Lesson 8: Configuring Hyper-V MOAC 70-687: Configuring Windows 8.1.

Slides:



Advertisements
Similar presentations
Lesson 8: Creating and Configuring Virtual Machine Storage
Advertisements

Lesson 17: Configuring Security Policies
MCITP Guide to Microsoft Windows Server 2008 Server Administration (Exam #70-646) Chapter 11 Windows Server 2008 Virtualization.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
9.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 9: Installing and Configuring.
Lesson 4: Configuring File and Share Access
Lesson 7: Creating and Configuring Virtual Machine Settings
Lesson 1: Configuring Network Load Balancing
Lesson 11: Deploying and Configuring the DHCP Service
Lesson 5: Configuring Print and Document Services
Lesson 19: Configuring Windows Firewall
Lesson 16: Creating Group Policy Objects
Lesson 2: Configuring Servers
Lesson 18: Configuring Application Restriction Policies
Lesson 9: Creating and Configuring Virtual Networks
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Microsoft Load Balancing and Clustering. Outline Introduction Load balancing Clustering.
Elad Hayun Agenda What's New in Hyper-V 2012 Storage Improvements Networking Improvements VM Mobility Improvements.
Your Interactive Guide to the Digital World Discovering Computers 2012.
About the Presentations The presentations cover the objectives found in the opening of each chapter. All chapter objectives are listed in the beginning.
Hands-On Microsoft Windows Server 2008
Hands-On Virtual Computing
“Copyright © 2001 John Wiley & Sons, Inc. All rights reserved. Reproduction or translation of this work beyond that permitted in Section 117 of the 1976.
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 7: Domain Name System.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
By Rashid Khan Lesson 10-From Here to There: Remote Installation of the Windows XP Professional Client.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Three Configuring Windows Server 2008 Storage.
Implementing Hyper-V®
Lesson 12: Working with Code-editing Features Introduction to Adobe Dreamweaver CS6 Adobe Certified Associate: Web Communication using Adobe Dreamweaver.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Four Windows Server 2008 Remote Desktop Services,
Lesson 3: Migrating and Configuring User Data
Lesson 11: Configuring and Maintaining Network Security
Lesson 23: Configure File Recovery
Lesson 13: Configuring Shared Resources
Lesson 12: Configuring Remote Management
Lesson 2: Installing Windows 8.1
5 Lesson 5: Installing and Configuring Desktop Applications and Windows Store Apps MOAC : Configuring Windows 8.1.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Lesson 20: Managing Local Storage MOAC : Configuring Windows 8.1.
Alessandro Cardoso, Microsoft MVP Creating your own “Private Cloud” with Windows 10 Hyper- V WIN443.
Hands-On Virtual Computing
Cloud Computing Lecture 5-6 Muhammad Ahmad Jan.
Lesson 18: Configuring Security for Mobile Devices MOAC : Configuring Windows 8.1.
Lesson 6: Controlling Access to Local Hardware and Applications
Course 03 Basic Concepts assist. eng. Jánó Rajmond, PhD
Lesson 4: Working with Disks and Devices MOAC : Configuring Windows 8.1.
1 Remote Installation Service Windows 2003 Server Prof. Abdul Hameed.
Lesson 14: Configuring File and Folder Access MOAC : Configuring Windows 8.1.
Using Virtualization in the Classroom
DISCOVERING COMPUTERS 2018 Digital Technology, Data, and Devices
Lesson 19: Configuring and Managing Updates
Chapter 6: Securing the Cloud
Lesson 7: Creating and Configuring Virtual Machine Settings
Lesson 8: Creating and Configuring Virtual Machine Storage
Lesson 5: Configuring Print and Document Services
Lesson 22: Configuring System Recovery
Lesson 6: Configuring Servers for Remote Management
Lesson 4: Configuring File and Share Access
Systems Analysis and Design With UML 2
CONFIGURING HARDWARE DEVICE & START UP PROCESS
Systems Analysis and Design 5th Edition Chapter 8. Architecture Design
Lesson #7 MCTS Cert Guide Microsoft Windows 7, Configuring Chapter 7 Configuring Devices and Updates.
HC Hyper-V Module GUI Portal VPS Templates Web Console
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
Chapter 15 – Part 2 Networks The Internal Operating System
Lesson 8: Configuring IP Settings MOAC : Configuring Windows Devices.
Windows Virtual PC / Hyper-V
Copyright © 2000 John Wiley & Sons, Inc. All rights reserved
How to install and manage exchange server 2010 OP Saklani.
06 | SQL Server and the Cloud
Presentation transcript:

Lesson 8: Configuring Hyper-V MOAC : Configuring Windows 8.1

Overview Exam Objective 2.5: Configure Hyper-V o Create and configure virtual machines, including integration services o Create and manage checkpoints o Create and configure virtual switches o Create and configure virtual disks o Move a virtual machine’s storage © 2013 John Wiley & Sons, Inc. 2

Creating Virtual Machines with Hyper-V Machine Lesson 8: Configuring Hyper-V © 2013 John Wiley & Sons, Inc.3

Hyper-V Hyper-V provides the capability to share a computer’s hardware with one or more operating systems that run inside the same computer. The technology that allows this to happen is called a Hypervisor. The hypervisor keeps the host or parent operating system separate from all the virtual machines installed. © 2013 John Wiley & Sons, Inc. 4

Installing Hyper-V The hypervisor requires the 64-bit operating system to be able to act as a host for other 64-bit operating systems such as Windows Server 2012 R2. © 2013 John Wiley & Sons, Inc. 5

Install Hyper-V Installing Hyper-V © 2013 John Wiley & Sons, Inc.6

Exploring Hyper-V Manager Hyper-V Manager is a Microsoft Management Console (MMC) snap-in application that allows management of the Hypervisor on a local or remote machine. The Hyper V Manager snap-in consists of five areas or Panes. © 2013 John Wiley & Sons, Inc. 7

Exploring Hyper-V Manager Hyper-V Manager © 2013 John Wiley & Sons, Inc.8

Using Hyper-V Manager Hyper-V Hosts – Provides local and remote connections to any number of Hyper-V host computers. The authenticated user and the computer account must have permissions to connect to the remote hosts. Virtual Machines - Lists all of the virtual machines contained in the currently selected Hyper-V host. Actions - The top section relates to the Hyper-V host computer, and the bottom relates to the currently selected virtual machine. All host networking and settings are configured in this pane. Checkpoints - Contains all saved checkpoints of the currently selected virtual machine. VM tabs – Provides a view of the currently selected virtual machine, with each tab showing a different area of functionality. The Replication tab appears only if the Hyper-V host and the virtual machine are enabled for replication using Hyper-V replica. Summary, Memory, and Networking tabs are always available. Double clicking on the Virtual Machine image connects the user to the VM. © 2013 John Wiley & Sons, Inc. 9

Creating a Virtual Machine Using Hyper-V Manager A virtual machine consists of: o A virtual hard disk o Some XML configuration files o Any snapshots created in the environment when in use All of these can be created and managed using Hyper-V Manager. © 2013 John Wiley & Sons, Inc. 10

Creating a Virtual Machine Using Hyper-V Manager The New Virtual Machine Wizard © 2013 John Wiley & Sons, Inc.11

Creating Generation 1 and Generation 2 VMs Generation 1 VMs are designed to emulate the hardware found in a typical computer, and to do this, they use drivers for specific devices, such as an AMI BIOS, an S3 graphics adapter, and an Intel chipset and network adapter. Generation 1 VMs that you create with Windows 8.1 Hyper-V are completely compatible with all previous Hyper-V versions. © 2013 John Wiley & Sons, Inc. 12

Creating Generation 1 and Generation 2 VMs Generation 2 VMs use synthetic drivers and software-based devices instead, and provide advantages that include the following: o UEFI boot - Instead of using the traditional BIOS, Generation 2 VMs support Secure Boot, using the Universal Extensible Firmware Interface (UEFI), which requires a system to boot from digitally signed drivers and enables them to boot from drives larger than 2 TB, with GUID partition tables. o SCSI disks - Generation 2 VMs omit the IDE disk controller used by Generation 1 VMs to boot the system and use a high-performance virtual SCSI controller for all disks, enabling the VMs to boot from VHDX files and support hot disk adds and removes. © 2013 John Wiley & Sons, Inc. 13

Configuring Virtual Machine Settings You must work through the Virtual Machine settings to ensure the virtual machine has the correct operating system and hardware characteristics for your desired purpose. © 2013 John Wiley & Sons, Inc. 14

Configuring Virtual Machine Settings The Settings dialog box for a virtual machine © 2013 John Wiley & Sons, Inc.15

Configuring Guest Integration Services In some cases, certain Hyper-V guest operating system features do not function properly using the OS’s own device drivers. Hyper-V, therefore, includes a software package called guest integration services, which Hyper-V installs on your virtual machines for compatibility purposes. © 2013 John Wiley & Sons, Inc. 16

Configuring Guest Integration Services Some of the functions provided by the guest integration services package are as follows: o Operating system shutdown o Time synchronization o Data Exchange o Heartbeat o Backup o Guest services © 2013 John Wiley & Sons, Inc. 17

Configuring Guest Integration Services The Windows 8.1, Windows 8, Windows Server 2012 R2, and Windows Server 2012 operating systems have the latest guest integration services software built in © 2013 John Wiley & Sons, Inc. 18

Configuring Guest Integration Services Integration Services settings for a virtual machine © 2013 John Wiley & Sons, Inc.19

Managing Checkpoints Lesson 8: Configuring Hyper-V © 2013 John Wiley & Sons, Inc.20

Checkpoints Hyper-V provides a feature that enables a user to take a point-in-time image of the current settings and configuration and even the system state of a virtual machine. This image is called a checkpoint and is useful in testing changes to a setup or installation of software. If the changes fail, there is no need to uninstall or redo the actions; the ability to apply any checkpoint at any time enables quick and easy testing and reverting. Checkpoint data files are stored as.avhd files. © 2013 John Wiley & Sons, Inc. 21

Checkpoint Functions Settings - Opens the Virtual Machine Settings dialog for the particular checkpoint. A checkpoint file saves the hardware settings for a virtual machine and maintains them separately from the other checkpoints. Apply - Applies the chosen checkpoint and loads the virtual machine in the state that was present when it was created Rename - Enables you to give the chosen checkpoint a meaningful and relevant name. Delete Checkpoint - Deletes all the checkpoint files. Delete Checkpoint Subtree - Removes the whole checkpoint subtree. Help - Provides basic Hyper-V help screens. © 2013 John Wiley & Sons, Inc. 22

Managing Virtual Switches Lesson 8: Configuring Hyper-V © 2013 John Wiley & Sons, Inc.23

Understanding Virtual Switches The Hyper-V Virtual Switch is a software- based layer-2 network switch that is available in Hyper-V Manager when you install the Hyper-V server role. The switch includes the capability to connect virtual machines to both virtual networks and the physical network. In addition, Hyper-V Virtual Switch provides policy enforcement for security, isolation, and service levels. © 2013 John Wiley & Sons, Inc. 24

Understanding Virtual Switches ARP/ND Poisoning (spoofing) protection - Provides protection against a malicious virtual machine using Address Resolution Protocol (ARP) spoofing to steal IP addresses from other virtual machines. Provides protection against attacks that can be launched for IPv6 using Neighbor Discovery (ND) spoofing. DHCP Guard protection - Protects against a malicious virtual machine representing itself as a Dynamic Host Configuration Protocol (DHCP) server for man-in-the-middle attacks. Port Access Control Lists (ACLs) - Provides traffic filtering based on Media Access Control (MAC) or Internet Protocol (IP) addresses/ranges, which enables you to set up virtual network isolation. © 2013 John Wiley & Sons, Inc. 25

Understanding Virtual Switches Trunk mode to a Virtual Machine - Enables administrators to set up a specific VM as a virtual appliance, and then direct traffic from various VLANs to that virtual machine. Network traffic monitoring - Enables administrators to review traffic that is traversing the network switch. Isolated (private) VLAN - Enables administrators to segregate traffic on multiple VLANs to more easily establish isolated tenant communities. © 2013 John Wiley & Sons, Inc. 26

Virtual Switch Types Three types of virtual switches: o External – Connects directly to a physical NIC and the virtual machines can communicate with the external network as well as the host computer (if configured to allow that option). o Internal – Allows the virtual machines to communicate together and with the host computer. o Private – Allows the virtual machines to communicate together but not to communicate with the host computer. © 2013 John Wiley & Sons, Inc. 27

Create and Configure a Virtual Switch Virtual Switch Manager © 2013 John Wiley & Sons, Inc.28

Create and Configure a Virtual Switch Virtual Switch Properties © 2013 John Wiley & Sons, Inc.29

Creating Virtual Hard Disks Lesson 8: Configuring Hyper-V © 2013 John Wiley & Sons, Inc.30

Virtual Hard Disks (VHD) For a virtual machine to function, it must have one or more virtual hard disks (VHDs). VHDs are files that reside on the host computer and contain either an operating system or data to be used by a virtual machine. In addition, it is possible to boot a physical machine from a VHD if it is running the Windows 7 or 8/8.1 operating system. There are a number of different types and formats of VHD that can be used in a Hyper-V solution. © 2013 John Wiley & Sons, Inc. 31

Understanding Virtual Hard Disk Formats Virtual hard disks can be one of two different formats: VHD—A VHD file can be as large as 2040 GB (just under 2TB) in size and was the original format used in the predecessor to Hyper-V (Virtual PC). VHDX —A new more efficient VHD format that can be as large as 64TB. VHDX disks have many advanced features. © 2013 John Wiley & Sons, Inc. 32

Create Virtual Hard Disks Displaying Virtual Hard Disk Format Choice © 2013 John Wiley & Sons, Inc.33

Managing and Configuring Virtual Hard Disks After creating a new VHD, you can attach the hard disk to a virtual machine through the settings of that VM. A hard disk can be attached to an IDE controller or a SCSI controller. The latter maybe attached without switching the VM off, which is a useful facility. It is also possible to attach many more hard disks to a SCSI controller than to an IDE. © 2013 John Wiley & Sons, Inc. 34

Managing and Configuring Virtual Hard Disks Inspecting a virtual hard disk © 2013 John Wiley & Sons, Inc.35

Move Virtual Machine Storage The Choose Options for Moving Storage page © 2013 John Wiley & Sons, Inc.36

Moving Virtual Machine Storage Live Migration is a Hyper-V feature that enables you to move a virtual hard disk file to another location without shutting down the virtual machine. When you move a virtual machine, Hyper-V creates a mirror image of the VHD and, optionally, the VM configuration files as well, and then switches from using the original copy to the mirror images. You can leave the original image in place, for use as a backup, or you can remove it to reclaim the disk space. © 2013 John Wiley & Sons, Inc. 37

Lesson Summary Hyper-V virtualization technology has been providing virtualized server environments since Windows Server Hyper-V provides the capability to share a computer’s hardware with one or more operating systems that run inside the same computer. The technology that enables this to happen is called a hypervisor. Hyper-V Manager is a Microsoft Management Console (MMC) snap-in application that enables management of the Hypervisor on a local or remote machine. © 2013 John Wiley & Sons, Inc. 38

Lesson Summary A virtual machine consists of a virtual hard disk, some XML configuration files, and any checkpoints created in the environment when in use. All of these can be created and managed using Hyper-V Manager. Dynamic Memory is a Hyper-V feature that treats memory as a shared resource that can be reallocated automatically among running virtual machines based on changes in memory demand and values that you specify. Hyper-V provides a software-based Layer 2 network switch. This switch allows virtual machines to connect to external networks and virtual networks on Hyper-V hosts. © 2013 John Wiley & Sons, Inc. 39

Lesson Summary Hyper-V provides a feature that enables a user to take a point-in-time image of the current settings and configuration and even the system state of a virtual machine. For a virtual machine to function, it must have one or more Virtual Hard Disks (VHDs). VHDs are files that reside on the host computer and contain either an operating system or data to be used by a virtual machine. Virtual hard disks can be one of two different formats: VHD—A VHD file can be as large as 2040 GB (just under 2TB) in size and was the original format used in the predecessor to Hyper-V (Virtual PC). VHDX—A new more efficient VHD format that can be as large as 64TB. VHDX disks have many advanced features. © 2013 John Wiley & Sons, Inc. 40

Copyright 2013 John Wiley & Sons, Inc.. All rights reserved. Reproduction or translation of this work beyond that named in Section 117 of the 1976 United States Copyright Act without the express written consent of the copyright owner is unlawful. Requests for further information should be addressed to the Permissions Department, John Wiley & Sons, Inc.. The purchaser may make back-up copies for his/her own use only and not for distribution or resale. The Publisher assumes no responsibility for errors, omissions, or damages, caused by the use of these programs or from the use of the information contained herein.