Users Guide
Table Of Contents
- VMware vSphere ESXi 6.5.x on Dell EMC PowerEdge Systems Installation Instructions and Important Information Guide
- Introduction
- Installing vSphere 6.5.x
- Download Dell EMC customized ESXi image
- Installing, enabling and disabling ESXi
- Overview of Dell NUMA Fault Resilient Memory
- Enabling Dell NUMA Fault Resilient Memory
- Overview of Dell Fault Resilient Memory
- Enabling Dell Fault Resilient Memory
- Installing ESXi on flash media
- Installing ESXi on the hard drive
- Installing ESXi on the BOSS-S1 device
- Enabling or disabling internal SD card
- Configuring one-time boot to ESXi
- Configuring boot sequence to ESXi
- VMware ESXi Secure boot support for Dell EMC PowerEdge Servers
- Downloading patches and updates for ESXi
- Creating vCenter Server installation media
- Installing vCenter Server
- Deploying vSphere 6.5.x
- Configuration back up and restore procedures
- Licensing information
- Troubleshooting ESXi
- Getting help

2. Press F2 to open the System Setup page.
After you complete the system boot, the System BIOS configuration menu is displayed.
3. Select Hard-Disk Boot Sequence by using the up- and down-arrow keys, and then select the relevant boot device.
4. Press the hyphen key (-) to move up the relevant boot device in the order.
CAUTION: Dell EMC recommends that you do not modify other settings unless you are familiar with the
settings. Modifying settings could cause your system to fail to boot or function properly.
5. Press Enter, and then follow the on-screen procedure to save these changes.
6. Restart your system.
VMware ESXi Secure boot support for Dell EMC
PowerEdge Servers
VMware supports UEFI Secure boot on versions ESXi 6.5 or later. UEFI Secure boot in general verifies the integrity of every
package loaded as part of the operating system (OS) bootup. Secure boot verifies the integrity of the vSphere Installation
Bundle (VIB) packages loaded from the boot device.
ESXi Secure boot workflow
The mboot boot loader in ESXi contains a VMware public key and is validated against the Certificate Authority (CA) present
in the platform BIOS UEFI Secure boot authorized Database (DB) during ESXi boot. The boot loader uses this key to verify the
signature of the kernel and a small subset of systems that includes a Secure boot VIB verifier—a VIB package that is used for
validating the signature of the drivers and other VIB packages loaded from the boot device. If any of the VIB installed on ESXi
does not match with the signature of the public key contained in the bootloader, then ESXi boot ends up with the Purple Screen
Of Death (PSOD) mentioning a signature mismatch for the specific failing VIBs.
14
Installing vSphere 6.5.x