当前位置:网站首页>Install esxi 6.0 interactively
Install esxi 6.0 interactively
2022-07-05 11:28:00 【Full stack programmer webmaster】
ESXi yes VMware vSphere The underlying server system of a complete set of solutions , According to different application scenarios ESXi Installed in the U disc 、 Local disk or ISCSI Storage . This article will introduce if Interaction Install on local disk ESXi 6.0.
1. Create a virtual machine
notes : This time for the convenience of demonstration , stay VMware Workstation 10.0 Upper Department ESXi6.0 .
1.1 New virtual machine , choice “ A typical ”, Click on “ next step ”
1.2 Click on “ Browse ” add to ESXi 6.0 Installation CD , next step
1.3 because Workstation 10.0 There is no ESXi 6 The option to , Here you can choose “VMware ESXi 5”
1.4 Enter the name and location of the virtual machine , Click on “ next step ”
1.5 Define the disk size , next step
1.6 If you need to modify, click “ Customize the hardware for modification ”, Click on “ complete ”
2. install ESXi 6.0
2.1 Turn on virtual machine , Click on “Enter” Conduct ESXi Installation wizard
2.2 load ESXi The installation files
2.3 Wait for loading
2.4 Press “Enter” Key continuation
2.5 Press ”F11 ” key , Accept the license and continue
2.6 Specify installation ESXI Of disks , Press “Enter” Key continuation
2.7 Select the keyboard type , Press “Enter” continue
2.8 Set up root password , Press “Enter” continue
2.9 Press F11 Installation
2.10 Installing ESXi 6.0.0
2.11 Restart according to the prompt after installation , Press “Enter”
2.12 After restart ESXi 6.0 That is, the installation is completed successfully
Above is ESXI 6.0 Installation demonstration of , After installation, you need to configure IP,DNS etc. . Thank you for your support .
Publisher : Full stack programmer stack length , Reprint please indicate the source :https://javaforall.cn/109440.html Link to the original text :https://javaforall.cn
边栏推荐
- FreeRTOS 中 RISC-V-Qemu-virt_GCC 的调度时机
- DDoS attack principle, the phenomenon of being attacked by DDoS
- R3Live系列学习(四)R2Live源码阅读(2)
- 数据库三大范式
- 边缘计算如何与物联网结合在一起?
- 解决访问国外公共静态资源速度慢的问题
- COMSOL--三维随便画--扫掠
- 不要再说微服务可以解决一切问题了!
- c#操作xml文件
- 7 themes and 9 technology masters! Dragon Dragon lecture hall hard core live broadcast preview in July, see you tomorrow
猜你喜欢
Codeforces Round #804 (Div. 2)
[JS] extract the scores in the string, calculate the average score after summarizing, compare with each score, and output
基于OpenHarmony的智能金属探测器
MySQL 巨坑:update 更新慎用影响行数做判断!!!
AutoCAD -- mask command, how to use CAD to locally enlarge drawings
Characteristics and electrical parameters of DDR4
Wechat nucleic acid detection appointment applet system graduation design completion (6) opening defense ppt
【DNS】“Can‘t resolve host“ as non-root user, but works fine as root
[advertising system] incremental training & feature access / feature elimination
DDRx寻址原理
随机推荐
如何让全彩LED显示屏更加节能环保
CDGA|数据治理不得不坚持的六个原则
Summary of thread and thread synchronization under window
AUTOCAD——遮罩命令、如何使用CAD对图纸进行局部放大
以交互方式安装ESXi 6.0
MySQL 巨坑:update 更新慎用影响行数做判断!!!
Cron expression (seven subexpressions)
Prevent browser backward operation
[there may be no default font]warning: imagettfbbox() [function.imagettfbbox]: invalid font filename
C#实现WinForm DataGridView控件支持叠加数据绑定
go语言学习笔记-分析第一个程序
Detailed explanation of MATLAB cov function
871. Minimum Number of Refueling Stops
R3live series learning (IV) r2live source code reading (2)
Wechat nucleic acid detection appointment applet system graduation design completion (7) Interim inspection report
Cdga | six principles that data governance has to adhere to
【爬虫】wasm遇到的bug
FreeRTOS 中 RISC-V-Qemu-virt_GCC 的调度时机
How does redis implement multiple zones?
Spark Tuning (I): from HQL to code