Symantec Ghost 7.5 Student Guide, Courseware, Symantec, Symantec Ghost 7.5 CourseWare

[ Pobierz całość w formacie PDF ]
//-->ForSymantecPartnerInternalSSymantec Ghost 7.5Student GuideRevision July 2, 2002Part Number: SM-00025taffTrainingOnlySymantec and the Symantec logo are U.S. registered trademarks of Symantec Corporation.Other brands and products are trademarks of their respective holder/s. Copyright © 2002Symantec Corporation. All Rights Reserved. Any technical documentation that is madeavailable by Symantec Corporation is the copyrighted work of Symantec Corporation and isowned by Symantec Corporation.NO WARRANTY. The technical documentation is being delivered to you AS-IS, andSymantec Corporation makes no warranty as to its accuracy or use. Any use of the technicaldocumentation or the information contained therein is at the risk of the user. Documentationmay include technical or other inaccuracies or typographical errors. Symantec reserves theright to make changes without prior notice.TrademarksForSymantecNo part of this publication may be copied without the express written permission ofSymantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.Symantec, the Symantec logo, Intruder Alert, NetProwler, Raptor, VelociRaptor, SymantecDesktop Firewall, Symantec Enterprise VPN, Symantec Enterprise Firewall, SymantecGhost, Symantec pcAnywhere, RaptorMobile, NetRecon, Enterprise Security Manager, NAV,Norton AntiVirus, Symantec System Center, Symantec Web Security, Mail-Gear and I-Gearare trademarks of Symantec Corporation.Windows is a registered trademark of Microsoft Corporation. Pentium is a registeredtrademark of Intel Corporation. Other product names mentioned in this manual may betrademarks of their respective companies and are hereby acknowledged.Printed in the United States of America.10987654321PartnerInternalCopyright NoticeStaffTrainingOnlyTable of ContentsCourse overview.................................................................................................................................ixIntended audience ...................................................................................................................ixCourse prerequisites .................................................................................................................ixRelated documentation.............................................................................................................ixConventions..............................................................................................................................xCourse description ...................................................................................................................xiCourse objectives ....................................................................................................................xiiCourse agenda................................................................................................................................ xiiiDay 1.................................................................................................................................... xiiiDay 2.................................................................................................................................... xiiiDay 3.................................................................................................................................... xivUnit 1 Fundamentals of Ghost ......................................................................................................... 1-1Overview................................................................................................................................. 1-1Understanding Ghost................................................................................................................1-2Cloning and image files ......................................................................................................... 1-2Ghost components................................................................................................................... 1-4Ghost executable .................................................................................................................. 1-4Ghost Console....................................................................................................................... 1-4Ghost Console client.............................................................................................................. 1-4GhostCast Server................................................................................................................... 1-4Ghost Boot Wizard ................................................................................................................ 1-6Ghost AutoInstall .................................................................................................................. 1-6Ghost Walker ........................................................................................................................ 1-6Ghost Explorer ...................................................................................................................... 1-6GDisk................................................................................................................................... 1-8License Audit Utility.............................................................................................................. 1-8Methods for creating an image................................................................................................ 1-10Three methods for creating an image .................................................................................... 1-10Understanding Ghost partitions............................................................................................... 1-12Installed boot partition ........................................................................................................ 1-12Virtual boot partition ........................................................................................................... 1-14When to use which partition ................................................................................................. 1-16Installing and uninstalling Ghost............................................................................................. 1-18Installation requirements ..................................................................................................... 1-20Choosing an installation option............................................................................................. 1-22Uninstalling Ghost .............................................................................................................. 1-24ForSymUnit 2 Installing Ghost.................................................................................................................... 2-1Overview................................................................................................................................. 2-1Installing the Ghost Console......................................................................................................2-2Requirements for the Ghost Console server computer................................................................ 2-2Installing the Ghost Console................................................................................................... 2-4Creating a Configuration Server account................................................................................... 2-10Registering Symantec Ghost....................................................................................................2-14iantecPartnerInternalStaffTrainingOnlyUnit 4 Implementing Ghost as a stand-alone .....................................................................................4-1Running Ghost.exe on the local computer...................................................................................4-2Operating system requirements...............................................................................................4-2Transfer methods on a stand-alone computer ...........................................................................4-4Disk to disk transfer (cloning disks)...........................................................................................4-6Requirements .......................................................................................................................4-8Completing a disk-to-disk transfer...........................................................................................4-8Disk-to-image file transfer.......................................................................................................4-16Requirements .....................................................................................................................4-16Transferring disk-to-image file ..............................................................................................4-16Disk-from-image file transfer...................................................................................................4-24Requirements .....................................................................................................................4-24Retrieving information from an image file ..............................................................................4-24Partition-to-partition cloning...................................................................................................4-28Understanding partition cloning............................................................................................4-28Requirements .....................................................................................................................4-30Transferring data partition-to-partition ...................................................................................4-30Partition-to-image file transfer.................................................................................................4-32Requirements .....................................................................................................................4-32Transferring partition-to-image file ........................................................................................4-32Partition-from-image file transfer.............................................................................................4-34Requirements .....................................................................................................................4-34Transferring partition-from-image file ....................................................................................4-34ForSymiiantecPartnerInternalUnit 3 Creating packages using the Ghost Boot Wizard.......................................................................3-1Overview.................................................................................................................................3-1Creating boot disks and images.................................................................................................3-2Defining the options on the Boot Package................................................................................3-4Opening the Ghost Boot Wizard ..............................................................................................3-4Creating a network boot disk ..................................................................................................3-6Creating a drive mapping boot disk .........................................................................................3-8Creating a boot disk with CD-R/RW, LPT and USB support ......................................................3-10Creating a CD-ROM boot disk ...............................................................................................3-12Creating a TCP/IP Network boot image ..................................................................................3-14Microsoft RIS Boot option ....................................................................................................3-16Lab 3-1:Creating a network boot disk.......................................................................................3-19Network Interface Card template library....................................................................................3-22Adding a NIC Template to the Ghost Boot Wizard ...................................................................3-22Using the packet driver method ............................................................................................3-24Using the NDIS2 driver method ............................................................................................3-26Modifying an existing template .............................................................................................3-28Copying a NIC template .......................................................................................................3-30Renaming a template – Name/Delete buttons.........................................................................3-32Multicard template.................................................................................................................3-34Lab 3-2:Creating a multicard template.....................................................................................3-37StaffTrainingSymantec Ghost 7.5OnlyRegistering Symantec Ghost .................................................................................................2-14Generating a registration file ................................................................................................2-16Obtaining and entering a validation key .................................................................................2-18Adding additional licenses ...................................................................................................2-18Registering the Symantec Ghost Console after reinstallation ....................................................2-20Lab 2-1:Installing the Ghost Console.......................................................................................2-23Unit 5 GhostCasting........................................................................................................................5-1Understanding GhostCasting and its components........................................................................5-2GhostCasting components ......................................................................................................5-2Function of the GhostCast Server ............................................................................................5-4Supported topologies for GhostCasting ....................................................................................5-4Functions for GhostCasting.....................................................................................................5-4Creating a model computer......................................................................................................5-6GhostCast transfer methods.......................................................................................................5-8GhostCast Server configuration options.....................................................................................5-10Controlling bandwidth use when GhostCasting...........................................................................5-14Configuring the network hardware when bandwidth is not an issue ...........................................5-16GhostCast Server....................................................................................................................5-18Installing the server .............................................................................................................5-18GhostCast Client....................................................................................................................5-20GhostCast operations..............................................................................................................5-22Requirements .....................................................................................................................5-22Dumping a ghost image file from a client computer ................................................................5-24Dumping a ghost image file on the GhostCast Client ...............................................................5-26Lab 5-1:Using GhostCast Server to dump an image from a client................................................5-29ForSymantecPartnSaving an image file to a CD-R/RW..........................................................................................4-38Creating Bootable CDs .........................................................................................................4-38Writing an image file to CD-R/RW............................................................................................4-40Requirements .....................................................................................................................4-40Writing an image file-to-CD-R/RW .........................................................................................4-40File verification......................................................................................................................4-42Source drive transfers ..........................................................................................................4-42Destination drive transfers....................................................................................................4-42Checking image files..............................................................................................................4-44Requirements .....................................................................................................................4-44Performing an image file check.............................................................................................4-44Checking disk integrity...........................................................................................................4-46Requirements .....................................................................................................................4-46Performing a disk integrity check ..........................................................................................4-46Peer connections....................................................................................................................4-48Master/Slave relationship .....................................................................................................4-50TCP peer-to-peer connection...................................................................................................4-52Requirements .....................................................................................................................4-52Establishing a TCP peer-to-peer connection ...........................................................................4-52LPT and USB peer-to-peer connections....................................................................................4-56Requirements .....................................................................................................................4-56Establishing LPT and USB peer-to-peer connections...............................................................4-56Command-line options and switches........................................................................................4-60Ghost command-line............................................................................................................4-60Disk-to-disk transfer command-line options ...........................................................................4-62Disk-to-image file command-line options ...............................................................................4-66Disk-from-image file command-line options ...........................................................................4-68Partition command-line options ............................................................................................4-70Partition command-line options ............................................................................................4-72Peer-to-peer command-line options .......................................................................................4-74Lab 4-1:Performing local partition operations............................................................................4-77Lab 4-2:Performing peer-to-peer operations..............................................................................4-79erInternalStaffTrainingOnlyiii [ Pobierz całość w formacie PDF ]

  • zanotowane.pl
  • doc.pisz.pl
  • pdf.pisz.pl
  • kfc.htw.pl