Table of Contents

Advertisement

Quick Links

Symantec Ghost Imaging
Foundation
7.1

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the GHOST IMAGING FOUNDATION 7.1 - V1.0 and is the answer not in the manual?

Questions and answers

Summary of Contents for Symantec GHOST IMAGING FOUNDATION 7.1 - V1.0

  • Page 1 Symantec Ghost Imaging Foundation...
  • Page 2 Legal Notice Copyright © 2008 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners.
  • Page 3 Symantec Corporation 20330 Stevens Creek Blvd. Cupertino, CA 95014 http://www.symantec.com...
  • Page 4: Technical Support

    The Technical Support group also creates content for our online Knowledge Base. The Technical Support group works collaboratively with the other functional areas within Symantec to answer your questions in a timely fashion. For example, the Technical Support group works with Product Engineering and Symantec Security Response to provide alerting services and virus definition updates.
  • Page 5 Troubleshooting that was performed before contacting Symantec Recent software configuration changes and network changes Licensing and registration If your Symantec product requires registration or a license key, access our technical support Web page at the following URL: www.symantec.com/techsupp/ Customer service Customer service information is available at the following URL: www.symantec.com/techsupp/...
  • Page 6 North America and Latin America supportsolutions@symantec.com Additional enterprise services Symantec offers a comprehensive set of services that allow you to maximize your investment in Symantec products and to develop your knowledge, expertise, and global insight, which enable you to manage your business risks proactively.
  • Page 7: Table Of Contents

    Adding switches to your Ghost.exe operation ........30 Running Ghost32.exe in Windows ........... 31 Compatibility with Ghost.exe ........... 32 Chapter 2 Symantec Ghost support for image files and disks ................. 33 About Symantec Ghost image files ..........33 Image files and compression ............34 Performance on a network ............
  • Page 8 Contents Restoring from a spanned image ..........38 Image files and tape drives ............. 38 Drives with BitLocker Drive Encryption ........... 39 Dynamic disks in Windows Vista/XP/2003/2000 ........ 39 Support for Disk Drive Overlays (DDO) ..........40 Hibernation and swap files ............. 41 Backing up or migrating a server .............
  • Page 9 Contents Performing multiple GDisk operations using batch mode ....65 Deleting and wiping your disk ............66 Wiping Host Protected Areas (HPA)/PARTIES ......69 Confirming a disk wipe ............70 Activating or deactivating a partition ..........71 Hiding or unhiding a partition ............71 Modifying the Windows 2000/XP boot menu ........
  • Page 10 Contents Chapter 7 Editing registry keys and values using GhRegEdit ............... 93 About GhRegEdit ................. 93 Using GhRegEdit ................94 Chapter 8 Using GhostCasting to create and restore images ................101 About GhostCasting ..............101 Splitting images in a GhostCast operation ......... 102 Preparing for GhostCasting ............
  • Page 11 ..............173 About using Ghost with NTFS files .......... 173 Symantec GhostCast errors ............175 Symantec Ghost and legacy network cards ........177 Problems running Symantec Ghost ..........177 Cloning Windows 2000/XP computers ........177 Vista partition restore ............177...
  • Page 12 Contents Cannot start from drive A ............178 Windows blue screen ............178 Missing hibernation file ............178 About cancelling a Ghost.exe operation ........179 Index ........................181...
  • Page 13: Using Symantec Ghost As A Stand-Alone Program

    Chapter Using Symantec Ghost as a stand-alone program This chapter includes the following topics: About Ghost.exe Using Ghost.exe on a stand-alone computer Starting Ghost.exe Using Ghost.exe with a mapped network drive Establishing a peer-to-peer connection with Ghost.exe Creating a backup image file...
  • Page 14: Using Ghost.exe On A Stand-Alone Computer

    Using Symantec Ghost as a stand-alone program Using Ghost.exe on a stand-alone computer Note: For Ghost32, VMDK images are supported for all normal operations, and PQI and V2I images are supported as a source (but not as a destination) in all cloning operations.
  • Page 15: Starting Ghost.exe

    Using Symantec Ghost as a stand-alone program Starting Ghost.exe Do one of the following for operations other than checking an image: Select the destination hard disk or partition. Select the image file. Warning: Make sure that you select the correct destination. The destination disk is completely overwritten with no chance of recovering any data.
  • Page 16: Establishing A Peer-To-Peer Connection With Ghost.exe

    Using Symantec Ghost as a stand-alone program Establishing a peer-to-peer connection with Ghost.exe You must use a mapped network boot package created from the Ghost Boot Wizard. If the boot package contains Ghost.exe then you cannot save the package to a floppy disk set.
  • Page 17 Note: You must create both boot packages in the same version of Symantec Ghost. You cannot use one boot disk that was created in Symantec Ghost 8.0 and one boot disk that was created in Symantec Ghost 11.5 in the same task.
  • Page 18 Using Symantec Ghost as a stand-alone program Establishing a peer-to-peer connection with Ghost.exe To establish a peer-to-peer connection with Ghost.exe Do one of the following: On the master computer, insert the first Ghost boot disk into the floppy disk drive, and then restart the computer.
  • Page 19: About Splitting Images In A Peer-To-Peer Operation

    Using Symantec Ghost as a stand-alone program Creating a backup image file About splitting images in a peer-to-peer operation When you perform a peer-to-peer operation, an image is split when it reaches 2 GB in size unless you have set the split size to another value using the -split command switch.
  • Page 20 Using Symantec Ghost as a stand-alone program Creating a backup image file To back up a disk to an image file On the Ghost.exe main menu, do one of the following: Local Click Local > Disk > To Image. Peer-to-peer connection Click Disk >...
  • Page 21: Backing Up A Partition To An Image File

    Using Symantec Ghost as a stand-alone program Creating a backup image file Do one of the following: To proceed with the image file Click Yes. creation The system performs an integrity check of the file structure on the source disk. The source disk is then copied to the destination image file.
  • Page 22 Using Symantec Ghost as a stand-alone program Creating a backup image file In the File Locator dialog box, select the image file destination and name. In the Image file description box, type a description of the image file. Click Save.
  • Page 23: Restoring From An Image File

    Using Symantec Ghost as a stand-alone program Restoring from an image file Restoring from an image file You can restore a hard disk or a partition. The restore is made from a previously created image file that is stored on one of...
  • Page 24 Using Symantec Ghost as a stand-alone program Restoring from an image file In the Destination Drive dialog box, select the destination disk. Choose carefully as this is the disk that will be overwritten. The Destination Drive dialog box shows the details of every drive that Ghost.exe finds on the local computer.
  • Page 25: Restoring A Partition From An Image File

    Verify the integrity of the destination disk. “Verifying integrity” on page 30. You can also run Symantec Disk Doctor, Chkdsk, ScanDisk, or a similar utility to verify the integrity of the destination disk. Restoring a partition from an image file When you restore a partition, it is overwritten by the data from an image file.
  • Page 26: Cloning Disks And Partitions

    Verify the integrity of the destination partition. “Verifying integrity” on page 30. You can also run Symantec Disk Doctor, Chkdsk, ScanDisk, or a similar utility to verify the integrity of the destination partition. Cloning disks and partitions By default, Ghost.exe tries to maintain the same size ratio between new disk...
  • Page 27: Cloning Disk To Disk

    Using Symantec Ghost as a stand-alone program Cloning disks and partitions You can change the size of any destination FAT, NTFS, or Linux Ext2/3 partition by entering the new size in megabytes. You cannot enter a value that exceeds the available space, is beyond the file system's limitations, or that is not large enough to contain the data held in the source partition.
  • Page 28: Cloning Partition To Partition

    Verify the integrity of the destination disk. “Verifying integrity” on page 30. You can also run Symantec Disk Doctor, Chkdsk, ScanDisk, or a similar utility to verify the integrity of the destination disk. Cloning partition to partition When you clone partition to partition, Ghost.exe copies the contents of one partition onto another.
  • Page 29 Restart the destination computer when the partition copy is complete. Verify the integrity of the destination partition. “Verifying integrity” on page 30. You can also run Symantec Disk Doctor, Chkdsk, ScanDisk, or a similar utility to verify the integrity of the destination partition.
  • Page 30: Verifying Integrity

    Using Symantec Ghost as a stand-alone program Verifying integrity Verifying integrity After a backup, restore, or clone operation, check the integrity of the partition, hard disk, or image file. To verify the integrity of an image file On the computer on which the image file is saved, on the main menu, do one...
  • Page 31: Running Ghost32.Exe In Windows

    Using Symantec Ghost as a stand-alone program Running Ghost32.exe in Windows To add switches to your Ghost.exe operation On the main menu, click Options. Select from the following the options to include in your current cloning task. Span/CRC -span, -auto, -cns, -crcignore, -fcr...
  • Page 32: Compatibility With Ghost.exe

    Ghost32.exe: Int86_32.dll Int86_16.dll You can find these files in the Symantec Ghost Solution Suite folder. To run Ghost32 in Microsoft Vista, you must run the command prompt as an administrator. To run the command prompt as an administrator On the taskbar, click Start >...
  • Page 33: Symantec Ghost Support For Image Files And Disks

    Backing up or migrating a server About Symantec Ghost image files You can create image files by using the Symantec Ghost executable, the GhostCast Server, or the Symantec Ghost Console. Symantec Ghost supports VMWare Disk images (.vmdk files) for both creating and restoring images.
  • Page 34: Image Files And Compression

    Splitting of media files Spanning across volumes Symantec Ghost images contain only the actual data on a disk. If you have a 9 GB drive with only 600 MB of data, the Symantec Ghost image is approximately 600 MB, or is smaller if you use compression.
  • Page 35: Image Files And Crc32

    Symantec Ghost support for image files and disks Image files and CRC32 When you use Symantec Ghost across a network, use the fast compression option. If disk space is at a premium, you can use higher compression, but it can affect speed.
  • Page 36: Image Files And Volume Spanning

    There are situations in which it is not practical to have a standard image file. Symantec Ghost can split an image file into segments (known as spans) that are limited to a user-specified size. For example, you may want to keep files created on your network drive limited to 100 MB so that you can transfer them easily in the future.
  • Page 37: Spanning Across Multiple Volumes And Limiting Span Sizes

    If Symantec Ghost determines that this is the case, it alerts you and asks whether to enable spanning. Symantec Ghost assumes that compression reduces the size of the image by one-third when it determines whether the image will fit.
  • Page 38: Restoring From A Spanned Image

    Ghost process, which might require you to reinsert the first disk in the span set. Symantec Ghost prompts you for the first disk in the span set and for subsequent volumes when restoring from an image.
  • Page 39: Drives With Bitlocker Drive Encryption

    Spanned, striped, and RAID-5 volumes are not supported by Symantec Ghost. You can back up an image of a partition on a disk in a dynamic disk set to an image file. If you back up a disk, then all of the partitions that Ghost supports on the disk, and only those partitions, are backed up to an image file.
  • Page 40: Support For Disk Drive Overlays (Ddo)

    Destination drive too small message, you must load the ASPI driver for the SCSI card. Without an ASPI driver, Symantec Ghost does not always detect the correct size of the SCSI drive and cannot determine whether the drive is large enough to hold the image.
  • Page 41: Hibernation And Swap Files

    Hibernation and swap files Hibernation and swap files When Symantec Ghost creates image files or clones, it does not include hibernation and swap files. These files are valid only for one Windows session, and when they are included in an image file, they make it significantly larger.
  • Page 42: Backing Up Or Migrating A Server

    Backing up or migrating a server Backing up or migrating a server You can use Symantec Ghost to back up or migrate a server. However, it is not recommended that you use Symantec Ghost to roll out an image of a server to multiple computers.
  • Page 43: Modifying Image File Contents With Ghost Explorer

    Chapter Modifying image file contents with Ghost Explorer This chapter includes the following topics: Using Ghost Explorer Viewing image files and their properties Launching a file Extracting a file or directory from an image file Modifying image files Listing the contents of an image file About image file spans Setting the default split options Compiling an image file...
  • Page 44: Viewing Image Files And Their Properties

    NTFS Linux Ext2/3 To open Ghost Explorer On the Windows taskbar, click Start > All Programs > Symantec Ghost > Ghost Explorer. To access a list of file commands Right-click a file or directory in Ghost Explorer to access a list of file commands.
  • Page 45: Launching A File

    Modifying image file contents with Ghost Explorer Launching a file To view an image file and the properties Open Ghost Explorer. “To open Ghost Explorer” on page 44. On the File menu, click Open. Select an image file. Click Open. On the File menu, click Properties to view the image file properties.
  • Page 46: Extracting A File Or Directory From An Image File

    Whether you can add, delete, or view an image file, or move files within an image file, depends on the version of Symantec Ghost that was used to create the image file. You can check the version of Symantec Ghost used to create your image file in the image file properties.
  • Page 47: Listing The Contents Of An Image File

    You can split an existing image file into smaller spans. This function is useful if, for example, you need to split a file into two or more files that can then be saved onto a CD/DVD drive that is unsupported by Symantec Ghost. After you split an image file you must compile it.
  • Page 48: Setting The Default Split Options

    Setting the default split options “Compiling an image file” on page 48. Note: If the CD/DVD drive is supported by Symantec Ghost, then as you create the image file you can save the image file directly to the CD/DVD. Setting the default split options Once this option is set, it becomes the default for all regenerated files.
  • Page 49: Using Ghost Explorer From The Command Line

    On the Windows taskbar, click Start > Programs > Accessories > Command Prompt. Type: c:\Program Files\Symantec\Ghost\Ghostexp This is the default path to Ghost Explorer. Press Enter. Ghost Explorer has a batch mode in which it carries out a single command and then exits.
  • Page 50: Using Ghost Explorer With Long File Names

    36. Using Ghost Explorer with long file names The image index created by versions of Symantec Ghost prior to 5.1c did not handle long file names containing double-byte characters correctly, such as file names in Asian or Eastern European languages. Ghost Explorer may be able to show these names properly by reading them directly from the image file instead of from the index.
  • Page 51: Running Deployanywhere From The Command Line

    Chapter Running DeployAnywhere from the command line This chapter includes the following topics: Running DeployAnywhere from the command line Adding new drivers to the Ghost Deploy Anywhere driver database Running DeployAnywhere from the command line The Deploy Anywhere feature lets you retarget an image to suit a computer that has different hardware from the model computer from which the image was created.
  • Page 52: Evaluating The Target Volume

    If you create a boot package using Ghost Boot Wizard, you can include the DeployAnywhere driver database with the image. Alternatively, you can copy it from your Ghost installation (C:\Documents and Settings\All Users\Application Data\Symantec\Ghost\Template) to the appropriate media. If you want, you can create your own driver database by copying a subset of the drivers from the DeployAnywhere driver database, and use it with this switch.
  • Page 53: Retargeting The Image

    Running DeployAnywhere from the command line Adding new drivers to the Ghost Deploy Anywhere driver database You need to ensure that the missing drivers are available in the DeployAnywhere driver database, and then run again. You use the Ghost Boot ghDplyAw32.exe Wizard to add new drivers to the DeployAnywhere driver database.
  • Page 54 Running DeployAnywhere from the command line Adding new drivers to the Ghost Deploy Anywhere driver database To add a new driver to the Ghost Deploy Anywhere driver database In the Windows PE Drivers window, click Add New Driver. In the New Windows Driver window, select the driver that you want to add and specify the appropriate driver details: Location The folder in which the driver is located.
  • Page 55: Managing Partitions Using Gdisk

    Modifying the Windows 2000/XP boot menu Support for large hard-disks About GDisk GDisk is a utility that lets you create partitions, reinitialize master boot records, delete data, and wipe your disks in many different ways. The following versions of GDisk are included with Symantec Ghost:...
  • Page 56: Running Gdisk

    To run gdisk for Linux, you must run as root. To run GDisk.exe Start your computer in DOS mode. At the DOS prompt, type Progra~1\Symantec\Ghost\GDisk followed by the required disk and switches. To run the command prompt as an administrator On the taskbar, click Start >...
  • Page 57: Overview Of The Main Command-Line Switches

    Overview of the main command-line switches To run GDisk32.exe On the Windows taskbar, open a command window. At the command prompt, type Program Files\Symantec \Ghost\GDisk32 followed by the required disk and switches. To run GDisk64.exe On the Windows taskbar, open a command window.
  • Page 58: Online Help For Command-Line Switches

    For example, to view the detailed Help file for Hide, type one of the following command lines: GDisk.exe C:\progra~1\symantec\ghost\gdisk /hide /? GDisk32.exe C:\progra~1\symantec\ghost\gdisk32 /hide /? Switches common to all GDisk commands Table 5-2 describes the switches for any of the main GDisk operations.
  • Page 59 Managing partitions using GDisk Overview of the main command-line switches Switches common to all GDisk commands Table 5-2 Switch Explanation /ad=image file Mounts the specified vmdk, pqi, v2i, or iv2i image file ("add" the image name as a disk). Once added, the disk can be used in all normal operations. /addDisk=image file name Prevents GDisk from using extended disk access support.
  • Page 60 Managing partitions using GDisk Overview of the main command-line switches Switches common to all GDisk commands (continued) Table 5-2 Switch Explanation /forceusb Forces USB support to start, even when the USB controller is being run by something else. The forceusb attempts to take over the USB Host Controller and then attempts to return it to the previous state once the Ghost operation is complete.
  • Page 61: Creating A Partition

    Managing partitions using GDisk Creating a partition Creating a partition The create command lets you create a partition and specify the parameters of the partition. The command uses the largest block of unused disk space to create the partition. You can specify the partition type and the partition size. You can use the /for switch with the create command to format the partition.
  • Page 62 Managing partitions using GDisk Creating a partition Create switches (continued) Table 5-3 Switch Explanation /log Creates a logical drive in the extended partition. This is supported for MBR only. /sz:MB Specifies the size of the partition in megabytes (MB). This is rounded up to the nearest cylinder.
  • Page 63: Reinitializing The Master Boot Record

    Managing partitions using GDisk Reinitializing the Master Boot Record Create switches (continued) Table 5-3 Switch Explanation /-32 Indicates that the partition is not formatted as FAT32. Limits primary and logical partitions to 2048 MB. Partitions over 16 MB are formatted as FAT16.
  • Page 64: Reinitializing Gpt Disks

    Managing partitions using GDisk Reinitializing GPT disks /mbr switches (continued) Table 5-4 Switch Explanation Preserves the disk signature. /replace: Replace the Master Boot Record with the specified mbr file. [filename] Clears the disk signature and sets it to 0. If you clear the disk signature on a Windows computer then the disk must be initialized by Windows before it can be used.
  • Page 65: Performing Multiple Gdisk Operations Using Batch Mode

    Managing partitions using GDisk Performing multiple GDisk operations using batch mode GDisk32.exe gdisk32 [disk] [/status] [/raw|lba] [/ser] Table 5-6 lists the status switches. /status switches Table 5-6 Switch Explanation disk Represents the physical fixed disk, from 1 to 128. /raw Shows the contents of the partition table in CHS or GPT form if used with the disk switch.
  • Page 66: Deleting And Wiping Your Disk

    Managing partitions using GDisk Deleting and wiping your disk lines are ignored. In the following example, the commands do not specify the fixed disk on which to operate: # delete all partitions /del /all # create formatted FAT16 primary DOS partition and then create an extended # partition /cre /pri /-32 /for /q /cre /ext...
  • Page 67 Managing partitions using GDisk Deleting and wiping your disk The /diskwipe switch wipes the entire disk, partitions, partition table, MBR, and all used and unused space. “About GDisk disk-wipe specifications” on page 125. Depending on the version of GDisk that you require, the syntax for the delete command is one of the following: GDisk gdisk disk /del {/pri[:nth]|/ext[:nth]|/log:nth|...
  • Page 68 Managing partitions using GDisk Deleting and wiping your disk /del switches (continued) Table 5-7 Switch Explanation /customwipe:n Overwrites the partition's data area n times before deleting the partition. You can set n from 1 to 100. The /customwipe:6 switch is equivalent to a sanitize /dodwipe operation.
  • Page 69: Wiping Host Protected Areas (Hpa)/Parties

    Managing partitions using GDisk Deleting and wiping your disk /diskwipe switches (continued) Table 5-8 Switch Explanation /keepghostboot Preserve the Ghost partition that was used to boot. Following are examples of the delete and wipe switches: gdisk 1 /del /all /qwipe completes one pass to delete all partitions and data on disk 1.
  • Page 70: Confirming A Disk Wipe

    Managing partitions using GDisk Deleting and wiping your disk /-hpa GDisk does not look for an HPA on the disk. For example: gdisk 1 /diskwipe /dodwipe /-hpa performs a DoD disk wipe without checking for an HPA on the disk. If an HPA area is present, it is not wiped.
  • Page 71: Activating Or Deactivating A Partition

    Managing partitions using GDisk Activating or deactivating a partition Viewing disk wipe output Figure 5-1 Activating or deactivating a partition A computer starts in an active partition. Using the /act or /-act switches, you can choose the partition to which the computer starts. Depending on the version of GDisk that you require, the syntax for this command is one of the following: GDisk.exe...
  • Page 72: Modifying The Windows 2000/Xp Boot Menu

    Managing partitions using GDisk Modifying the Windows 2000/XP boot menu GDisk32.exe gdisk32 disk /[-]hide /p:partn-no Table 5-10 lists the hide switches. /hide switches Table 5-10 Switch Explanation disk Represents the physical fixed disk, from 1 to 128. /hide Hides a partition. /-hide Unhides a partition.
  • Page 73: Specifying The Boot.ini Path And File Name

    Managing partitions using GDisk Modifying the Windows 2000/XP boot menu Original and copy names (continued) Table 5-11 Original boot.ini filename Boot.ini copy name Not named boot.ini and without a period. For _GDISK32_copy is appended to the end of example: the file name: myBootFile myBootFile_GDISK32_copy Specifying the boot.ini path and file name...
  • Page 74 Managing partitions using GDisk Modifying the Windows 2000/XP boot menu Boot.ini switches Table 5-12 Switch Explanation /bootini Modifies boot.ini. /add Creates a new entry in boot.ini. /d:diskno Represents the physical fixed disk, from 1 to 128. /p:partno Indicates the partition from which to boot. /desc:description Specifies the description to appear in the NT boot loader menu.
  • Page 75 Managing partitions using GDisk Modifying the Windows 2000/XP boot menu /winnt instructs GDisk32 to create an ARC style entry and must be used if the target operating system is Windows 2000/XP. If this switch is not used, then GDisk32 creates an entry as if the target operating system is not Windows 2000/XP.
  • Page 76: Removing An Entry From Boot.ini

    Managing partitions using GDisk Support for large hard-disks This produces a boot-sector file C:\bootos2.dat. Removing an entry from boot.ini The syntax to remove an entry from boot.ini is as follows: gdisk32 /bootini /remove /entry:number [/inifile:filename] [/r] Table 5-13 lists the remove switches. /remove switches Table 5-13 Switch...
  • Page 77 Managing partitions using GDisk Support for large hard-disks GDisk includes large disk-drive support for IDE and SCSI hard drives (disks that exceed the 1024 cylinder BIOS limitation, which translates to a capacity greater than 7.8 GB). GDisk can directly access hard disks through the IDE controller or ASPI interface provided by an ASPI driver.
  • Page 78 Managing partitions using GDisk Support for large hard-disks...
  • Page 79: Manipulating Files And Directories Using Omnifs

    Chapter Manipulating files and directories using OmniFS This chapter includes the following topics: About OmniFS OmniFS operating environments Using OmniFS OmniFS operations Using OmniFS to recover files Using a script file OmniFS scenarios OmniFS error handling Correcting the date and time About OmniFS OmniFS is a general-purpose utility for manipulating files and directories in a locally attached NTFS, FAT, or EXT3 file system (including hidden partitions).
  • Page 80: Omnifs Operating Environments

    Manipulating files and directories using OmniFS OmniFS operating environments OmniFS operating environments Table 6-1 lists the versions of OmniFS. OmniFS versions Table 6-1 Executable Operating system OmniFS.exe PC-DOS, MS-DOS omnifs Linux OmniFS32 Windows Vista/XP/2000 Long file names are supported on NTFS file systems, but support for long file names on FAT file systems depends on the operating system and access method.
  • Page 81: Access Method Switches

    Manipulating files and directories using OmniFS Using OmniFS To run the command prompt as an administrator On the taskbar, click Start > All Programs > Accessories, right-click Command Prompt and click Run as administrator. In the User Account Control dialog box, type the administrator credentials. Click OK.
  • Page 82 Manipulating files and directories using OmniFS Using OmniFS Access method switches (continued) Table 6-2 Switch Description /forceusb Forces USB support to start, even when the USB controller is being run by something else (DOS only).The -forceusb switch attempts to take over the USB Host Controller and then attempts to return it to the previous state once the Ghost operation is complete.
  • Page 83: Accessing Files And Folders With Names That Contain Spaces

    Manipulating files and directories using OmniFS Using OmniFS Accessing files and folders with names that contain spaces When using any of the OmniFS operations on files or folders that contain spaces in the file name or folder name, you must use one of these methods. To display the directory for the folder My Documents in volume 1, use one of the following: OmniFS dir “1.1:\My Documents”...
  • Page 84: Omnifs Operations

    Manipulating files and directories using OmniFS OmniFS operations OmniFS operations The supported OmniFS operations are as follows: Attrib Copy Rename Delete Deltree Info Help Version Mkdir Commands are not case sensitive. Setting the attribute for a file The syntax for the attrib command is as follows: attrib [+r][-r][+s][-s][+h][-h][+w][-w][+x][-x] <source>...
  • Page 85: Copying Files And Directories

    Manipulating files and directories using OmniFS OmniFS operations Copying files and directories The syntax for the copy command is as follows: copy <source> <destination> Both the source and destination arguments must be specified as absolute paths. For example, as follows: Copy a file from a volume that is copy a:\temp\test.txt 2:1\user\data.txt accessible to the current operating...
  • Page 86: Deleting A File

    Manipulating files and directories using OmniFS OmniFS operations Deleting a file The syntax for the delete command is as follows: delete <source> The source argument must be specified as an absolute path, and the path must be valid. No wildcard characters are accepted. For example: delete 2:1\user\data.txt A directory can be deleted only if it is empty.
  • Page 87: Listing The Commands

    Manipulating files and directories using OmniFS Using OmniFS to recover files Listing the commands The syntax for the help command is as follows: help The help command lists the OmniFS commands. Displaying the OmniFS version and copyright The syntax for the version command is as follows: version This command displays the OmniFS version number and copyright.
  • Page 88 Manipulating files and directories using OmniFS Using OmniFS to recover files Designating drives formats (continued) Table 6-4 Format Example Format disk_1\partition_2 omnifs dir pf:\disk_1\partition_2\data when the origin partition was NTFS or hidden FAT. Table 6-5 lists the commands you can use for recovering files. No other OmniFS commands are supported for use with the File Preservation Metadata File.
  • Page 89: Using A Script File

    Manipulating files and directories using OmniFS Using a script file OmniFS recovery commands (continued) Table 6-5 Command line Description omnifs delete pf:\source Deletes specified file. destination For example, omnifs delete pf:\1.2:\ghost: disk_0\partition_1\recovery\extra.txt Deletes the extra.txt file in the directory recovery listed in the File Preservation Metadata File that is in the Ghost directory on the second partition on the first disk.
  • Page 90: Omnifs Scenarios

    Manipulating files and directories using OmniFS OmniFS scenarios OmniFS scenarios OmniFS can be used from the command line with a batch file and with a script file. Using OmniFS from the command line In this scenario, OmniFS is executed from the command line. The user executes a single operation.
  • Page 91: Omnifs Error Handling

    Manipulating files and directories using OmniFS OmniFS error handling omnifs copy a:\temp\user.dat 2:1\user\profile.dat omnifs copy a:\userdir 2:1\user\data omnifs delete 2:1\user\data\copy.bat omnifs rename 2:1\user\data\catalog.cpy catalog.dat OmniFS error handling If an error occurs during the OmniFS operation, an error file, OmniFSer.txt, is created in the current directory.
  • Page 92 Manipulating files and directories using OmniFS Correcting the date and time There is no significance in the abbreviation string other than it must be three alphanumeric characters. Following are examples with part hour time differences: India (Delhi) set TZ=IST-5:30 Nepal (Katmandu) set TZ=NST-5:45 These settings are in contrast to Windows times zones, which are the number of hours East of Greenwich, in which Auckland would be GMT+12.
  • Page 93: Editing Registry Keys And Values Using Ghregedit

    Chapter Editing registry keys and values using GhRegEdit This chapter includes the following topics: About GhRegEdit Using GhRegEdit About GhRegEdit GhRegEdit lets you edit Windows registry keys and values. Table 7-1 lists the versions of GhRegEdit. GhRegEdit versions Table 7-1 Executable Operating system GhRegEdt.exe...
  • Page 94: Using Ghregedit

    Editing registry keys and values using GhRegEdit Using GhRegEdit Note: On a 64-bit operating system, you can run GhRegEdit64.exe to manipulate the registry as normal. You can also run GhRegEdit32 on a 64-bit operating system, where it manipulates the Wow6432Node. You need to specify the "wow64_64key" to make GhRegEdit32 function like GhRegEdit64 on 64-bit operating systems.
  • Page 95 Editing registry keys and values using GhRegEdit Using GhRegEdit GhRegEdit display switches Table 7-2 Switch Description -ad=image file Mounts the specified vmdk, pqi, v2i, or iv2i image file to GhRegEdit name ("add" the image as a disk). Once added, the disk can be used in all normal operations.
  • Page 96 Editing registry keys and values using GhRegEdit Using GhRegEdit GhRegEdit import and export switches (continued) Table 7-3 Switch Description export [windowsdir] filename Exports the entire registry as follows: Windowsdir is the location of the Windows directory. For example, 1.1:\Windows. Filename is the name and location of the .reg file. Key operations switches must include the hive and can only operate on the local computer (HKEY_LOCAL_MACHINE) or the local user (HKEY_USERS).
  • Page 97 Editing registry keys and values using GhRegEdit Using GhRegEdit GhRegEdit key switches (continued) Table 7-4 Switch Description enumkey [windowsdir] key Enumerates the subkeys for the specified key as follows: Windowsdir is the location of the Windows directory. For example, 1.1:\Windows. Key is the name and location of the key.
  • Page 98 Editing registry keys and values using GhRegEdit Using GhRegEdit GhRegEdit value switches Table 7-5 Switch Description addvalue Modifies the specified value as follows: [windowsdir] key Windowsdir is the location of the Windows directory. [value] type data For example, 1.1:\WINNT. Key is the name and location of the key to be modified. Value is the name of the value to be modified.
  • Page 99 Editing registry keys and values using GhRegEdit Using GhRegEdit GhRegEdit value switches (continued) Table 7-5 Switch Description delvalue Deletes the specified value as follows: [windowsdir] key Windowsdir is the location of the Windows directory. value For example, 1.1:\Windows. Key is the name and location of the key to be modified. Value is the name of the value to be modified.
  • Page 100 Editing registry keys and values using GhRegEdit Using GhRegEdit...
  • Page 101: Using Ghostcasting To Create And Restore Images

    Running Ghost.exe on a client computer About GhostCasting GhostCasting lets multiple computers running Symantec Ghost receive the same information over a computer network simultaneously. The GhostCast Server works with Ghost.exe to create an image file of a model computer or restore an...
  • Page 102: Splitting Images In A Ghostcast Operation

    Using GhostCasting to create and restore images About GhostCasting Symantec Ghost supports VMWare Disk images (.vmdk files) for both creating and restoring images. Symantec Ghost supports Backup Exec System Recovery (.v2i, .iv2i) and DeployCenter Library (.pqi) images for restoring a computer only.
  • Page 103: Preparing For Ghostcasting

    Create a model computer to serve as a template for client computers. This is the first step in creating a Symantec Ghost image. Set up a computer with Windows and all of its drivers installed and configured as you want all of your computers configured.
  • Page 104: Starting A Ghostcast Session

    GhostCast session. To start a GhostCast session On the GhostCast Server computer, on the Windows taskbar, click Start > Programs > Symantec Ghost > GhostCast Server. In the GhostCast Server window, in the Session Name box, type a session name.
  • Page 105: Creating An Image File

    Using GhostCasting to create and restore images Creating an image file Creating an image file To create an image file, you must first start a GhostCast session from the GhostCast Server. Once you create a session on the server, join the GhostCast session from the source computer.
  • Page 106: Restoring An Image File Onto Client Computers

    Using GhostCasting to create and restore images Restoring an image file onto client computers On the Ghost.exe menu, click GhostCasting, then select one of the following: Multicast Connect to the session using Multicasting Direct Broadcast Connect to the session using direct broadcasting Unicasting Connect to the session using Unicasting In the GhostCast Session Name to Join dialog box, type the session name.
  • Page 107 Using GhostCasting to create and restore images Restoring an image file onto client computers To restore an image onto client computers using the GhostCast Server Click Restore Image to send an image file to all connecting clients. Do one of the following: In the Image File box, type the name and full path of the image file containing the image.
  • Page 108: Controlling The Ghostcast Session From The Server

    Using GhostCasting to create and restore images Controlling the GhostCast session from the server To join a GhostCast session to restore an image file to client computers On the client computers, use the Ghost Boot Disk to start Ghost.exe. On the Ghost.exe menu, click GhostCasting, then select one of the following: Multicast Connect to the session using Multicasting Direct Broadcast...
  • Page 109 Using GhostCasting to create and restore images Controlling the GhostCast session from the server Add other switches to the command line to execute specific command-line options on the client computer, if required. For example, if the initial command is: -clone,mode=pcreate,src=2,dst=@mcSessionNm Add the following switches to avoid prompts and restart the client computer after the image has been extracted: -clone,mode=pcreate,src=2,dst=@mcSessionNm -sure -rb...
  • Page 110 Using GhostCasting to create and restore images Controlling the GhostCast session from the server In the Partition No. box, type the partition number, if required. In the Command line box, type the client clone command. Add other switches to the command line to execute specific commands on the client computer.
  • Page 111: Setting Auto Start Parameters

    Using GhostCasting to create and restore images Setting Auto Start parameters Setting Auto Start parameters When your GhostCast session includes restoring an image file to client computers, you can set the server to start the session automatically. The start time can be based on a single parameter or a combination of parameters.
  • Page 112 This requires the support of appropriately configured routers and switches. You can alter settings globally or for a GhostCast session. Symantec Ghost attempts to use Multicasting by default. If you have set the data transfer mode to Unicast or Directed broadcast, then Symantec Ghost uses that method.
  • Page 113: Controlling The Amount Of Network Bandwidth Used

    Controlling the amount of network bandwidth used Controlling the amount of network bandwidth used Symantec Ghost lets you control how much network bandwidth is used when GhostCasting. By using this functionality, you can avoid overloading the network with GhostCasting traffic.
  • Page 114: Viewing And Changing Ghostcast Server Session Options

    Select one of the following: Restart On Completion Restart the GhostCast Server, accepting clients and using the same Auto Start parameters. Close GhostCast Server On Close Symantec GhostCast Server once the session Completion is complete.
  • Page 115: Running Ghost.exe On A Client Computer

    The TCP/IP settings are stored in a configuration file Wattcp.cfg that is located in the same directory as Ghost.exe. As with all Symantec Ghost applications, DHCP, BOOTP, and manually set IP addresses are supported. Use the Symantec Ghost GhostCast client command-line switches to run Ghost.exe from the command line or in the GhostCast session.
  • Page 116 Using GhostCasting to create and restore images Running Ghost.exe on a client computer...
  • Page 117: Ghostcasting From The Command Line

    GhostCast Server command-line options About running GhostCast Server from the command line You can run the Symantec GhostCast Server from the command line by including switches with ghostsrv. You can run GhostCast Server from the command line. Use a batch file or third-party scheduler application to start the server.
  • Page 118: Starting The Ghostcast Session

    GhostCasting from the command line Starting the GhostCast session Starting the GhostCast session Once you have created a GhostCast session and the client computers have appeared on-screen, you can start the transmission. To start the session transmission When all clients have connected, click Start. GhostCast Server command-line options Table 9-1 lists the GhostCast Server command-line switches.
  • Page 119: Command-Line Option Examples Using Ghostcast Server

    GhostCasting from the command line GhostCast Server command-line options GhostCast Server switches (continued) Table 9-1 Switch Description -Mxxx.xxx.xxx.xxx Sets the multicast address to xxx.xxx.xxx.xxx. Addresses between 224.0.2.0—239.255.255.255 are valid. -Mxxx.xxx.xxx.xxx-xxx. Specifies a range of multicast addresses. The address is chosen xxx.xxx.xxx from within this range.
  • Page 120 GhostCasting from the command line GhostCast Server command-line options GhostCast Server command-line examples (continued) Table 9-2 Summary Syntax Description Creating an image file of a ghostsrv c:\test123.gho TestSession -d -p Starts a GhostCast session called partition from a client computer TestSession and creates or to an image file overwrites the image file c:\...
  • Page 121 GhostCasting from the command line GhostCast Server command-line options GhostCast Server command-line examples (continued) Table 9-2 Summary Syntax Description Specifying the number of clients ghostsrv c:\test123.gho TestSession -n10 Starts a GhostCast session called to Auto Start TestSession and uses the image file c:\test123.gho.
  • Page 122 GhostCasting from the command line GhostCast Server command-line options...
  • Page 123: Ghostcasting And Ip Addresses

    Chapter GhostCasting and IP addresses This chapter includes the following topics: About IP addresses for GhostCasting Locally specified IP addresses About using BOOTP/DHCP to assign IP addresses About IP addresses for GhostCasting An IP network using locally specified addresses requires each manually setup computer to have the following: A unique IP address The correct subnet mask...
  • Page 124: Examples Of Wattcp.cfg Client Configuration Files

    GhostCasting and IP addresses About using BOOTP/DHCP to assign IP addresses Examples of Wattcp.cfg client configuration files The following example displays the IP details on a computer and the details in the Wattcp.cfg file: IP details: IP address: 192.168.100.3 Subnet mask: 255.255.255.0 Default gateway: 192.168.100.1 Wattcp.cfg: IP = 192.168.100.3...
  • Page 125: Gdisk Disk-Wipe Specifications

    Appendix GDisk disk-wipe specifications This appendix includes the following topics: About GDisk disk-wipe specifications Clearing, sanitizing, and viewing hard disks About completeness of coverage Determining disk size About GDisk disk-wipe specifications GDisk is a tool for partitioning hard drives that also has a secure, disk-wiping function.
  • Page 126 GDisk disk-wipe specifications Clearing, sanitizing, and viewing hard disks Table A-1 is an extract from Section 8-306 of the NISPOM. Clearing and sanitizing a hard disk Table A-1 Magnetic disk type Clear Sanitize Bernoullis a, b, c Floppy disk a, b, c Non-removable rigid disk a,b,d,m Removable rigid disk...
  • Page 127: About Completeness Of Coverage

    GDisk disk-wipe specifications About completeness of coverage GDisk clearing, sanitizing or viewing operations (continued) Table A-2 Operation Description Sanitizing a disk GDisk performs a sanitize operation, as defined by action d, when performing a disk-wipe operation with the /diskwipe /dodwipe command modifier.
  • Page 128 GDisk disk-wipe specifications About completeness of coverage Completeness of coverage (continued) Table A-3 Control Description Wiping Host Protected During execution of a DoD disk wipe, GDisk attempts to detect an Area (HPA) PARTIES HPA/PARTIES area on the disk. If an HPA/PARTIES area is detected, then you are asked if this area is to be wiped.
  • Page 129: Determining Disk Size

    GDisk disk-wipe specifications Determining disk size Completeness of coverage (continued) Table A-3 Control Description Non-addressable There may be storage on the disk that is not directly addressable locations by GDisk. GDisk does not support the following features: Bad sector remapping The disk may have spare sectors available that are used to automatically remap, or substitute, bad sectors by the disk firmware.
  • Page 130 GDisk disk-wipe specifications Determining disk size...
  • Page 131: Command-Line Switches

    Interactively with no command-line switches Interactively with selected switches Automated in batch files (batch mode) The Symantec Ghost command-line switches are used to alter Symantec Ghost behavior and automate procedures. A hyphen (-) or a slash (/) must precede all switches except @filename. Switches are not case sensitive.
  • Page 132: Listing Command-Line Switches

    The command-line switch file can include any Symantec Ghost command-line switch. The Symantec Ghost command-line switch file must be a text file with each switch on a separate line. This lets you exceed the DOS command-line limit of 150 characters.
  • Page 133 -bfc Handles bad FAT clusters when writing to disk. If this switch is set and the target partition is FAT, Symantec Ghost checks for and works around bad sectors, and all free sectors are verified. This option may slow Symantec Ghost operation substantially.
  • Page 134 Reverts the naming of spanned files to the system used by versions of Symantec Ghost prior to Symantec Ghost 6.5. If this switch is not used, then the naming of spanned files conforms to Microsoft application guidelines. You do not need to use this switch when reading an existing file.
  • Page 135 FAT32. -f64 Lets Symantec Ghost resize FAT16 partitions to be larger than 2047 MB using 64 KB clusters. This is only supported by Windows 2000. Do not use on computers with other operating systems.
  • Page 136 Uses all available disk space when creating partitions. By default, Symantec Ghost often leaves a small amount of free space at the end of the disk. Because partitions must be aligned to cylinder boundaries, Symantec Ghost may leave up to 8 MB free even when -fis is specified. -fmbr Forces the disk to restore to a MBR-based disk.
  • Page 137 Symantec Ghost prompts the user to restart or exit when the operation has finished. If Symantec Ghost is run as part of a batch file, it is sometimes useful to exit back to the DOS prompt after completion so that further batch commands are processed.
  • Page 138 However, it is easiest to use the return value. The image all switch forces Symantec Ghost to perform a sector-by-sector copy of all partitions. By default, when copying a partition from a disk to an image file or to another disk, Symantec Ghost examines the source partition and decides whether to copy just the files and directory structure or to do a sector-by-sector copy.
  • Page 139 You will need an identical or larger disk than the original. Symantec Ghost does not wipe the destination disk when restoring from an -id image. Geometry differences between disks may leave tracks on the destination disk with their previous contents.
  • Page 140 -jm=[u|d|m] Use unicasting, direct broadcast, or multicasting. -js=n Sets to n the number of router hops Symantec Ghost is allowed to cross in an attempt to find the GhostCast Server. (Default is 16.) -limitswap Limits the Linux swap space to 2GB.
  • Page 141 Command-line switches Command-line switches -lps The LPT slave mode switch causes Symantec Ghost to automatically go into LPT slave mode and is the equivalent of selecting LPT Slave from the main menu. -mcyl=[1022|1023] Forces the cylinder value to either 1022 or 1023 when the cylinder value is insufficient to address the whole partition.
  • Page 142 Attempts to arrange the restored NTFS volume in the same way as the source volume. -ntic Ignores the NTFS volume CHKDSK bit. Symantec Ghost checks the CHKDSK bit on an NTFS volume before performing operations. When Symantec Ghost indicates that the CHDSK bit is set, you should run CHKDSK on the volume to ensure that the disk is in a sound state before cloning.
  • Page 143 -prefghst If Symantec Ghost has a choice, it attempts to use internal Ghost file system access as opposed to using the operating system for file system access. This switch is intended for use under instruction from Symantec Technical Support when troubleshooting.
  • Page 144 Specifies that password protection be used when creating an image file. x indicates the password for the image file. If no password is given in the switch, Symantec Ghost prompts for one. You can enter a maximum of 10 alphanumeric characters.
  • Page 145 Command-line switches -skip=x The skip file switch causes Symantec Ghost to exclude the indicated files during a create or restore operation. A skip entry can specify a single file, a directory, or multiple files using the * wildcard. File names must be given in short file name format and all path names are absolute.
  • Page 146 “Setting a destination size for the clone switch” on page 154. -szee Forces Symantec Ghost to keep the sizes of all destination partitions the same size as in the source partition (no resizing). This switch can be used with or without the -clone switch.
  • Page 147 -tapespeed=x Allows control of tape speed, where x is 0 to F. 0 is the default. 1 to F increases tape speed. Only use this when the tape does not work correctly at the speed used by Symantec Ghost. -tapeunbuffered Sets the ASPI driver to report a read/write as successful only when the data has been transferred to the tape drive.
  • Page 148: Accessing Files

    Command-line switches Accessing files -vmdkAdatper=val When creating a virtual disk (the virtual disk is the destination of the clone), this switch specifies the type of disk adapter for the created vmdk. The valid values are: lsiLogic (scsi) busLogic (scsi) Note: For SCSI adapters, choose busLogic for the Windows 2000 family or Windows XP.
  • Page 149: Defining The Type Of Clone Command

    Command-line switches Using the clone switch The syntax for the clone switch is: -clone,MODE={operation},SRC={source},DST={destination}, [SZE{size},SZE{size}..] Defining the type of clone command MODE defines the type of clone command. The syntax is as follows: MODE={copy | restore | create | pcopy | prestore | pcreate} Table B-4 lists the mode commands.
  • Page 150 Command-line switches Using the clone switch Cloning operations Table B-5 Mode Source Destination copy disk disk restore file (.gho, .vmdk, .pqi, .v2i, .iv2i) disk GhostCast Server tape CD-ROM USB 1.1 and 2.0 Mass Storage Device FireWire hard disk create disk file (.vmdk) GhostCast Server tape...
  • Page 151: Setting A Source For The Clone Switch

    Command-line switches Using the clone switch Setting a source for the clone switch The syntax for this switch is as follows: SRC={disk | file | multicast | tape | cd writer } SRC defines the source for the operation that is selected by the clone mode option. Table B-6 lists the source switches.
  • Page 152: Setting A Destination For The Clone Switch

    Command-line switches Using the clone switch Source options for cloning (continued) Table B-6 Switch Source Explanation CD ROM @CDx The CD or DVD drive number. If you have a CD reader and a CD writer, in the Ghost.exe user interface you would see @CD1 and @CD2. The number is optional if you are specifying an operation from the command line.
  • Page 153 Command-line switches Using the clone switch Destination options for cloning Table B-7 Switch Destination Explanation disk drive The destination disk drive number, such as DST=2. A partition on a drive can also be specified. For example: DST=2:1 To create a new partition, type a destination partition one greater than the existing number of partitions, if there is enough free space.
  • Page 154: Setting A Destination Size For The Clone Switch

    Command-line switches Using the clone switch Setting a destination size for the clone switch The SZE switch sets the size of the destination partitions for either a disk restore or disk copy operation. This is optional. Multiple partition size switches are supported.
  • Page 155 Command-line switches Using the clone switch Clone switch usage examples (continued) Table B-9 Switch Function ghost.exe -lpm Connects a master computer using LPT to another computer -clone,mode=create,src=2,dst=c:\drive2.gho running Ghost.exe in slave mode and saves a disk image of local disk two to the remote file c:\drive2.gho. The slave computer can be started with ghost.exe -lps.
  • Page 156: Batch File Example

    Symantec Ghost operation. Batch file contents: @ECHO OFF ghost.exe -clone,src=@mcSN,dst=1,sze1=450M,sze2=1599,sze3=2047M -batch IF ERRORLEVEL 1 GOTO PROBLEM ECHO Symantec Ghost exited with value 0 indicating success. REM ** Add any commands required to run if Symantec Ghost REM succeeds here** GOTO FINISH...
  • Page 157: Using The -Crc32 Switch

    Command-line switches Using the -CRC32 switch :PROBLEM ECHO Symantec Ghost returned with an Error value 1 or higher ECHO Symantec Ghost operation was not completed successfully REM **Add any commands required to run if Symantec Ghost REM fails here **...
  • Page 158: Examples Of -Crc32 Usage

    Command-line switches Using the -CRC32 switch Examples of -CRC32 usage Table B-11 provides some examples of how you can use the -CRC32 switch. -CRC32 usage examples Table B-11 Switch Function ghost.exe -fcr Creates a CRC32 file (called Ghost.crc) while making an image file. ghost.exe -fcr=d:\test.crc Creates a CRC32 file (called Test.crc) while making an image file.
  • Page 159: Files Not Checked With Crc

    Command-line switches About numbering the Virtual Partition Files not checked with CRC The switch vexcept=filename specifies files that are not checked with CRC. This is normally used to exclude files that are always changed on start up. A sample exception file follows: [ghost exclusion list] \PERSONAL\PHONE [partition:1]...
  • Page 160 Command-line switches About numbering the Virtual Partition If you use GDisk to view the disk, the Virtual Partition is displayed with the volume label VPSGHBOOT. Therefore, the partition numbering that you can see in GDisk is not the same as the partition numbering in Ghost.exe.
  • Page 161: Ghost For Linux

    Supported configurations Symantec Ghost can copy or clone many different Linux distributions. However, Symantec Ghost is sensitive to any possible changes in Ext2/3 file systems and LILO and GRUB specifications. If changes are made to these specifications, Symantec Ghost may no longer support the Linux distribution.
  • Page 162 The /boot directory can be a directory within the root file system. Symantec Ghost assumes that GRUB has been installed in the standard /boot/grub directory or /grub in a /boot partition and uses the standard file name /boot/grub/stage 2.
  • Page 163 Symantec Ghost provides the following support: LVM partitions are created as extended/logical partitions. Symantec Ghost does not support Linux if there is no valid boot record in the disk MBR and more than one partition on a disk is installed with LILO or GRUB.
  • Page 164: Supported Linux Distributions For Cloning

    Symantec Ghost can copy or clone many different Linux distributions. Note: Installing unsupported versions or features of the bootloaders and filesystems may cause Ghost to fail. Symantec Ghost can copy or clone the following versions of Linux in their default configurations: Red Hat Enterprise Linux ES release 5.1...
  • Page 165: Supported Linux Distributions For Running Ghost

    Ghost for Linux Supported Linux distributions for running Ghost Note: Symantec Ghost Solution Suite 2.5 supports 64-bit Linux if it is AMD64 and EMT64. Itanium 64-bit Linux is not currently supported. Supported Linux distributions for running Ghost Symantec Ghost for Linux (ghost) and the Linux tools (ghregedit, ghconfig, omnifs, and gdisk) are supported on the following Linux distributions: Red Hat Enterprise Linux ES release 5.1...
  • Page 166 Ghost for Linux Symantec Ghost utility support...
  • Page 167: Configuring Firewalls

    Appendix Configuring firewalls This appendix includes the following topics: Symantec Ghost port configuration Symantec Ghost port configuration Table D-1 lists the ports that must be open in a firewall to allow the Ghost Console and the Console client to work.
  • Page 168 Configuring firewalls Symantec Ghost port configuration Ghost Console and Console client port configuration (continued) Table D-1 Sent by Source port Destination address Destination port Type Volume Client 7777 Server IP Varies Medium Server Varies 224.77.xxx.xxx 7777 High Table D-2 lists the ports that must be open in a firewall to allow GhostCast multicasting to work.
  • Page 169 Configuring firewalls Symantec Ghost port configuration GhostCast server directed broadcasting port configuration Table D-3 (continued) Sent by Source port Destination address Destination port Type Volume Client Varies Server IP Varies Low to medium Server Varies Client IP Varies Low to...
  • Page 170 Configuring firewalls Symantec Ghost port configuration...
  • Page 171: Troubleshooting

    Problems running Symantec Ghost Ghost.exe errors messages A Symantec Ghost error message consists of an error number and a description. A Ghosterr.txt file is generated when an abort error occurs. More information about Ghost.exe error messages is available on the Symantec Ghost Technical Support Web site: www.symantec.com/techsupp...
  • Page 172: Ghost.exe Problems

    The workaround is as follows: In Disk Manager, convert the disk to an mbr disk and then restore the image. CDR101: Not ready A system error message. This error is not caused by Symantec reading drive X, Abort, Ghost. It is caused by malfunctioning hardware or software Retry, Fail configurations.
  • Page 173: Vista Volume Containing System Restore Points

    Troubleshooting Ghost.exe problems Vista volume containing system restore points When a Vista volume containing system restore points is mounted in a Windows XP/2003 volume, the restore points are deleted. The following error is displayed: Question 1854: A source volume could not be locked as it is in use by another process.
  • Page 174 Troubleshooting Ghost.exe problems Errors when using Ghost with NTFS files (continued) Table E-2 Error message Description Error 25058 - "Unable to This error occurs when Ghost cannot find a large enough locate enough contiguous free space to store a section of an NTFS file. There may be free space to load run.
  • Page 175: Symantec Ghostcast Errors

    Symantec GhostCast errors Symantec GhostCast errors If you are having problems using Symantec Ghost or the Symantec GhostCast Server ensure that you have the latest drivers for your network card installed. The manufacturer of your network card or computer should have the latest drivers available on its Web site.
  • Page 176 IP packets are not being passed between these computers. To ping the IP address of the client computer: Start the client computer. On the Symantec Ghost main menu, click GhostCast and select one of the following: Unicast Direct Broadcast Multicast Do not enter a session name.
  • Page 177: Symantec Ghost And Legacy Network Cards

    Troubleshooting Symantec Ghost and legacy network cards Symantec Ghost and legacy network cards Windows 95 and 98 are plug-and-play operating systems. They reconfigure most network cards if they find an IRQ conflict. Because GhostCasting runs on a DOS level and DOS is not a plug-and-play operating system, IRQ conflicts may arise.
  • Page 178: Cannot Start From Drive A

    Troubleshooting Problems running Symantec Ghost You may want to use the DCDIAG tool available from the Windows 2000 Server resource kit. Cannot start from drive A If your computer does not check drive A first on startup, use your computer's Setup program to change its settings.
  • Page 179: About Cancelling A Ghost.exe Operation

    Troubleshooting Problems running Symantec Ghost Recreate the hibernation files according to the instructions for your Windows operating system. About cancelling a Ghost.exe operation If you start a Ghost.exe operation, you can abort the process by pressing Ctrl+C. Be aware that pressing Ctrl+C leaves the destination image file, disk, or partition...
  • Page 180 Troubleshooting Problems running Symantec Ghost...
  • Page 181: Index

    Index Symbols BIOS about 140 ? switch 137 reporting drives 135 @filename switch 132 BitLocker Drive Encryption 34, 39 blue screen troubleshooting 178 abort log 132, 171 boot disk set abort operation 179 about 15 active directory 177 boot menu ad=image file name switch 59, 81, 95, 132 displaying 73 addDisk=image file name switch 59, 81, 95, 132...
  • Page 182 Index clone (continued) data transfer locally 14 mode 111 operations 149, 151 network traffic 101 partition to partition 28–29 dd switch 135 preserving signature bytes 135 defragmentation 48 speed 34 Department of Defense requirements Windows 2000 39 GDisk 56, 66 clone switch Deploy Anywhere about 133, 148...
  • Page 183 Index files (continued) manipulating 79 error log paths 148 file 132 recovering 87 error messages renaming 85 Ghost.exe 171–172 setting an attribute 84 extended disk access 136 skipping 145 finger switch 136 fingerprint 136, 138 f32 switch 135 firewall f64 switch 135 configure 167 FireWire clusters 133...
  • Page 184 Index GDisk (continued) GhostCast Server (continued) large hard disks 77 creating 104 specifications 125 creating image file 105 switches 76 data transfer mode 111 viewing partitions 159 direct broadcast 111 GDisk for Linux IP address 139 about 55 jm switch 140 GDisk.exe limiting the network bandwidth 113 about 55...
  • Page 185 Index hard disk (continued) image files (continued) hiding partitions 57 compiling 48 IDE 77 compression 20, 22, 34 MBR 57 crc. See CRC32 switch number of 135 creating 19, 22, 37 SCSI 77 creating using GhostCast Server 105 space 136 default split option 48 status 57, 64 defragmentation 48...
  • Page 186 Index limitations Multicast (continued) file size 36 network bandwidth 113 limitswap switch 140 time to live 114 Linux 44, 46, 138 cloning support 164 Ghost.exe 15 network OmniFS 79 improving performance 113 support for Ghost Explorer 165 limiting bandwidth 113 support for Ghost tools 165 performance 34 supported configurations 161...
  • Page 187 Index OmniFS (continued) PC-DOS drive identifiers 83 limitation 47 error handling 91 pcopy switch 149 NTFS file system 83 pcreate switch 149 spaces 83 pdump switch 149 supported operations 84 peer-to-peer using 80 connecting using 18 using a batch file 90 establishing connection 16 using a script file 89–90 Pentium III Processor ID 140...
  • Page 188 14 swap files 41 MBR partition 136 switches NTFS 142 Ghost command line 131 restore switch 149 Symantec Ghost fingerprint 136 running from a CD 143 speed 34 script switch 144 sze switch 146, 154 SCSI szee switch 146...
  • Page 189 Ghost 132 mounting to GhRegEdit 95 mounting to OmniFS 81 vdw switch 147 ver switch 147 verify command 147 version Symantec Ghost 147 vexcept switch 159 virtual partition numbering 159 Vista support 62, 133 vmdk image file mounting to GDisk 59...

This manual is also suitable for:

Ghost imaging foundation 7.1

Table of Contents