Event Id | 1001 |
Source | dhcp |
Description | You computer was not assigned an address from the network (by the DHCP Server) for the Network Card with network address <MAC address>. The following error occurred: <error description>. Your computer will continue to try and obtain an address on its own from the network address (DHCP) server. |
Event Information | CAUSE: Some Ethernet switches have a feature that checks ports for a loop condition when ports become active (this is the learning mode for spanning tree algorithm). If a loop is found, traffic is not allowed across the port. This process of checking for a loop condition takes approximately 10- 15 seconds during which the Windows NT Workstation computer appears to be on the network, yet no traffic is being passed. Additionally, some newer switch features such as Port Trunking or Port Aggregation may increase the problem. The DHCPREQUEST packet (along with any other traffic during that time) is lost. If you have a hub at the end of the port, the hub will have already brought the port up. You will only fail when connected directly to the switch. RESOLUTION: To resolve this problem, disable the spanning tree algorithm feature of your Ethernet switch. This may not be necessary on all manufactures switches, some vendors may allow you to simply move spanning tree initialization to the background. This enables the switch port to almost immediately become functional, but still perform spanning tree discovery in the background (non-blocking). Please note that spanning tree is only necessary on ports that connect to other switches (or bridges). Additionally, if Port Trunking or Port Aggregation is enabled on ports attached to DHCP clients, then either disable these features or convert the client to a static IP address if these features are required. Ports that have only clients connected do not need spanning tree enabled. For information on how to do this, please contact the switch manufacturer. |
Reference Links | Resolution Information |
Catch threats immediately
We work side-by-side with you to rapidly detect cyberthreats
and thwart attacks before they cause damage.