Solved

DHCP JET database error -510

Posted on 1999-01-12
3
1,165 Views
Last Modified: 2013-12-19
My dhcp server generates an error every 30 sec. that is recorded in the event log.  The error is "Event id: 1014", "The JET database call returned the following error: -510"  This error is interfering with clients renewing their addresses and also the server backing up it's database.  It would be great to get an answer to this problem, if not that then somewhere else to look would be helpful also.  I have tried MS web site but haven't had any luck.  Thanks
0
Comment
Question by:brobinson
3 Comments
 
LVL 1

Accepted Solution

by:
tongman earned 200 total points
Comment Utility
It seems like your DHCP database is corrupted. You need to restore the file dhcp.mdb from the following directory -  'c:\winnt\system32\dhcp\backup\jet\new' to 'c:\winnt\system32\dhcp'.
You need to stop dhcp service and move all the files but not the 'backup' directory from 'c:\winnt\system32\dhcp' direcotory to somewhere else before you restore the file.
For more information, see the article : Q173396 in Technet.

Good luck!
0
 
LVL 4

Expert Comment

by:mcdonc
Comment Utility
Damn, scooped by only seconds!!

See this site http://ftp.sunet.se/pub/NT/mirror-microsoft/kb/Q129/7/30.TXT

It's "relevant" for NT 3.5, and the article says you can "solve" it by upgrading to 3.51, but I think the problem carries over to NT4.  Your answer is probably to follow the "workaround" instructions in this article (filenames may be different in NT4) OR to just uninstall and reinstall the DHCP service, before which, you should delete all the stuff in \WINNT\SYSTEM32\DHCP.

Please note that either of the solutions (reinstalling the SYSTEM.MDB file from the CD or reinstalling DHCP) will more than likely cause you to lose any scope definitions you've made.

You're another casualty of Microsoft.  You've been Microshafted!

0
 

Author Comment

by:brobinson
Comment Utility
That did the trick.  Thanks for the help and the pointer to more information.
0

Featured Post

What Is Threat Intelligence?

Threat intelligence is often discussed, but rarely understood. Starting with a precise definition, along with clear business goals, is essential.

Join & Write a Comment

Enterprise networks where VoIP phones have been deployed frequently use port configurations that allow both a computer and an IP phone to be plugged into the same switch port but use different VLANs. On Cisco equipment I'm referring to the "native V…
I'm a big fan of Windows' offline folder caching and have used it on my laptops for over a decade.  One thing I don't like about it, however, is how difficult Microsoft has made it for the cache to be moved out of the Windows folder.  Here's how to …
Illustrator's Shape Builder tool will let you combine shapes visually and interactively. This video shows the Mac version, but the tool works the same way in Windows. To follow along with this video, you can draw your own shapes or download the file…
This video explains how to create simple products associated to Magento configurable product and offers fast way of their generation with Store Manager for Magento tool.

772 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now