Operation Manual

Table Of Contents
© Acronis, Inc 5
10. Standalone deployment ................................................................................................ 67
11. Manual deployment ...................................................................................................... 69
11.1 Booting up the targets ...................................................................................................... 69
11.2 Starting deployment .......................................................................................................... 71
12. Event-driven deployment ............................................................................................. 73
13. Scheduled deployment.................................................................................................. 76
13.1 Preparation steps .............................................................................................................. 76
13.1.1 Getting MAC addresses ............................................................................................... 76
13.1.2 Enabling WOL on targets............................................................................................. 76
13.2 Scheduled deployment within one subnet ........................................................................... 77
13.3 Scheduled deployment in other subnet ............................................................................... 79
13.4 Operations with scheduled tasks ........................................................................................ 81
14. Custom deployment mode ............................................................................................ 83
14. 1 Understanding custom deployment ................................................................................... 83
14. 2 Considerations and tips .................................................................................................... 84
14. 3 Setting up the custom deployment mode .......................................................................... 85
14. 4 Changing parameters of the custom deployment mode ...................................................... 87
14. 5 Closing the custom deployment mode ............................................................................... 87
15. Command line and scripting under Win PE and Bart PE ............................................... 88
15.1 Adding ASD command line utility to PE ............................................................................... 88
15.1.1 Acronis Snap Deploy PE Builder ................................................................................... 88
15.1.2 Adding ASD command line utility to PE 1.0 ................................................................... 89
15.1.3 Adding ASD command line utility to PE 2.0 ................................................................... 90
15.2 Uploading PE images to Acronis PXE Server ........................................................................ 90
15.3 ASD command line syntax ................................................................................................. 91
15.3.1 Supported commands ................................................................................................. 91
15.3.2 Common options (options common for most asdcmd commands) .................................. 92
15.3.4 asdcmd usage examples ............................................................................................. 96
15.4 Sample scenarios .............................................................................................................. 96
15.4.1 Deploying images assigned to targets .......................................................................... 96
15.4.2 Creating images assigned to targets ............................................................................ 97
16. Managing a remote computer ....................................................................................... 99
16.1 File management on a remote computer ............................................................................ 99
16.2 Executing applications on a remote computer ................................................................... 100