Skip to content
English - United States
  • There are no suggestions because the search field is empty.

Devices that may have additional security settings may require additional steps to pxe boot.

PXE booting settings

PXE booting is a method of booting a computer from a network source rather than a local hard drive or other storage device. It can be a useful tool for system administrators who need to deploy new operating systems or software to a large number of computers, as it allows them to remotely boot and configure machines without the need for physical access to each device.
 
However, there are additional security settings that can be configured on a network that may make it difficult or even impossible to PXE boot computers. Some of these settings include:
 
  1. Secure Boot: This is a feature built into many modern computer systems that prevents the booting of any unauthorized or untrusted operating systems or software. It does this by verifying the digital signature of the bootloader before allowing it to run. If Secure Boot is enabled, it may prevent the PXE boot process from proceeding, as the network-based bootloader may not have a valid digital signature.
  2. Network Access Control: This is a system that restricts access to a network based on certain criteria, such as device type or user credentials. If a computer is not authorized to access the network, it may not be able to initiate a PXE boot process.
  3. Firewall Settings: Firewalls can be configured to block incoming traffic from specific IP addresses or network ports. If the network port used for PXE booting is blocked, the computer may not be able to communicate with the server to initiate the boot process.
  4. VLANs: Virtual LANs (VLANs) are used to logically group devices on a network based on their location or function. If a computer is not located on the same VLAN as the PXE server, it may not be able to communicate with the server to initiate the boot process.
In order to successfully PXE boot computers in the presence of these additional security settings, system administrators may need to adjust network settings or configure the computers themselves to meet the necessary requirements. This may involve disabling Secure Boot, configuring network access control rules, opening firewall ports, or configuring VLANs to allow communication between the PXE server and the target computers.
 
Some models that our users have shared that have these additional settings are:
  1. Acer N16P3
  2. Surface Pro 5, 6, 7