亚洲av成人无遮挡网站在线观看,少妇性bbb搡bbb爽爽爽,亚洲av日韩精品久久久久久,兔费看少妇性l交大片免费,无码少妇一区二区三区

  免費(fèi)注冊(cè) 查看新帖 |

Chinaunix

  平臺(tái) 論壇 博客 文庫(kù)
最近訪問板塊 發(fā)新帖
查看: 4753 | 回復(fù): 4
打印 上一主題 下一主題

[VMware] 安裝esx 3.5提示找不到網(wǎng)絡(luò)設(shè)備 [復(fù)制鏈接]

論壇徽章:
0
跳轉(zhuǎn)到指定樓層
1 [收藏(0)] [報(bào)告]
發(fā)表于 2011-04-29 11:41 |只看該作者 |倒序?yàn)g覽
描述:
新建虛擬機(jī)時(shí)網(wǎng)卡選擇的是橋接
安裝esx-3.5時(shí)提示如:
The installer was unable to find any supported network devices.
press 'ok' to reboot your system

#################相關(guān)信息################################
OS 名稱:          Microsoft(R) Windows(R) Server 2003 Enterprise x64 Edition
OS 版本:          5.2.3790 Service Pack 2 Build 3790
系統(tǒng)制造商:       INTEL_
系統(tǒng)型號(hào):         DG45ID__
系統(tǒng)類型:         x64-based PC
處理器:           安裝了 4 個(gè)處理器。
            [01]: EM64T Family 6 Model 23 Stepping 10 GenuineIntel ~2500 Mhz
                  [02]: EM64T Family 6 Model 23 Stepping 10 GenuineIntel ~2500 Mhz
                  [03]: EM64T Family 6 Model 23 Stepping 10 GenuineIntel ~2500 Mhz
                  [04]: EM64T Family 6 Model 23 Stepping 10 GenuineIntel ~2500 Mhz
物理內(nèi)存總量:     8,060 MB
網(wǎng)卡:             安裝了 4 個(gè) NIC。
                  [01]: 1394 Net Adapter
                  [02]: Intel(R) 82567LF-2 Gigabit Network Connection
                           [03]: VMware Virtual Ethernet Adapter for VMnet1
                           [04]: VMware Virtual Ethernet Adapter for VMnet8

VMware® Workstation 7.1.1 build-282343

esx-3.5 32位
#################################################

感謝~

論壇徽章:
0
2 [報(bào)告]
發(fā)表于 2011-04-29 11:47 |只看該作者
用CPUZ,檢查過了,Q8300是支持VT技術(shù)的,可能是主板未在BIOS里設(shè)備開啟支持VT技術(shù),或者是BIOS版本太舊需要刷新BIOS,所以沒有辦法安裝ESX4的版本,所以才選擇用esx-3.5。
請(qǐng)問有其他的解決方法嗎?升級(jí)BIOS遠(yuǎn)程操作是否可行?
感謝.

論壇徽章:
0
3 [報(bào)告]
發(fā)表于 2011-04-29 12:28 |只看該作者
參考下面資料: http://skabelka.com/node/40

VMWare ESX 3i and VMWare ESX3/ESX4 on Desktop PC
Submitted by Alexander on Sun, 12/13/2009 - 21:16 Sometimes it's really useful to setup whole VMWare ESX Infrastructure not on proper Server hardware for Production purposes but on local Desktop PC for study and testing functionality. Let's do it with several easy steps.

This installation guide was tested on Dell Latitude D620 Laptop computer.


Following conditions are required to be able to start VMWare ESX3i/ESX3/ESX4 just on your Desktop PC:

AMD-V or Intel VT processor
Min 2GB RAM (4GB is recommended)
ESX or ESXi Media(ISO)
VMWare Workstation 6 or 6.5
Instructions (see below)



Step1: check if processor is compatible with AMD-V or Intel VT technologies

Find out the model of processor on your computer via "Computer management" console.
Computer Management: get model of processor
Just follow the link Intel components info for your Intel processor and
check Intel VT-X processor compatibility. Make sure that VT-X is option for your type of processor. Otherwise it will never work.
http://ark.intel.com: Processor details

Step2: Create new VM(Virtual machine)

(...will be soon...)

Step3: Install ESX

(...will be soon...)

VMWare VMWare ESX 3 VMWare ESX3i
» Alexander's blog
Submitted by Alexander on Sun, 12/13/2009 - 23:37. #
Intel first introduced VT-x on late-model P4 processors (codenamed Paxville). Many Core, Core 2, Core i3, Core i5 and Core i7 processors are VT-capable (as are their Xeon-branded counterparts). However, some skus of these models are not VT-capable. (For example, the Q8200 Intel Core 2 Quad Processor is not VT-capable). You can check to see if your processor is VT-capable here.

On Intel CPUs, it is expected that the BIOS (or other firmware) will either enable or disable VT-x at boot, and will then lock the setting so that it cannot be subsequently changed without powering down the CPU. Note that VT-x must be both enabled and locked before software can make use of the VMX extensions. This operation must be performed for each core of a multi-core system, and for each thread of a multi-threaded system.

Because the VT-x setting is typically locked at power on, it is necessary to fully power down the system after changing any VT-x options in the BIOS. A simple reboot is not sufficient! After saving your BIOS changes, I recommend that you either switch off the power supply itself or pull the power cord(s) out of the wall and wait ten seconds. For laptop systems, you may have to remove the battery as well, although such extreme measures are rarely necessary.

Some BIOSes do not have VT-x enable/disable options. Some BIOSes with such an option fail to enable/disable VT-x on each core of a multi-core system or on each thread of a multi-threaded system. To verify that VT-x is enabled and locked on each core/thread of your system, download the attached ISO, burn it to a CD, and boot your host from the CD.

For each core (or thread, for HT CPUs) on your system, the ISO will report one or more of the following:

CPU : This core does not support long mode
CPU : This core does not support VT
CPU : Feature control MSR is unlocked!
CPU : VT is disabled in the feature control MSR!
CPU : VT is enabled on this core.

If the ISO reports that some core(s) do not support long mode, you will not be able to use VT-x with current VMware products. You can use VT-x for 32-bit guests with Workstation 5.5 or 6.0.x, Fusion 1.0, or ESX 3.0, but this configuration is not supported. See VMware Products and Hardware-Assisted Virtualization (VT-x/AMD-V).

If the ISO reports that some core(s) do not support VT, but your CPU(s) should support VT, you may have encountered an Intel chip erratum (possibly AW67 or AV69, depending on the CPU). The effect of this erratum is that some CPU features are reported incorrectly after a particular machine specific register has been updated by the BIOS. The solution to this problem is to obtain an updated BIOS from your system vendor.

If the ISO reports that the feature control MSR is unlocked some core(s), a workaround is available for current VMware hosted products. Simply add the following option to your system-wide configuration file:

hv.enableIfUnlocked = TRUE


On Linux systems, the system-wide configuration file is /etc/vmware/config. On Windows systems, the system-wide configuration file varies according to VMware product and Windows version. For VMware Workstation on XP hosts, the system-wide configuration file is C:\Documents and Settings\All Users\Application Data\VMware\VMware Workstation\config.ini. For VMware Workstation on Vista hosts, the system-wide configuration file is C:\ProgramData\VMware\VMware Workstation\config.ini. For other VMware products, adjust the path appropriately.

Note that this workaround can also be helpful if your BIOS fails to enable and lock VT-x when waking from hibernation. However, the ISO is not helpful in diagnosing this failure. If VT-x works after a power-cycle but fails after resuming from hibernation, then you should try the above workaround.

If the ISO reports that VT is disabled on some core(s) and it does not also report that the feature control MSR is unlocked on the same core(s), then it is impossible to enable VT-x through software.

Note that VT-x is typically unavailable to normal software if you have enabled "trusted execution," which may restrict VT-x to "trusted" code. You should disable trusted execution in the BIOS and power-cycle the system.

Original: http://communities.vmware.com/docs/DOC-8978
iso: http://communities.vmware.com/se ... ad/8978-13-16491...

reply  Submitted by Alexander on Mon, 12/14/2009 - 00:18. #

Requirements

It is only possible to run nested VMs when the outer VM uses hardware-assisted virtualization (Intel VT-x or AMD-V) and the inner VM uses classic software virtualization (binary translation). You may run any 32-bit or 64-bit operating system as the outer guest. You may only run 32-bit operating systems as the inner guest. Running nested VMs under ESX 4.0 (or ESXi 4.0) under Workstation 7 is the only officially supported configuration. Other configurations may work, but are entirely unsupported.

Nested VMs are only possible when the host is running ESX 3.0 (with some caveats), ESX 3.5 (some AMD CPUs only), Workstation 6.0 (or later), or Fusion. Note that you cannot run nested VMs on Intel systems when the host is running ESX 3.5.

See the appropriate section below for the configuration options required for the two guests.


Intel VT-x Hosts

Intel VT-x is supported on many Core, Core 2, Core i3, Core i5 and Core i7 processors, and on some late-model P4 processors. Current VMware products only support VT-x on 64-bit (EM64T) Intel processors. For more information on enabling VT-x, see Verifying that VT-x is Enabled and Locked at Boot.


ESX 3.0

The configuration file for the outer guest should contain the following line:
{font:courier}
monitor_control.vt32 = TRUE
{font}

The configuration file for the inner guest should contain the following line:
{font:courier}
vmx.allowNested = TRUE
{font}

Note that the {font:courier}vmx.allowNested{font} option is not supported by older VMware products. For nested VMs to work on an ESX 3.0 host, the VMware product running in the outer guest must be Workstation 6.0 or later or ESX 3.5 or later. Furthermore, you must not use the backdoor in the inner guest. In particular, this means that you must not install VMware tools in the inner guest.


Workstation 6.0 and Fusion 1.x

The configuration file for the outer guest should contain the following lines:
{font:courier}
monitor_control.vt32 = TRUE
monitor_control.restrict_backdoor = TRUE
{font}


Workstation 6.5 or later, Fusion 2.0 or later and ESX 4.0

The configuration file for the outer guest should contain the following lines:
{font:courier}
monitor.virtual_exec = hardware
monitor_control.restrict_backdoor = TRUE
{font}


AMD-V Hosts

AMD-V is supported on Rev F and later Family 0FH AMD64 processors, but current VMware products only support AMD-V on Family 10H or later AMD64 processors (Barcelona or Phenom). Thus, you can use AMD-V on Family 0FH Rev F and Rev G processors with Workstation 6.0. However, you need a Family 10H processor to use AMD-V with ESX 3.5 and Workstation 6.5 (or later).


ESX 3.0

The configuration file for the outer guest should contain the following line:
{font:courier}
monitor_control.enable_svm = TRUE
{font}

The configuration file for the inner guest should contain the following line:
{font:courier}
vmx.allowNested = TRUE
{font}

Note that the {font:courier}vmx.allowNested{font} option is not supported by older VMware products. For nested VMs to work on an ESX 3.0 host, the VMware product running in the outer guest must be Workstation 6.0 or later or ESX 3.5 or later. Furthermore, you must not use the backdoor in the inner guest. In particular, this means that you must not install VMware tools in the inner guest.


Workstation 6.0

The configuration file for the outer guest should contain the following lines:
{font:courier}
monitor_control.enable_svm = TRUE
monitor_control.restrict_backdoor = TRUE
{font}


ESX 3.5

The configuration file for the outer guest should contain the following lines:
{font:courier}
monitor.virtual_mmu = hardware
monitor_control.restrict_backdoor = TRUE
{font}


Workstation 6.5 or later and ESX 4.0

The configuration file for the outer guest should contain the following lines:
{font:courier}
monitor.virtual_exec = hardware
monitor_control.restrict_backdoor = TRUE
{font}

Original: Running Nested VMs
Created on: Nov 30, 2008 6:17 PM by jmattson - Last Modified: Dec 11, 2009 9:06 AM by jmattson

reply  Submitted by Alexander on Fri, 12/25/2009 - 23:02. #
There was one important thing I have to do for solving the installation problem - on my DELL Latitude D620 I was needed to upgrade BIOS to last available one A10 and had to enable Virtualization in Post Behaviour section. So right now I finished it and it works fine - both ESX3i and ESX4.

reply

論壇徽章:
0
4 [報(bào)告]
發(fā)表于 2011-04-29 12:29 |只看該作者
參考資料2: http://communities.vmware.com/docs/DOC-8978
Trouble-shooting Intel VT-x Issues
版本 22   創(chuàng)建于: 2008-12-1 上午11:48 作者 jmattson - 最后修改:  2011-1-6 上午2:52 作者 jeanchen
Note: This document pertains only to Intel VT-x on Intel hardware.  It  does not pertain to AMD-V (aka SVM) on AMD hardware.  Some portions of  this document may be relevant to Intel VT-x on VIA hardware.

Intel first introduced VT-x on late-model P4 processors (codenamed  Paxville).  Many Core, Core 2, Core i3, Core i5 and Core i7 processors  are VT-capable (as are their Xeon-branded counterparts).  However, some  skus of these models are not VT-capable.  (For example, the Q8200 Intel  Core 2 Quad Processor is not VT-capable).  You can check to see if your  processor is VT-capable here.

On Intel CPUs, it is expected that the BIOS (or other firmware) will  either enable or disable VT-x at boot, and will then lock the setting so  that it cannot be subsequently changed without powering down the CPU.   Note that VT-x must be both enabled and locked before software can make  use of the VMX extensions.  This operation must be performed for each  core of a multi-core system, and for each thread of a multi-threaded  system.

Because the VT-x setting is typically locked at power on, it is  necessary to fully power down the system after changing any VT-x options  in the BIOS.  A simple reboot is not sufficient!   After saving your  BIOS changes, I recommend that you either switch off the power supply  itself or pull the power cord(s) out of the wall and wait ten seconds.   For laptop systems, you may have to remove the battery as well, although  such extreme measures are rarely necessary.

Some BIOSes do not have VT-x enable/disable options.  Some BIOSes with  such an option fail to enable/disable VT-x on each core of a multi-core  system or on each thread of a multi-threaded system.  To verify that  VT-x is enabled and locked on each core/thread of your system, download  the attached ISO, burn it to a CD, and boot your host from the CD.

For each core (or thread, for HT CPUs) on your system, the ISO will report one or more of the following:

CPU <n>: This core does not support long mode
CPU <n>: This core does not support VT
CPU <n>: Feature control MSR is unlocked!
CPU <n>: VT is disabled in the feature control MSR!
CPU <n>: VT is enabled on this core.


If the ISO reports that some core(s) do not support long mode, you will  not be able to use VT-x with current VMware products.  You can use VT-x  for 32-bit guests with Workstation 5.5 or 6.0.x, Fusion 1.0, or ESX 3.0,  but this configuration is not supported. See VMware Products and Hardware-Assisted Virtualization (VT-x/AMD-V).

If the ISO reports that some core(s) do not support VT, but your CPU(s)  should support VT, you may have encountered an Intel chip erratum  (possibly AW67, AV69, AX64, AY64, AZ69 or AAA70, depending on the CPU).   The effect of this erratum is that some CPU features are reported  incorrectly after a particular machine specific register has been  updated by the BIOS.  The solution to this problem is to obtain an  updated BIOS from your system vendor.

If the ISO reports that the feature control MSR is unlocked some  core(s), a workaround is available for older VMware hosted products.   Simply add the following option to your system-wide configuration file:

hv.enableIfUnlocked = TRUE

Note that this is already the default setting for current VMware hosted products (Workstation 7.x, Player 3.x, and Fusion 3.x).

On Linux systems, the system-wide configuration file is  /etc/vmware/config.  On Windows systems, the system-wide configuration  file varies according to VMware product and Windows version.  For VMware  Workstation on XP hosts, the system-wide configuration file is  C:\Documents and Settings\All Users\Application Data\VMware\VMware  Workstation\config.ini. For VMware Workstation on Vista hosts, the  system-wide configuration file is C:\ProgramData\VMware\VMware  Workstation\config.ini.  For other VMware products, adjust the path  appropriately.

Note that this workaround can also be helpful if your BIOS fails to  enable and lock VT-x when waking from hibernation.  However, the ISO is  not helpful in diagnosing this failure.  If VT-x works after a  power-cycle but fails after resuming from hibernation, then you should  try the above workaround.

If the ISO reports that VT is disabled on some core(s) and it does not  also report that the feature control MSR is unlocked on the same  core(s), then it is impossible to enable VT-x through software.

Note that VT-x is typically unavailable to normal software if you have  enabled "trusted execution," which may restrict VT-x to "trusted" code.   You should disable trusted execution in the BIOS and power-cycle the  system.

論壇徽章:
0
5 [報(bào)告]
發(fā)表于 2011-04-29 15:52 |只看該作者
終于找到了,原文:http://blogold.chinaunix.net/u2/83111/showart_2093236.html
編輯E:\Esx\Esx.vmx(我把Esx安裝在E盤下了), 只需要找到Esx.vmx文件。
在其中添加或編輯
ethernetx.virtualDev="e1000"(x應(yīng)為0、1、2。。。。。。)要根據(jù)你的網(wǎng)卡來修改!


如果是實(shí)體機(jī),那么你要更換網(wǎng)卡,到vmware的官方網(wǎng)站查他的HCL,買Esx能識(shí)別了的硬件!
您需要登錄后才可以回帖 登錄 | 注冊(cè)

本版積分規(guī)則 發(fā)表回復(fù)

  

北京盛拓優(yōu)訊信息技術(shù)有限公司. 版權(quán)所有 京ICP備16024965號(hào)-6 北京市公安局海淀分局網(wǎng)監(jiān)中心備案編號(hào):11010802020122 niuxiaotong@pcpop.com 17352615567
未成年舉報(bào)專區(qū)
中國(guó)互聯(lián)網(wǎng)協(xié)會(huì)會(huì)員  聯(lián)系我們:huangweiwei@itpub.net
感謝所有關(guān)心和支持過ChinaUnix的朋友們 轉(zhuǎn)載本站內(nèi)容請(qǐng)注明原作者名及出處

清除 Cookies - ChinaUnix - Archiver - WAP - TOP