Jan 30, 2015


One of the great things about the Hyper-V virtual switch is that it can be used to very effectively isolate your virtual machines from the physical network. This grants them a layer of protection that’s nearly unparalleled. Like any security measure, this can be a double-edged sword. Oftentimes, these isolated guests still need some measure of access to the outside world, or they at least need to have access to a system that can perform such access on their behalf.

How to Install and Configure TCP/IP Routing in a Hyper-V Guest

Jan 13, 2015


Google is not shy when it comes to bringing its apps, those made famous on the Android platform, over to the competition. Today, they do it again with the Chrome Remote Desktop app.

On Monday, Google officially launched the Chrome Remote Desktop app that will, as the name suggests, essentially extends the desktop in a secure fashion over to the iPhone or iPad of your choice. To make the magic happen, a user will have to set up the Chrome Remote Desktop app on their desktop of choice (which is available through the Chrome Web Store as a separate download), and then set up the app on the iOS-based device of their choice as well.

Google’s Chrome Remote Desktop for iOS now available

Jan 12, 2015

We’ve had a long run of articles in this series that mostly looked at general networking technologies. Now we’re going to look at a technology that gets us closer to Hyper-V. Load-balancing algorithms are a feature of the network team, which can be used with any Windows Server installation, but is especially useful for balancing the traffic of several operating systems sharing a single network team.

Hyper-V and Networking Part 8: Load-Balancing Algorithms

So far, this series has spent most of its time focused on the methods that systems use to decide where traffic should go and how it should get there. A logical next step is to discuss how bindings work. What this article will do is bring the concepts of that topic inline with the aims of this series along with an explanation of the machinations of binding.

Hyper-V and Networking – Part 7: Bindings

In many ways, this particular post won’t have a great deal to do with Hyper-V itself. It will earn its place in this series by helping to clear up a common confusion point I see being posted on various Hyper-V help forums. People have problems moving traffic to or from virtual machines, and, unfortunately, spend a lot of time working on the virtual switch and the management operating system.

Hyper-V and Networking – Part 6: Ports, Sockets and Applications

The last couple of posts in this series have dealt with how Ethernet frames and IP packets get to their destination. In this post, we’ll step up a little bit and look at the role DNS plays in getting those packets to the correct IP address. We’ll see how this works in general and the issues specific to a Hyper-V environment.

Hyper-V and Networking – Part 5: DNS

In part 3, I showed you a diagram of a couple of switches that were connected together using a single port. I mentioned then that I would likely use link aggregation to connect those switches in a production environment. Windows Server introduced the ability to team adapters natively starting with the 2012 version. Hyper-V can benefit from this ability.

Hyper-V and Networking – Part 4: Link Aggregation and Teaming

In the previous post, we dug into VLANs, which are a layer 2 concept in the ISO model. In this piece, we’re going to step up into layer 3 and look at IP address and routing and how they work with Hyper-V.

Hyper-V and Networking – Part 3: IP Routing

In the first part of this series, we started with the foundational concepts of networking in the OSI model and took a brief look at where Hyper-V components live in that model. In this part, we’ll build on that knowledge by looking at the operation of VLANs and how they work within the context of a Hyper-V deployment.

Hyper-V and Networking – Part 2: VLANs

After storage, Hyper-V’s next most confusing subject is networking. There are a dizzying array of choices and possibilities. To make matters worse, many administrators don’t actually understand that much about the fundamentals because, up until now, they’ve never really had to.

Hyper-V and Networking – Part 1: Mapping the OSI Model

As an IT Professional, you might find yourself blessed with the unfortunate scenario of working on a Hyper-V server that is not able to authenticate to the domain and the cached domain credentials are no longer working. In addition to this predicament, you learn that there is no documentation for the local administrator password. Either the client who you’re working for doesn’t know the local administrator password or the previous engineer who built the server is no longer working for your company and the standard passwords aren’t working.

How to Reset A Forgotten Hyper-V Admin Password with a Windows CD

Hyper-V

Did your software vendor indicate that you can Virtualize their application, but only if you dedicate one or more CPU cores to it? Not clear on what happens when you assign CPUs to a virtual machine? You are far from alone.

Hyper-V Virtual CPUs Explained

 
TECHNOCRACY © 2012-2017