vSphere Client Download – Direct Links

vSphere Client Download

In the past it has been a massive pain to download the vSphere client. Although the web UI has become far less clunky and much more streamlined – we still present the vSphere Client download links for ALL client versions to date! A fair chunk of standard day-to-day administration can be comfortably done with the standalone client.

vSphere Client VersionFile Link
vSphere Client v4.1 Update 1VMware-viclient-all-4.1.0-345043.exe
vSphere Client v4.1 Update 2VMware-viclient-all-4.1.0-491557.exe
vSphere Client v4.1 Update 3VMware-viclient-all-4.1.0-799345.exe
vSphere Client v5.0VMware-viclient-all-5.0.0-455964.exe
vSphere Client v5.0 Update 1VMware-viclient-all-5.0.0-623373.exe
vSphere Client v5.0 Update 2VMware-viclient-all-5.0.0-913577.exe
vSphere Client v5.0 Update 3VMware-viclient-all-5.0.0-1300600.exe
vSphere Client v5.1VMware-viclient-all-5.1.0-786111.exe
vSphere Client 5.1.0aVMware-viclient-all-5.1.0-860230.exe
vSphere Client 5.1.0bVMware-viclient-all-5.1.0-941893.exe
vSphere Client 5.1 Update 1VMware-viclient-all-5.1.0-1064113.exe
vSphere Client 5.1 Update 1bVMware-viclient-all-5.1.0-1235233.exe
vSphere Client 5.1 Update 2VMware-viclient-all-5.1.0-11471691.exe
vSphere Client 5.5VMware-viclient-all-5.5.0-1281650.exe
vSphere Client 5.5 Update 1VMware-viclient-all-5.5.0-1618071.exe
vSphere Client 5.5 Update 2VMware-viclient-all-5.5.0-1993072.exe
vSphere Client 5.5 Update 1bVMware-viclient-all-5.5.0-1880841.exe
vSphere Client 5.5 Update CVMware-viclient-all-5.5.0-1745234.exe
vSphere Client 5.5 Update 1aVMware-viclient-all-5.5.0-1746248.ex
vSphere Client 5.5 Update 3VMware-viclient-all-5.5.0-3024345.exe
vSphere Client 5.5 Update 3eVMware-viclient-all-5.5.0-4032365.exe
vSphere Client 6.0VMware-viclient-all-6.0.0-2502222.exe
vSphere Client 6.0 Update 1VMware-viclient-all-6.0.0-3016447.exe
vSphere Client 6.0 Update 2VMware-viclient-all-6.0.0-3562874.exe
vSphere Client 6.0 Update 2aVMware-viclient-all-6.0.0-4437566.exe
vSphere Client 6.0 Update 3VMware-viclient-all-6.0.0-5112508.exe
VMware vSphere Client Download Matrix

What is the vSphere Client?

The vSphere Client is the principal interface for administering vCenter Server and ESXi; vSphere client download links are all listed above – make sure you have downloaded the correct version for your ESXi release! There’s no problem having more than one installed – the launcher, i.e. the login window you see when you open the client, will connect to your ESXi server and choose the correct version to carry on with – or prompt you to download another version!

The vSphere Client user interface is configured based on the server to which it is connected:

  • When the server is a vCenter Server system, the vSphere Client displays all the options available to the vSphere environment, according to the licensing configuration and the user permissions
  • When the server is an ESXi host, the vSphere Client displays only the options appropriate to single host management.

When you first log in to the vSphere Client, it displays a Home page with icons that you select to access vSphere Client functions. When you log out of the vSphere Client, the client application retains the view that was displayed when it closed, and returns you to that view when you next log in.

You perform many management tasks from the Inventory view, which consists of a single window containing a menu bar, a navigation bar, a toolbar, a status bar, a panel section, and pop-up menus.

iRule Event Order for HTTP Requests and TCP Connections

iRule Event Order

There is an excellent article on DevCentral regarding iRule order but this focuses on TCP, the event order for an HTTP request is different as you can see below:

Event Order – HTTP Request

1. RULE_INIT
2. CLIENT_ACCEPTED
3. CLIENTSSL_HANDSHAKE
4. CLIENTSSL_CLIENTCERT
5. CLIENT_DATA
6. HTTP_REQUEST | CACHE_REQUEST
7. HTTP_CLASS_FAILED | HTTP_CLASS_SELECTED
8. STREAM_MATCHED
9. HTTP_REQUEST_DATA
10. CLIENT_DATA | HTTP_REQUEST_DATA
11. LB_SELECTED | LB_FAILED
12. STREAM_MATCHED
13. SERVER_CONNECTED (Here is where the backend server is reached)
14. SERVER_SSL_HANDSHAKE
15. HTTP_REQUEST_SEND
16. SERVER_DATA (CACHE_RESPONSE | HTTP_RESPONSE)
17. HTTP_RESPONSE_DATA

Event Order – TCP Connection

1. RULE_INIT
2. CLIENT_ACCEPTED
3. CLIENT_DATA
4. STREAM_MATCHED
5. LB_FAILED | LB_SELECTED
6. SERVER_CONNECTED
7. SERVER_DATA

f5 Default Gateway Configuration

f5 Default Gateway

This article walks through how to configure an f5 default gateway for your internal (or external!) machines.

Often, SNAT automap, a SNAT address or SNAT pool is used to essentially “hide NAT” the incoming packet behind the BigIP which will mean that the server will reply directly back to it; this doesn’t work or isn’t wanted for some environments though.

If the packet is passed through the f5 and still contains its original (internet routable) client source IP then the back-end server will send its reply to the default gateway and if this *isn’t* the BigIP then we will have asymmetric routing which is never pleasant at the best of times. This is therefore an example scenario where using the f5 as a default gateway would be convenient.

This  is actually a “Forwarding (IP)” Virtual Server which will listen on all Self IPs but you can (and most certainly should) lock this down on a VLAN basis for security.

Part 1

  1. Name your virtual server, in this case “s_gateway”
  2. Specify a source address – this is optional but if you leave it blank it will default to 0.0.0.0/0 meaning it will accept connections from ALL IP addresses whether internal or external. As this is a MAJOR SECURITY RISK you should lock it down to the subnets you want to accept connections from, in this case we have used “10.5.5.0/24” – connections from all other address ranges will be silently dropped
  3. Destination – you can lock this down to a specific network but for a default gateway we want to allow everything so this is “0.0.0.0/0”
  4. Set ports to “*” to accept connections to any port.

Part 2

  1. Unless you only wat to allow TCP & UDP, drop the Protocol menu down and choose “All Protocols”
  2. Select the VLANs you want to enable this on (optional)
  3. Enable SNAT Automap – this essentially hides connections behind the BigIP -you could also use a SNAT pool or address