Wednesday, May 26, 2010

WindowsNetworking.com - May 2010 Newsletter

-----------------------------------------
WindowsNetworking.com Monthly Newsletter of May 2010
Sponsored by: SolarWinds <hthttp://www.solarwinds.com/register/index.aspx?Program=607&c=70150000000E1x5&CMP=BIZ-TAD-TG-X-NPM-eNL-Q2_2010>
-----------------------------------------

Welcome to the WindowsNetworking.com newsletter by Debra Littlejohn Shinder <http://www.windowsnetworking.com/Deb_Shinder/>, MVP. Each month we will bring you interesting and helpful information on the world of Windows Networking. We want to know what all *you* are interested in hearing about. Please send your suggestions for future newsletter content to: dshinder@windowsnetworking.com


1. A Very Short Course on Hyper-V Virtual Networks
---------------------------------------------------------

Networking in Hyper-V is sort of interesting for those who are used to physical networking or how networking is implemented in VMware. With Hyper-V, the guest operating systems never have direct access to the hardware, and the Hyper-V management interfaces control the traffic moving through the physical and virtual interfaces.

Hyper-V has a Virtual Network Manager. The Virtual Network Manager is responsible for creating and controlling virtual switches. There is no limit on the number of virtual switches you can create – depending on the type of virtual network you are working with. For example, external virtual networks are basic on physical NICs, so you can only have the number of external networks that is the same as your number of physical NICs.

The concept of virtual network is an important one for you to understand. Consider a virtual network to be like a switch, but instead of a physical switch, it's a virtual switch. All the virtual machines that connect to the same virtual network switch are, funnily enough, connected to the same switch. Each virtual switch is logically isolated from all other virtual switches. If you want hosts connected to one virtual switch to communicate with hosts on another virtual switch, you can create a virtual router, VPN server, firewall or similar device that you would have on a physical network. It's a good idea to create different virtual switches if you have scenarios where you need to have network isolation similar to what you would have on a physical network, where the different segments are separate by firewalls or some other access control device.

There are three types of virtual networks you can connect to:

* Private Virtual Network
* Internal Virtual Network
* External Virtual Network

A Private Virtual Network is virtual switch that only VMs can connect to. Guest operating systems connected to the same Private Virtual Network can communicate with each other, but they cannot communicate with the Host operating system and the Host operating system cannot connect to the VMs on the Private Virtual Network. Private Virtual Networks are great if you need total isolation from all other Virtual Networks, but can be problematic if you need to copy files to the virtual machines, since there is no connectivity to any physical network or to the Host operating system. In this scenario, you can create a virtual machine that is a firewall or a router, and connect on virtual NIC to the Virtual Private Network and one virtual NIC to the physical network (through an External Virtual Network, which we'll cover in just a bit).

An Internal Virtual Network is similar to a Private Virtual Network in that it is not bound to any physical NIC. The Internal Virtual Network is an isolated virtual switch like the Private Virtual Network, but in the case of the Internal Virtual Network, the Host operating system has access to the guest virtual machines through the Internal Virtual Network virtual switch. However, there is no DHCP-like functionality with this virtual switch (as there is with some instantiations of VMware workstation), so if you want to communicate with virtual machines connected to the Internal Virtual Network switch, you need to assign the virtual NIC assigned to that Internal Virtual Network for the Host operating system an IP address which is valid on the virtual network that you are trying to connect to.

An External Virtual Network is different from the other Virtual Networks because they are associated with physical NICs. You can have one External Virtual Network for each NIC installed on the Hyper-V server. The External Virtual Network switch will actually appear to take the place of the physical NIC on the Hyper-V server – so that if you were to look at the configuration of the former NIC, it would appear to not have any IP addressing assigned to it. Instead, a virtual NIC is added to the Network Connections window and that virtual NIC is connected to the External Virtual Network switch, and it is that virtual NIC that has the IP addressing assigned to it that allows it to communicate with the physical network.

There you have it – a very short course on Hyper-V networks. The type of virtual network you decide to use will depend on your security and isolation requirements. In most cases you'll start with connecting the virtual machines to an External Virtual Network, but then change them over to either a Private or Internal Virtual Network.

Let me know if you have any questions on the types of Virtual Networks used by Hyper-V and I'll answer your questions in the next newsletter.

Thanks!
Deb
dshinder@windowsnetworking.com


=======================
Quote of the Month - "Two can live for the price of one, for half as long" - Anon.
=======================


2. ISA Server 2006 Migration Guide - Order Today!
---------------------------------------------------------

Dr. Tom Shinder's best selling books on ISA Server 2000 and 2004 were the "ISA
Firewall Bibles" for thousands of ISA Firewall administrators. Dr. Tom and his
illustrious team of ISA Firewall experts now present to you , ISA Server 2006
Migration Guide
<http://www.amazon.com/exec/obidos/ASIN/1597491993/isaserver1-20/>. This book
leverages the over two years of experience Tom and his team of ISA Firewall
experts have had with ISA 2006, from beta to RTM and all the versions and builds
in between. They've logged literally 1000's of flight hours with ISA 2006 and
they have shared the Good, the Great, the Bad and the Ugly of ISA 2006 with
their no holds barred coverage of Microsoft's state of the art stateful packet
and application layer inspection firewall.

Order your copy of ISA Server 2006 Migration Guide
<http://www.amazon.com/exec/obidos/ASIN/1597491993/isaserver1-20/>. You'll be
glad you did.

3. WindowsNetworking.com Articles of Interest
---------------------------------------------------------

* Barracuda Spam Firewall - Voted WindowsNetworking.com Readers' Choice Award Winner - Anti Spam Hardware
<http://www.windowsnetworking.com/news/WindowsNetworking-Readers-Choice-Award-Anti-Spam-Hardware-Barracuda-Spam-Firewall-Mar10.html>

* Readers' Choice Awards Yearly Round Up 2009
<http://www.windowsnetworking.com/news/Readers-Choice-Awards-Yearly-Round-Up-2009.html>

* Deploying Windows 7 - Part 22: Bulk Populating the MDT Database Using PowerShell
<http://www.windowsnetworking.com/articles_tutorials/Deploying-Windows-7-Part22.html>

* Using BitLocker to Encrypt Removable Media (Part 3)
<http://www.windowsnetworking.com/articles_tutorials/Using-BitLocker-Encrypt-Removable-Media-Part3.html>

* Deploying Windows 7 Part 23: Managing Drivers &#150; Introduction
<http://www.windowsnetworking.com/articles_tutorials/Deploying-Windows-7-Part23.html>

* The Forefront Unified Access Gateway DirectAccess Wizard &#150; Part2: Examining the UAG DirectAccess Wizard Options
<http://www.windowsnetworking.com/articles_tutorials/Forefront-Unified-Access-Gateway-DirectAccess-Wizard-Part2.html>

* Using BitLocker to Encrypt Removable Media (Part 4)
<http://www.windowsnetworking.com/articles_tutorials/Using-BitLocker-Encrypt-Removable-Media-Part4.html>

* Deploying Windows 7 - Part 24: Managing Drivers &#150; Issues and Approaches
<http://www.windowsnetworking.com/articles_tutorials/Deploying-Windows-7-Part24.html>


4. Administrator KB Tip of the Month
---------------------------------------------------------

*What is Offline Domain Join?*

Windows 7 or Windows Server 2008 R2 computers can use the new feature called "Offline Domain Join". This process requires the Windows 7 or Windows Server 2008 R2. This step requires two steps: First the computer account is created or provisioned on the domain controller and the resulting information is stored in the metadata, and then this information is transferred to the joining computer. The workstation then performs the joining part without having the connectivity with the domain controller.

You need to use Djoin.exe on the domain controller to accomplish above. Please use Djoin.exe /? to see the syntaxes.

An example is given below:

Djoin.exe /provision /domain Name_Of_the_Domain_To_Be_Joined /machine Client_Computer_Name /savefileFile_Name.txt

For more information about offline domain join, check out:
http://blogs.technet.com/aviraj/archive/2009/03/01/windows-server-2008-r2-offline-domain-join-step-by-step-guide.aspx

For more administrator tips, go to WindowsNetworking.com/WindowsTips
<http://www.windowsnetworking.com/kbase/WindowsTips/>


5. Windows Networking Tip of the Month
---------------------------------------------------------

What is a "core network"? What is a core network in a Microsoft environment? A core network is a collection of network hardware, software, devices and network services that are required to meet your organization&#146;s network application requirements.

What are some examples of core network services? How about:

* TCP/IP, including IPv4 and IPv6
* DHCP
* DNS
* NetBIOS name resolution
* Active Directory forests
* RADIUS, or Network Policy Servers
* Routers, hubs and layer 2 and 3 switches
* Cat 6 cabling

If you're fairly new to the game, or just and to learn more about Windows core network services, then check out the Windows Server 2008 R2 Core Network Guide over at http://technet.microsoft.com/en-us/library/dd894461(WS.10).aspx


6. WindowsNetworking Links of the Month
---------------------------------------------------------

* What's New in Hyper-V
<http://technet.microsoft.com/en-us/library/dd446676(WS.10).aspx>

* Hyper-V Virtual Machine Snapshots FAQ
<http://technet.microsoft.com/en-us/library/dd560637(WS.10).aspx>

* Hyper-V Configuring Virtual Networks
<http://technet.microsoft.com/en-us/library/cc816585(WS.10).aspx>

* Hyper-V Live Migration Network Configuration Guide
<http://technet.microsoft.com/en-us/library/ff428137(WS.10).aspx>

* Cool Hyper-V Videos
<http://technet.microsoft.com/en-us/library/ee731912(WS.10).aspx>


7. Ask Sgt. Deb
---------------------------------------------------------

* QUESTION:

Hey Deb,

We were sitting around the other day and talking about geeky things and the subject of NTFS came up. If I remember correctly, NTFS was introduced with the first version of Windows NT and has seen a few changes over the years. What we were wondering is if there have been any changes lately to NTFS. Does Windows Server 2008 R2 introduce anything new or cool regarding NTFS?

Thanks! - Homer C.

* ANSWER:

Hi Homer,

NTFS is something a geek like you would think about! Seriously, file systems are key to a world class operating system, and NTFS enables Windows Server 2008 R2 to be that world class OS. Some of the major changes you&#146;ll find in NTFS with Windows Server 2008 R2 include:

* Delete notification for solid state disk drives (SSDs) with support for the T10 Trim command
* New opportunistic locks (oplocks) semantics and introduction of oplock keys
* Support for file system metadata defragmenting
* Improvement in volume shrink
* Ability to disable short names on a per-volume basis
* Improved concurrency of read requests while flushing
* Native VHD support
* Chkdsk performance improvements
* Robocopy performance enhancements
* Local file copy improvements

That's a lot of new stuff! If you want to learn the details of these improvements, check out the article What's New in NTFS over at http://technet.microsoft.com/en-us/library/ff383236(WS.10).aspx

TechGenix Sites
---------------------------------------------------------

MSExchange.org <http://www.msexchange.org/>
WindowSecurity.com <http://www.windowsecurity.com/>
ISAserver.org <http://www.isaserver.org/>
VirtualizationAdmin.com <http://www.virtualizationadmin.com/>

--
Visit the Subscription Management <http://www.techgenix.com/newsletter/>
section to unsubscribe.
WindowsNetworking.com is in no way affiliated with Microsoft Corp.
http://www.techgenix.com/advert/index.htm for sponsorship
information or contact us at advertising@windowsnetworking.com
Copyright c WindowsNetworking.com 2010. All rights reserved.

No comments:

Post a Comment