{"id":170,"date":"2017-08-20T15:33:18","date_gmt":"2017-08-20T15:33:18","guid":{"rendered":"https:\/\/secureethics.com\/?p=170"},"modified":"2018-08-04T08:25:31","modified_gmt":"2018-08-04T08:25:31","slug":"how-to-install-vmware-esxi-6-5","status":"publish","type":"post","link":"https:\/\/secureethics.com\/?p=170","title":{"rendered":"How to install Vmware ESXi 6.5"},"content":{"rendered":"<p><strong>Step 1 :<\/strong><\/p>\n<p>Insert\u00a0 the ESXi 6.5 hypervisor bootable image and then boot from CD-ROM<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-174\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/1-1.png\" alt=\"\" width=\"550\" height=\"335\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/1-1.png 550w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/1-1-300x183.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/1-1-520x317.png 520w\" sizes=\"auto, (max-width: 550px) 100vw, 550px\" \/><\/p>\n<p><strong>Step 2 :<\/strong><\/p>\n<p>Select ESXI-6.5.0 &#8211; standard installer and &#8220;Enter&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-175\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2-1-300x222.png\" alt=\"\" width=\"552\" height=\"408\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2-1-300x222.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2-1-768x569.png 768w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2-1-1024x759.png 1024w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/2-1.png 1025w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/p>\n<p><strong>Step 3 :<\/strong><\/p>\n<p>Press &#8220;Enter&#8221; key from keyboard<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-173\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/3-1.png\" alt=\"\" width=\"484\" height=\"208\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/3-1.png 484w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/3-1-300x129.png 300w\" sizes=\"auto, (max-width: 484px) 100vw, 484px\" \/><\/p>\n<p><strong>Step 4 :<\/strong><\/p>\n<p>Press &#8220;F11&#8221; key from keyboard<\/p>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-176\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/4-1.png\" alt=\"\" width=\"515\" height=\"371\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/4-1.png 515w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/4-1-300x216.png 300w\" sizes=\"auto, (max-width: 515px) 100vw, 515px\" \/><\/p>\n<p><strong>Step 5 :<\/strong><\/p>\n<p>Press &#8220;<strong>Enter<\/strong> &#8220;key from keyboard<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-177\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/5-1.png\" alt=\"\" width=\"594\" height=\"307\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/5-1.png 594w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/5-1-300x155.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/5-1-520x269.png 520w\" sizes=\"auto, (max-width: 594px) 100vw, 594px\" \/><\/p>\n<p><strong>Step 6 :<\/strong><\/p>\n<p>Press &#8220;<strong>Enter<\/strong> &#8220;key from keyboard<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-178\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/6-1.png\" alt=\"\" width=\"406\" height=\"252\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/6-1.png 394w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/6-1-300x187.png 300w\" sizes=\"auto, (max-width: 406px) 100vw, 406px\" \/><\/p>\n<p><strong>Step 7 :<\/strong><\/p>\n<p>Enter the &#8220;<strong>root password<\/strong>&#8221; and press &#8220;Enter&#8221; key from keyboard<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-179\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/7-1.png\" alt=\"\" width=\"436\" height=\"194\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/7-1.png 436w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/7-1-300x133.png 300w\" sizes=\"auto, (max-width: 436px) 100vw, 436px\" \/><\/p>\n<p><strong>Step 8 :<\/strong><\/p>\n<p>Press &#8220;<strong>F11<\/strong>&#8221; from keyboard and start the ESXi installation<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-180\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/8.png\" alt=\"\" width=\"520\" height=\"176\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/8.png 520w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/8-300x102.png 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<p><strong>Step 9 :<\/strong><\/p>\n<p>Waiting\u00a0 until\u00a0 100 % Complete<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-181\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/9.png\" alt=\"\" width=\"405\" height=\"90\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/9.png 405w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/9-300x67.png 300w\" sizes=\"auto, (max-width: 405px) 100vw, 405px\" \/><\/p>\n<p><strong>Step 10 :<\/strong><\/p>\n<p>Press &#8220;<strong>Enter<\/strong> &#8220;key from keyboard to reboot for complete the Esxi 6.5 hypervisor<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-182\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/10.png\" alt=\"\" width=\"482\" height=\"304\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/10.png 482w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/10-300x189.png 300w\" sizes=\"auto, (max-width: 482px) 100vw, 482px\" \/><\/p>\n<p><strong>Step 11 :<\/strong><\/p>\n<p>Esxi 6.5 hypervisor is ready to configure and creating VM&#8217;s<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-184\" src=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/12.png\" alt=\"\" width=\"617\" height=\"461\" srcset=\"https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/12.png 1028w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/12-300x224.png 300w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/12-768x574.png 768w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/12-1024x765.png 1024w, https:\/\/secureethics.com\/wp-content\/uploads\/2017\/08\/12-520x388.png 520w\" sizes=\"auto, (max-width: 617px) 100vw, 617px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Step 1 : Insert\u00a0 the ESXi 6.5 hypervisor bootable image and then boot from CD-ROM Step 2 : Select ESXI-6.5.0 &#8211; standard installer and &#8220;Enter&#8221; Step 3 : Press &#8220;Enter&#8221; key from keyboard Step 4 : Press &#8220;F11&#8221; key from&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":435,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-170","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vmware"],"_links":{"self":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/170","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=170"}],"version-history":[{"count":0,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/posts\/170\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=\/wp\/v2\/media\/435"}],"wp:attachment":[{"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=170"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=170"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secureethics.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=170"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}