A parallel connection cable
LPT
A USB 1.1 cable
USB
A network connection
TCP peer-to-peer
In a peer-to-peer operation, one computer is designated the master computer,
and the other is designated the slave computer.
Table 1-1
describes the possible Ghost.exe processes and the master/slave
relationships that exist within these processes.
Table 1-1
Master and slave computers
Slave
Master
Action
Computer containing
destination disk
Computer containing
source disk
Disk-to-disk clone
Computer receiving
destination image file
Computer containing
source disk
Back up disk to image file
Computer containing
source image file
Computer containing
destination disk
Restore disk from image file
Computer containing
destination partition
Computer containing
source partition
Partition-to-partition clone
Computer receiving
destination image file
Computer containing
source partition
Back up partition to image file
Computer containing
source image file
Computer containing
destination partition
Restore partition from image file
Select which computer is the master (the computer from which you control the
connection) and which is the slave (the other computer participating in the
connection). All operator input must occur on the master computer.
You must have two Ghost boot packages with which to start both the master and
slave computers. You can create the boot packages using the Ghost Boot Wizard.
Note:
You must create both boot packages in the same version of Symantec Ghost.
You cannot use one boot disk that was created in Symantec Ghost 8.0 and one
boot disk that was created in Symantec Ghost 11.5 in the same task.
17
Using Symantec Ghost as a stand-alone program
Establishing a peer-to-peer connection with Ghost.exe
Содержание GHOST IMAGING FOUNDATION 7.1
Страница 1: ...Symantec Ghost Imaging Foundation 7 1...
Страница 3: ...Symantec Corporation 20330 Stevens Creek Blvd Cupertino CA 95014 http www symantec com...
Страница 78: ...Managing partitions using GDisk Support for large hard disks 78...
Страница 100: ...Editing registry keys and values using GhRegEdit Using GhRegEdit 100...
Страница 116: ...Using GhostCasting to create and restore images Running Ghost exe on a client computer 116...
Страница 122: ...GhostCasting from the command line GhostCast Server command line options 122...
Страница 130: ...GDisk disk wipe specifications Determining disk size 130...
Страница 166: ...Ghost for Linux Symantec Ghost utility support 166...
Страница 170: ...Configuring firewalls Symantec Ghost port configuration 170...
Страница 180: ...Troubleshooting Problems running Symantec Ghost 180...