Ghost 2003 User Guide
Ghost 2003 User Guide
Copyright Notice
Copyright ©1998-2002 Symantec Corporation
All Rights Reserved.
Any technical documentation that is made available by Symantec Corporation is the
copyrighted work of Symantec Corporation and is owned by Symantec Corporation.
NO WARRANTY. The technical documentation is being delivered to you AS-IS and
Symantec Corporation makes no warranty as to its accuracy or use. Any use of the
technical documentation or the information contained therein is at the risk of the user.
Documentation may include technical or other inaccuracies or typographical errors.
Symantec reserves the right to make changes without prior notice.
No part of this publication may be copied without the express written permission of
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA 95014.
Trademarks
Symantec, the Symantec logo, Norton Ghost, Ghost Walker, Ghost Explorer, and GDisk
are trademarks of Symantec Corporation.
Microsoft, MS-DOS, Windows, and Windows NT are registered trademarks of Microsoft
Corporation. IBM and PC-DOS are registered trademarks of International Business
Machines Corporation. 3Com and EtherLink are registered trademarks of 3Com
Corporation. Compaq is a registered trademark of Compaq Corporation. SuperDisk is a
trademark of Imation Enterprises Corporation. Zip and Jaz are registered trademarks of
Iomega Corporation. FireWire is a trademark of Apple Computer, Inc., registered in the
U.S. and other countries.
Other product names mentioned in this manual may be trademarks or registered
trademarks of their respective companies and are hereby acknowledged.
Printed in the United States of America.
10 9 8 7 6 5 4 3 2 1
SYMANTEC LICENSE AND WARRANTY
IMPORTANT: PLEASE READ THE TERMS AND CONDITIONS OF D. use a later version of the Software than is provided herewith unless
THIS LICENSE AGREEMENT CAREFULLY BEFORE USING THE You have purchased upgrade insurance or have otherwise separately
SOFTWARE. SYMANTEC CORPORATION AND/OR ITS acquired the right to use such later version;
SUBSIDIARIES ("SYMANTEC") IS WILLING TO LICENSE THE E. use, if You received the software distributed on media containing
SOFTWARE TO YOU AS THE INDIVIDUAL, THE COMPANY, OR multiple Symantec products, any Symantec software on the media for
THE LEGAL ENTITY THAT WILL BE UTILIZING THE SOFTWARE which You have not received a permission in a License Module;
(REFERENCED BELOW AS "YOU OR YOUR") ONLY ON THE F. use the Software in any manner not authorized by this license; nor
CONDITION THAT YOU ACCEPT ALL OF THE TERMS OF THIS G. use the Software in any manner that contradicts any additional
LICENSE AGREEMENT. THIS IS A LEGAL AND ENFORCEABLE restrictions set forth in Section 9, below.
CONTRACT BETWEEN YOU AND SYMANTEC. BY OPENING
THIS PACKAGE, BREAKING THE SEAL, CLICKING ON THE
2. CONTENT UPDATES:
"AGREE" OR "YES" BUTTON OR OTHERWISE INDICATING
ASSENT ELECTRONICALLY, OR LOADING THE SOFTWARE, Certain Symantec software products utilize content that is updated
YOU AGREE TO THE TERMS AND CONDITIONS OF THIS from time to time (antivirus products utilize updated virus definitions;
AGREEMENT. IF YOU DO NOT AGREE TO THESE TERMS AND content filtering products utilize updated URL lists; firewall products
CONDITIONS, CLICK ON THE "I DO NOT AGREE", "NO" utilize updated firewall rules; vulnerability assessment products utilize
BUTTON, OR OTHERWISE INDICATE REFUSAL, MAKE NO updated vulnerability data, etc.; collectively, these are referred to as
FURTHER USE OF THE SOFTWARE, AND RETURN THE FULL "Content Updates"). You may obtain Content Updates for any period
PRODUCT WITH PROOF OF PURCHASE TO THE DEALER FROM for which You have purchased a subscription for Content Updates for
WHOM IT WAS ACQUIRED WITHIN SIXTY (60) DAYS OF the Software (including any subscription included with Your original
PURCHASE, AND YOUR MONEY WILL BE REFUNDED. purchase of the Software), purchased upgrade insurance for the
Software, entered into a maintenance agreement that includes Content
1. LICENSE: Updates, or otherwise separately acquired the right to obtain Content
Updates. This license does not otherwise permit You to obtain and use
The software which accompanies this license (collectively the Content Updates.
"Software") is the property of Symantec or its licensors and is protected
by copyright law. While Symantec continues to own the Software, You
3. SIXTY (60) DAY MONEY BACK GUARANTEE:
will have certain rights to use the Software after Your acceptance of this
license. This license governs any releases, revisions, or enhancements If You are the original licensee of this copy of the Software and are not
to the Software that Symantec may furnish to You. Except as may be completely satisfied with it for any reason, please contact Symantec
modified by a Symantec license certificate, license coupon, or license Customer Service, for a refund of the money You paid for the Software
key (each a "License Module") which accompanies, precedes, or (less shipping, handling, and any applicable taxes) at any time during
follows this license, Your rights and obligations with respect to the use the sixty (60) day period following the date of purchase.
of this Software are as follows:
.4. LIMITED WARRANTY:
YOU MAY: Symantec warrants that the media on which the Software is distributed
A. use one copy of the Software on a single computer. If a License will be free from defects for a period of sixty (60) days from the date of
Module accompanies, precedes, or follows this license, You may make delivery of the Software to You. Your sole remedy in the event of a
that number of copies of the Software licensed to You by Symantec as breach of this warranty will be that Symantec will, at its option, replace
provided in Your License Module. Your License Module shall any defective media returned to Symantec within the warranty period
constitute proof of Your right to make such copies. or refund the money You paid for the Software. Symantec does not
B. make one copy of the Software for archival purposes, or copy the warrant that the Software will meet Your requirements or that
Software onto the hard disk of Your computer and retain the original operation of the Software will be uninterrupted or that the Software
for archival purposes; will be error-free.
C. use the Software on a network, provided that You have a licensed THE ABOVE WARRANTY IS EXCLUSIVE AND IN LIEU OF ALL
copy of the Software for each computer that can access the Software OTHER WARRANTIES, WHETHER EXPRESS OR IMPLIED,
over that network; INCLUDING THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE
D. after written notice to Symantec, transfer the Software on a
AND NONINFRINGEMENT OF INTELLECTUAL PROPERTY
permanent basis to another person or entity, provided that You retain
RIGHTS. THIS WARRANTY GIVES YOU SPECIFIC LEGAL
no copies of the Software and the transferee agrees to the terms of this
RIGHTS. YOU MAY HAVE OTHER RIGHTS, WHICH VARY FROM
license; and
STATE TO STATE AND COUNTRY TO COUNTRY.
E. use the Software in accordance with any additional permitted uses
set forth in Section 9, below.
5. DISCLAIMER OF DAMAGES:
YOU MAY NOT: SOME STATES AND COUNTRIES, INCLUDING MEMBER
COUNTRIES OF THE EUROPEAN ECONOMIC AREA, DO NOT
A. copy the printed documentation which accompanies the Software; ALLOW THE LIMITATION OR EXCLUSION OF LIABILITY FOR
B. sublicense, rent or lease any portion of the Software; reverse INCIDENTAL OR CONSEQUENTIAL DAMAGES SO THE BELOW
engineer, decompile, disassemble, modify, translate, make any attempt LIMITATION OR EXCLUSION MAY NOT APPLY TO YOU.
to discover the source code of the Software, or create derivative works TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW
from the Software; AND REGARDLESS OF WHETHER ANY REMEDY SET FORTH
C. use a previous version or copy of the Software after You have HEREIN FAILS OF ITS ESSENTIAL PURPOSE, IN NO EVENT WILL
received a disk replacement set or an upgraded version. Upon SYMANTEC OR ITS LICENSORS BE LIABLE TO YOU FOR ANY
upgrading the Software, all copies of the prior version must be SPECIAL, CONSEQUENTIAL, INDIRECT OR SIMILAR DAMAGES,
destroyed; INCLUDING ANY LOST PROFITS OR LOST DATA ARISING OUT
OF THE USE OR INABILITY TO USE THE SOFTWARE EVEN IF media, or network drive. If a License Module accompanies, precedes,
SYMANTEC HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH or follows this license, you may make and use that number of copies of
DAMAGES. the Software licensed to you by Symantec as provided in your License
IN NO CASE SHALL SYMANTEC'S OR ITS LICENSORS' LIABILITY Module on an equal number of individual computers pursuant to the
EXCEED THE PURCHASE PRICE FOR THE SOFTWARE. The terms of this license. Your License Module shall constitute proof of
disclaimers and limitations set forth above will apply regardless of your right to make and use such copies;
whether You accept the Software. (ii) use the Software on that same computer to create an image file of a
hard drive on that computer and store the image file on removable
6. U.S. GOVERNMENT RESTRICTED RIGHTS: media for disaster recovery purposes;
RESTRICTED RIGHTS LEGEND. All Symantec products and (iii) use the Software to create a boot disk as described in the
documentation are commercial in nature. The software and software documentation for reapplying the hard drive image that was created
documentation are "Commercial Items", as that term is defined in 48 for disaster recovery purposes to the hard drive on that same
C.F.R. section 2.101, consisting of "Commercial Computer Software" computer; and
and "Commercial Computer Software Documentation", as such terms (iv) use the Software to clone a hard drive from that same computer to
are defined in 48 C.F.R. section 252.227-7014(a)(5) and 48 C.F.R. a replacement computer, in the manner described in the software
section 252.227-7014(a)(1), and used in 48 C.F.R. section 12.212 and documentation, and to use the Software on the replacement computer
48 C.F.R. section 227.7202, as applicable. Consistent with 48 C.F.R. provided that the Software has been removed from the original
section 12.212, 48 C.F.R. section 252.227-7015, 48 C.F.R. section computer.
227.7202 through 227.7202-4, 48 C.F.R. section 52.227-14, and other You may not use the Software commercially or non-commercially for
relevant sections of the Code of Federal Regulations, as applicable, the purpose of creating multiple computers or hard drives not
Symantec's computer software and computer software documentation connected to the original computer, with similar or identical
are licensed to United States Government end users with only those configurations to that of the original computer or hard drive.
rights as granted to all other end users, according to the terms and
conditions contained in this license agreement. Manufacturer is
Symantec Corporation, 20330 Stevens Creek Blvd., Cupertino, CA
95014.
7. EXPORT REGULATION:
Export, re-export of this Software is governed by the laws and
regulations of the United States and import laws and regulations of
certain other countries. Export or re-export of Software to any entity
on the Denied Parties List and other lists promulgated by various
agencies of the United States Federal Government is strictly prohibited.
8. GENERAL:
If You are located in North America or Latin America, this Agreement
will be governed by the laws of the State of California, United States of
America. Otherwise, this Agreement will be governed by the laws of
England. This Agreement and any related License Module is the entire
agreement between You and Symantec relating to the Software and: (i)
supersedes all prior or contemporaneous oral or written
communications, proposals and representations with respect to its
subject matter; and (ii) prevails over any conflicting or additional
terms of any quote, order, acknowledgment or similar
communications between the parties. This Agreement may only be
modified by a License Module or by a written document which has
been signed by both You and Symantec. This Agreement shall
terminate upon Your breach of any term contained herein and You
shall cease use of and destroy all copies of the Software. The
disclaimers of warranties and damages and limitations on liability shall
survive termination. Should You have any questions concerning this
Agreement, or if You desire to contact Symantec for any reason, please
write: (i) Symantec Customer Service, 555 International Way,
Springfield, OR 97477, USA, or (ii) Symantec Customer Service
Center, PO BOX 5689, Dublin 15, Ireland.
Appendix F Troubleshooting
Ghost.exe error messages ..............................................................................192
Problems running Norton Ghost .................................................................193
Card not found/Card not installed .......................................................193
Creating an image on an NTFS partition .............................................193
Cannot start from drive A .....................................................................193
Windows NT blue screen ......................................................................194
Missing hibernation file .........................................................................194
Computer fails to restart .......................................................................194
Getting out of the Virtual Partition ......................................................195
Cancelling a Ghost.exe operation .........................................................195
Installing and uninstalling Norton Ghost ............................................195
Connecting using USB peer-to-peer .....................................................196
Contents 11
Appendix G Diagnostics
Hard drive detection and diagnostic information ...................................... 202
View Log ................................................................................................ 202
Abort error file (Ghosterr.txt) .............................................................. 202
Creating a full diagnostic statistics dump summary ........................... 202
Testing TCP/IP functionality ....................................................................... 203
Virtual Partition
The Virtual Partition is a partition that is created when you perform a backup,
restore, clone, or other operation from Windows. All the files required for the
backup, restore, or clone are automatically installed into the Virtual Partition and
the task performed. Most of the Virtual Partition operation is not apparent to
you. However, there may be some occasions when you must know what the
Virtual Partition is and what it does, such as if you want to run Ghost.exe or
another application from the Virtual Partition.
One primary partition slot must be available in the MBR for the Virtual Partition.
16 About Norton Ghost
How Norton Ghost works
Hardware restrictions
Norton Ghost is designed to restore to and clone identical hardware. When
Microsoft Windows is installed, drivers necessary to support your hardware are
installed to the hard disk and recorded in the Windows Registry. If you move an
installation of Windows to another computer, either by directly moving the hard
disk or copying it using a Ghost operation, there is no guarantee that it will boot
or function correctly. Although Microsoft provides tools, such as Sysprep, that
may alleviate these problems to volume license holders, these tools are usually
unavailable to consumer or small business users.
A computer with Windows installed should be copied to a computer with
identical hardware. Moving or cloning file systems that do not contain an
operating system does not usually present a problem.
Note: If you saved your image file directly to CD or DVD, then you do not need a
recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to
CD or DVD.
About Norton Ghost 17
Norton Ghost components
Warning: Create and test a recovery boot disk before you need it. If your
computer crashes and you do not have a recovery boot disk, then you will have to
find another computer on which to create a boot disk.
Backup Wizard
The Backup Wizard lets you select a hard disk or partition to back up to an image
file.
Restore Wizard
The Restore Wizard lets you restore a hard disk or partition from an image file.
About Norton Ghost 19
Norton Ghost components
Clone Wizard
The Clone Wizard lets you clone a hard disk or partition directly from another
hard disk or partition.
Peer-to-Peer Wizard
The Peer-to-Peer Wizard starts Ghost.exe in the Virtual Partition with the peer-
to-peer drivers loaded.
20 About Norton Ghost
Norton Ghost components
Integrity Check
The image integrity check runs an integrity check on backup image files.
About Norton Ghost 21
Norton Ghost components
View Log
View Log lets you view logs created during Norton Ghost operations.
Ghost Explorer
Ghost Explorer is a Windows application that lets you view directories and files in
an image file. You can also add, recover, and delete individual directories and files
from a FAT16/32 file system image file.
About Norton Ghost 23
Norton Ghost components
Note: You can restore individual files from NTFS images, but you cannot update
NTFS images.
GDisk
GDisk is a complete replacement for the Microsoft FDISK and FORMAT utilities
that allows the following:
■ FAT file system formatting
■ Batch mode operation
■ Hiding and unhiding of partitions
■ Secure disk wiping to US Department of Defense standards
■ Extensive partition reporting
■ Boot.ini manipulation (GDisk32 only)
Two versions of GDisk are supplied:
■ GDisk: Runs in DOS
■ GDisk32: Runs from the command prompt in a Windows operating system
24 About Norton Ghost
Norton Ghost components
Ghost Walker
Ghost Walker assigns a statistically unique security identifier (SID) and a unique
computer name to cloned Microsoft Windows NT/2000/XP workstations. The
SID is an important part of the Windows NT/2000/XP security architecture as it
provides a unique identifier when these computers are networked. If you are
cloning more than one computer using the multiuser pack, you can use Ghost
Walker to set up each computer on a network with a unique identification, which
is mandatory on a Microsoft network.
Chapter 2
Installing Norton Ghost
This chapter includes the following topics:
Ghost.exe
Ghost.exe must be installed on a computer with the Norton Ghost minimum
requirements. However, you can run Ghost.exe on a computer with the following
minimum requirements:
■ IBM PC computer or 100% compatible
■ 486 processor
■ 16 MB RAM
■ VGA monitor
■ Microsoft-compatible mouse recommended
Registration option in the Help menu in the Norton Ghost window. On the Web
site, go to the Products page for the registration link.
Note: Sometimes the drive letter in Norton Ghost in DOS does not match the
drive letter in Windows.
For example:
You back up to a file, F:\test.gho. When you execute a backup task, the backup
appears in Ghost.exe as E:\test.gho.
From the tray icon you can initiate any of the following tasks:
■ Launch Norton Ghost
■ Run the Restore Wizard
■ Run the Backup Wizard
■ View the task log
7 If this is the first time that you have used Norton Ghost on this computer, in
the Add Ghost Disk Identification dialog box, identify the disk.
See “Identifying a hard disk” on page 43.
If you have previously used Norton Ghost on this computer, then this dialog
box does not appear.
8 If you want to set advanced settings for the backup, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
9 Click Next.
10 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
11 In the Disaster Recovery dialog box, click Continue.
This dialog box warns you to ensure that you can run Ghost.exe and access
your image file once it has been created. You may need to create a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
12 Select one of the following:
■ Run Now: Creates the backup image file.
Your computer is restarted and the backup image file is created.
■ Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
4 Click Next.
5 The Overwrite partition warning dialog box appears if you are overwriting
any of the following:
■ The current Windows partition
■ The Ghost installation
Click Next to continue.
6 If this is the first time that you have used Norton Ghost on this computer, in
the Add Ghost Disk Identification dialog box, identify the disk.
See “Identifying a hard disk” on page 43.
If you have previously used Norton Ghost on this computer, then this dialog
box does not appear.
7 If you want to set advanced settings for the clone, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
8 Click Next.
40 Backing up, restoring, and cloning from Norton Ghost
Launching Ghost.exe peer-to-peer
9 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
10 Click Run Now to start the clone operation.
Ensure that all applications on your computer are closed before you run the
clone operation.
Your computer is restarted and the destination hard disk or partition is
cloned from the source hard disk or partition.
To identify a disk
◆ In the Add Ghost Disk Identification dialog box, click OK to identify all hard
disks.
44 Backing up, restoring, and cloning from Norton Ghost
Identifying a hard disk
Chapter 4
Setting options and
defaults
This chapter includes the following topics:
■ Starting Ghost.exe
Norton Ghost
default options
Some options can only be set as you create the task in the wizard.
The options and defaults include the following:
■ Adding command-line switches to a task
■ Assigning a drive letter to a CD/DVD drive
■ Setting the options for a mapped network drive
■ Setting display options
■ Setting the DOS version
■ Setting the image integrity check default
■ Setting a compression level
■ Assigning a password to an image file
■ Adding free space to the Virtual Partition
■ Installing SCSI drivers
■ Setting external storage device drivers
■ Setting TCP/IP drivers
■ Setting LPT peer-to-peer drivers
■ Installing extra drivers
■ Installing USB peer-to-peer drivers
Setting options and defaults 47
Setting Norton Ghost options and defaults
Warning: The syntax of your command line is not checked when the task
runs. Therefore, review these instructions carefully to avoid errors. The
consequences of an error could be serious.
5 Check Show information screen about the DOS version of Ghost to display
the warning that Norton Ghost restarts into DOS while running a task.
6 Click OK.
To install MS-DOS
1 Insert the MS-DOS formatted floppy disk into drive A of the computer on
which Norton Ghost is running.
2 In the DOS Type window, click Get MS-DOS Files.
3 Click OK.
To uninstall MS-DOS
1 In the DOS Type window, click Remove MS-DOS Files.
2 Click OK.
To assign a password
1 Do one of the following:
■ To set the default to create an image password, in the Ghost Basic
window, click Options.
■ To set the option to create an image password while running a Windows
wizard task, in the Advanced Settings window, click Advanced Settings.
2 On the Image password tab, check Prompt for an image password to set the
option to prompt for a password when the image file is created.
Note: Do not use this option if you want to connect to another computer using
peer-to-peer.
See “Installing USB peer-to-peer drivers” on page 57.
Before you create the Virtual Partition, you must create a folder that contains the
files that you want included in the Virtual Partition.
Starting Ghost.exe
You can start Ghost.exe from Windows. This option restarts your computer in
DOS and opens Ghost.exe, which lets you run Norton Ghost interactively.
60 Setting options and defaults
What to do if a task fails
To start Ghost.exe
1 In the Ghost Basic window, click Ghost Advanced, and then click Run Ghost
Interactively.
2 Click Next.
3 If you want to set advanced settings for the backup, then click Advanced
Settings.
See “Setting Norton Ghost options and defaults” on page 46.
4 Click Next.
5 In the Important Information dialog box, if you do not want to view this
warning again, click Don’t show this screen again, and then click Next.
6 In the Disaster Recovery window, select one of the following:
■ Launch Tutorials: Opens the tutorial index.
From the tutorials, you can select a tutorial that demonstrates how to
create a recovery boot disk.
■ Continue: Returns to the Run Ghost Interactively Wizard.
This dialog box warns you to ensure that you can run Ghost.exe and access
your image file once it has been created. You may need to create a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
7 Select one of the following:
■ Run Now: Restarts your computer into DOS and launches Ghost.exe.
■ Disaster Recovery: Starts the Ghost Boot Wizard and creates a recovery
boot disk.
See “Creating a recovery boot disk” on page 73.
You can use the -cns switch for an alternative naming standard. For example:
■ First file: Image.gho
■ Second file: Image.001
■ Third file: Image.002
You can continue on the same form of media. For example, if you originally
spanned onto a JAZ disk and want to restore a 3.0 GB drive from JAZ disks, you
can replace the disk and continue from JAZ disks. Alternatively, you can restore
from different media types.
Norton Ghost automatically restores spanned images without prompting if it can
find the next span.
See “Adding switches to your Ghost operation” on page 108.
For Ghost.exe to access SCSI tape drives, a DOS ASPI driver must be installed
prior to use.
See “Standard boot disks” on page 76.
Image file options 67
GoBack and Norton Ghost
Ghost.exe in its default mode performs well with most SCSI tape devices. In some
situations with older SCSI tape devices and possibly with unreliable tapes,
Ghost.exe may need to be configured to slow down or alter the way it uses the
tape device.
See “Command-line switches” on page 153.
If you restore an -ia disk image of a dynamic disk onto a SCSI hard drive and you
see a Destination drive too small message, you must load the ASPI driver for the
SCSI card. Without an ASPI driver, Norton Ghost does not always detect the
correct size of the SCSI drive and cannot determine whether the drive is large
enough to hold the image.
Note: You should not take an image all of a dynamic disk because the method is
slow and the image file would be very large.
■ Spart.par
■ Swapper.dat
■ Toshiber.dat
■ Virtpart.dat
■ Win386.swp
Chapter 6
Creating boot disks with
the Ghost Boot Wizard
This chapter includes the following topics:
■ Selecting a template
■ Providing MS-DOS
72 Creating boot disks with the Ghost Boot Wizard
Introducing the Norton Ghost Boot Wizard
Note: If you saved your image file directly to CD or DVD, then you do not need a
recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to
CD or DVD.
To use Ghost.exe you must have a Ghost boot disk. The following tasks require a
boot disk:
■ Restoring your computer with Ghost.exe after software or hardware failure
■ Cloning a computer that does not have Windows installed
Note: If you saved your image file directly to CD or DVD, then you do not need a
recovery boot disk. Norton Ghost includes Ghost.exe if you save the image file to
CD or DVD.
74 Creating boot disks with the Ghost Boot Wizard
Opening the Ghost Boot Wizard
See Table 6-1 to determine which type of boot disk you should create as a disaster
recovery disk.
Once you have created a recovery boot disk, ensure that your computer starts
with the boot disk or the CD/DVD.
Local use of Norton Ghost: You can use either of the following options:
■ Disk-to-disk clone ■ Standard Ghost Boot Disk
■ Partition-to-partition clone See “Standard boot disks” on page 76.
■ Disk or partition backup to local ■ Peer-to-Peer Network Boot Disk
disk or partition See “Boot disks with network support”
■ Disk or partition backup to local on page 79.
JAZ or ZIP drive
■ Disk or partition restore from local
disk or partition
■ Disk or partition restore from local
JAZ or ZIP drive
■ Clone, back up, or restore over peer- Standard Ghost Boot Disk
to-peer connection between two
See “Standard boot disks” on page 76.
computers using LPT or USB cable.
■ Clone, back up, or restore over TCP/ Peer-to-Peer Network Boot Disk
IP peer-to-peer connection with
See “Boot disks with network support” on
network support between two
page 79.
computers
■ Access files other than a Ghost image CD/DVD Startup Disk with Ghost
file on a CD-ROM.
See “Boot disks with CD-ROM and DVD
support” on page 81.
To create a boot disk to run Ghost.exe, or with support for LPT, USB, or
FireWire cables
1 In the Ghost Boot Wizard window, click Standard Ghost Boot Disk.
2 Click Next.
3 Do one or more of the following:
■ Check USB support to add support for USB peer-to-peer to the boot
disk.
■ Click Advanced to set the USB peer-to-peer drivers.
See “Setting the USB peer-to-peer drivers” on page 79.
■ Check LPT support to add support for LPT peer-to-peer to the boot
disk.
■ Click Advanced to change the LPT mode or port.
■ Click No USB support to exclude support for USB external devices.
■ Click USB 1.1 support to add support for USB 1.1 external devices to the
boot disk.
If any of your USB cards/chipsets are USB 1.1, then you must select this
option.
■ Click USB 2.0 support to add support for USB 2.0 external devices to the
boot disk.
If any of your USB cards/chipsets are USB 1.1, then do not select this
option. Select the USB 1.1 support option.
■ Click Firewire Support to add support for FireWire external devices to
the boot disk.
78 Creating boot disks with the Ghost Boot Wizard
Creating boot disks and boot images
■ Click Assign DOS drive letters to assign a DOS drive letter to a USB or
FireWire external device.
■ Click Include Adaptec ASPI drivers to add Adaptec ASPI drivers to the
boot disk.
These drivers are required to write an image directly to a SCSI CD-R
that is supported by Norton Ghost.
4 Click Next.
5 Select one of the following:
■ Use PC-DOS: Includes PC-DOS on the boot disk.
■ Use MS-DOS: Includes MS-DOS on the boot disk.
See “Providing MS-DOS” on page 89.
6 Click Next.
7 In the Ghost.exe field, type the correct path if the executable has been moved
or you want to use a different version of Norton Ghost.
The default path to the Norton Ghost executable appears in the Ghost.exe
field.
8 In the Parameters field, type any required command-line parameters.
See “Adding command-line parameters to a boot package” on page 88.
9 Click Next.
10 In the Floppy Disk Drive field, select the appropriate drive letter.
11 In the Number of disks to create field, select the number of disks that you
want to create.
12 Ensure that Format disk(s) first is checked to format the disks before disk
creation.
Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not
bootable.
13 Ensure that Quick Format is checked to perform a quick format.
14 Click Next.
15 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
Creating boot disks with the Ghost Boot Wizard 79
Creating boot disks and boot images
10 In the Domain field, type the domain to which the user belongs.
11 In the Drive Letter field, select a drive letter to access a network share through
a mapped drive.
Select a drive letter greater than any existing drive letter.
12 If you want to prevent the boot package from mapping a drive when the
computer starts, click None.
In this case, map a drive from the DOS prompt after the computer has
started.
13 In the Maps To field, type the complete UNC path to the network share.
For example, to access a shared folder named Ghost on a computer named
Boss, the UNC path is \\Boss\Ghost.
14 Click Next.
15 Do one of the following:
■ Click DHCP will assign the IP settings if your network contains a
DHCP server.
■ Click The IP settings will be statically defined and complete the fields
below this option if your network does not contain a DHCP server. Your
network administrator can provide the values for these fields.
16 Click Next.
17 In the Floppy Disk Drive field, select the appropriate drive letter.
18 In the Number of disks to create field, select the number of disks that you
want to create.
19 Ensure that Format disk(s) first is checked to format the disks before disk
creation.
Ensure that this option is checked unless you are creating a custom boot disk
with custom system files. If this option is unchecked, the boot disk is not
bootable.
20 Ensure that Quick Format is checked to perform a quick format.
21 Click Next.
22 Review the boot disk details and click Next to start creating the boot disks.
Follow the prompts to format the disks and create a boot disk set.
84 Creating boot disks with the Ghost Boot Wizard
Selecting a template
Selecting a template
For the boot disk to work correctly, it is important that you select the correct
template. When you create a boot disk for client computers, the template that
you select must be suitable for the network cards installed in the computers that
are to start from the package.
To determine which network interface card is installed in a computer, find the
name of the driver from Network Properties within Windows. This must be done
on the client computer for which you are preparing the boot disk.
For example, Windows may list the card as 3Com Fast EtherLink XL 10/100Mb
TX Ethernet NIC (3C905B-TX). In this case the text in paraenthesis is the actual
model number of the card, which indicates that the Ghost Boot Wizard template
named 3COM 3C90X (which works for all 3C90- cards) is the correct template.
In some cases you may have a choice between an NDIS2 driver and a packet
driver version of the same template. Both templates should work, but you may
find that one gives better performance. Experiment to see which one works
better.
It is possible that there is no existing template in the Ghost Boot Wizard that is
suitable for the network interface card installed in your computer. In this case,
obtain the DOS drivers for the network interface card either from the disk
supplied with the card or from the manufacturer's Web site, and add a new
template to the Ghost Boot Wizard.
See “Adding network drivers to the Ghost Boot Wizard” on page 86.
If you have different network interface cards installed in client computers, then
you may be able to use the multicard template to create a single boot package that
works on each of your computers without modification.
To modify a template
1 In the Template Properties window, on the Advanced tab, click New.
2 Click Delete to delete the selected file from the list.
3 In the Autoexec.bat field, type any additional Autoexec.bat entries for the
driver.
The entries appear before any network-related commands, such as
Netbind.com or the packet driver executable.
4 In the Config.sys field, type any additional Config.sys entries for the driver.
The entries appear before any driver-related devices to ensure that the
enabling drivers load before the main network device drivers specified on the
network driver page.
In the following example, the parameters instruct Norton Ghost to back up your
main disk to an image on another drive.
-clone,mode=create,src=1,dst=d:\backups\maindrv.gho
Table 6-2 Command parameters
Providing MS-DOS
The Ghost Boot Wizard includes PC-DOS on boot disks. However, a boot disk
that includes PC-DOS might not start all computers. When you create a boot
disk, you can include MS-DOS instead of PC-DOS.
If you use MS-DOS, then you must provide MS-DOS files on the computer on
which you are creating the boot disk. Using an MS-DOS system disk that was
formatted on a Windows 95/98 computer, you can install the MS-DOS files
during the creation of the boot disk.
4 Click Format.
5 Check Copy System Files.
6 Click Start to format the disk.
You can install or uninstall MS-DOS while you are creating a boot disk.
90 Creating boot disks with the Ghost Boot Wizard
Providing MS-DOS
Note: On the Ghost.exe main menu, the option of GhostCast is not supported.
The GhostCast functionality is available only with Symantec Ghost Enterprise
Edition. If you require GhostCast functionality, see “Service and support
solutions” on page 209.
Backing up, restoring, and cloning from DOS 93
Starting the Norton Ghost executable
Select which computer is the master (the computer from which you control the
connection), and which is the slave (the other computer participating in the
connection). All operator input must occur on the master computer.
96 Backing up, restoring, and cloning from DOS
Establishing a peer-to-peer connection with Ghost.exe
You must have two Ghost boot disks with which to start your computers. Create
the boot disks using the Ghost Boot Wizard.
Note: Ensure that both boot disks are created with the same version of Norton
Ghost. You cannot use one boot disk created in Norton Ghost 2002 and one boot
disk created in Norton Ghost 2003 in the same task.
Note: If the image file reaches the size of 2 GB and there is not enough space to
continue, you are prompted to insert the next media to continue.
Verify the integrity of the image file when it has been created.
See “Verifying image integrity” on page 107.
6 In the Image file description dialog box, type a description of the image file.
You can modify this description in Ghost Explorer when the image file has
been created.
7 Click Save.
8 In the Compress Image? dialog box, do one of the following:
■ Click No for no compression (high speed).
■ Click Fast for low compression (medium speed).
■ Click High for high compression (slower speed).
See “Image files and compression” on page 62.
9 In the Proceed with partition image creation? dialog box, ensure that the
correct options are selected.
10 Do one of the following:
■ Click Yes to proceed with the image file creation.
The system performs a quick integrity check of the file structure on the
source partitions and then copies the source partitions to the destination
image file. If you need to abort the process, press Ctrl+C, but be aware
that this leaves the destination image file in an unknown state.
■ Click No to return to the menu.
11 If spanning is enabled and required, click Yes and type the location of the
next span of the image file.
See “Image files and volume spanning” on page 63.
Note: If the image file reaches the size of 2 GB and there is not enough space to
continue, you are prompted to insert the next media to continue.
Verify the integrity of the image file when it has been created.
See “Verifying image integrity” on page 107.
Backing up, restoring, and cloning from DOS 101
Restoring from an image file
Warning: Only click Yes if you are sure that you want to proceed. The
destination disk is completely overwritten with no chance of recovering any
data.
Warning: Only click Yes if you are sure that you want to proceed. The
destination partition is completely overwritten with no chance of recovering
any data.
5 Click OK.
6 When the “Proceed with disk clone?” question appears, check the details and
ensure that the correct options are selected.
106 Backing up, restoring, and cloning from DOS
Cloning disks and partitions
Warning: Only click Yes if you are sure that you want to proceed. The
destination disk is overwritten with no chance of recovering any data.
Warning: You should remove one of the hard disks before you restart your
computer. If you leave two hard disks in the computer, damage can occur to
both of the bootable operating systems.
Run Symantec Disk Doctor, ScanDisk, or a similar utility to verify the integrity of
the destination disk.
Warning: Only click Yes if you are sure that you want to proceed. The
destination partition is completely overwritten with no chance of recovering
any data.
For Norton Ghost to access SCSI CD/DVD writers, a DOS ASPI driver must be
installed prior to use. The Backup and Clone Wizards attempt to detect and
install the driver automatically, but you may have to select the drivers in the
Advanced Settings. When creating a Ghost boot disk from the Ghost Boot
Wizard, you must include the Adaptec ASPI drivers.
See “Standard boot disks” on page 76.
Norton Ghost should work with most SCSI and IDE writers produced in 2000 or
later. It may or may not work with older models. Use the latest firmware available
for your CD/DVD writer. An IDE CD/DVD writer performs best if it is mounted
on the secondary IDE controller.
A list of CD/DVD writers with which Norton Ghost has been tested is available
on the Symantec Service and Support Web site:
http://service1.symantec.com/SUPPORT/ghost.nsf/docid/2002030414141625
Backing up and restoring with CD-R/RW and DVD-R/RW 113
Saving an image file directly to a CD-R/RW or DVD-R/RW drive
If your CD/DVD device is not listed on the Web site, use the Integrity Check
Wizard to ensure that your image can be restored. The Integrity Check Wizard
performs a dummy restore and confirms that your CD/DVD drive is compatible
with Norton Ghost.
Table 8-1 lists the media that you should use with CD and DVD writers and the
action that Norton Ghost takes.
Table 8-1 CD and DVD media
CD-R Blank
DVD-R Blank
DVD+R Blank
When you create an image on CD/DVD, you can make the CD/DVD bootable.
The Backup Wizard does this automatically, but when you create an image from
Ghost.exe, then you need an appropriate boot disk created with the Ghost Boot
Wizard to make the CD/DVD bootable.
See “Standard boot disks” on page 76.
If Norton Ghost does not support your CD-R/RW drive and the image file is too
large to fit on one CD, you can still save the image file to CD.
See “Saving an image file to an unsupported CD-R/RW or DVD-R/RW drive” on
page 114.
Note: Some CD/DVD writers let you write directly to the CD-RW/DVD as if to a
drive letter. This is not supported by Norton Ghost.
See “Using third-party software to write to the CD-R/RW disc” on page 200.
Backing up and restoring with CD-R/RW and DVD-R/RW 115
Saving an image file to an unsupported CD-R/RW or DVD-R/RW drive
■ Launching a file
■ Compiling a file
Note: If an image file has been created from an NTFS partition, you can view and
extract files from the image file. You cannot add files to or delete files from the
image file.
Ghost Explorer lets you quickly and easily extract files or directories from an
image file. Using Ghost Explorer, you can do the following:
■ View image file contents and save a list of files within an image file.
■ Extract files or directories from an image file.
■ Add, move, copy, delete, and launch files from and within an image file.
■ Use drag-and-drop or cut-and-paste functionality to add files and directories
from Windows Explorer to the image file.
■ Set span sizes.
■ Add a description to an image file.
Launching a file
This command is available only when you select a file in the right pane.
Ghost Explorer restores a file to a temporary directory and attempts to open it. If
the file is an executable program, it is run. If it is a data file and there is an
120 Using Ghost Explorer to modify image file contents
Extracting a file or directory from an image file
application installed and associated with this file type, the application opens with
the data file.
If you try to launch an application that depends on other files within the image
file, it will probably fail. Ghost Explorer does not determine what dependencies
exist. Extract the required files and then run the application file.
To launch a file
1 In Ghost Explorer, in the right pane, select a file.
2 On the File menu, click Launch.
Note: You can also drag and drop a file from Ghost Explorer to Windows
Explorer to extract it.
Note: If the CD-R/RW drive is supported by Norton Ghost, then you can save an
image file directly to CD as it is created.
See “Creating a backup image file” on page 36.
Compiling a file
If you add or delete files from within an image file, the image file becomes
fragmented. Norton Ghost takes longer to restore a fragmented image than a
compiled file. Compiling a file defragments it, which improves performance
during the restore.
Using Ghost Explorer to modify image file contents 123
Determining Norton Ghost image file version
To compile a file
1 On the File menu, click Compile if compilation is recommended.
2 Type a new name for the compiled file.
3 Click Save.
If Ghost Explorer reports a corruption in your image file, you may be able to get
further details of the nature of the corruption. Normally, you would only use
these options when asked to do so by Ghost Explorer Technical Support.
Table 9-1 lists the arguments with which you can start the program.
Table 9-1 Ghost Explorer arguments
The reports are presented to you as dialog boxes. You can use all switches or use
-d7 to turn on all options.
Ghost Explorer has a batch mode in which it carries out a single command and
then exits. In this version, batch mode supports the saving of the contents to a
text file only. To use this mode, specify one of the switches in Table 9-2.
Table 9-2 Batch mode switches
-t Saves the list of directories in the dump file to a file with the same
name as the image file but with an extension of .txt
■ Introducing GDisk
■ Running GDisk
■ Creating a partition
Introducing GDisk
GDisk lets you create partitions, reinitialize Master Boot Records, delete data, and
wipe your disks in many different ways.
Two versions of GDisk are supplied with Norton Ghost:
■ GDisk: Runs in DOS
■ GDisk32: Runs from the command line in a Windows operating system
Not all GDisk command-line switches can be run with GDisk32.
GDisk is a complete replacement for the Fdisk and Format utilities that offers the
following features:
■ On-the-fly formatting
■ Extensive partition reporting
■ High-security disk wiping
■ The ability to hide a partition or make a hidden partition visible
Unlike Fdisk, which uses interactive menus and prompts, GDisk is command-
line driven. This offers quicker configuration of a disk's partitions and the ability
to define GDisk operations in a batch file.
Running GDisk
Run either GDisk in DOS or GDisk32 in Windows.
To run GDisk
1 Start your computer in DOS mode.
2 At the DOS prompt, type GDisk followed by the required disk and switches.
To run GDisk32
1 On the Windows taskbar, open a DOS window.
2 At the DOS prompt, type GDisk32 followed by the required disk and
switches.
Managing partitions using GDisk 129
Overview of main command-line switches
Status (default) /status Lists information on the specified fixed disk and its
partitions.
Reinitialize MBR /mbr Reinitializes the Master Boot Record. This switch
functions with GDisk only.
Disk wipe /diskwipe Wipes the contents of the whole disk. This switch
functions with GDisk only.
Note: An additional switch not shown in Help is the /VERSION switch. This
switch shows the version information for the GDisk executable.
More detailed Help is available by qualifying the Help command with the switch
for one of the nine main modes of operation.
For example, to view the detailed Help file for Hide, type one of the following
command lines:
■ GDisk: gdisk /hide /?
■ GDisk32: gdisk32 /hide /?
Switch Explanation
/x Prevents GDisk from using extended disk access support. This may result in
GDisk not being aware of the full capacity of the disk.
/i Prevents GDisk from using direct IDE disk access support. This may result
in GDisk not being aware of the full capacity of the disk.
/s Prevents GDisk from using direct SCSI disk access support. This may result
in GDisk not being aware of the full capacity of the disk.
Creating a partition
The create switch creates a partition of the specified type using the largest block of
unused disk space. The partition is not formatted during the operation unless the
/for switch is used. You cannot create an NTFS partition or a dynamic disk
partition.
This switch functions with GDisk only.
Note: When GDisk creates a FAT32 partition, it aligns the first data sector to a 4
KB boundary from the start of the partition.
Switch Explanation
/sz:pcent{p|%} Specifies the size of the partition as a percentage of the total disk
size, not the available disk space.
/end Creates the partition at the end of the free space. If this switch is not
used, then the partition is created at the beginning of the free space.
If the command line specifies that all of the available space is to be
used to create the partition, then the /end switch is ignored.
132 Managing partitions using GDisk
Reinitializing the Master Boot Record
Switch Explanation
/for Formats the new partition once it has been created. Unless the
/ntfat16 or /-32 switches are used, the partition type is determined
by the following:
■ If the partition is less than 16MB: FAT12
■ If the partition is between 16MB and 512MB: FAT16
■ If the partition is greater than 512MB: FAT32
/v[:label] Gives the new formatted partition the specified label when used in
combination with the /for switch.
Note: The switch must be used when you delete Linux partitions if LILO resides
in the MBR.
Managing partitions using GDisk 133
Showing information about disks
Switch Explanation
Switch Explanation
/raw Shows the contents of the partition table in CHS form if used with the
disk switch.
/lba Shows the contents of the partition table in logical block form if used
with the disk switch.
Note: To use the Windows version of GDisk in the example commands, replace
gdisk with gdisk32.
For example:
C:\> gdisk /batch:cmds.txt
If the batch mode switch is supplied without a file name, GDisk prompts for the
commands to execute.
Command-line arguments that apply to all of the batch commands can be
specified on the original command line along with the batch mode switch. The
lines found in the batch file (or typed at the prompt) are appended to the already
partially formed command line.
Following is a sample batch command file called Two-new.txt. Blank lines and
lines starting with the number (hash) symbol are considered comments. These
lines are ignored. (In this example, the commands do not specify the fixed disk on
which to operate.)
# delete all partitions
/del /all
# create formatted FAT16 primary DOS partition and then create an extended
# partition
/cre /pri /-32 /for /q
/cre /ext
# create formatted FAT16 logical DOS partition
/cre /log /-32 /for /q
The following command deletes all partitions and creates two new ones on the
second fixed disk with confirmation prompting turned off:
gdisk 2 /y /batch:two-new.txt
Managing partitions using GDisk 135
FAT16 partitions in Windows NT
Note: DOS and Windows 9x do not support FAT16 partitions using 64 K clusters
and are limited to 2 GB FAT16 partitions.
Switch Explanation
/ext[:nth] Deletes the nth extended DOS partition. The default is 1. Also deletes
any logical partitions in the extended partition.
/log:nth Deletes the nth logical DOS drive from the extended DOS partition.
/p:partn-no Indicates the partition to delete. Use the number reported by GDisk in
standard display mode (not using /lba or /raw) for partn-no.
/qwipe Overwrites the partition’s data area before deleting the partition. Makes
one pass of deleting the data on the disk.
/dodwipe Overwrites the partition’s data area before deleting the partition. Makes
seven passes of deleting the data on the disk. This is the security
standard for the U.S. Department of Defense.
/customwipe:n Overwrites the partition’s data area n times before deleting the
partition. n can be set from 1 to 100. /customwipe:7 is equivalent to
/dodwipe.
For example:
■ gdisk 1 /del /all /qwipe completes one pass to delete all partitions and data on
disk 1.
■ gdisk 1 /del /p:2 /qwipe wipes partition 2 on disk 1 with one pass.
■ gdisk 1 /diskwipe /customwipe:15 wipes the entire disk with 15 passes.
Managing partitions using GDisk 137
Activating or deactivating a partition
Switch Explanation
Switch Explanation
/p:partn-no Indicates the partition to hide or unhide. Use the number reported by
GDisk in standard display mode (not using /lba or /raw) for partn-no.
138 Managing partitions using GDisk
Modifying the Windows NT/2000/XP boot menu
Switch Explanation
/inifile:filename Specifies the full path and file name for Boot.ini. The default
value is C:\boot.ini.
/bsectfile:filename Specifies the boot sector file to create. For example, C:\bsect.dat.
For more information, see the Microsoft Knowledge Base article Q102873 -
“BOOT.INI and ARC Path Naming Conventions and Usage.”
Note the following:
■ GDisk uses only MULTI(X) syntax when describing ARC style paths, as
opposed to SCSI(X).
■ GDisk always uses multi(0)disk(0) as the beginning of the ARC style path.
■ /winnt instructs GDisk32 to create an ARC style entry and must be used if
the target operating system is Windows NT/2000/XP. If this switch is not
used, then GDisk32 creates an entry as if the target operating system is not
Windows NT/2000/XP.
■ /sysfolder lets you specify the Windows system folder on the target operating
system. The system folder is usually Winnt. If the system folder is not Winnt,
then provide the path to this folder, but do not include the root directory.
For example, use /sysfolder:"2k\WinNt", not /sysfolder:"f:\2k\WinNt".
Switch Explanation
If the entry to be removed is the default boot option, then GDisk removes the
entry and sets the first entry in the remaining list as the default boot entry.
GDisk does not remove the entry if it is the only entry in Boot.ini.
Switch Explanation
/timeout:sec Sets the number of seconds before the default boot option is selected.
142 Managing partitions using GDisk
Support for Large Hard Disks
It appears that the accessing user is given the rights that the accessed user has by
proxy. For example, the access is performed on behalf of the accessing user by the
accessed user, just because there is a user name/password match. This can best be
seen when specific access rights are granted remotely by the accessing user to a
resource on the accessed computer. The Access Control List shows that the
accessed user is the user who has rights to the resource.
Updating the SID on a workstation does not stop this situation from occurring.
You must change the password of one of the users.
Switch Description
Switch Description
Examples:
/CN=”PC<RANDOM_NUMERIC>” replaces the computer name
with a name that starts with PC, followed by a series of random
digits between 0 and 9.
/CN=”ID<RANDOM_ALPHA>X” replaces the computer name
with a name that starts with ID, followed by a series of random
letters, ending with the character X.
/CN=”<RANDOM_ALPHA>” replaces the computer name with
a name that is randomly generated using letters.
The random output fills out the format string to produce a new
computer name of the same length as the original name. Ensure
that the format string allows enough room to embed at least one
random character without exceeding the length of the original
name.
/BV=<drv:part> Specifies the drive number and partition number of the bootable
operating system installation to update.
If there is more than one operating system, then this switch must
be included in the command.
Switch Description
/SURE Specifies that the update should start without user confirmation.
/DIAG Specifies that the utility can only generate diagnostic dumps and
log files (not update the computer name or SID).
/SAFE_ Ensures that all diagnostic logging gets flushed to disk by closing
LOGGING and reopening the Gwalklog.txt file after every log statement.
This results in very slow execution. Recommended for Technical
Support use only.
Switch Description
/MNUPD= Specifies a registry location that you want Ghost Walker to search
<registry path> for instances of the computer name to update them. This registry
key and its subkeys are searched for wholly matched instances of
the computer name (of the same length). If any are found, they
are updated to the new computer name.
Multiple registry locations may be specified with multiple
instances of this switch.
■ Command-line switches
Command-line switches
@filename Specifies a file that contains additional command-line switches that Norton Ghost should
read. Filename indicates the path and file name of the command-line switch file. The
command-line switch file can include any Norton Ghost command-line switch, except for
-afile and -dfile. The Norton Ghost command-line switch file must be a text file with each
switch on a separate line. This feature lets you exceed the DOS command-line limit of 150
characters.
For example, for the following command line:
ghost.exe @ghswitch.txt
The file Ghswitch.txt would read:
-clone,mode=pcreate,src=1:2,dst=g:\part2.gho
-fcr
-sure
Command-line switches 155
Command-line switches
-afile=filename Replaces the default abort error log file name, Ghosterr.txt, with the directory and file
given in filename.
-auto Automatically names spanned image files during creation. Using this switch avoids the
user prompt that asks for confirmation of the next destination location for the remainder
of the image file that is being loaded. This switch is the default behavior for Norton Ghost.
-batch Batch mode switch. Prevents abort messages from waiting for user acknowledgment, and
removes user interaction prompts. The return value of Ghost.exe must be checked to
identify whether the operation was successful. Norton Ghost returns 0 on success and 1 or
higher on failure or error.
-bfc Handles bad FAT clusters when writing to disk. If this switch is set, and the target
partition is FAT, Norton Ghost checks for and works around bad sectors. This option may
slow Norton Ghost operation substantially.
-bootcd When writing an image directly to a CD/DVD writer, makes the CD/DVD bootable. You
need a bootable floppy disk in drive A. If you use the -sure switch with -bootcd, and a
floppy disk is not in drive A, then a non-bootable CD/DVD is created.
-buffersize=x Ghost creates an image file using a small buffer where x = number of KB. The size of the
buffer is automatically calculated by Norton Ghost. The buffersize switch lets you override
this size. You can set the buffer size value from 1 to 32.
-clone Ghost.exe operation switch. This switch allows automation of Ghost.exe operations and
has a series of arguments that define the operation parameters.
See “Clone switch usage” on page 166.
-cns Reverts the naming of spanned files to the system used by versions of Norton Ghost prior
to Symantec Ghost 6.5. If this switch is not used, then the naming of spanned files
conforms to Microsoft application guidelines. You do not need to use this switch when
reading an existing file. Use this switch when the first five characters in a file name must be
unique. For example:
Filename.gho Filename.gho
Filename.001 Filen001.ghs
Filename.002 Filen002.ghs
156 Command-line switches
Command-line switches
-CRC32 The -CRC32 switch lets you make a list of the files on a disk or partition or create an
image file with CRC values and then verify the list against the original or a copy. The
purpose is to allow both quick listing of the contents of an image file and verification that
a disk created by Norton Ghost contains the same files as the original.
See “-CRC32 switch usage” on page 172.
-crcignore Ignores CRC errors. CRC errors indicate data corruption. This switch overrides the CRC
error detection and may let a corrupted image file be used. Using this switch leaves the
corrupted files in an unknown state. You can use this switch to help you extract files from
a corrupted image file.
-cvtarea Creates a file, Cvtarea.tmp, that is the location of the MFT when the FAT32 partition is
converted to NTFS. This switch operates in a similar manner to the cvtarea program that
Microsoft provides in Deploy.cab on the Windows XP installation CD.
For more information, see the Microsoft Web site:
http://www.microsoft.com/hwdev/tech/storage/ntfs-preinstall.asp
The file is created in the root directory of the partition during a partition or disk restore
and is created as a contiguous space on the disk. The largest size allowed is 4 GB. If the file
is larger than this, it is truncated to 4 GB.
The syntax for this switch is as follows:
-cvtarea,filename=xxx,size=yyy{%disk,%free,KB,MB,GB},
firstcluster=zzz{%disk,%free,KB,MB,GB}
filename cvtarea.tmp
size 12%disk
-dd Dumps disk metrics information to the dump log file, Ghststat.txt. The file location can be
altered using the -dfile=filename switch.
-dfile=filename Changes the path and file name of the dump log file created using the -dd switch. This
switch cannot be included in the @ Ghost switch text file
Command-line switches 157
Command-line switches
-dl=number Specifies the number of hard disks present. Valid numbers are between 1 and 8. This may
help when the BIOS does not report the number of drives correctly.
-dlist=drives Specifies a list of drives to search for span files. If a span file cannot be found, then the
drive letters in dlist are substituted one by one to look for the file on other drives.
For example, the command ghost -dlist=CDEFG instructs Norton Ghost to look for files
on C, D, E, F, and G drives. The path remains the same.
-f32 Lets Norton Ghost convert all FAT16 volumes to FAT32 volumes when the destination
partition to convert is larger than 256 MB in size. Ensure that the installed operating
systems can access the volumes that will be converted to support FAT32.
-f64 Lets Norton Ghost resize FAT16 partitions to be larger than 2047 MB using 64 K clusters.
This is only supported by Windows NT and Windows 2000. Do not use on computers
with other operating systems
-fatlimit Limits the size of FAT16 partitions to 2047 MB. Useful when Windows NT FAT16
partitions are present on the disk and 64 K clusters are not wanted
-fdsp Preserves the signature bytes on the destination disk when performing a disk-to-disk or
image-to-disk cloning operation
-fdsz Clears the signature bytes on the destination disk when performing a disk-to-disk or
image-to-disk cloning operation.
-ffatid Forces the FAT partition id. This switch changes the partition id to the recommended
partition id for the FAT partition within the destination image file or the destination
partition table. This switch only takes effect if the source is a disk or partition, not an
image file.
For example, if you are cloning a partition of type 0xA0 (some unknown partition id), and
Norton Ghost sees it as a valid FATx (FAT12/FAT16/FAT32) partition, then the partition id
is changed from 0xA0 to FATx.
This was default Norton Ghost behavior before Symantec Ghost 7.5. This switch allows
for backward compatibility.
-ffi Prefers the use of direct IDE access for IDE hard disk operations. This switch does not
have any effect when running Norton Ghost in Windows 98.
-ffs Prefers the use of direct ASPI/SCSI disk access for SCSI hard disk operations.
-ffx Prefers the use of Extended Interrupt 13h disk access for hard disk operations.
158 Command-line switches
Command-line switches
-finger Shows the fingerprint details written on a hard disk created by Norton Ghost. The
fingerprint details include the process used to create the disk or partition and the time,
date, and disk on which the operation was performed.
-fis Uses all available disk space when creating partitions. By default, Norton Ghost often
leaves a small amount of free space at the end of the disk. Because partitions must be
aligned to cylinder boundaries, Norton Ghost may leave up to 5 MB free even when -fis is
specified.
-fni Disables direct IDE access support for IDE hard disk operations.
This switch has the same functionality as the -noide switch.
-fns Disables direct ASPI/SCSI access support for SCSI hard disk operations.
This switch has the same functionality as the -noscsi switch.
-fro Forces Norton Ghost to continue cloning even if the source contains bad clusters.
-fx Causes Norton Ghost to exit to DOS after operation completion. By default, Norton Ghost
prompts the user to restart or exit when the operation has finished. If Norton Ghost is run
as part of a batch file, it is sometimes useful to exit back to the DOS prompt after
completion so that further batch commands can be processed.
See “-rb” on page 162.
-ia The image all switch forces Norton Ghost to perform a sector-by-sector copy of all
partitions. When copying a partition from a disk to an image file or to another disk,
Norton Ghost examines the source partition and decides whether to copy just the files and
directory structure, or to do a sector-by-sector copy. If it understands the internal format
of the partition, it defaults to copying the files and directory structure. Generally this is the
best option. However, if a disk has been set up with special hidden security files that are in
specific positions on the partition, the only way to reproduce them accurately on the
target partition is through a sector-by-sector copy. If you use this switch to create an
image of a dynamic disk, then the image must be restored to a disk with identical
geometry.
-ial Forces a sector-by-sector copy of Linux partitions. Other partitions are copied as normal.
-ib The image boot switch copies the entire boot track, including the boot sector, when
creating a disk image file or copying disk-to-disk. Use this switch when installed
applications, such as boot-time utilities, use the boot track to store information. By
default, Norton Ghost copies only the boot sector, and does not copy the remainder of the
boot track. You cannot perform partition-to-partition or partition-to-image functions
with the -ib switch.
Command-line switches 159
Command-line switches
-id The image disk switch is similar to -ia (image all), but also copies the boot track, as in -ib
(image boot), extended partition tables, and unpartitioned space on the disk. When
looking at an image with -id, you see the unpartitioned space and extended partitions in
the list of partitions. The -id switch is primarily used by law enforcement agencies that
require forensic images.
When Norton Ghost restores from an -id image, it relocates partitions to cylinder
boundaries and adjusts partition tables accordingly. Head, sector, and cylinder
information in partition tables is adjusted to match the geometry of the destination disk.
Partitions are not resizeable. You will need an identical or larger disk than the original.
Norton Ghost does not wipe the destination disk when restoring from an -id image.
Geometry differences between disks may leave tracks on the destination disk with their
previous contents.
Use the -ia (image all) switch instead of the -id switch when copying partition-to-partition
or partition-to-image. An individual partition can be restored from an image created with
-id.
-imgdesc Adds a single-line image file description to the image file. This has the following
restrictions:
■ Cannot include any new lines
■ Cannot be used with -imgdescfile
■ Must be used with the clone switch
■ Clone switch mode must be create, dump, prcreate, or pdump
-imgdescfile Specifies a text file that contains an image file description to be added to the image file.
This has the following restrictions:
■ Cannot be used with -imgdesc
■ Must be used with the clone switch
■ Clone switch mode must be create, dump, prcreate, or pdump
-ir The image raw switch copies the entire disk, ignoring the partition table. This is useful
when a disk does not contain a partition table in the standard PC format, or you do not
want partitions to be realigned to track boundaries on the destination disk. Some
operating systems may not be able to access unaligned partitions. Partitions cannot be
resized during restore and you need an identical or larger disk.
-jl:x=filename Creates a log file to assist in diagnosing problems with TCP/IP connections. The amount
of information logged is set by the log level, x. The log level x can be E (errors), S
(statistics), W (warnings), I (information), or A (all), in increasing order of logging detail.
The file name indicates the path and file name of the log to be created. In general, the error
and statistic levels do not affect session performance. All other levels may reduce
performance and should be used for diagnostic purposes only.
-lockinfo Shows the type code and information stored in the BIOS or the Pentium III Processor ID.
For example:
160 Command-line switches
Command-line switches
M Manufacturer Compaq
U UUID 2DA9379B4707D31185E8C800A4F232BC
I PIII ID 0000067200028E72A6994A20
-locktype= Type Lets you lock an image file for use with a specific set of computers defined by the type
chosen and the source computer.
For example, ghost -locktype=P creates an image that can be used only on systems that
have the same product name type as the source computer.
-lpm The LPT master mode switch causes Norton Ghost to automatically go into LPT master
mode, and is the equivalent of selecting LPT Master from the main menu.
See “Peer-to-peer connections” on page 178.
-lps The LPT slave mode switch causes Norton Ghost to automatically go into LPT slave mode,
and is the equivalent of selecting LPT Slave from the main menu.
See “Peer-to-peer connections” on page 178.
-noauto Disables the automatic naming of spanned image files during creation. The user is
prompted for confirmation of the next destination location for the remainder of the image
file that is being restored.
-noautoskip Includes the hibernation and skip files in the image file. These files are excluded by
default.See “Hibernation and swap files” on page 69.
-nofile Disables the Image File Selection dialog box. Useful when opening directories with large
numbers of files and slow links.
-noindex Prevents Norton Ghost from creating an index when creating an image file. This slightly
reduces the size of the image file and saves memory but Ghost Explorer is much slower in
reading the image file. This switch is useful if you are saving an image file from a large disk
with very little memory.
Command-line switches 161
Command-line switches
-nolilo Does not attempt to patch the LILO boot loader after a clone. If you use the -nolilo switch,
you need to start from a floppy disk after the clone and then run /sbin/lilo as the root user
to reinstall LILO.
-ntchkdsk Sets the CHKDSK bit set on a copied NTFS volume. This causes Windows NT to check the
integrity of the volume when it is started.
-ntic Ignores the NTFS volume CHKDSK bit. Norton Ghost checks the CHKDSK bit on an
NTFS volume before performing operations. When Norton Ghost indicates that the
CHDSK bit is set, you should run CHKDSK on the volume to ensure that the disk is in a
sound state before cloning.
-ntiid By default, Norton Ghost copies partitions participating in an Windows NT volume set,
stripe set, or mirror set using image all sector-by-sector copying. This switch forces Norton
Ghost to ignore the Windows NT volume set partition status and image the partition as if
it were an NTFS partition to let it be intelligently imaged on a file-by-file basis. Take care
when using this switch. Do not use the -ntiid switch with volume sets and stripe sets.
To clone mirrored partitions (also known as Windows NT software RAID partitions)
1 With Windows NT disk administrator, break the mirror set.
2 Using the -ntiid switch, clone one of the mirror partitions.
3 Resize as desired. Partitions can only be resized by Norton Ghost during a disk
operation. When performing a partition operation, the target partition size must
already be established.
4 After cloning, recreate the mirror set using the Windows NT disk administrator. The
disk administrator creates the partitions in the mirror set.
-or The override switch allows the override of internal space and integrity checks and lets you
put a very big image into a small partition. The operation fails if it is unable to write to the
limited partition size. This switch lets you override spanning, which fails if there is limited
space. Avoid using this switch.
-pmbr Specifies that the master boot record of the destination disk is to be preserved when
performing a disk-to-disk or image-to-disk cloning operation.
-pwd and -pwd=x Specifies that password protection be used when creating an image file.
x indicates the password for the image file. If no password is given in the switch, Norton
Ghost prompts for one. You can enter a maximum of 10 alphanumeric characters.
162 Command-line switches
Command-line switches
-quiet The quiet mode switch disables status updates and user intervention.
-rb Restarts after finishing a restore or copy. After completing a restore or copy operation, the
target computer must be restarted so that the operating system can restore the new disk/
partition information. Normally, Norton Ghost prompts the user to restart or exit. -rb tells
Norton Ghost to restart automatically after it completes the restore or copy. This is useful
when automating Norton Ghost in a batch command file.
See “-fx” on page 158.
-script Allows you to specify a series of commands (one per line) that Norton Ghost will execute
in sequential order.
For example:
ghost -script=script.txt
Following is an example of script.txt:
-clone,mode=create,src=2,dst=c:\drv2.gho
-chkimg,c:\drv2.gho
-clone,mode=create,src=2,dst=c:\part2.gho
-chkimg,c:\part2.gho
Command-line switches 163
Command-line switches
-skip=x The skip file switch causes Norton Ghost to exclude the indicated files during a create or
restore operation. A skip entry can specify a single file, a directory, or multiple files using
the * wildcard. File names must be given in short file name format and all path names are
absolute. Only FAT system files can be skipped. It is not possible to skip files on NTFS or
other file systems. The skip switch may only be included in the command line once. To
specify multiple skip entries, they must be included in a text file indicated using
-skip=@skipfile. The format of the skip text file, skipfile, matches the format used with the
CRC32 vexcept option.
For example:
■ -skip=\windows\user.dll
Skips the file User.dll in the Windows directory.
■ -skip=*\readme.txt
Skips any file called Readme.txt in any directory.
■ -skip=\ghost\*.dll
Skips any file ending with .dll in the Ghost directory.
■ -skip=\progra~1\
Skips the program files directory (note the short file name).
■ [email protected]
Skips files as outlined in Skipfile.txt. For example, if Skipfile.txt contains:
*\*.tmt
[partition:1]
\windows\
*\*.exe
[Partition:2]
*\*me.txt
This would skip all *.tmt files on any partition, the Windows directory, all *.exe files
on the first partition, and any file that ends with me.txt on the second partition.
-split=x Splits image file into x MB spans. Use this switch to create a forced-size volume set. For
example, if you want to force smaller image files from a 1024 MB drive, you could specify
200 MB segments.
For example:
ghost.exe -split=200
This divides the image into 200 MB segments.
-sure Use the -sure switch in conjunction with -clone to avoid being prompted with the final
question “Proceed with disk clone - destination drive will be overwritten?” This command
is useful in batch mode.
164 Command-line switches
Command-line switches
-sze Sets the size for the destination partitions for either a disk restore or disk copy operation.
When numbering partitions in the -sze switch, do not include the hidden Ghost partition.
See “Setting a destination size for the clone switch” on page 169.
-szee Forces Norton Ghost to keep the sizes of all destination partitions the same as in the source
partition (no resizing).
This switch can be used with or without the -clone switch.
See “Setting a destination size for the clone switch” on page 169.
-szef Forces Norton Ghost to keep the sizes of all destination partitions, except for the first one,
the same as in the source partition. The first partition uses the remaining disk space.
This switch can be used with or without the -clone switch.
See “Setting a destination size for the clone switch” on page 169.
-szel Forces Norton Ghost to keep the sizes of all destination partitions, except for the last one,
the same as in the source partition. The last partition uses the remaining disk space.
This switch can be used with or without the -clone switch.
See “Setting a destination size for the clone switch” on page 169.
-tapebuffered Default tape mode. Sets the ASPI driver to report a read/write as successful as soon as the
data has been transferred to memory. Useful when using older or unreliable tape devices or
sequential media.
-tapeeject Forces Norton Ghost to eject the tape following a tape operation. If the tape drive does not
support remote ejection you must eject and insert the tape manually before further use.
Earlier versions ejected the tape by default. By default, Norton Ghost does not eject the
tape. It rewinds the tape before exiting to DOS.
-tapesafe Sets the ASPI driver to report a read/write as successful only when the data has been
transferred to the physical medium. Useful when using older or unreliable tape devices or
sequential media.
-tapebsize=x Specifies the tape block size in units of 512 bytes, where x is 1 to 128.
-tapespeed=x Allows control of tape speed, where x is 0 to F. 0 is the default. 1 to F increase tape speed.
Only use this when the tape does not work correctly at the speed used by Norton Ghost.
-tapeunbuffered Sets the ASPI driver to report a read/write as successful only when the data has been
transferred to the tape drive. (It is possible that this occurs before the data is physically
written to the medium.)
-tcpm[:slave IP address] The TCP/IP master mode switch causes Norton Ghost to go into TCP/IP master mode
automatically, and is the equivalent of selecting TCP/IP Master from the main menu. The
IP address of the slave computer may be specified. See “Peer-to-peer connections” on
page 178.
Command-line switches 165
Command-line switches
-tcps The TCP/IP slave mode switch causes Norton Ghost to go into TCP/IP slave mode
automatically, and is the equivalent of selecting TCP/IP Slave from the main menu.
See “Peer-to-peer connections” on page 178.
-usbm The USB master mode switch causes Norton Ghost to go into USB master mode
automatically, and is the equivalent of selecting USB Master from the main menu. This
switch should precede the -clone switch. For example,
ghost.exe -usbm -clone,mode=dump,src=1,dst=1:1\image.gho See “Peer-to-peer
connections” on page 178.
-usbs The USB slave mode switch causes Norton Ghost to go into USB slave mode automatically,
and is the equivalent of selecting USB Slave from the main menu. This switch should
precede the -clone switch. See “Peer-to-peer connections” on page 178.
-vdw If this switch is set, Norton Ghost uses the disk’s verify command to check every sector on
the disk before it is written. This option may slow Norton Ghost operation substantially.
-z Runs compression when saving a disk or partition to an image file. The greater the
compression, the slower the transmission.
■ -z or -z1: Low compression (fast transmission)
■ -z2: High compression (medium transmission)
■ -z3 through -z9: Higher compression (slower transmission)
See “Image files and compression” on page 62.
166 Command-line switches
Clone switch usage
Switch Action
SRC defines the source for the operation selected by the clone mode option.
Table A-3 Source options for cloning
disk drive number Source disk drive number. Numbers start at 1. For example:
SRC=1
A partition on a drive can also be specified. Numbers start at
1. For example:
SRC=1:2
tape @MTx The tape drive number. Numbers start at 0. For example:
SRC=@MT0
A partition on a tape can also be specified. For example:
SRC=@MT0:3
tape @MTx The tape drive number. Numbers start at 0. For example:
DST=@MT0
cd/ @CDx The CD or DVD writer drive number. Numbers start at 1. For
dvdwriter example:
DST=@CD1
If you have a CD reader and a CD writer, in the Ghost.exe
user interface you would see @CD1 and @ CD2. The number
is optional if specifying an operation from the command-
line.
The number of size switches depends on the number of partition sizes that you
want to specify. There may be none.
SZE{E | F | L | n={xxxxM | mmP| F | V}}
Table A-5 Destination size options for cloning
Switch Explanation
n=xxxxM Indicates that the nth destination partition is to have a size of xxxxMB
(for example, SZE2=800M indicates partition two is to have 800 MB).
n=mmP Indicates that the nth destination partition is to have a size of mm percent
of the target disk. Due to partition size rounding and alignment issues,
100% physical use of disk space may not be possible.
n=F Indicates that the nth destination partition is to remain the same size on
the destination as it was on the source. This is referred to as fixed size.
n=V Indicates that the partition may be made bigger or smaller depending on
how much disk space is available. This is the default.
F The sizes of all partitions except the first remain fixed. The first partition
uses the remaining space.
L The sizes of all partitions except the last remain fixed. The last partition
uses the remaining space.
Switch Function
Switch Function
Switch Function
Parameter Explanation
Switch Function
Switch Function
\WINDOWS\TEMPOR~1\CACHE4\*
[partition:2]
*\*.1
[end of list]
The exclusion list is case-sensitive; all files should be specified in upper case. The *
wildcard symbol follows UNIX rules, and is more powerful than the MS-DOS *
wildcard. In particular, it matches the . as well as any other character, but other
characters can follow the *. Therefore a wildcard of *br* matches any files
containing the letters br, such as, Brxyz.txt, Abr.txt, and Abc.dbr.
The specification of \WINDOWS\COOKIES\*.* in the previous example means
match all files in the \WINDOWS\COOKIES subdirectory that have extensions.
To match all files with or without extensions, use WINDOWS\COOKIES\*.
Use short file names in exclusion files. Files specified before the first [Partition:x]
heading are used to match files in any partition.
A directory of * matches any subdirectory, regardless of nesting. The previous
exclusion file matches any file with an extension of .1 in any subdirectory on the
second partition. Apart from this, use wildcards for files, not for directories.
■ Peer-to-peer connections
■ Removable media
■ CD/DVD usage
■ Internal drives
178 Transfer methods and hardware setup
Transfer and hardware requirements
Peer-to-peer connections
Peer-to-peer connections enable Norton Ghost to run on two computers,
copying drives and partitions and using image files between them.
TCP/IP connections
Connect the computers with an ethernet or token ring network interface card and
an established network connection, which includes one of the following:
■ Crossover cable
■ Coaxial or twisted pair cable
■ Ethernet or Token Ring (Network Interface Card)
■ Ethernet or MSAU hub
Install a network interface card (NIC).
Transfer methods and hardware setup 179
SCSI tape drives
The Norton Ghost wizards automatically attempt to detect and load Adaptec
SCSI cards. If this succeeds you do not need to make any additions to Config.sys.
If Norton Ghost does not detect the SCSI card, you can add the drivers in one of
the following ways:
■ In the Norton Ghost wizards, in the Preferences and Options dialog box, on
the SCSI driver settings tab.
■ In the Norton Ghost wizards, in the Preferences and Options User dialog
box, on the User Files tab. This lets you make an addition to Config.sys.
Refer to the documentation included with the SCSI tape device for more
information.
Removable media
The removable media drive, media, and media drivers for use in DOS are
required.
CD/DVD usage
A CD/DVD writer and blank CD-R/RW or DVD media are required.
See “Image files and CD/DVD writers” on page 112.
180 Transfer methods and hardware setup
Internal drives
Internal drives
To work with internal drives, ensure that each of the drives is properly
configured. This means that if fixed IDE drives are in use, then the jumpers on
the drives are set up correctly and the BIOS of the computer is configured for the
disk arrangement. Both the source and the destination drives must be free from
file corruption and physical hard drive defects.
Third-party devices
Install the DOS driver as outlined in the device documentation.
Appendix C
USB and DirectParallel
Cables
This chapter includes the following topics:
Fax 253.813.8730
Email [email protected]
For peer-to-peer connections, Norton Ghost supports USB 1.1 cables and USB
1.1 controller. Some USB 2.0 controllers may work, but Norton Ghost does not
support this configuration.
The USB and DirectParallel connection cables can also be used for high-speed
computer-to-computer file transfer and networking in Windows 9x and
Windows 2000. Norton Ghost contains DirectParallel driver technology from
Parallel Technologies, Inc., the developers of the Direct Cable Connection
computer-to-computer technology built into Windows 9x and Windows 2000.
The DirectParallel drivers and cables contain patent-pending parallel port
interface technology.
Keyword Description
Gateway Specifies the IP address of the gateway. This option is required when
(optional) routers are present on the network and when participating
computers are located on different subnets.
Example: GATEWAY=192.168.100.1
Keyword Description
■ Supported configurations
■ Position of disk
■ Boot configuration
Supported configurations
Norton Ghost can copy or clone many different Linux distributions successfully.
However, Norton Ghost is sensitive to any possible changes in Ext2/3 file system
and LILO specifications. If changes are made to these specifications, Norton
Ghost may no longer support the Linux distribution. Symantec attempts to
release new builds of Ghost promptly to address such changes.
Norton Ghost is not sensitive to kernel versions. Use the -ial and -nolilo
command-line switches to resolve problems with any incompatibilities.
See “Command-line switches” on page 153.
Norton Ghost copies or clones any x86-based Linux system with full support for
Ext2/3 file systems (type 0x83) containing 1 KB, 2 KB, or 4 KB block sizes. Other
file systems, such as reiserfs, are cloned on a sector-by-sector basis and cannot be
resized during cloning.
Linux systems that use LILO as their boot loader in the MBR or in the active
Ext2/3 partition are supported with some exceptions. Any references to a disk
other than the first hard disk in the system (/dev/hda or /dev/sda) are not
supported. The /boot and root file systems must be on the first hard disk. /boot
can be a directory within the root file system.
Norton Ghost supports type 0 and type 1 Linux swap file systems (type 0x82).
Norton Ghost partially supports Linux extended partitions (type 0x85). It copies
file systems inside these extended partitions, but restores them as DOS extended
partitions. This is not known to cause problems with Linux systems after cloning.
Position of disk
Linux is sensitive to the position of the disk in hardware. A system running on the
primary master disk does not run if the disk is mounted as the primary slave or as
the secondary master. Norton Ghost does not resolve this issue.
Boot configuration
Norton Ghost uses the file /etc/lilo.conf to determine the boot configuration. If
this file does not match the boot configuration, Norton Ghost may be unable to
patch LILO during cloning. The keyword, default, is not supported in Lilo.conf,
so the first target specified should be the default target.
Cloning with Linux 189
Norton Ghost utility support
If a different boot loader, such as grub, is used, or the preceding conditions are
not met, Norton Ghost clones the system but the new disk probably will not boot.
The system should be started from a floppy disk or CD, and the boot loader
should be reinstalled by running /sbin/lilo or an equivalent.
Warning: Always have a boot disk available in case of problems starting a Linux
system after cloning.
10010, 10014, Incorrect path/file syntax. Ensure that the path and file name are
11000 correct. Also make sure that you have the proper user rights to read
or create the image file.
19913 Cannot find the BOOTP/DHCP server. Ensure that the computer is
connected to the network and that a BOOTP or DHCP server is set
up for this subnet.
CDR101: Not A system error message. This error is not caused by Norton Ghost. It
ready reading is caused by malfunctioning hardware or software configurations.
drive X, Abort, The image file on the CD is not readable. To verify this, go into DOS
Retry, Fail and copy the image file off of the CD-ROM using copy verification,
copy /v.
Troubleshooting 193
Problems running Norton Ghost
Be careful when you make changes using your computer’s Setup program. If you
have never used it before, you may want to refer to your computer
manufacturer’s documentation.
To run Ghreboot.exe
Add the following to the end of a command line to create a Logfile.txt file in the
root directory of your computer - /l*v c:\logfile.txt
See “Installing from the command line” on page 207.
To add logging to the end of a command line for Windows NT/2000/XP
installations, use the following command line:
Msiexec.exe /i "d:\install\norton ghost.msi" /q INSTALLDIR="c:\program
files\symantec\norton ghost 2003\" USERNAME="Me"
COMPANYNAME="Symantec" /l*v c:\logfile.txt
Msiexec.exe /x "d:\install\norton ghost.msi" /q /l*v c:\logfile.txt
To add logging to the end of a command line for Windows 9x/Me and XPH
installations, use the following command line:
d:\install\setup.exe /s /v"/l*v c:\logfile.txt"
d:\install\setup /x /s /v"/l*v c:\logfile.txt"
If the word Unavailable appears under the ASPI heading, then check the ASPI
files loaded from Config.sys. The following files must be loaded:
■ aspi2dos.sys
■ aspi4dos.sys
■ aspi8dos.sys
■ aspi8u2.sys
These drivers can be included in a task from the Advanced Settings dialog box in
the Windows wizards.
All SCSI controllers require an ASPI driver. The listed ASPI files are sufficient for
most SCSI controllers. The controller might require a driver that is usually
supplied with the controller. Copy the driver to the bootable floppy disk and edit
Config.sys to load the driver. The contoller’s documentation should include the
correct syntax for loading the driver from DOS. If you do not have the driver,
then contact the controller’s manufacturer.
If the correct ASPI drivers are loaded, then update the computer BIOS and the
controller BIOS with the latest versions.
For example, older versions of the BIOS for the Adaptec 2940 controller card are
not compatible with Norton Ghost.
CD-R/RW disc
The CD disc to which you are writing may have a problem. Check the following:
■ Use an unformatted CD-RW disc.
To write an image to a CD-RW disc that you have already used, use the CD-
RW utility to wipe all information off the disc, including the file system.
■ Try a second disc.
If you have tried one disc only, then you have not eliminated the possibility
of a damaged disc. Try again, using an unused new disc.
■ Try a different brand of disc.
Some CD-R/RW drives do not work with low quality discs or specific
manufacture of discs. Use a different brand.
■ Use a standard 650 MB CD-R/RW disc.
Norton Ghost or the CD-R/RW drive may have problems with high speed
discs or with discs that record more information.
Troubleshooting 199
Writing to a recordable CD or DVD
High compression
Try using a lower or no compression when creating the image file.
View Log
If you are running tasks from the wizards, a task log may be generated. This can
help in diagnosing problems.
See “Viewing the task log” on page 59.
■ The Repair installation lets you repair the current installation. It is accessed
once Norton Ghost is installed on your computer. You can activate this by
clicking Add/Remove Programs in the Control Panel and clicking Ghost. You
can also run this mode from the command line. The syntax is as follows:
msiexec /f “c:\temp\Norton Ghost.msi”
The switch /fa reinstalls all files, /fu rewrites all required user registry entries,
and /fs overwrites any existing shortcuts.
Table H-2 contains the switches that can be used with Setup.exe.
Table H-2 Setup.exe switches
Switch Description
The /v switch is used to pass the parameters to the installation. All of the
parameters must be enclosed in quotation marks and the opening quotation
mark must immediately follow the /v switch. Any other quotation marks must be
preceded by a backslash.
The following command line installs Norton Ghost in a specified folder,
registering Norton Ghost with the user name in silent mode:
setup.exe /v"USERNAME=\"Me\" INSTALLDIR=\"c:\temp\" /qn"
Technical support
Symantec offers two technical support options:
■ Online Service and Support
Connect to the Symantec Service & Support Web site at
http://service.symantec.com, select your user type, and then select your
product and version. This gives you access to current hot topics, knowledge
bases, file download pages, multimedia tutorials, contact options, and more.
■ PriorityCare telephone support
PriorityCare fee-based telephone support services are available to all
registered customers. You can access the PriorityCare number for your
product through the Service & Support Web site. You’ll be led through the
online options first, and then to the telephone contact options available for
your product and version.
Customer service
Access customer service options through the Service & Support Web site at http:/
/service.symantec.com. From this site, you can receive assistance with non-
technical questions, and for information on how to do the following:
■ Subscribe to the Symantec Support Solution of your choice.
■ Obtain product literature or trialware.
■ Locate resellers and consultants in your area.
■ Replace missing or defective CD-ROMS, disks, manuals, and so on.
■ Update your product registration with address or name changes.
■ Get order, return, or rebate status information.
■ Access customer service FAQs.
■ Post a question to a Customer Service representative.
For upgrade orders, visit the online upgrade center at:
http://www.symantecstore.com
Asia/Pacific Ring
Brazil
Mexico
Subscription policy
If your Symantec product includes virus, firewall, or web content protection, you
might be entitled to receive protection updates via LiveUpdate. The length of the
subscription could vary by Symantec product.
When you near the end of your subscription, you will be prompted to subscribe
when you start LiveUpdate. Simply follow the instructions on the screen. After
your initial subscription ends, you must renew your subscription before you can
update your virus, firewall, or web content protection. Without these updates,
your vulnerability to attack increases. Renewal subscriptions are available for a
nominal charge.
Every effort has been made to ensure the accuracy of this information. However,
the information contained herein is subject to change without notice. Symantec
Corporation reserves the right for such change without prior notice.
January 15, 2002
Glossary
boot disk A disk that contains the Norton Ghost executable and any necessary drivers.
You start a computer from the boot disk and start Norton Ghost to perform
a cloning operation. Any drivers required to run supported hardware can be
saved onto the boot disk.
command line The direct DOS interface that lets you type commands to be executed.
create To copy the contents of a hard disk or partition to an image file. This
includes the disk system area (for example, the partition table) and the data
contents. To create an image file of a computer. In Norton Ghost, this
equates to the terms backup and dump.
DOS Disk Operating System. DOS can be run from within Windows from a
command shell, but you cannot run Norton Ghost from a command shell.
A Windows 9x computer can be restarted into DOS. Windows NT/Me/XP/
2000 computers cannot be restarted into DOS except with the use of a boot
disk containing DOS.
dynamic disk A proprietary disk partitioning structure used by Microsoft Windows 2000/
XP. Dynamic disks can be created and deleted within the operating system
without having to reboot. Dynamic disks cannot be accessed by other
operating systems.
214 Glossary
external mass storage device A device that is attached to your computer with a network or cable. that is
capable of storing large amounts of data. For example, a hard disk attached
to a computer with a USB or FireWire cable.
image file A file created using Norton Ghost. An image file of a disk or partition is
created and is used to create exact duplicates of the original disk or
partition.
IP address Internet Protocol Address. This term refers to a number that uniquely
identifies a computer on a network or on the Internet. IP addresses for
computers on a client-server network might change daily or more often.
The address for a computer must be unique within a network.
native copy Copies only the disk structure information and the files, rather than all
sectors on the disk. In addition, on FAT partitions, native cloning saves the
files contiguously. That is, when you write the image to the destination
drive, the files are no longer fragmented.
NIC Network Interface Card. The NIC is a physical device inside a computer
which coordinates communications between the computer and a network
primary partition A hard disk can contain up to four primary partitions, or up to three
primary partitions and one extended partition. Most hard disks have this
partitioning structure.
restore Overwrite all existing data on a computer either with an image file or
directly with a copy of another computer. To write information to a disk or
partition. In Norton Ghost, this equates to the term load.
sector copy A copy of an entire disk, including the boot track, all sectors, and
unpartitioned space. A sector copy does not filter extraneous or erroneous
information from the boot track.
Virtual Partition A partition that is created when you perform a backup, restore, clone, or
other Norton Ghost operation from Windows. The Ghost operation is
performed from the Virtual Partition.
Index
I
ia switch 158
218 Index
Q T
quiet switch 162 tape block size 164
tape drives 66, 164
R tape speed 164
tapebsize switch 164
RAID 68, 161
tapebuffered switch 164
rb switch 162
tapeeject switch 164
rebooting 195
tapesafe switch 164
restore
tapespeed=x switch 164
Ghost.exe 101, 103
tapeunbuffered switch 164
Norton Ghost 37
task log 59
Restore Wizard 37
TCP/IP 79, 164, 165, 178
drivers 54
S peer-to-peer 95
script switch 162 tcpm switch 164
SCSI 161 tcps switch 165
drivers 53, 157, 158 Technical Support 209
Adaptec 77 tray icon 48
tape
drives 66 U
setup 179
update
switches 164
SID 147
sector, bad 155, 158, 165
updating
sector-by-sector copy 158
computer name 147
Service and Support 209
USB
setup 180
drivers 54
See also SCSI tape
peer-to-peer 95
signature bytes 157
port 178
skip=x switch 163
support 79
skipping files 69
usb switch 165
slave mode 95, 165
usbm switch 165
source switch 167
usbs switch 165
span switch 163
spanning 64-65, 68
avoiding user prompt 155 V
list of drives to search 157 vdw switch 165
naming 155, 160 ver switch 165
override 161 verify 165
to a CD-R/RW 113 vexcept switch 174
split=x switch 163 Virtual Partition 15, 49, 52, 57, 193, 195
starting in 57 volume integrity 161
sure switch 163
swap files 69
sze switch 170
220 Index
W
Windows
2000 68
boot menu 138
running Ghost.exe 94
wiping
disks 135
partitions 135
writing to a CD-R/RW 112, 113
Z
z switch 165
Norton Ghost™
CD Replacement Form
CD REPLACEMENT: After your 60-Day Limited Warranty, if your CD becomes unusable, fill out and return 1) this form, 2)
your damaged CD, and 3) your payment (see pricing below, add sales tax if applicable), to the address below to receive
replacement CD. DURING THE 60-DAY LIMITED WARRANTY PERIOD, THIS SERVICE IS FREE. You must be a registered
customer in order to receive CD replacements.
FOR CD REPLACEMENT
Please send me: ___ CD Replacement
Name __________________________________________________________________________________________________
Company Name __________________________________________________________________________________________
Street Address (No P.O. Boxes, Please)_________________________________________________________________________
City_________________________________________________________ State _______ Zip/Postal Code _________________
Country* ___________________________________________Daytime Phone _______________________________________
Software Purchase Date ____________________________________________________________________________________
*This offer limited to U.S., Canada, and Mexico. Outside North America, contact your local Symantec office or distributor.
Briefly describe the problem: ________________________________________________________________________________
CD Replacement Price $ 10.00 SALES TAX TABLE: AZ (5%), CA (7.25%), CO (3%), CT (6%), DC (5.75%), FL (6%), GA (4%), IA (5%),
Sales Tax (See Table) ______ IL (6.25%), IN (5%), KS (4.9%), LA (4%), MA (5%), MD (5%), ME (6%), MI (6%), MN (6.5%), MO
(4.225%), NC (6%), NJ (6%), NY (4%), OH (5%), OK (4.5%), PA (6%), SC (5%), TN (6%), TX (6.25%),
Shipping & Handling $ 9.95 VA (4.5%), WA (6.5%), WI (5%). Please add local sales tax (as well as state sales tax) in AZ, CA, FL, GA,
TOTAL DUE ______ MO, NY, OH, OK, SC, TN, TX, WA, WI.