Advertisement
hoek

Untitled

May 1st, 2019
134
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 7.60 KB | None | 0 0
  1. Request retry. SMSPXE 5/1/2019 5:49:51 PM 4872 (0x1308)
  2. Not in SSL SMSPXE 5/1/2019 5:49:51 PM 4872 (0x1308)
  3. Client boot action reply: <ClientIDReply><Identification Unknown="0" DuplicateSMBIOS="0" DuplicateMACAddress="0" ItemKey="2046820352" ServerName=""><Machine><ClientID>2cfdfc53-958e-4303-93a4-fe4043513012</ClientID><NetbiosName/></Machine></Identification><PXEBootAction LastPXEAdvertisementID="" LastPXEAdvertisementTime="" OfferID="SB120083" OfferIDTime="4/12/2018 2:02:00 PM" PkgID="SB100141" PackageVersion="" PackagePath="http://server.ourdomain.com/SMS_DP_SMSPKG$/SB1000D2" BootImageID="SB1000D2" Mandatory="0"/></ClientIDReply>
  4. SMSPXE 5/1/2019 5:49:51 PM 4872 (0x1308)
  5. F8:CA:B8:2B:00:D4, 4C4C4544-0057-5810-804A-C3C04F463732: found optional advertisement SB120083 SMSPXE 5/1/2019 5:49:51 PM 4872 (0x1308)
  6. Operation: BootReply (2) Addr type: 1 Addr Len: 6 Hop Count: 0 ID: D4002BB8
  7. Sec Since Boot: 0 Client IP: 000.000.000.000 Your IP: 000.000.000.000 Server IP: 010.005.000.089 Relay Agent IP: 000.000.000.000
  8. Addr: f8:ca:b8:2b:00:d4:
  9. Magic Cookie: 63538263
  10. Options:
  11. Type=53 Msg Type: 2=Offer
  12. Type=54 Svr id: 010.005.000.089
  13. Type=97 UUID: 0044454c4c57001058804ac3c04f463732
  14. Type=60 ClassId: PXEClient SMSPXE 5/1/2019 5:49:51 PM 4872 (0x1308)
  15. ============> Received from client: SMSPXE 5/1/2019 5:49:55 PM 4812 (0x12CC)
  16. Operation: BootRequest (1) Addr type: 1 Addr Len: 6 Hop Count: 0 ID: D4002BB8
  17. Sec Since Boot: 0 Client IP: 000.000.000.000 Your IP: 000.000.000.000 Server IP: 000.000.000.000 Relay Agent IP: 000.000.000.000
  18. Addr: f8:ca:b8:2b:00:d4:
  19. Magic Cookie: 63538263
  20. Options:
  21. Type=53 Msg Type: 3=Request
  22. Type=50 Requested IP: 010.005.001.012
  23. Type=55 Param Request List: 0102030405060b0c0d0f10111216171c28292a2b3233363a3b3c42438081828384858687
  24. Type=57 Max Msg Size: 04ec
  25. Type=54 Svr id: 192.168.007.051
  26. Type=97 UUID: 0044454c4c57001058804ac3c04f463732
  27. Type=93 Client Arch: Intel x86PC
  28. Type=94 UNDI: 010201
  29. Type=60 ClassId: PXEClient:Arch:00000:UNDI:002001 SMSPXE 5/1/2019 5:49:55 PM 4812 (0x12CC)
  30. ============> Received from client: SMSPXE 5/1/2019 5:49:55 PM 4812 (0x12CC)
  31. Operation: BootRequest (1) Addr type: 1 Addr Len: 6 Hop Count: 0 ID: D4002BB8
  32. Sec Since Boot: 0 Client IP: 010.005.001.012 Your IP: 000.000.000.000 Server IP: 000.000.000.000 Relay Agent IP: 000.000.000.000
  33. Addr: f8:ca:b8:2b:00:d4:
  34. Magic Cookie: 63538263
  35. Options:
  36. Type=53 Msg Type: 3=Request
  37. Type=55 Param Request List: 0102030405060b0c0d0f10111216171c28292a2b3233363a3b3c42438081828384858687
  38. Type=57 Max Msg Size: 04ec
  39. Type=97 UUID: 0044454c4c57001058804ac3c04f463732
  40. Type=93 Client Arch: Intel x86PC
  41. Type=94 UNDI: 010201
  42. Type=60 ClassId: PXEClient:Arch:00000:UNDI:002001 SMSPXE 5/1/2019 5:49:55 PM 4812 (0x12CC)
  43. ============> REQUEST Reply to client ([010.005.001.012:68]) Len:348 SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  44. Operation: BootReply (2) Addr type: 1 Addr Len: 6 Hop Count: 0 ID: D4002BB8
  45. Sec Since Boot: 0 Client IP: 010.005.001.012 Your IP: 000.000.000.000 Server IP: 010.005.000.089 Relay Agent IP: 000.000.000.000
  46. Addr: f8:ca:b8:2b:00:d4:
  47. BootFile: smsboot\x86\wdsnbp.com
  48. Magic Cookie: 63538263
  49. Options:
  50. Type=53 Msg Type: 5=Ask
  51. Type=54 Svr id: 010.005.000.089
  52. Type=97 UUID: 0044454c4c57001058804ac3c04f463732
  53. Type=60 ClassId: PXEClient
  54. Type=250 02010105040000001303020014040200ba062c436f6e66696775726174696f6e204d616e61676572206973206c6f6f6b696e6720666f7220706f6c6963792e0b0101 SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  55. <============ REQUEST Reply (end) SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  56. ============> Received from client: SMSPXE 5/1/2019 5:49:55 PM 4828 (0x12DC)
  57. Operation: BootRequest (1) Addr type: 1 Addr Len: 6 Hop Count: 0 ID: D4002BB8
  58. Sec Since Boot: 0 Client IP: 010.005.001.012 Your IP: 000.000.000.000 Server IP: 000.000.000.000 Relay Agent IP: 000.000.000.000
  59. Addr: f8:ca:b8:2b:00:d4:
  60. Magic Cookie: 63538263
  61. Options:
  62. Type=53 Msg Type: 3=Request
  63. Type=60 ClassId: PXEClient
  64. Type=97 UUID: 0044454c4c57001058804ac3c04f463732
  65. Type=93 Client Arch: Intel x86PC
  66. Type=250 0d0208000e010101020006050400000013ff
  67. Type=55 Param Request List: 03013c8081828384858687 SMSPXE 5/1/2019 5:49:55 PM 4828 (0x12DC)
  68. Getting boot action for unknown machine: item key: 2046820353 SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  69. Prioritizing local MP http://server.ourdomain.com. SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  70. Not in SSL SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  71. Request using architecture 9. SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  72. Not in SSL SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  73. Client boot action reply: <ClientIDReply><Identification Unknown="0" DuplicateSMBIOS="0" DuplicateMACAddress="0" ItemKey="2046820353" ServerName=""><Machine><ClientID>99012295-1f54-45c6-9e8d-51bff760f536</ClientID><NetbiosName/></Machine></Identification><PXEBootAction LastPXEAdvertisementID="" LastPXEAdvertisementTime="" OfferID="SB120083" OfferIDTime="4/12/2018 2:02:00 PM" PkgID="SB100141" PackageVersion="" PackagePath="http://server.ourdomain.com/SMS_DP_SMSPKG$/SB1000D2" BootImageID="SB1000D2" Mandatory="0"/></ClientIDReply>
  74. SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  75. F8:CA:B8:2B:00:D4, 4C4C4544-0057-5810-804A-C3C04F463732: found optional advertisement SB120083 SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  76. Looking for bootImage SB1000D2 SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  77. Prioritizing local MP http://server.ourdomain.com. SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  78. Not in SSL SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  79. Not in SSL SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  80. Prioritizing local MP http://server.ourdomain.com. SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  81. Not in SSL SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  82. Report Body: <ReportBody><ClientID>99012295-1f54-45c6-9e8d-51bff760f536</ClientID><StateMessage MessageTime="20190502004955.000000+000" SerialNumber="1"><ClientID>99012295-1f54-45c6-9e8d-51bff760f536</ClientID><Topic ID="PXE Boot Client" Type="601" IDType="601"/><State ID="100" Criticality="0"/><UserParameters Flags="32" Count="4"><Param>F8:CA:B8:2B:00:D4</Param><Param>4C4C4544-0057-5810-804A-C3C04F463732</Param><Param>10.5.1.12</Param><Param>SB1</Param></UserParameters></StateMessage></ReportBody>
  83. SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  84. Not in SSL SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  85. ============> REQUEST Reply to client ([010.005.001.012:68]) Len:447 SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  86. Operation: BootReply (2) Addr type: 1 Addr Len: 6 Hop Count: 0 ID: D4002BB8
  87. Sec Since Boot: 0 Client IP: 010.005.001.012 Your IP: 000.000.000.000 Server IP: 010.005.000.089 Relay Agent IP: 000.000.000.000
  88. Addr: f8:ca:b8:2b:00:d4:
  89. BootFile: smsboot\x64\pxeboot.com
  90. Magic Cookie: 63538263
  91. Options:
  92. Type=53 Msg Type: 5=Ask
  93. Type=54 Svr id: 010.005.000.089
  94. Type=97 UUID: 0044454c4c57001058804ac3c04f463732
  95. Type=60 ClassId: PXEClient
  96. Type=243 01515c534d5354656d705c323031392e30352e30312e31372e31302e33382e303030342e7b31413042323536322d313633442d343739312d413041312d3442424136363732464439327d2e626f6f742e766172
  97. Type=252 5c534d5354656d705c323031392e30352e30312e31372e31302e33362e31312e7b31413042323536322d313633442d343739312d413041312d3442424136363732464439327d2e626f6f742e62636400 SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  98. <============ REQUEST Reply (end) SMSPXE 5/1/2019 5:49:55 PM 4872 (0x1308)
  99. Begin validation of Certificate [Thumbprint BD473092DBC01F2A247DECC5B40182A3DCC004D9] issued to '{490EAFC5-1D8F-4137-96F8-6BA40B450948}' SMSPXE 5/1/2019 5:57:08 PM 4716 (0x126C)
  100. Completed validation of Certificate [Thumbprint BD473092DBC01F2A247DECC5B40182A3DCC004D9] issued to '{490EAFC5-1D8F-4137-96F8-6BA40B450948}' SMSPXE 5/1/2019 5:57:08 PM 4716 (0x126C)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement