Symantec Ghost Implementation Guide
Symantec Ghost Implementation Guide
Implementation Guide
Symantec Ghost™
Implementation Guide
The software described in this book is furnished under a license agreement and may be used only in
accordance with the terms of the agreement.
Documentation version 7.5
PN: 07-30-00482
Copyright Notice
Copyright 1998–2001 Symantec Corporation.
All Rights Reserved.
AnytechnicaldocumentationthatismadeavailablebySymantecCorporationisthecopyrightedworkof
Symantec Corporation and is owned by Symantec Corporation.
NO WARRANTY. The technical documentation is being delivered to you AS-IS and Symantec
Corporation makes no warranty as to its accuracy or use. Any use of the technical documentation or the
information contained therein is at the risk of the user. Documentation may include technical or other
inaccuraciesortypographicalerrors.Symantecreservestherighttomakechangeswithoutpriornotice.
No part of this publication may be copied without the express written permission of Symantec
Corporation, 20330 Stevens Creek Boulevard, Cupertino, CA 95014.
Trademarks
Symantec, the Symantec logo, Symantec Ghost, Ghost Walker, Ghost Explorer, and GDisk are
trademarks of Symantec Corporation.
Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft
Corporation. IBM, OS/2, and OS/2 Warp are registered trademarks of International Business
Machines Corporation. Novell and NetWare are registered trademarks of Novell Corporation.
3Com and EtherLink are registered trademarks of 3Com Corporation. Compaq is a registered
trademark of Compaq Corporation. Zip and Jaz are registered trademarks of Iomega
Corporation. SuperDisk is a trademark of Imation Enterprises Corporation.
Other product names mentioned in this manual may be trademarks or registered trademarks of their
respective companies and are hereby acknowledged.
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
SYMANTEC LICENSE AND WARRANTY
5
Installing Symantec Ghost Standard Tools ........................................ 42
Registering Symantec Ghost ............................................................... 43
Generating a registration file ....................................................... 43
Obtaining a validation key .......................................................... 44
Entering a validation key ............................................................. 45
Adding additional licenses .......................................................... 45
Registering the Symantec Ghost Console after reinstallation .... 45
Clearing an outstanding registration request .............................. 46
Updating Symantec Ghost .................................................................. 47
Updating the Symantec Console client ....................................... 47
Uninstalling Symantec Ghost ............................................................. 48
Creating Configuration Server accounts ............................................ 49
Removing a domain account ...................................................... 51
6
Creating the model computer ..................................................... 82
Creating image dump tasks ................................................................ 83
Setting image dump task properties ........................................... 84
Creating tasks ...................................................................................... 87
Setting task properties ................................................................. 88
Reviewing tasks ........................................................................... 96
Scheduling and executing tasks ......................................................... 97
Scheduling a task ......................................................................... 97
Executing a task manually from the Symantec Ghost Console 98
Initiating a task from a client computer ............................................ 98
Initiating a task from the client command line .......................... 99
7
Chapter 8 Sysprep
Introducing Sysprep ......................................................................... 125
Setting up Sysprep ............................................................................ 126
Adding a Sysprep configuration ................................................ 127
Overwriting a Sysprep configuration ........................................ 128
Deleting a Sysprep configuration .............................................. 128
Cloning with Sysprep ....................................................................... 129
Editing, restoring or reloading Sysprep.inf ............................... 130
How Sysprep works with cloning and the Console
post-configuration process ............................................................ 131
Configuring Sysprep.inf .................................................................... 132
8
Chapter 11 Image file options
About Symantec Ghost image files .................................................. 161
Image files and compression ........................................................... 162
Performance expectations on a network .................................. 162
Image files and CRC32 ..................................................................... 163
Image files and volume spanning .................................................... 164
Standard image files ................................................................... 164
Size-limited, multisegment image files ..................................... 164
Spanned image files ................................................................... 164
Spanning across multiple volumes and limiting span sizes .... 165
Loading from a spanned image ................................................ 166
Image files and tape drives .............................................................. 166
Image files and CD writers ............................................................... 168
Cloning dynamic disks in Windows 2000 ....................................... 169
Hibernation and swap files .............................................................. 170
9
Creating a DOS boot disk manually ............................................... 198
Setting up packet drivers ........................................................... 199
10
Section 5 Creating executables to roll out
applications
Chapter 17 Getting started with AutoInstall
How AutoInstall works ..................................................................... 235
Using AutoInstall ............................................................................... 236
Installing AI Snapshot and AI Builder on the model computer 237
Setting up target computers ...................................................... 238
Installing Microsoft products using AutoInstall ............................... 238
Letting the model computer restart ........................................... 238
Adding uninstall commands ...................................................... 238
Using AutoInstall to clone Office XP ........................................ 238
Microsoft system file protection (SFP) limitations on
deploying AI packages ........................................................... 239
11
Determining Symantec Ghost image file version ............................ 260
Using Ghost Explorer from the command line ............................... 260
12
Loss of access to external data objects ..................................... 293
Identical user names and passwords across workstations ...... 293
Section 7 Appendices
Appendix A Command-line switches
Symantec Ghost command-line switches ........................................ 297
Clone switch syntax .......................................................................... 314
Defining the type of clone command ....................................... 314
Setting a source for the clone switch ....................................... 315
Setting a destination for the clone switch ................................ 316
Setting a destination size for the clone switch ......................... 316
Examples of clone switch usage ............................................... 317
Batch file example ..................................................................... 319
CRC32 switch usage .......................................................................... 320
Examples of -CRC32 usage ........................................................ 321
13
Boot configuration ............................................................................ 334
Symantec Ghost utility support ........................................................ 334
Appendix G Troubleshooting
Symantec Ghost error message ........................................................ 339
Symantec Ghost Console errors ....................................................... 341
Symantec Ghost GhostCast errors .................................................... 341
Symantec Ghost and GhostCast DOS errors ................................... 343
Running command-line or scheduled tasks .................................... 344
Appendix H Diagnostics
Hard drive detection and diagnostic information ........................... 345
Symantec Ghost abort error file (Ghosterr.txt) ........................ 345
Creating a full diagnostic statistics dump summary ................. 346
Elementary network testing techniques .......................................... 346
Testing TCP/IP functionality ..................................................... 346
Generating a GhostCast log file ................................................ 348
CD Replacement Form
Glossary
Index
14
G e t t i n g s t a r t e d
Symantec Ghost reduces the costs and overhead associated with installing
software applications and operating systems.
17
About Symantec Ghost
■ GhostCast Server
The GhostCast Server replaces the Multicast Server to provide three
methods of transferring image files to optimize their deployment. You
can choose from:
■ Unicast: One copy of the data sent to each computer
■ Directed broadcast: Data sent to all computers on a specified
subnet
■ Multicast: Data sent to all computers on the network that are
included in the multicast session
■ Reducing GhostCast traffic on the network
You can control how much network bandwidth is used and therefore
avoid overloading the network with GhostCast traffic.
■ Client initiated tasks
You can initiate tasks from the client computer, freeing you from
having to return to the Symantec Ghost Console. This lets you perform
a task without having to return to the Symantec Ghost Console
computer. Users can initiate tasks.
■ Tuning the Console heartbeat
You can configure the ping rate of the Console client, which reduces
the network noise associated with Symantec Ghost.
■ Microsoft Terminal Services support
Enables the remote control of the Symantec Ghost Console via
Microsoft Terminal Server.
■ GDisk32
GDisk32 runs from a command line within Windows NT/2000/XP/9x.
It updates Boot.ini to change the boot order and lets you create
partitions at the end of free space.
■ Enhanced dynamic disk support
Symantec Ghost supports a full dynamic disk dump.
■ Section 508 of the US Rehabilitation Act of 1973 supported
■ Additional security options
New security options include password protection and BIOS-lock.
■ Updated post clone configuration support
Symantec Ghost includes Novell NetWare client information.
18
How Symantec Ghost works
■ Standalone configuration
You can configure computers without using the Symantec Ghost
Console.
■ Windows XP Professional, Windows 2000 Professional, and Server
Logo Certification
19
About Symantec Ghost
Console
GhostCast
Server
Ghost.exe
Cloning from
disk to disk
20
Quick reference guide
21
About Symantec Ghost
22
C H A P T E R
Understanding
Symantec Ghost basics
23
Understanding Symantec Ghost basics
Which method you choose depends on how many computers you are
cloning, the operating system installed, and the functions required.
Cloning over a You can use the Standard Tools on a server computer and
network using run the Symantec Ghost executable on the client
GhostCasting computers to create an image file. You can then clone a
number of computers simultaneously.
When you install the Console client remotely or from the CD, Symantec
Ghost creates the virtual partition automatically when a task that requires a
computer to restart in DOS is executed.
24
The Symantec Ghost partition
For more information, see the Installing the Ghost boot partition PDF on
the Symantec Ghost CD.
You can check the Ghost partition settings for each client computer.
For more information, see “Storing the Console client computer details” on
page 63.
Once you have installed the Console client on the client computer, and a
task requiring a restart in DOS is executed from the Console for that client,
then the virtual partition is created to let the task execute.
25
Understanding Symantec Ghost basics
If the Ghost boot partition exists on a client computer, then it is used when
a task is run. Client computers that have a previous version of the Console
client installed have the boot partition. You don’t have to use the virtual
partition if the Ghost boot partition exists on the computer.
26
Symantec Ghost components
Symantec Ghost
Console main
window
27
Understanding Symantec Ghost basics
Symantec Ghost
GhostCast Server
main window
28
Symantec Ghost components
Symantec Ghost
Boot Wizard
main window
AI Builder main
window
29
Understanding Symantec Ghost basics
Ghost.exe menu
Standalone configuration
The standalone configuration feature lets you apply configuration settings
directly to a computer. This lets you run a post clone configuration without
using the Symantec Ghost Console.
Ghost Walker
Ghost Walker assigns statistically unique security identifiers (SIDs) to
cloned Microsoft Windows NT/2000/XP workstations. The SID is an
important part of the Windows NT/2000/XP security architecture as it
provides a unique identifier when a computer is networked.
30
Symantec Ghost components
Ghost Explorer
Ghost Explorer lists all of the files and directories within image files. On
FAT and Linux file systems, you can also add, recover, and delete
individual directories and files to or from an image file.
Ghost Explorer
main window
GDisk
GDisk is a complete replacement for the FDISK and FORMAT utilities that
allows:
■ FAT file system formatting
■ Batch mode operation
■ Hiding and unhiding of partitions
■ Secure disk wiping
■ Extensive partition reporting
31
Understanding Symantec Ghost basics
For more information, see “Setting the Symantec Ghost Console options”
on page 154.
32
Accessibility in Symantec Ghost
Document Format
33
Understanding Symantec Ghost basics
34
C H A P T E R
Installing Symantec
Ghost
35
Installing Symantec Ghost
System requirements
This sections lists the minimum requirements for each installation option.
Ghost.exe
■ IBM PC computer or 100% compatible
■ 386 processor
■ 8 MB RAM
■ VGA monitor
■ Microsoft compatible mouse recommended
To support CD writing:
■ An additional 6.5 MB above the Ghost.exe requirements
■ CD writer supported by Symantec Ghost
36
Preparing for installation
■ Can have more than one physical disk, but backup functionality
supports the first physical disk only
■ DOS drivers for network card
For more information, see “Creating boot images and disks with the
Ghost Boot Wizard” on page 133.
Standard Tools
■ IBM computer or 100% compatible
■ 386 processor
■ 8 MB RAM
■ VGA monitor
■ Microsoft compatible mouse recommended
■ Microsoft Windows 9x/2000/NT/Me/XP
What to install
Symantec Ghost has five software packages. Use this table to determine
what you need to install and where you need to install it.
Component Description
Symantec Ghost Install on the server computer from which you plan to
Console remotely clone and configure other workstations. Install
all components of Symantec Ghost on the server except
for the Console client.
37
Installing Symantec Ghost
Component Description
Symantec Ghost Install when the Console is not required. Install all
Standard Tools components of Symantec Ghost except for the Console
server and client.
The Getting Started guide includes common scenarios for using Symantec
Ghost and lists which components must be installed for each scenario.
Note: The user name, email address, and serial number that you enter
during installation are used in the registration process.
38
Installing the Console client
7 In the Email Address field, type the email address to which the
registration file should be sent.
This must be a valid and working email address.
8 In the Serial Number field, type the serial number from your Symantec
Ghost certificate.
For more information, see “Generating a registration file” on page 43.
9 Click Next.
10 Do one of the following:
■ Confirm the installation location.
■ To select a different installation location, click Browse.
11 Click Next.
12 In the Custom Setup window, click Next.
13 In the Symantec Ghost Console Service Account Registration window,
click Next.
If required, change the Console Service Account Password to increase
security.
For more information, see “Creating Configuration Server accounts” on
page 49.
14 Click Install to start the installation.
Once you have installed the Console client, confirm that the client appears
in the Symantec Ghost Console.
For more information, see “Storing the Console client computer details” on
page 63.
39
Installing Symantec Ghost
40
Installing the standalone configuration client
41
Installing Symantec Ghost
6 Click Next.
7 In the Destination Folder window, do one of the following:
■ Click Change to change the destination folder for the Console
client.
■ Click Next to confirm the current folder as the destination folder
for the Console client.
8 Click Install to start the installation process.
42
Registering Symantec Ghost
If you are upgrading from a previous version of Symantec Ghost, you can
attach the existing number of clients to the Console for a period of 30 days.
43
Installing Symantec Ghost
If you have generated a registration file and have not yet entered a
validation key, you cannot generate a new registration file. If you have a
problem with the existing registration file, you must clear the outstanding
registration request before generating a new one.
44
Registering Symantec Ghost
The Symantec Ghost Console is now registered for the number of clients
for which you are licensed.
45
Installing Symantec Ghost
If you bought additional licenses before reinstalling, then you must repeat
the registration process for each set of licenses purchased.
1 Register the Console with the original validation key.
2 Generate a new registration file with the same information used to
purchase the additional licenses.
3 Register the Console with the additional license validation key.
4 Repeat steps 2-3 until all of the additional license validation keys are
registered.
You must generate a new registration file and complete the registration
process.
The Symantec Ghost executable runs under DOS, but you must install
Symantec Ghost in a Windows operating system.
46
Updating Symantec Ghost
Symantec does not charge for Symantec Ghost updates. However, your
normal Internet access fees apply.
47
Installing Symantec Ghost
You can uninstall the client from the Symantec Ghost Console on Windows
NT/2000/XP computers.
You can also uninstall the Console client on the client computer. On
Windows 9x computers, the client must be uninstalled from the Control
Panel in Windows.
48
Creating Configuration Server accounts
The user name and password are set for the Console Service Account
during installation. The default user name is Ghost_computer name, and
the default password is Ghost_computername. The Configuration Server
logs on as this user. The user does not have interactive logon rights, is not
a member of any groups, and only has the privilege to manage computer
accounts.
49
Installing Symantec Ghost
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\Ngserver
\Params
50
Creating Configuration Server accounts
51
Installing Symantec Ghost
52
C r e a t i n g i m a g e f i l e s a n d
m a n a g i n g t a s k s f r o m t h e
C o n s o l e
54
C H A P T E R
55
Managing image files, configuration resources, and computers
Symantec
Ghost Console
main window
56
Creating and executing a Symantec Ghost Console task
57
Managing image files, configuration resources, and computers
The wizard lets you access the most frequently executed tasks using
the Symantec Ghost Console program.
Note: The Symantec Ghost Console runs in Windows Me, Windows NT,
and Windows 2000. It does not run in Windows 9x.
58
Grouping Console client computers
For example, you might have an Administration folder, and beneath that,
an HR folder and a Payroll folder. A computer can be added to any one of
these three groups. A task can be applied to either the HR group or the
Payroll group. To execute the task for both HR and Payroll, select the
Administration folder. The task executes for both the HR group and the
Payroll group as well as any computers that are grouped in the
Administration folder.
59
Managing image files, configuration resources, and computers
If you have two copies of the same computer in different groups, you can
remove one. Removing one copy does not remove the other.
60
Grouping Console client computers
Renaming a computer
You can rename a computer for easy identification. The name changes in
the Symantec Ghost Console only. The name of the computer is not
affected anywhere else. You cannot rename a computer using the same
name as another computer in the same folder.
To rename a computer
1 In the left pane of the Symantec Ghost Console, expand the Machine
Groups folder.
2 Open the folder containing the computer that you want to rename.
3 Select the computer that you want to rename.
4 On the File menu, click Rename.
5 Type a name for the computer.
6 Press Enter.
61
Managing image files, configuration resources, and computers
■ Data throughput limits: Symantec Ghost lets you control how much
network bandwidth is used when GhostCasting. Use this functionality
to avoid overloading the network with GhostCasting traffic.
For more information, see “Controlling the amount of network
bandwidth used” on page 188.
■ Data transfer mode: You can select one of the following data transfer
modes.
62
Storing the Console client computer details
When DOS is the only operating system installed on the Console client
computer, the computer appears with a title matching the adapter address
of the computer.
63
Managing image files, configuration resources, and computers
■ A question mark means that the client heartbeat is 0 and that the client
status is unknown.
64
Storing the Console client computer details
For more information, see “Setting the Symantec Ghost Console options”
on page 154, “Setting properties for computers in a subnet” on page 61,
and “To set a client heartbeat” on page 157.
65
Managing image files, configuration resources, and computers
The default configuration settings can be updated at any time to match the
settings on the computer by including the computer in a task that has the
Configuration Refresh check box checked.
When you edit the default configuration settings, you can apply them to
the client computer by choosing to use the default settings in a task.
You can use the same configuration settings for many computers by
copying the settings.
66
Storing the Console client computer details
You can set the template that contains the DOS network drivers to use
when the client computer starts in the virtual partition.
You can select a version of DOS to install when the virtual partition is
created on the client computer.
67
Managing image files, configuration resources, and computers
You can view details of any baseline images and incremental images that
have been created for a computer.
68
About the Configuration Resources folder
Folder Description
Data Templates Stores the data templates created for inclusion in user
profiles.
69
Managing image files, configuration resources, and computers
Folder Description
User Packages Stores the packages of user data taken from the Console
client computers in Move the User tasks.
User Profiles Stores user profiles used to define Move the User tasks.
70
About the Configuration Resources folder
71
Managing image files, configuration resources, and computers
72
About the Configuration Resources folder
If you choose to apply this configuration set as a template, then the default
name appears as Computer N*****. When the task runs, the wildcard stars
are replaced with a number that is unique to each computer. You can
increase or decrease the number of stars, and you can alter the alphabetical
part of the name. For example, if you create computers for the
Administration department, set this field to Admin *****.
73
Managing image files, configuration resources, and computers
74
About the Configuration Resources folder
Applying IP addresses
You can choose between DHCP or static IP address. This choice must
match the image file when the configuration change is part of a cloning
task. However, for a task that only changes the configuration, this setting
must match the setting on the current computer.
75
Managing image files, configuration resources, and computers
76
About the Configuration Resources folder
77
Managing image files, configuration resources, and computers
78
About the Configuration Resources folder
79
Managing image files, configuration resources, and computers
80
C H A P T E R
Understanding tasks
A task is a set of instructions carried out by the Symantec Ghost Console.
You create a task to perform any of the following actions on client
computers:
■ Create an image file
■ Load an image file
■ Apply configuration settings
■ Apply user data files and registry settings
■ Load AutoInstall packages
You can initiate (execute) a task from the Console server or a client
computer.
81
Creating and executing tasks
If you are creating a model computer for Windows NT computers, see the
Online Knowledge Base article “How to clone an NT system” under the
General Information section.
You may need to create a model computer for each unique hardware
setup. For example, if you have some computers with different network or
video cards, you must have separate images for them. However, on
Windows 2000/XP computers, Microsoft Sysprep can help you create a
generic template image for different hardware setups.
82
Creating image dump tasks
Option Description
83
Creating and executing tasks
84
Creating image dump tasks
85
Creating and executing tasks
For more information, see “Setting the data transfer mode” on page 187,
“Controlling the amount of network bandwidth used” on page 188, and
“Setting the Symantec Ghost Console options” on page 154.
86
Creating tasks
Creating tasks
A task is a set of instructions. Tasks can be created, copied, changed, and
reused as required.
Option Description
Network ■ Lets you include all computers in the target group that are
currently turned off and have Wake on Lan installed.
■ Optimizes data transfer.
Move the User Captures or restores user packages from target computers.
File transfer Lists the files to be copied onto the target computers.
87
Creating and executing tasks
88
Creating tasks
6 Select the machine group that you want to receive the task.
If you select a group folder, all computers in that folder and in the
folders below are selected.
7 Double-click the computer icon to view the computer properties of
any of the computers in the group.
8 Click Allow Client Initiation to let the client computer execute the
task.
9 Click Set password and type a password to enter on the user
computer for client initiated tasks.
For more information, see “Initiating a task from a client computer” on
page 98.
For more information, see “To set Wake on Lan properties” on page 86 and
“Optimizing data transfer over the network” on page 85.
89
Creating and executing tasks
6 In the Image definitions folder, select the image definition for the
image file that you want to load.
7 Double-click the image definition icon to view the image definition
properties.
8 If the image is being loaded to a partition, do one of the following:
■ If an image file exists for the image definition specified, select the
Source partition from the Source partition drop-down list.
■ If an image file does not exist, select a Source partition number.
9 Click SID Change to alter the SID on each of your target computers
using Symantec Ghost Walker if you are cloning onto a Windows NT/
2000/XP operating system.
For more information, see “Using Ghost Walker” on page 287.
10 If required, add more advanced features to the task using the
command line.
Warning: The syntax of your command line is not checked when the
task runs. Therefore, review these instructions carefully to avoid
crashing or errors. The consequences of an error could be serious.
90
Creating tasks
Option Description
For more information, see “Setting General task properties” on page 88.
91
Creating and executing tasks
For more information, see “Capturing and restoring user data” on page 113.
You cannot uninstall all packages. You can uninstall a package if it was
created with an uninstall command included. If you are unsure, open the
package with AI Builder to see if there is an uninstall command.
92
Creating tasks
2 Select the package definition for the package that you want to install.
3 Under Remove packages, click Browse to locate uninstall packages
created with AutoInstall.
4 Select the package definition for the package you want to uninstall.
93
Creating and executing tasks
Storing AI packages
AI packages can be stored locally, at an HTTP location, or on a network
share.
Packages located on a nonUNC path are transferred and installed from the
client. Packages located on a UNC path are accessed over the network.
However, should this fail, these packages are transferred to the client.
The client uses HTTP protocols to access the packages stored at HTTP
locations.
HKEY_LOCAL_MACHINE\System\CurrentControlSet\Services\
LanManServer\Parameters\NullSessionShares
94
Creating tasks
When the task is executed, the files are transferred to the following folder:
c:\Program Files\Symantec\Ghost\Incoming
Note: Using GDisk from Command lets you alter partitions during a task.
95
Creating and executing tasks
Reviewing tasks
You can check the details of the task in the task scenario dialog box before
you execute it. The task scenario includes the clone properties, all
configuration steps, and the client computers included in the task.
96
Scheduling and executing tasks
You can view tasks that are currently executing in the bottom pane of the
Symantec Ghost Console.
For more information, see “Setting the Symantec Ghost Console options”
on page 154.
A task may fail to execute if the correct network drivers are not found. If
the task log indicates that this happened, amend the computer properties
to use the correct template.
For more information, see “Storing the Console client computer details” on
page 63, and “Monitoring the Symantec Ghost Console activity” on
page 151.
Scheduling a task
You can schedule tasks to run automatically from the Symantec Ghost
Console.
To schedule a task
1 On the View menu, click Scheduler.
All scheduled tasks appear.
2 On the Task menu, click New Task.
3 Expand the Tasks folder.
4 Select the task that you want to schedule, then click OK.
5 On the Schedule tab, set the date, time, and frequency with which to
execute the task.
6 On the Task tab, in the Run as field, type the user name of the person
who is running the task.
The default is the logged on user.
7 Click Set Password.
97
Creating and executing tasks
You can run tasks concurrently. Before tasks are executed, the following
information is checked:
■ The validity of an image file to be loaded.
■ Whether or not a target computer is included in more than one task.
If you run two tasks that have the same target computer, the first task
executes for that computer. The second task does not start.
You can also execute a task from the command line using the following
command:
ngcons.exe /e taskname
Both global and task settings must allow for client initiated tasks.
For more information, see “Setting task properties” on page 88 and “Setting
the Symantec Ghost Console options” on page 154.
98
Initiating a task from a client computer
You must include the task name in this command, and the password, if
required. There is no notification if the task has succeeded or failed.
99
Creating and executing tasks
100
C H A P T E R
Incremental backups
and rollbacks
The first backup of a client computer is stored as the baseline image. Each
subsequent backup is an incremental image; only the changes made since
the last backup are stored. However, if the changes made are too great to
be stored as an incremental image, a new baseline image is created and
stored, replacing the previous baseline. Full baseline images must be
created when fundamental changes to the operating system are made (for
example, installing service packs, Microsoft applications, drivers, or making
101
Incremental backups and rollbacks
For more information, see “To set the location for incremental backups” on
page 159.
102
Creating a backup regime
Warning: The syntax of your command line is not checked when the
task runs. Therefore review these instructions carefully to avoid
crashing or errors. The consequences of an error could be serious.
103
Incremental backups and rollbacks
Incremental and baseline images are deleted as a set, so they may not be
deleted when expected. Backups are not automatically deleted after the
required number of days. Backups are not deleted until all dependent
images are deleted.
For example:
■ You have a baseline image, and several incremental images that rely
on the baseline.
■ The last incremental image that you created was within the specified
number of days to keep backups.
Once the last incremental image is older than the specified number of
days, it is deleted because no other backups rely on it. Each earlier
incremental image is deleted until the final baseline image is reached
and then it is deleted.
104
Creating a backup manually
For more information, see “To view Console client computer properties”
on page 65.
105
Incremental backups and rollbacks
Restoring a computer
Computers can be rolled back to a previous backup at any time.
To restore a computer
1 On the Windows taskbar, click Start > Programs > Symantec Ghost
> Corporate Console.
2 Click Close to close the Console Wizard.
3 In the left pane of the Symantec Ghost Console, expand the Backup
Regime folder.
4 Select the regime for the computer that you want to receive the
rollback.
5 Right-click the regime, then click Restore.
6 On the list of incremental backups, select the one to which to roll
back.
The status of each incremental backup is indicated as follows:
■ Success: The computer in this backup was successfully backed up.
■ Failed: The computer in this backup failed to back up.
7 In the bottom pane, you can view the status of the back up.
The status for the computer is as follows:
■ OK: This computer was successfully backed up.
■ Unfinished: This computer did not complete the back up, or is
currently running the back up.
8 Click Safe Mode restore (non-system files only) to restore user files
only.
The operating system files and registry files are not restored.
9 Click Finish to initiate the rollback.
10 Click OK to confirm.
106
C H A P T E R
There are several steps involved in defining the settings and files to capture
in a Move the User task. First, data templates are defined. Then a User
Profile is created that lets you specify a user, the application-specific data,
and data templates required.
107
Move the User
Data templates define rules for excluding and including individual files and
registry keys. You can create and use more than one data template to
create a User Profile.
Once you’ve created a User Profile, you can use it to capture user settings
from one computer or a number of computers, and restore them as
required. You can then run a Move the User task.
108
Creating a data template
109
Move the User
You can set a source directory path and a target directory path. This lets
you move files from a source folder to a different folder on the target
computer.
110
Viewing a data template
111
Move the User
112
Viewing a User Profile
113
Move the User
114
Variables for use with Move the User
You can view a user package to check the computer on which it was
created and the date it was created.
You can use a variable within a path or append a directory or file to the
end of a variable.
115
Move the User
The relative path feature lets you set global source and target paths in the
Advanced options. Once you have enabled this feature and entered source
and target paths, then any path that is not an absolute path is set within the
relative path.
For example, the source path in the Advanced feature dialog box is:
If you add the rule Include “My Documents\*.*”, then all of the files within
C:\Documents and Settings\msmith\My Documents\ are included in the
template. When you execute the Move the User task, the documents are
moved to:
116
User settings that can be moved
Accessibility settings
This table displays the user settings that you can capture in the Control
Panel under Accessibility.
Setting 95 98 Me NT 2000 XP
Keyboard, StickyKeys ✔ ✔ ✔ ✔ ✔ ✔
Keyboard, FilterKeys ✔ ✔ ✔ ✔ ✔ ✔
Keyboard, ToggleKeys ✔ ✔ ✔ ✔ ✔ ✔
Sound, SoundSentry ✔ ✔ ✔ ✔ ✔ ✔
Sound, ShowSounds ✔ ✔ ✔ ✔ ✔ ✔
CursorWidth ✔ ✔
Mouse, MouseKeys ✔ ✔ ✔ ✔ ✔ ✔
117
Move the User
Setting 95 98 Me NT 2000 XP
Display settings
This table displays the user settings that you can capture in the Control
Panel under Display.
Option 95 98 Me NT 2000 XP
Background, Wallpaper ✔ ✔ ✔ ✔ ✔ ✔
Background, Pattern ✔ ✔ ✔ ✔ ✔
Appearance, Scheme ✔ ✔ ✔ ✔ ✔ ✔
118
User settings that can be moved
Option 95 98 Me NT 2000 XP
International settings
This table displays the user settings that you can capture in the Control
Panel under International.
Option 95 98 Me NT 2000 XP
Regional settings ✔ ✔ ✔ ✔ ✔ ✔
Number ✔ ✔ ✔ ✔ ✔ ✔
Currency ✔ ✔ ✔ ✔ ✔ ✔
Time ✔ ✔ ✔ ✔ ✔ ✔
Date ✔ ✔ ✔ ✔ ✔ ✔
119
Move the User
Keyboard settings
This table displays the user settings that you can capture in the Control
Panel under Keyboard.
Option 95 98 Me NT 2000 XP
Indicator on taskbar ✔ ✔ ✔ ✔ ✔ ✔
Language (95/98/Me) ✔ ✔ ✔ ✔ ✔ ✔
Mouse settings
This table displays the user settings that you can capture in the Control
Panel under Mouse.
Option 95 98 Me NT 2000 XP
Pointer, Scheme ✔ ✔ ✔ ✔ ✔ ✔
Pointer, Speed ✔ ✔ ✔ ✔ ✔ ✔
Pointer, Trail ✔ ✔ ✔ ✔ ✔
120
User settings that can be moved
Option 95 98 Me NT 2000 XP
Acceleration ✔ ✔ ✔
Sound settings
This table displays the user settings that you can capture in the Control
Panel under Sound.
Option 95 98 Me NT 2000 XP
Schemes ✔ ✔ ✔ ✔ ✔ ✔
Screen Saver
This table displays the user settings that you can capture in the Control
Panel under Screen Saver.
Option 95 98 Me NT 2000 XP
Option 95 98 Me NT 2000 XP
121
Move the User
Internet settings
This table displays the user settings that you can capture in the Control
Panel under Internet.
Option 95 98 Me NT 2000 XP
Home Page ✔ ✔ ✔ ✔ ✔
Option 95 98 Me NT 2000 XP
Always on top ✔ ✔ ✔ ✔ ✔ ✔
Height of taskbar ✔ ✔ ✔ ✔ ✔ ✔
122
User settings that can be moved
Desktop options
Option 95 98 Me NT 2000 XP
Toolbar, Address ✔ ✔ ✔ ✔
Toolbar, Link ✔ ✔ ✔ ✔
Toolbar, Desktop ✔ ✔ ✔ ✔
Toolbar, QuickLaunch ✔ ✔ ✔ ✔
123
Move the User
124
C H A P T E R
Sysprep
Introducing Sysprep
Sysprep is a Microsoft utility that helps prepare Microsoft Windows 2000/
XP computers for cloning, and customizes the configuration settings when
a computer is cloned. It is available on the Microsoft Web site, or it may be
on your Microsoft Windows installation CD.
125
Sysprep
Some data from Sysprep.inf is used to prepare the source computer for
duplication and customization before creating the image. Some of the
settings specified in Sysprep.inf are applied by Sysprep after you load the
image back onto the destination computers. Sysprep.inf is not included
with the Sysprep download from Microsoft. You must create Sysprep.inf
according to Microsoft guidelines or with the tools provided by Microsoft.
Sysprep also ensures that the Security Identifiers (SID) on the destination
computers are unique.
Read the following documents, even if you are familiar with Sysprep.
Note: Do not use Sysprep and a configuration task to set the same
configuration settings. For example, do not instruct Sysprep to add a
computer to a domain and set this in a configuration task.
Setting up Sysprep
Use the Symantec Ghost Console to automatically install and configure
Sysprep on the Console client computers.
Symantec Ghost supports Sysprep version 1.1 for Windows 2000 and
Sysprep version 2.0 for Windows XP. The version that is included with
Windows 2000 is Sysprep version 1.0 which contains reduced functionality.
126
Setting up Sysprep
Download Sysprep version 1.1 for Windows 2000 from the Microsoft Web
site:
http://www.microsoft.com/windows2000/downloads/tools/sysprep/
default.asp
Copy Sysprep version 2.0 for Windows XP from the following directory on
the Windows XP installation CD:
Support\Tools\Deploy.cab
All files in the Sysprep folder and subfolders (except for the empty
ones) are installed in the Console local data area. Before you create a
Sysprep image, all folders and files from that location are copied to the
Console client computer.
127
Sysprep
128
Cloning with Sysprep
129
Sysprep
130
How Sysprep works with cloning and the Console post-configuration process
■ Each Console client then defers its own post-configuration until the
Sysprep Mini-Setup Wizard or Windows Welcome is finished.
■ Sysprep uses either the Mini-Setup Wizard along with information
specified in Sysprep.inf, or the Windows Welcome, to gather
configuration parameters and then complete its post-cloning
configuration.
131
Sysprep
■ If Sysprep has been enabled to change the SID, it changes it once the
Console client computer has been configured.
For more information, see “Making SID changes with Sysprep and
Ghost Walker on NT based clients” on page 285.
■ The Console client completes the remainder of its post-configuration
tasks after Sysprep has restarted a second time, and depending on the
post-configuration tasks that the Console client has completed, it may
restart the computer a third time.
Configuring Sysprep.inf
When you update a Sysprep configuration, the Sysprep.inf file that is
copied by the Console becomes the template for all Sysprep tasks for that
configuration. The template is copied for each Sysprep operation and can
be edited and configured for a specific task. It is unique to the task.
However, if you want to alter the template file, you must make the changes
to the Sysprep.inf file and update the Sysprep configuration by overwriting
the existing one.
You can configure Sysprep in many ways. To have Sysprep.inf apply the
computer name, you must request that Sysprep randomly generate the
computer name. If you do not, Sysprep supplies a default to the Mini-Setup
Wizard and the user is prompted to confirm it. To request a randomly
generated computer name, use the following parameter:
[UserData]
ComputerName=*
For more information, see“Making SID changes with Sysprep and Ghost
Walker on NT based clients” on page 285.
132
C H A P T E R
IBM DOS is supplied for the purpose of creating boot disks. The DOS files
are installed automatically when you create the boot disk in Ghost Boot
Wizard.
133
Creating boot images and disks with the Ghost Boot Wizard
134
Creating boot disks and boot images
Standard boot disks with the option of LPT and USB support
The Ghost Boot Wizard creates a boot disk that does any of the following:
■ Lets you write Ghost images to a CD-R/RW on a CD writer supported
by Symantec Ghost
For more information, see “Image files and CD writers” on page 168.
■ Runs Ghost.exe on computers with LPT and USB support and
peer-to-peer.
■ Contains Ghost.exe only
Note: Symantec Ghost does not support writing to a CD-ROM drive that is
connected with a USB cable.
To create a boot disk to run Ghost.exe, or with support for LPT and
USB cables
1 In the Ghost Boot Wizard window, click Boot Disk with CD-R/RW,
LPT and USB Support.
2 Click Next.
3 Do one or more of the following:
■ Check USB support to add USB support to the boot disk.
■ Check LPT support to add LPT support to the boot disk.
■ Uncheck to clear USB support and LPT support to create a boot
disk that runs Symantec Ghost on a single computer.
■ Click Advanced to change the LPT mode or port.
■ Click Include Adaptec ASPI drivers to add drivers to support
Adaptec ASPI drivers to the boot disk.
These drivers are required to write an image directly to a SCSI CD-R
that is supported by Symantec Ghost.
4 Click Next.
135
Creating boot images and disks with the Ghost Boot Wizard
The default mode for an LPT connection is ECP/EPP High Speed. If you are
having problems with your LPT connection, set the mode to Bidirectional
8bit or Bidirectional 4bit. The next time that you create a boot disk, the
mode is reset to the default ECP/EPP High Speed.
If you have multiple parallel ports and want to connect via any port other
than the default LPT1, use the LPT port option to specify the port into
which your cable is plugged.
Before starting this process, you need to know the types of network cards
that are installed on your client computers. Unless you use the multicard
template, you must create a boot disk for each network card.
136
Creating boot disks and boot images
137
Creating boot images and disks with the Ghost Boot Wizard
138
Creating boot disks and boot images
139
Creating boot images and disks with the Ghost Boot Wizard
140
Creating boot disks and boot images
8 In the Floppy Disk Drive field, type the appropriate drive letter.
9 In the Number of disks to create field, type the number of disks that
you want to create.
10 Click Format disk(s) first to format the disks before disk creation.
11 Click Quick Format to perform a quick format.
12 Click Next.
For more information, see “Installing the Console client” on page 39.
141
Creating boot images and disks with the Ghost Boot Wizard
7 Type the correct path in the Ghstwalk.exe field, if the executable has
been moved, or you want to use a different version.
The default path to the Ghost Walker executable is entered in the
Ghstwalk.exe field.
8 In the Machine Group, type the computer group folder, if required.
When a Console Client is first discovered on the network, the Console
creates an icon for it in the Machine Group section of the Default
folder. When DOS Console Client computers are discovered, they are
identified by Adapter Address only. Specifying a group folder makes
identification of the computer easier.
9 Do one of the following:
■ Click DHCP will assign the IP settings if your network contains a
DHCP server.
■ Click The IP settings will be statically defined and complete the
fields below this option if your network does not contain a DHCP
server.
10 Click Next.
11 Type a name and description for the image file.
12 Click Next.
You can create a RIS boot package in the Symantec Ghost Boot Wizard
only when running on a Windows 2000 or XP server with RIS installed. No
floppy disk is required. An entry appears in the RIS menu.
142
Creating boot disks and boot images
143
Creating boot images and disks with the Ghost Boot Wizard
144
Multicard templates and the boot disk
145
Creating boot images and disks with the Ghost Boot Wizard
146
Adding network drivers to the Ghost Boot Wizard
You can add files to the template and customize the Autoexec.bat and
Config.sys files of the resulting boot package. Usually these are either DOS
drivers or executable programs, but you can add any type of file. Files
added to the template appear in the list to the right of the button.
147
Creating boot images and disks with the Ghost Boot Wizard
148
Adding command-line parameters to a boot package
Switch Description
149
Creating boot images and disks with the Ghost Boot Wizard
-clone,mode=dump,src=1,dst=d:\backups\maindrv.gho
The -ja = sessionname switch lets you avoid having to specify the
GhostCast session name parameters on each client computer.
For more information, see “Controlling the GhostCast session from the
server” on page 183.
If you use MS-DOS, then you must install MS-DOS files on the computer on
which you are creating the boot disk. Using a floppy disk that was
formatted on a Windows 9x computer, you can install the MS-DOS files
during the creation of the boot disk.
150
C H A P T E R
Additional Console
options
Logs/summaries Description
Console Log A log of all steps occurring during the execution of tasks
from the command line or scheduler.
151
Additional Console options
Logs/summaries Description
Event Log The history of all events for all computers for a task.
Ghost error file The error file that is created on the client computer if the
task fails.
Event Details The details for an item in the client summary or event log.
Active Tasks A second window that lists tasks that are currently
executing.
152
Monitoring the Symantec Ghost Console activity
153
Additional Console options
However, you can manually launch the Configuration Server from the
Symantec Ghost Console if you need to for any reason. For example, if you
have closed it down by mistake.
154
Setting the Symantec Ghost Console options
■ Set the frequency with which status reports are sent from Console
client computers to the Console.
This lets you reduce network traffic if required. This may be useful if
computers are networked over a WAN. You can also set the client
heartbeat for each subnet and for each client computer. If you set the
client heartbeat to 0, then the status of the client computer is not
indicated on the Console.
For more information, see “Setting properties for computers in a
subnet” on page 61 and “Setting the client computer heartbeat interval”
on page 65.
■ Set the data transfer mode.
You can set the data transfer mode depending on your network
hardware setup. Used in conjunction with the network bandwidth
limits, you can optimize the way in which image files are transferred
over your network. You can alter these settings globally, for a task, and
for a single execution of a task.
For more information, see “Setting the data transfer mode” on
page 187, “Controlling the amount of network bandwidth used” on
page 188, and “Optimizing data transfer over the network” on page 85.
■ Control the amount of network bandwidth used.
Symantec Ghost lets you control how much network bandwidth is
used when transferring image files while cloning. By using this
functionality, you can avoid overloading the network with
GhostCasting traffic.
For more information, see “Controlling the amount of network
bandwidth used” on page 188.
■ Set the size of the virtual partition.
You can alter the size of the virtual partition if you require. For
example, if you need to transfer a large executable to the virtual
partition.
■ The number of minutes the Configuration Server waits for a client to
connect.
155
Additional Console options
156
Setting the Symantec Ghost Console options
157
Additional Console options
158
Symantec Ghost Console security
The Windows client needs the public certificate to communicate with the
Console. When the Console client is installed, it prompts for the Console
computer name. This is the Windows computer name specified in
159
Additional Console options
Windows network settings. The client uses this name to communicate with
the correct Console.
If the client computer is installed with a boot partition, you can generate a
boot disk and a boot partition image file with the Ghost Boot Wizard. Use
the wizard from the Console Server to ensure that the correct public
certificate file is automatically included with all boot partition image files
that include the Console client. If the client is installed with the virtual
partition, this is done automatically.
For NT based computers you must perform a remote client install for the
client computer.
For 9x computers you must uninstall and then reinstall the client.
There are two certificates for the Console Server on each client, one in the
Symantec Ghost boot partition, and one with the Windows client in the
Symantec Ghost directory.
160
C H A P T E R
The image files created with Symantec Ghost have a .gho extension by
default. They contain the entire disk or partitions of the disk. Image files
support:
■ Various levels of compression
■ CRC32 data integrity checking
■ Splitting of media files
■ Spanning across volumes
Symantec Ghost images contain only the actual data on a disk. If you have
a 9 GB drive with only 600 MB of data, the Symantec Ghost image is
approximately 600 MB, or smaller if you use compression.
161
Image file options
If you also use the Ghost Explorer application, an image file companion
utility, you can recover individual files from these image files selectively
without having to restore the complete partition or disk.
As a rule, the more compression you use, the slower Symantec Ghost
operates. However, compression can improve speed when there is a data
transfer bottleneck. There is a big difference in speed between high
compression and no compression when creating an image file on a local
disk. Over a network connection, fast compression is often as fast as, or
faster than, no compression. Over a parallel cable, high compression is
often faster than no compression because fewer bytes are sent over the
cable. Decompression of high-compressed images is much faster than the
original compression. The level of compression that you select depends on
your own individual requirements.
162
Image files and CRC32
When an image file is created, CRC32 details are embedded into the file to
ensure that image file corruption is detected when it is being loaded to
disk. CRC32 is currently included on a file-by-file basis with FAT and Linux
Ext2 partitions, and on an MFT table basis for NTFS partitions.
In addition to image file error detection, the CRC values are used to verify
that image files and partitions or disks are identical. This offers an
additional detection method against bad sector writes and other drive
anomalies that may be missed during normal imaging checks.
A text file containing CRC values and associated file attributes can be
generated using the -CRC32 command-line switch.
163
Image file options
Symantec Ghost also allows size limiting of spans when spanning volumes
to ensure that no span exceeds the maximum size.
164
Image files and volume spanning
With all image files, the only constraint on the selection of the destination
volume is that it must not be part of the source selection. For example, it
cannot be on a source disk or partition if that disk or partition is to be
included in the image.
Before saving the disk contents to the image file, Symantec Ghost shows
the source and destination details and offers a chance to back out. The
default is to back out.
Once the process starts, the image file creation continues until the
destination volume is full.
If you started spanning onto a JAZ disk and want to span a 3.0 GB drive
onto JAZ disks, you can choose to continue on JAZ disks. If you want to
span across different forms of media, you can select an option to span onto
a different location.
Record where the span segments are saved and the segment file names.
Symantec Ghost does not record the locations and file names you selected.
Information about the partitions is stored at the start of the image file. This
is updated at the end of the Ghost process, which might require you to
reinsert the first disk in the span set. Symantec Ghost prompts you for the
first disk in the span set and for subsequent volumes when loading from an
image.
165
Image file options
You can continue on the same form of media. For example, if you
originally spanned onto a JAZ disk and want to restore a 3.0 GB drive from
JAZ disks, you can replace the disk and continue from JAZ disks.
To load spanned images without prompting, you can set the AutoName
switch on the Ghost main menu under Options.
When using tape drives with Symantec Ghost, the tape drive can be
selected as the source or destination device in the File Locator window.
Each SCSI tape device is shown as MTx, where x is a number starting at 0
166
Image files and tape drives
and increasing incrementally for each drive present. For example, the
following screen shows a tape drive MT0 available for use.
For Symantec Ghost to access SCSI tape drives, a DOS ASPI driver must be
installed prior to use.
For more information, see “Setting up the hardware and transfer methods”
on page 325.
Symantec Ghost in its default mode performs well with most SCSI tape
devices. In some situations with older SCSI tape devices and possibly with
unreliable tapes, Symantec Ghost may need to be configured to slow down
or alter the way it uses the tape device.
167
Image file options
For Symantec Ghost to access SCSI CD writers, a DOS ASPI driver must be
installed prior to use.
Symantec Ghost should work with most SCSI and IDE writers produced in
2000 or later. It may or may not work with older models. Use the latest
firmware available for your CD writer. An IDE CD writer performs best if it
is mounted on the secondary IDE controller.
168
Cloning dynamic disks in Windows 2000
A list of CD writers that Symantec Ghost has been tested with is available
on the Symantec Service and Support Web site:
http://service.symantec.com
When creating an image on CD, you can make the CD bootable. You need
an appropriate boot disk with CD drivers and MSCDEX loaded for this
option. The Ghost Boot Wizard can create a suitable boot disk for you.
Start from a disk with appropriate drivers and MSCDEX loaded. Symantec
Ghost restores images from CD as it does from other media, so the
CD-reader must have a CD-drive letter.
169
Image file options
You can restore an image of a dynamic disk to a basic disk only, not to a
dynamic disk. After you have restored the image file to a basic disk, you
can then use Windows 2000 Disk Manager to convert the disk to a dynamic
disk.
You can also take a disk image of a dynamic disk if you use the image all
(-ia) switch. The -ia switch performs a sector-by-sector copy of the entire
disk. The disk on which the image is to be loaded must be identical to the
source disk in every way. This function is only useful for creating a back
up. If you load an image created using -ia onto a drive with different
geometry, Windows 2000 does not understand the dynamic disk.
If you load an -ia disk image of a dynamic disk onto a SCSI hard drive and
you get the error Destination drive too small, you must load the ASPI driver
for the SCSI card. Without an ASPI driver, Symantec Ghost does not always
have the correct size of the SCSI drive and cannot distinguish if the drive is
large enough to hold the image.
Note: You should not take an image all of a dynamic disk as the method is
slow and the image file would be very big.
Symantec Ghost implements file skipping differently for each type of file
system:
■ FAT file systems: Files are not included on the image file or destination
disk.
■ NTFS file systems: A file with the same name is created on the image
file or destination disk, but the contents of the file are not cloned.
170
Hibernation and swap files
171
Image file options
172
G h o s t C a s t i n g i m a g e
f i l e s i n a n e t w o r k e d
e n v i r o n m e n t
Using GhostCasting to
create and load images
The GhostCast Server supports three forms of data transfer for transferring
image files during cloning tasks:
■ Unicasting
■ Direct Broadcasting
■ Multicasting
175
Using GhostCasting to create and load images
176
Preparing for GhostCasting
Windows Ghostsrv.exe
DOS Dosghsrv.exe
If you are creating a model computer for Windows NT computers, see the
Online Knowledge Base article “How to clone an NT system” under the
General Information section.
You may need to create a model computer for each unique hardware
setup. For example, if you have some computers with SCSI disks and some
with IDE disks, you need to have separate images for them. However, on
Windows 2000/XP computers, Microsoft Sysprep can help you create a
generic template image for different hardware setups.
177
Using GhostCasting to create and load images
178
Creating a GhostCast Server
179
Using GhostCasting to create and load images
4 Click Accept Clients to accept the client computer into the session.
The Accept Clients button becomes active when all fields are
completed.
5 Start Symantec Ghost on the destination client computers and begin a
GhostCast session.
For more information, see “To connect a source computer to a
GhostCast session” on page 180.
Once the GhostCast session is started on the server, you can start the client
computers from a boot disk and have them join the session.
180
Creating a GhostCast Server
181
Using GhostCasting to create and load images
5 Click Accept Clients to accept the client computer into the session.
The Accept Clients button becomes active when all required fields are
completed.
6 Log the client computers on to the GhostCast session.
For more information, see “To join a GhostCast session to load an
image file to client computers” on page 182.
7 Click Send to start the image load and the GhostCast session when all
of the required clients have joined the session.
If you close the GhostCast Server or turn off the computer once a
GhostCast session has started, the GhostCast session stops and a warning
message appears.
182
Creating a GhostCast Server
8 Click OK.
9 Click Yes to indicate that the computer is ready for the image load to
begin.
For more information, see “Running the Symantec Ghost executable”
on page 190.
The IP and MAC addresses of the client computers that are connected
and waiting for the GhostCast session to start appear in the Connected
Clients list along with their statuses.
183
Using GhostCasting to create and load images
Only use the -sure switch when you are sure that you are writing from
the intended disk or partition.
6 Click Accept Clients to accept the client computer into the session.
7 Start the client computers in DOS.
8 Run Ghost using the -ja switch to log on to the GhostCast session from
the command line:
ghost.exe -ja=SessionName
9 Confirm your choices on the client computers if the -sure switch was
not used.
For more information, see “Running the Symantec Ghost executable”
on page 190.
184
Creating a GhostCast Server
7 Click Accept Clients to accept the client computer into the session.
8 Start the client computers in DOS.
9 Run Ghost using the -ja switch to log on to the GhostCast session from
the command line:
ghost.exe -ja=SessionNm
10 Confirm your choices on the client computers if the -sure switch was
not used.
For more information, see “Running the Symantec Ghost executable”
on page 190.
185
Using GhostCasting to create and load images
If you specify more than one Auto Start parameter, the session starts when
one of the conditions is fulfilled.
186
Creating a GhostCast Server
Note: Cloning tasks support all three transfer options. Any transfer of data
during a Symantec Ghost Console task that is not a transfer task is via
Unicast.
Multicasting is usually the most efficient option for the following reasons:
■ Only one stream of data is sent out for all clients.
■ Multicasting sends packets to client computers that have requested
data from the GhostCast Server. Only computers that have requested
this data receive it.
187
Using GhostCasting to create and load images
You can alter these settings globally, for a GhostCast session, and for a
task.
For more information, see “Optimizing data transfer over the network” on
page 85 and “Setting the Symantec Ghost Console options” on page 154.
You can enter a value for loading an image, dumping an image, or both.
The values are saved and loaded the next time that you run the GhostCast
Server. However, if you run a GhostCast session from the command line,
the limits that are set on the command line are used for that session only.
188
Creating a GhostCast Server
Unicast Yes No No
In the situations in which you should not limit network bandwidth, the
hardware directs the traffic to intended recipients only, and all other users
should be unaffected.
189
Using GhostCasting to create and load images
The Symantec Ghost client executable runs under DOS and uses a packet
driver interface to the network card. The TCP/IP settings are stored in a
configuration file named Wattcp.cfg that is located in the directory in which
Ghost.exe runs.
190
Creating a GhostCast Server
For more information, see “Setting up the hardware and transfer methods”
on page 325.
For more information, see “Cloning disks” on page 215 and “Cloning
partitions” on page 221.
For any GhostCasting session, the session name on the entry screen of the
client should match the GhostCast Server session name.
191
Using GhostCasting to create and load images
192
C H A P T E R
You can run the Symantec Ghost GhostCast Server from the command line
by including the appropriate switches with the Windows or PC-DOS
versions of the application.
Syntax
193
GhostCasting from the command line
For more information, see “Boot disks with network support” on page 136
and “Creating a DOS boot disk manually” on page 198.
Syntax
194
GhostCast Server command-line options
Switch Description
-Ffilename Specifies log file name for the -L option (by default,
Ghostlog.txt).
195
GhostCasting from the command line
Switch Description
Starts a GhostCast session called TestSession and uses the image file
c:\test123.gho. The connecting clients’ IP addresses appear on-screen. Start
the session transmission.
For more information, see “Starting the GhostCast session” on page 194.
196
GhostCast Server command-line options
Starts a GhostCast session called TestSession, and uses the second partition
in the image file c:\test123.gho. The connecting clients’ IP addresses
appear on-screen.
Starts a GhostCast session called TestSession, uses the first partition in the
image file c:\test123.gho, and places it in the second partition of the
clients’ first disk. The connecting clients’ IP addresses appear on-screen.
Start the GhostCast transmission.
For more information, see “Starting the GhostCast session” on page 194.
Starts a GhostCast session called TestSession and uses the image file
c:\test123.gho. The connecting clients’ IP addresses appear on-screen.
Once ten clients have connected, the session transmission starts
automatically.
Starts a GhostCast session called TestSession and uses the image file
c:\test123.gho. The connecting clients’ IP addresses appear on-screen. At
half past one in the afternoon (1:30 PM), the session transmission starts
automatically.
197
GhostCasting from the command line
Starts a GhostCast session called TestSession and uses the image file
c:\test123.gho. The connecting clients’ IP addresses appear on-screen. At
either half past one in the afternoon (1:30 PM), or after 10 clients join the
session, transmission starts automatically. Ghostsrv does not wait for both
conditions to be met. When the GhostCast session is completed, ghostsrv
closes down as requested.
Isolating problems
ghostsrv c:\test123.gho TestSession -la -ferrlog.txt -n10
Starts a GhostCast session called TestSession and uses the image file
c:\test123.gho. The connecting clients’ IP addresses appear on-screen.
Once 10 clients connect, the session transmission starts automatically and a
log file, Errlog.txt, is created for debugging. Creating a log file reduces the
performance of the GhostCast transmission.
198
Creating a DOS boot disk manually
199
GhostCasting from the command line
■ NDIS version 2.01 driver with packet driver shim supplied by Symantec
Ghost. NDIS version 3 or later drivers do not work with the Ghost
GhostCast client.
For more information, see “To set up an NDIS 2.01 network adapter
driver with supplied packet driver shim” on page 201.
■ Third-party network adapter driver and packet driver shim. These have
not been tested or documented with the Symantec Ghost GhostCasting
feature. This includes ODI-based packet driver shims such as
Odipkt.com.
The NDIS driver setup is more complex. The selection of NDIS 2.01 and
shim, or a network interface card-specific packet driver depends on factors
such as availability, reliability, ease of use, and speed. By running a system
test, you can choose the best alternative for your network interface card
(that is, the specific packet driver or the NDIS 2.01 driver and shim).
200
Creating a DOS boot disk manually
*.dos
201
GhostCasting from the command line
drivername = ELNK3$
Type any additional required options for the network interface card
configuration in the [PC_CARD] module. Refer to the documentation or the
sample Protocol.ini for the network interface card in use, if required. For
example, the 3Com 509 card lets you optionally specify the IO Base
address:
[PC_CARD]
drivername = ELNK3$
IOADDRESS = 0x300
The /I: in the first line indicates the location of the Protocol.ini file and
must be present. For example, /I:\ specifies the root directory and /
I:A:\NET specifies A:\NET.
The last line refers to the driver for the network interface card. For
example, if you use a 3COM509, the last line of Config.sys should be
replaced with:
device=ELNK3.DOS
202
Creating a DOS boot disk manually
NETBIND binds the NDIS drivers together and installs the packet driver
interface.
203
GhostCasting from the command line
204
C H A P T E R
GhostCasting and IP
addresses
205
GhostCasting and IP addresses
If you use a DOS boot disk to start GhostCasting with locally specified IP
addresses, each computer requires a different Wattcp.cfg file to be
specified to ensure that every boot disk for each workstation is unique.
206
Locally specified IP addresses
NETMASK = 255.255.255.0
GATEWAY = 192.168.100.1
NETMASK = 255.255.255.0
GATEWAY = 192.168.100.1
If the server and client are within the same subnet, a default gateway is not
required.
207
GhostCasting and IP addresses
You must run the BOOTP or DHCP server on the network to use BOOTP
or DHCP to specify a computer’s IP address. This BOOTP/DHCP server
listens on the network for computers requesting an IP address, and replies
with the address that the BOOTP/DHCP server is configured to provide.
The BOOTP/DHCP server must be configured to provide the IP address,
subnet mask, and (optionally) the default gateway.
208
Using BOOTP/DHCP to assign IP addresses
The Wattcp.cfg file for DOS computer #2 is empty or does not exist
because Symantec Ghost GhostCasting defaults to using BOOTP and DHCP
if no locally specified network TCP/IP parameters are supplied.
The Wattcp.cfg file for DOS computer #3 is empty or does not exist
because Symantec Ghost GhostCasting defaults to using BOOTP and DHCP
if no locally specified network parameters are supplied.
The controlling element for DHCP is the DHCP server that serves the
requests of clients and ensures that no duplicate IP addresses exist on the
network. Since many DHCP servers can be placed on a network, avoid
duplicate address generation and its problems. This is equally true for
BOOTP servers.
209
GhostCasting and IP addresses
210
C l o n i n g i m a g e f i l e s
l o c a l l y
Symantec Ghost as a
standalone program
213
Symantec Ghost as a standalone program
You cannot run Symantec Ghost within Windows NT, Windows 2000/XP,
Linux, OS/2, or other nonDOS operating systems. To run Symantec Ghost
on a computer running a nonDOS operating system, use a Ghost boot disk.
214
Cloning disks
Cloning disks
You access disk cloning procedures from the main menu. You can specify
one of the following transfer methods:
■ Local
■ LPT > Master
■ USB > Master
■ TCP/IP > Master
215
Symantec Ghost as a standalone program
By default Symantec Ghost tries to maintain the same size ratio between
the new disk partitions. However, you should note the following:
■ You can change the size of any destination FAT, NTFS, or Linux Ext2
partition by entering the new size in megabytes.
■ You cannot enter a value that exceeds the available space, is beyond
the file system’s limitations, or that is not large enough to contain the
data held in the source partition.
216
Cloning disks
Warning: Only click Yes if you are sure that you want to proceed. The
destination drive is overwritten with no chance of recovering any data.
Warning: You should remove the second hard drive before you restart
your computer. If you leave the second drive in the computer, damage
can occur to both of the bootable operating systems.
When using peer-to-peer connections, the image file is created on the slave
computer.
If you write the image file to a CD, you can make the CD bootable. If a
boot disk is placed in the floppy drive before the cloning session begins,
Symantec Ghost copies the system files from the boot disk onto the CD.
217
Symantec Ghost as a standalone program
218
Cloning disks
7 When the “Proceed with Image File Creation?” question appears, check
the details and ensure that the correct options have been selected.
8 Do one of the following:
■ Click Yes to proceed with the image file creation.
The system performs an integrity check of the file structure on the
source disk and then copies the source disk to the destination
image file. If you need to abort the process, press Ctrl-C, but be
aware that this leaves the destination image file in an unknown
state.
■ Click No to return to the menu.
9 On the main menu, click Check > Image File to verify the integrity of
the image file.
219
Symantec Ghost as a standalone program
Warning: Only click Yes if you are sure that you want to proceed. The
destination drive is completely overwritten with no chance of
recovering any data.
220
Cloning partitions
Cloning partitions
You access partition cloning procedures from the main menu. You can
select to transfer with one of the following methods:
■ Local
■ LPT > Master
■ USB > Master
■ TCP/IP > Master
221
Symantec Ghost as a standalone program
Warning: Only click Yes if you are sure that you want to proceed. The
destination partition is completely overwritten with no chance of
recovering any data.
The image file may reside on a mapped network drive or a local drive with
a FAT filesystem (but not the one from which it is being copied). Local
drives include writable CD, tape, ZIP, JAZ, and LS120 Superdisk drives.
When using peer-to-peer connections, the image file is created on the slave
computer.
If you write the image file to a CD, you can make it bootable. If a boot disk
is placed in the floppy drive before the cloning session begins, Symantec
Ghost copies the system files from the boot disk onto the CD.
222
Cloning partitions
223
Symantec Ghost as a standalone program
224
Cloning partitions
Warning: Only click Yes if you are sure that you want to proceed. The
destination partition is completely overwritten with no chance of
recovering any data.
225
Symantec Ghost as a standalone program
For more information, see “Image files and CD writers” on page 168.
For more information, see “Standard boot disks with the option of LPT and
USB support” on page 135.
To make the CD bootable, you must have a second boot disk. This boot
disk is created in the Ghost Boot Wizard, using the CD-ROM Boot Disk
option. This option creates a boot disk that contains the CD-R/RW driver
files.
226
Adding switches to your cloning task
For more information, see “Cloning a disk to an image file” on page 217.
Symantec Ghost lets you make the CD bootable during the creation of the
image file. To make the CD bootable, follow the on-screen instructions.
When prompted for the required files, insert the second boot disk that you
created using the Ghost Boot Wizard into the computer’s floppy disk drive.
227
Symantec Ghost as a standalone program
You only need to create a DOS boot disk if you are using Symantec Ghost
without GhostCasting, TCP/IP, or peer-to-peer connections.
228
C H A P T E R
Standalone
configuration
There are some differences between the standalone configuration and the
post clone configuration from the Console. The differences are as follows:
■ Standalone configuration allows the addition of Microsoft Windows
NT/XP/2000 computers to a domain. However, you must create the
computer account on the domain before using the standalone
configuration. For the computer account to work, you must first add
security permissions for Windows 2000 and Windows XP native mode
Active Directory domain controllers.
■ Standalone configuration supports an extra option to disable itself after
running. This works on standalone client installations only, and
disables the standalone configuration from running on that computer
after it is run the first time. To use the standalone configuration again
on that computer, you must uninstall and reinstall the standalone
configuration client.
229
Standalone configuration
The following example files on which to base your program are included:
■ Genghostfile.cpp
■ Genghostfile.dsp
■ Genghostfile.dsw
■ StdAfx.cpp
■ Stdafx.h
■ MachConf.h
All of the example program files, .dll files, and Help files are on the
Symantec Ghost CD in the following directory:
\Extras\Source\Genghostfile
230
Running the standalone configuration
You can also run the standalone configuration without using Ghost.exe.
231
Standalone configuration
232
C r e a t i n g e x e c u t a b l e s t o
r o l l o u t a p p l i c a t i o n s
235
Getting started with AutoInstall
Symantec Ghost AutoInstall has two components to help you create and
customize AI packages. AI Snapshot creates an installation script that
records the changes to a model computer when software is installed. AI
Builder uses the installation script to create a package that duplicates the
changes made by the software installation. AI Builder also lets you
customize the package to meet your needs. Once created, packages can be
modified using AI Builder.
Using AutoInstall
To use AutoInstall you must perform the following procedures:
1 Install AI Builder on the Console server.
AI Builder is included in the Corporate Console installation.
2 Install AI Snapshot and AI Builder on the model computer.
3 Capture existing system information.
4 Install the software that you would like to deploy.
5 Capture system information again to determine changes.
6 Use AI Builder to build and save the file created by AI Snapshot as an
executable AI package. You can also use AI Builder to customize the
installation script, prior to building, or after building the executable, if
necessary.
7 Use the Symantec Ghost Console to deploy the AI package to target
workstations.
236
Using AutoInstall
237
Getting started with AutoInstall
For more information see “Installing the Console client” on page 39.
238
Installing Microsoft products using AutoInstall
Note: You must have a Volume License Key from Microsoft to perform this
installation.
239
Getting started with AutoInstall
240
C H A P T E R
Creating AI packages
Note: If you are going to install the software on the model computer using
Microsoft Installer, make sure that Microsoft Installer is not installed before
the first snapshot is taken.
When installing software, the model computer should have only the
operating system installed.
241
Creating AI packages
The next step is to install the software that you would like to package.
242
Creating an installation script for a software installation
3 During the installation, select the options that you want to install on
the target workstations.
Some installation programs launch slowly and have long pauses
between screens.
4 Do one of the following:
■ For a Microsoft installation, cancel all restarts by clicking No or
pressing Ctrl-Esc to regain control of the computer until the build
is completed.
■ For all other installations, restart the computer if the installation
requires it.
5 Click AI Snapshot.
243
Creating AI packages
If you are installing the software from an autorun CD, the initial installation
steps are automatically performed.
244
Customizing and building AI packages
The installation script is an ASCII text file that can be read by AI Builder, a
text editor. The commands in the installation script dictate how the
software is installed.
245
Creating AI packages
The checklist interface guides you through the required steps. Installations
can test for CPU, RAM, and video configurations. You can use If statements
to adapt to individual configurations. AI Builder creates a wizard interface
for AI packages that can be run by the client. It cannot be deployed by the
console.
Extra lines are ignored, so you can add them for readability. However,
extra spaces and carriage returns should not be added as they cause syntax
errors. You can use the REM command to add remarks to any line. The text
on that line is ignored by AI Builder even if it is a valid command. This is
useful for documenting your installation script.
246
Customizing and building AI packages
The customizing options appear in the left pane, and details of the selected
option appear in the bottom right pane. The installation script is in the top
right pane.
247
Creating AI packages
This table outlines the command types that are available in AI Builder.
Defaults & Calls Set up defaults and include calls to external programs.
248
Customizing and building AI packages
4 In the right pane of the AI Builder window, enter the parameters for
the selected command.
For more information about AI Builder commands, consult the online
Help file.
5 Do one of the following:
■ Click Add to add a command.
■ Click Remove to remove a command.
6 Repeat steps 1 through 5 until the installation script is completed.
7 Build the AI package.
For more information, see “Building AI packages” on page 250.
249
Creating AI packages
Building AI packages
When you have made all of the changes to your installation script that you
require, you can build the AI package.
The package is saved as a single file that requires a large storage medium,
such as a hard drive, network file server, or CD-ROM.
To build an AI package
1 On the Build menu, click Build.
2 Type the build directory if it is not already listed.
The default directory is:
C:\Program Files\Symantec\Ghost\Working
3 Click Build.
4 Close AI Builder.
AI Builder automatically creates an entry in the task log with a status of
Hold.
250
Customizing and building AI packages
To modify an AI package
1 Open AI Builder.
2 On the File menu, click Open.
3 Navigate to the package (an .exe file).
The default location is:
C:\Program Files\Symantec\AutoInstall\Working\Onefile\
4 Double-click the file to open it.
The installation script is extracted from the file.
251
Creating AI packages
The Symantec Ghost Console creates an installation task that rolls out AI
packages to client computers. The Console task provides the path to the AI
package to be run, as well as the parameters that dictate which target
workstations receive the package.
When the distribution server tells the target workstation that an AI package
is available for installation, the Symantec Ghost client runs the executable.
252
S y m a n t e c G h o s t
u t i l i t i e s
255
Using Ghost Explorer to modify image file contents
Ghost Explorer lets you quickly and easily restore files or directories from
an image file. Using Ghost Explorer you can:
■ View image file contents and save a list of files within an image file.
■ Restore files or directories from an image file.
■ Add, move, copy, delete, and launch files from and within an image
file.
■ Use drag-and-drop or cut-and-paste functionality to add files and
directories from Windows Explorer to the image file.
■ Set span sizes.
■ Add a description to an image file.
256
Restoring a file or directory from an image file
You can check the Symantec Ghost version in which your image file was
created in Ghost Explorer.
Note: You can also drag and drop a file from Ghost Explorer to Windows
Explorer to restore it.
257
Using Ghost Explorer to modify image file contents
You can check the version of Symantec Ghost used to create your image
file in Ghost Explorer.
Warning: If you use Ghost Explorer to add files to an image file, there may
be some performance degradation when you clone the file using
GhostCasting. Symantec Explorer calculates whether compilation is
recommended. If it is, you can compile the file to improve performance.
For more information, see “Compiling a file” on page 259.
258
Setting span file sizes
Compiling a file
If you add or delete files from within an image file, the image file becomes
fragmented. Symantec Ghost takes longer to restore a fragmented image
than a compiled file. Compiling a file defragments it, which improves
performance when restoring.
To compile a file
1 On the File menu, click Compile if compilation is recommended.
2 Type a new name for the compiled file.
3 Click Save.
259
Using Ghost Explorer to modify image file contents
C:\Progra~1\Symantec\Ghost\Ghostexp
You can also provide a Ghost image file as an argument for Ghost Explorer
to open. For example:
Ghostexp n:\Images\Myimage.gho
If Ghost Explorer reports a corruption in your image file, you may be able
to get further details of the nature of the corruption. Normally, you would
only use these options when asked to do so by Ghost Explorer Technical
Support. Start the program with one of the following arguments:
-d1 Reports on corruptions or significant events in FAT file systems.
260
Using Ghost Explorer from the command line
The reports are presented to you as dialog boxes. You can use all switches,
or use -d7 to turn on all options.
Ghost Explorer has a batch mode in which it carries out a single command
and then exits. In this version, batch mode supports the saving of the
contents to a text file only. To use this mode, specify one of the following
switches:
-t Save the list of directories in the dump file to a file with the same
name as the image file but with an extension of .txt.
For more information, see “Setting span file sizes” on page 259.
The image index created by versions of Symantec Ghost prior to 5.1c did
not handle long file names containing double byte characters correctly,
such as file names in Asian or Eastern European languages. Ghost Explorer
may be able to show these names properly by reading them directly from
the image file instead of from the index. However, the loading of the image
is much slower. Use the switch -ignoreindex to force this behavior.
261
Using Ghost Explorer to modify image file contents
262
C H A P T E R
Managing partitions
using GDisk
Introducing GDisk
GDisk lets you create partitions, reinitialize Master Boot Records, and
delete and wipe your disks in many different ways.
263
Managing partitions using GDisk
GDisk is a complete replacement for the Fdisk and Format utilities that
offers:
■ On-the-fly formatting.
■ Extensive partition reporting.
■ High security disk wiping.
■ The ability to hide a partition or make a hidden partition visible.
To run GDisk
1 Start your computer in DOS mode.
2 At the DOS prompt, type progra~1\symantec \ghost\GDisk
followed by the required disk and switches.
To run GDisk32
1 On the Windows taskbar, click Start > Programs > MS-DOS Prompt.
2 At the DOS prompt, type progra~1\symantec \ghost\GDisk32
followed by the required disk and switches.
Status (default) /status List information on the specified fixed disk and
its partitions.
264
Overview of main command-line switches
More detailed Help is available by qualifying the Help command with the
switch for one of the nine main modes of operation.
For example, to view the detailed Help file for Hide, type one of the
following command lines:
■ GDisk: C:\progra~1\symantec\ghost\gdisk /hide /?
■ GDisk32: C:\progra~1\symantec\ghost\gdisk32 /hide /?
265
Managing partitions using GDisk
Switch Explanation
/x Prevents GDisk from using extended disk access support. This may
result in GDisk not being aware of the full capacity of the disk.
/i Prevents GDisk from using direct IDE disk-access support. This may
result in GDisk not being aware of the full capacity of the disk.
/s Prevents GDisk from using direct SCSI disk-access support. This may
result in GDisk not being aware of the full capacity of the disk.
Creating a partition
The create switch creates a partition of the specified type using the largest
block of unused disk space. The partition is not formatted during the
operation unless the /for switch is used. You cannot create a dynamic disk
partition.
Note: When GDisk loads a FAT32 partition, it aligns the first data sector to
a 4 KB boundary from the start of the partition.
266
Creating a partition
Depending on the version of GDisk that you require, the syntax for this
command is one of the following:
■ GDisk: gdisk disk /cre {/pri| /ext| /log} [/sz: {MB|pcent{p|%}}]
[/end] [/for [/q] [/v[:label]]] [/-32] [/ntfat16]
■ GDisk32: gdisk32 disk / cre {/pri| /ext| /log} [/sz: {MB|pcent{p|%}}]
[/end] [/for [/q] [/v[:label]]] [/-32] [/ntfat16]
Switch Explanation
/end Creates the partition at the end of the free space. If this
switch is not used, then the partition is created at the
beginning of the free space.
/for Formats the new partition once it has been created. Unless
the /ntfat16 or /-32 switches are used, the partition type is
determined by the following:
■ If the partition is less than 16MB: FAT12
■ If the partition is between 16MB and 512MB: FAT16
■ If the partition is greater than 512MB: FAT32
/v[:label] Gives the new formatted partition the specified label when
used in combination with the /for switch.
267
Managing partitions using GDisk
Switch Explanation
Note: The switch must be used when deleting Linux partitions if LILO
resides in the MBR.
Depending on the version of GDisk that you require, the syntax for this
command is one of the following:
■ GDisk: gdisk disk /mbr [/wipe]
■ GDisk32: gdisk32 disk /mbr [/wipe]
Switch Explanation
268
Showing information about disks
Depending on the version of GDisk that you require, the syntax for this
command is one of the following:
■ GDisk: gdisk [disk] [/status] [/raw] [/lba] [/ser]
■ GDisk32: gdisk32 [disk] [/status] [/raw] [/lba] [/ser]
Switch Explanation
/raw Shows the contents of the partition table in CHS form if used
with the disk switch.
/lba Shows the contents of the partition table in logical block form if
used with the disk switch.
If the name of a text file is supplied along with the batch mode switch,
GDisk opens the file and executes the commands within it until all
commands have been executed or one of the commands encounters an
error.
For example:
269
Managing partitions using GDisk
If the batch mode switch is supplied without a file name, GDisk prompts
for the commands to execute.
The following command deletes all partitions and creates two new ones on
the second fixed disk with confirmation prompting turned off:
gdisk 2 /y /batch:two-new.gg
1 /batch:two-new.gg
2 /batch:two-new.gg
gdisk /batch:std-init.gg
270
FAT16 partitions in Windows NT
The switch /del/all deletes all partitions that are on the disk. Any other
space that has not been used for creating a partition is not deleted.
Deleting an extended partition also deletes any logical partition within it.
The /diskwipe switch wipes the entire disk, partitions, partition table, MBR,
and all used and unused space.
Depending on the version of GDisk that you require, the syntax for the
delete switch is one of the following:
■ GDisk: gdisk disk /del {/pri[:nth]|/ext[:nth]|/log:nth|/p:partn-no|/all}
[/qwipe|/dodwipe|/customwipe:n]
■ GDisk32: gdisk32 disk /del {/pri[:nth]|/ext[:nth]|/log:nth|/
p:partn-no|/all} [/qwipe|/dodwipe|/customwipe:n]
271
Managing partitions using GDisk
Depending on the version of GDisk that you require, the syntax for the
diskwipe switch is one of the following:
■ GDisk: gdisk disk /diskwipe [dodwipe| /customwipe:n]
■ GDisk32: gdisk32 disk /diskwipe [dodwipe| /customwipe:n]
Switch Explanation
/ext[:nth] Deletes the nth extended DOS partition. The default is 1. Also
deletes any logical partitions in the extended partition.
/log:nth Deletes the nth logical DOS drive from the extended DOS
partition.
/qwipe Overwrites the partition’s data area before deleting the partition.
Makes one pass of the disk.
/dodwipe Overwrites the partition’s data area before deleting the partition.
Makes seven passes of the disk. This is the security standard for
the U.S. Department of Defense.
For example:
■ gdisk 1 /del /all /qwipe completes one pass to delete all partitions and
data on disk 1.
■ gdisk 1 /del /p:2 /qwipe wipes partition 2 on disk 1 with one pass.
■ gdisk 1 /diskwipe /customwipe:15 wipes the entire disk with 15
passes.
272
Activate or deactivate a partition
Depending on the version of GDisk that you require, the syntax for this
command is one of the following:
■ GDisk: gdisk disk /[-]act /p:partn-no
■ GDisk32: gdisk32 disk /[-]act /p:partn-no
Switch Explanation
Depending on the version of GDisk that you require, the syntax for this
command is one of the following:
■ GDisk: gdisk disk /[-]hide /p:partn-no
■ GDisk32: gdisk32 disk /[-]hide /p:partn-no
Switch Explanation
273
Managing partitions using GDisk
When GDisk changes the state of Boot.ini, a copy of the current Boot.ini is
created. The copy is named either C:\boot_gdisk32_copy.ini or
C:\boot.ini_gdisk32_copy.
/inifile lets you specify the full path and file name of the current Windows
NT/2000/XP Boot.ini file. This lets you locate Boot.ini if it is not on the C
drive.
274
Modify the Windows NT/2000/XP boot menu
The following table describes the function of each switch for both types of
entries.
Switch Explanation
/inifile:filename The full path and file name for Boot.ini. The default value
is C:\boot.ini.
275
Managing partitions using GDisk
This entry uses the Advanced RISC Computing (ARC) style path to describe
the relative disk location for the entry. The entry has the following format:
For example:
multi(0)disk(0)rdisk(0)partition(1)\winnt=”Boot NT System”
For more information, see the Microsoft Knowledge Base article Q102873 -
“BOOT.INI and ARC Path Naming Conventions and Usage.”
This entry to Boot.ini references a boot sector file used to continue the
starting process.
276
Modify the Windows NT/2000/XP boot menu
For example:
The /bsectfile switch lets you specify the full path and file name for the
boot sector file that is created.
Switch Explanation
If the entry to be removed is the default boot option, GDisk removes the
entry and sets the first entry in the remaining list as the default boot entry.
GDisk does not remove the entry if it is the only entry in Boot.ini.
277
Managing partitions using GDisk
Switch Explanation
/timeout:sec Sets the number of seconds before the default boot option is
selected.
278
Support for large hard disks
Remember the following information when you create partitions for use in
Windows NT:
■ According to the Microsoft Support Knowledgebase, Windows NT
NTFS bootable partitions cannot exceed 7.8 GB (8,455,716,864 bytes).
This information is detailed in the Windows Knowledgebase Article
“Windows NT Boot Process and Hard Disk Constraints,” Article ID:
Q114841.
Nonbootable NTFS partitions do not have this size limitation.
■ NT cannot start from partitions that start or end over the 1024-cylinder
boundary. If this condition exists, NT reports a “Boot Record Signature
AA55 Not Found” error message.
Windows NT does not support drives larger than 7.8 GB unless you install
Service Pack 4 or apply the ATAPI hot fix to Service Pack 3. This
information is included in the Windows Knowledgebase Article “IBM
DTTA-351010 10.1 GB Drive Capacity Is Inaccurate,” Article ID: Q183654.
279
Managing partitions using GDisk
280
C H A P T E R
Tracking Symantec
Ghost license numbers
The License Audit Utility (LAU) runs as a part of user logon scripts. When a
user logs on to a computer with a cloned disk, the disk’s details are
recorded in a database file that can be viewed by the administrator.
The files required for LAU setup are included in the Symantec Ghost
Console and Standard Tools installation packages.
281
Tracking Symantec Ghost license numbers
If LAU finds a cloned disk, it updates the database file on the server. The
next time a user logs on to a computer, LAU looks for fingerprint
information. If it detects any changes, it updates the database file on the
server.
282
Viewing the database file
Note: If a SCSI disk is cloned with Symantec Ghost version 6.5, the
database file includes the disk model number and serial number
information only if the ASPI drivers were loaded when cloning was
performed.
283
Tracking Symantec Ghost license numbers
284
C H A P T E R
Updating Security
Identifiers (SIDs) and
computer names
285
Updating Security Identifiers (SIDs) and computer names
■ Alters all local workstation user SIDs in Access Control Lists (ACLs) for
file and registry objects so that local users retain user profiles and
access rights.
■ Alters computer names for Windows 95, 98, Me, NT, XP and 2000
operating systems.
Note: This does not change the computer name within the Symantec
Ghost Console.
286
Using Ghost Walker
For these reasons you are strongly advised to test computer environments
and the applications on them before mass rollouts or upgrades.
When you update the SID using Ghost Walker, all existing workstation
users and their passwords, permissions, and registry settings are
maintained.
287
Updating Security Identifiers (SIDs) and computer names
Ghost Walker can be operated from the graphical user interface or from the
command line. Ghost Walker does not run from:
■ A Windows NT or 2000 DOS shell
■ A Windows 95, 98, or Me DOS shell if you are also updating a
Windows 95, 98, or Me operating system
The Ghost Walker window lists all bootable 95, 98, Me, NT, XP, and 2000
systems on the computer hard drives. Ghost Walker determines that there
is an installed operating system if a full set of registry hive files and the
operating system kernel executable are located in their normal locations.
288
Using Ghost Walker
289
Updating Security Identifiers (SIDs) and computer names
[/LOGGING]
[/SAFE_LOGGING]
[/#E=<environment file>]
[/H|/HELP|/?]
[/SID=<replacement SID>]
[IGNORE_ENCRYPTFILES]
Switch Description
<new_computer The new name must be the same length as the original name,
_ and cannot contain any of the following characters:
name> /\[]”:;|<>+=,?*
To include spaces in the computer name, enclose the
computer name in quotes, for example; /CN="EW PC 123"
Examples:
290
Using Ghost Walker
Switch Description
/DIAG Specifies that the utility can only generate diagnostic dumps
and log files (not update the computer name or SID).
291
Updating Security Identifiers (SIDs) and computer names
Switch Description
292
Using Ghost Walker
When Ghost Walker updates the SID, it not only changes the computer
SID, but also all of the workstation user and group SIDs. This is done
because user and group SIDs are assumed to be based on the workstation's
computer SID (which is now updated). This may mean that the security
information on external computers no longer matches the new SIDs of the
workstation users, which may result in a loss of access to those data
objects.
It appears that the accessing user is given the rights that the accessed user
has by proxy. For example, the access is performed on behalf of the
accessing user by the accessed user, just because there is a user name/
password match. This can best be seen when specific access rights are
granted remotely by the accessing user to a resource on the accessed
computer. The Access Control List shows that the accessed user is the user
who has rights to the resource.
Updating the SID on a workstation does not stop this situation from
occurring. You must change the password of one of the users.
293
Updating Security Identifiers (SIDs) and computer names
294
A p p e n d i c e s
■ Command-line switches
■ Setting up the hardware and transfer methods
■ USB and DirectParallel Cables
■ The Wattcp.cfg network configuration file
■ Cloning with Linux
■ Customizing Symantec Ghost functionality
■ Troubleshooting
■ Diagnostics
■ Installing Symantec Ghost from the command line
296
A P P E N D I X
Command-line switches
A hyphen (-) or a slash (/) must precede all switches except @. Switches
are not case sensitive. They can be entered in upper, lower, or mixed case.
297
Command-line switches
@filename
ghost.exe @ghswitch.txt
-afile=filename
Overrides the default abort error log file (Ghosterr.txt) to the directory and
file given in filename.
-auto
Automatically names spanned image files during creation. Using this switch
avoids the user prompt that asks for confirmation of the next destination
location for the remainder of the image file that is being loaded.
-batch
-bfc
Handles bad FAT clusters when writing to disk. If this switch is set, and the
target partition is FAT, Symantec Ghost checks for and works around bad
sectors. This option may slow Symantec Ghost operation substantially.
298
Symantec Ghost command-line switches
-bootcd
-buffersize=x
Where x = number of KB. Ghost creates an image file using a small buffer.
The size of the buffer is automatically calculated by Symantec Ghost. The
buffersize switch lets you override this size. You can set the buffer size
value from 1 to 32.
-chkimg,filename
-clone
Note: Some cloning switches for use in Ghost can be specified on the
GhostCast Server.
-cns
Filename.gho Filename.gho
Filename.001 Filen001.ghs
Filename.002 Filen002.ghs
299
Command-line switches
-CRC32
The -CRC32 switch lets you make a list of the files on a disk or partition, or
create an image file with CRC values, and to verify the list against the
original or a clone. The purpose is to allow both quick listing of the
contents of an image file and verification that a disk created by Symantec
Ghost contains the same files as the original.
-crcignore
Ignores CRC errors. CRC errors indicate data corruption. This switch
overrides the CRC error detection and may let a corrupted image file be
used. Using this switch leaves the corrupted files in an unknown state.
-cvtarea
The file is created in the root directory of the partition during a partition or
disk load and is created as a contiguous space on the disk. The largest size
allowed is 4 GB. If the file is larger than this, it is truncated to 4 GB.
-cvtarea,filename=xxx,size=yyy{%disk,%free,KB,MB,GB},firstcluster=zzz{%di
sk,%free,KB,MB,GB}
size 12%disk
Defaults to:
■ 1/3 of the partition size if the partition size is less than 2 GB
■ 1 GB if the partition size is less than 6 GB
■ 3 GB if the partition size is equal to or greater than 6 GB
300
Symantec Ghost command-line switches
-dd
Dumps disk metrics information to the dump log file Ghststat.dmp. The file
location can be altered using the -dfile=filename switch.
-dfile=filename
Changes the path and file name of the dump log file created using the -dd
switch. This switch cannot be included in the @ Ghost switch text file.
-dl=number
Specifies the number of hard drives present. Valid numbers are between 1
and 8. This may help when the BIOS does not report the number of drives
correctly.
-f32
Lets Symantec Ghost convert all FAT16 volumes to FAT32 volumes when
the destination partition is larger than 256 MB in size. Ensure that the
installed operating systems requiring access to the volumes that will be
converted support FAT32.
-f64
-fatlimit
Limits the size of FAT16 partitions to 2047 MB. Useful when Windows NT
FAT16 partitions are present on the disk, and 64 K clusters are not wanted.
-fcr
-fdsp
301
Command-line switches
-fdsz
-femax
-ffatid
Forces the FAT partition id. This switch changes the partition id to the
recommended partition id for the FAT partition within the destination
image file or the destination partition table. This switch only takes effect if
the source is a disk or partition, not an image file.
For example, if you are cloning a partition of type 0xA0 (some unknown
partition id), and Symantec Ghost sees it as a valid FATx (FAT12/FAT16/
FAT32) partition, then the partition id is changed from 0xA0 to FATx.
This was default Symantec Ghost behavior before Symantec Ghost 7.5. This
switch allows for backward compatibility.
-ffi
Prefers the use of direct IDE access for IDE hard disk operations. This
switch does not have any effect when running Symantec Ghost in
Windows 98.
-ffs
Prefers the use of direct ASPI/SCSI disk access for SCSI hard disk
operations.
-ffx
Prefers the use of Extended Interrupt 13h disk access for hard disk
operations.
-finger
302
Symantec Ghost command-line switches
-fis
Use all available disk space when creating partitions. By default, Symantec
Ghost often leaves a small amount of free space at the end of the disk.
Because partitions must be aligned to cylinder boundaries, Symantec Ghost
may leave up to 5 MB free even when -fis is specified.
-fni
Disables direct IDE access support for IDE hard disk operations.
-fns
Disables direct ASPI/SCSI access support for SCSI hard disk operations.
-fnx
-fro
Forces Symantec Ghost to continue cloning even if the source contains bad
clusters.
-fx
-h or -?
303
Command-line switches
-ia
Image all. The image all switch forces Symantec Ghost to perform a
sector-by-sector copy of all partitions. When copying a partition from a
disk to an image file or to another disk, Symantec Ghost examines the
source partition and decides whether to copy just the files and directory
structure, or to do a sector-by-sector copy. If it understands the internal
format of the partition, it defaults to copying the files and directory
structure. Generally this is the best option. However, if a disk has been set
up with special hidden security files that are in specific positions on the
partition, the only way to reproduce them accurately on the target partition
is through a sector-by-sector copy. If you use this switch to create an image
of a dynamic disk, then the image must be loaded to a disk with identical
geometry.
-ial
-ib
Image boot. Copies the entire boot track, including the boot sector, when
creating a disk image file or copying disk-to-disk. Use this switch when
installed applications, such as boot-time utilities use the boot track to store
information. By default, Symantec Ghost copies only the boot sector, and
does not copy the remainder boot track. You cannot perform
partition-to-partition or partition-to-image functions with the -ib switch.
-id
Image disk. Similar to -ia (image all), but also copies the boot track, as in
-ib (image boot), extended partition tables, and unpartitioned space on the
disk. When looking at an image with -id, you see the unpartitioned space
and extended partitions in the list of partitions. The -id switch is primarily
used by law enforcement agencies that require forensic images.
304
Symantec Ghost command-line switches
Symantec Ghost does not wipe the destination disk when restoring from an
-id image. Geometry differences between disks may leave tracks on the
destination disk with their previous contents.
Use the -ia (image all) switch instead of the -id switch when copying
partition-to-partition or partition-to-image. An individual partition can be
restored from an image created with -id.
-ir
Image raw. Copies the entire disk, ignoring the partition table. This is
useful when a disk does not contain a partition table in the standard PC
format, or you do not want partitions to be realigned to track boundaries
on the destination disk. Some operating systems may not be able to access
unaligned partitions. Partitions cannot be resized on restore and you need
an identical or larger disk.
-ja=sessionname
Connects to the GhostCast Server using the specified session name. Set the
disk and possibly partition to be cloned on the GhostCast Server.
-jaddr=<id_address>
-jl:x=filename
-jm=[u|d|m]
-js=n
305
Command-line switches
-lockinfo
Shows the type code and information stored in the BIOS, or the Pentium
III Processor ID.
For example:
M Manufacturer Compaq
U UUID 2DA9379B4707D31185E8C800A4F232BC
I PIII ID 0000067200028E72A6994A20
-locktype= Type
Lets you lock an image file for use with a specific set of computers defined
by the type chosen and the source computer.
For example, ghost -locktype=P creates an image that can be used only on
systems that have the same product name type as the source computer.
-lpm
-lps
306
Symantec Ghost command-line switches
-memcheck
-nofile
Disables the Image File Selection dialog box. Useful when opening
directories with large numbers of files and slow links.
-nolilo
Does not attempt to patch the LILO boot loader after a clone. If you use
the -nolilo switch, you need to start from a floppy disk after the clone, and
then run /sbin/lilo as the root user to reinstall LILO.
-noscsi
-ntc-
-ntchkdsk
Cloned NTFS volume will have the CHKDSK bit set. This causes Windows
NT to check the integrity of the volume when it is started.
-ntd
-ntic
Ignores the NTFS volume CHKDSK bit. Symantec Ghost checks the
CHKDSK bit on an NTFS volume before performing operations. When
Symantec Ghost indicates that the CHDSK bit is set, run CHKDSK on the
volume to ensure that the disk is in a sound state before cloning.
307
Command-line switches
-ntiid
-ntil
-or
Override. Allows the override of internal space and integrity checks. Lets
you put a very big image into a small partition. The operation fails if it is
unable to write to the limited partition size. This switch lets you override
spanning, which fails if there is limited space. Avoid using this switch.
-pmbr
308
Symantec Ghost command-line switches
x indicates the password for the image file. If no password is given in the
switch, Symantec Ghost prompts for one. You can enter a maximum of 10
alphanumeric characters.
-quiet
-rb
-script
Allows you to specify a series of commands (one per line) and Symantec
Ghost will execute them in a sequential order.
Example:
ghost -script=script.txt
-clone,mode=dump,src=2,dst=c:\drv2.gho
-chkimg,c:\drv2.gho
-clone,mode=dump,src=2,dst=c:\part2.gho
-chkimg,c:\part2.gho
309
Command-line switches
-skip=x
Skip file. Causes Symantec Ghost to exclude the indicated files during a
create or load operation. A skip entry can specify a single file, directory, or
multiple files using the * wildcard. File names must be given in short file
name format and all path names are absolute. Only FAT system files can be
skipped. It is not possible to skip files on NTFS or other file systems. The
skip switch may only be included in the command line once. To specify
multiple skip entries, they must be included in a text file indicated using
-skip=@skipfile. The format of the skip text file, skipfile, matches the
format used with the CRC32 vexcept option.
Examples:
■ -skip=\windows\user.dll
Skips the file User.dll in the Windows directory.
■ -skip=*\readme.txt
Skips any file called Readme.txt in any directory.
■ -skip=\ghost\*.dll
Skips any file ending with .dll in the Ghost directory.
■ -skip=\progra~1\
Skips the program files directory (note the short file name).
■ -skip=@skipfile.txt
Skips files as outlined in Skipfile.txt. For example, Skipfile.txt contains:
*\*.tmt
[partition:1]
\windows\
*\*.exe
[Partition:2]
*\*me.txt
This would skip all *.tmt files on any partition, the Windows directory and
any *.exe files on the first partition, and any file that ends with me.txt on
the second partition.
-span
310
Symantec Ghost command-line switches
-split=x
Splits image file into x MB spans. Use this switch to create a forced size
volume set. For example, if you want to force smaller image files from a
1024 MB drive, you could specify 200 MB segments. For example,
ghost.exe -split=200
-sure
Use the -sure switch in conjunction with -clone to avoid being prompted
with the final question Proceed with disk clone - destination drive will be
overwritten? This command is useful in batch mode.
-sze
Sets the size for the destination partitions for either a disk load or disk copy
operation. When numbering partitions in the -sze switch, do not include
the hidden Ghost partition.
For more information, see “Setting a destination size for the clone switch”
on page 316.
-tapebuffered
Default tape mode. Sets the ASPI driver to report a read/write as successful
as soon as the data has been transferred to memory. Useful when using
older or unreliable tape devices or sequential media.
-tapeeject
Forces Symantec Ghost to eject the tape following a tape operation. If the
tape drive does not support remote ejection you must eject and insert the
tape manually before further use. Earlier versions ejected the tape by
default. By default, Symantec Ghost does not eject the tape. It rewinds the
tape before exiting to DOS.
-tapesafe
Sets the ASPI driver to report a read/write as successful only when the data
has been transferred to the physical medium. Useful when using older or
unreliable tape devices or sequential media.
311
Command-line switches
-tapebsize=x
Specifies the tape block size in units of 512 bytes, where x is 1 to 128.
-tapespeed=x
-tapeunbuffered
Sets the ASPI driver to report a read/write as successful only when the data
has been transferred to the tape drive. (It is possible that this occurs before
the data is physically written to the medium.)
-tcpm[:slave IP address]
-tcps
-usbm
312
Symantec Ghost command-line switches
-usbs
-vdw
If this switch is set, Symantec Ghost uses the disk’s verify command to
check every sector on the disk before it is written. This option may slow
Symantec Ghost operation substantially.
-ver
-ver=value
Tests the version of Symantec Ghost. If Symantec Ghost is older than the
specified version, it aborts and exits, otherwise it proceeds as normal. This
is designed for use in batch files. The version number should be specified
without the period. For example, Symantec Ghost 6.5 is -ver=650.
-z
For more information, see “Image files and compression” on page 162.
313
Command-line switches
-clone,MODE={operation},SRC={source},DST={destination},
[SZE{size},SZE{size}.......]
Switch Action
314
Clone switch syntax
315
Command-line switches
Switch Explanation
316
Clone switch syntax
Switch Explanation
n=F Indicates that the nth destination partition is to remain the same
size on the destination as it was on the source. This is referred to as
fixed size.
F The sizes of all partitions except the first remain fixed. The first
partition uses the remaining space.
L The sizes of all partitions except the last remain fixed. The last
partition uses the remaining space.
Switch Function
317
Command-line switches
Switch Function
318
Clone switch syntax
Switch Function
@ECHO OFF
ghost.exe
-clone,src=@mcSN,dst=1,sze1=450M,sze2=1599,sze3=2047M -batch
IF ERRORLEVEL 1 GOTO PROBLEM
ECHO Symantec Ghost exited with value 0 indicating success.
REM ** Add any commands required to run if Symantec Ghost
REM succeeds here**
GOTO FINISH
:PROBLEM
ECHO Symantec Ghost returned with an Error value 1 or higher
ECHO Symantec Ghost operation was not completed successfully
REM **Add any commands required to run if Symantec Ghost
REM fails here **
:FINISH
ECHO Batch File Finished
319
Command-line switches
-CRC32,action={create|verify|pcreate|pverify|dcreate|dverify},src={{DiskS
pec}|{PartSpec}|{File}},crcfile={File},vlist={File},vexcept={File}
Parameter Explanation
320
CRC32 switch usage
321
Command-line switches
Switch Function
vexcept=filename
Specifies files that are not checked with CRC. This is normally used to
exclude files that are always changed on start up. A sample exception file
follows.
322
CRC32 switch usage
Use short file names in exclusion files. Files specified before the first
[Partition:x] heading are used to match files in any partition.
323
Command-line switches
324
A P P E N D I X
Peer-to-peer connections
Peer-to-peer connections enable Symantec Ghost to run on two computers,
transferring drives and partitions and using image files between them.
The following table describes different cloning situations, and the master/
slave relationship.
325
Setting up the hardware and transfer methods
Select which computer is the master (the computer from which you control
the connection), and which is the slave (the other computer participating
in the connection). All operator input must occur on the master computer.
ECP is the best option for LPT connections. Symantec Ghost must be
running under DOS on both computers.
For more information, see “USB and DirectParallel Cables” on page 329.
TCP/IP connections
Connect the computers with an ethernet or token ring network interface
card and an established network connection, which includes one of the
following:
■ Crossover ethernet cable
(pins 1236 > 3612)
■ Coaxial cable
■ Standard cables with hub or MAU
326
Hardware and transfer requirements
Refer to the documentation included with the SCSI tape device for more
information.
GhostCasting
For GhostCasting transfers, the following hardware and software are
required:
■ Ethernet or token ring NIC
■ Established network connection
■ Optional multicast-enabled router
■ Optional BOOTP/DHCP software
Set up the NIC using the manufacturer’s installation program and run the
NIC test program to check the NIC and cabling.
Removable media
The removable media drive, media, and media drivers for use in DOS are
required.
CD-ROM usage
A CD writer and blank CD-R/RW media are required.
For more information, see “Image files and CD writers” on page 168.
327
Setting up the hardware and transfer methods
For more information, see “Creating boot images and disks with the Ghost
Boot Wizard” on page 133.
Internal drives
To work with internal drives, ensure that each of the drives is properly
configured. This means that if fixed IDE drives are in use, the jumpers on
the drives are set up correctly, and the BIOS of the computer is configured
for the disk arrangement. Both the source and the destination drives must
be free from file corruption and physical hard drive defects.
328
A P P E N D I X
The USB and DirectParallel connection cables can also be used for
high-speed computer-to-computer file transfer and networking in Windows
9x and Windows 2000. Symantec Ghost contains DirectParallel driver
technology from Parallel Technologies, Inc., the developers of the Direct
Cable Connection computer-to-computer technology built into Windows 9x
and Windows 2000. The DirectParallel drivers and cables contain
patent-pending parallel port interface technology.
329
USB and DirectParallel Cables
330
A P P E N D I X
The Wattcp.cfg file specifies the IP address and the subnet mask of the
computer and lets you set other optional network parameters. The file
should be located in the current directory when Ghost.exe is started.
Comments in the file start with a semicolon (;). Options are set using the
format option = value. For example:
receive_mode=5;set receive mode
331
The Wattcp.cfg network configuration file
Keyword Description
Example: IP=192.168.100.10
Example: NETMASK=255.255.255.0
Example: GATEWAY=192.168.100.1
Example: RECEIVE_MODE=6
332
A P P E N D I X
Supported configurations
Symantec Ghost can clone many different Linux distributions successfully.
However, Symantec Ghost is sensitive to any possible changes in ext2 file
system and LILO specifications. If changes are made to these specifications,
Symantec Ghost may no longer support the Linux distribution. Symantec
attempts to release new builds of Ghost promptly to address such changes.
Symantec Ghost is not sensitive to kernel versions. Use the -nolinux and
-nolilo command-line switches to resolve problems with any
incompatibilities.
Symantec Ghost clones any x86-based Linux system with full support for
ext2 file systems (type 0x83) containing 1 KB, 2 KB, or 4 KB block sizes.
Other file systems, for example, reiserfs, are cloned on a sector-by-sector
basis and cannot be resized during cloning.
Linux systems that use LILO as their boot loader in the MBR or in the active
ext2 partition are supported with some exceptions. Any references to a
disk other than the first hard disk in the system (/dev/hda or /dev/sda) are
not supported. The /boot and root file systems must be on the first hard
disk. /boot can be a directory within the root file system.
333
Cloning with Linux
Symantec Ghost supports type 0 and type 1 Linux swap file systems (type
0x82).
Position of disk
Linux is sensitive to the position of the disk in hardware. A system running
on the primary master disk does not run if the disk is mounted as the
primary slave or as the secondary master. Symantec Ghost does not resolve
this issue.
Boot configuration
Symantec Ghost uses the file /etc/lilo.conf to determine the boot
configuration. If this file does not match the boot configuration, Symantec
Ghost may be unable to patch LILO during cloning. It does not support the
default keyword in Lilo.conf, so the first target specified should be the
default target.
GDisk does not create any Linux file systems, or recognize any partitions
within a Linux extended partition.
334
A P P E N D I X
Customizing Symantec
Ghost functionality
335
Customizing Symantec Ghost functionality
Switch Description
336
Examples of customized functionality
Switches: load=y,dump=n,disk=n,peer=n
KeyNum: 12345
License: BM-512
MaxUsers: 10
Name: ABC Inc
Address1: 200 John Wayne Blvd.
Address2: Irvine, CA 1024
Switches: load=n,dump=y,disk=n,peer=n
337
Customizing Symantec Ghost functionality
For more information, see “Service and support solutions” on page 357.
338
A P P E N D I X
Troubleshooting
339
Troubleshooting
For more information, see “Service and support solutions” on page 357.
8006, 8008 The trial period of the evaluation has expired. Visit the
Symantec Web site at http://www.symantec.com for details on
how to purchase Symantec Ghost.
10010,10014, Incorrect path/file syntax. Ensure that the path and file name
11000 are correct. Also make sure that you have the proper user
rights to read or create the image file.
19913 Can’t find the BOOTP/DHCP server. Ensure that the computer
is connected to the network and that a BOOTP or DHCP
server is set up for this subnet.
CDR101: Not A system error message. This error is not caused by Symantec
ready reading Ghost. It is caused by malfunctioning hardware or software
drive X, Abort, configurations. The image file on the CD is not readable. To
Retry, Fail verify this, go into DOS and copy the image file off of the
CD-ROM using copy verification.
340
Symantec Ghost Console errors
Following are specific answers to certain situations. Use the solution most
closely related to the problem that you are experiencing.
Use the Ghost Boot Wizard to create a packet driver boot disk.
For more information, see “Boot disks with network support” on page 136
and “Setting up packet drivers” on page 199.
341
Troubleshooting
You can also try pinging the IP address of the client computer from the
server computer.
342
Symantec Ghost and GhostCast DOS errors
http://service1.symantec.com/SUPPORT/ghost.nsf/docid/
1998101316275025
Most newer network cards come with a software configuration utility that
automatically checks for IRQ conflicts and reconfigures the card if a
conflict exists. Otherwise, you must manually change the IRQ of the
network card. Refer to your network adapter manual for more information
on changing the IRQ address of your card.
DOS drivers can also have problems detecting the type and speed of your
network. The DOS configuration utility lets you set these explicitly.
343
Troubleshooting
When you launch a task from the command-line or from Scheduler you
can also check two error log files for the cause of failure of a task.
Console log.txt logs the success or failure of a task launched from the
command-line or Scheduler. However, if a task has been initiated from the
Scheduler then the Console might not start. In this case you can check
Schedulgu.txt for a cause of failure.
344
A P P E N D I X
Diagnostics
The Symantec Ghost abort error file includes these details along with
additional drive diagnostics and details required to assist Technical Support
in diagnosing the cause of the problem.
345
Diagnostics
The Ping.exe utility shows TCP/IP networking response and can be used to
show connectivity between computers. For a mapped network volume
connection, a client can ping the server and vice versa to check that they
have basic connectivity at any time. For GhostCast connections, Symantec
Ghost only responds to a ping request sent from another computer if it is
in GhostCast or TCP/IP peer-to-peer mode.
Ping utilities that do not indicate multicast packets can traverse between
two points on a network. For example, a ping test may indicate successful
TCP/IP operation between two computers on differing subnets, while
GhostCast packets may not be able to cross due to a nonmulticast-enabled
router that separates the subnets.
Pinging a local host shows basic local TCP/IP functionality. The address
used in the following example identifies the local host on the network.
346
Elementary network testing techniques
This test indicates that the TCP/IP stack is installed and operating.
The outcome of the first command indicates that the client using the IP
address 192.168.100.3 received the ping request and replied. This indicates
basic TCP/IP operation between the two computers. This does not indicate
that multicast packets can traverse between the two computers. Winipcfg
then verifies that the Windows 95 computer’s IP configuration parameters
are as follows:
347
Diagnostics
348
Elementary network testing techniques
For example:
349
Diagnostics
350
A P P E N D I X
For more information, see “Installing from the command line in Windows
9x or NT” on page 354.
351
Installing Symantec Ghost from the command line
■ The Silent interface mode does not show any dialog boxes or error
messages. If you alter any default settings, you must pass this
information through as parameters from the command line. To install
the Symantec Ghost Console, the syntax is:
msiexec /i "c:\temp\Symantec Ghost 2002.msi" /q
To install any other component, the syntax is:
msiexec /i "c:\temp\Symantec Ghost.msi" /q
ghostinstalltype="xxxxxx"emailaddress="zzzzzz"
where xxxxxx is any of the following:
■ Server = Symantec Ghost Console
■ Server Tools = Standard Tools only
■ Client = Console client
■ AutoInstall = AutoInstall
352
Installing from the command line
If you are installing in Administration mode, you don’t need to set these
properties as you are copying the installation package to a location on the
network. Set these properties once you run the installation from the
network location.
You must set a user name, company name, and email address in the
command line, or the installation fails. An error file, Ghmsierr.txt, is
generated in the Windows System folder if the installation fails.
353
Installing Symantec Ghost from the command line
The following table shows the package properties that can be set from the
command line.
Switch Description
The /v switch is used to pass the parameters to the installation. All of the
parameters must be enclosed in quotation marks and the opening
quotation mark must immediately follow the /v switch. Any other
quotation marks must be preceded with a backslash.
354
Uninstalling from the command line
355
Installing Symantec Ghost from the command line
356
S U P P O R T
Service and support information is available from the Help system of your
Symantec product. Click the Service and Support topic in the Help index.
Technical support
Symantec offers several technical support options:
■ Online Service and Support
Connect to the Symantec Service & Support Web site at
http://service.symantec.com, select your user type, and then select
your product and version. This gives you access to current hot topics,
knowledge bases, file download pages, multimedia tutorials, contact
options, and more.
■ PriorityCare telephone support
PriorityCare fee-based telephone support services are available to all
registered customers. For complete information, please call our
automated fax retrieval service at (800) 554-4403 and request
document 933000.
You can also access the PriorityCare number for your product through
the Service & Support Web site. You’ll be led through the online
options first, and then to the telephone contact options available for
your product and version.
■ Automated fax retrieval
Use your fax machine to receive general product information, fact
sheets, and product upgrade order forms by calling (800) 554-4403. For
technical application notes, call (541) 726-9410.
357
Service and support solutions
Customer service
Access customer service options through the Service & Support Web site at
http://service.symantec.com. From this site, you can receive assistance with
non-technical questions, and for information on how to do the following:
■ Subscribe to the Symantec Support Solution of your choice.
■ Obtain product literature or trialware.
■ Locate resellers and consultants in your area.
■ Replace missing or defective CD-ROMS, disks, manuals, and so on.
■ Update your product registration with address or name changes.
■ Get order, return, or rebate status information.
■ Access customer service FAQs.
■ Post a question to a Customer Service representative.
358
Worldwide service and support
Asia/Pacific Rim
Symantec Australia http://www.symantec.com/region/reg_ap/
Level 2, 1 Julius Avenue +61 (2) 8879-1000
North Ryde, NSW 2113 Fax: +61 (2) 8879-1001
Sydney
Australia
Brazil
Symantec Brasil http://www.service.symantec.com/br
Market Place Tower +55 (11) 5189-6300
Av. Dr. Chucri Zaidan, 920 Fax: +55 (11) 5189-6210
12° andar
São Paulo - SP
CEP: 04583-904
Brasil, SA
359
Service and support solutions
Mexico
Symantec Mexico http://www.service.symantec.com/mx
Blvd Adolfo Ruiz Cortines, +52 (5) 661-6120
No. 3642 Piso 14
Col. Jardines del Pedregal
Ciudad de México, D.F.
C.P. 01900
México
Subscription policy
If your Symantec product includes virus, firewall, or web content
protection, you might be entitled to receive protection updates via
LiveUpdate. The length of the subscription could vary by Symantec
product.
When you near the end of your subscription, you will be prompted to
subscribe when you start LiveUpdate. Simply follow the instructions on the
screen. After your initial subscription ends, you must renew your
subscription before you can update your virus, firewall, or web content
protection. Without these updates, your vulnerability to attack increases.
Renewal subscriptions are available for a nominal charge.
Every effort has been made to ensure the accuracy of this information.
However, the information contained herein is subject to change without
notice. Symantec Corporation reserves the right for such change without
prior notice.
360
Symantec Ghost™
CD Replacement Form
CD REPLACEMENT: After your 60-Day Limited Warranty, if your CD becomes unusable, fill out and return 1) this form, 2) your
damaged CD, and 3) your payment (see pricing below, add sales tax if applicable), to the address below to receive replacement CD.
DURING THE 60-DAY LIMITED WARRANTY PERIOD, THIS SERVICE IS FREE. You must be a registered customer in order to receive CD
replacements.
FOR CD REPLACEMENT
Please send me: ___ CD Replacement
Name ________________________________________________________________________________________________________________
*This offer limited to U.S., Canada, and Mexico. Outside North America, contact your local Symantec office or distributor.
______________________________________________________________________________________________________________________
CD Replacement Price $ 10.00 SALES TAX TABLE: AZ (5%), CA (7.25%), CO (3%), CT (6%), DC (5.75%), FL (6%), GA (4%), IA (5%),
Sales Tax (See Table) ______ IL (6.25%), IN (5%), KS (4.9%), LA (4%), MA (5%), MD (5%), ME (6%), MI (6%), MN (6.5%), MO (4.225%),
NC (6%), NJ (6%), NY (4%), OH (5%), OK (4.5%), PA (6%), SC (5%), TN (6%), TX (6.25%), VA (4.5%), WA (6.5%),
Shipping & Handling $ 9.95 WI (5%). Please add local sales tax (as well as state sales tax) in AZ, CA, FL, GA, MO, NY, OH, OK, SC, TN, TX, WA,
TOTAL DUE ______ WI.
**U.S. Dollars. Payment must be made in U.S. dollars drawn on a U.S. bank.
boot package A file, bootable disk, Ghost image, or PXE image of a bootable disk
that contains the Symantec Ghost executable and any necessary
drivers. Lets you start a client computer from the boot package and
start Symantec Ghost to perform a cloning operation from the Ghost
executable, the GhostCast Server, or the Console.
configuration settings Registry settings for client computers that can be set during the
execution of a Console task.
Console client Client of the Symantec Ghost Console that allows remote control of the
client computer.
data template A template that defines files or registry entries to include in a backup.
image file definition A description of the properties of an image file, including the image
file name, location, and status.
image file A file created using Symantec Ghost. An image file of a disk or
partition is created and is used to create exact duplicates of the original
disk or partition.
363
package definition A link from the Console to an AI package, either on an attached drive
or on a Web server.
source computer A computer installed with drivers and applications that is used as a
template. An image file is created of this computer and cloned onto
other client computers.
Creating an image file Specifies a series of steps to be performed on all selected computers
including:
■ Cloning of an image file
■ Applying configuration settings
■ Loading software applications
■ Loading user settings
■ Loading a file
■ Creating a backup
■ Restoring a computer from a backup
user package The data captured in a Move the User operation. These packages can
be used to restore a user’s data and settings to another computer.
user profile A definition of the data that you want to capture during a Move the
User operation.
364
I N D E X
Symbols B
? switch 303 Backup 363
@filename switch 298 Creating a regime 102
Manual 105
Regime 101
A batch switch 298
Abort log 298, 345 bfc=x switch 298
Accessibility 32 Boot disk 214
Active tasks 154 Creating manually 198
Adding, Data Template information 110 Setup 228
Advanced options 85, 90 Boot menu 274
afile=filename switch 298 Boot package 134, 363
AI package definition 78 Creating 133, 134
Application image files 236 Setup 133
ASPI driver 327 Boot partition 17, 24, 64, 90, 363
Auto Start 186 bootcd switch 299
auto switch 298 BOOTP 208, 208-209
Autoexec.bat, multicast Bootstrap Protocol. See BOOTP
NDIS driver 203 buffersize switch 299
Packet driver 199 Builder 236, 245-250
AutoInstall
Builder 236, 245-250
Installing Microsoft products 238 C
Limitations 239 Cables 329
Office XP 238 Capturing, User Data 113
Overview 235 CD bootable disk 168, 217, 222, 226
Package definition 364 CD writers 168, 226
Snapshot 236, 241, 245 CD-R/RW
Uninstall command 238 Cloning to 226
Using 241 Write to 135
Automation CD-ROM 327
Batch switch 298 Support 140
Clone switch and examples 314, 317-319 Certificate files, generating 160
Close on completion 303 chkimg,filename switch 299
Quiet mode 309 Client heartbeat 61
Remove confirmation 311 Client initiated tasks 82, 154
Restart on completion 309 Client summary 153
Switches 297-313 clone switch 299, 314
Version checking 312, 313 Clone task properties 89
W
U Wake on Lan 83, 86
Unicast 18, 61, 175, 189 Watermark 32, 154
Updating Wattcp.cfg 199, 206, 207
Computer name 288 See also TCP/IP settings
Console client 47 Windows
SID 288 2000 169
Symantec Ghost 47 Boot menu 274
USB port 326 Running Ghost 214
Support 136 Wiping
usb switch 313 Disks 271
usbm switch 312 Partitions 271
usbs switch 313 Writing to a CD-R/RW 168, 226
Z
z switch 313