This document provides an overview of installing and configuring the Hyper-V R2 server role. It discusses installing Hyper-V on Windows Server 2008, configuring virtual networks, and considerations for virtual network types and VLAN configurations. Hands-on demonstrations are provided for installing Hyper-V, configuring user settings, virtual networks, and VLAN support.
Cisco SDM is an embedded web-based management tool for Cisco routers that provides wizards to simplify configuration without requiring CLI expertise. It supports various router platforms and IOS versions when configured with HTTP/HTTPS servers, a privilege level 15 user account, and SSH/Telnet access. Cisco SDM's main window includes menus, tools and wizards for LAN, WAN, firewall, VPN, security and QoS configuration.
The document provides an overview of virtual networking concepts in VMware vSphere, including:
- Types of virtual switch connections like virtual machine port groups and VMkernel ports
- Standard switches and distributed switches
- VLAN configurations and tagging
- Network adapter and switch port policies for security, traffic shaping, and failover
- Troubleshooting tools like ESXCLI, TCPDUMP and networking commands
This document provides instructions for integrating FreeRadius with Novell eDirectory to enable wireless authentication. It describes installing and configuring Novell OES Linux, applying necessary patches, installing FreeRadius and the RADIUS plugin for iManager, extending the eDirectory schema, generating certificates, and configuring FreeRadius, eDirectory, and clients. The goal is to set up wireless authentication against an eDirectory user directory using FreeRadius as the RADIUS server.
This document provides instructions for a lesson on securing network devices. It discusses concepts like router hardening, secure administrative access, and network monitoring techniques. It also outlines objectives like configuring a secure network perimeter and demonstrating secure router administration access. Finally, it provides details on implementing security features like banners, SSH, privilege levels, role-based CLI access, resilient configuration, and password recovery procedures.
The document discusses DHCP and configuring a DHCP server on a Cisco router. It explains that DHCP uses a client-server model where servers allocate addresses and clients request parameters. A router running Cisco IOS can function as a DHCP server, assigning addresses from pools and optional settings like DNS and default gateway. The DHCP configuration involves defining an address pool name, network/subnet, and starting/ending addresses. Cisco SDM can be used to both configure and monitor the DHCP server, and the show ip dhcp conflict command identifies address conflicts.
The document discusses router security and configuration. It covers common physical threats to routers, configuring passwords to restrict access, using login banners to display messages before authentication, and the differences between Telnet and SSH access. Telnet sends traffic as cleartext while SSH encrypts traffic, but SSH requires defining a domain, generating keys, and configuring usernames and passwords. Physical security, passwords, banners, and use of encrypted protocols like SSH are all recommended for securing router access and management.
Cisco SDM is an embedded web-based management tool for Cisco routers that provides wizards to simplify configuration without requiring CLI expertise. It supports various router platforms and IOS versions when configured with HTTP/HTTPS servers, a privilege level 15 user account, and SSH/Telnet access. Cisco SDM's main window includes menus, tools and wizards for LAN, WAN, firewall, VPN, security and QoS configuration.
The document provides an overview of virtual networking concepts in VMware vSphere, including:
- Types of virtual switch connections like virtual machine port groups and VMkernel ports
- Standard switches and distributed switches
- VLAN configurations and tagging
- Network adapter and switch port policies for security, traffic shaping, and failover
- Troubleshooting tools like ESXCLI, TCPDUMP and networking commands
This document provides instructions for integrating FreeRadius with Novell eDirectory to enable wireless authentication. It describes installing and configuring Novell OES Linux, applying necessary patches, installing FreeRadius and the RADIUS plugin for iManager, extending the eDirectory schema, generating certificates, and configuring FreeRadius, eDirectory, and clients. The goal is to set up wireless authentication against an eDirectory user directory using FreeRadius as the RADIUS server.
This document provides instructions for a lesson on securing network devices. It discusses concepts like router hardening, secure administrative access, and network monitoring techniques. It also outlines objectives like configuring a secure network perimeter and demonstrating secure router administration access. Finally, it provides details on implementing security features like banners, SSH, privilege levels, role-based CLI access, resilient configuration, and password recovery procedures.
The document discusses DHCP and configuring a DHCP server on a Cisco router. It explains that DHCP uses a client-server model where servers allocate addresses and clients request parameters. A router running Cisco IOS can function as a DHCP server, assigning addresses from pools and optional settings like DNS and default gateway. The DHCP configuration involves defining an address pool name, network/subnet, and starting/ending addresses. Cisco SDM can be used to both configure and monitor the DHCP server, and the show ip dhcp conflict command identifies address conflicts.
The document discusses router security and configuration. It covers common physical threats to routers, configuring passwords to restrict access, using login banners to display messages before authentication, and the differences between Telnet and SSH access. Telnet sends traffic as cleartext while SSH encrypts traffic, but SSH requires defining a domain, generating keys, and configuring usernames and passwords. Physical security, passwords, banners, and use of encrypted protocols like SSH are all recommended for securing router access and management.
The document discusses Cisco Unified Communications Manager (CUCM) database replication. It describes the database replication architecture and setup process, including defining nodes, replicating tables, and synchronizing data between publisher and subscriber nodes. Troubleshooting steps are provided for monitoring and repairing replication issues. The document also contains examples of CLI commands for managing database replication and answers common questions.
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...VMworld
VMworld 2013
Ninad Desai, VMware
Greg Herzog, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Citrix Provisioning Services (PVS) functionality targets network client machines that boot and connect to provisioning services servers under the guidelines specified in the PXE 2.1 specification. This in-depth technical session will provide a step-by-step detailed overview of the target boot process used by provisioning services versions 5.6.x and 6.x.
In this session you will learn about:
• Components and architecture of the PVS boot process
• Troubleshooting PVS boot issues
• Load balancing and failover technology
This document provides frequently asked questions about MikroTik RouterOS. It addresses questions about what RouterOS is, how to install and license it, how to configure features like networking, bandwidth management, wireless connectivity, and BGP routing. The document provides concise answers and instructions for tasks like upgrading RouterOS, recovering lost passwords, and troubleshooting common issues.
Unattended Deployment with Zero Touch Provisioning (ZTP)Cumulus Networks
Using Zero Touch Provisioning (ZTP) and a configuration management tool, you can bring up a production-ready switch in a matter of minutes — with little effort, scale your IT environment quickly, and reduce risk of mistakes.
Check out the on-demand webinar at: go.cumulusnetworks.com/ztp
This document discusses accessing and managing connections to remote network devices. It describes using Telnet to connect to remote devices, viewing active Telnet and SSH connections, suspending and resuming Telnet sessions, and closing Telnet sessions. It also covers using the ping and traceroute commands to test connectivity and trace the network path to remote devices.
The document discusses evolving network technologies including the Internet of Things (IoT), cloud computing, virtualization, and software-defined networking (SDN). It provides an overview of these topics and their importance in modern networks. Specifically, it describes the six pillars of IoT, types of cloud services, cloud deployment models, virtualization techniques, SDN components and controllers, and how policy-based SDN allows for simplified network management.
This document discusses wide area networks (WANs) and how they connect multiple local area networks (LANs) over long distances. It describes how WANs use services from carriers like phone and cable companies to transmit data across broad geographic areas. Various devices are used for WAN access, including routers, modems, and switches for technologies like Frame Relay and ATM. WANs primarily operate at the lower layers of the OSI model, layer 1 for physical connections and layer 2 for data encapsulation standards. They allow businesses and individuals to communicate remotely and share data across organizations over large geographic regions.
The document provides instructions for installing and using a Linux Developer's Kit for the bc635/637PCI-V2/PCIe Time and Frequency Processor. It includes steps for hardware installation, compiling and installing the driver and sample program, and using the sample pcidemo program to test device functionality and settings like time format, clock source, and operational mode. The pcidemo menu allows selecting and reading various register settings and time values for testing and demonstration purposes.
This document discusses characterizing an existing network in preparation for an upgrade. It outlines objectives like documenting the network, using Cisco resources to determine appropriate software and hardware, performing a wireless survey, and organizing collected data. The goals are to identify strengths and weaknesses, ensure accurate inventory information, understand network flows, and define requirements for a new design that overcomes existing limitations. Key steps involve diagramming physical and logical views, using Cisco tools to choose IOS versions and modules, measuring wireless signals, and specifying an overall upgrade aim based on current business and technical needs.
The document provides instructions for configuring IP addresses on a Nutanix cluster in 3 steps:
1. Use the web-based configuration tool to automatically configure IP addresses on Controller VMs and the cluster by inputting network settings.
2. Log into any Controller VM with SSH and start the Nutanix cluster.
3. Verify the cluster services start properly on each node to confirm the cluster is running.
This document discusses implementing high availability for server virtualization. It covers failover clustering options with Hyper-V, including requirements, implementation, and demonstrations. It also covers implementing high availability with Virtual Machine Manager (VMM) 2008 R2, including planning, host cluster configuration, and a demonstration of clustering in VMM. A lab exercise provides instructions for installing and configuring failover clustering, live migration, and host clustering in VMM.
This document provides an overview of configuring and managing the VMM library. It discusses the VMM library server and resources, hardware and guest operating system profiles, virtual machine templates, and high availability options. Demonstrations are provided on adding library servers and shares, creating profiles and templates, and configuring failover clustering for high availability of the library server.
This document provides an overview of implementing Remote Desktop Services (RDS) role services including the Remote Desktop Session Host, Remote Desktop Connection Broker, and Remote Desktop Virtualization Host roles. It covers planning, installing, and configuring these roles to provide users remote access to session-based desktops, applications, and virtual desktops from centralized servers. The document also includes demonstrations of configuring these roles and a lab exercise to implement RDS in a scenario.
This document provides an overview of managing virtual machines using Virtual Machine Manager 2008. It discusses creating and managing checkpoints for virtual machines. The first lesson covers tasks for operating and managing VMs like starting, stopping, pausing, saving state. It also discusses deploying, migrating, and storing VMs. The second lesson explains what a VM checkpoint is and considerations for using them. It includes demonstrations of creating, managing, and restoring checkpoints. The lab exercises guide learners through operating a VM, modifying properties, and managing checkpoints using VMM 2008.
This document provides an overview and summary of a training module on evaluating and planning for virtualization using Microsoft technologies. It covers evaluating current environments for virtualization suitability, planning server virtualization with Hyper-V, and managing virtual environments with System Center products. Key topics include virtualization challenges, modes, server and desktop virtualization, and planning storage, networks and availability for virtual machines.
This document discusses monitoring and reporting virtualization using System Center Virtual Machine Manager (VMM) 2008 R2 and System Center Operations Manager. It covers viewing and managing job status in VMM, integrating Operations Manager with VMM to enable reporting and monitoring capabilities, and configuring performance and resource optimization (PRO) in VMM using Operations Manager data. A lab is included to practice configuring the integration between VMM and Operations Manager and validating PRO configuration.
This document provides an overview and lessons on creating and configuring virtual hard disks and virtual machines in Hyper-V. It covers storage options for virtual machines, different types of virtual disks, virtual machine components, demonstrations on creating VMs and snapshots, and guidelines for planning and designing VMs for applications like SQL Server and Exchange Server.
The document discusses Cisco Unified Communications Manager (CUCM) database replication. It describes the database replication architecture and setup process, including defining nodes, replicating tables, and synchronizing data between publisher and subscriber nodes. Troubleshooting steps are provided for monitoring and repairing replication issues. The document also contains examples of CLI commands for managing database replication and answers common questions.
VMworld 2013: vCloud Hybrid Service Jump Start Part Two of Five: vCloud Hybri...VMworld
VMworld 2013
Ninad Desai, VMware
Greg Herzog, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Citrix Provisioning Services (PVS) functionality targets network client machines that boot and connect to provisioning services servers under the guidelines specified in the PXE 2.1 specification. This in-depth technical session will provide a step-by-step detailed overview of the target boot process used by provisioning services versions 5.6.x and 6.x.
In this session you will learn about:
• Components and architecture of the PVS boot process
• Troubleshooting PVS boot issues
• Load balancing and failover technology
This document provides frequently asked questions about MikroTik RouterOS. It addresses questions about what RouterOS is, how to install and license it, how to configure features like networking, bandwidth management, wireless connectivity, and BGP routing. The document provides concise answers and instructions for tasks like upgrading RouterOS, recovering lost passwords, and troubleshooting common issues.
Unattended Deployment with Zero Touch Provisioning (ZTP)Cumulus Networks
Using Zero Touch Provisioning (ZTP) and a configuration management tool, you can bring up a production-ready switch in a matter of minutes — with little effort, scale your IT environment quickly, and reduce risk of mistakes.
Check out the on-demand webinar at: go.cumulusnetworks.com/ztp
This document discusses accessing and managing connections to remote network devices. It describes using Telnet to connect to remote devices, viewing active Telnet and SSH connections, suspending and resuming Telnet sessions, and closing Telnet sessions. It also covers using the ping and traceroute commands to test connectivity and trace the network path to remote devices.
The document discusses evolving network technologies including the Internet of Things (IoT), cloud computing, virtualization, and software-defined networking (SDN). It provides an overview of these topics and their importance in modern networks. Specifically, it describes the six pillars of IoT, types of cloud services, cloud deployment models, virtualization techniques, SDN components and controllers, and how policy-based SDN allows for simplified network management.
This document discusses wide area networks (WANs) and how they connect multiple local area networks (LANs) over long distances. It describes how WANs use services from carriers like phone and cable companies to transmit data across broad geographic areas. Various devices are used for WAN access, including routers, modems, and switches for technologies like Frame Relay and ATM. WANs primarily operate at the lower layers of the OSI model, layer 1 for physical connections and layer 2 for data encapsulation standards. They allow businesses and individuals to communicate remotely and share data across organizations over large geographic regions.
The document provides instructions for installing and using a Linux Developer's Kit for the bc635/637PCI-V2/PCIe Time and Frequency Processor. It includes steps for hardware installation, compiling and installing the driver and sample program, and using the sample pcidemo program to test device functionality and settings like time format, clock source, and operational mode. The pcidemo menu allows selecting and reading various register settings and time values for testing and demonstration purposes.
This document discusses characterizing an existing network in preparation for an upgrade. It outlines objectives like documenting the network, using Cisco resources to determine appropriate software and hardware, performing a wireless survey, and organizing collected data. The goals are to identify strengths and weaknesses, ensure accurate inventory information, understand network flows, and define requirements for a new design that overcomes existing limitations. Key steps involve diagramming physical and logical views, using Cisco tools to choose IOS versions and modules, measuring wireless signals, and specifying an overall upgrade aim based on current business and technical needs.
The document provides instructions for configuring IP addresses on a Nutanix cluster in 3 steps:
1. Use the web-based configuration tool to automatically configure IP addresses on Controller VMs and the cluster by inputting network settings.
2. Log into any Controller VM with SSH and start the Nutanix cluster.
3. Verify the cluster services start properly on each node to confirm the cluster is running.
This document discusses implementing high availability for server virtualization. It covers failover clustering options with Hyper-V, including requirements, implementation, and demonstrations. It also covers implementing high availability with Virtual Machine Manager (VMM) 2008 R2, including planning, host cluster configuration, and a demonstration of clustering in VMM. A lab exercise provides instructions for installing and configuring failover clustering, live migration, and host clustering in VMM.
This document provides an overview of configuring and managing the VMM library. It discusses the VMM library server and resources, hardware and guest operating system profiles, virtual machine templates, and high availability options. Demonstrations are provided on adding library servers and shares, creating profiles and templates, and configuring failover clustering for high availability of the library server.
This document provides an overview of implementing Remote Desktop Services (RDS) role services including the Remote Desktop Session Host, Remote Desktop Connection Broker, and Remote Desktop Virtualization Host roles. It covers planning, installing, and configuring these roles to provide users remote access to session-based desktops, applications, and virtual desktops from centralized servers. The document also includes demonstrations of configuring these roles and a lab exercise to implement RDS in a scenario.
This document provides an overview of managing virtual machines using Virtual Machine Manager 2008. It discusses creating and managing checkpoints for virtual machines. The first lesson covers tasks for operating and managing VMs like starting, stopping, pausing, saving state. It also discusses deploying, migrating, and storing VMs. The second lesson explains what a VM checkpoint is and considerations for using them. It includes demonstrations of creating, managing, and restoring checkpoints. The lab exercises guide learners through operating a VM, modifying properties, and managing checkpoints using VMM 2008.
This document provides an overview and summary of a training module on evaluating and planning for virtualization using Microsoft technologies. It covers evaluating current environments for virtualization suitability, planning server virtualization with Hyper-V, and managing virtual environments with System Center products. Key topics include virtualization challenges, modes, server and desktop virtualization, and planning storage, networks and availability for virtual machines.
This document discusses monitoring and reporting virtualization using System Center Virtual Machine Manager (VMM) 2008 R2 and System Center Operations Manager. It covers viewing and managing job status in VMM, integrating Operations Manager with VMM to enable reporting and monitoring capabilities, and configuring performance and resource optimization (PRO) in VMM using Operations Manager data. A lab is included to practice configuring the integration between VMM and Operations Manager and validating PRO configuration.
This document provides an overview and lessons on creating and configuring virtual hard disks and virtual machines in Hyper-V. It covers storage options for virtual machines, different types of virtual disks, virtual machine components, demonstrations on creating VMs and snapshots, and guidelines for planning and designing VMs for applications like SQL Server and Exchange Server.
This document provides an overview and instructions for integrating Microsoft System Center Virtual Machine Manager 2008 R2 with Hyper-V R2. It discusses planning the VMM implementation, installing the VMM server and console, and managing hosts and host groups. Key topics covered include system requirements, new features in VMM 2008 R2, considerations for planning the VMM database and library, installing VMM components, and adding and configuring host groups.
This document provides an overview of backup and restore strategies for virtual machines using various Microsoft technologies. It discusses options for backing up virtual machines and the VMM database using Windows Server Backup, and implementing Data Protection Manager 2007 SP1 to back up the Hyper-V infrastructure. The document includes demonstrations of backing up and restoring virtual machines, the VMM database, and using DPM 2007 SP1 for virtual machine backups.
This document discusses configuring user roles and the VMM self-service portal. It covers creating user roles in VMM 2008 R2, installing and configuring the self-service portal, and considerations for implementing it. A demonstration shows how to create a user role and configure access to the portal. The goal is to allow specific groups like a research department to deploy and manage their own virtual machines.
This document discusses creating and managing virtual machines using System Center Virtual Machine Manager 2008 R2. It covers creating new VMs, converting physical servers to VMs, converting and migrating existing VMs, and cloning VMs. Demonstrations show how to create and place new VMs, deploy VMs from a library, perform conversions between VM formats, and migrate VMs between hosts and storage.
This document discusses maintaining software updates for offline virtual machines using the Offline Virtual Machine Servicing Tool. It provides an overview of the tool, how it works, and infrastructure requirements. It also covers configuring WSUS and the tool, creating and running servicing jobs, and includes demonstrations of key tasks.
Vitalization & HP TippingPoint
Virtual Firewall for Virtual machines, to validate the east west communications. As growth is tremendous in ES communication than legacy Datacenter architects more focus on North South traffic.
The document provides information on new networking features in Windows Server 2012 for Hyper-V including load balancing and failover capabilities using NIC Teaming, support for Single Root I/O Virtualization (SR-IOV) to directly assign network adapters to virtual machines, and Quality of Service bandwidth management. It defines these features and explains how NIC Teaming can provide redundancy, how SR-IOV can reduce latency and increase throughput, and how bandwidth management enables predictable performance for virtual machines.
This presentation is prepared for anyone that needs to basic information about Microsoft virtualization solutions and VDI solutions on Hyper-V, Remote protocols and compatible devices.
This document provides a guide for setting up a class environment using virtual machines for training on Kaspersky Security for Virtualization 3.0 Light Agent. It describes setting up domain controllers, workstations, Hyper-V servers, and various virtual machines. Key steps include installing operating systems, configuring networking and domains, deploying virtual desktop infrastructure and Remote Desktop Services, and installing Kaspersky Security Center and Protection Servers. The goal is to replicate an ABC company network with all necessary infrastructure elements for demonstrations in the training labs.
Security best practices for hyper v and server virtualisation [svr307]Louis Göhl
The document provides information on the Microsoft Assessment & Planning Toolkit 5.0 customer technology preview and Visual Studio Team System 2010 Lab Management Beta 2. It also covers topics like Windows Server 2008 R2 Hyper-V security best practices, Hyper-V networking configurations, Windows Server 2008 R2: SCONFIG, and Hyper-V best practices.
This document provides host system requirements and specifications for virtual machines in Workstation Pro. The host system must have a 64-bit processor that supports VT-x or AMD-V, at least 1GB RAM, and at least 1GB free disk space. Virtual machines support up to 8 virtual CPUs, 64GB RAM (8GB on 32-bit hosts), IDE and SCSI devices, and a variety of guest operating systems. The document provides detailed requirements and specifications.
Increase security, evolve your datacentre, and innovate faster with Microsoft Windows Server 2016—the cloud-ready operating system.
Learn more about:
» Windows Server 2016 as the 4th Era of Windows Server
» Editions & features
» Hardware requirements
» Features:
• Nano server
• Containers
• Hyper-V Hot-Add Virtual Hardware
• Nested Virtualization
- The document discusses the author's experience adopting Hyper-V for virtualization and shares lessons learned along the journey. It addresses common myths and fears about Hyper-V and compares it to VMware.
- Key topics covered include choosing server hardware, storage, networking, deploying Hyper-V hosts and VMs, management tools like System Center VMM 2008, and tips for evaluating virtualization solutions.
- The author encourages trying products like Hyper-V and VMware in a lab to document findings before production deployment and not trusting opinions without own hands-on experience.
- The FIWARE Lab provides cloud hosting and infrastructure as a service capabilities including compute, network, storage, and PaaS functionality.
- It utilizes OpenStack for core infrastructure services including compute (Nova), networking (Neutron), storage (Cinder, Swift), and identity (Keystone).
- The PaaS Manager allows users to define templates called Blueprints to deploy multi-tier applications and software stacks across the virtual infrastructure in an automated manner.
Presented by Michael NOEL, this session focuses on SharePoint Server 2010 farm virtualization, and how components of a SharePoint 2010 environment can be successfully virtualized.
SharePoint Saturday Vietnam 22/01/11 was sponsored by Officience. Visit http://www.officience.com/
VMworld Europe 204: Technical Deep Dive on EVO: RAIL, the new VMware Hyper-Co...VMworld
This document provides an overview of the VMware EVO:RAIL product. It begins with a disclaimer noting that features discussed are under development and subject to change. It then introduces EVO:RAIL as a converged infrastructure product that simplifies the deployment, configuration, and management of a software-defined datacenter through an appliance-based model. Key features highlighted include its use of trusted VMware technologies, prescribed 2U/4N hardware platform, automated scale-out capabilities, rapid time to value of deploying the first virtual machine, and non-disruptive upgrade process. Primary use cases are listed as remote/branch office, virtual desktop infrastructure, and private cloud. The document then discusses the origins and development of
This document discusses virtualizing a SharePoint 2010 farm. It begins by outlining the benefits of virtualization for SharePoint such as cost effectiveness, easy scaling, and separation of roles. It then provides guidelines for virtualizing SharePoint roles and SQL Server. Different virtualized farm architectures are presented, including ones that are cost effective without high availability and others that offer high availability. Memory limitations for virtual machine guests are also covered. The document demonstrates how to quickly provision a SharePoint farm using a template in System Center Virtual Machine Manager 2008 R2. It concludes with a discussion of Microsoft's virtualization licensing and support for third party hypervisors.
This document provides best practices for running SQL Server 2008 in a Hyper-V virtualization environment on Windows Server 2008. It discusses storage configuration recommendations, test methodologies used to evaluate performance overhead and scalability, and results from testing various SQL Server workloads including OLTP, reporting, and database operations. The testing showed that SQL Server 2008 can provide stable performance within a Hyper-V guest virtual machine when the workload is within the capacity of the virtual machine.
This document provides an overview of Microsoft's Virtual Academy training on Hyper-V and virtualization. It outlines an introductory first half focusing on Hyper-V infrastructure, networking, storage and management. After a meal break, the second half covers Hyper-V networking technologies like VMQ, SR-IOV and the extensible switch, as well as integration with System Center and other Microsoft virtualization products. Frequently asked networking questions are also addressed at a high level.
Top Issues For Microsoft Support For Windows ServerBlauge
The document provides resolutions for common issues customers experience with Hyper-V virtualization. It addresses problems such as virtual machines failing to start or load devices correctly, snapshots being lost, virtual machines disappearing, and backup or cluster configuration failures. Resolutions include enabling hardware virtualization in the BIOS, installing necessary drivers and service packs, and following steps documented in Microsoft Knowledge Base articles.
Material de la Charla de Virtualizacion de la Comunidad Windows del 10 de Setiembre del 2009
http://ecastrom.blogspot.com
http://comunidadwindows.org
ecastro@grupoasesor.net
Ing. Eduardo Castro Martinez, PhD
Microsoft SQL Server MVP
http://ecastrom.blogspot.com
http://mswindowscr.org
http://comunidadwindows.org
Comparação Hyper-V Windows 2008 R2 e Windows 2012grvalle_
Windows Server 2008 R2 Hyper-V and Windows Server 2012 Hyper-V both provide server virtualization capabilities. However, Windows Server 2012 Hyper-V provides more secure multitenancy with features like private virtual LANs, DHCP guard, and router guard. It also offers more flexibility with network virtualization, live migration improvements, storage migration, and PowerShell automation. Additionally, Windows Server 2012 Hyper-V is able to scale to larger configurations with support for more CPUs, memory, and virtual machines, features for performance like Dynamic Memory and NUMA support, and new storage and network features.
The document discusses the libvirt library which is used to interface with virtualization technologies in Ubuntu. It provides instructions on installing libvirt and related tools like virt-install and virt-manager. It also covers configuring networking and storage for virtual machines as well as managing virtual machines using tools like virsh.
VMWARE Professionals - Security, Multitenancy and FlexibilityPaulo Freitas
This document provides information about virtualization capabilities and features of Hyper-V 2012 and VMware vSphere 5.1. It discusses network virtualization, live migration capabilities like simultaneous migrations and storage migrations. Hyper-V 2012 supports many advanced features out of the box, while some VMware features require additional licenses or components. The document also provides configuration examples and diagrams to illustrate network virtualization and live migration workflows between Hyper-V hosts.
Configuration Manager 2007 focused on systems management and found user management challenging, while Configuration Manager 2012 embraces user-centric scenarios with a state-based design and full application lifecycle model. Configuration Manager 2012 also understands relationships between user systems and provides a management solution tailored for applications. It allows creating primary sites for scale and optimization of content distribution, inventory, and agent status across locations. Role-based administration provides data segmentation and configurable client agent settings so users only see necessary data.
Configurando Private Cloud con System Center 2012Juanchi_43
This document discusses how System Center provides an integrated platform for managing applications, services, and infrastructure across physical, virtual, and cloud environments. It allows for:
1) Standardizing application deployment using templates to ensure consistent configurations.
2) Creating cloud abstractions that allow managing infrastructure from Microsoft, VMware, and Citrix in a unified way.
3) Providing flexibility through delegation and control by allowing administrators to delegate self-service access and control resource utilization.
This document provides an overview of extending remote desktop services outside an organization using Remote Desktop Gateway (RD Gateway) and Remote Desktop Web Access (RD Web Access). It discusses configuring the RD Gateway to enable secure remote access to internal resources over the internet. It also covers installing and configuring RD Web Access to enable launching remote apps and desktops from a web interface. The document includes demonstrations of configuring these technologies.
This document provides an overview and agenda for a course on implementing and managing Microsoft server virtualization. It outlines the course objectives, schedule, modules, and labs. The course will cover topics such as planning virtualization, installing Hyper-V, creating and managing virtual machines, high availability, backup and recovery, and desktop virtualization using Remote Desktop Services. Students will gain hands-on experience working with Hyper-V and Virtual Machine Manager in labs modeling a virtualized server environment.
The document discusses modules 9 and 10 of a Microsoft Jump Start course on virtualization for VMware professionals. The modules cover virtual desktop infrastructure (VDI) architecture in two parts. They explain how VDI moves the operating system, applications, and data from the physical desktop to the data center, allowing users to access their desktops remotely through protocols like Remote Desktop.
020811 Introduction To Virtualization 279337Juanchi_43
Este documento proporciona una introducción a la virtualización de VMware. Explica las principales razones por las que los clientes eligen VMware, como la reducción de costos y riesgos. Describe las funciones clave de la arquitectura de VMware, incluida la partición, el aislamiento y el encapsulamiento de sistemas operativos y aplicaciones en máquinas virtuales portátiles. También cubre la instalación y configuración, y los próximos pasos de actualización a vSphere.
El documento describe el Marco de Operaciones de Microsoft (MOF), el cual provee guías para lograr alta disponibilidad, confiabilidad y soporte técnico en plataformas Microsoft. MOF se basa en modelos de procesos, equipos y riesgos, dividiendo las operaciones en personas, procesos y tecnología. El modelo de procesos consta de cuatro fases (Cambios, Funcionamiento, Soporte, Optimización) mientras que el modelo de equipo organiza roles funcionales. MOF busca administrar riesgos de forma proactiva a
El documento describe los diferentes procesos involucrados en la gestión de servicios de TI, incluyendo la gestión de incidentes, problemas, cambios, configuraciones, servicios, nivel de servicio y seguridad. Explica los roles y responsabilidades en la gestión de configuraciones y diagramas para representar las relaciones entre componentes de infraestructura.
1. Module 2 Installing and Configuring the Hyper-V R2 Server Role
2.
3.
4.
5. Installing Hyper-V R2 on a Windows Server 2008 Host Verify the status of the Hyper-V Virtual Machine Management Service by using the Services snap-in Hypervisor must be installed and running to start virtual machines
6. Tools Used to Manage the Hyper-V R2 Role Management tools: Virtual Machine Connection Remote Desktop Protocol Windows Vista SP2: Download available Windows 7: Download available Windows Server 2008 R2: Add feature using Server Manager
7.
8.
9.
10. Overview of Hyper-V R2 Settings Hyper-V Servers Listing of Virtual Machines Hyper-V Server Actions Virtual Machine Actions
11.
12. Overview of User Settings for Hyper-V R2 Default Folder Locations User Settings Keyboard Actions
13.
14. Overview of Virtual Network Settings for Hyper-V R2 Virtual Network Adapters Types of Network Connections
15.
16.
17.
18.
19.
20.
21.
22.
23.
Editor's Notes
Presentation: 60 minutes Lab: 30 minutes After completing this module, students will be able to: Explain how to install the Hyper-V™ Server Role. Explain how to configure Hyper-V settings and virtual networks.. Required materials To teach this module, you need the Microsoft® Office PowerPoint® file 10215A_02.ppt. Important: It is recommended that you use PowerPoint 2002 or a later version to display the slides for this course. If you use PowerPoint Viewer or an earlier version of PowerPoint, all the features of the slides might not be displayed correctly. Preparation tasks To prepare for this module: Read all of the materials for this module. Practice performing the demonstrations and the lab exercises. Work through the Module Review and Takeaways section, and determine how you will use this section to reinforce student learning and promote knowledge transfer to on-the-job performance. Make sure that students are aware that Course Companion CD has additional information and resources for the module. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Hyper-V runs on a x64 server platform and requires support of either AMD64 or Intel x64 processors with hardware-assisted virtualization support. Hyper-V does not support Itanium (IA-64) processors. For the virtual machines, Hyper-V supports both x32 and x64 systems as guest operating systems. Your system may require an update to the latest available BIOS version for your server hardware. Note: You can install the Hyper-V Role, but the virtual machines will not run if you disable virtualization. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
You must install, and begin running, the hypervisor before you can start any virtual machine. The Hyper-V Virtual Machine Management Service must be running to manage virtual machines. You can verify the status of the Hyper-V Virtual Machine Management Service by using the Services snap-in located in Administrative Tools. Two additional services are also started including the Hyper-V Image Management Service and the Hyper-V Networking Management Service. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Remote Server Administration Tools (RSAT) is one of several methods that you can use to manage Hyper-V servers remotely. To install the Remote Server Administration Tools, the host must be running Windows Server® 2008, Windows Vista® SP1 or newer, or Windows® 7. You perform the installation of the Remote Server Administration Tools on Windows Server 2008 by using the same method as you would to add the feature by using Server Manager. However, the installation on a Windows Vista SP1 requires downloading a separate package for installation (KB952627). Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Demonstration steps: Use Deployment Image Servicing and Management (DISM.exe) to install the Hyper-V server role 1. On NYC-Host1, ensure that the NYC-DC1 virtual machine is running. 2. Ensure that the NYC-SVR2 virtual machine is running. 3. Connect to NYC-SVR2. Log on to NYC-SVR2 as Contoso\\Administrator with the password Pa$$W0rd . 4. At the command prompt, type Dism /online /get-features /Format:table and press ENTER. This command displays the roles installed on the server. 5. At the command prompt, type Dism /online /enable-feature /featurename:Microsoft-Hyper-V and press ENTER. 6. Type Y to restart the computer. Use netsh to review the Windows Firewall configuration after the installation 1. After the server restarts, log on to NYC-SVR2 as Contoso\\Administrator with the password Pa$$W0rd . 2. At the command prompt, type netsh advfirewall firewall show rule name=all dir=in > rules.txt and press ENTER 3. At the command prompt, type notepad rules.txt. Scroll to the top of the Notepad file and show the Hyper-V firewall rules that have been enabled. 4. Close Notepad. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Demonstration steps: 1. On NYC-Host1, ensure that the NYC-DC1 virtual machine is running. 2. Ensure that the NYC-SVR2 and NYC-CL1 virtual machines are running. Use Connection Manager to connect to a Hyper-V Server 2008 R2 1. On NYC-Host1, click Start , point to Administrative Tools and then click Hyper-V Manager . 2. In Hyper-V Manager , right-click Hyper-V Manager , and then click Connect to Server . 3. Click Another computer , type NYC-SVR2 , and click OK . Verify that you can connect to the Hyper-V server. Install and use RSAT Note: The installation of the RSAT takes about 5 minutes. Consider starting the installation earlier in the module presentation. 1. Connect to NYC-CL1. Log on to NYC-CL1 as Contoso\\Administrator with the password Pa$$W0rd . 2. On NYC-CL1, open Windows Explorer and browse to E:\\Labfiles . 3. Double-click x86fre_GR MRSATX_MSU . In the Windows Update Standalone Installer dialog box, click Yes , and then click I accept . 4 . Wait for the installation to complete, and then click Close . 5. Close the Windows 7 Remote Administration window. 6. Click Start , click Control Panel , and then click Programs . In Programs , click Turn Windows features on and off . 7. In the Windows Features window, expand Remote Server Administration Tools , and then expand Role Administration Tools . 8. Check the check box next to Hyper-V Tools , and then click OK . 9. Click Control Panel , and then click System and Security . In System and Security , click Administrative Tools . 10. In the Administrative Tools window, double-click the Hyper-V Manager shortcut. 11. In the Hyper-V Manager , right-click Hyper-V Manager , and click Connect to Server . 12. In the Select Computer window, click Another Computer , and then in the box, type NYC-Host1 , and then click OK . Verify that you can connect to the Hyper-V server. Use RDP to manage the Hyper-V Server 2008 R2 1. On NYC-CLI, click Start . In the Search box, type mstsc.exe . 2. In the Remote Desktop Connection box, type LON-SRV3 , and then click Connect . 3. In the Windows Security window, type Contoso\\administrator for the user and Pa$$w0rd for the password. Click OK . Verify that you can connect to the Hyper V server. 4. In the NYC-Host1 window, click Start , and click Log off . Question : What tools would you use from a Windows 7 client to manage a Hyper-V Server 2008 R2? Answer : The Remote Server Administration Tools or Remote Desktop. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Cover each of the panes, their purpose, and what is found in each location. Let students know that later sections will provide more detail on these subjects. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Remind students that virtual machines can take a lot of space, especially if they use snapshots. You need to set permissions for the virtual machines so that they are not compromised. Placing the virtual machines on separate physical drives will improve performance. Move the location of the virtual hard disks, and configuration files and folders, to a separate drive, and then control them by using permissions. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Cover each of the panes, and discuss the following: Server settings for default locations. User settings for keyboard, mouse, user credentials, and the reset check box. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Keyboard On NYC-Host1, ensure that the Hyper-V Manager is open. Keyboard 1. In Hyper-V Manager , click NYC-HOST1 2. In the Actions pane, under NYC-HOST1 , click Hyper-V Settings . 3. Under User , click Keyboard . Describe the configuration options. Configure Mouse Release Keys Under User , click Mouse Release Key . Describe the configuration options. Manage User Credentials Under User , click User Credentials . Describe the configuration option. Reset Check Boxes Under User , click Reset Check Boxes . Describe the configuration option. Question: When might you choose to reset the Hyper-V check boxes? Answer: Most of the wizards in Hyper-V provide an introductory page that provides an overview of the task that the wizard will perform and often provides a link to the Help files for the specific task. On the introductory page, you have the option of selecting a check box that will result in the page not being displayed again. If you want to see the page after you have selected the check box, you can reset the check boxes. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Discuss the use of virtual networks. Also, discuss the Global Network Settings and the media access control (MAC) address ranges. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Demonstration steps: Create a new internal virtual network 1. On NYC-Host1, ensure that the NYC-DC1 virtual machine is running. 2. Ensure that the NYC-SVR2 and NYC-CL1 virtual machines are running. Create a new internal virtual network 1. On NYC-Host1, in Hyper-V Manager , in the Actions pane, click Virtual Network Manager . 2. In the Virtual Network Manger window, click Internal . Internal networks are used to communicate between the host computer and virtual machines on the host computer. 3. In the Name field, type Internal Network and then click OK . 4. Click Start , right-click Network , and click Properties . 5. On the Network and Sharing Center window, click Change adapter settings . 6. Right-click the Local Area Connection that is connected to the Internal Network, and click Properties . 7. Click Internet Protocol Version 4 (TCP/IPv4) , and click Properties . Verify that no IP address is configured and click Cancel . In order for the host computer to communicate with the virtual machines using this network, the network adapter would need to be configured with an IP address configuration that is able to communicate with the virtual machines. 8. Close the Local Area Connection dialog box, and close the Network Connections window. Configure the MAC address range 1. In Hyper-V Manager , in the Actions pane, click Virtual Network Manager . 2. In the Virtual Network Manger window, click MAC Address Range . 3. Beside Maximum, change the value of the fifth pane by one, and click OK . Modify an existing external virtual network 1. In Hyper-V Manager , in the Actions pane, click Virtual Network Manager . 2. In the Virtual Network Manger window, click External Network . 3. In the Virtual Network Properties pane, change the Notes information to External network connection used by all virtual machines .4. Click OK . Question : When would use a private, internal, and external network? Answer : You would use a private network when the virtual machines on the host need to communicate with other virtual machines on the host only. An internal network is used to allow the virtual machines to communicate with each other and with the host computer. External networks enable the virtual machines to communicate with other hosts on the network. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
You can configure three types of networks by using the Virtual Network Manager Tool: External: This network binds to a physical network adapter on the Hyper-V server, so that the virtual machine can access a physical network or can be accessed from within the corporate network or outside the corporate network Internal: This network is for use by the virtual machines that are running on the Hyper-V Server. Virtual machines on this network can communicate with each other and with the Parent Partition, but not external to the physical machine. Can be used for a training environment or to simulate a network. Private: Only virtual machines can use this network. There is no association with any physical network adapter in the Parent Partition. Used when the virtual machines will never access or be accessed by either the base system or beyond. Great for secure segments and R&D. The Virtual Network Manager also provides for Virtual Local Access Network (VLAN) isolation on External and Internal networks, but not on Private networks. If you are using an External network configuration, which maps to a physical network adapter in the Parent Partition, you must configure the physical network adapter for VLAN support on the physical network. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
The Hyper-V role of Windows Server 2008 can specify a VLAN ID for the virtual machine network connection and for the parent partition network connection. To enable VLAN ID for a parent partition, click to select the Enable virtual LAN identification check box to enable VLAN ID and to specify an ID. You specify an ID under Virtual Network Properties on the Virtual Network Manager page in the Hyper-V Manager. To enable VLAN ID for a virtual machine, access the properties of the virtual machine, and then select the virtual network adapter. Click to select the Enable virtual LAN identification check box to enable VLAN tagging and to specify an ID that you want the virtual machine connection to use. A virtual machine may have multiple network adapters, and all these adapters may use either the same or different VLAN IDs. Therefore, you must perform this action on each network adapter. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Demonstration steps: 1. On NYC-Host1, ensure that the NYC-DC1 virtual machine is running. 2. Ensure that the NYC-SVR2 and NYC-CL1 virtual machines are running. Configure an additional internal virtual network 1. In Hyper-V Manager , in the Actions pane, click Virtual Network Manager . 2. In the Virtual Network Manger window, click Internal , and then click Add . 3. In the New Virtual Network pane, under Name , type Internal-One , and then click OK . Configure different VLAN IDs for each internal virtual network 1. In Hyper-V Manager , in the Actions pane, click Virtual Network Manager . 2. In the Virtual Networks window, click Internal-One . 3. In the New Virtual Network pane, check the Enable virtual LAN identification for management operating system box. 4. Change the VLAN ID to 3 , and then click OK . 5. In Hyper-V Manager , in the Actions pane, click Virtual Network Manager . 6. In the Virtual Networks window, click Internal Network . 7. In the New Virtual Network pane, check the Enable virtual LAN identification for management operating system box. 8. Change the VLAN ID to 4 , and then click OK . 9. In the New Virtual Network pane, under Name , type Internal-One , and then click OK . Show that two virtual machines cannot communicate with each other 1. Connect to NYC-CL1. Open a command prompt, type Ping NYC-DC1 and press ENTER. Verify that NYC-CL1 is able to communicate with NYC-DC1. 2. In Hyper-V Manager , right-click NYC-CL1, and click Settings . 3. In Settings for NYC-CL1 , click the Network Adapter . In the Network list, click InternalOne . Click OK . 4. In Hyper-V Manager , right-click NYC-DC1, and click Settings . 5. In Settings for NYC-CL1 , click the Network Adapter . In the Network list, click Internal Network . Click OK . 6. On NYC-CL1, at the command prompt, type Ping NYC-DC1 and press ENTER. Verify that NYC-CL1 is not able to communicate with NYC-DC1 7. Change the network settings for both NYC-DC1 and NYC-CL1 to use the External Network again. Question : When would you use VLAN ID on a network? Answer : You use a VLAN ID on a network when you have more than one VLANs. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Lab: Implementing Inheritance (45 minutes) Lab Goal: Students will create an inheritance structure that includes polymorphic methods. Students also will use the inheritance structure to implement the business scenario. Lab Objectives: Install the Hyper-V Role. Determine configuration settings for the virtual network based on organizational requirements. Configure virtual network settings using Virtual Network Manager. Installing (remote management tools). Exercise 1: Installing the Hyper-V Role The student will install the Hyper-V Role. Exercise 2: Determining Virtual Network Configuration Settings The student will determine configuration settings for the virtual network. Exercise 3: Configuring Virtual Network Settings Using Virtual Network Manager The student will configure virtual network settings by using Virtual Network Manager. Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Module 2: Installing and Configuring the Hyper-V R2 Server Role Implementing and Managing Microsoft Server Virtualization
Review Questions 1. What are the hardware and BIOS prerequisites to install the Hyper-V Role? Answer: 64-bit hardware, hardware DEP, and hardware-assisted virtualization. 2. What are the differences between External, Internal, and Private network connection types? Answer: You use an external connection type to communicate beyond the virtual machine and the host. An external connection type gives access to the physical network. An internal allows the virtual machines and the host operating system to communicate. A private network allows only the virtual machines to communicate with each other. 3. Where is the option to change the location of the .VHD and virtual machines? Answer: It is on the Server Settings tab. 4. What does it mean when the mouse pointer displays as a small dot in a virtual machine window? Answer: The mouse has not been released from the virtual machine. Implementing and Managing Microsoft Server Virtualization Module 2: Installing and Configuring the Hyper-V R2 Server Role