background image

The syntax for the clone switch is:

-clone,MODE={operation},SRC={source},DST={destination},

[SZE{size},SZE{size}.......]

Defining the type of clone command

MODE defines the type of clone command.

The syntax is as follows:

MODE={copy | restore | create | pcopy | prestore | pcreate}

Table B-4

lists the mode commands.

Table B-4

Mode commands

Action

Switch

Disk-to-disk copy

copy

File-to-disk restore

restore

Note:

The load switch is replaced by the restore switch.

The load switch is still fully functional and is
interchangeable with restore.

Disk-to-file backup

create

Note:

The dump switch is replaced by the create switch.

The dump switch is still fully functional and is
interchangeable with create.

Partition-to-partition copy

pcopy

File-to-partition restore

prestore

Note:

The pload switch is replaced by the prestore

switch. The pload switch is still fully functional and is
interchangeable with prestore.

Partition-to-file backup (allows
multipartition Ghost backup
selection)

pcreate

Note:

The pdump switch is replaced by the pcreate

switch. The pdump switch is still fully functional and
is interchangeable with pcreate.

Cloning combination options

Table B-5

illustrates the possible cloning operations that you can perform.

149

Command-line switches

Using the clone switch

Содержание GHOST IMAGING FOUNDATION 7.1

Страница 1: ...Symantec Ghost Imaging Foundation 7 1...

Страница 2: ...REPRESENTATIONS AND WARRANTIES INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY FITNESS FOR A PARTICULAR PURPOSE OR NON INFRINGEMENT ARE DISCLAIMED EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HEL...

Страница 3: ...Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 http www symantec com...

Страница 4: ...at provides rapid response and up to the minute information Upgrade assurance that delivers automatic software upgrade protection Global support that is available 24 hours a day 7 days a week Advanced...

Страница 5: ...Customer service information is available at the following URL www symantec com techsupp Customer Service is available to assist with the following types of issues Questions regarding product licensi...

Страница 6: ...countermeasures to prevent attacks before they occur Symantec Early Warning Solutions These services remove the burden of managing and monitoring security devices and events ensuring rapid response t...

Страница 7: ...g a hard disk from an image file 23 Restoring a partition from an image file 25 Cloning disks and partitions 26 Cloning disk to disk 27 Cloning partition to partition 28 Verifying integrity 30 Adding...

Страница 8: ...file 47 About image file spans 47 Setting the default split options 48 Compiling an image file 48 Using Ghost Explorer from the command line 49 Using Ghost Explorer with long file names 50 Chapter 4 R...

Страница 9: ...using OmniFS 79 About OmniFS 79 OmniFS operating environments 80 Using OmniFS 80 Access method switches 81 Accessing files and folders with names that contain spaces 83 Listing drive identifiers 83 Om...

Страница 10: ...t of network bandwidth used 113 Viewing and changing GhostCast Server session options 114 Running Ghost exe on a client computer 115 Chapter 9 GhostCasting from the command line 117 About running Ghos...

Страница 11: ...tition 159 Appendix C Ghost for Linux 161 Supported configurations 161 Supported Linux distributions for cloning 164 Supported Linux distributions for running Ghost 165 Symantec Ghost utility support...

Страница 12: ...Cannot start from drive A 178 Windows blue screen 178 Missing hibernation file 178 About cancelling a Ghost exe operation 179 Index 181 Contents 12...

Страница 13: ...a peer to peer connection with Ghost exe Creating a backup image file Restoring from an image file Cloning disks and partitions Verifying integrity Adding switches to your Ghost exe operation Running...

Страница 14: ...t fit on a single floppy disk Ghost exe is concatenated on a RAM drive in DOS and executed from the RAM drive The concatenation is transparent To use Ghost exe on a stand alone computer 1 Start Ghost...

Страница 15: ...rompt type the following command progra 1 symantec ghost ghost exe Start the computer in DOS mode After the first DOS boot disk loads you are prompted to insert the second Ghost boot disk Ghost starts...

Страница 16: ...the computer with a boot package that contains Ghost exe then Ghost starts after the computer has restarted If GhostCasting or peer to peer services are not available from the menu then ensure that Gh...

Страница 17: ...rtition Partition to partition clone Computer receiving destination image file Computer containing source partition Back up partition to image file Computer containing source image file Computer conta...

Страница 18: ...the computer as the slave computer USB connection Click Peer to peer LPT Slave to start the computer as the slave computer LPT connection Click Peer to peer TCP IP Slave to start the computer as the...

Страница 19: ...hard disk Second partition on your hard disk partition backup only LS120 Superdisk JAZ or ZIP disk CD R RW or DVD R RW R RW FireWire hard disk USB 1 1 2 0 hard disk Tape Locally mapped network file se...

Страница 20: ...x type a description of the image file You can modify this description on the Console or in Ghost Explorer 5 Click Save 6 When you are prompted to select the compression level select one of the follow...

Страница 21: ...ntegrity on page 30 Backing up a partition to an image file You can create an image file from one or more partitions to use as a backup or to clone onto another partition or disk To back up a partitio...

Страница 22: ...og box do one of the following Click Yes The system performs an integrity check of the file structure on the source partitions The source partitions are then copied to the destination image file If yo...

Страница 23: ...d disk it is overwritten by the contents of the image file To restore a disk from an image file 1 On the main menu do one of the following Click Local Disk From Image Local Click Disk From Image Peer...

Страница 24: ...he data held in the source image Warning The Destination Drive Details dialog box shows a suggested partition layout for the destination drive once the cloning process is completed This partition layo...

Страница 25: ...ge Peer to peer connection 2 In the File Locator dialog box do one of the following Type the path and file name of the image file Click Browse to locate the image file Specify the drive or device and...

Страница 26: ...n cloning Click No To return to the menu Warning Only click Yes if you are sure that you want to proceed The destination partition is completely overwritten with no chance of recovering any data 8 If...

Страница 27: ...dialog box shows the details of every disk that Ghost exe finds on the local computer 3 In the Destination Drive dialog box select the destination disk Choose carefully as this is the disk that will...

Страница 28: ...you leave two hard disks in the computer damage can occur to both of the bootable operating systems 8 Verify the integrity of the destination disk See Verifying integrity on page 30 You can also run S...

Страница 29: ...tion However you can create a new partition if space is available If you create a new partition it can be resized during the cloning operation 6 Click OK 7 When the final Proceed with Partition Copy p...

Страница 30: ...peer connection To verify the integrity of a disk 1 On the main menu do one of the following Click Local Check Disk Local Click Check Disk Peer to peer connection 2 Select the source disk to verify 3...

Страница 31: ...g systems The hard drives must be able to communicate with the GhostCast Server If you run Ghost32 exe in Windows note the following information The partition on which Windows is installed cannot be o...

Страница 32: ...edentials 3 Click OK Compatibility with Ghost exe Ghost32 exe shares the following functions with Ghost exe Both Ghost exe and Ghost32 exe can be a master or slave in a TCP IP peer to peer operation I...

Страница 33: ...verlays DDO Hibernation and swap files Backing up or migrating a server About Symantec Ghost image files You can create image files by using the Symantec Ghost executable the GhostCast Server or the S...

Страница 34: ...ides access to nine levels of compression See About Symantec Ghost switches on page 131 As a rule the more compression you use the slower Symantec Ghost operates However compression can improve speed...

Страница 35: ...error checking technique CRC ensures that the original data written to the image file is the same as the data on the disk CRC32 is a CRC technique that uses a 32 bit value to store error checking info...

Страница 36: ...actical to have a standard image file Symantec Ghost can split an image file into segments known as spans that are limited to a user specified size For example you may want to keep files created on yo...

Страница 37: ...For example as follows First file Filename gho Second file Filename 001 Third file Filename 002 See About Symantec Ghost switches on page 131 Spanning across multiple volumes and limiting span sizes...

Страница 38: ...e locations of the image file spans You must know the span segment locations and file names You can continue on the same form of media For example if you originally spanned onto a JAZ disk and want to...

Страница 39: ...ource disk in every way You should take a copy of a disk that uses BitLocker Drive Encryption only as a backup If you restore an image onto a drive that has a different geometry Windows Vista cannot i...

Страница 40: ...ot interpret the dynamic disk If you restore an ia disk image of a dynamic disk onto a SCSI hard drive and you receive a Destination drive too small message you must load the ASPI driver for the SCSI...

Страница 41: ...e systems Files are not included on the image file or destination disk NTFS file systems A file with the same name is created on the image file or destination disk but the contents of the file are not...

Страница 42: ...uccessful if the hardware is identical on the source and destination hard drives or computers You can clone a server if the source and destination servers log on to two totally different networks and...

Страница 43: ...from an image file Modifying image files Listing the contents of an image file About image file spans Setting the default split options Compiling an image file Using Ghost Explorer from the command l...

Страница 44: ...Ghost Explorer On the Windows taskbar click Start All Programs Symantec Ghost Ghost Explorer To access a list of file commands Right click a file or directory in Ghost Explorer to access a list of fil...

Страница 45: ...table program it is run If it is a data file and there is an application installed and associated with this file type the application opens with the data file If you try to launch an application that...

Страница 46: ...mage file properties Ghost Explorer cannot open a file created with a version of Symantec Ghost earlier than 3 0 You can use Ghost Explorer to add files or directories from Windows Explorer to any ima...

Страница 47: ...asily accessible list of the image file contents To list the contents of an image file 1 In Ghost Explorer open the image file 2 On the File menu click List Contents 3 Click one of the following List...

Страница 48: ...an image file the image file becomes fragmented Symantec Ghost takes longer to restore a fragmented image than a compiled file You can improve the performance of a restore by compiling a file before y...

Страница 49: ...iles Symantec Ghost Ghostexp This is the default path to Ghost Explorer 3 Press Enter Ghost Explorer has a batch mode in which it carries out a single command and then exits In this version batch mode...

Страница 50: ...ontaining double byte characters correctly such as file names in Asian or Eastern European languages Ghost Explorer may be able to show these names properly by reading them directly from the image fil...

Страница 51: ...for each hardware set If you want to use DeployAnywhere outside the managed environment you can run the DeployAnywhere executable ghDplyAw32 exe from the command line The executable is located in the...

Страница 52: ...abase with the image Alternatively you can copy it from your Ghost installation C Documents and Settings All Users Application Data Symantec Ghost Template to the appropriate media If you want you can...

Страница 53: ...re available you can retarget the image The retargeting step installs the appropriate drivers and performs other necessary configuration tasks To perform the retargeting step use the following command...

Страница 54: ...driver is located Type the folder path or click Browse and select it Location A suitable name for the driver This is used in the Ghost Deploy Anywhere driver database and displayed in the Windows PE...

Страница 55: ...erforming multiple GDisk operations using batch mode Deleting and wiping your disk Activating or deactivating a partition Hiding or unhiding a partition Modifying the Windows 2000 XP boot menu Support...

Страница 56: ...cker configuration of a disk s partitions and the ability to define GDisk operations in a batch file Running GDisk GDisk exe must be run in DOS mode GDisk32 exe can be run from within Windows gdisk fo...

Страница 57: ...The first four correspond to the menu options on the FDisk main menu Some command line switches work only with the DOS version of GDisk or only with the Windows 32 version of GDisk Table 5 1 describes...

Страница 58: ...g help in GDisk is as follows C progra 1 symantec ghost gdisk GDisk exe C progra 1 symantec ghost gdisk32 GDisk32 exe Note An additional switch not shown is the VERSION switch This switch shows the ve...

Страница 59: ...of the full capacity of the disk i Prevents GDisk from using direct SCSI disk access support This may result in GDisk not being aware of the full capacity of the disk s Suppresses prompting to confirm...

Страница 60: ...this switch with caution Avoid using the forceusb switch to take over a USB controller from a driver for example Iomega USB drivers You may encounter problems if you do this This switch works in DOS o...

Страница 61: ...i ext log sz MB pcent p end for q ntfs vista xp 2000 align chs 1mb v label 32 ntfat16 GDisk gdisk32 disk cre pri ext log sz MB pcent p end for q ntfs vista xp 2000 align chs 1mb v label 32 ntfat16 GDi...

Страница 62: ...by the following If the partition is less than 16MB FAT12 If the partition is between 16MB and 512MB FAT16 If the partition is greater than 512MB FAT32 for Formats the new partition as NTFS You can us...

Страница 63: ...e the boot code in the master boot record MBR For example you can use the mbr command to reinitialize the MBR to eliminate a boot sector virus You can also use the mbr command with the wipe option in...

Страница 64: ...h wipe to reformat a GPT disk You can also use the gpt switch with the wipe switch in DOS to delete a dynamic disk The syntax for this command is as follows gdisk disk gpt wipe Table 5 5 lists the gpt...

Страница 65: ...text file If the name of a text file is supplied along with the batch mode switch GDisk opens the file and executes the commands within it until all commands have been executed or one of the commands...

Страница 66: ...el all gdisk 2 y cre pri 32 for q gdisk 2 y cre ext gdisk 2 y cre log 32 for q Batch files may be nested recursively For example a second file called Std_init txt contains the following lines 1 batch...

Страница 67: ...setting is 1 pri nth Deletes the nth extended partition as well as any logical partitions in the extended partition This switch is supported on MBR disks only The default setting is 1 ext nth Deletes...

Страница 68: ...tion Switch Represents the physical fixed disk from 1 to 128 n The disk number disk One of the following ALL All attached disks SYSTEM The disk containing the bootable OS disk Wipes the contents of th...

Страница 69: ...rea then it shall notify the user that it was found and ask the user whether this area should be unlocked so that it can be erased If the user requests that the area be unlocked then GDisk will attemp...

Страница 70: ...s start at 0 The optional arguments are as follows m sectors are displayed starting at the sector indicated in the view command If num m is not specified then GDisk defaults to displaying only one sec...

Страница 71: ...switches Explanation Switch Represents the physical fixed disk from 1 to 128 disk Activates a partition act Deactivates a partition act Indicates the partition to activate or deactivate Only primary...

Страница 72: ...00 XP boot menu The following modifications are supported Displaying a list of current boot entries Adding an entry to boot ini Removing an entry from boot ini Setting the default boot option and time...

Страница 73: ...ies Use the bootini switch to display the existing boot menu for the current Windows 2000 XP operating system The syntax for this command is as follows gdisk32 bootini inifile filename Adding an entry...

Страница 74: ...lder folder Restarts after the execution of the command r Adding an entry to start Windows 2000 XP The syntax for this command is as follows gdisk32 bootini add d disknumber p partno desc description...

Страница 75: ...ss The entry has the following format full path to boot sector file boot sector file description For example C bootos2s dat Boot OS 2 System When adding this entry GDisk does the following Reads the f...

Страница 76: ...is the only entry in boot ini Setting the default boot option and timeout Use the default switch to set the default boot option and timeout The syntax for this command is as follows gdisk32 bootini de...

Страница 77: ...which translates to a capacity greater than 7 8 GB GDisk can directly access hard disks through the IDE controller or ASPI interface provided by an ASPI driver Take care when creating partitions for o...

Страница 78: ...Managing partitions using GDisk Support for large hard disks 78...

Страница 79: ...utility for manipulating files and directories in a locally attached NTFS FAT or EXT3 file system including hidden partitions OmniFS exe performs these functions from DOS or WinPE OmniFS32 performs th...

Страница 80: ...switches The following interfaces are supported for OmniFS exe OmniFS32 exe and omnifs for Linux Performs the file operation and exits It uses the exit code to signal whether or not the operation was...

Страница 81: ...i disks are read only ad image file name addDisk image file name Handles the code page in the same way as the current OEM page The code page is specified as a number cp codepage Specifies that the pre...

Страница 82: ...Note the following Use this switch with caution Avoid using the forceusb switch to take over a USB controller from a driver for example the Ghost peer to peer USB driver You may encounter problems if...

Страница 83: ...on a computer In all cases the characters distinguish the volume identifier from the path name For example the output of c omnifs info might look like the following M Maxtor 4 G100H5 GAK8 S G5001MGF...

Страница 84: ...llows attrib r r s s h h w w x x source Table 6 3 lists the attributes Some attributes are not available for some file systems Table 6 3 Attribute descriptions Description Attribute Readable r System...

Страница 85: ...his case the destination argument must point to a valid directory The last portion of the destination path is created if required If the first argument points to a file and the second argument points...

Страница 86: ...all subdirectories are deleted before the directory is deleted Listing a folder The syntax for the directory listing command is as follows dir source The source argument must be specified as an absol...

Страница 87: ...ept for the last directory must exist For example mkdir 2 1 user test The directory 2 1 user must already exist Using OmniFS to recover files If a Clone task has failed on a client computer and the co...

Страница 88: ...directory listing from the File Preservation Metadata File of the preserved files if the File Preservation Metadata File is not in the current directory If a path is not included a full listing is di...

Страница 89: ...recognized by the utility uses the following rules Each line in the script file begins with the operation and is followed by all of the required arguments for the nominated operation When specifying o...

Страница 90: ...h a script file This scenario uses a batch file and a script file to copy delete and rename files on a volume that is not recognized by the operating system on the computer Following are the contents...

Страница 91: ...wever uses UTC Universal Time Coordinated dates and times also known as Greenwich Mean Time Therefore to set the date and time data correctly OmniFS needs to know the time zone that the computer is in...

Страница 92: ...examples with part hour time differences India Delhi set TZ IST 5 30 Nepal Katmandu set TZ NST 5 45 These settings are in contrast to Windows times zones which are the number of hours East of Greenwi...

Страница 93: ...egEdit About GhRegEdit GhRegEdit lets you edit Windows registry keys and values Table 7 1 lists the versions of GhRegEdit Table 7 1 GhRegEdit versions Operating system Executable PC DOS MS DOS GhRegEd...

Страница 94: ...the operating system runs All GhRegEdt command line switches can be run with GhRegEdit32 Where the Windows directory is listed as a parameter it is not optional if you are running GhRegEdit in DOS The...

Страница 95: ...with names that contain spaces on page 83 Note The format for displaying in GhRegEdit is disk partition not disk partition To access registry files stored in an NTFS partition from within DOS you mus...

Страница 96: ...the key operations switches Table 7 4 GhRegEdit key switches Description Switch Adds the specified key to the registry as follows Windowsdir is the location of the Windows directory For example 1 1 W...

Страница 97: ...ample ghregedt enumkey 1 1 Windows HKEY_LOCAL_MACHINE Software enumkey windowsdir key Exports the key with subkeys as follows Windowsdir is the location of the Windows directory For example 1 1 Window...

Страница 98: ...e ghregedt addvalue 1 1 Windows HKEY_LOCAL_MACHINE Software MyTestApp REG_SZ This is my test app If you add a value of type REG_MULTI_SZ multiple strings you must use the following syntax addvalue WIN...

Страница 99: ...e operation executes on the default value For example ghregedt delvalue 1 1 Windows HKEY_LOCAL_MACHINE Software MyTestApp Version delvalue windowsdir key value Enumerates the specified key s value as...

Страница 100: ...Editing registry keys and values using GhRegEdit Using GhRegEdit 100...

Страница 101: ...ver Setting Auto Start parameters Setting the data transfer mode Controlling the amount of network bandwidth used Viewing and changing GhostCast Server session options Running Ghost exe on a client co...

Страница 102: ...rk server restores image files to multiple clients or creates an image file from a single connected client On a client workstation Ghost exe receives and writes the image file to the local disk GhostC...

Страница 103: ...a Symantec Ghost image Set up a computer with Windows and all of its drivers installed and configured as you want all of your computers configured You may need to create a model computer for each uni...

Страница 104: ...boot package for the client computers you can run a GhostCast session To start a GhostCast session 1 On the GhostCast Server computer on the Windows taskbar click Start Programs Symantec Ghost GhostC...

Страница 105: ...tion click Partition 4 Click Accept Clients to accept the client computer into the session The Accept Clients button becomes active when all boxes are filled in 5 Start Ghost exe on the destination cl...

Страница 106: ...which to take an image 7 Click OK 8 Select the partition from which to take an image if required 9 Click OK 10 Select the level of compression that you require 11 Click Yes to begin See Running Ghost...

Страница 107: ...s are filled out 6 Join the client computers to the GhostCast session See To join a GhostCast session to restore an image file to client computers on page 108 7 Click Send to start the image restore a...

Страница 108: ...he client computers that are connected and waiting for the GhostCast session to start appear in the Connected Clients list along with their status Controlling the GhostCast session from the server In...

Страница 109: ...lick Accept Clients to accept the client computer into the session 7 Start the client computers in DOS 8 Run Ghost exe using the ja switch to log on to the GhostCast session from the command line ghos...

Страница 110: ...mode prestore src mcSessionNm dst 1 1 sure rb Only use the sure switch when you are sure that you are writing to the intended disk or partition 6 Click Accept Clients to accept the client computer in...

Страница 111: ...s until the tenth client Once the tenth and final client is accepted the server stops accepting clients and starts sending out to the connected client computers To use the number of clients parameter...

Страница 112: ...llowing reasons Only one stream of data is sent out for all clients Multicasting sends packets only to client computers that have requested data from the GhostCast Server This requires the support of...

Страница 113: ...ipients of image files If your network hardware does not support multicasting then limiting bandwidth is helpful in many situations Table 8 2 provides a guide to network hardware setups and when you m...

Страница 114: ...ict if you run two or more GhostCast operations simultaneously This option should be used by advanced users only To view or record GhostCast Server options 1 On the File menu click Options 2 If you wa...

Страница 115: ...stored in a configuration file Wattcp cfg that is located in the same directory as Ghost exe As with all Symantec Ghost applications DHCP BOOTP and manually set IP addresses are supported Use the Sym...

Страница 116: ...Using GhostCasting to create and restore images Running Ghost exe on a client computer 116...

Страница 117: ...e Symantec GhostCast Server from the command line by including switches with ghostsrv You can run GhostCast Server from the command line Use a batch file or third party scheduler application to start...

Страница 118: ...nnection Ominutes Creates a log file specifying log level E S W I or A The log level x can be E errors S statistics W warnings I information or A all in increasing order of logging detail Llevel Speci...

Страница 119: ...is the number of megabytes per minute HLxxx Sets the maximum amount of bandwidth consumed while creating an image where xxx is the number of megabytes per minute HDxxx Sets the multicasting time to li...

Страница 120: ...n page 104 ghostsrv exe c test123 gho TestSession Restoring a disk image file onto client computers Starts a GhostCast session called TestSession and uses the second partition in the image file c test...

Страница 121: ...uses the image file c test123 gho The connecting clients IP addresses appear on screen At either half past one in the afternoon 1 30 PM or after 10 clients join the session transmission starts automat...

Страница 122: ...GhostCasting from the command line GhostCast Server command line options 122...

Страница 123: ...tup computer to have the following A unique IP address The correct subnet mask The default gateway optional Specify the TCP IP configuration parameters using one of the following methods Locally on a...

Страница 124: ...CP and BOOTP applications are available for various operating systems and can be used with GhostCasting If you are GhostCasting to many clients not having to edit a unique Wattcp cfg file on every cli...

Страница 125: ...tandards that are detailed in the following documents U S Department of Defense NISPOM National Industrial Security Program Operating Manual DoD 5220 22 M January 1995 The NISPOM document is available...

Страница 126: ...le locations with a character its complement then a random character and verify Note This method is not approved for sanitizing media that contains Top Secret information d Destroy disintegrate incine...

Страница 127: ...at sector n of a physical disk by default 1 sector is displayed Viewing a disk About completeness of coverage Table A 3 details the control that GDisk has over the disk and therefore the completeness...

Страница 128: ...e view n command to view the overwrite pattern on the disk to confirm the overwrite has occurred by sampling You can use the view n command line switch to display one or more sectors starting at n of...

Страница 129: ...is not addressable by GDisk Inaccurate disk geometry detection An error in determining the disk size could result in non accessibility Specialized disk commands Specialized disk commands such as thos...

Страница 130: ...GDisk disk wipe specifications Determining disk size 130...

Страница 131: ...hes Interactively with selected switches Automated in batch files batch mode The Symantec Ghost command line switches are used to alter Symantec Ghost behavior and automate procedures A hyphen or a sl...

Страница 132: ...e The command line switch file can include any Symantec Ghost command line switch The Symantec Ghost command line switch file must be a text file with each switch on a separate line This lets you exce...

Страница 133: ...riting to disk If this switch is set and the target partition is FAT Symantec Ghost checks for and works around bad sectors and all free sectors are verified This option may slow Symantec Ghost operat...

Страница 134: ...ng the CRC32 switch on page 157 CRC32 Ignores CRC errors CRC errors indicate data corruption This switch overrides CRC error detection and may allow a corrupted image file to be used Using this switch...

Страница 135: ...nd ghost dlist CDEFG instructs Symantec Ghost to look for files on C D E F and G drives The path remains the same dlist drives Lets Symantec Ghost convert all FAT16 volumes to FAT32 volumes when the d...

Страница 136: ...a hard disk created by Symantec Ghost The fingerprint details include the process used to create the disk or partition and the time date and disk on which the operation was performed Reports the pres...

Страница 137: ...b Forces an attempt to use volume SNAPSHOT on volumes in preference to standard volume locking forcevolumesnapshot Forces destination partitions to be resized proportionally to their original size By...

Страница 138: ...e internal format of the partition it defaults to copying the files and directory structure Generally this is the best option However if a disk has been set up with special hidden security files that...

Страница 139: ...ge created with id id Disable parsing of Linux LVM volumes ignoreLVM Adds a single line image file description to the image file with the following restrictions Cannot include any new lines Cannot be...

Страница 140: ...me examples of type codes and provides example values Table B 2 Lockinfo type codes Value Based On Type Compaq Manufacturer M Deskpro EN Series SFF Product name P Award Software Version V H925CKH60020...

Страница 141: ...for the remainder of the image file that is being restored noauto Includes the hibernation and skip files in the image file These files are excluded by default See Hibernation and swap files on page 4...

Страница 142: ...lume to ensure that the disk is in a sound state before cloning ntic This switch forces Symantec Ghost to ignore the partition table system ids and instead to check the partition contents when detecti...

Страница 143: ...when troubleshooting prefos Preserves the specified files The task fails if the specified files do not exist To preserve files or directories other than the image file the syntax is as follows preserv...

Страница 144: ...switch disables status updates and user intervention quiet Restarts after finishing a restore or copy After completing a restore or copy operation the target computer must be restarted so that the ope...

Страница 145: ...ry skip readme txt Skips any file called Readme txt in any directory skip ghost dll Skips any file ending with dll in the Ghost directory skip progra 1 Skips the program files directory note the short...

Страница 146: ...Ghost partition This switch is intended to be used in the Additional command line in the Console All functionality of sze switches are supported See Setting a destination size for the clone switch on...

Страница 147: ...equivalent of selecting TCP IP Master from the main menu The IP address of the slave computer may be specified tcpm slave IP address The TCP IP slave mode switch causes Symantec Ghost to go into TCP I...

Страница 148: ...ansmission z2 High compression medium transmission z3 through z9 Higher compression slower transmission See Image files and volume spanning on page 36 z Accessing files Table B 3 lists the formats tha...

Страница 149: ...backup create Note The dump switch is replaced by the create switch The dump switch is still fully functional and is interchangeable with create Partition to partition copy pcopy File to partition re...

Страница 150: ...ice DVD FireWire hard disk disk create disk partition disk partition pcopy disk partition file partition GhostCast Server no partition specified tape partition CD image partition USB 1 1 and 2 0 Mass...

Страница 151: ...1 For example SRC 1 2 drive number disk The source image file name For example SRC g source gho A partition in an image file can also be specified For example SRC g source gho 2 Files can also be read...

Страница 152: ...ed during a restore that failed For example ghost recover clone mode p load src pf PF Preservation file SRC OS will take an image containing all volumes that have been mounted by the operating system...

Страница 153: ...a normal disk If the vmdk file does not exist Ghost will create it from scratch There are additional vmdk switches to control the creation of vmdk files filename file The name of the multicast sessio...

Страница 154: ...the target disk Due to partition size rounding and alignment issues 100 physical use of disk space may not be possible n mmP Indicates that the nth destination partition is to remain the same size on...

Страница 155: ...wo from an image file and resizes the destination partitions into a 60 20 20 allocation assuming that the image contains 3 partitions ghost exe clone mode restore src g 3prtdisk gho dst 2 sze1 60P sze...

Страница 156: ...e src VirtualMachine vmdk dst 1 ghost exe clone mode prestore src VirtualMachine vmdk 1 dst 1 1 Includes all mounted volumes in the image ghost32 exe clone mode create src OS dst allvols gho Includes...

Страница 157: ...rify it against a disk The full syntax for this switch is as follows CRC32 action create verify pcreate pverify dcreate dverify src disk partition file crcfile file partition vlist file vexcept file T...

Страница 158: ...xt This example uses disk 2 as the source drive and the output file ghost exe crc32 action create src 2 crcfile myfile txt Verifies the contents of the primary disk against a default ASCII CRC32 file...

Страница 159: ...ny files containing the letters br such as Brxyz txt Abr txt and Abc dbr The specification of WINDOWS COOKIES in the previous example means match all files in the WINDOWS COOKIES subdirectory that hav...

Страница 160: ...rtual Partition is displayed with the volume label VPSGHBOOT Therefore the partition numbering that you can see in GDisk is not the same as the partition numbering in Ghost exe Command line switches A...

Страница 161: ...itive to any possible changes in Ext2 3 file systems and LILO and GRUB specifications If changes are made to these specifications Symantec Ghost may no longer support the Linux distribution Symantec G...

Страница 162: ...Note It is recommended that you use GRUB in preference to LILO GRUB Ghost supports version 22 5 1 and earlier of LILO It only supports the linear mode not the lba32 mode This means the boot files must...

Страница 163: ...ort having the journal on another device but this is an extremely uncommon case Journaling H tree directory indexes are not cloned but can easily be recreated by the user after the restore operation H...

Страница 164: ...s may cause Ghost to fail Symantec Ghost can copy or clone the following versions of Linux in their default configurations Red Hat Enterprise Linux ES release 5 1 Red Hat Enterprise Linux ES release 5...

Страница 165: ...1 Fedora Core 8 Werewolf Ubuntu 7 10 Gutsy Gibbon SuSE Linux Enterprise Server 10 Symantec Ghost utility support Ghost Explorer substantially supports Ext2 3 file systems within image files including...

Страница 166: ...Ghost for Linux Symantec Ghost utility support 166...

Страница 167: ...nsole client port configuration Volume Type Destination port Destination address Source port Sent by Stage 1 Server Discovery Low UDP 1345 229 55 150 208 1346 Client Low UDP 137 WINS server Varies Cli...

Страница 168: ...Varies Client IP 6666 Server Stage 2 Status update Low to Medium TCP Varies Server IP Varies Client Low to medium TCP Varies Client IP Varies Server Stage 3 Task execution High UDP Varies Server IP 77...

Страница 169: ...ts that must be open in a firewall to allow the GhostCast unicasting to work Table D 4 GhostCast server unicasting port configuration Volume Type Destination port Destination address Source port Sent...

Страница 170: ...Configuring firewalls Symantec Ghost port configuration 170...

Страница 171: ...mation about Ghost exe error messages is available on the Symantec Ghost Technical Support Web site www symantec com techsupp Table E 1 details some error messages that you may encounter Table E 1 Err...

Страница 172: ...en allocated that is already in use 19916 The GhostCast session is set up incorrectly Ensure that the TCP IP settings are correct 19900 If you restore an image to a disk configured as a dynamic disk w...

Страница 173: ...rors that may occur when using Ghost with NTFS files Table E 2 Errors when using Ghost with NTFS files Description Error message This error occurs when Ghost has finished mapping the location of disk...

Страница 174: ...to the cluster mappings and the subsequent space required to store the mappings Error 25058 Unable to locate enough contiguous free space to load run Increase the destination partition size or run Gh...

Страница 175: ...hat you are experiencing Table E 3 Symantec GhostCast errors Solution Problem Symantec Ghost uses a packet driver or NDIS2 drivers to perform GhostCasting If Symantec Ghost does not detect a packet dr...

Страница 176: ...n also try pinging the IP address of the client computer from the server computer If you are not able to ping the client there is a communicationproblem andIPpacketsarenotbeingpassed between these com...

Страница 177: ...r code Cloning Windows 2000 XP computers If a Windows 2000 XP computer fails to start after being cloned it may not have the correct mass storage controller driver configured and loaded for the hardwa...

Страница 178: ...drive A first and drive C second Setup programs vary from one manufacturer to the next If you cannot find the Boot Sequence option use the Setup program s Help system refer to the documentation that c...

Страница 179: ...ing system About cancelling a Ghost exe operation If you start a Ghost exe operation you can abort the process by pressing Ctrl C Be aware that pressing Ctrl C leaves the destination image file disk o...

Страница 180: ...Troubleshooting Problems running Symantec Ghost 180...

Страница 181: ...Cast Server 105 locally 14 bad clusters 137 bad sectors 133 137 batch switch 133 bfc switch 133 BIOS about 140 reporting drives 135 BitLocker Drive Encryption 34 39 blue screen troubleshooting 178 boo...

Страница 182: ...a switch 134 D data checking 35 compression 34 data transfer mode 111 network traffic 101 dd switch 135 defragmentation 48 Department of Defense requirements GDisk 56 66 Deploy Anywhere running from c...

Страница 183: ...file to disk restore 149 file to partition restore 149 files copying 85 deleting 86 files continued manipulating 79 paths 148 recovering 87 renaming 85 setting an attribute 84 skipping 145 finger swit...

Страница 184: ...examples 119 command line options 118 connecting to a session 139 GhostCast Server continued creating 104 creating image file 105 data transfer mode 111 direct broadcast 111 IP address 139 jm switch...

Страница 185: ...File Selection dialog box 141 image files adding files 47 image files continued compiling 48 compression 20 22 34 crc See CRC32 switch creating 19 22 37 creating using GhostCast Server 105 default spl...

Страница 186: ...mode switch 149 model computer creating 103 Multicast about 101 address 114 connection 105 jm switch 140 Multicast continued network bandwidth 113 time to live 114 N network improving performance 113...

Страница 187: ...rored 142 partition to file backup 149 partition to partition copy 149 password image file 144 paths specifying 148 PC DOS limitation 47 pcopy switch 149 pcreate switch 149 pdump switch 149 peer to pe...

Страница 188: ...earch 135 naming 134 141 split image file compiling 48 creating 146 GhostCast 102 split switch 102 146 status update 144 sure switch 146 swap files 41 switches Ghost command line 131 Symantec Ghost fi...

Страница 189: ...OmniFS 81 vdw switch 147 ver switch 147 verify command 147 version Symantec Ghost 147 vexcept switch 159 virtual partition numbering 159 Vista support 62 133 vmdk image file mounting to GDisk 59 mount...

Отзывы: