Determining disk size .................................................................. 129
Appendix B
Command-line switches
................................................... 131
About Symantec Ghost switches .................................................... 131
Listing command-line switches ............................................... 132
Command-line switches ............................................................... 132
Accessing files ........................................................................... 148
Using the clone switch ................................................................ 148
Defining the type of clone command ........................................ 149
Setting a source for the clone switch ........................................ 151
Setting a destination for the clone switch .................................. 152
Setting a destination size for the clone switch ............................ 154
Examples of clone switch usage ............................................... 154
Batch file example ................................................................ 156
Using the -CRC32 switch .............................................................. 157
Examples of -CRC32 usage ..................................................... 158
Files not checked with CRC ..................................................... 159
About numbering the Virtual Partition ........................................... 159
Appendix C
Ghost for Linux
................................................................... 161
Supported configurations ............................................................ 161
Supported Linux distributions for cloning ................................. 164
Supported Linux distributions for running Ghost ............................. 165
Symantec Ghost utility support ..................................................... 165
Appendix D
Configuring firewalls
......................................................... 167
Symantec Ghost port configuration ............................................... 167
Appendix E
Troubleshooting
................................................................. 171
Ghost.exe errors messages ........................................................... 171
Ghost.exe problems .................................................................... 172
Vista volume containing system restore points .......................... 173
Starting from a PXE image on a Dell Dimension 8100
computer ...................................................................... 173
About using Ghost with NTFS files .......................................... 173
Symantec GhostCast errors .......................................................... 175
Symantec Ghost and legacy network cards ...................................... 177
Problems running Symantec Ghost ................................................ 177
Cloning Windows 2000/XP computers ...................................... 177
Vista partition restore ........................................................... 177
Joining client computers to Active Directory Domains ................. 177
11
Contents
Summary of Contents for GHOST IMAGING FOUNDATION 7.1
Page 1: ...Symantec Ghost Imaging Foundation 7 1...
Page 3: ...Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 http www symantec com...
Page 78: ...Managing partitions using GDisk Support for large hard disks 78...
Page 100: ...Editing registry keys and values using GhRegEdit Using GhRegEdit 100...
Page 116: ...Using GhostCasting to create and restore images Running Ghost exe on a client computer 116...
Page 122: ...GhostCasting from the command line GhostCast Server command line options 122...
Page 130: ...GDisk disk wipe specifications Determining disk size 130...
Page 166: ...Ghost for Linux Symantec Ghost utility support 166...
Page 170: ...Configuring firewalls Symantec Ghost port configuration 170...
Page 180: ...Troubleshooting Problems running Symantec Ghost 180...