norton ghost enterprise imlementation guide

Upload: azizsoft

Post on 09-Apr-2018

225 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    1/204

    Norton Ghost TM EnterpriseImplementation Guide

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    2/204

    Norton Ghost EnterpriseImplementation Guide

    The software described in this boo k is furnished u nder a license agreement andmay be used only in accordance with the terms of the agreement.

    Copyright NoticeCopyright 19981999 Symantec Corporation.

    All Rights Reserved.

    Any technical documentation that is made available by Symantec Corporation is thecopyrighted work of Symantec Corporation and is owned by SymantecCorporation.

    NO WARRANTY. The technical documentation is being delivered to you

    AS-IS and Symantec Corporation makes no warranty as to its accuracy or use. Anyuse o f the technical documentation or the information contained therein is at therisk of the user. Documentation may include technical or other inaccuracies ortypographical errors. Symantec reserves the right to make changes without priornotice.

    No part of this pub lication may be copied without the express written permissionof Symantec Corporation, Peter Norton Group , 10201 Torre Avenue, Cupertino, CA95014.

    TrademarksSymantec, the Symantec logo, Norton Ghost, Ghost Walker, Ghost Explorer, andGDisk are trademarks of Symantec Corporation.

    Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft Corporation. IBM, OS/2, and OS/2 Warp are registered trademarks of International Business Machines Corporation. Novell and NetWare are registeredtrademarks o f Novell Corporation. 3Com and EtherLink are registered trademarks o f 3Com Corporation. Compaq is a registered trademark of Compaq Corporation. Zipand Jaz are registered trademarks of Iomega Corporation. SuperDisk is a trademark of Imation Enterprises Corporation.

    Other p roduct names mentioned in this manual may be trademarks or registeredtrademarks of their respective comp anies and are hereby ackno wledged.

    Printed in the United States of America.

    10 9 8 7 6 5 4 3 2 1

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    3/204

    SYMANTEC LICENSE AND WARRANTY

    NOTICE: SYMANTEC LICENSES THE ENCLOSED SOFTWARETO YOU ONLY UPON THE CONDITION THAT YOU ACCEPTALL OF THE TERMS CONTAINED IN THIS LICENSEAGREEMENT. PLEASE READ THE TERMS CAREFULLYBEFORE OPENING THIS PACKAGE, AS OPENING THEPACKAGE WILL INDICATE YOUR ASSENT TO THEM. IF YOU

    DO NOT AGREE TO THESE TERMS, THEN SYMANTEC ISUNWILLING TO LICENSE THE SOFTWARE TO YOU, INWHICH EVENT YOU SHOULD RETURN THE FULL PRODUCTWITH PROOF OF PURCHASE TO THE DEALER FROM WHOMIT WAS ACQUIRED WITHIN SIXTY DAYS OF PURCHASE,AND YOUR MONEY WILL BE REFUNDED.

    LICENSE AND WARRANTY:

    The software which accompanies this license (the Software)is the property of Symantec or its licensors and is protected bycopyright law. While Symantec continue s to own the Software,you will have certain rights to use the Software after youracceptance of this license. Except as may be modied by alicense addendum which accompanies this license, your rightsand obligations with respect to the use of this Software are asfollows:

    You may:

    (i) use Norton Ghost to clone a hard drive from another disk,partition, or image le onto that number of hard drives equalto the number of Norton Ghost licenses granted by Symantecunder this license;(ii) reapply, upgrade, refresh, or recover a hard drive anunlimited number of times provided that the hard drive is partof the original Norton Ghost licenses granted by Symantecunder this license;(iii) reuse a Norton Ghost license to apply an image le to areplacement hard drive provided the replaced hard drive hasbeen permanently decommissioned.

    You may not:

    (i) copy the documentation which accompan ies the Software;(ii) sublicense, rent or lease any portion of the Software; or(iii) reverse engineer, decompile, disassemble, modify,translate, make any attempt to discover the source code of theSoftware, create derivative works from the Software, reuse thelicense as a reseller of systems containing the hard drive, orredistribute Norton Ghost for disaster recovery or any otherpurposes.

    Sixty Day Money Back Guarantee:

    If you are the original licensee of this copy of the Softwareand are dissatised with it for any reason, you may return thecomplete product, together with your receipt, to Symantec oran authorized dealer, postage prepaid, for a full refund at any

    time during the sixty day period following the delivery to youof the Software.

    Limited Warranty:

    Symantec warrants that the media on which the Software isdistributed will be free from defects for a period of sixty (60)days from the date of delivery of the Software to you. Yoursole remedy in the event of a breach of this warranty will bethat Symantec will, at its option, replace any defective mediareturned to Symantec within the warranty period or refund themoney you paid for the Software. Symantec does not warrant

    that the Software will meet your requirements or thatoperation of the Software will be uninterrupted or that theSoftware will be error-free.THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALLOTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED,INCLUDING THE IMPLIED WARRANTIES OF

    MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSEAND NONINFRINGEMENT. THIS WARRANTY GIVES YOUSPECIFIC LEGAL RIGHTS. YOU MAY HAVE OTHER RIGHTS,WHICH VARY FROM STATE TO STATE.

    Disclaimer of Damages:

    REGARDLESS OF WHETHER ANY REMEDY SET FORTHHEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENTWILL SYMANTEC BE LIABLE TO YOU FOR ANY SPECIAL,CONSEQUENTIAL, INDIRECT OR SIMILAR DAMAGES,INCLUDING ANY LOST PROFITS OR LOST DATA ARISINGOUT OF THE USE OR INABILITY TO USE THE SOFTWAREEVEN IF SYMANTEC HAS BEEN ADVISED OF THEPOSSIBILITY OF SUCH DAMAGES.SOME STATES DO NOT ALLOW THE LIMITATION OR

    EXCLUSION OF LIABILITY FOR INCIDENTAL ORCONSEQUENTIAL DAMAGES SO THE ABOVE LIMITATIONOR EXCLUSION MAY NOT APPLY TO YOU.IN NO CASE SHALL SYMANTECS LIABILITY EXCEED THEPURCHASE PRICE FOR THE SOFTWARE. The disclaimers andlimitations set forth above will apply regardless of whetheryou accept the Software.

    U.S. Government Restricted Rights:

    RESTRICTED RIGHTS LEGEND. Use, duplication, or disclosureby the Government is subject to restrictions as set forth insubparagraph (c) (1) (ii) of the Rights in Technical Data andComputer Software clause at DFARS 252.227-7013 orsubparagraphs (c) (1) and (2) of the Commercial ComputerSoftware-Restricted Rights clause at 48 CFR 52.227-19, asapplicable, Symantec Corporation, 10201 Tore Avenue,Cupertino, CA 95014.

    General:

    This Agreement will be governed by the laws of the State of California. This Agreement may only be modied by a licenseaddendum which accompanies this license or by a writtendocument which has been signed by both you and Symantec.Should you have any questions concerning this Agreement, orif you desire to contact Symantec for any reason, please write:Symantec Customer Sales and Service, 10201 Torre Avenue,Cupertino, CA 95014.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    4/204

    4

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    5/204

    5

    C O N T E N T S

    Chapter 1 About Norton GhostNorton Ghost Enterprise .................................................................... 12How Norton Ghost works .................................................................. 13

    Clone internal hard d isk drives and individual partitions ......... 13Save and load image files to and from a file server .................. 14Save and load image files to and from removable media ......... 15Clone hard drives and partitions pee r-to-peer ........................... 16

    Using the NETBIOS interface ........................... .................... 16Using the parallel (LPT) port ........................... ..................... 17

    Clone multiple target machines using multicasting ................... 18Typical usage examp les ..................................................................... 19

    Clone networked computers ....................................................... 20Clone a machine through a parallel cable ................................. 20Clone disks at optimum speed ................................................... 21Back up disks ........................ ............................ ........................... 21Refresh multiple machines simultaneously ................................ 21Restore systems from removable media ..................................... 22Using Norton Ghost and Microsofts Remote Installation

    Service (RIS) & PXE capable machines ......................... .......... 22

    Chapter 2 Setting up Norton GhostMinimum system requirements .......................................................... 23

    Hardware requirements for Norton Ghost transfer modes ....... 24Installing Norton Ghost ......................... ........................... .................. 25

    Installing individual comp onents of Norton Ghost ................... 25Norton Ghost Console security ................................................... 26Updating Norton Ghost Enterprise ............................................. 27

    Setting up a DOS boot disk ........................... ............................ ........ 27Setting up transfer methods ............................................................... 28

    Internal drives ........................ ........................... ........................... 28Local devices .......................... ........................... ........................... 29

    Peer-to-peer connections ............................................................ 29Peer-to-peer parallel port connections ....................................... 29Peer-to-peer NetBIOS network connections .............................. 30

    Sourcing NetBIOS ......................... ........................... ............. 30Mapping to a Microsoft Windows network volume .................. 31

    Creating a Windows NT Server 4.0 network boot disk for DOS ........................ ........................... ........................... 31

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    6/204

    6

    Chapter 3 Getting startedCreate a source machine .................................................................... 36Create an image of a client machine ................................................. 37Create an image from the source machine ....................................... 38Install the Norton Ghost Console client ............................................ 39Create and install the boot p artition .................................................. 40Create and execute a cloning task ..................................................... 41Rolling out Norton Ghost client software .......................................... 42

    Installing the Norton Ghost client for the first time ................... 43Clone and post-configure client machines without

    capturing existing configuration data ...................................... 44Clone and post configure client machines capturing

    existing configuration data ...................................................... 45

    Chapter 4 Using Norton GhostWhat you need to do ......................................................................... 47Starting Norton Ghost ............................ ........................... .................. 50Navigating without a mouse .............................................................. 51Cloning disks ........................................ ........................... ................... 51

    Cloning from disk to disk ...................................... ...................... 51Cloning a disk to an image file ................................................... 53Cloning a disk from an image file .............................................. 54

    Cloning partitions ........................ ........................... ............................ 56Cloning from partition to partition ............................................. 56Cloning from partition to image file .......................... ................. 57Cloning a partition from an image file ....................................... 59

    Managing image files ........................ ........................... ....................... 60Image files and compression ...................................................... 61Image files and CRC32 ........................ ............................ ............ 61Image files and volume spanning ............................................... 62

    Standard image files ........................... ........................... ........ 62Size-limited, multi-segment image files ......................... ...... 62Spanned image files ........................... ........................... ........ 62Creating an image file ................................. .......................... 63

    Spanning images across multiple volumes andlimiting span sizes .............................. ............................ ... 63Loading from a spanned image ........................................... 64

    Image files and tape drives ......................................................... 64

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    7/204

    7

    Chapter 5 Norton Ghost multicastingWhat you need to do to use multicasting ......................................... 68Preparing for multicasting ....................................... ........................... 69

    Creating the source machine ...................................................... 70IP addresses and Norton Ghost Multicasting ............................. 70

    Locally specified IP address ...... ........................... ................ 71Automatically generated IP address using

    DHCP/BOOTP ........................... ............................ ............ 72Example of locally specified IP address for

    Windows 95 .......................... ............................ ................. 73BOOTP/ DHCP automatically defined IP address ............... 74

    Using Norton Ghost Multicast Assist Wizard .......................... ........... 75Microsoft Remote Installation Service ....... ........................... ....... 75Creating a boot package ............................................................. 75

    Generating a boot package ......................................................... 76Selecting a boot package ............................................................ 77Specifying Norton Ghost parameters for a boot disk ................ 77To specify the Configurations folder .......................................... 78Configuring network settings ...................................................... 79Ghost image file name ................................................................ 80RIS menu details ...................................... ........................... ......... 81Selecting a destination drive for a boot disk .............................. 81

    Deploying the Windows Ghost Multicast Server .............................. 82Ghost Multicast Server op tions ......................... .......................... 87Ghost Multicast Server for Windows command-line

    syntax ........................ ........................... ............................ ......... 88Syntax ......................... ........................... ............................ .... 88Options .................................................................................. 88Examples ......................... ........................... ........................... 89

    Dep loying the DOS Ghost Multicast Server ........................... ........... 90Syntax ........................... ........................... ........................... .......... 91Options ......................... ........................... ........................... .......... 91Examp les ........................... ........................... ........................... ..... 91

    Dep loying the NetWare Ghost Multicast Server ......................... ...... 93Requirements for the NetWare Ghost Multicast Server ............. 93

    Dep loying the Ghost Multicast Client ...................... .......................... 94Setting up DOS-based multicast client and server ..................... 94

    Creating a DOS client boot d isk .......................................... 95Setting up a DOS packet d river .................................................. 96

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    8/204

    8

    Chapter 6 Using Norton Ghost ConsoleNorton Ghost Console basics ........................................................... 101

    Norton Ghost Console components ......................................... 102Create and execute a Norton Ghost Console task .......................... 103

    Creating machine groups .......................................................... 103Adding a machine to a group ............................................ 104New machines ..................................................................... 105Removing a machine from a group ................................... 106Renaming a machine .......................................................... 106Viewing or changing machine properties ......................... 107

    Creating tasks ........................ ............................ ......................... 107Setting task properties ........................................................ 108Executing a task ..................................... ........................... .. 110

    Configuration Resources ........................... ........................... ...... 111

    Image files ........................... ............................ .................... 111Creating configuration settings ........................................... 112

    Managing users ....................... ............................ ........................... ... 114Monitoring Norton Ghost Console activity ........................ .............. 115Launching the Configuration Server ........................ ........................ 116Setting Norton Ghost Console options ............................................ 116Norton Ghost security ........................... ........................... ................ 117

    Distribution of the certificate files ........................................ ..... 117Changing Norton Ghost Console servers ................................. 118Generating new certificates ....................................................... 118NGServer password ......................... ........................... ............... 119

    Chapter 7 Norton Ghost UtilitiesNorton Ghost Explorer ..................................................................... 121

    Viewing image file contents ............................................ .......... 122Restoring a file or directory ................................................. ...... 122Modifying image files in Norton Ghost Explorer ..................... 123

    Adding, moving, and deleting files .................................... 123Saving a list of files within an image file ....................... .......... 124Setting span file sizes ..................................... ........................... . 124

    Determining Norton Ghost image file version ......................... 125Command-line use ..................................................................... 125Norton Ghost Walker ....................... ............................ .................... 126

    Altering iden tification details ......................... ........................... . 127Running Norton Ghost Walker from the command line ......... 129

    Loss of access to external data objects .............................. 132Identical user names and p asswords across

    workstations ..................................................................... 132

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    9/204

    9

    Norton Ghost GDISK ........................ ............................ .................... 133Overview of main command-line switches .............................. 133Online he lp for command-line switches .................................. 134Reinitializing the Master Boot Record ........................ .............. 134

    Batch Mode ............................ ........................... ......................... 135Advanced combinations ..................................................... 136FAT16 partitions in Windows NT .......................... ................... 137Deleting and wiping your disk ................................................. 137Support for large hard drives .................................................... 138Accessing hard drives ............................... ........................... ...... 139

    Using the IDE con troller ................................................ ..... 139Using the ASPI driver interface ........................ .................. 139

    Appendix A Command-line switchesNorton Ghost command-line switches ............................................ 141

    Examples of switch usage ......................................................... 145Batch file example ................................................. .................... 147

    Examples of -CRC32 usage ............ ............................ ......... 149Norton Ghost Multicast Server command-line switches ................. 161

    Windows command-line switches ............................................ 161DOS and Netware command-line switches .............................. 162

    Appendix B The wattcp.cfg network configuration file

    Appendix C Frequently asked questionsAppendix D Troubleshooting

    Norton Ghost error codes ................................................................ 177Norton Ghost Multicast errors ............................................... ........... 179

    Appendix E DiagnosticsHard drive detection and diagnostic information ........................... 183

    Norton Ghost abort error file (ghost.err) .................................. 183

    Hard disk geometry diagnostics ................................................ 184Full diagnostic statistics dump summary .................................. 184Elementary network testing techn iques .......................................... 184

    TCP/ IP .......................... ........................... ........................... ........ 184Pinging a local host ............. ........................... .................... 185Pinging a Norton Ghost multicast client ............................ 185

    Multicasting diagnostic logging op tions .......................... ......... 186Generating a multicast log file .. ........................... .............. 186

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    10/204

    10

    Logging in the Windows Ghost Multicast Server .............. 187Logging in the DOS Ghost Multicast Server ...................... 187Logging in the Ghost Multicast Client ........................... .... 188

    Appendix F Customizing Norton Ghost functionalityFunctionality op tions ........................ ........................... ..................... 189

    Examp les .......................... ............................ ........................... ... 190Saving switches ....................... ............................ ........................... ... 191OEM version of Norton Ghost .......... ........................... .................... 191

    Service and Support Solutions

    CD Replacement Form

    Index

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    11/204

    11

    C H A P T E R 1About Norton GhostNorton Ghost is the fast and reliable software solution to satisfy all your PCdisk cloning and copying needs: upgrading hard drives, backing up fordisaster recovery, or rolling out numerous machines of similar

    congurations.Norton Ghost clones either complete disks or specied partitions:s An entire disk can be either cloned directly from one disk to another

    or saved into a Norton Ghost image le. The image le can be used asa template to create copies of the original disk.

    s The contents of a partition can be copied to another partition. Selectedpartitions can be copied to an image le that is used as a template tocreate copies of the original partitions.

    When cloning complete hard drives, procedures such as FDISK andFORMAT are a thing of the past. Norton Ghost dynamically partitions andformats a target disk on the y. The source and target disks can be differentsizes. Norton Ghost adjusts the position and size of the target partitionsautomatically FAT12, FAT16, FAT32, NTFS, and Linux Ext2 partitions areexpanded or contracted to t the target. The source and target disk can beon the same computer, or the target disk can be on a different computer,providing the two computers are connected by a network or parallel ports.

    Norton Ghost copies every required partition, regardless of type, from thesource (disk or image le) to the target. If the source and target disks are

    identical in size and structure, Norton Ghost can perform a sector-by-sectorcopy. Because this is seldom the case and does not allow the resizing of partitions, Norton Ghost positions each partition or logical drive on thetarget disk using the same rules as FDISK, copying the partitions on ale-by-le basis.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    12/204

    About Norton Ghost

    12

    An image le can be stored on a network server, CD-ROM, Superdisk, JAZor ZIP drive, or other removable media. This le can be used for backup orfor cloning copies of the original disk.

    Norton Ghost runs under DOS with a simple graphical interface.Alternatively, to simplify repetitive tasks, command-line switches canautomate operation.

    The Norton Ghost installation CD contains four additional utilities thatwork with Norton Ghost:s Ghost Multicast Server simultaneously delivers an image le to Norton

    Ghost running on multiple machines using a single IP multicasttransmission.

    s Ghost Walker assigns a statistically unique security identier (SID) tocloned Microsoft Windows NT workstations.

    s Ghost Explorer adds, recovers, and deletes individual directories andles from an image le.

    s GDISK is a complete replacement for the FDISK and FORMAT utilitiesthat allows on-the-y formatting, better disk space utilization, batchmode operation, hiding and unhiding of partitions, secure disk wiping,and extensive partition reporting.

    Unlike FDISK, which uses interactive menus and prompts, GDISK iscommand line driven and offers quicker conguration of a diskspartitions.

    Norton Ghost EnterpriseThe enterprise version of Norton Ghost includes additional applications,Norton Ghost Console and Norton Ghost Console Client.s Norton Ghost Console is a 32-bit server-based application for remote

    management of cloning operations and post-cloning conguration. Italleviates the need for a boot disk on subsequent cloning operations.

    s Norton Ghost Console Client is installed on all Windows 9x, NT, and

    2000 desktop machines, enabling remote control from the NortonGhost Console.

    With the Norton Ghost Console, IT Managers can group targeted machinesfor a cloning task and initiate the process from the console. The clientinstalled on the workstation eliminates the need to visit a computer with aNorton Ghost boot d isk.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    13/204

    How Norton Ghost works

    13

    Norton Ghost Console stores workstation conguration data, which allowsthe quick reconguration of a machine after the cloning operation. Storedworkstation data includes:s Machine Names Workgroups Domains Machine Descriptions TCP/ IP Settings

    How Norton Ghost worksBecause the Norton Ghost executable is small with minimal conventional

    memory requirements, it can easily be run from a DOS boot disk or harddrive. Norton Ghost can load a workstation from an image le containingboth Windows 95 and the full installation of Ofce 97 in about sevenminutes. Not only is Norton Ghost the fastest way to install Windows 95/ 98, Windows NT, OS/2, and other operating systems, it can make completebackups of disks or partitions. Norton Ghost even copies system les thatother backup utilities miss, making it a great tool for disaster recoveryoperations.

    The following sections give examples of common ways to use NortonGhost.

    Clone internal hard disk drives and individual partitionsWith Norton Ghost you can save all of the contents of one internal harddisk drive or partition to another by cloning local disk-to-disk, orpartition-to-partition. The hardware must be installed correctly and havethe hard disk drive jumpers and CMOS/ BIOS correctly congured. As withall Norton Ghost usage, both the source and destination must be free fromle corruption and physical hard disk drive problems prior to cloning.

    Note: When cloning an entire hard disk drive, the existing partitionconguration is overwritten and need not be set in advance.

    Internal transfer operations are one of the fastest methods of cloning, andoffer a simple quick hard disk drive backup or migration tool. By using asecond hard drive as a backup, it can be used to replace the original in theevent of its failure or corruption, reducing the downtime of the machine.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    14/204

    About Norton Ghost

    14

    Norton Ghosts ability to resize partitions while cloning disk-to-disk simplies upgrading to a larger hard drive. Install the new hard drivehardware as required, then run Norton Ghost from a boot disk to migratethe contents of the old drive to the larger drive. This leaves the original

    disk untouched and available until the new system conguration iscompleted.

    Caution: Make sure you correctly identify and select the source anddestination disks as the operation can not be undone.

    Save and load image les to and from a le serverYour engineers can use Norton Ghost to create a model conguration on a

    desktop or laptop, add the third-party software (ofce software, Webbrowser, etc.), and save the conguration onto a le server for later recall.

    When creating the original model image to be used with dissimilarhardware, it is best to remove the model machines operating systemssoftware drivers for specic devices such as SCSI devices, network interface cards, proprietary video cards, and sound cards. After cloning themachine, and starting it for the rst time, the operating system will do abetter job of loading and conguring the hardware drivers. Windows 95/ 98, Windows NT, and OS/2 Warp might fail to load due to drivers trying tobind to dissimilar congurations on start up when system hardware differs.

    You can add these drivers to the operating system after it loads, or includethe source les in your model image so that upon needing drivers andsystem components, they are already available. For example, include theWindows 95/98 CAB les or the Windows NT I386 directory.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    15/204

    How Norton Ghost works

    15

    Note: If all machines are identical in hardware, then driver conicts aftercloning are less likely to occur.

    When restoring the model onto a machine, it is a simple process of bootingthe machine to DOS with the network client installed to provide themapped volume on the le server where the image le is stored, and thenrunning Norton Ghost.

    Save and load image les to and from removable mediaIt is possible to burn image les onto a CD-ROM or to save an image le toa ZIP drive, JAZ drive, Superdisk, or other removable media.

    For ZIP, JAZ, Superdisk, and removable media, Norton Ghost writes andreads directly to and from the device, providing that the device is availablefrom DOS and has a drive letter.

    When creating the image of the model for storage on a CD-ROM, we

    recommend bringing the image down onto the PC that has the writingsoftware, and then creating the CD-ROM. Norton Ghost can be included onthe created CD-ROM with its functionality limited as outlined inAppendix F, Customizing Norton Ghost functionality on page 189.

    File server holdingNorton Ghost image le

    Model systemsaved to animage le onle server

    Cloned systems using an imagele stored on the le server

    through a mapped network drive

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    16/204

    About Norton Ghost

    16

    To create a CD-ROM image le for later restoration:

    1 Create the model workstation and remove the hardware-specicdrivers to reduce driver conicts when recreating machines withdiffering hardware.

    2 Save the model hard drive to an image le using Norton Ghost and thesplit command-line option (onto a network drive, or second drive).

    3 Run the CD-ROM writing software and save the image onto theCD-ROM.

    For restoration purposes, once the device is working and has a drive letter,Norton Ghost can use that drive to perform the required task.

    Clone hard drives and partitions peer-to-peerPeer-to-peer connections are typically used when there is no network server, just two computers that you wish to connect. Norton Ghost givesyou the choice of connecting through NetBIOS or through the LPT(printer) parallel port. In both cases, one computer becomes the master,the other the slave. See Peer-to-peer connections on page 29 for moreinformation.s To connect through the printer port you need a parallel data transfer

    cable plugged into the LPT port of both computers.s To connect through NetBIOS you need a network card in each

    computer and the appropriate cable and networking software. Ingeneral, connecting through the network gives two to ve times theperformance of an LPT connection.

    For NetBIOS and LPT connections, one machine must act as the master andthe other the slave. All operator input will be on the master computer.

    Using the NETBIOS interface

    With Ethernet, or Token Ring, it is possible to clone between twomachines, using their network interface cards and the NetBIOS protocol.

    To set up NetBIOS requires ve basic Novell networking softwarecomponents:s LSLs MLID (the Network Interface Card ODI driver)s IPXODI

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    17/204

    How Norton Ghost works

    17

    s NetBIOS interfaces NET.CFG (conguration)

    These components can be loaded from a boot disk to allow Norton Ghost

    to use NetBIOS to communicate and clone between master and slave.

    Using the parallel (LPT) port

    With two computers and a parallel data transfer cable (not provided withNorton Ghost), you can clone two computers, master to slave.

    CrossoverEthernet Cable

    Master

    Slave

    Parallel datatransfer cable

    Master

    Slave

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    18/204

    About Norton Ghost

    18

    Clone multiple target machines using multicastingThe replication of a model workstation onto many computers can be atime-consuming task. One-to-one connections with a small number of

    computers is fast and efcient, but as the number of machines increases,network degradation and the duration of the task increases in proportionto the number of computers being cloned.

    Norton Ghost uses TCP/IP multicasting in conjunction with a reliablesession protocol to provide one-to-many communication. Norton Ghostmulticasting supports both Ethernet and Token Ring networks and removesthe bottleneck that occurs when multiple copies of data pass through thenetwork. Norton Ghost multicasting also includes support for the creationof image les.

    A multicasting session consists of one server, a single image le, and agroup of similar clients requiring the identical disk or partition image. Thesession name indicates the session clients are to join and listen to.

    Ghost Multicasting Client is built into the Norton Ghost applicationsoftware and operates in conjunction with the Ghost Multicast Server

    application to quickly replicate workstations.

    2. Ghost Multicast Serverreceives the model image andcreates an image le

    3. Ghost Multicast Servertransmits an existing image lesimultaneously to all listeningmachines

    1. Model system:An image le issaved onto theGhost MulticastServer machine

    4. Cloned systemssimultaneously updated usingan image le sent by the GhostMulticast Server

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    19/204

    Typical usage examples

    19

    Typical usage examplesCloning hard drives and partitions with Norton Ghost is a exible andpowerful method that can be used for anything from upgrading the harddrive in your PC at home, right through to managing organization-widesystem conguration in large corporations.s Upgrade networked workstations

    With Norton Ghost, you can create a model system with all of thenecessary software installed (ofce software, web browser, etc.), andthen save an image of the system to a network server. Use NortonGhost to load the image onto o ther machines over the network. If youare using Ghost Multicast Server, you can load multiple machines atonce, dramatically reducing installation time and network trafc. GhostWalker can then be run to provide each Windows NT machine with aunique security identier (SID).

    s Restore non-networked workstations

    Norton Ghost allows you to create a drive image on removable media,such as ZIP disks or JAZ disks. You simply create a model system withall of the necessary software installed (as in the preceding example),and then save the drive image directly to the device. Norton Ghost willprompt you if it runs out of space on the removable disk and willprompt you to either insert another one or to save to an alternatelocation. Alternatively, you can use an LPT port connection to connectto another machine and clone a disk, partition, or image le.

    s Install clean systems from CD-ROMs

    Use Norton Ghost to install a complete Windows 9x system (or otheroperating system) from an image le held on a CD-ROM. For example,several universities issue students a CD-ROM containing an image leand Norton Ghost. Students can reload their notebook computers fromthe CD-ROM at any stage, just by clicking the Norton Ghost icon. Nofurther user input is required.

    Burning an image le onto a CD-ROM is a useful technique for anyorganization that distributes updates on CD-ROMs. The version of

    Norton Ghost included on the CD-ROM can be congured to limit thefunctionality it provides to the end user. See Appendix F, CustomizingNorton Ghost functionality on page 189 for more information.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    20/204

    About Norton Ghost

    20

    Clone networked computersNorton Ghost allows you to connect two computers directly usingNetBIOS. Both computers must be running the minimum network software

    for a NetBIOS connection (as in the example below). One computer isthen set up as the master and the other as the slave. Norton Ghostautomatically connects the two computers.

    It may prove useful to have a special boot disk that loads just the network software needed by Norton Ghost for the NetBIOS connection. Forexamp le, an NE2000 network card requires the following les (your driversand protocols might vary):

    LSL.COM

    NE2000.INS

    NE2000.COMIPXODI.COM

    NET.CFG

    NETBIOS.EXE

    The following les could be called from the autoexec.bat le, which wouldload the network drivers needed for Norton Ghost to work with NetBIOS:

    LH LSL

    LH NE2000

    LH IPXODI

    LH NETBIOS

    Clone a machine through a parallel cableMake sure both computers are connected through the LPT port with aparallel data transfer cable. Norton Ghost must be running under DOS onboth computers. Select master and slave computers. The parallel portMUST be set to bidirectional, EPP, or ECP (not unidirectional). You canexperiment with the mode for best performance.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    21/204

    Typical usage examples

    21

    Clone disks at optimum speedIf you plan to regularly clone new systems, use the Norton Ghostdisk-to-disk cloning option. Set up a system with one drive congured as

    the model drive to clone (as above). Whenever a new drive needs to becloned, simply attach the new drive to the controller in the model system,run the drive auto-congure option in the BIOS, and then run NortonGhost with the clone local disk-to-disk option.

    Back up disksNorton Ghost is a complete drive backup solution that does not miss in-usesystem les and can be run from a command line. It is the perfect solutionfor making complete backups of disks; it even copies system les that are

    missed by other backup utilities.For backups you will generally want to use batch mode. Batch mode canautomate backups, and it allows full control through command-lineconguration options.

    Refresh multiple machines simultaneouslyMulticasting allows you to establish model congurations of the systems atany stage and save them onto the server machine. If you need to restoremultiple systems, you can start up the Ghost Multicast Server at the timeyou would like the session to start, or at a specic client count.

    After arranging the session start, use a oppy disk or alternative boot upoption to start clients, and run Norton Ghost. Norton Ghost can then useDHCP to get TCP/IP conguration details and connect to the multicastingsession. Once the last machine connects, or the time to start occurs, themulticast session starts automatically and sends the contents of the partitionor drive to the lab machines.

    Note: If you have the Enterprise version of Norton Ghost you will be able

    to automate the task of refreshing the machines from Norton GhostConsole. The entire refresh can be handled from a central machine.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    22/204

    About Norton Ghost

    22

    Restore systems from removable mediaUse Norton Ghost to create a compressed image le containing WindowsNT Server hard drive contents and save the image onto a JAZ cartridge. In

    an emergency, such as a power outage, use Norton Ghost to restore thesaved hard drive image. The system conguration is returned to how it waswhen the image le was created before the disaster. What would normallytake more than several, full-time days of work will take only one hour.

    Using Norton Ghost and Microsofts Remote InstallationService (RIS) & PXE capable machines

    RIS leverages the Preboot Execution Environment (PXE) feature of PC-98spec computers to provide an installation service for the Windows 2000

    OS. RIS allows a user to remotely install an operating system on a clientslocal hard disk. You can create a RIS menu item using Norton GhostMulticast Assist Wizard when running the Wizard on a Windows 2000server with RIS installed.

    For information on creating RIS boot packages see Using Norton GhostMulticast Assist Wizard on page 75 .

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    23/204

    23

    C H A P T E R 2Setting up Norton GhostNorton Ghost and the associated utilities are installed from the installationprogram on the Norton Ghost CD.

    However, the Norton Ghost application is a standalone executable that canbe run from any location in DOS. For example, ghost.exe can be copied toand run from a hard drive, a 3.5-inch oppy disk, a CD-ROM, or a network drive.

    Norton Ghost must be run in DOS. If another operating system such asWindows NT is installed on the computer on which Norton Ghost is to run,then a DOS boot disk is required.

    Minimum system requirementsThe system requirements to run Norton Ghost are:s 386SX processor (486 or above recommended)s 4 MB RAM (8 MB RAM for NTFS), 16 MB recommendeds DOS 6.22 or aboves VGA monitor

    The system requirements to run Norton Ghost Console are:s Pentium processor

    s 16 MB RAM, 32 MB recommendeds VGA monitors Windows NT 4.0 SP4 or above ors Windows 95/98 with IE 4.0 installed, so long as you do not require

    client machines to be added to or removed from NT domains.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    24/204

    Setting up Norton Ghost

    24

    Hardware requirements for Norton Ghost transfer modes

    Type of connection Hardware

    Peer-to-peer LPT/ parallel po rtconnection Parallel connection cable and a bidirectionalparallel port with EPP or ECP compatibilityon each machine. Bidirectional is the bestoption for connection.

    Peer-to-peer NetBIOSconnection

    Ethernet or Token Ring network interfacecardEstablished network connection w hichincludes one of the following:s Crossover Ethernet cable

    (pins 1236 > 3612)s

    Coaxial cables Standard cables with hub or MAUs NetBIOS network software

    SCSI tape driver DOS ASPI driverSCSI tape driveTape media

    Multicast Ethernet or Token Ring NICEstablished network connectionNIC packet driver or NDIS 2.01 NIC driverOptional multicast-enabled routerOptional BOOTP/DHCP software

    Removable media Removable media drive and mediaMedia drivers required to use in DOS

    CD-ROM usage CD-ROM writerCD-ROM writer disk creation software

    Mapped ne twork vo lume Network in te rface cardEstablished network connectionDOS network client software to providemapped drives

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    25/204

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    26/204

    Setting up Norton Ghost

    26

    Note: If a Windows drag-and-drop or copy and p aste operation is usedinstead of a DOS command, the les being copied from the CD retaintheir read-only attributes when copied to a oppy disk or hard drive.You must manually change the attribute on the Norton Ghostexecutable (ghost.exe) and all other les that will be updated oredited.

    3 Run Norton Ghost once within DOS to activate the application. Anenvironment le named ghost.env will be created in the directory.Make sure you keep a backup copy of this le to protect it from loss orcorruption as it will be required to activate updates.

    To remove read-only property on Norton Ghost les in Windows:

    1 Select the ghost.exe le.

    2 Right-click the le and select Properties.

    3 Uncheck the Read-only attribute.

    4 Click OK.

    To uninstall Norton Ghost:s If you have installed Norton Ghost from the install program then you

    can uninstall from Add/Remove Programs in the Control Panel.s If you manually copied in the Norton Ghost les then delete the single

    ghost.exe executable le and associated les.

    Norton Ghost Console securityThe Norton Ghost Console server and clients use public-key cryptographytechniques to authenticate the server to the client. This ensures that onlythe authorized servers can remotely control, clone, and recongure clientmachines. During the Norton Ghost Console server installation, public andprivate certicate les are generated. These les are called pubkey.crt andprivkey.crt.

    When a client communicates with the server, it uses a challenge-responseprotocol. The client must have the servers public certicate to perform thisoperation. Therefore, the servers public certicate must be distributed toall clients. See Distribution of the certicate les on page 117 for furtherinformation.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    27/204

    Setting up a DOS boot disk

    27

    Warning: The private certicate must be safeguarded. If an unauthorizeduser copies it, security is compromised. If you accidentally delete yourprivate certicate, and have no other copy, you will have to generate anew certicated pair and distribute the public certicate to all clients. SeeTo generate new certicates: on page 118 for further information.

    Updating Norton Ghost EnterpriseLiveUpdate provides free updates to x defects and provide additionalfeatures in the Norton Ghost program. LiveUpdate uses an Internetconnection to connect to Symantec to see if updates are available forNorton Ghost.

    Symantec does not charge for Norton Ghost updates, however, yournormal Internet access fees apply.

    To update Norton Ghost using LiveUpdate:

    1 Do one of the following:s On the Windows taskbar, click Start , then click Programs >

    Norton Ghost > LiveUpdate .s On the Windows taskbar, click Start , then click Settings > Control

    Panel . From the Control Panel double-click LiveUpdate .

    2 Follow the instructions that ap pear on the screen.

    Setting up a DOS boot diskYou only need to create a DOS boot disk as described below if you areusing Norton Ghost without multicasting. For further information onmulticasting see Using Norton Ghost Multicast Assist Wizard on page 75 .

    Norton Ghost is a DOS-based application that should be run in DOS modeoutside of Windows. On some systems, such as Windows NT, Windows

    2000, and other non-DOS operating systems, a DOS boot disk must beused to start the system to allow Norton Ghost to operate. Additional DOSdrivers may be required to allow Norton Ghost to access local or network hardware. The conguration les on a DOS boot disk can be altered toload these drivers as detailed in Setting up transfer methods on page 28 .

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    28/204

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    29/204

    Setting up transfer methods

    29

    Local devicesTo use Norton Ghost with a SCSI tape device, the tape device needs tohave an Advanced SCSI Programming Interface (ASPI) driver for DOS

    installed. The driver is installed in the cong.sys le as shown in theexample below:

    device=C:\scsitape\aspi4dos.sys

    Refer to the documentation included with the SCSI tape device for furtherdetails.

    Peer-to-peer connectionsPeer-to-peer connections enable Norton Ghost to run on two machines andtransfer drives and partitions, and to use image les between them.

    Peer-to-peer parallel port connections

    Connect both computers through the LPT port with a parallel data transfercable. Norton Ghost must be running under DOS on both computers. Theparallel port must be set to bidirectional, or EPP, or ECP, but notunidirectional. You may need to experiment with the mode for bestperformance.

    Action Master Slave

    Disk-to-disk copy Machine containing sourcedisk

    Machine containingdestination disk

    Disk-to-image lecopy

    Machine containing sourcedisk

    Machine receivingdestination image le

    Image le-to-disk copy

    Machine containingdestination disk

    Machine containing sourceimage le

    Partition-to-partitioncopy

    Machine containing sourcepartition

    Machine containingdestination partition

    Partition-to-imagele cop y

    Machine containing sourcepartition

    Machine receivingdestination image le

    Imagele-to-partition copy

    Machine containingdestination partition

    Machine containing sourceimage le

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    30/204

    Setting up Norton Ghost

    30

    Select which computer is the master (the machine from which you controlthe connection), and which is the slave (the other machine participating inthe connection). All operator input must be on the master computer. Usethe previous table to choose which machine will be the master and which

    will be slave.

    Peer-to-peer NetBIOS network connectionsNetBIOS is only available for peer-to-peer connections. Sample third-partyles are available on the Symantec FTP site at:

    ftp://ftp.symantec.com/public/english_us_canada/products/ghost/

    Sourcing NetBIOS

    The following steps explain the NetBIOS setup procedure.1 Install network interface cards in each computer.

    2 Once the ne twork interface cards are installed, the two p eer machinesneed to be connected using cabling. The type and setup of theconnection will depend on your individual network requirements.These can include converted twisted pair cables, coaxial, hub, andMAU-based setups.

    3 Run the Network Interface Card setup program and congure the card.

    4 Set up NetBIOS.

    Here is an example of loading NetBIOS in your startnet.bat orautoexec.bat:

    LSL.COM

    REM (Comment: replace NE2000.COM with your NIC driver)

    NE2000.COM

    IPXODI.COM

    NETBIOS.EXE

    An example of the net.cfg for an NE2000 NIC:

    #set up the NIClink driver NE2000

    _int 10

    _port 300

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    31/204

    Setting up transfer methods

    31

    Select which computer is the master (the machine from which youcontrol the connection), and which is the slave (the other machineparticipating in the connection). All operator input must be on themaster comp uter. See Peer-to-peer connections on page 29 to choose

    which will be the master and which machine will be slave.

    Mapping to a Microsoft Windows network volumeNetwork le server access available within Windows will be unavailablewhen Norton Ghost is run in DOS. To access a network le server, a DOSnetwork client boot disk must be created. A network client boot disk willcontain the ap propriate ne twork drivers and network client software toallow connection to a network.

    Creating a Windows NT Server 4.0 network boot diskfor DOS

    To create a DOS network client boot disk for a Microsoft network:

    1 Create a DOS boot disk as outlined in Updating Norton GhostEnterprise on page 27.

    2 Open Administrative Tools on Windows NT Server and start theNetwork Client Administrator.

    3 Choose Make Network Installation Startup Disk. This option copiesles onto the boot disk to allow access to a Microsoft network volumeand congures the components to connect to the Server.

    4 Choose the location of the network client installation setup les bysetting up the Windows NT Server setup CDs Client directory as ashare, or by copying the Windows NT Server setup CDs Clientdirectory onto the server and setting up this directory as a share.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    32/204

    Setting up Norton Ghost

    32

    5 Choose Network Client v3.0. You must also choose your network interface card. If your network interface card is not on the list,temporarily p ick something similar.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    33/204

    Setting up transfer methods

    33

    6 To log on to the Windows NT server you need to provide some basicnetworking information needed for Microsoft networking.

    7 Make sure that the DOS boot disk you created is in the drive. TheNetwork Client Administrator will copy the required network clientles onto the DOS boot disk.

    8 On completion, edit and modify the network boot disk congurationles to log onto the network and map the correct drive. For example,make the following changes to your autoexec.bat le:

    path=a:\ net

    a:\ net\ net startnet use z: \ \ KERMIT\ images

    Note: Change the \ \ KERMIT\ images to your \ \ server\ share location.

    9 If the network interface card that you selected in Step 4 was incorrect,go on to the next step. If you think you have the right card but thenetwork boot d isk gives you an e rror message about binding, there is aproblem with the card conguration.

    10 Following is an excerpt from article Q142857 (How to Create aNetwork Installation Boot Disk) in the Microsoft Knowledge Base,which explains how to add an NDIS driver for network interface cardsnot originally included in the network client administrator.

    This example is for the Intel EtherExpress Pro NIC card; however, thisexample can serve as a template for all NDIS-compatible drivers.s Copy the epro.dos driver to the A:\ Net directory.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    34/204

    Setting up Norton Ghost

    34

    s Modify the net\ protocol.ini le and change the [EPRO$] section todrivername=EPRO$ .

    The drivername= information is included on most manufacturersdisks in the sample protocol.ini le that comes with the network interface card.

    s Modify the net\ system.ini le and change the [network drivers]section to netcard=Epro.dos

    The driver le that the netcard= equals is also on themanufacturers disk.

    Additional drivers reside in the Clients\ Wdl\ Update d irectory on theWindows NT Server CD. For more information, see article Q128800(How to Provide Additional NDIS2 Drivers for Network Client 3.0) inthe Microsoft Knowledge Base.

    If you get an error message stating an inability to bind, the network interface card is not congured properly. Check the interrupt andaddress settings on your card and in your protocol.ini. Also makecertain you have customized properly as explained in Step 9.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    35/204

    35

    C H A P T E R 3Getting startedThis chapter discusses how to roll out and install Norton Ghost Clientsoftware. A owchart illustrates the sequence of steps to prepare a clientmachine or set of client machines to work with Norton Ghost Console.

    These steps mirror the three separate scenarios that follow the owchart.You can follow either the owchart or one of the scenarios.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    36/204

    Getting started

    36

    Create a source machine

    See Create an image fromthe source machine onpage 38 .

    Yes

    NoDo you have a sourcemachine?

    Install Norton Ghost

    Enterprise. See InstallingNorton Ghost onpage 25 .

    See Create an image of aclient machine on

    page 37 .

    No

    See Creating the sourcemachine on page 70 .

    Yes

    Do you need to create asource machine?

    For Windows NT templatemachines, see theSymantec support siteKnowledgbase article#1999012209340925 How to clone an NTsystem .

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    37/204

    Create an image of a client machine

    37

    Create an image of a client machine

    Use Multicast AssistWizard to make a bootdisk. See Creating a boot

    package on page 75.

    See Create and installthe boot partition onpage 40 .

    Use the boot disk youcreated to boot the clientmachine.

    Install the Norton GhostConsole client on aclient. See InstallingNorton Ghost onpage 25 .

    Use Multicast Server tocreate an image le fromthe client machine. See Deploying the WindowsGhost Multicast Serveron page 82.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    38/204

    Getting started

    38

    Create an image from the source machine

    Use Multicast Server tocreate an image le from

    your source machine. See Deploying the WindowsGhost Multicast Serveron page 82 .

    Install console client on

    the client machine. See Installing Norton Ghoston page 25 .

    From the server machineuse Multicast AssistWizard to create a bootdisk. See Creating a bootpackage on page 75 .

    Boot the source machinefrom the boot disk.

    Do you need to capturethe existing congurationdata for client machines?

    See Install the NortonGhost Console client onpage 39 .

    See Create and installthe boot partition onpage 40 .

    Yes

    No

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    39/204

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    40/204

    Getting started

    40

    Create and install the boot partition

    Install the boot partitionon the client machines.

    Create a boot partition.See Creating a bootpackage on page 75.

    Create and execute acloning task. See Createand execute a cloningtask on page 41 .

    Reboot the cl ientmachines.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    41/204

    Create and execute a cloning task

    41

    Create and execute a cloning task

    Execute the task to createyour client machines. See Executing a task onpage 110.

    In Norton Ghost Console,create a location for theimage le. See Imageles on page 111 .

    In Norton Ghost Console,

    create a congurationtemplate if required. See Creating congurationsettings on page 112 .

    In Norton Ghost Console,

    create a task to clone andrecongure clients. See Creating tasks onpage 107.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    42/204

    Getting started

    42

    Rolling out Norton Ghost client softwareThe information below explains how to perform the following tasks:s

    Comp lete a rst time install of Norton Ghost client software on a singleclient machine, preserving the original setup of the client, ready forcloning and post conguration from Norton Ghost Console. Once thisprocess is complete the client machines can be controlled from theconsole. See Installing the Norton Ghost client for the rst time onpage 43 .

    s Capture an image from a source machine and roll out the image to aset of client machines. This process does not capture existingconguration data from the client machines, but when rolling out theimage you can use a template to apply a generic set of congurationdata to these machines. Once this process is complete the clientmachines can be controlled from the console. See Clone andpost-congure client machines without capturing existing congurationdata on page 44 .

    s Capture conguration data from a set of client machines. Capture animage from a source machine, then roll out the image and the originalconguration data to the client machines. This process results in clientmachines with the original conguration data but with a copy of theoperating system from the source machine. Once this process iscomplete the client machines can be controlled from the console. SeeClone and post congure client machines capturing existingconguration data on page 45.

    The information in this chapter assumes you have installed the NortonGhost Console Server. See Installing Norton Ghost on page 25 for moreinformation.

    You should be aware of the following points as you follow the proceduresbelow.s The Norton Ghost boot partition must exist on every client machine or

    it cannot be cloned using Norton Ghost Console.

    s It is possible to take an image of a machine that includes both the bootpartition and a Windows partition. However, this is not recommended.

    s The boot partition must have network drivers that match the network card. Creating the boot partition from Norton Ghost Multicast Assistensures that the network driver matches the network card.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    43/204

    Rolling out Norton Ghost client software

    43

    Installing the Norton Ghost client for the rst time1 Install the console client to your client machine by selecting the

    Enterprise Client option. See Installing Norton Ghost on page 25 for more information.

    2 On the console server machine, use Multicast Assist Wizard to create aboot disk. This is used to enable Norton Ghost Multicast Server to takean image of the client machine.

    See Creating a boot package on page 75 for more information.

    3 Use the boot disk you created to boot the client machine.

    4 On the console server machine, use Norton Ghost Multicast Server tocreate an image le of the client machine.

    See Deploying the Windows Ghost Multicast Server on page 82 formore information.

    5 Create a boot partition image using Norton Ghost Multicast AssistWizard on the console server machine. The boot partition contains thenecessary Norton Ghost utilities, including the console client anddrivers for your particular network card.

    See Creating a boot package on page 75 for more information.

    You should use the same network card template you used to create theboot disk in step 2. Save the image along with the image you createdin step 4. Both images are used on your client machine.

    6 Install the boot partition on the client machine. This erases the harddisk on the client machine. The disk will contain only the NortonGhost boot partition, which is very small. Do not perform this stepunless you are sure you have copied all data off the machine and thatit is safe to proceed.

    a Insert the boot disk in the client machines oppy drive.

    b Use Norton Ghost Multicast Server to load the boot partition ontothe client. See Deploying the Windows Ghost Multicast Server onpage 82 for more information.

    7 Remove the boot disk and reboot the client machine to allow the

    console client to communicate with the console.The client machine is ready to be managed from the console servermachine.

    8 On the console server machine do the following:

    a Create a location for the image le you created in step 4.

    See Image les on page 111 for more information.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    44/204

    Getting started

    44

    b Create a task to clone your client machine.

    See Creating tasks on page 107 for more information.

    9 Execute the task to load the image le back onto your client machine.

    See Executing a task on page 110 for more information.

    Clone and post-congure client machines without capturingexisting conguration data

    1 Create a template source machine for all the other machines to becloned.

    See Creating the source machine on page 70 for more information.

    2 Install the console client on the source machine. This allows NortonGhost Console to discover the source machine.

    See Installing Norton Ghost on page 25 for more information.

    3 On the console server machine, use Multicast Assist Wizard to create aboot disk. This is used to enable Norton Ghost Multicast Server to takean image of the source machine.

    See Creating a boot package on page 75 for more information.

    4 Use the boot disk you created to boot the source machine.

    5 On the console machine, use Norton Ghost Multicast Server to createan image le of the source machine.

    See Deploying the Windows Ghost Multicast Server on page 82 formore information.

    6 Create a boot partition image using Norton Ghost Multicast AssistWizard on the console server machine. The boot partition contains thenecessary Norton Ghost utilities, including the console client anddrivers for your particular network card.

    See Creating a boot package on page 75 for more information.

    You should use the same network card template you did to create theboot disk in step 3. Save the image along with the image you createdin step 5. Both images are used on your client machines.

    7 Install the boot partition on each client machine. This erases the harddisk on the client machines. This disk will contain only the Ghost bootpartition, which is very small. Do not perform this step unless you aresure you have copied all data off the machines and that it is safe toproceed.

    a Insert the boot disk in the client machines oppy drive.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    45/204

    Rolling out Norton Ghost client software

    45

    b Use Norton Ghost Multicast Server to load the boot partition ontothe client. See Deploying the Windows Ghost Multicast Server onpage 82 .

    8 Remove the boot disk and reboot each client machine to allow theconsole client to communicate with the console.The client machines are ready to be managed from the console servermachine.

    9 On the console server machine do the following:

    a Create a location for the image le created in step 5.

    See Image les on page 111 for more information.

    b Create a conguration template if required.

    See Creating conguration settings on page 112 for more

    information.c Create a task to clone and recongure the clients.

    See Creating tasks on page 107 for more information.

    10 Execute the task to create your client machines.

    See Executing a task on page 110 for more information.

    Clone and post congure client machines capturing existingconguration data

    1 Create a template source machine for all the client machines to becloned.

    See Creating the source machine on page 70 for more information.

    2 Install the console client on the source machine.

    See Installing Norton Ghost on page 25 for more information.

    3 On the console server machine, use Norton Ghost Multicast AssistWizard to create a boot disk. This is used to enable Norton GhostMulticast Server to take an image of the source machine.

    See Creating a boot package on page 75 for more information.

    4 Use the boot disk you created to boot the source machine.5 On the console machine, use Norton Ghost Multicast Server to create

    an image le of the source machine.

    See Deploying the Windows Ghost Multicast Server on page 82 formore information.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    46/204

    Getting started

    46

    6 Install the console client on each client machine by selecting theEnterprise Client option. This allows the Norton Ghost Console todiscover the client machines and capture the conguration data. SeeInstalling Norton Ghost on page 25 for more information.

    7 On the console server conrm that all client machines and existingconguration data appear in the console. See Viewing or changingmachine properties on page 107 .

    8 Create a boot partition image using Norton Ghost Multicast AssistWizard on your Console server machine. The boot partition containsthe necessary Norton Ghost utilities, including the console client anddrivers for your particular network card.

    See Creating a boot package on page 75 for more information.

    You should use the same network card template you used to create the

    boot disk in step 3. Save the image along with the image you createdin step 5. Both images are used on the client machine.

    9 Install the boot partition on each client machine. This erases the harddisk on the client machines. This disk will contain only the NortonGhost boot partition, which is very small. Do not perform this stepunless you are sure you have copied all data off the machines and thatit is safe to proceed.

    a Insert the boot disk in the client machines oppy drive.

    b Use Norton Ghost Multicast Server to load the boot partition ontothe client. See Deploying the Windows Ghost Multicast Server onpage 82 for further information.

    10 Reboot the client machines to allow the console client to communicatewith the console.

    The client machines are ready to be managed from the console servermachine.

    11 On the console server machine do the following:

    a Create a location for the image le you have created in step 5.

    See Image les on page 111 for more information.

    b Create a task to clone and recongure the clients with the imagele you created and the conguration details you captured fromeach machine.

    See Creating tasks on page 107 for more information.

    12 Execute the task to create the client machines.

    See Executing a task on page 110 for more information.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    47/204

    47

    C H A P T E R 4Using Norton GhostThis chapter describes how to perform Norton Ghost operations. Theprocedures assume that all hardware is congured properly andcommunication methods are established. See Updating Norton Ghost

    Enterprise on page 27 for more information.Information on the following tasks is provided:s Starting Norton Ghosts Navigating in Norton Ghost without a mouses Cloning diskss Cloning partitionss Managing image les

    What you need to doThe following section gives a quick overview of the ways you can useNorton Ghost to perform everyday tasks.

    1 Identify what you want Norton Ghost to do and how many machinesare involved.s Disk duplications Disk image le creations Disk creation from image les Partition duplications Partition image le creations Partition creation from image le

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    48/204

    Using Norton Ghost

    48

    2 Select the hardware setup method you will use to perform theoperation.

    Internal drives and:s No other devices.s Other peripheral devices not needing additional setup (for

    example, Jaz or Zip drive).s SCSI tape drive requiring DOS ASPI driver setup.s Third-party device requiring DOS driver setup.s Mapped network volume.s Peer-to-peer connection using LPT printer port.s Peer-to-peer connection using NetBIOS and network interface cards

    connection.s Multicast TCP/IP network.

    3 Set up the hardware and system for the method chosen.

    a Ensure all hard drives are installed correctly and the BIOS of thesystem is congured and correctly displays the valid parameters of the drives.

    b Set up additional drivers required for other devices:

    SCSI tape drive requiring DOS driver setup

    Install the SCSI ASPI DOS driver in the cong.sys le as outlined inSCSI Tape Drive documentation.

    Third-party device requiring DOS driver setup

    Install the DOS driver as outlined in device documentation.

    Mapped netwo rk drive

    s Install Network Interface Card (NIC).s Connect up cabling.s Set up NIC using manufacturers installation program.s Run NIC test program to check NIC and cabling.s

    Install DOS network volume connectivity software.s Map the network volume to a local drive letter.

    Peer-to-peer connection: LPT

    Using a parallel data transfer connection cable, connect up the twomachines. Decide which machine is the master and which is theslave.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    49/204

    What you need to do

    49

    Peer-to-peer connection: NetBIOS

    s Install network interface card (NIC).s Connect cabling.

    s Set up NIC using manufacturers installation program.s Run NIC test program to check NIC and cabling.s Install NetBIOS networking software.s Select which machine is the master and which is the slave.

    Multicast TCP/ IP netw ork

    s Install Network Interface Card (NIC).s Connect cabling.s Set up NIC using manufacturers installation program.

    s Run NIC test program to check NIC and cabling.s Set up multicasting and perform multicast operations as

    detailed in Norton Ghost multicasting on page 67 .s Test Hardware and DOS driver setup.

    4 Start Norton Ghost. Optionally, add command-line switches. Forinformation on the Norton Ghost command-line switches, see NortonGhost command-line switches on page 141 .

    5 Select the transfer method and Norton Ghost operation from the menu.

    6 Select source hard drive, partitions, or image le.

    7 Select destination hard drive, partition, or image le.

    Warning: Choose carefully. Make sure you select the correctdestination to overwrite. In most cases, you will not be able to recoverfrom an incorrectly selected destination drive.

    8 Follow the prompts on the screen and proceed with the clone.

    9 Reboot the machine.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    50/204

    Using Norton Ghost

    50

    Starting Norton GhostNorton Ghost is a DOS-based application and should run in DOS modeoutside of Windows, if possible. If you run Norton Ghost within Windows95/98, note the following:s Files may be in an open or changing state. If these les are cloned, the

    resulting destination les will be left in an inconsistent state.s The operating systems volume must not be overwritten.s If you overwrite a drive or partition, the system must be restarted.s LPT connection operation is not available.s Norton Ghost client multicast operation is not available.s Norton Ghost will not automatically reboot the system.s Hard drive sizes may be displayed smaller than their actual size.

    Norton Ghost will only be able to access the displayed destination size.The remaining space will not be used.

    Norton Ghost should never be run within Windows NT, Windows 2000,OS/2, or other non-DOS operating systems. To run Norton Ghost on amachine running a non-DOS operating system, use a DOS boot disk. Formore information, see Updating Norton Ghost Enterprise on page 27 .

    To start Norton Ghost:

    Do one of the following:s From the DOS prompt, type:

    C:\>ghost.exes Click the Start button, then select Programs > Norton Ghost > Norton

    Ghost.s Boot the machine using a DOS boot disk.

    A DOS boot disk can be created on a machine running Windows orDOS. Running Norton Ghost in DOS may require additional DOSdrivers to be started to allow Norton Ghost to access and use some

    hardware. See Updating Norton Ghost Enterprise on page 27 formore information.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    51/204

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    52/204

    Using Norton Ghost

    52

    3 Select the destination drive.

    If a peer-to-peer connection is established, this will be the slavemachines disks. (If this is a local disk-to-disk copy, then the sourcedisk will be unavailable for selection.). On selection of the destinationdrive, the Destination Drive Details dialog box displays.

    Warning: Choose carefully as this is the disk that is going to getoverwritten.

    4 Conrm or change the destination drive partition layout.

    The Destination Drive Details dialog box displays a suggested partitionlayout for the destination drive. By default Norton Ghost allocates anyextra space that the new disk has to the rst FAT or NTFS partition thatit discovers.

    You can change the size of any destination FAT or NTFS partition atthis stage simply by entering the new size in megabytes.

    You cannot enter a value that exceeds the available space, is beyondthe le systems limitations, or that is not large enough to contain thedata held in the source partition.

    5 Click OK.

    6 When the Proceed with Disk Clone? question displays, check thedetails displayed and ensure the correct options are selected.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    53/204

    Cloning disks

    53

    Do one of the following:s Select Yes to proceed with the disk cloning.

    The system performs a quick integrity check of the le structure onthe source disk and then copies the source disk to the destination.If you need to abort the process use Ctrl-C, but be aware that thisleaves the destination disk in an unknown state.

    Warning: Only select Yes if you are really sure you want to proceed.The destination drive will be completely overwritten with no chance of recovering any data.

    s Select No to return to the menu.

    7 When the disk clone is complete, reboot the machine. Norton Disk Doctor, ScanDisk, or a similar utility can then be run to verify theintegrity of the destination disk.

    Cloning a disk to an image le

    To clone a disk to an image le:

    1 From the Norton Ghost main menu, select Disk > To Image.

    The Source Drive dialog box displays.

    2 Select the source drive.

    The Source Drive dialog box displays the details of every disk NortonGhost can nd on the local machine. On selection of the source d rive,the File Locator dialog box displays.

    3 Select the image le. Do one of the following:s Type the path and lename for the disk image le.s Browse to locate the image le.

    4 Specify the drive or device, and specify the full path name.

    The image le may reside on either a locally mapped network leserver volume or a local drive (but not the one that is being copied

    from). When using peer-to-peer connections, the image le will becreated on the slave machine.

    5 Press Enter.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    54/204

    Using Norton Ghost

    54

    6 When the Compress Image File? question displays, select thecompression type.s Select No for no compression (high speed)s Select Fast for low compression (medium speed)s Select High for high compression (slower speed)

    Compression may affect the speed of operations. On selection of acompression type, Norton Ghost estimates the amount of spaceavailable for the destination image le. If there is insufcient space,Norton Ghost prompts you to enable spanning of image les.

    Note: If spanning is enabled, Norton Ghost prompts for the additionaldisks and volumes. See Image les and volume spanning on page 62 for more information.

    Norton Ghost displays the nal Proceed with disk dump? question.This is the last chance to back out.

    7 When the Proceed with Image File Creation? question appears, check the details displayed and ensure the correct options have beenselected.

    Do one of the following:s Select Yes to proceed with the image le creation.

    The system performs a quick integrity check of the le structure onthe source disk and then copies the source disk to the destinationimage le. If you need to abort the process use Ctrl-C, but be awarethat this leaves the destination image le in an unknown state.

    s Select No to return to the menu.

    8 After the image le creation is complete, Norton Ghost can verify theintegrity of the image le. From the main menu, select Check > ImageFile.

    Cloning a disk from an image le

    To clone a disk from an image le:1 From the main menu, select Disk > From Image.

    Norton Ghost displays the File Locator dialog box.

    2 Do one of the following:s Type the path and lename of the image le.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    55/204

    Cloning disks

    55

    s Browse to locate the image le.

    Specify the drive or device and select the full path name. Note that theimage le may reside on either a locally mapped network le servervolume or a local drive (but not the one that is being copied to). Whenusing peer-to-peer connections, the le will be located on the slavemachine.

    3 Press Enter. The Destination Drive dialog box displays.

    4 Select the destination drive.

    The Destination Drive dialog box displays the details of every driveNorton Ghost can nd on the local machine. The disk containing thesource image le is not available for selection. On selection of thedestination drive, the Destination Drive Details dialog box displays.

    Warning: Choose carefully as this is the disk that is going to getoverwritten.

    5 Conrm or change the destination drive partition layout.

    The Destination Drive Details dialog box displays a suggested p artitionlayout for the destination drive. By default Norton Ghost allocates anyextra space that the new disk has to the rst FAT or NTFS partition thatit discovers.s You can change the size of any target FAT or NTFS partition at this

    stage simply by entering the new size in megabytes.s You cannot enter a value that exceeds the available space, is

    beyond the le systems limitations, or is not large enough tocontain the data held in the source partition.

    6 Click OK.

    7 When the nal Proceed with disk load? question displays, check thedetails displayed and ensure the correct options have been selected.

    Do one of the following:s Select Yes to proceed with the disk cloning.

    Norton Ghost creates the destination drive using the source imagele drive details. If you need to abort the process use Ctrl-C, but beaware that this leaves the destination drive in an unknown state.

    Note: Only select Yes if you are really sure you want to proceed. Thedestination drive will be completely overwritten with no chance of recovering any data.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    56/204

    Using Norton Ghost

    56

    s Select No to return to the menu.

    Note: For more information about how Norton Ghost handles spannedand split image les, see Managing image les on page 60 .

    8 When the disk image load is complete, reboot the machine. NortonDisk Doctor, ScanDisk, or a similar utility can then be run to verify theintegrity of the destination drive.

    Cloning partitionsPartition cloning procedures are accessed from the main menu. To specifya transfer method, select one of the following items from the Norton Ghostmain menu:s Locals LPT > Masters NetBIOS > Master

    The source and destination partitions must be correctly congured beforecloning partitions.

    Cloning from partition to partition

    A destination partition must be correctly congured before Norton Ghostcan clone another partition into it.

    To clone from partition to partition:

    1 From the main menu, select Partition > To Partition.

    The Source Drive dialog box displays.

    2 Select the source drive.

    The Source Drive dialog box displays the details of every drive NortonGhost can nd on the local machine. On selection of the source d rive,

    the Source Partition dialog box displays.3 Select the source partition.

    The Source Partition dialog box displays the details of all the partitionson the selected source drive. On selection of the source partition, theDestination Drive dialog box displays.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    57/204

    Cloning partitions

    57

    4 Select the destination drive.

    The Destination Drive dialog box displays the details of every disk Norton Ghost can nd on the destination machine. For peer-to-peerconnections, the slave machine is the destination. On selection of thedestination drive, the Destination Partition dialog box displays.

    5 Select the destination partition.

    The Destination Partition dialog box displays the details of all thepartitions on the selected destination drive.

    Warning: Choose carefully as this is the partition that is going to beoverwritten.

    6 Click OK.

    7 When the nal Proceed with Partition Copy? question displays, check the details displayed and ensure the correct options have beenselected. This is the last chance to back out.

    Do one of the following:s Select Yes to proceed with the partition copy.

    If you need to abort the process use Ctrl-C, but be aware that thisleaves the destination drive in an unknown state.

    Warning: Only select Yes if you are sure you want to proceed. Thedestination partition will be completely overwritten with no chance of recovering any data.

    s Select No to return to the menu.

    8 When the p artition copy is complete, reboo t the destination machine.Norton Disk Doctor, ScanDisk, or a similar utility can then be run toverify the integrity of the destination partition.

    Cloning from partition to image le

    To clone a parti tion to an image le:

    1 From the main menu, select Partition > To Image.

    The Source Drive dialog box displays.

    2 Select the source drive.

    The Source Drive dialog box displays the details of every disk NortonGhost can nd on the local machine. On selection of the source d rive,the Source Partition dialog box displays.

  • 8/8/2019 Norton Ghost Enterprise Imlementation Guide

    58/204

    Using Norton Ghost

    58

    3 Select the source partitions to be included in the destination image le.

    The Source Partition dialog box displays the details of all the partitionson the selected source drive. Multiple partitions may be selected. Onselecting OK, the File Locator dialog box displays.

    4 Select the image le. Do one of the following:s Type the path and lename for the disk image le.s Browse to locate the image le.

    The image le may reside on either a locally mapped network leserver volume or a local partition (but not the partition that is beingcopied from). When using peer-to-peer connections, the image le willbe created on the slave machine.

    5 Press Enter.

    6 When the Compress Image? question displays, select thecompression type.s Select No for no compression (high speed).s Select Fast for low compression (medium speed).s Select High for high compr