70-740 Terms Lessons 10, 12, 15, 17, 18, 19

¡Supera tus tareas y exámenes ahora con Quizwiz!

You can configure and manage Networking Loading Balancing using the following cmdlets:

-Add-N1bClusterNode -Add-N1bClusterNodeDip -Add-N1bClusterPortRule -Add-N1bClusterVip

LM requires four steps to properly move a running VM.

-Configure LM prerequisites. -Configure LM security (constrained delegation, if needed). -Configure the source and destination computers for LM. -Move a running VM or VM storage.

To use NIC teaming in Hyper-V, you must complete three basic tasks.

-Create the NIC team in the Windows Server 2016 host operating system. -In Hyper-V Manager, create an external virtual switch using the NIC team. -Configure the network adapter in a virtual machine to connect to the virtual switch representing the NIC team.

VLANs provide a number of benefits over routed networks

-Higher performance on medium or large LANs due to reduced broadcast traffic. -Better organization of devices on the network for easier management. -Additional security because devices can be put on their own VLAN.

To configure the NLB cluster, you must configure three types of parameters:

-Host parameters -Cluster parameters -Port rules

Microsoft update classifications

-Important -Recommended -Optional

Processes used to move an entire VM or its parts while it runs.

-Live Migration (LM) -Quick Migration -Storage Migration

Filter Mode includes

-Multiple hosts -Single host -Disable

Windows Containers support four different networking drives or nodes.

-Network Address Translation -Transparent -L2 Bridge -L2 Tunnel

Three options for configuring Affinity

-None -Single -Class C

Hyper-V Replica components

-Replication Engine -Change Tracking -Network Module -Hyper-V Replica Broker Server Role

Windows Update can deliver the following

-Security updates -Critical updates -Service packs

NIC teaming in Windows Server 2016 supports two modes

-Switch Independent Mode -Switch Dependent Mode

Types of Containers

-Windows Server Containers -Hyper-V Containers

Main components of WSUS

-Windows Server Update Services (WSUS) -Microsoft Update -Update Services console

Private Virtual Switch

Can only be used by the VMs running on the computer.

Node

A cluster has two or more servers. Runs separate copy of the desired service application, such as a web server, an FTP server, or a Secure Shell (SSH)/Remote Desktop Server. Scalable, high-availability feature found in Windows Server 2016.

DockerHub

Cloud-based public registry service that is used for building and shipping applications and containers. It allows for centralized resources for container image discovery, distribution, change management, and workflow automation.

Microsoft Azure

Cloud-computing platform used for building, deploying, and managing applications and services through a global network of Microsoft-managed data centers.

Docker

Collection of open source tools, solutions, and cloud-based services that are used for creating and managing containers.

Docker Build

Command consumes a Dockerfile and then triggers the image creation process.

Standard/Synthetic Network Adapters

Communicate over the VMBus, which allows it to be faster than legacy network adapters. Generation 1 and Generation 2.

Replication Engine

Component that manages the replication configuration details and manages initial replication, delta replication, failover, and test-failover operations.

Network Module

Component that provides a secure and efficient way to transfer VM replicas between primary hosts and replica hosts by using compression and encryption (using HTTPS and certificate-based authentication).

Change Tracking

Component that tracks changes on the primary copy of the VM It tracks the changes regardless of where the VM .vhdx files reside.

Container Image

Derived from the container OS Image (base image, additional binary/libraries, middleware) and applications/data, is stored in a repository, and can be interconnected with other containers to create a larger application.

Affinity

Determines how the servers are going to balance the load. You use affinity settings when you use multiple hosts filter mode.

Virtual LANs (VLAN)

Developed as an alternate solution to deploying multiple routers.

The main components to automate the creation of container images is the ________ and the _________ _________.

Dockerfile. Docker Build.

Transparent

Each container endpoint is directly connected to the physical network. Addresses can be assigned statically or dynamically using an external DHCP server.

L2 Bridge

Each container endpoint is in the same IP subnet as the container host. The IP addresses must be assigned statically from the same prefix as the container host. All containers have the same MAC address, due to Layer-2 address translation.

Network Address Translation

Each container receives an IP address from an internal, private IP prefix. The container host performs port forwarding/mapping from the public address to the private address and vice versa.

Unicast

Each packet is sent to a single network destination identified by a unique address. Host sends packets to a single computer.

Virtual Match Queue (VMQ)

Uses hardware packet filtering to deliver data directly to virtual machines from an external network, reducing the overhead of routing packets from the management operating system to the virtual machine. Only Hyper-V specific network adapters support this feature.

To add or remove network adapters to Generation 1 systems, or virtual machines running earlier than Windows 10 and Windows Server 2016, you must ___________________.

turn off the computer.

PackageManagement (OneGet)

Used to discover and install software packages over the Internet.

Each VM can support a total of ____________.

12 virtual network adapters (8 Hyper-V synthetic adapters and 4 legacy network adapters).

Hyper-V virtual machines can also take advantage of NIC teaming, but they are limited to teams of _________, as opposed to the host operating system, which can have teams of up to _________ NICs.

2. 64.

The default pool of __________ address is expected to be sufficient for most Hyper-V virtual machine configurations, but if it is not, you can modify the __________ and __________ values only, by making it into a range of addresses like the last byte.

256. Minimum. Maximum.

Media Access Control (MAC) address

6-byte hexadecimal value-the first 3 bytes are an organizationally unique identifier (OUI) that specifies the manufacturer, and the last 3 bytes identify the adapter itself.

WSUS uses port ______ for HTTP protocol and port ______ for HTTPS to obtain updates from the Microsoft Update servers.

8530. 8531

Kerberos

A network authentication protocol that is designed to provide strong authentication for client/server applications by using secret-key cryptography and is used by Active Directory domains.

Link Aggregation Control Protocol (LACP)

A protocol currently defined by IEEE's 802.3AX standard that dynamically coordinates communications between two hosts.

External Virtual Switch

Binds to the physical network adapter. This enables your VMs to access your physical network.

To install the NLB cluster and the NLB tools using PowerShell, you can use the following cmdlets:

Add-WindowsFeature NLB, RSAT-NLB

Switch Independent Mode

All of the network adapters are connected to different switches, providing alternative routes through the network. Static teaming and LACP are switch dependent modes.

Switch Dependent Mode

All of the network adapters are connected to the same switch, providing a single interface with their combined bandwidth.

Single-root I/O virtualization (SR-IOV)

Allows a device, such as a network adapter, to distribute access to its resources among PCI Express hardware functions. You can configure a maximum number of off-loaded security associations form 1 to 4,096. This feature is supported only on Hyper-V standard network adapters.

Hyper-V Replica (Offline Copy)

Allows you to replicate a Hyper-V VM from one Hyper-V host at a primary site to another Hyper-V host at the replica site. Used as a spare server, which is stored on another central storage device at another site. It would also be a cold server, since the server is off until you need it and will need to be powered on and some configuration may be needed depending on where the replica resides when it is turned on and how it is to be used.

Switch Embedded Teaming (SET)

An alternative to NIC teaming. Allows you to use a Hyper-V virtual switch to team up to eight physical Ethernet adapters located on the same Hyper-V host into one or more software-based virtual network adapters.

Quick Migration

Another process of moving a running VM from one physical host to another. However, Quick Migration occurs only within the confines of a cluster.

Drainstop

Blocks all new connections without terminating existing sessions.

Containers are meant to run specific applications. However, when using containers, it is better not to use the storage on the container and use _____________ ___________________ to keep data on the container host.

Data Volumes

IPsec task off-loading

Enables IPsec task off-loading at the machine level, reducing the demands on the virtual machine's CPU by using a dedicated processor on the physical network adaptor. This feature is only supported on Hyper-V specific network adapters.

Windows Server Update Services (WSUS)

Enables you to centrally manage the deployment of updates released through Microsoft, track compliance, and provide basic reporting functions.

Credential Security Support Provider (CredSSP) protocol

Enables you to securely delegate a user's credentials from a client to a target server, or whether you will use Kerberos to authenticate LM traffic.

Hyper-V types of virtual switches

External, Internal, and Private

Kerberos uses port

HTTP 80

Certificate-based authentication

HTTPS 443

To use encryption for the replication, you need to use certificate based authentication __________. You then need to use tan existing __________ certificate or create a self-signed certificate.

HTTPS. X.509v3

Containers

Lightweight virtual machines that can provide an isolated environment for applications. Provide a separate operating environment for installed applications that does not affect the rest of the operating system and the operating system does not affect the container. Typically used to run a single application.

As VMs grow, they can outgrow their initial storage. _______ ________ is yet another way to move live VM data without disrupting users.

Storage Migration

When you configure an NLB cluster to use unicast mode, NLB replaces the network card's original ______ address and all cluster hosts use the same unicast ______ address.

MAC

Patch Tuesday

Microsoft routinely releases security updates on the second Tuesday of each month.

Shared Nothing Migration

Move the entire VM or its storage from one physical host to another without interrupting your users. Storage is mirrored over the network to the destination server while the VM continues to run and provide network services.

Heartbeats

NLB can detect the failure of cluster nodes by sending packets. Transmitted ever second between nodes in the cluster. If a node misses five consecutive heartbeats, the node is automatically removed from the NLB cluster.

Hyper-V Replica Broker server role

New server role (introduced in Windows Server 2012) that redirects all VM-specific events to the appropriate node in the replica cluster. It is configured as part of the failover cluster.

Stop action

Terminates all existing connections to the cluster node and stoops the NLB service.

Legacy/Emulated Network Adapters

Only available in Generation 1 virtual machines. Legacy adapters communicate by making calls to the hypervisor. They emulate an Intel 21140-based PCI Fast Ethernet Adapter and can be used to boot to a network so you can install an operating system from a service such as Windows Deployment Services.

Multicast

Packets are sent to multiple computers simultaneously in a single transmission from the source. Host sends packets using multicasting, a single set of packets is sent to all computers at once.

Multiple Hosts

Permits al cluster hosts to actively respond to client requests. Most common mode used.

Container Host

Physical or virtual computer that is configured with the Windows container feature.

Container Repository

Place that the container image and its dependencies (such as libraries) are stored. Can reuse the image multiple times on a container host.

Quick Migration

Process of moving an entire VM or parts of a VM to another physical server using a cluster.

Live Migration (LM)

Process of moving an entire VM or parts of a VM to another physical server without a cluster.

Storage Migration

Process of moving the storage of a VM from one physical server to another without a cluster.

Sandbox

Provides a layer that consists of all changes made to the container, including file system and registry modifications and software installations. Keep or discard changes as needed.

Hyper-V Containers

Provides a more isolated environment, they do not share container OS images with other Hyper-V containers. Each container has its own OS.

Network Health Protection

Provides network high availability with Hyper-V, which automatically migrates from one failover cluster node to another failover cluster node if network connectivity on a specific network adapter becomes disconnected.

Container OS Image

Provides the OS environment.

Hyper-V Virtualization

Provides virtual networks for the virtual machines to communicate with other virtual machines and it allows the virtual machines to communicate with the physical network infrastructure. Just like a physical network, the virtual devices connect to virtual switches, which can provide security, isolation, and service levels.

Out-of-band patches

Released at other times when the patches are deemed critical or time-sensitive.

Dockerfile

Text document that contains all the commands a user could call to assemble an image, including using an existing image as a base. Dockerfile can then be used to automate the creation of container images, which can be performed in rapid and precise re-creation of container images.

To add the NLB feature to a computer running Windows Server 2016, you use ____________.

Server Manager

Windows Server Containers

Share the OS kernel with the container host and with all other containers that run on the host. Does not provide complete isolation of the containers. Provides faster startup.

Docker Container

Software wrapped in a complete file system that includes everything it needs to run. Runs as an isolated process in the user space on the host OS.

Hyper-V Virtual Switch

Software-based layer-2 network system that can be managed with Hyper-V Manager.

Filter Mode

Specifies which hosts can respond to requests.

Port Rules

Specify how NLB directs traffic based on the port and protocol.

Synchronization

The process of connecting and downloading updates.

Downstream Server

The servers that obtain their updates from the upstream server.

L2 Tunnel

This mode is used with private and public cloud deployments, specifically with Microsoft Cloud Stack.

Network Load Balancing (NLB)

Transparently distributes traffic across multiple servers by using virtual IP addresses and a shared name. Gain fault tolerance and enhanced performance. Often used with mission -critical web servers, but can also be found with other types of servers.

NLB host multicast mode, each NLB network adapter has _____ MAC addresses (the original MAC address and the virtual MAC address)

Two

Internal Virtual Switch

Used only by VMs that run on the physical computer and between the VMs and the physical computer.

Convergence

When a node is added or removed from a cluster. Can occur only if each node is configured with the same port rules.

Upstream Server

When multiple servers are use, the server that provides updates.

NIC Teaming (Bonding, Balancing, or Aggregation)

Windows feature that enables administrators to join multiple network adapters into a single entity, for performance enhancement or fault-tolerance purposes.

Internet Group Management Protocol (IGMP) multicast mode is a special form of multicast mode that ______ the network switch form flooding with traffic.

prevents

If Windows Update fails to retrieve any updates, you should check your ______ settings.

proxy


Conjuntos de estudio relacionados

320 Legal Dimensions of Nursing Practice

View Set

PrepU Ch 29: Management of Patients with Nonmalignant Hematologic Disorders

View Set

Law and Legal Environment Exam 1

View Set

08 Intermediate: File I/O in C Programming

View Set

Managerial Accounting- Chapter 19

View Set