Microsoft delivers a complete datacenter solution with Windows Server 2012 R2 out-of-the-box Cloud OS Development Management Identity Virtualization.

Slides:



Advertisements
Similar presentations
And many others…. Deliver networking as part of pooled, automated infrastructure Ensure multitenant isolation, scale and performance Expand.
Advertisements

System Center 2012 R2 Overview
Session Goal Be familiar with the possibilities of the operating system From the user mode and kernel mode We are NOT talking about the forensics!
“It’s going to take a month to get a proof of concept going.” “I know VMM, but don’t know how it works with SPF and the Portal” “I know Azure, but.
Trusted End Host Monitors for Securing Cloud Datacenters Alan Shieh †‡ Srikanth Kandula ‡ Albert Greenberg ‡ †‡
Must have static IP address pool and VLANs for Provider Address (PA) network – network on which NVGRE encapsulated packets are sent All subnets.
Unified Logs and Reporting for Hybrid Centralized Management
BETA!BETA! Building a secure private cloud on Microsoft technologies Private cloud security concerns Security & compliance in a Microsoft private cloud.
© 2009 Cisco Systems, Inc. and VMware 1 Accelerating Cloud Computing Infrastructure: Cisco Nexus 1000V Phil Veniot Systems Engineer
VMware Update 2009 Daniel Griggs Solutions Architect, Virtualization Servers & Storage Solutions Practice Dayton OH.
6 Hypervisor Management OS Guest VM 1 Guest VM n Hardware User Mode Kernel Mode User Mode … Kernel Mode User Mode.
NIC Management Storage Migration Cluster NIC.
Yes, yes it does! 1.Guest Clustering is supported with SQL Server when running a guest operating system of Windows Server 2008 SP2 or newer.
CMDB Ticketing Billing Management Systems Web based Runbook Authoring: Service Administrator can create runbooks to automate all aspects of cloud.
Service Provider Next generation managed services Public Cloud (true multi- tenant) Private Cloud Hybrid Cloud Delivering the highest levels of user.
Overview of Microsoft DR solution for the three clouds Learn how to setup protection and recover to Microsoft Azure Planning guidance on choosing topologies.
4 2) Code Repository 1) Developers 3) Build4) Test5) Deploy to Cloud 6) Monitor and Improve Contoso App Azure.
Microsoft Virtual Academy Module 4 Creating and Configuring Virtual Machine Networks.
Blue CorpRed Corp Blue Subnet1 Blue Subnet3Blue Subnet2 Blue Subnet5 Blue Subnet4 Red Subnet2 Red Subnet1 Blue R&D Net Blue Sales Net.
Monitor Linux OS health & performance Monitor log files Monitor JEE app servers Monitor line-of-business applications Monitor databases and web.
Flat or shrinking IT budgets even as business expectations increase. Efficient datacenter operations across entire customer base. Enterprise- class.
What's New in Windows Server 2012 Hyper-V, Part 2 Jeff Woolsey Windows Server & Cloud Microsoft Corporation VIR309.
Looking Ahead…Embracing Our Past Building upon our successes for the future of operations.
Availability Configuration PerformanceCapacity.
Network Management Microsoft System Center 2012 SP1 Virtual Machine Manager Greg Cusanza Senior Program Manager Microsoft Corporation MGT315.
3 STEPS TO SECURING YOUR HYPER-V INFRASTRUCTURE by Virtualization Evangelist David Davis.
Network discovery Multi- server mgmt (MSM) Visibility & audit.. Automatic discovery of DC, DHCP and DNS servers, and dynamic IP addresses.
Available in 2012 R2 UR2 & 2012 SP1 UR6.
How to protect your Virtual Datacenter Michiel van den Bos.
Data Center Network Redesign using SDN
Real Security for Server Virtualization Rajiv Motwani 2 nd October 2010.
© 2010 IBM Corporation Cloudy with a chance of security Information security in virtual environments Johan Celis Security Solutions Architect EMEA IBM.
Extreme Networks Confidential and Proprietary. © 2010 Extreme Networks Inc. All rights reserved.
Agentless Security for Windows Server 2012, Windows Server 2012 R2, System Center VMM, Hyper-V and Windows 8 ISV Partner Alliance Value.
Глибоке занурення у System Center 2012 SP1 Михайло Комаров Газпром-информ MVP Virtual Machine.
HOW TO SECURE AN ENTIRE HYPER-V NETWORK by Virtualization Evangelist David Davis.
Focus on “services” describing “what you deliver” Improve quality and consistency Continuous improvement in service delivery Prove it… and “show.
3 VIRTUAL MACHINES WEB SITES SERVICE BUS DATABASE.
© Copyright 2014 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. 3.
Virtual Switch
What’s new in Hyper-V in Windows Server 2012 (Part 2) Stu Fox Technical Specialist, Microsoft NZ VIR315.
Hyper-V Security Tips: Protect yourself from vulnerabilities that you never knew existed Symon PerrimanAlex Karavanov VP, Business DevelopmentDirector.
86% 50% Infrastructure provisioning Enterprise-class multi- tenant infrastructure for hybrid environments System Center capabilities Application.
Datacenters of the Past StorageNetworkCompute Today’s datacenter.
MDC-B350: Part 1 Room: You are in it Time: Now What we introduced in SP1 recap How to setup your datacenter networking from scratch What’s new in R2.
Processor or Socket NUMA Node Core LP Processor or Socket NUMA Node Core LP Processor or Socket NUMA Node Core LP Processor or Socket NUMA Node Core.
Get Hands-on with the New Hyper-V Extensible Switch in Windows Server 2012 Bob Combs Hyper-V Networking Microsoft Corporation VIR307.
MDC417 Follow me on Working as Practice Manager for Insight, he is a subject matter expert in cloud, virtualization and management.
From Virtualization Management to Private Cloud with SCVMM 2012 Dan Stolts Sr. IT Pro Evangelist Microsoft Corporation
Cloud Scale Performance & Diagnosability Comprehensive SDN Core Infrastructure Enhancements vRSS Remote Live Monitoring NIC Teaming Hyper-V Network.
Windows Azure Pack Service Provider Foundation 2012 R2 Windows Server 2012 R2 Virtual Machine Manager 2012 R2 Damian Flynn MVP System Center
Microsoft Virtual Academy Module 8 Managing the Infrastructure with VMM.
How to Integrate Security Tools to Defend Data Assets Robert Lara Senior Enterprise Solutions Consultant, GTSI.
Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Thomas.
Hyper-V Security TipsHyper-V Security Tips Fix the Gaps you Never Knew About Symon Thomas.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
WS-B327 Dynamic, policy-driven network (re)configuration Consistent, profile- based deployment of SDN traffic policies through distributed.
Benefits For hoster or private cloud: Multi-tenant gateway reduces cost Enhanced Reliability with Clustering Works Seamlessly with Hyper-V network.
Reid Purvis Rob Tappenden Microsoft Cloud meets Cisco ACI CLD23 4.
Complete VM Mobility Across the Datacenter Server Virtualization Hyper-V 2012 Live Migrate VM and Storage to Clusters Live Migrate VM and Storage Between.
Network Virtualization Policy-Based Isolation QoS Performance Metrics Live & Storage Migrations Cross-Premise Connectivity Dynamic & Multi-Tenant.
| Basel Fabric Management with Virtual Machine Manager Philipp Witschi – Cloud Architect & Microsoft vTSP Thomas Maurer – Cloud Architect & Microsoft MVP.
Marko Ugrin Integra Group Budućnost mrežne infrastrukture na MS način.
Level 300 Windows Server 2012 Networking Marin Franković, Visoko učilište Algebra.
Microsoft Virtual Academy. Microsoft Virtual Academy First HalfSecond Half (01) Introduction to Microsoft Virtualization(05) Hyper-V Management (02) Hyper-V.
Virtualization & Security real solutions
11/17/2018 9:32 PM © Microsoft Corporation. All rights reserved. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN.
20409A 7: Installing and Configuring System Center 2012 R2 Virtual Machine Manager Module 7 Installing and Configuring System Center 2012 R2 Virtual.
TechReady 16 1/12/2019 MDC-B351 How to Design and Configure Networking in Microsoft System Center Part 2 of 2 Greg Cusanza Senior Program Manager, Microsoft.
Re-think Networking Windows Server 2012 R2
Presentation transcript:

Microsoft delivers a complete datacenter solution with Windows Server 2012 R2 out-of-the-box Cloud OS Development Management Identity Virtualization Data

Extension miniport

Virtualization VM 1 VM 3 VM 2 Root Partition 3 rd Party components VMM Agent VMM Service SCVMM Vendor network mgmt console Policy database Vendor SCVMM Plugin Capture Extension Filtering Extension Forwarding Extension Physical NIC Hyper-V switch extensions and SCVMM extensions from partners

Enterprise-grade Aggregate security control Simplified deployment Agentless Anti-Virus/ Anti-Malware Agentless: no degradation All versions of guest OS supported by Microsoft Hyper-V Fastest AV Scans available Orchestrate scans and set thresholds across VMs Staggered scanning Caching across VMs Centralized management Agentless Anti-Virus/ Anti-Malware Agentless: no degradation All versions of guest OS supported by Microsoft Hyper-V Fastest AV Scans available Orchestrate scans and set thresholds across VMs Staggered scanning Caching across VMs Centralized management Agentless Intrusion Detection Industrial-strength Real-time threat monitoring Signature-based Block application-level attacks (WAF) Behavioral: build baseline for known attacks (WAF) Pro-active - detect, warn, block (WAF) Agentless Intrusion Detection Industrial-strength Real-time threat monitoring Signature-based Block application-level attacks (WAF) Behavioral: build baseline for known attacks (WAF) Pro-active - detect, warn, block (WAF) Agentless Virtual Firewall Isolate VMs: manage security programmatically per VM Control and protect inbound, outbound, intra-VM traffic Multi-Tenant protection and support of network virtualization Stateful, deep packet inspection Granular QoS Aggregate, analyze, audit logs Virtual Machine Security Groups User/Role - level access: support of Security and Auditor accounts Application-level protection against a wide range of exploits (WAF) Agentless Virtual Firewall Isolate VMs: manage security programmatically per VM Control and protect inbound, outbound, intra-VM traffic Multi-Tenant protection and support of network virtualization Stateful, deep packet inspection Granular QoS Aggregate, analyze, audit logs Virtual Machine Security Groups User/Role - level access: support of Security and Auditor accounts Application-level protection against a wide range of exploits (WAF)

VTN2 ProgrammableFlow Controller Independent and secure virtual networks Control Virtual Networks (VTNs) Physical Network Network Switch Pool Server Pool Network Appliance Pool ProgrammableFlow Switch VTN1

Tenant Red Tenant Red VTN for Others Path policy2 VMM VTN for HNV tenant VLAN: 200 Path policy1 PF6800

Fabric Operation VMs and Services Operation Logical network VM network VM Subnet Network site VLAN-Subnet Uplink port VM Virtual port IP Pool Logical switch PF1000 Path-Control over Fabric Network

Nexus 1000V Architecture Respects DC Operational Model for P  V Hypervisor Modular Switch … … Linecard-N Supervisor-1 (Active) Supervisor-2 (StandBy) Linecard-1 Linecard-2 Back Plane VEM-N VEM-2 VSM: Virtual Supervisor Module VEM: Virtual Ethernet Module VSM-1 (active) VSM-2 (standby) Virtual Appliance Network Admin Server Admin NX-OS Control Plane NX-OS Data Plane Extensible Switch Capture Filtering Forwarding Nexus 1000V VEM

Database Network ClientsGuests # port-profile database-client ip port access-group dbclient in no shut state enabled # port-profile database-server ip port access-group dbserver in no shut state enabled # port-profile database-admin ip port access-group dbadmin in no shut state enabled # network-segment database1 switchport mode access switchport access vlan 10

Cisco Virtual Security Gateway Context-based, Multi-tenant, Workload Segmentation Nexus 1000V Distributed Virtual Switch VM vPath Cisco PNSC Log/Audit VSG (active) Secure Segmentation (VLAN agnostic) Efficient Deployment (secure multiple hosts) Transparent Insertion (topology agnostic) High Availability Dynamic policy-based provisioning Mobility aware ( policies follow Migration )

Condition VM Attributes VM Name Guest OS name Port Profile Name VM DNS Name Network Attributes IP Address Network Port Operator eq neq gt lt range Not-in-range Prefix Operator member Not-member Contains And (Global Level) Or (Global Level)  Source Condition Destination Condition Action Rule  Attribute Type Network VM User Defined vZone Condition Match Criteria Match All (And) Match Any (Or)

Come Visit Us in the Microsoft Solutions Experience! Look for Datacenter and Infrastructure Management TechExpo Level 1 Hall CD For More Information Windows Server 2012 R2 Microsoft Azure System Center 2012 R2 Azure Pack cloud/products/windows-azure-pack