Vmware vSphere Clinet 5.5 Win2003 WinXp無法串連的處理

來源:互聯網
上載者:User

標籤:windows xp   windows 2003   vmwere client 5.5出現未知串連錯誤   

環境:

   Microsoft(R) Windows(R) Server 2003, Enterprise Edition Service Pack2

   Microsoft(R) Windows(R) Server xp, Enterprise Edition Service Pack3

描述:

   安裝 Vmware vSphere Clinet 5.5過程中出現警告如下:

650) this.width=650;" src="http://s3.51cto.com/wyfs02/M00/25/81/wKiom1NhyLviY1OIAADIJZL-5ms451.jpg" title="vmware client" alt="wKiom1NhyLviY1OIAADIJZL-5ms451.jpg" />

   Vmware vSphere Clinet 5.5 安裝在 Windows XP 或者 Windows Server 2003系統時, vSphere 用戶端連結vCenter Server 5.5時可能發生錯誤。詳情請查看VMware 知識庫檔案號為 2049143。

   安裝 Vmware vSphere Clinet 5.5後連結中出現警告如下:


650) this.width=650;" src="http://s3.51cto.com/wyfs02/M00/25/82/wKioL1Nh8HahkMNdAAC_Fd3R0qM633.jpg" style="float:none;" title="QQ20140501145313.jpg" alt="wKioL1Nh8HahkMNdAAC_Fd3R0qM633.jpg" />

解決:

   安裝相對應補丁版本號碼:Fix192447

   補丁下載連結:

   英文本版:

  • x64: http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351403_ENU_x64_zip.exe

  • ia64:

    http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351397_ENU_ia64_zip.exe

  • i386:

    http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351385_ENU_i386_zip.exe
    中文以及其他語言版本:

    Hotfix 19247 from Microsoft Support Hotfix Reques

處理過程:

   根據平台的不同選擇安裝相應的補丁

參考原文:

vSphere Client and vSphere PowerCLI may fail to connect to vCenter Server 5.5 due to a Handshake failure (2049143)DetailsWhen installed on a Windows XP or Windows Server 2003 host machine, the vSphere Client and vSphere PowerCLI may fail to connect to vCenter Server 5.5 due to a Handshake failure. vSphere 5.5 uses the Open SSL library, which, for security, is configured by default to accept only connections that use strong cipher suites. On Windows XP or Windows Server 2003, the vSphere Client and vSphere PowerCLI do not use strong cipher suites to connect with vCenter Server. This results in the error No matching cipher suite on the server side, and a Handshake failure on the vSphere Client or vSphere PowerCLI side.Solution

To work around this issue, perform one of these options:

  • For Windows Server 2003 or 64-bit Windows XP, apply the appropriate Microsoft hotfix:

    • Platform: x64: http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351403_ENU_x64_zip.exe

    • Platform: ia64:http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351397_ENU_ia64_zip.exe

    • Platform: i386:http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351385_ENU_i386_zip.exe

      For additional language options, request the appropriate file for Hotfix 19247 from Microsoft Support Hotfix Request.

      Note: The preceding links were correct as of November 4, 2013. If you find a link is broken, provide feedback and a VMware employee will update the link.


  • For Windows Server 2003, 64-bit Windows XP, or 32-bit Windows XP, perform one of these options:

    • Before installing the vSphere Client or vSphere PowerCLI, upgrade the Windows operating system on the host machine to Windows Vista or later.

    • On the vCenter Server 5.5 host machine, modify the vpxd.cfg to reduce the implied security by allowing the server to communicate using weak cipher suites:

      For Windows-based vCenter Server


  1. Connect to the vCenter Server using RDP.

  2. Navigate to the directory:

    C:\ProgramData\VMware\VMware VirtualCenter\

  3. Backup the vpxd.cfg file. Do not skip this step.

  4. Open the vpxd.cfg file in a text editor

  5. Add the <cipherList>ALL</cipherList> parameter between the <ssl>...</ssl> section of the configuration file, for example:

    <config>
    ...
    <vmacore>
    ...
    <ssl>
    ...
    <cipherList>ALL</cipherList>
    ...
    </ssl>
    ...
    </vmacore>
    ...
    </config>

  6. Save and close the vpxd.cfg file.

  7. Restart the vCenter Server service for the setting to take affect. For more information, see Stopping, starting, or restarting vCenter services (1003895).


               For the vCenter Server Appliance

  1. Connect to the vCenter Server Appliance via SSH. For more information, see Enable or Disable SSH Administrator Login on the VMware vCenter Server Appliance in the vCenter Server and Host Management Guide.

  2. Navigate to the directory:

    /etc/vmware-vpx/

  3. Backup the vpxd.cfg file. Do not skip this step.

  4. Open vpxd.cfg file in a plan text editor

  5. Add the <cipherList>ALL</cipherList> parameter between the <ssl>...</ssl> section of the configuration file, For example:

    <config>
    ...
    <vmacore>
    ...
    <ssl>
    ...
    <cipherList>ALL</cipherList>
    ...
    </ssl>
    ...
    </vmacore>
    ...
    </config>

  6. Save and close the vpxd.cfg file.

  7. Restart the vCenter Server service for the change to take effect. For more information, see Stopping, starting, or restarting vCenter Server Appliance services (2054085).

On the ESXi 5.5 host, modify the rhttpproxy service to reduce the implied security by allowing the host to communicate using weak cipher suites:

For ESXi 5.5

  1. Connect to the host via SSH. For more information, see Using ESXi Shell in ESXi 5.0 and 5.1 (2004746).

  2. Navigate to the directory:

    /etc/vmware/rhttpproxy/

  3. Backup the config.xml file. Do not skip this step.

  4. Open config.xml file using vi editor. For more information, see Editing files on an ESX host using vi or nano (1020302).

  5. Add the <cipherList>ALL</cipherList> parameter between the <ssl>...</ssl> section of the configuration file. Use the model below as an example:

    <config>
    ...
    <vmacore>
    ...
    <ssl>
    <doVersionCheck> false </doVersionCheck>
    <useCompression>true</useCompression>
    <libraryPath>/lib/</libraryPath>
    <handshakeTimeoutMs>120000</handshakeTimeoutMs>
    <cipherList>ALL</cipherList>
    </ssl>
    ...
    </vmacore>
    ...
    </config>

  6. Save and close the config.xml file

  7. Reset the rhttpproxy service for the change to take effect by running the command:

    /etc/init.d/rhttpproxy restart

本文出自 “專註系統整合” 部落格,請務必保留此出處http://jinda.blog.51cto.com/2701883/1405315

聯繫我們

該頁面正文內容均來源於網絡整理,並不代表阿里雲官方的觀點,該頁面所提到的產品和服務也與阿里云無關,如果該頁面內容對您造成了困擾,歡迎寫郵件給我們,收到郵件我們將在5個工作日內處理。

如果您發現本社區中有涉嫌抄襲的內容,歡迎發送郵件至: info-contact@alibabacloud.com 進行舉報並提供相關證據,工作人員會在 5 個工作天內聯絡您,一經查實,本站將立刻刪除涉嫌侵權內容。

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.