SCCM Issues: Error 0x102 Fix

Earlier today, I added a new boot image, OS image, and deployed a new task sequence for our SCCM setup. Took a UEFI laptop that previously PXE-booted successfuly, but this time nothing happened. Tried a different model, still nothing.

I mucked around with DHCP options (specifically, adding Option 60 detailed here with specific steps here). No luck. Laptop would boot up, detect media was present, then try other boot methods as nothing was found.

Started playing around with the changes I made, editing the task sequence to use an older (but still current-versioned) and it worked!

Re-examined the new boot image I uploaded and viewing Properties told me I forgot to enable PXE support on it. D’oh!

SCCM: Boot Image Error Updating Distribution Points

I had a Win10 Ent boot image loaded into SCCM and distributed. However, I needed to enable command support as well as add some more drivers. Making the changes within the boot image’s properties went fine, but when I tried distributing the modified image, I rec’d the following error:

“Failed to make a copy of source WIM file due to error 2”;

Going into the location where my boot image was stored, I saw two were created: the original boot image I started with and boot.<uuid>.<uuid>.wim. I went into the properties of the boot image > Data Source > and browsed to just the boot.wim file.

I can distribute the modified image once more.

Consulted: https://social.technet.microsoft.com

Running DHCP Server Within AWS VPC

Problem:

DHCP server hosted in VPC wasn’t issuing addresses to clients.

Scenario:

DHCP server resides in a VPC which tunnels to our office LAN. Because of the particular solutions I’m implementing, the DHCP server must be in AWS, not on-prem.

The test client resides on VLAN X and the router is properly configured. There’s also another device on the same VLAN that acts as a DHCP relay agent, forwarding DHCP broadcasts to the DHCP server in the VPC.

Troubleshooting:

  • If statically-addressed, can test client ping the VLAN’s gateway?
  • Yup!
  • Can test client ping out to 8.8.8.8?
  • Yup!
  • Can test client ping the DHCP server in AWS?
  • Yup!
  • Can the DHCP relay agent ping the VLAN’s gateway?
  • Yup!
  • Can the DHCP relay agent ping the DHCP server in AWS?
  • Yup!
  • When performing a packet capture, is DHCP relay rec’ing DHCP request from test client?
  • Yup
  • When performing a packet capture is DHCP relay forwarding requests to DHCP server in AWS?
  • Yup!
  • When performing a packet capture, is the edge router forwarding the DHCP relay traffic through the tunnel to AWS?
  • Yup!
  • When performing a packet capture, is the DHCP server receiving the DHCP request from the DHCP relay agent?
  • Yup!
  • Is the DHCP server responding to both DHCP and bootp requests?
  • Yup!
  • Is the DHCP scope properly configured in the DHCP server?
  • Yup!

And that’s where I got stopped. Monitoring the DHCP server’s network, it would receive traffic from the DHCP relay, but do absolutely nothing with it. I’ve tried it with firewalls on and off. No luck.

Solution – Part 1

After running BPA, it didn’t dawn on me that DHCP server would crap out if the server’s NIC wasn’t configured w/ a static IP. As a test, I configured the DHCP server w/ a static address and it worked!

However…

Solution – Part 2

DO. NOT. CONFIGURE. EC2 INSTANCES. WITH. STATIC. ADDRESSES!!!! Period. No exceptions. No way around it.

I did this once before when I was just starting out with AWS/VPC and it absolutely WRECKS your chances of getting into (or recovering) an AMI that you lose connectivity to. All of the AWS recovery tools rely on the default networking, and configuring anything that’s not default within an AMI’s OS breaks the tools’ ability to function.

So, I added a second NIC to the server and manually configured that, leaving the default NIC alone so recovery tools can work.

Failed to Authorize DHCP

I’m introducing DHCP into my two-controller AD environment and ran into the following error:

Troubleshooting Steps:
1. Account used to install DHCP was in Enterprise Admins. Also added to Domain Admins group
2. Removed DHCP role from second controller, rebooted
3. Removed DHCP role from first controller, rebooted
4. Ran gpupdate /force on second controller, to ensure security group membership applied
5. Ran gpupdate /force on first controller, to ensure security group membership applied
6. Used ASDI Edit > Configuration > Services > NetService to delete both the DHCP objects
7. Forced replication
8. Re-added DHCP Role

After trying to commit, received the following error… again:

9. Enabled WinRM in GPO
10. Removed DHCP role from first controller
11. Deleted DHCP objects in ASDI Edit again
12. Forced replication
13. Re-added DHCP role
14. Rebooted
15. Success!!

What was the problem?

WinRM policy was preventing GUI to complete installation. The policy has since been restored back to how it was before, blocking WinRM once more.

Image 1 Source

Force Replication Source

WinRM GPO Source

Delete DHCP Objects in ASDI Source