?
Solved

Does Ghost allow me to create a PXE server ?

Posted on 2008-10-28
3
Medium Priority
?
338 Views
Last Modified: 2013-12-02
Can I create several diffrent  Images via Ghost and the be able to boot the client and choose what image I would like to use ? If so How do I do this ? Also Besides Ghost is there any free software out there that will allow me to do this ?
0
Comment
Question by:jbovalley
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
3 Comments
 
LVL 1

Accepted Solution

by:
killamankaze earned 1200 total points
ID: 22823810
This is possible, i believe what you are referring to is RIS. Here is some documentation on the correct procedure.

http://service1.symantec.com/SUPPORT/on-technology.nsf/docid/2000042011340125

Open in new window

0
 
LVL 17

Assisted Solution

by:JohnGerhardt
JohnGerhardt earned 400 total points
ID: 22823853
If you dont want to use RIS then have a look at this..
We have a TFTP server with the boot images created using a piece of software from emboot...
http://unattended.sourceforge.net/pxe-win2k.html
0
 
LVL 63

Assisted Solution

by:SysExpert
SysExpert earned 400 total points
ID: 22859643
see
 Ghost alternatives

http://ghost.radified.com/ghost_alternatives.htm

Plenty of open source stuff clonezilla project with the Server option should be able to do this.


I hope this helps !
0

Featured Post

Ransomware: The New Cyber Threat & How to Stop It

This infographic explains ransomware, type of malware that blocks access to your files or your systems and holds them hostage until a ransom is paid. It also examines the different types of ransomware and explains what you can do to thwart this sinister online threat.  

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In 2017, ransomware will become so virulent and widespread that if you aren’t a victim yourself, you will know someone who is.
Your data is at risk. Probably more today that at any other time in history. There are simply more people with more access to the Web with bad intentions.
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…

719 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question