Solved

Trouble starting ghost session

Posted on 2008-10-16
6
1,642 Views
Last Modified: 2013-12-02
I am re-imaging all of the machines in our organization as part of yearly maintenance.  Out of 150 computers I have 4 or 5 that I was not able to Ghost.  Ghostcast session came up however once it got to the step of "initializing packet driver and IP address.." it failed and the following error comes up:


output error file to the following location
a:\ghosterr.txt

These computers work find on the internet and our network right now so they are getting an ip address etc.  I renewed the IP and that didn't work...I then reset tcp/ip and rebooted and that didn't work.

Any suggestions on this would be greatly appreciated!  Thanks.
0
Comment
Question by:jbartleydcc
  • 3
  • 2
6 Comments
 
LVL 27

Expert Comment

by:Jason Watkins
Comment Utility
Hi,

Could it be a port duplex/speed mismatch issue.  That is most often the case in our examples.

/F
0
 
LVL 16

Accepted Solution

by:
cantoris earned 250 total points
Comment Utility
I've seen this if the network card isn't recognised (watch carefully and you may see a message appear before Ghost client starts to this effect).  If you're using an old version of Ghost, you might need to download the NDIS driver for that network card and create a Ghost boot floppy with it.
If you're using a newer version of Ghost that uses the 32bit Ghost client then you can create a Windows PE CD using the WindowsAIK and include the Ghost client on it.  Windows PE includes loads of drivers.

If these PCs are the same type as the ones that are working then perhaps their NICs are having problems negotiating link speed/duplex with the switch.  Try setting a particular port on your switch (presuming you're ghosting them on a separate LAN) to 100Mbps statically and a different one to Auto Negotiation.  Then try it the affected PC on both ports and see if it works on one rather than the other.
0
 

Author Comment

by:jbartleydcc
Comment Utility
Thanks.  I will try these things out.  They are on the same LAN though as the computer that did ghost for me.  First I will look to see if there are any messages regarding the NIC having issues before GHOST started.  I may have more questions.  Stay tuned :)
0
Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

 

Author Comment

by:jbartleydcc
Comment Utility
The version of Ghost that we are using is 8.2.0.1117.   I am not familiar with creating a Windows PE CD.  Any help with that would be great.
0
 
LVL 16

Expert Comment

by:cantoris
Comment Utility
Here's an example tutorial - beware, it's a rather involved process:
http://searchenterprisedesktop.techtarget.com/tip/0,289483,sid192_gci1297757,00.html
You'll see it mentions where you can add extra files to the image - add your ghost32.exe in to the relevant folder at this point.
0
 

Author Comment

by:jbartleydcc
Comment Utility
I haven't had a chance to try these things yet sorry.  We are under new management at work now and they have been keeping me too busy with other things.  I am hoping to get back to this project soon.
0

Featured Post

Get up to 2TB FREE CLOUD per backup license!

An exclusive Black Friday offer just for Expert Exchange audience! Buy any of our top-rated backup solutions & get up to 2TB free cloud per system! Perform local & cloud backup in the same step, and restore instantly—anytime, anywhere. Grab this deal now before it disappears!

Join & Write a Comment

Suggested Solutions

VM backup deduplication is a method of reducing the amount of storage space needed to save VM backups. In most organizations, VMs contain many duplicate copies of data, such as VMs deployed from the same template, VMs with the same OS, or VMs that h…
Microservice architecture adoption brings many advantages, but can add intricacy. Selecting the right orchestration tool is most important for business specific needs.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

762 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

10 Experts available now in Live!

Get 1:1 Help Now