Solved

Connecting an external USB HDD to a VM

Posted on 2013-05-30
4
506 Views
Last Modified: 2013-06-16
Q1:
Can someone provide a step by step instruction on how
I can get an external USB HDD (it's a Western Digital's
MyPassport 1TB & a HGST Touro 1TB ; both are USB3)
being detected by my VM running Win 2008 R2 Enterprise.
Screen shots would be useful.  I plan to write/save Win2008
Bare Metal backups to the external USB HDDs.

Q2:
Is it possible to have multiple VMs accessing one external
USB HDD?
0
Comment
Question by:sunhux
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 3
4 Comments
 
LVL 122
ID: 39208338
See my EE article which shows you in my Profile
0
 
LVL 122

Assisted Solution

by:Andrew Hancock (VMware vExpert / EE MVE^2)
Andrew Hancock (VMware vExpert / EE MVE^2) earned 390 total points
ID: 39208351
HOW TO: Add and Connect a USB Device to a Virtual Machine, hosted on VMware vSphere Hypervisor ESX 4.1 ESXi 4.1, ESXi 5.0

Please note USB pass through is slow for an External HD.

VM Direct Path I/O is much faster, where you add the PCI express card to the VM.

See here for an example

http://www.vm-help.com/esx40i/VMDirectPath/USB_Setup.php
0
 

Author Comment

by:sunhux
ID: 39212441
Don't understand the following:

> See my EE article which shows you in my Profile
0
 
LVL 122

Accepted Solution

by:
Andrew Hancock (VMware vExpert / EE MVE^2) earned 390 total points
ID: 39212517
That was typed, when I was mobile on my phone, I've later included the article in my second post! I was unable to include the article link in my first post.

this is the EE Article I refer to:-

HOW TO: Add and Connect a USB Device to a Virtual Machine, hosted on VMware vSphere Hypervisor ESX 4.1 ESXi 4.1, ESXi 5.0
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article aims to explain the working of CircularLogArchiver. This tool was designed to solve the buildup of log file in cases where systems do not support circular logging or where circular logging is not enabled
When we purchase storage, we typically are advertised storage of 500GB, 1TB, 2TB and so on. However, when you actually install it into your computer, your 500GB HDD will actually show up as 465GB. Why? It has to do with the way people and computers…
Teach the user how to configure vSphere Replication and how to protect and recover VMs Open vSphere Web Client: Verify vsphere Replication is enabled: Enable vSphere Replication for a virtual machine: Verify replicated VM is created: Recover replica…
In this video tutorial I show you the main steps to install and configure  a VMware ESXi6.0 server. The video has my comments as text on the screen and you can pause anytime when needed. Hope this will be helpful. Verify that your hardware and BIO…
Suggested Courses

630 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question