Solved

SBS2008 install fail  ESRTII S3420GP

Posted on 2011-09-22
1
563 Views
Last Modified: 2012-05-12
Tried using Intel DA and it fails because ti will only ecept an R2 version of the Opsys so fails to allow load of SBS2008 [Server2008sp2].

So tried using SBS DVD and flash drive w/ESRTII drivers. After getting drivers from flash drive it fails saying it can't access the CD/DVD drive (which is also on the ESRTII hardware.)

0
Comment
Question by:tuckertf
1 Comment
 

Accepted Solution

by:
tuckertf earned 0 total points
ID: 36582936
OK, I solved it and will record here so others may not have to go through this

Original Config  Intel S3420GP Board, Two Drives in Raid 1 ESRTII Config; CD/DVD shows up as part of the ESRTII config when you boot. Flash Drive has ESRTII drivers on it.

Boot from CD, Select Install, will ask various ??'s re: User, server name, etc. and then will get to panel where it would show available Partitions. IT SHOWS the ESRTII .5TB Raid 1 Partition. At this point you can choose to click on Load Driver or not, it doesn't matter, the same thing happens, After clicking Next, the install fails right as it would being "Copying Files ...". The message shown says it is missing software necessary to connect to the CD/DVD (the same one it has been talking to for the last few minutes!) ...

After many different tries varying various variables I finally decided to attached my USB CD/DVD RW. I then, in the BIOS, configured it as the 1st boot device, and the ESRTII as the second. I also had the Flash Drive plugged in.

I booted to the DVD. This time when it got to the panel where it showed the partitions available, It did NOT SHOW ANY. I clicked load driver, selected the ESRTII driver from the flash drive. The process now showed the ESRTII Raid 1 partition, and when I hit next, it started copying files!! The rest of the install was a piece of cake!



 
0

Featured Post

Why You Should Analyze Threat Actor TTPs

After years of analyzing threat actor behavior, it’s become clear that at any given time there are specific tactics, techniques, and procedures (TTPs) that are particularly prevalent. By analyzing and understanding these TTPs, you can dramatically enhance your security program.

Join & Write a Comment

Written by Glen Knight (demazter) as part of a series of how-to articles. Introduction One of the biggest consumers of disk space with Small Business Server 2008(SBS) is Windows Server Update Services, more affectionately known as WSUS. For t…
A quick step-by-step overview of installing and configuring Carbonite Server Backup.
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…
When you create an app prototype with Adobe XD, you can insert system screens -- sharing or Control Center, for example -- with just a few clicks. This video shows you how. You can take the full course on Experts Exchange at http://bit.ly/XDcourse.

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now