设为首页 收藏本站
查看: 913|回复: 0

[经验分享] Vmware vSphere Clinet 5.5 Win2003 WinXp无法连接的处理

[复制链接]

尚未签到

发表于 2018-6-6 08:47:25 | 显示全部楼层 |阅读模式
  环境:
  Microsoft(R) Windows(R) Server 2003, Enterprise Edition Service Pack2
  Microsoft(R) Windows(R) Server xp, Enterprise Edition Service Pack3
  描述:
  安装 Vmware vSphere Clinet 5.5过程中出现警告如下:
DSC0000.jpg

  Vmware vSphere Clinet 5.5 安装在 Windows XP 或者 Windows Server 2003系统时, vSphere 客户端链接vCenter Server 5.5时可能发生错误。详情请查看VMware 知识库档案号为 2049143。
  安装 Vmware vSphere Clinet 5.5后链接中出现警告如下:
  

DSC0001.jpg

  解决:
  安装相对应补丁版本号:Fix192447
  补丁下载链接:

  英文本版:


  •   x64: http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351403_ENU_x64_zip.exe
  •   ia64:
      http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351397_ENU_ia64_zip.exe
  •   i386:
      http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351385_ENU_i386_zip.exe
    中文以及其他语言版本:
      Hotfix 19247 from Microsoft Support Hotfix Reques
  处理过程:
  根据平台的不同选择安装相应的补丁

  参考原文:

vSphere Client and vSphere PowerCLI may fail to connect to vCenter Server 5.5 due to a Handshake failure (2049143)
Details
When installed on a Windows XP or Windows Server 2003 host machine, the vSphere Client and vSphere PowerCLI may fail to connect to vCenter Server 5.5 due to a Handshake failure. vSphere 5.5 uses the Open SSL library, which, for security, is configured by default to accept only connections that use strong cipher suites. On Windows XP or Windows Server 2003, the vSphere Client and vSphere PowerCLI do not use strong cipher suites to connect with vCenter Server. This results in the error No matching cipher suite on the server side, and a Handshake failure on the vSphere Client or vSphere PowerCLI side.
Solution
To work around this issue, perform one of these options:

  •   For Windows Server 2003 or 64-bit Windows XP, apply the appropriate Microsoft hotfix:



    •   Platform: x64: http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351403_ENU_x64_zip.exe
    •   Platform: ia64:http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351397_ENU_ia64_zip.exe
    •   Platform: i386:http://hotfixv4.microsoft.com/Windows%20Server%202003/sp3/Fix192447/3790/free/351385_ENU_i386_zip.exe

      For additional language options, request the appropriate file for Hotfix 19247 from Microsoft Support Hotfix Request.

      Note: The preceding links were correct as of November 4, 2013. If you find a link is broken, provide feedback and a VMware employee will update the link.


      


  •   For Windows Server 2003, 64-bit Windows XP, or 32-bit Windows XP, perform one of these options:



    •   Before installing the vSphere Client or vSphere PowerCLI, upgrade the Windows operating system on the host machine to Windows Vista or later.


    •   On the vCenter Server 5.5 host machine, modify the vpxd.cfg to reduce the implied security by allowing the server to communicate using weak cipher suites:

      For Windows-based vCenter Server
      



  •   Connect to the vCenter Server using RDP.
  •   Navigate to the directory:

    C:\ProgramData\VMware\VMware VirtualCenter\


  •   Backup the vpxd.cfg file. Do not skip this step.
  •   Open the vpxd.cfg file in a text editor
  •   Add the <cipherList>ALL</cipherList> parameter between the <ssl>...</ssl> section of the configuration file, for example:

    <config>
    ...
    <vmacore>
    ...
    <ssl>
    ...
    <cipherList>ALL</cipherList>
    ...
    </ssl>
    ...
    </vmacore>
    ...
    </config>


  •   Save and close the vpxd.cfg file.
  •   Restart the vCenter Server service for the setting to take affect. For more information, see Stopping, starting, or restarting vCenter services (1003895).

                For the vCenter Server Appliance

  •   Connect to the vCenter Server Appliance via SSH. For more information, see Enable or Disable SSH Administrator Login on the VMware vCenter Server Appliance in the vCenter Server and Host Management Guide.
  •   Navigate to the directory:

    /etc/vmware-vpx/


  •   Backup the vpxd.cfg file. Do not skip this step.
  •   Open vpxd.cfg file in a plan text editor
  •   Add the <cipherList>ALL</cipherList> parameter between the <ssl>...</ssl> section of the configuration file, For example:

    <config>
    ...
    <vmacore>
    ...
    <ssl>
    ...
    <cipherList>ALL</cipherList>
    ...
    </ssl>
    ...
    </vmacore>
    ...
    </config>


  •   Save and close the vpxd.cfg file.
  •   Restart the vCenter Server service for the change to take effect. For more information, see Stopping, starting, or restarting vCenter Server Appliance services (2054085).


  On the ESXi 5.5 host, modify the rhttpproxy service to reduce the implied security by allowing the host to communicate using weak cipher suites:

For ESXi 5.5

  •   Connect to the host via SSH. For more information, see Using ESXi Shell in ESXi 5.0 and 5.1 (2004746).
  •   Navigate to the directory:

    /etc/vmware/rhttpproxy/


  •   Backup the config.xml file. Do not skip this step.
  •   Open config.xml file using vi editor. For more information, see Editing files on an ESX host using vi or nano (1020302).
  •   Add the <cipherList>ALL</cipherList> parameter between the <ssl>...</ssl> section of the configuration file. Use the model below as an example:

    <config>
    ...
    <vmacore>
    ...
    <ssl>
    <doVersionCheck> false </doVersionCheck>
    <useCompression>true</useCompression>
    <libraryPath>/lib/</libraryPath>
    <handshakeTimeoutMs>120000</handshakeTimeoutMs>
    <cipherList>ALL</cipherList>
    </ssl>
    ...
    </vmacore>
    ...
    </config>


  •   Save and close the config.xml file
  •   Reset the rhttpproxy service for the change to take effect by running the command:

    /etc/init.d/rhttpproxy restart

运维网声明 1、欢迎大家加入本站运维交流群:群②:261659950 群⑤:202807635 群⑦870801961 群⑧679858003
2、本站所有主题由该帖子作者发表,该帖子作者与运维网享有帖子相关版权
3、所有作品的著作权均归原作者享有,请您和我们一样尊重他人的著作权等合法权益。如果您对作品感到满意,请购买正版
4、禁止制作、复制、发布和传播具有反动、淫秽、色情、暴力、凶杀等内容的信息,一经发现立即删除。若您因此触犯法律,一切后果自负,我们对此不承担任何责任
5、所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其内容的准确性、可靠性、正当性、安全性、合法性等负责,亦不承担任何法律责任
6、所有作品仅供您个人学习、研究或欣赏,不得用于商业或者其他用途,否则,一切后果均由您自己承担,我们对此不承担任何法律责任
7、如涉及侵犯版权等问题,请您及时通知我们,我们将立即采取措施予以解决
8、联系人Email:admin@iyunv.com 网址:www.yunweiku.com

所有资源均系网友上传或者通过网络收集,我们仅提供一个展示、介绍、观摩学习的平台,我们不对其承担任何法律责任,如涉及侵犯版权等问题,请您及时通知我们,我们将立即处理,联系人Email:kefu@iyunv.com,QQ:1061981298 本贴地址:https://www.yunweiku.com/thread-519051-1-1.html 上篇帖子: VMware vSphere 下篇帖子: VMware vSAN 初探
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

扫码加入运维网微信交流群X

扫码加入运维网微信交流群

扫描二维码加入运维网微信交流群,最新一手资源尽在官方微信交流群!快快加入我们吧...

扫描微信二维码查看详情

客服E-mail:kefu@iyunv.com 客服QQ:1061981298


QQ群⑦:运维网交流群⑦ QQ群⑧:运维网交流群⑧ k8s群:运维网kubernetes交流群


提醒:禁止发布任何违反国家法律、法规的言论与图片等内容;本站内容均来自个人观点与网络等信息,非本站认同之观点.


本站大部分资源是网友从网上搜集分享而来,其版权均归原作者及其网站所有,我们尊重他人的合法权益,如有内容侵犯您的合法权益,请及时与我们联系进行核实删除!



合作伙伴: 青云cloud

快速回复 返回顶部 返回列表