Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
?
Solved

GhostCasting using Symantec's Norton Ghost 8.0

Posted on 2006-05-19
1
Medium Priority
?
1,162 Views
Last Modified: 2013-12-02
I have been using Ghost 7.5 and use floppy discs to boot the clients and send the image using console through the network. Now, recently I have bought Ghost 8.0 and doesn't want to use floppy discs to boot clients. I have arount 100 clients systems.  WHAT I want to do is - boot the client systems on network (PXE) and send the ghost image.

Need guidelines about how to perform the whole task ?
0
Comment
Question by:logic0004
1 Comment
 
LVL 1

Accepted Solution

by:
toynz earned 1200 total points
ID: 16730606
Ghost doesn't have PXE capability built in.
They use the 3COM Boot Services for PXE.
For this you have to use the 3COM Boot image editor to create a bootdisk image.
Then use the BOOTP tab editor to set the image to use.
Then start the TFTP server and BOOTP server.

It is a bit of a long winded affair.  But once you have done it once it is straight forward.
0

Featured Post

Concerto Cloud for Software Providers & ISVs

Can Concerto Cloud Services help you focus on evolving your application offerings, while delivering the best cloud experience to your customers? From DevOps to revenue models and customer support, the answer is yes!

Learn how Concerto can help you.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

"Any files you do not have backed up in at least two [other] places are files you do not care about."
LinkedIn blogging is great for networking, building up an audience, and expanding your influence as well. However, if you want to achieve these results, you need to work really hard to make your post worth liking and sharing. Here are 4 tips that ca…
Monitoring a network: how to monitor network services and why? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the philosophy behind service monitoring and why a handshake validation is critical in network monitoring. Software utilized …
When cloud platforms entered the scene, users and companies jumped on board to take advantage of the many benefits, like the ability to work and connect with company information from various locations. What many didn't foresee was the increased risk…

580 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question