vSphere / Lab For Beginners: Part 4 – Virtual Distributed Switches & Migrating Networking (VSS to vDS)

Where are We?

By this point we should be in the position of having our lab cluster up and running, configured for storage and able to authenticate against a real domain with all the control that gives us.  We haven’t yet enabled any of the advanced features like vMotion though as this would have required network configuration that we would have removed in this stage.

What’s Next?

VMware provides two different ways to configure networking Virtual Standard Switches  (VSS) and Virtual Distributed Switches (vDS).  So, what’s the difference?  Standard switches are, simple, easily configurable switches that have to be configured individually on every ESXi host you have.  They also dont need Virtual Center to work.  Additionally, for features like vMotion to work they must be configured identically across all hosts.  This a management pain and when you scale, it doesn’t!

Virtual Distributed Switches are a centeralised switch that hosts can be members of.  They are managed from vCenter and provide unified management of the estates networking and advanced features not in VSS (such as pVLAN tagging).

So, in this part of our tutorial we are going to do a few things.

  1. Create a new Virtual Distributed Switch
  2. Migrate the initial VSS configuration and virtual machine networking over to the vDS
  3. Create a vDS VMKernel Port Group and enable vMotion (because we havent set this up in VSS at this moment).

A small note.  In a real environment you would be running with network uplink redundency and would be able to do this in 2 stages.  In this example we only have 3 NICs and we will have to migrate components one at a time using the ‘spare’ physical NIC.  This means that there is a lot of repition in this part of the blog.  It’ll help to understand the process!

Why Do I Want to Do This?

Simply because in the real world you’re unlikley to encounter many enterprises using VSS configurations.  vDS setups are more flexible and more widly in use.  From a lab perspective it also means you get  to play with more advanced features once you’re familar with vSphere so you may as well enable that functionality now.

Step 1: Create a new Virtual Distributed Switch

First we have to create the actual switch within vCenter.  So, log on to the vCenter Web Client as before with administrator rights and swititch to the networking tab on the left.  Select you Data Center and then click the Actions dropdown.  Expand Distributed Switch and select New Distributed Switch.


This brings up a familiar looking wizard.  Give your switch a friendly name (it’s good practice to denote that it’s a distributed switch in the name). Click Next.


You can now select the version (feature level) of you vDS.  In this example we’re going for the newest to enable all features.  In the real world you may want to select an older version if you are integrating with an older VSphere suite. Select the newest version. Click Next.


We now get to choose the number of uplinks we want to assign to the switch.  Uplinks map to physical network adapters.  The default is 4  and we are going to go with this (even though the lab in this example only has 3 Physical NICs).  You can have more uplinks than Physical NICs no problem (they just wont work or don anything).

We also get the option to Create a default Port Group (A port group is analgous to a set of network ports you’d plug wires into, grouped together for a similar task).  This first Port Group is the one you’d probably assign for connecting Virtual Machine vNIC to (to enable communication).  Give it a friendly name and click  Next.


You now get a summery page detailing what has happened and, interestingly, what your next actions should be.  Click  Finish.


So, we’ve now created a basic Distributed Switch, created a set of uplinks for it (as yet NOT assigned to a Physical NIC) and created a default Purt Group which we shall use for VM connectivity.

Step 2: Add Hosts to the vDS

Now the vDS is created we have to assign our ESXi hosts to the switch and create the additional port groups we are going to need (for Storage and vMotion in our case).  To do this navigate to the Networking tab in the Webclient,  select the distributed switch we created above, Select the Manage tab (configure in version 6.5), selct settings and then Topology  you’ll now need to click on the screen-shot-2016-10-22-at-16-18-09 icon.


This will bring up the  Add and Manage Hosts configuration Wizard.  This is a Wizard we will keep returning to whenever we make a change to the vDS.

Firstly we will need to add our hosts to the vDS.  Select Add Hosts and click  Next.


Here you’ll need to select all the hosts you have in your lab and click OK.


You’re shown a confirmation screen. Click Next.  Continue to the end of the Wizard and  Finish (without altering any configuration). Remember, we’re just connecting the hosts at this point, taking it step by step.


Step 3: Crete Other Port Groups

Now we’re going to create the remaining Port Groups we will need for ther lab.  These include:

  • A portgroup for iSCSI storage that we will migrate our ‘storage’ VSS to.
  • A portgroup for vMotion to enable this feature.

Each portgroup will have a dedicated uplink associated with it (and each uplink will have a dedicated physical NIC).

So, from the vSphere Web Client, navigate to the Networking tab, select the  Distributed Switch  we have created and right click on it.  Select Distributed Port Group and then  New Distributed Port Group.


You’ll now be presented with a simple wizard:

Give the Port Group a friendly, descriptive name. Click  Next.


Keep the default options for the switch (we can do configuration and explination in detail another time).  Click  Next.


The Summary screen is shown.  Click  Finish.


Repeat this Wizard three times.  I have created three Port Groups called:

  • StorageDPG (for iSCSI traffic and access to storage).
  • VMNetworkDPG (for Management and VM communication) [Renamed default Port Group from Step 2].
  • vMotionDPG (for vMotion traffic).

At the end of the process you should have something like this.


Back in the Topology view for the vDS you should now see something like this.  IT shown the Distributed Switch with it’s uplinks (notice there’s still no physical NICs associated with them).  You can also see t he portgroups on the left (currently with no details or items assigned to them).

Now, we have to add Physical NICs to the Uplinks.

Step 4: Add Physical NICS to Uplinks

Click on the screen-shot-2016-10-22-at-16-18-09icon fromt he topology view to initiate the  Add and Manage Hosts wizard again.


Click the Green plus symbol labelled  Attached hosts.


Select all the hosts in the lab cluster (all of the ones shown below in this example).


The confirmation will be shown as below. Click  Next.


On the next wizard screen select the  Manage Host Networking  option and click  Next.


Now ensure only  Manage Physical Adapters is selected and click  Next.   In this step we are only going to add the spare adapter.


Select the currently not used (or extra) vNIC and click the Assign Uplink button. Assign it to Uplink 1.  Note: In the example below if we try to assign one of the vNICS from vSwitch0 or Storage we would end up disconnecting the physical link from the switches BEFORE migrating the networking over to the vDS.  This would mean that either Management+VM networking or (worse) storage to the running VMs (Including this vCSA) would die.  This causes a horrible mess and is why you should probably run dual NICS / switch in reality (so we could connect half to the new vDS and leave half where they were and do a seemles switchover).

As mentioned above this lab example doesnt have this so we have to perform a rolling migration with our currently unassigned NIC.  If you’re messing around in a lab that has multi physical NICs but no spare (but vMotion has been configured) then use the NIC assigned to the vMotion interface as the ‘spare’ as this isn’t a critical componant of keeping a VM alive.

Check everying is assigned to the correct (free) NIC.  Click Next.


The next screen shows an impact summary and should alert you is you’re about to do anything stupid.  We’re not.  Click Next.


Click Finish and the process should complete momentarily.  Back at the Topology screen you should notice that the Uplinks sections of the diagram now shows adapters assigned to Uplink 1.  In tis example, 2.  One for each host.


Step 5: Migrate Networking

Again, click the screen-shot-2016-10-22-at-16-18-09 Add and Manage Hosts button from the topology view and ensure, this time, that just  Manage host Networking is selected.


Select both hosts again.


Now ensure Manage VMkernel adapter  and Migrate virtual machine networking options are selected.


Now select the VMK0 adapter currently assigned to vSwitch0 (Management Network) and select the Assign Port Group button.


Assign this to the newley created VMNetworkDPG vDS port group and ensure the same is done for the second (and any other additional) hosts in your environment.  Click  Next. Leave the storage adapter alone for the moment.


Check that nothing will be broken in the Analyze Impact window.


Now, on the Migrate vm Networking  window expand and ensure all the VMs currently in the lab are migrated over to the new Port Group.  In the example be low you can see the three VMs already in my lab (including this VCSA) ready to migrate from the VM Network VSS Port group to the VMNetworkDPG  vDS Portgroup.


Review the settings to ensure everything is as it should be.  Finish the wizard.


You should now see, in the topology view, the three VMs attached to Uplink 1 and, crucially, you should still have network connectivity to the LVCA web interface.


Next, restart the Add and Manage Hosts wizard to move the next set of items over.


Select all the hosts in the lab.


Select  Manage physical adapters  and  Manage VMkernel adapters.


Now assign the NIC in use by vSwitch0 (which we migrated the networking OFF off in the last step through the wizard) to Uplink 2.  Do this for all hosts in the environment.


Now click the Assign Port Group button and ensure that the vmkernel  port currently used for storage in the VSS is migrated to the StorageDPG .  Notice how we are rotating the next VSS switch to the DPG to free up the final adapter in the next step.


A final check on the Analyse Impact screen and it is showing a warning.  In this instance it is simply telling us that we are switching physical NICs in this operation.  We know this to be the case as were having to shuffle non resilliant connections.


Check the summery screen and Finish


Once complete we, again, should still ahve access to our VMs (the storage is still connected) and the StorageDPG  portgroup and vmk ports anre connected to Uplink 2


For one final time.  Restart the Wiard and select Manage host networking 


Add all the hosts from the environment.




Ensure the Manage physical adapters  and  Manage VMkernel adapters options are selected.


Assign the final unused NIC from the VSS to Uplink 3.  This should be the NIC assigned to the Storage switch in the old networking.


On the Manage VMkernel adapters screen click the New adapter button.

Screen Shot 2016-10-24 at 21.09.30.png

One the Select target device  screen click  browse to select an existing network.


Now select the vMotionDPG portgroup that was created right back at the start of this stage of the guide.  Note in the screenshot belowthe WRONG network is hilighted…


For the Port Propeties tick vMotion traffic  under  enable services.


Assign the new VMkernel port for vMotion an IP address and appropriate subnet.


Now assign this new VMK port to the vMotionDPG distributed port group on all hosts. NOTE: In the picture below I got it wrong for host esxi01.  Host esxi02 is CORRECT.


One final Analyse Impact  screen is shown.  Move on to thee Summary screen and complete the wizard.


Like before, you should be able to see the two new VMkernel ports assigned to the vMotionDPG port group.


That’s it.  We have migrated all the networking from VSS to vDS and created a final DPG and VMK port for vMotion capabilities.  We now have centerally managed networking from within vCenter with the ability to migrate VMs across hosts.  We also have the storage and regular network traffic controlled fromt he same area.

Step 6: Cleanup

Now everything is controlled by the vDS we just need to clean up the older VSS configuration.  To do this from the Web Client select the individual host from the  Hosts and Clusters  view, select the 1st host, the  manage  tab,  networking and then  virtual switches.  This will list the vDS and the two (obsolete) standard switches (vSwitch0 and Storage).  Select the 1st VSS and click the red ‘x’ to delete it.  Now do the same for the final VSS. NOTE:  In version 6.5 select the switch, click actions then select remove.

Remember that you will have to do this for all the hosts you have as VSS and not centerally controlled.


What’s Next?

Next we will roll through some of the feaures in vCenter such as HA, DRS and vMotion.  this will be in part 5 of this beginners series.


vSphere / Lab For Beginners: Part3 – Domain Based Authentication

So, What Do We Currently Have?

At this point we have a functioning vCenter server containing a datacenter construct and a cluster with some ESXi servers.  These are all authenticating using the built in SSO (Single Sign On) server and all networking is done via VMware Standard Switches (VSS).  These should all be configured exactly the same for basic networking across all hosts.

We could go and start deploying VMs now and creating additional vmKernel ports to enable vMotion etc. BUT VSS configs are a pain to manage and scale out (as everything has to manually be configured identically) and dont provide anyof the advanced features or centeralised management that virtual Distributed Switches do (vDS).  Also, you’d be hard pressed to find a real world deployment using just standard switches.

What We’re Going To Do Next?

This post is going to deal with one of two things that you should do right now as it’s far, far easier to configure these features before going forward than it is to try and change later when VMs are running and using all the vSphere features.

  1. Configure vSphere (ESXi and vCenter) to use domain authentication for added, more flexible, more real world security).
  2. Configure vSphere with a custom group to allow users to be given very specific roles and permissions.

We will configure advance networking in the next part of this series.

Why Are We Doing It?

Simple, because this is one of two changes to the basic config that are typical of what you’ll find in real world deployments and enable more features and flexibility in your lab whilst being easier to manage.

Stage 0: Stop the VCSA root Password From Expiring and Configure NTP

In this blog post we are going to configure the vSphere environment to use AD Authentication vs the inbuild SSO authentication.  But what if something goes wrong and both authentication sources require remediation.  Simple, you log in as root to your appliance and you can fix stuff.  True, but….  By default the root password in VCSA will expire after a year which can leave you high and dry.  It’s simple to fix so, before going any further, lets configure it to never expire.

Navigate to your VCSA’s admin web interface.  This is a specialconfiguration interface with basic appliance settings.  it’s avaialble at https://<VCSA-Appliance&gt;:5480


Log on to the appliance’s web configuration interface using the root user and the password defined in the setup script from Part 2 of this blog series.

Navigate to Adminsitration and ensure that No  is selected under Password Expiry Settings > Root Password Expires. Click Submit.

Now we can quickly configure the time service to the same values as we did for the ESXi hosts. Select Time from the menu and then the Edit button.

NOTE: For vSphere 6.7 you won’t need to do this as NTP is configured at deployment via the JSON parameter file.


Click on the dropdown for Mode and select NTP from the list of options.
Now enter uk.pool.ntp.org (Assuming this is the server you entered into the ESXi NTP configuration earlier) under the Time Servers area and click OK.screen-shot-2016-09-29-at-22-07-44

The VCSA is now configured to use NTP as it’s time source.

Stage 1: Configuring For Active Directory Authentication

What You’ll Need

In order to connect the VCSA to an Active Directory for authentication you’ll need to have an account in the Active Directory set up to allow vCenter to be joind to the lab domain.  For this example I recomend creating a service account to perform this function.

I have created and will be using the following in this example: svc_ldap@lab.local

NOTE: It does not need to be an admin user as a standard AD account can join 10 computers to a domain.  This is only going to join 1.

Join The VCSA To The Domain

Open a browser to https://<vCSA_Address>/vsphere-client/


Log on to the appliance using the administrator@vsphere.local account and the password set up when you deployed the appliance.screen-shot-2016-09-29-at-22-17-39

From the Navigator pane select Administration to open the admin sub menu.


Select Deployment System Configuration


This will open System Configuration. Select Nodes then hilight the VCSA from the list (of one).  Now Select the Manage tab and click the Join button.


This will bring up the Join Active Directory window. Enter the information required to join the domain.  In the example below:

  • Domain: lab.local [The full name of the domain you wish to join]
  • Organization Unit: <optional> [The DN path of the AD area you’d like the VCSA to be placed.
  • User Name: svc_ldap@lab.local [the service account created earlier]
  • Password: <password> [The password]

Click OK.


Unless there is an error noting obvious will happen.  You will have to reboot the appliance to see the changes applied.  Once it has rebooted, navigate back to the same place  and notice that the domain is now listed as joined.


Now we should configure Active Directory as an Identity Source within  vCenter.  This will allow us to use domain credentials to logon to vCenter and control access via domain group membership.  To do this navigate to Single Sign-on > Configuration  and open the Identity Sources tab.


Click green plus to start the process to add an identity source.


the simplest method to use is the one listed below.  So, in the Add identity source window, select Active Directory (Integrated Windows Authentication) option.  Ensure the domain name is correct (i.e. the same as the domain we just joined inthe steps above). and select the Use machine account option.  Clock OK. toadd the identity source.

NOTE: this will only work if the VCSA is joined to a domain already.  This is what we achieved in the previous step so it will work for us.


We can now use Active Directory as an authentication source but, right now, we still need to configure vCenter to give permissions to users/groups to allow this to happen.  Firstly off it makes sense to give a domain account administrative access to vCenter so we can stop using the administrator@vsphere.local account.

Navigate to Single Sign-On > Users and Groups and select the Groups tab.


This window allows tyou to create a new group for use in vSphere or add users / groups in to an existing group.  Scroll down and select the Administrators group (this is the default group vSphere has for high level access to vSphere).  You’ll see that the only member of this at the moment is the accoiunt you’re logged in with right now.


Click the Add Member  (under the Group Members heading).  From the Domain drop down ensure you select the Active Directory domain you want (In our example lab.local).  You can now select the user or group from the domain to add to the group.  I’ve added both (shown below).  If you’re following best practice you should probably create a group in Active Directory, add users to that group and add this group at this step.

Now, when we look at the group, we should see our new entries listed.

Screen Shot 2016-10-01 at 20.49.32.png


To test this worked log out of the web client and try logging back in as a domain user (as shown below.  You have to use the format <user>@<domain>.<whatever> in VMware products

Screen Shot 2016-10-01 at 20.51.18.png

If Successful you’ll be back in the main Web Client window and you should be able to see and do whatever you want.  You’ll also have your domain username shown in the top right


Stage 2: Creating Groups With Custom Permissions

Being able to add users and groups from SSO and a Windows domain to the built in vSphere groups is great and all that but, what if you want to offer more granular permissions or restrict a user / group to a single task in Virtual Center.  This is where Roles/Global Permissions can come in handy.

What’s The Process Then?

Simply it’s this:

  1. Create a new group.
  2. Add Users and Groups to this group.
  3. Create a new role with custom permissions
  4. Assign the created group the new custom role

Create a New Group, Assign Users

As in stage 1 navigate to Users and Groups and the Groups tab.  Now Create a new group by clicking on the green plus sign.  In this example I’ve named it as below.  This gives a good explination of the purpose of this demo.


Once the group is created add in a user from Active Directory that will eventually have the rights we’re about to define.  In this example I have pre-created a domain account called No Access.  It’s just a basic domain user account I’m going to use for this process.


Create a New Role In vCenter

Now Navigate to the Access Controls > Roles section of vCenters Administration settings.  From here we will create a new role which simply has permissions to Create a Datacenter.


The Roles screen is displayed.  Click the green plus to create a new role.


Name the role and assign the permissions you want granted to users of this role.  In this example I’m Createing a role called Create Data Center and assigning only one permission, that of Create Datacenter.  Click ok to create the role.


Assign Users This Permission

Now we need to assign this permission to users or groups.  In this example we will assign the role to the previously created vSphere group (above).  Navigate to Administration > Global Permissions.


Select the Manage tab and click the green plus to add the new permission.  Note that this screen lists all the currently active permissions.


Now Add the previously created group from the vSphere.local domain (notice that this vsphere.local group contains lab.local users) and click OK.


Finally select the created Create DataCenter role from the dropdown on the right and click OK.  You have now created a permissions group, added domain users to it, created and new role and finally assigned this role to the new group.


You can see the effect of this immediatly by simply logging out of the vSphere Web Client and logging back on again with the user assigned to the group.  So, in this example, I would log back on with the NoAccess@lab.local user and I should find that I can log on but all actions on all objects within vCenter are now greyed out except for the ability to create a datacenter.

NOTE: In vSphere permissions are additive.  So, if you add a user to the above Create DataCenter group but they are also a member of an admin group they will get all the administrative permissions as well as any specific others.  Its worth remembering this.

What’s Next?

next up we’re goingt o configure the advanced networking features of vSphere by configuring Virtual Distributed Switches and migrating our lab networking off the standatd switches.








vSphere / Lab For Beginners: Part 1 – Installing ESXI To USB

This post is all about how to install the first part of any vSphere / HomeLab setup.  the basic ESXi client.  It’s intended for beginners who haven’t used vSphere before or those who know a little but are installing on their own for the first time.


This guide assumes that you’re installing on to a physical piece of hardware that will boot from a USB key. Although the process is pretty much the same for SD cards, local storage etc).  It also assumes that you’re installing from an ISO image and no optical drive.

All software used in this guide can be obtained with a free trial licence so you get going  quickly and have a limited playa round.

For advice on choosing hardware suitable for a lab or test environment check out the Open Home Lab project (community run) or ‘Part 0’ of this series for information on the kit this lab weas built on.

Note: This guide was based off vSphere 6.0 however.  This processw is the same for vSphere 6.5 based installs of ESXi.  Differences are called out and noted.

What You’ll Need

For this part of the guide you’ll need:

  • Aa blank USB key (8GB or more, 16GB recomended [for logs])
  • An installed copy of VMware Workstation (Windows) or Fusion (Mac)
  • An ESXi Install.iso image
  • Some shared storage (iSCSI via a NAS shown in guide).
    • any NFS share would also be viable but not shown here.
  • 2 x ‘computers’ to act as hosts for ESXI and run our workloads
    • These will run ESXi from USB.

Trial versions of the software can be downloaded form VMware’s website.

What Are We Going To Do?

The aim here is to install ESXi 6.0 (the beating heart of vSphere) on to a USB stick and then get our hosts to boot  ESXi from that.  We’re then going to set the hosts up so they can communicate and have access to some shared storage.  Then they will be ready to run VMs.

Step 1: Create a Blank VM In Workstation

Open up VMware Workstation and create a new VM  from File > New Virtual Machine.  This bring up a handy Wizard.


Workstation provides an option to attach an ISO to a new VM and boot straight to it when it’s created.  This is perfect for Installing ESXi as, with a few clicks, we’ll have the installer booted and ready to go without any faff!.

Select Installer disc image (.iso): as the option and then browse to the ESXi .iso file you have downloaded from VMware. It’ll probably have an unfriendly name. e.g. VMware-VMvisor-Installer-6.0.0.update02-3620759.x86_64.iso. Click Next.


Now name the VM something friendly (its not being kept so dont worry too much). and, if you can, make the location somewhere fast and local to speed up install times.  Click Next.


This VM isn’t going to do much apart from boot an ISO image (we’re installing to USB remember) so make the disk size 2GB and click Next.


Make sure you tick the Power on this VM after createion option and click Finish.


The VM used to boot the ESXi installer will now be created, turn itself on, and then load the installer program.  Probably less than 30 seconds!.

Step 2: Install ESXi to USB Stick

When you open a console to you’re VM you should probablu see something like this.  Notice there is a countdown timer so, if you’ve been a biy slow, the default option will already have been selected for you…


Once you’ve selected you want to install ESXi you’ll be presented with a chance to back out.  Don’t! Go forth and install (Enter).


Before you go any further you’ll want to ensure that you’ve plugged in your USB key that you with to install ESXi on to and connected it to the VM via VM > Removable Devices > [Your USB Drvice] > Connect.USB Connect

Accept the EULA, you know there’s nothing important contained in it right? (Press F11).


Now you have to start paying attention.  Use the cursor keys to select the USB key from the list If it’s not shown check that you’ve connected the key to the host via the VM menu. Press Enter.


The installer will now scan the disk to see if it’s blank or already has something on it.  Wait a few moments.


In My case I already had ESXi installed on this USB stick so I got the warning shown below (sorry about that).  I chose Install as I wanted to show this as if it were a blank drive going forward.


You should now select a keyboard layout.  Ensure you get this right as it’s a total pain if you set a password down the line and then change the keyboard layout. Press Enter.


Now enter a password for the root account.  This should be secure as it give total access to ESXi. Press Enter.


ESXi will now do some checks to work out what it needs to configure during the install. Just wait a moment.


Now is your final choice to back out.  Check it’s going to install to the correct device (you memorised the HBA number from earlier right?).  Press F11 to begin the install.


The isntall will begin and progress will be shown.  It only takes about 10 mins to a normal (slow) USB stick.


At the end of the process you’ll be greeted with a success screen as shown below. Remove your USB key and turn off the VM in workstation.  You don’t need to press Enter to reboot as we’re done with the VM now.  We just care about the contents of the USB stick.


Step 3: Booting ESXi and Initial Configuration

NOTE: Going forward I’m using a host with no monitor attached.  Instead I have an Intel vPro CPU installed allowing me to use Intem AMT KVM to view the servers boot process.  If you’re intalling to a regular computer ensure you can see the servers output and have a working keyboard to hand before continuing.

NOTE: Most systems are not set to boot from USB by default.  You should chnage the boot priotory in your systems BIOS / UEFI at this point.

Insert the USB key in to your server / computer / host / PC and power it on.  ESXi will load (take about 10 mins) and then will present you with a screen as shown below.


The first thing you must do after installing ESXI is get the basic management network configured.  This is the initial IP  and NIC assignment that ESXi uses to send all traffic between hosts, VMs and your system.  By default it’s set to DHCP and you dont want your IP address changing all the time!

Press F2 to bring up the logon prompt.  Enter root as the username and the password you set in step 2. Press Enter.  If your log on was ucessful nothing wil appear to happen (yes really).  Press F2 again.


The system customisation screen will now be displayed.  This is the area that, in the event of a massive SNAFU in configuration you will always come back to in order to fix things (generally networking).

At this stage we are interested in Configuring the Management Network.  So, select this opeion and press Enter.


This shows the Configure Management Network screen.  We’ll need to configure all of these options but, to start, select Network Adapters. Press Enter.SnapCrab_NoName_2016-6-13_13-30-45_No-00

This is where you can select the NIC that you want to use for the basic management network.  You can select more than one for failover if required but advanced configiuration is far easier from within Virtual Center (covered later).

In this example there are three NICs in my host (onboard lan and an intel Dual port PT adapter [the onces labelled “J6B2….”).  Select the most appropriate one for your system. Press Enter to return to the Configure Management Network screen.


Now select IPv4 Configuration. Press Enter.  This brings up the network settings screen for the NIC assigned to the management network (previous step).  As noted when we booted the host this will be set to DHCP as default.  It is recomended to change this to static and then configure the network settings based on your environment.

The example below shows my setup.  Press Enter. You will rturn to the Configure Management Network screen.


Select IPv6 Configuration and disable IPv6 (restart required).  I’m doing this to simplify things later on and remote and long format IPv6 addresses from troubleshooting steps.  If you want to use IPv6 there is no reason why you can’t leave it on. Press Enter. You will return to the the Configure Management Network screen.


Select DNS Configuration and enter information relevent for your network.  In the example below the primary and secondary DNS entries are my Acrive Directory servers.  It’s crucial that the primary DNS server actually EXISTS at this point.  So, in your environment this may be your internet router.  You should also set the Hostname at this point.  Press Enter.  You will return to the Configure Management Network screen.


Select Custom DNS Suffixes and enter the suffix you are creating for your lab.  This doesn’t have to exist at the moment but if you’re planning on building a domain on the lab enter here what you’re calling the domain.  In my case lab.local. Press Enter.  You will return to the Configure Management Network screen.


Now we have finished configuring the Management Network. Press Escape and the following confirmation should appear.  Press Y to reboot the ESXi host.

NOTE: If you chose to leave IPv6 ENABLED you will simple be asked to Restart the Management Network.  Again, press Y and wait a second.


The host will now restart (a process that takes about 10 mins


Once the host has rebooted you wil have to log in again to be presented witht he main options screen.  We’re going to skip over some of the options here  as they relate to tests or service restarts.  Select Troubleshooting Options. Press Enter.


This display the Troubleshoting Mode Options screen.  Select Enable SSH and Press Enter. this allows us to connect to the ESXi host using PuTTY or similar (iTerm on Mac).  This is handy in a lab as it enables cut-paste of commands.

NOTE: This is only being enabled here as we’re building a lab and it’s useful.  This should obviously not be enabled in a production environment unless there is actuall a problem.

Press Esc to return to the main menu and log out.


This is the basic configuration of ESXi done.  It will now be reachable via https://<IP Address>.  From here you can download the vSphere client for Windows to gain access and install Virtual center.  However, this is useless if you’re on a Mac and the Windows client is going to be replaced soon.  There is a better way….

Step 3: Install the ESX UI Utility

That better way is the ESXi Embedded Host Client.  This is an HTML 5 based management component that isntalls directly on to the host and allows management and configuration of the ESXi hosts from any modern web browser.

NOTE: As of vSphere 6.0U2 this is included as part of the main install and the following step is not technically required.  However, I would always install the latest version and I even came across a bundles version that would not allow me to configure iSCSI until I had upgraded.

Download it here: VMware Embedded Host Client

Essentially, this is a plug-in for ESXi.  These are known as “VIBs” (vSphere Installation Bundle).  Once You’ve downloaded the file and extracted it we need to install it.  The easiest way to do this is to copy the VIB over to the ESXi host using WinSCP.  Place it in simple to get to location (such as /tmp/).

Now, as we enabled SSH in the previous step we can open a PuTTY session to the esxi host and install the  UI utility.

I ran the command esxcli ssoftware vib install -v /tmp/esxui-signed-3843236.vib


Output from that command should look something like the screenshot below.


Once finished you can enter the url https://<IP of ESXi>/ui/ and you’ll get the lovley new html5 interface.  VMware have intimated that this is the way everything is going in the next version of vSphere but, for the moment, this remains an unsupported method of connection.  IMO it works and is FAR better than the old method.


You’ll want to log in at this point.  Use the username root and the password you set up earlier. Click Login.


Welcome to ESXi!


Step 4: Configure Time Synchronisation

ESXi and the rest of the vSphere infrastructure relies heavily on time synchronisation for proper and reliable operation.  Becasue of this it should be configured now before anything else is configured.  This needs to done per installed host.

Click  Manage in the left pane under the host and select the system tab and select Time & Date option.  Select Edit Settings.Screen Shot 2016-07-26 at 22.00.20

Select the Use Network Time Protocol option.  Change the NTP service startup policy and NTP servers to as shown below and click Save.

Screen Shot 2016-07-26 at 22.00.55

Back in the main area select the Actions button and expand NTP service option.  Select start.Screen Shot 2016-07-26 at 22.01.19

NTP will now start and time will be configured on the ESXi server.  Repeat for all installed ESXi server you have.

Step 5: Configure Storage

Once we’re at this point we have a functioning ESXi system with networking but we are still missing one crucial piece of the puzzle. Storage!

Note: vSphere shines and is most useful with shared storage (it’s a requirement for anything vaguley real world) but there is nothing to stop you playing around with one host and locak storage.  You just wont be able to do much.

For the lab to be useful we’ll have to configure some shared storage.  You can use a SAN, NFS shares or iSCSI without issue.  For this lab I’m going to be demonstrating iSCSI running from a Synology NAS (DS1513+).  However, if you dont have iSCSI capability use NFS from whatever share you feel like.  I’ll write an NFS section later.  I’m not going to go over how to set up your storage as that is generally device specific.  We are going to start from within the ESXi Host UI and configure from there.

Example Setup Details

Going forward my example setup consists of 4 iSCSI targets each representing a datastore.  These are called Datastore1, Datastore2, Datastore3 and ISO Store.  These reside on A synology NAS presenting iSCSI over (note the different subnet to the management network).  This is to ensure segregation of storage traffic from data traffic.  It also allows me to monitor my system more easily.

iSCSI Configuration Process

Log on to the ESXi UI via the URL https://<IP Address of ESXi>/ui/ log in as root user with the password you set earlier.  On the left pane, select storage.


In the right hand pane select the Adapters tab and notice that there is only one adapter listed.  This is the USB adapter (if you have a host with a physical HBA this will probably be listed here at this stage, I don’t).  Click the Configure iSCSI item.


This brings up the screen to configure a new Adapter for iSCSI.  For now Enable iSCSI and click the Save Configuration button.


Notice that this now adds another adapter in the list.SnapCrab_NoName_2016-6-13_17-30-43_No-00

iSCSI requires a network connection over a vmkernel port to function correctly and, as mentioned at the start, I am running iSCSI on a seperate subnet.  This requires a little network configuration before we start.  Fronm the left pane, select Networking.


Select the Virtual Switches tab and then click the Add Virtual Standard Switch item.


Call it something relevent (such as Storage) and select an uplink (NIC).  I’ve chosen the 2nd NIC in my system. leave everything else as standard. Click Add.


Switch to the Port Groups tab select the new vSwitch and click the Add Port Group item.


Call this Storage and assign it to the Storage virtual switch.  Click Add.  This essentially, binds the uplink to the portgroup to the switch to create a dedicated path way for storage traffic.


Finally, we need to create a VMkernel NIC. VMware uses these to pass certain types of traffic within the system.  There is already one created for management by default (called vmk0) but we need to create one for storage traffic.Select the VMkernel NIC’s tab and select the Add VMkernel NIC item.


Select the Storage Port Group and change the IPv4 Settings to Static.  You’ll need to click the little arrow to actually show the fields to enter the address. Now add in the networking information for the port.  You will need an IP address on the same subnet as the iSCSI storage as well as the subnet information and gateway.  You do not need to specify the type of traffic for the kernel port when configuring for storage.  Click Create.


Now head back to the storage information by selecting Storage from the left pane.  Select the Adapters tab and select the Configure iSCSI item to bring back up the configuration screen.


Click the Add Port Binding item in the Network Port Bindings  section and select the storage (vmk1) interface we just created.


Now select the Add Dynamic Targets from the Dynamic targets section.  Add in the IP address of the iSCSI server.and click Save Configuration.  In my case this is the IP address of the network port on my NAS which handels iSCSI traffic.  The port is default at 3260 inless you’ve configured your iSCSI server with something different.


Click Save Configuration. VMware should rescan all your adapters and, if configured correctly. you should see your iSCSI LUNS listed in the Devices tab.


Finally, select the datastores tab and click refresh.  This should refresh the screen and show that there are now datastores available to the ESXi Host.


Wrap Up

That’s it.  You now have an ESXi host ready to be used for creating VMs and your lab.  At this point I would recomend repeating the steps above for all the other physical hosts you have.  Then you are in the position where you can install Virtual Center and really start to use the softwares power.  I’ve got a sectionon how to isntall  the VCSA in Part 2 of this beginners guide.