error messages? An exact error message, or even better a copy of the install log ( Should be located in [SIZE=12px][FONT=Consolas][COLOR=#333333]/var/log/foginstall.log[/COLOR][/FONT][/SIZE] ), would help us out tremendously.
Gotta help keep the forum organized and what not right. I’ll post here again if I here back about whether or not option 43 was touched by someone else.
[quote=“hesslr, post: 42845, member: 17210”]I reinstalled the fog service on our master image and all is well using 1.2.0. Thanks for the help![/quote]
Awesome! That was such a far-fetched idea, can’t believe it worked!
Well found out what was killing VMPlayer from Network booting it was Symantec Network threat protection causing the issue when disabled it works just the way it should. Now I just need to find where to add an exception for vmplayer so I don’t need to keep disabling the network protection.
Full scan seemed to fail on the few I tried it on so I switched to using quick scan so that I could at least add tasks. My priority has been using the PXE boot virus software after an “incident” earlier in the month.
If I import the list now will it match on MAC addresses and not create duplicates?
I want to thanks all of those for your being patient with me and giving feed backs through out this particular cluster. After getting tired dealing with the “what if” finally it was time to restore the drive to factory state by destroying all sectors, tracks and cylinders. Then installing Windows 8 and letting Windows 8 to create sectors, tracks and cylinders. It worked!!!
AFAIK you don’t need anything special. Just option 66 and 67. No dot at the end of the IP! Are you familiar with wireshark/tcpdump. If not maybe it’s time to dive into that part of network debugging. Capture the DHCP traffic and compare working against non-working setup. Probably best to use a hub to be able to capture that traffic. On your FOG server you can just use tcpdump straight away:
[CODE]sudo tcpdump -i eth0 -w /tmp/packet_capture.pcap[/CODE]
You can then transfer this file to your PC and open it up using wireshark… Try display filters to find DHCP (filter: bootp) and TFTP (filter: tftp) traffic.