Windows Server 2012 On Premises Servers

Slides:



Advertisements
Similar presentations
Auditing Microsoft Active Directory
Advertisements

COMP091 OS1 Active Directory. Some History Early 1990s Windows for Workgroups introduced peer-to-peer networking based on SMB over netbios (tcp/ip still.
Microsoft Dynamics AX Technical Conference 2013
What to expect.  Linux  Windows Server (2008 or 2012)
Introduction to Active Directory
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
3.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 3: Introducing Active Directory.
Understanding Active Directory
Hands-On Microsoft Windows Server 2008
Hands-On Microsoft Windows Server 2008
Virtual IP Network Windows Server 2012 Windows 08 Dual Subnets.
Overview of Active Directory Domain Services Lesson 1.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Session 6 Windows Platform Dina Alkhoudari. Learning Objectives What is Active Directory Logical components of active directory Physical components of.
Designing Active Directory Child Domain Sainath K.E.V Directory Services MVP 5/Aug/2015.
Windows Server 2008 Chapter 4 Last Update
Review. 2 Main Areas Client and Server / Active Directory.
MCTS Guide to Configuring Microsoft Windows Server 2008 Active Directory Chapter 3: Introducing Active Directory.
Implementing DNS Module D 7: Implementing DNS
Migrating Business Apps to Windows Azure Marc Müller Principal Consultant, 4tecture GmbH
Working with domains and Active Directory
Active Directory Harikrishnan V G 18 March Presentation titlePage 2 Agenda ► Introduction – Active Directory ► Directory Service ► Benefits of Active.
Active Directory Maryam Izadi. Topics Covered NT Vs 2000/2003 Active Directory LDAP MMC.
Remote Desktop Services in Windows Server 2008 R2.
1 Windows 2008 Configuring Server Roles and Services.
DCIM319. NIC Management Storage Migration Cluster NIC.
Windows Azure Pack Service Provider Foundation 2012 R2 Windows Server 2012 R2 Virtual Machine Manager 2012 R2 Damian Flynn MVP System Center
Module 1: Introduction to Active Directory Infrastructure
GPO - WINDOWS SERVER AGENDA: Introduction Group Policy Overview Types of Group Policies/Objects Associated Technologies How to implement.
 Identify Active Directory functions and Benefits.  Identify the major components that make up an Active Directory structure.  Identify how DNS relates.
Page 1 Active Directory and DNS Lecture 2 Hassan Shuja 09/14/2004.
Introduction to Active Directory Domain Services
Module 1: Implementing Active Directory ® Domain Services.
Module 12: Implementing an Active Directory ® Domain Services Infrastructure.
Hands-On Microsoft Windows Server 2008 Chapter 4-Part 1 Introduction to Active Directory and Account Manager.
Module 3 Creating Groups and Organizational Units.
3 TIME IT CAPACITY Actual Load Allocated IT-capacities Too Much Power Not Enough Power Load Forecast.
CLOUD COMPUTING. What is cloud computing ??? What is cloud computing ??? Cloud computing is a general term for anything that involves delivering hosted.
SERVER I SLIDE: 3. SERVER I Topic for tomorrow: Chapter 3: Configuring Hyper-V ■■ Objective 3.1: Create and configure virtual machine settings (Group.
Introduction to Active Directory in Windows 2000/2003.
Installing a Domain Controller
Introduction to Active Directory
Active Directory CNS 4650 Fall 2004 Rev. 2. Active Directory Introduced with Windows 2000 Server X.500 based Can emulate NT-style network environments.
3 TIME IT CAPACITY Actual Load Allocated IT-capacities Too Much Power Not Enough Power Load Forecast.
Hussain Ali Department of Computer Engineering KFUPM, Dhahran, Saudi Arabia Active Directory.
Active Directory. Computers in organizations Computers are linked together for communication and sharing of resources There is always a need to administer.
Module 8: Planning for Windows Server 2008 Active Directory Services.
Labs. Session 1 Lab 1: Designing an Active Directory Forest Infrastructure in Windows Server 2008 Exercise 1: Designing an Active Directory Forest Exercise.
Windows 2003 Architecture, Active Directory & DNS Lecture # 3 Hassan Shuja 02/14/2006.
MCSE: Windows Server 2003 Active Directory Planning, Implementation, and Maintenance Study Guide, Second Edition (70-294) Chapter 1: Overview of the Active.
Workload Active directory BizTalk server DHCP DNS Dynamics Exchange server Fax server IIS Lync server RDS SharePoint server SQL System Center Visual.
Microsoft Exam.
Overview of Active Directory Domain Services Lesson 1.
Microsoft Exam
Implementing Active Directory Domain Services
(ITI310) SESSIONS 6-7-8: Active Directory.
Microsoft Braindumps Questions Answers
MrCerts Practice Test
MCSA VCE
Active Directory Stored collection of information about objects
Unit 3 NT1330 Client-Server Networking II Date: 1/6/2016
MICROSOFT Upgrading Your Skills to MCSA: Windows Server 2016.
CIS 332 Competitive Success-- snaptutorial.com
CIS 332 Education for Service-- snaptutorial.com
CIS 332 Teaching Effectively-- snaptutorial.com
Network Administration
Windows Active Directory Environment
ACTIVE DIRECTORY An Overview.. By Karan Oberoi.
Presentation transcript:

Windows Server 2012 On Premises Servers Today everything seems to be about the cloud, cloud computing and saving it to the cloud. We even see applications as a service, rent an app when needed, turn it off when you don’t. With Everyone moving to the cloud, why do I need to deploy Windows Server 2012 locally? The answer to this question is a hot topic among System and Network Administrators. If the Data pipe between the cloud and the local area network is compromised business can be disrupted or hacked. Security and High Availability MUST be considered when deploying a server in production. Not every service and application used daily should be hosted in the cloud. Locally-deployed servers still will continue to be the backbone of an organizational network for the foreseeable future. Because of this Windows Server 2012 was designed for cloud computing, private and public, as well as maintaining the traditional local on premise solution. No one solution can fit all the possibilities so several versions of the Windows Server 2012 have been developed. Each edition with its strengths, depending on the situation.

vs. Windows Server 2012 C L O U D SaaS On Premises Servers On Premise Server Today everything seems to be about the cloud, cloud computing and saving it to the cloud. We even see applications as a service, rent an app when needed, turn it off when you don’t. With Everyone moving to the cloud, why do I need to deploy Windows Server 2012 locally? The answer to this question is a hot topic among System and Network Administrators. If the Data pipe between the cloud and the local area network is compromised business can be disrupted or hacked. Security and High Availability MUST be considered when deploying a server in production. Not every service and application used daily should be hosted in the cloud. Locally-deployed servers still will continue to be the backbone of an organizational network for the foreseeable future. Because of this Windows Server 2012 was designed for cloud computing, private and public, as well as maintaining the traditional local on premise solution. No one solution can fit all the possibilities so several versions of the Windows Server 2012 have been developed. Each edition with its strengths, depending on the situation.

Windows Server 2012 What is Cloud Computing? So what is Cloud Computing. When we say Cloud we refer to “not on premise”, i.e. not on the LAN. If we are hosting a production environment off site, handling Backup and Disaster Recovery options for the LAN, or just supplying offsite data storage the data path is leaving the local environment. This is cloud computing. It can be owned and operated by our company, this is call a “Private Cloud”. Private clouds are cloud infrastructure that is dedicated to a single organization. Private clouds may be hosted by the organization itself, or may be hosted by a cloud services provider who ensures that the cloud services are not shared with any other organization. Or we can purchase services from a third party, this is a “Public Cloud”. A public cloud is a cloud service that is hosted by a cloud services provider, and is made available for public use. The most common forms of cloud computing are: ·         Infrastructure as a Service (IaaS). With this form of cloud computing, you run a full virtual machine or completely hosted site in the cloud. The cloud hosting provider manages the hypervisor platform, and you manage the virtual machine that runs on the cloud provider’s infrastructure. Windows Azure™ Compute is an example of IaaS. You can run Windows Server 2012 as a virtual machine in an IaaS cloud, or the operating system can be the host to the virtual machines in an IaaS cloud. Windows Server 2012 has many improvements with it’s Hyper-V solution. ·         Platform as a Service (PaaS). With PaaS, the cloud hosting provider provisions you with a particular platform. For example, a provider may allow you to host databases. You manage the database itself, and the cloud hosting provider hosts the database server. SQL Azure™ is an example of Platform as a Service. ·         Software as a Service (SaaS). The cloud hosting provider hosts your application and the entire infrastructure that supports that application. You purchase and run a software application from a cloud hosting provider. Windows InTune™ and Microsoft Office 365 are examples of SaaS.

Windows Server 2012 host built consume “SaaS” “IaaS” “PaaS” What is Cloud Computing? “SaaS” “IaaS” “PaaS” Infrastructure-as-a-Service host Platform-as-a-Service built Software-as-a-Service consume So what is Cloud Computing. When we say Cloud we refer to “not on premise”, i.e. not on the LAN. If we are hosting a production environment off site, handling Backup and Disaster Recovery options for the LAN, or just supplying offsite data storage the data path is leaving the local environment. This is cloud computing. It can be owned and operated by our company, this is call a “Private Cloud”. Private clouds are cloud infrastructure that is dedicated to a single organization. Private clouds may be hosted by the organization itself, or may be hosted by a cloud services provider who ensures that the cloud services are not shared with any other organization. Or we can purchase services from a third party, this is a “Public Cloud”. A public cloud is a cloud service that is hosted by a cloud services provider, and is made available for public use. The most common forms of cloud computing are: ·         Infrastructure as a Service (IaaS). With this form of cloud computing, you run a full virtual machine or completely hosted site in the cloud. The cloud hosting provider manages the hypervisor platform, and you manage the virtual machine that runs on the cloud provider’s infrastructure. Windows Azure™ Compute is an example of IaaS. You can run Windows Server 2012 as a virtual machine in an IaaS cloud, or the operating system can be the host to the virtual machines in an IaaS cloud. Windows Server 2012 has many improvements with it’s Hyper-V solution. ·         Platform as a Service (PaaS). With PaaS, the cloud hosting provider provisions you with a particular platform. For example, a provider may allow you to host databases. You manage the database itself, and the cloud hosting provider hosts the database server. SQL Azure™ is an example of Platform as a Service. ·         Software as a Service (SaaS). The cloud hosting provider hosts your application and the entire infrastructure that supports that application. You purchase and run a software application from a cloud hosting provider. Windows InTune™ and Microsoft Office 365 are examples of SaaS.

Domain Controllers What Are Active Directory Domain Services Domains? All of these logical objects are stored in the AD DS database, and a copy of this database is stored on every domain controller in the AD DS domain. There are several types of objects that can be stored in the AD DS database, including user and domain‑joined computer accounts, which can be organized in groups, for administrative or security reasons. The AD DS domain provides an authentication center. All user accounts and computer accounts in the domain are stored in the domain database, and users and computers must connect to a domain controller to authenticate. An AD DS domain is an administrative center. It contains an Administrator account and a Domain Admins group, which both have full control over every object in the domain. Unless they are in the forest root domain, however, their range of control is limited to the domain. The AD DS domain is also a replication boundary. When changes are made to any object in the domain, that change is replicated automatically to all other domain controllers in the domain.

Domain Controllers What Are Active Directory Domain Services Domains? Global Catalog Server User RODC Data Store All of these logical objects are stored in the AD DS database, and a copy of this database is stored on every domain controller in the AD DS domain. There are several types of objects that can be stored in the AD DS database, including user and domain‑joined computer accounts, which can be organized in groups, for administrative or security reasons. The AD DS domain provides an authentication center. All user accounts and computer accounts in the domain are stored in the domain database, and users and computers must connect to a domain controller to authenticate. An AD DS domain is an administrative center. It contains an Administrator account and a Domain Admins group, which both have full control over every object in the domain. Unless they are in the forest root domain, however, their range of control is limited to the domain. The AD DS domain is also a replication boundary. When changes are made to any object in the domain, that change is replicated automatically to all other domain controllers in the domain.

Domain Controllers AD DS Domains The Forest is logically organized into Domains, Domain Trees and Organizational Units To efficiently apply rules you need a logical structure. AD DS has a hierarchical structure logically shaped like a pyramid. The blocks that make up the pyramid have a broad base that responsible to the layer above until the last block is at the top. This shape is called a forest. The forest is made up of Domain Trees with each tree comprised of the main building blocks, the domains. Each domain can be further organized internally with Organization Units. These OUs, as the name suggests allow us to divide up the domain structure of Computers, Users, and Groups for better control.

Domain Controllers AD DS Domains Logical Structure The Forest is logically organized into Domains, Domain Trees and Organizational Units Domain Domains Organizational Units Trees and Forests Domain OU Domain OU OU Domain Domain Domain Domain To efficiently apply rules you need a logical structure. AD DS has a hierarchical structure logically shaped like a pyramid. The blocks that make up the pyramid have a broad base that responsible to the layer above until the last block is at the top. This shape is called a forest. The forest is made up of Domain Trees with each tree comprised of the main building blocks, the domains. Each domain can be further organized internally with Organization Units. These OUs, as the name suggests allow us to divide up the domain structure of Computers, Users, and Groups for better control.

Domain Controllers There are several designs, depending on your organizations business structure, for Active Directory Domain Services but the key physical component to Active Directory Domain Services is the Active Directory Domain Controller. The domain controllers in your network are the centerpiece of your Active Directory service. All DCs in a forest are connected so the replication of AD DS data can be synchronized though out the Forest. They each contain a exact copy of the Schema, which is the description of what objects make up the unique structure of the AD DS. They each contain a exact copy of the domain structure for their unique Domain. Abbreviated as DC, domain controller is a server on a Microsoft Windows Server 2012 network that is responsible for allowing host access to Windows domain resources. It stores user account information, authenticates users and enforces security policy for a Windows domain. When we install AD Domain Services we create or extend an Active Directory Domain. When we install the AD Domain Controller service we take control over that portion of the AD DS. The original DC becomes the “Root” and hosts the “Schema” and its “Global Catalog.” The Global Catalog list all the object created in Active Directory and a partial set of attributes.

Domain Controllers Root Domain Domain Controllers Sub Domain Switch Switch Domain Clients Computer 1 Computer 2 Computer 3 Domain Clients Computer 1 Computer 2 Computer 3 Domain Clients Network Printer Computer 4 Printer Domain Clients Network Printer Computer 4 Printer There are several designs, depending on your organizations business structure, for Active Directory Domain Services but the key physical component to Active Directory Domain Services is the Active Directory Domain Controller. The domain controllers in your network are the centerpiece of your Active Directory service. All DCs in a forest are connected so the replication of AD DS data can be synchronized though out the Forest. They each contain a exact copy of the Schema, which is the description of what objects make up the unique structure of the AD DS. They each contain a exact copy of the domain structure for their unique Domain. Abbreviated as DC, domain controller is a server on a Microsoft Windows Server 2012 network that is responsible for allowing host access to Windows domain resources. It stores user account information, authenticates users and enforces security policy for a Windows domain. When we install AD Domain Services we create or extend an Active Directory Domain. When we install the AD Domain Controller service we take control over that portion of the AD DS. The original DC becomes the “Root” and hosts the “Schema” and its “Global Catalog.” The Global Catalog list all the object created in Active Directory and a partial set of attributes.

Managing DNS Zones Active Directory–Integrated Zones A DNS server can store zone data in the AD DS database provided that the DNS server is an Active Directory–Integrated DNS server residing on a AD DS domain controller. When the DNS server stores zone data in this way, this creates an Active Directory–integrated zone. The benefits of an Active Directory–integrated zone are significant. We use Multimaster Replication for updates. Unlike standard primary zones —which can only be modified by a single primary server—Active Directory–integrated zones can be written to by any writable domain controller to which the zone is replicated. In addition, Multimaster updates are particularly important in geographically distributed organizations that use dynamic update zones. The DNS zone data is handled with AD DS replication. One of the characteristics of Active Directory replication is attribute-level replication in which only changed attributes are replicated rather than replicating the entire zone file as in traditional DNS zone transfer models. An Active Directory–integrated zone can enforce secure dynamic updates. And we have Granular security model. As with other Active Directory objects, an Active Directory-integrated zone allows you to delegate administration of zones, domains, and resource records by modifying the access control list (ACL) on the zone.

Managing DNS Zones Active Directory–Integrated Zones contoso.com ZONE hqdc01 filesvr01 desktop101 ZONE A DNS server can store zone data in the AD DS database provided that the DNS server is an Active Directory–Integrated DNS server residing on a AD DS domain controller. When the DNS server stores zone data in this way, this creates an Active Directory–integrated zone. The benefits of an Active Directory–integrated zone are significant. We use Multimaster Replication for updates. Unlike standard primary zones —which can only be modified by a single primary server—Active Directory–integrated zones can be written to by any writable domain controller to which the zone is replicated. In addition, Multimaster updates are particularly important in geographically distributed organizations that use dynamic update zones. The DNS zone data is handled with AD DS replication. One of the characteristics of Active Directory replication is attribute-level replication in which only changed attributes are replicated rather than replicating the entire zone file as in traditional DNS zone transfer models. An Active Directory–integrated zone can enforce secure dynamic updates. And we have Granular security model. As with other Active Directory objects, an Active Directory-integrated zone allows you to delegate administration of zones, domains, and resource records by modifying the access control list (ACL) on the zone.

Group Policy Processing Once we have created and edited a GPO we use the GPMC to link the GPO to the desired container. Until the GPO in Linked to a container it does not effect the container. Once Linked it saves a GPO template in the Sysvol Partition to be copied to each Client as they boot up or refresh their copy of the Sysvol. This GPO template is applied to the client is a specific order. GPOs are not applied simultaneously; rather, they are applied in a logical order. GPOs that are applied later in the process of applying GPOs overwrite any conflicting policy settings that were applied earlier. GPOs are applied in the following order: As the local machine boots it’s Local GPOs is applied Each operating system that is running Windows 2000 or newer potentially already has a local Group Policy configured. Once these policy setting are active the computer will look for Site GPOs. Setting for the computers OS site membership will over write any conflict with the local GPO. Now the Computer will look for Domain GPOs. Again the matching process takes place the Domain GPOs are overlaid on the combination Local and Site settings. Any conflict will be overwritten by the Domain setting. There are often multiple polices at the domain level. These policies are processed in order of preference. Then we move to the OUs. These policies contain settings that are unique to the objects in that OU. For example, the Sales users might have special required settings. You can link a policy to the Sales OU to deliver those settings. If there is a conflict the OU being applied last will win out. If we have nested or “Child OU” policies that are linked to child OUs these are processed last. Again, GPOs in the containers receive the cumulative effect of all polices in their processing order. In the case of a conflict between settings, the last policy applied takes effect. If there is a policy that is absolutely got to be, we can apply an “Enforced” tag with the GPMC and subsequent GPOs will not override this setting.

Group Policy Processing GPO 1 xxx Local Group GPO 2 xxx SITE GPO 3 xxx DOMAIN GPO 4 xxx OU Once we have created and edited a GPO we use the GPMC to link the GPO to the desired container. Until the GPO in Linked to a container it does not effect the container. Once Linked it saves a GPO template in the Sysvol Partition to be copied to each Client as they boot up or refresh their copy of the Sysvol. This GPO template is applied to the client is a specific order. GPOs are not applied simultaneously; rather, they are applied in a logical order. GPOs that are applied later in the process of applying GPOs overwrite any conflicting policy settings that were applied earlier. GPOs are applied in the following order: As the local machine boots it’s Local GPOs is applied Each operating system that is running Windows 2000 or newer potentially already has a local Group Policy configured. Once these policy setting are active the computer will look for Site GPOs. Setting for the computers OS site membership will over write any conflict with the local GPO. Now the Computer will look for Domain GPOs. Again the matching process takes place the Domain GPOs are overlaid on the combination Local and Site settings. Any conflict will be overwritten by the Domain setting. There are often multiple polices at the domain level. These policies are processed in order of preference. Then we move to the OUs. These policies contain settings that are unique to the objects in that OU. For example, the Sales users might have special required settings. You can link a policy to the Sales OU to deliver those settings. If there is a conflict the OU being applied last will win out. If we have nested or “Child OU” policies that are linked to child OUs these are processed last. Again, GPOs in the containers receive the cumulative effect of all polices in their processing order. In the case of a conflict between settings, the last policy applied takes effect. If there is a policy that is absolutely got to be, we can apply an “Enforced” tag with the GPMC and subsequent GPOs will not override this setting. OU OU

Virtualization Technologies Server virtualization has only been a part of the Windows Server® operating system since the release of Windows Server 2008 and the introduction of the Hyper-V® role. To use Server Virtualization more efficiently server administrators need to be able to decide which server workloads will run effectively in virtual machines, and which server workloads must remain deployed in a more traditional server environment. Here we look at the Hyper-V role in Windows Server 2012, the components of the role, how best to deploy the role, and the new features of the Hyper-V role that are introduced with Windows Server 2012. You can deploy many different types of virtualization technologies on networks where Windows® operating systems are deployed. The types of virtualization technologies that you select depends on what your organization needs to accomplish.

Virtualization Technologies Physical Servers Virtual Host Server virtualization has only been a part of the Windows Server® operating system since the release of Windows Server 2008 and the introduction of the Hyper-V® role. To use Server Virtualization more efficiently server administrators need to be able to decide which server workloads will run effectively in virtual machines, and which server workloads must remain deployed in a more traditional server environment. Here we look at the Hyper-V role in Windows Server 2012, the components of the role, how best to deploy the role, and the new features of the Hyper-V role that are introduced with Windows Server 2012. You can deploy many different types of virtualization technologies on networks where Windows® operating systems are deployed. The types of virtualization technologies that you select depends on what your organization needs to accomplish. Virtual Guests

Managing Virtual Networks Hyper-V provides several different options for network communication between virtual machines. You can configure virtual machines that communicate with an external network in a manner similar to traditionally deployed physical hosts. You can configure virtual machines to communicate only with a limited number of other virtual machines that are hosted on the same server. Hyper-V Network Virtualization makes it possible for you to isolate virtual machines that share the same physical server. Creating Vlans on the Virtual network. To do this we need a switch. Hyper–V virtual hardware now includes a virtual switch, a virtual version of a network switch. (The term virtual network, which was used in Windows Server 2008, has been replaced by the term virtual switch in Windows Server 2012.) Virtual switches control how network traffic flows between virtual machines that are hosted on the virtualization server, and between virtual machines and the rest of the organizational network. You manage virtual switches through the Virtual Switch Manager, which is accessible through the Actions pane of the Hyper-V Manager console. Hyper-V on Windows Server 2012 supports three different types of virtual switches: External. This type of switch maps a network to a specific network adapter or network adapter team. Windows Server 2012 supports mapping an external network to a wireless network adapter if you have installed the wireless local area network (LAN) service on the virtualization server, and if the virtualization server has a compatible adapter. Internal. Internal virtual switches communicate between the virtual machines on the virtualization server, and between the virtual machines and the virtualization server itself. Private. Private switches communicate only between virtual machines on the virtualization server. You cannot use private switches to communicate between the virtual machines and the virtualization server itself. When configuring a virtual network, you can also configure a virtual LAN (VLAN) ID to be associated with the network. This allows you to extend existing VLANs on the external network to VLANs within the virtualization server's network switch. VLANs allow you to partition network traffic, and they function as separate logical networks. Traffic can only pass from one VLAN to another if it passes through a router. You can configure the following extensions for each virtual switch type: ·         Microsoft NDIS Capture. This extension allows data that is travelling across the virtual switch to be captured. ·         Microsoft Windows Filtering Platform. This extension allows data that is travelling across the virtual switch to be filtered.

Managing Virtual Networks Hyper-V Virtual Machine Virtual Application Virtual network adapter Hyper –V Extensible Switch Physical Network Adapter Hyper-V Extensible Switch Virtual Switch VMNET Virtual Management OS NICs Management vNIC VLAN ID 10 TCP/IP Hyper-V provides several different options for network communication between virtual machines. You can configure virtual machines that communicate with an external network in a manner similar to traditionally deployed physical hosts. You can configure virtual machines to communicate only with a limited number of other virtual machines that are hosted on the same server. Hyper-V Network Virtualization makes it possible for you to isolate virtual machines that share the same physical server. Creating Vlans on the Virtual network. To do this we need a switch. Hyper–V virtual hardware now includes a virtual switch, a virtual version of a network switch. (The term virtual network, which was used in Windows Server 2008, has been replaced by the term virtual switch in Windows Server 2012.) Virtual switches control how network traffic flows between virtual machines that are hosted on the virtualization server, and between virtual machines and the rest of the organizational network. You manage virtual switches through the Virtual Switch Manager, which is accessible through the Actions pane of the Hyper-V Manager console. Hyper-V on Windows Server 2012 supports three different types of virtual switches: External. This type of switch maps a network to a specific network adapter or network adapter team. Windows Server 2012 supports mapping an external network to a wireless network adapter if you have installed the wireless local area network (LAN) service on the virtualization server, and if the virtualization server has a compatible adapter. Internal. Internal virtual switches communicate between the virtual machines on the virtualization server, and between the virtual machines and the virtualization server itself. Private. Private switches communicate only between virtual machines on the virtualization server. You cannot use private switches to communicate between the virtual machines and the virtualization server itself. When configuring a virtual network, you can also configure a virtual LAN (VLAN) ID to be associated with the network. This allows you to extend existing VLANs on the external network to VLANs within the virtualization server's network switch. VLANs allow you to partition network traffic, and they function as separate logical networks. Traffic can only pass from one VLAN to another if it passes through a router. You can configure the following extensions for each virtual switch type: ·         Microsoft NDIS Capture. This extension allows data that is travelling across the virtual switch to be captured. ·         Microsoft Windows Filtering Platform. This extension allows data that is travelling across the virtual switch to be filtered. VLAN ID 11 Live Migration vNIC TCP/IP