background image

Listing the commands

The syntax for the help command is as follows:

help

The help command lists the OmniFS commands.

Displaying the OmniFS version and copyright

The syntax for the version command is as follows:

version

This command displays the OmniFS version number and copyright.

Creating a directory

The syntax for the mkdir command is as follows:

mkdir <destination>

This command creates a directory. The destination argument must include an
absolute path, and all components of the path except for the last directory must
exist.

For example:

mkdir 2:1\user\test

The directory 2:1\user must already exist.

Using OmniFS to recover files

If a Clone task has failed on a client computer and the computer cannot start in
Windows, you can use OmniFS to do a directory listing of preserved files in the
File Preservation Metadata File and to copy the files to other locations.

Table 6-4

displays the formats that you can use for designating drives.

Table 6-4

Designating drives formats

Example

Format

omnifs dir pf:\e_drive\data

Format c_drive when the
origin partition was a FAT
partition accessible from
DOS.

87

Manipulating files and directories using OmniFS

Using OmniFS to recover files

Summary of Contents for GHOST IMAGING FOUNDATION 7.1

Page 1: ...Symantec Ghost Imaging Foundation 7 1...

Page 2: ...REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT ARE DISCLAIMED EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HEL...

Page 3: ...Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 http www symantec com...

Page 4: ...at provides rapid response and up to the minute information Upgrade assurance that delivers automatic software upgrade protection Global support that is available 24 hours a day 7 days a week Advanced...

Page 5: ...Customer service information is available at the following URL www symantec com techsupp Customer Service is available to assist with the following types of issues Questions regarding product licensi...

Page 6: ...countermeasures to prevent attacks before they occur Symantec Early Warning Solutions These services remove the burden of managing and monitoring security devices and events ensuring rapid response t...

Page 7: ...g a hard disk from an image file 23 Restoring a partition from an image file 25 Cloning disks and partitions 26 Cloning disk to disk 27 Cloning partition to partition 28 Verifying integrity 30 Adding...

Page 8: ...file 47 About image file spans 47 Setting the default split options 48 Compiling an image file 48 Using Ghost Explorer from the command line 49 Using Ghost Explorer with long file names 50 Chapter 4 R...

Page 9: ...using OmniFS 79 About OmniFS 79 OmniFS operating environments 80 Using OmniFS 80 Access method switches 81 Accessing files and folders with names that contain spaces 83 Listing drive identifiers 83 Om...

Page 10: ...t of network bandwidth used 113 Viewing and changing GhostCast Server session options 114 Running Ghost exe on a client computer 115 Chapter 9 GhostCasting from the command line 117 About running Ghos...

Page 11: ...tition 159 Appendix C Ghost for Linux 161 Supported configurations 161 Supported Linux distributions for cloning 164 Supported Linux distributions for running Ghost 165 Symantec Ghost utility support...

Page 12: ...Cannot start from drive A 178 Windows blue screen 178 Missing hibernation file 178 About cancelling a Ghost exe operation 179 Index 181 Contents 12...

Page 13: ...a peer to peer connection with Ghost exe Creating a backup image file Restoring from an image file Cloning disks and partitions Verifying integrity Adding switches to your Ghost exe operation Running...

Page 14: ...t fit on a single floppy disk Ghost exe is concatenated on a RAM drive in DOS and executed from the RAM drive The concatenation is transparent To use Ghost exe on a stand alone computer 1 Start Ghost...

Page 15: ...rompt type the following command progra 1 symantec ghost ghost exe Start the computer in DOS mode After the first DOS boot disk loads you are prompted to insert the second Ghost boot disk Ghost starts...

Page 16: ...the computer with a boot package that contains Ghost exe then Ghost starts after the computer has restarted If GhostCasting or peer to peer services are not available from the menu then ensure that Gh...

Page 17: ...rtition Partition to partition clone Computer receiving destination image file Computer containing source partition Back up partition to image file Computer containing source image file Computer conta...

Page 18: ...the computer as the slave computer USB connection Click Peer to peer LPT Slave to start the computer as the slave computer LPT connection Click Peer to peer TCP IP Slave to start the computer as the...

Page 19: ...hard disk Second partition on your hard disk partition backup only LS120 Superdisk JAZ or ZIP disk CD R RW or DVD R RW R RW FireWire hard disk USB 1 1 2 0 hard disk Tape Locally mapped network file se...

Page 20: ...x type a description of the image file You can modify this description on the Console or in Ghost Explorer 5 Click Save 6 When you are prompted to select the compression level select one of the follow...

Page 21: ...ntegrity on page 30 Backing up a partition to an image file You can create an image file from one or more partitions to use as a backup or to clone onto another partition or disk To back up a partitio...

Page 22: ...og box do one of the following Click Yes The system performs an integrity check of the file structure on the source partitions The source partitions are then copied to the destination image file If yo...

Page 23: ...d disk it is overwritten by the contents of the image file To restore a disk from an image file 1 On the main menu do one of the following Click Local Disk From Image Local Click Disk From Image Peer...

Page 24: ...he data held in the source image Warning The Destination Drive Details dialog box shows a suggested partition layout for the destination drive once the cloning process is completed This partition layo...

Page 25: ...ge Peer to peer connection 2 In the File Locator dialog box do one of the following Type the path and file name of the image file Click Browse to locate the image file Specify the drive or device and...

Page 26: ...n cloning Click No To return to the menu Warning Only click Yes if you are sure that you want to proceed The destination partition is completely overwritten with no chance of recovering any data 8 If...

Page 27: ...dialog box shows the details of every disk that Ghost exe finds on the local computer 3 In the Destination Drive dialog box select the destination disk Choose carefully as this is the disk that will...

Page 28: ...you leave two hard disks in the computer damage can occur to both of the bootable operating systems 8 Verify the integrity of the destination disk See Verifying integrity on page 30 You can also run S...

Page 29: ...tion However you can create a new partition if space is available If you create a new partition it can be resized during the cloning operation 6 Click OK 7 When the final Proceed with Partition Copy p...

Page 30: ...peer connection To verify the integrity of a disk 1 On the main menu do one of the following Click Local Check Disk Local Click Check Disk Peer to peer connection 2 Select the source disk to verify 3...

Page 31: ...g systems The hard drives must be able to communicate with the GhostCast Server If you run Ghost32 exe in Windows note the following information The partition on which Windows is installed cannot be o...

Page 32: ...edentials 3 Click OK Compatibility with Ghost exe Ghost32 exe shares the following functions with Ghost exe Both Ghost exe and Ghost32 exe can be a master or slave in a TCP IP peer to peer operation I...

Page 33: ...verlays DDO Hibernation and swap files Backing up or migrating a server About Symantec Ghost image files You can create image files by using the Symantec Ghost executable the GhostCast Server or the S...

Page 34: ...ides access to nine levels of compression See About Symantec Ghost switches on page 131 As a rule the more compression you use the slower Symantec Ghost operates However compression can improve speed...

Page 35: ...error checking technique CRC ensures that the original data written to the image file is the same as the data on the disk CRC32 is a CRC technique that uses a 32 bit value to store error checking info...

Page 36: ...actical to have a standard image file Symantec Ghost can split an image file into segments known as spans that are limited to a user specified size For example you may want to keep files created on yo...

Page 37: ...For example as follows First file Filename gho Second file Filename 001 Third file Filename 002 See About Symantec Ghost switches on page 131 Spanning across multiple volumes and limiting span sizes...

Page 38: ...e locations of the image file spans You must know the span segment locations and file names You can continue on the same form of media For example if you originally spanned onto a JAZ disk and want to...

Page 39: ...ource disk in every way You should take a copy of a disk that uses BitLocker Drive Encryption only as a backup If you restore an image onto a drive that has a different geometry Windows Vista cannot i...

Page 40: ...ot interpret the dynamic disk If you restore an ia disk image of a dynamic disk onto a SCSI hard drive and you receive a Destination drive too small message you must load the ASPI driver for the SCSI...

Page 41: ...e systems Files are not included on the image file or destination disk NTFS file systems A file with the same name is created on the image file or destination disk but the contents of the file are not...

Page 42: ...uccessful if the hardware is identical on the source and destination hard drives or computers You can clone a server if the source and destination servers log on to two totally different networks and...

Page 43: ...from an image file Modifying image files Listing the contents of an image file About image file spans Setting the default split options Compiling an image file Using Ghost Explorer from the command l...

Page 44: ...Ghost Explorer On the Windows taskbar click Start All Programs Symantec Ghost Ghost Explorer To access a list of file commands Right click a file or directory in Ghost Explorer to access a list of fil...

Page 45: ...table program it is run If it is a data file and there is an application installed and associated with this file type the application opens with the data file If you try to launch an application that...

Page 46: ...mage file properties Ghost Explorer cannot open a file created with a version of Symantec Ghost earlier than 3 0 You can use Ghost Explorer to add files or directories from Windows Explorer to any ima...

Page 47: ...asily accessible list of the image file contents To list the contents of an image file 1 In Ghost Explorer open the image file 2 On the File menu click List Contents 3 Click one of the following List...

Page 48: ...an image file the image file becomes fragmented Symantec Ghost takes longer to restore a fragmented image than a compiled file You can improve the performance of a restore by compiling a file before y...

Page 49: ...iles Symantec Ghost Ghostexp This is the default path to Ghost Explorer 3 Press Enter Ghost Explorer has a batch mode in which it carries out a single command and then exits In this version batch mode...

Page 50: ...ontaining double byte characters correctly such as file names in Asian or Eastern European languages Ghost Explorer may be able to show these names properly by reading them directly from the image fil...

Page 51: ...for each hardware set If you want to use DeployAnywhere outside the managed environment you can run the DeployAnywhere executable ghDplyAw32 exe from the command line The executable is located in the...

Page 52: ...abase with the image Alternatively you can copy it from your Ghost installation C Documents and Settings All Users Application Data Symantec Ghost Template to the appropriate media If you want you can...

Page 53: ...re available you can retarget the image The retargeting step installs the appropriate drivers and performs other necessary configuration tasks To perform the retargeting step use the following command...

Page 54: ...driver is located Type the folder path or click Browse and select it Location A suitable name for the driver This is used in the Ghost Deploy Anywhere driver database and displayed in the Windows PE...

Page 55: ...erforming multiple GDisk operations using batch mode Deleting and wiping your disk Activating or deactivating a partition Hiding or unhiding a partition Modifying the Windows 2000 XP boot menu Support...

Page 56: ...cker configuration of a disk s partitions and the ability to define GDisk operations in a batch file Running GDisk GDisk exe must be run in DOS mode GDisk32 exe can be run from within Windows gdisk fo...

Page 57: ...The first four correspond to the menu options on the FDisk main menu Some command line switches work only with the DOS version of GDisk or only with the Windows 32 version of GDisk Table 5 1 describes...

Page 58: ...g help in GDisk is as follows C progra 1 symantec ghost gdisk GDisk exe C progra 1 symantec ghost gdisk32 GDisk32 exe Note An additional switch not shown is the VERSION switch This switch shows the ve...

Page 59: ...of the full capacity of the disk i Prevents GDisk from using direct SCSI disk access support This may result in GDisk not being aware of the full capacity of the disk s Suppresses prompting to confirm...

Page 60: ...this switch with caution Avoid using the forceusb switch to take over a USB controller from a driver for example Iomega USB drivers You may encounter problems if you do this This switch works in DOS o...

Page 61: ...i ext log sz MB pcent p end for q ntfs vista xp 2000 align chs 1mb v label 32 ntfat16 GDisk gdisk32 disk cre pri ext log sz MB pcent p end for q ntfs vista xp 2000 align chs 1mb v label 32 ntfat16 GDi...

Page 62: ...by the following If the partition is less than 16MB FAT12 If the partition is between 16MB and 512MB FAT16 If the partition is greater than 512MB FAT32 for Formats the new partition as NTFS You can us...

Page 63: ...e the boot code in the master boot record MBR For example you can use the mbr command to reinitialize the MBR to eliminate a boot sector virus You can also use the mbr command with the wipe option in...

Page 64: ...h wipe to reformat a GPT disk You can also use the gpt switch with the wipe switch in DOS to delete a dynamic disk The syntax for this command is as follows gdisk disk gpt wipe Table 5 5 lists the gpt...

Page 65: ...text file If the name of a text file is supplied along with the batch mode switch GDisk opens the file and executes the commands within it until all commands have been executed or one of the commands...

Page 66: ...el all gdisk 2 y cre pri 32 for q gdisk 2 y cre ext gdisk 2 y cre log 32 for q Batch files may be nested recursively For example a second file called Std_init txt contains the following lines 1 batch...

Page 67: ...setting is 1 pri nth Deletes the nth extended partition as well as any logical partitions in the extended partition This switch is supported on MBR disks only The default setting is 1 ext nth Deletes...

Page 68: ...tion Switch Represents the physical fixed disk from 1 to 128 n The disk number disk One of the following ALL All attached disks SYSTEM The disk containing the bootable OS disk Wipes the contents of th...

Page 69: ...rea then it shall notify the user that it was found and ask the user whether this area should be unlocked so that it can be erased If the user requests that the area be unlocked then GDisk will attemp...

Page 70: ...s start at 0 The optional arguments are as follows m sectors are displayed starting at the sector indicated in the view command If num m is not specified then GDisk defaults to displaying only one sec...

Page 71: ...switches Explanation Switch Represents the physical fixed disk from 1 to 128 disk Activates a partition act Deactivates a partition act Indicates the partition to activate or deactivate Only primary...

Page 72: ...00 XP boot menu The following modifications are supported Displaying a list of current boot entries Adding an entry to boot ini Removing an entry from boot ini Setting the default boot option and time...

Page 73: ...ies Use the bootini switch to display the existing boot menu for the current Windows 2000 XP operating system The syntax for this command is as follows gdisk32 bootini inifile filename Adding an entry...

Page 74: ...lder folder Restarts after the execution of the command r Adding an entry to start Windows 2000 XP The syntax for this command is as follows gdisk32 bootini add d disknumber p partno desc description...

Page 75: ...ss The entry has the following format full path to boot sector file boot sector file description For example C bootos2s dat Boot OS 2 System When adding this entry GDisk does the following Reads the f...

Page 76: ...is the only entry in boot ini Setting the default boot option and timeout Use the default switch to set the default boot option and timeout The syntax for this command is as follows gdisk32 bootini de...

Page 77: ...which translates to a capacity greater than 7 8 GB GDisk can directly access hard disks through the IDE controller or ASPI interface provided by an ASPI driver Take care when creating partitions for o...

Page 78: ...Managing partitions using GDisk Support for large hard disks 78...

Page 79: ...utility for manipulating files and directories in a locally attached NTFS FAT or EXT3 file system including hidden partitions OmniFS exe performs these functions from DOS or WinPE OmniFS32 performs th...

Page 80: ...switches The following interfaces are supported for OmniFS exe OmniFS32 exe and omnifs for Linux Performs the file operation and exits It uses the exit code to signal whether or not the operation was...

Page 81: ...i disks are read only ad image file name addDisk image file name Handles the code page in the same way as the current OEM page The code page is specified as a number cp codepage Specifies that the pre...

Page 82: ...Note the following Use this switch with caution Avoid using the forceusb switch to take over a USB controller from a driver for example the Ghost peer to peer USB driver You may encounter problems if...

Page 83: ...on a computer In all cases the characters distinguish the volume identifier from the path name For example the output of c omnifs info might look like the following M Maxtor 4 G100H5 GAK8 S G5001MGF...

Page 84: ...llows attrib r r s s h h w w x x source Table 6 3 lists the attributes Some attributes are not available for some file systems Table 6 3 Attribute descriptions Description Attribute Readable r System...

Page 85: ...his case the destination argument must point to a valid directory The last portion of the destination path is created if required If the first argument points to a file and the second argument points...

Page 86: ...all subdirectories are deleted before the directory is deleted Listing a folder The syntax for the directory listing command is as follows dir source The source argument must be specified as an absol...

Page 87: ...ept for the last directory must exist For example mkdir 2 1 user test The directory 2 1 user must already exist Using OmniFS to recover files If a Clone task has failed on a client computer and the co...

Page 88: ...directory listing from the File Preservation Metadata File of the preserved files if the File Preservation Metadata File is not in the current directory If a path is not included a full listing is di...

Page 89: ...recognized by the utility uses the following rules Each line in the script file begins with the operation and is followed by all of the required arguments for the nominated operation When specifying o...

Page 90: ...h a script file This scenario uses a batch file and a script file to copy delete and rename files on a volume that is not recognized by the operating system on the computer Following are the contents...

Page 91: ...wever uses UTC Universal Time Coordinated dates and times also known as Greenwich Mean Time Therefore to set the date and time data correctly OmniFS needs to know the time zone that the computer is in...

Page 92: ...examples with part hour time differences India Delhi set TZ IST 5 30 Nepal Katmandu set TZ NST 5 45 These settings are in contrast to Windows times zones which are the number of hours East of Greenwi...

Page 93: ...egEdit About GhRegEdit GhRegEdit lets you edit Windows registry keys and values Table 7 1 lists the versions of GhRegEdit Table 7 1 GhRegEdit versions Operating system Executable PC DOS MS DOS GhRegEd...

Page 94: ...the operating system runs All GhRegEdt command line switches can be run with GhRegEdit32 Where the Windows directory is listed as a parameter it is not optional if you are running GhRegEdit in DOS The...

Page 95: ...with names that contain spaces on page 83 Note The format for displaying in GhRegEdit is disk partition not disk partition To access registry files stored in an NTFS partition from within DOS you mus...

Page 96: ...the key operations switches Table 7 4 GhRegEdit key switches Description Switch Adds the specified key to the registry as follows Windowsdir is the location of the Windows directory For example 1 1 W...

Page 97: ...ample ghregedt enumkey 1 1 Windows HKEY_LOCAL_MACHINE Software enumkey windowsdir key Exports the key with subkeys as follows Windowsdir is the location of the Windows directory For example 1 1 Window...

Page 98: ...e ghregedt addvalue 1 1 Windows HKEY_LOCAL_MACHINE Software MyTestApp REG_SZ This is my test app If you add a value of type REG_MULTI_SZ multiple strings you must use the following syntax addvalue WIN...

Page 99: ...e operation executes on the default value For example ghregedt delvalue 1 1 Windows HKEY_LOCAL_MACHINE Software MyTestApp Version delvalue windowsdir key value Enumerates the specified key s value as...

Page 100: ...Editing registry keys and values using GhRegEdit Using GhRegEdit 100...

Page 101: ...ver Setting Auto Start parameters Setting the data transfer mode Controlling the amount of network bandwidth used Viewing and changing GhostCast Server session options Running Ghost exe on a client co...

Page 102: ...rk server restores image files to multiple clients or creates an image file from a single connected client On a client workstation Ghost exe receives and writes the image file to the local disk GhostC...

Page 103: ...a Symantec Ghost image Set up a computer with Windows and all of its drivers installed and configured as you want all of your computers configured You may need to create a model computer for each uni...

Page 104: ...boot package for the client computers you can run a GhostCast session To start a GhostCast session 1 On the GhostCast Server computer on the Windows taskbar click Start Programs Symantec Ghost GhostC...

Page 105: ...tion click Partition 4 Click Accept Clients to accept the client computer into the session The Accept Clients button becomes active when all boxes are filled in 5 Start Ghost exe on the destination cl...

Page 106: ...which to take an image 7 Click OK 8 Select the partition from which to take an image if required 9 Click OK 10 Select the level of compression that you require 11 Click Yes to begin See Running Ghost...

Page 107: ...s are filled out 6 Join the client computers to the GhostCast session See To join a GhostCast session to restore an image file to client computers on page 108 7 Click Send to start the image restore a...

Page 108: ...he client computers that are connected and waiting for the GhostCast session to start appear in the Connected Clients list along with their status Controlling the GhostCast session from the server In...

Page 109: ...lick Accept Clients to accept the client computer into the session 7 Start the client computers in DOS 8 Run Ghost exe using the ja switch to log on to the GhostCast session from the command line ghos...

Page 110: ...mode prestore src mcSessionNm dst 1 1 sure rb Only use the sure switch when you are sure that you are writing to the intended disk or partition 6 Click Accept Clients to accept the client computer in...

Page 111: ...s until the tenth client Once the tenth and final client is accepted the server stops accepting clients and starts sending out to the connected client computers To use the number of clients parameter...

Page 112: ...llowing reasons Only one stream of data is sent out for all clients Multicasting sends packets only to client computers that have requested data from the GhostCast Server This requires the support of...

Page 113: ...ipients of image files If your network hardware does not support multicasting then limiting bandwidth is helpful in many situations Table 8 2 provides a guide to network hardware setups and when you m...

Page 114: ...ict if you run two or more GhostCast operations simultaneously This option should be used by advanced users only To view or record GhostCast Server options 1 On the File menu click Options 2 If you wa...

Page 115: ...stored in a configuration file Wattcp cfg that is located in the same directory as Ghost exe As with all Symantec Ghost applications DHCP BOOTP and manually set IP addresses are supported Use the Sym...

Page 116: ...Using GhostCasting to create and restore images Running Ghost exe on a client computer 116...

Page 117: ...e Symantec GhostCast Server from the command line by including switches with ghostsrv You can run GhostCast Server from the command line Use a batch file or third party scheduler application to start...

Page 118: ...nnection Ominutes Creates a log file specifying log level E S W I or A The log level x can be E errors S statistics W warnings I information or A all in increasing order of logging detail Llevel Speci...

Page 119: ...is the number of megabytes per minute HLxxx Sets the maximum amount of bandwidth consumed while creating an image where xxx is the number of megabytes per minute HDxxx Sets the multicasting time to li...

Page 120: ...n page 104 ghostsrv exe c test123 gho TestSession Restoring a disk image file onto client computers Starts a GhostCast session called TestSession and uses the second partition in the image file c test...

Page 121: ...uses the image file c test123 gho The connecting clients IP addresses appear on screen At either half past one in the afternoon 1 30 PM or after 10 clients join the session transmission starts automat...

Page 122: ...GhostCasting from the command line GhostCast Server command line options 122...

Page 123: ...tup computer to have the following A unique IP address The correct subnet mask The default gateway optional Specify the TCP IP configuration parameters using one of the following methods Locally on a...

Page 124: ...CP and BOOTP applications are available for various operating systems and can be used with GhostCasting If you are GhostCasting to many clients not having to edit a unique Wattcp cfg file on every cli...

Page 125: ...tandards that are detailed in the following documents U S Department of Defense NISPOM National Industrial Security Program Operating Manual DoD 5220 22 M January 1995 The NISPOM document is available...

Page 126: ...le locations with a character its complement then a random character and verify Note This method is not approved for sanitizing media that contains Top Secret information d Destroy disintegrate incine...

Page 127: ...at sector n of a physical disk by default 1 sector is displayed Viewing a disk About completeness of coverage Table A 3 details the control that GDisk has over the disk and therefore the completeness...

Page 128: ...e view n command to view the overwrite pattern on the disk to confirm the overwrite has occurred by sampling You can use the view n command line switch to display one or more sectors starting at n of...

Page 129: ...is not addressable by GDisk Inaccurate disk geometry detection An error in determining the disk size could result in non accessibility Specialized disk commands Specialized disk commands such as thos...

Page 130: ...GDisk disk wipe specifications Determining disk size 130...

Page 131: ...hes Interactively with selected switches Automated in batch files batch mode The Symantec Ghost command line switches are used to alter Symantec Ghost behavior and automate procedures A hyphen or a sl...

Page 132: ...e The command line switch file can include any Symantec Ghost command line switch The Symantec Ghost command line switch file must be a text file with each switch on a separate line This lets you exce...

Page 133: ...riting to disk If this switch is set and the target partition is FAT Symantec Ghost checks for and works around bad sectors and all free sectors are verified This option may slow Symantec Ghost operat...

Page 134: ...ng the CRC32 switch on page 157 CRC32 Ignores CRC errors CRC errors indicate data corruption This switch overrides CRC error detection and may allow a corrupted image file to be used Using this switch...

Page 135: ...nd ghost dlist CDEFG instructs Symantec Ghost to look for files on C D E F and G drives The path remains the same dlist drives Lets Symantec Ghost convert all FAT16 volumes to FAT32 volumes when the d...

Page 136: ...a hard disk created by Symantec Ghost The fingerprint details include the process used to create the disk or partition and the time date and disk on which the operation was performed Reports the pres...

Page 137: ...b Forces an attempt to use volume SNAPSHOT on volumes in preference to standard volume locking forcevolumesnapshot Forces destination partitions to be resized proportionally to their original size By...

Page 138: ...e internal format of the partition it defaults to copying the files and directory structure Generally this is the best option However if a disk has been set up with special hidden security files that...

Page 139: ...ge created with id id Disable parsing of Linux LVM volumes ignoreLVM Adds a single line image file description to the image file with the following restrictions Cannot include any new lines Cannot be...

Page 140: ...me examples of type codes and provides example values Table B 2 Lockinfo type codes Value Based On Type Compaq Manufacturer M Deskpro EN Series SFF Product name P Award Software Version V H925CKH60020...

Page 141: ...for the remainder of the image file that is being restored noauto Includes the hibernation and skip files in the image file These files are excluded by default See Hibernation and swap files on page 4...

Page 142: ...lume to ensure that the disk is in a sound state before cloning ntic This switch forces Symantec Ghost to ignore the partition table system ids and instead to check the partition contents when detecti...

Page 143: ...when troubleshooting prefos Preserves the specified files The task fails if the specified files do not exist To preserve files or directories other than the image file the syntax is as follows preserv...

Page 144: ...switch disables status updates and user intervention quiet Restarts after finishing a restore or copy After completing a restore or copy operation the target computer must be restarted so that the ope...

Page 145: ...ry skip readme txt Skips any file called Readme txt in any directory skip ghost dll Skips any file ending with dll in the Ghost directory skip progra 1 Skips the program files directory note the short...

Page 146: ...Ghost partition This switch is intended to be used in the Additional command line in the Console All functionality of sze switches are supported See Setting a destination size for the clone switch on...

Page 147: ...equivalent of selecting TCP IP Master from the main menu The IP address of the slave computer may be specified tcpm slave IP address The TCP IP slave mode switch causes Symantec Ghost to go into TCP I...

Page 148: ...ansmission z2 High compression medium transmission z3 through z9 Higher compression slower transmission See Image files and volume spanning on page 36 z Accessing files Table B 3 lists the formats tha...

Page 149: ...backup create Note The dump switch is replaced by the create switch The dump switch is still fully functional and is interchangeable with create Partition to partition copy pcopy File to partition re...

Page 150: ...ice DVD FireWire hard disk disk create disk partition disk partition pcopy disk partition file partition GhostCast Server no partition specified tape partition CD image partition USB 1 1 and 2 0 Mass...

Page 151: ...1 For example SRC 1 2 drive number disk The source image file name For example SRC g source gho A partition in an image file can also be specified For example SRC g source gho 2 Files can also be read...

Page 152: ...ed during a restore that failed For example ghost recover clone mode p load src pf PF Preservation file SRC OS will take an image containing all volumes that have been mounted by the operating system...

Page 153: ...a normal disk If the vmdk file does not exist Ghost will create it from scratch There are additional vmdk switches to control the creation of vmdk files filename file The name of the multicast sessio...

Page 154: ...the target disk Due to partition size rounding and alignment issues 100 physical use of disk space may not be possible n mmP Indicates that the nth destination partition is to remain the same size on...

Page 155: ...wo from an image file and resizes the destination partitions into a 60 20 20 allocation assuming that the image contains 3 partitions ghost exe clone mode restore src g 3prtdisk gho dst 2 sze1 60P sze...

Page 156: ...e src VirtualMachine vmdk dst 1 ghost exe clone mode prestore src VirtualMachine vmdk 1 dst 1 1 Includes all mounted volumes in the image ghost32 exe clone mode create src OS dst allvols gho Includes...

Page 157: ...rify it against a disk The full syntax for this switch is as follows CRC32 action create verify pcreate pverify dcreate dverify src disk partition file crcfile file partition vlist file vexcept file T...

Page 158: ...xt This example uses disk 2 as the source drive and the output file ghost exe crc32 action create src 2 crcfile myfile txt Verifies the contents of the primary disk against a default ASCII CRC32 file...

Page 159: ...ny files containing the letters br such as Brxyz txt Abr txt and Abc dbr The specification of WINDOWS COOKIES in the previous example means match all files in the WINDOWS COOKIES subdirectory that hav...

Page 160: ...rtual Partition is displayed with the volume label VPSGHBOOT Therefore the partition numbering that you can see in GDisk is not the same as the partition numbering in Ghost exe Command line switches A...

Page 161: ...itive to any possible changes in Ext2 3 file systems and LILO and GRUB specifications If changes are made to these specifications Symantec Ghost may no longer support the Linux distribution Symantec G...

Page 162: ...Note It is recommended that you use GRUB in preference to LILO GRUB Ghost supports version 22 5 1 and earlier of LILO It only supports the linear mode not the lba32 mode This means the boot files must...

Page 163: ...ort having the journal on another device but this is an extremely uncommon case Journaling H tree directory indexes are not cloned but can easily be recreated by the user after the restore operation H...

Page 164: ...s may cause Ghost to fail Symantec Ghost can copy or clone the following versions of Linux in their default configurations Red Hat Enterprise Linux ES release 5 1 Red Hat Enterprise Linux ES release 5...

Page 165: ...1 Fedora Core 8 Werewolf Ubuntu 7 10 Gutsy Gibbon SuSE Linux Enterprise Server 10 Symantec Ghost utility support Ghost Explorer substantially supports Ext2 3 file systems within image files including...

Page 166: ...Ghost for Linux Symantec Ghost utility support 166...

Page 167: ...nsole client port configuration Volume Type Destination port Destination address Source port Sent by Stage 1 Server Discovery Low UDP 1345 229 55 150 208 1346 Client Low UDP 137 WINS server Varies Cli...

Page 168: ...Varies Client IP 6666 Server Stage 2 Status update Low to Medium TCP Varies Server IP Varies Client Low to medium TCP Varies Client IP Varies Server Stage 3 Task execution High UDP Varies Server IP 77...

Page 169: ...ts that must be open in a firewall to allow the GhostCast unicasting to work Table D 4 GhostCast server unicasting port configuration Volume Type Destination port Destination address Source port Sent...

Page 170: ...Configuring firewalls Symantec Ghost port configuration 170...

Page 171: ...mation about Ghost exe error messages is available on the Symantec Ghost Technical Support Web site www symantec com techsupp Table E 1 details some error messages that you may encounter Table E 1 Err...

Page 172: ...en allocated that is already in use 19916 The GhostCast session is set up incorrectly Ensure that the TCP IP settings are correct 19900 If you restore an image to a disk configured as a dynamic disk w...

Page 173: ...rors that may occur when using Ghost with NTFS files Table E 2 Errors when using Ghost with NTFS files Description Error message This error occurs when Ghost has finished mapping the location of disk...

Page 174: ...to the cluster mappings and the subsequent space required to store the mappings Error 25058 Unable to locate enough contiguous free space to load run Increase the destination partition size or run Gh...

Page 175: ...hat you are experiencing Table E 3 Symantec GhostCast errors Solution Problem Symantec Ghost uses a packet driver or NDIS2 drivers to perform GhostCasting If Symantec Ghost does not detect a packet dr...

Page 176: ...n also try pinging the IP address of the client computer from the server computer If you are not able to ping the client there is a communicationproblem andIPpacketsarenotbeingpassed between these com...

Page 177: ...r code Cloning Windows 2000 XP computers If a Windows 2000 XP computer fails to start after being cloned it may not have the correct mass storage controller driver configured and loaded for the hardwa...

Page 178: ...drive A first and drive C second Setup programs vary from one manufacturer to the next If you cannot find the Boot Sequence option use the Setup program s Help system refer to the documentation that c...

Page 179: ...ing system About cancelling a Ghost exe operation If you start a Ghost exe operation you can abort the process by pressing Ctrl C Be aware that pressing Ctrl C leaves the destination image file disk o...

Page 180: ...Troubleshooting Problems running Symantec Ghost 180...

Page 181: ...Cast Server 105 locally 14 bad clusters 137 bad sectors 133 137 batch switch 133 bfc switch 133 BIOS about 140 reporting drives 135 BitLocker Drive Encryption 34 39 blue screen troubleshooting 178 boo...

Page 182: ...a switch 134 D data checking 35 compression 34 data transfer mode 111 network traffic 101 dd switch 135 defragmentation 48 Department of Defense requirements GDisk 56 66 Deploy Anywhere running from c...

Page 183: ...file to disk restore 149 file to partition restore 149 files copying 85 deleting 86 files continued manipulating 79 paths 148 recovering 87 renaming 85 setting an attribute 84 skipping 145 finger swit...

Page 184: ...examples 119 command line options 118 connecting to a session 139 GhostCast Server continued creating 104 creating image file 105 data transfer mode 111 direct broadcast 111 IP address 139 jm switch...

Page 185: ...File Selection dialog box 141 image files adding files 47 image files continued compiling 48 compression 20 22 34 crc See CRC32 switch creating 19 22 37 creating using GhostCast Server 105 default spl...

Page 186: ...mode switch 149 model computer creating 103 Multicast about 101 address 114 connection 105 jm switch 140 Multicast continued network bandwidth 113 time to live 114 N network improving performance 113...

Page 187: ...rored 142 partition to file backup 149 partition to partition copy 149 password image file 144 paths specifying 148 PC DOS limitation 47 pcopy switch 149 pcreate switch 149 pdump switch 149 peer to pe...

Page 188: ...earch 135 naming 134 141 split image file compiling 48 creating 146 GhostCast 102 split switch 102 146 status update 144 sure switch 146 swap files 41 switches Ghost command line 131 Symantec Ghost fi...

Page 189: ...OmniFS 81 vdw switch 147 ver switch 147 verify command 147 version Symantec Ghost 147 vexcept switch 159 virtual partition numbering 159 Vista support 62 133 vmdk image file mounting to GDisk 59 mount...

Reviews: