Use the dpmrsi capture_driverset command to capture operating system drivers for Windows deployment.
This command has the following format:
dpmrsi capture_driverset
[-sc sc_url] -name driversetname [-desc driversetdescription] -serverid targetserverid|-macaddr targetMACaddress [-boot_network bootnetwork] -img_host RSIserver -dc_user RSIapplicationuser -dc_password RSIapplicationpassword [-ws_user username -ws_password password] [-locale iso639value]
(Optional) Defines the URL for the service controller host.
Example: https://hostname:port/...
Defines the fully qualified host where the service controller is installed.
Example: localhost.ca.com
Defines the listening port for the service controller server.
Example: 80
Defines the name of the windows driver set. Valid entries: any alphanumeric characters.
Defines text for the driver source for easy identification. Valid entries: any alphanumeric characters.
Defines the server ID or MAC address of the Rapid Server Imaging target. -macaddr takes precedence when both -serverid and -macaddr parameters are specified.
Defines the name of the registered boot network on the RSI server. This parameter is required only if there is more than one network (default) registered with the RSI server. Valid entry: any alphanumeric characters.
Defines the name of the RSI server.
Defines the RSI application user name.
Defines the password for the RSI application user.
(Optional) Specifies the credentials to use for the web service security check. If you do not include credentials, you are prompted to enter them. Avoid the prompt for credentials by setting up your own session using caaipsecurity.
(Optional) Specifies an IS0 639_3166 combination to override the default English output, for example, fr_FR for French. To use the locale of the command prompt, specify "native".
Example: Capture an RSI Driverset
This example captures a Windows driverset from a server.
dpmrsi capture_driverset
-name Win2k3TestDriverSet -desc "Test driverset" -macaddr 00:50:56:ab:1e:97 -img_host rsiserver1 -dc_user user2 -dc_password pass2 -ws_user wsuser -ws_password wsuserpassword
Copyright © 2013 CA. All rights reserved. |
|