SCVMM R2 Operations Management 10: Adding a perimeter network computer

Source: Internet
Author: User
Tags configuration settings

SCVMM R2 Operations Management 10: Adding a perimeter network computer

The blog post in front of you talked about how to add a trusted Hyper-V host or cluster, and how to add an untrusted host or cluster, and I believe everyone has a deeper understanding, so in today's blog we'll show you how to add a perimeter network (DMZ) or Windows in a workgroup Server computers (standalone computers only)

We can use the following procedure to add a Hyper-V host in a perimeter network (also known as a DMZ, demilitarized zone, and perimeter subnet) as a managed Hyper-V host in System Center Virtual machine Manager. Only stand-alone hosts in the perimeter network can be added here, and SCVMM does not support the management of host clusters in the perimeter network. You can also use this procedure to add a standalone Hyper-V host that is not part of a domain in a workgroup.

Add Prerequisites:

You must install the agent locally on the server that you want to add before you can add hosts on the perimeter network to VMM.

Install the VMM agent on the target host

1. On the VMM product media or network share, right-click Setup.exe, and then click Run as Administrator

650) this.width=650; "height=" 484 "title=" clip_image002 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image002 "src=" http://s3.51cto.com/wyfs02/M02/6F/84/ Wkiol1wfhfsquox1aahepmffwl8599.jpg "border=" 0 "/>

2. On the Install menu, under optional installation, click Local Agent.

650) this.width=650; "height=" 465 "title=" clip_image004 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image004 "src=" http://s3.51cto.com/wyfs02/M00/6F/84/ Wkiol1wfhfthblp8aadiwexebzq514.jpg "border=" 0 "/>

3. On the Welcome page, click Next.

650) this.width=650; "height=" 484 "title=" clip_image005 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image005 "src=" http://s3.51cto.com/wyfs02/M02/6F/84/ Wkiol1wfhftdgspaaagreu2fcqg116.jpg "border=" 0 "/>

4. Review and accept the software License Terms, and then click Next.

650) this.width=650; "height=" 484 "title=" clip_image006 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image006 "src=" http://s3.51cto.com/wyfs02/M02/6F/84/ Wkiol1wfhfswug7yaakko54lezi277.jpg "border=" 0 "/>

5. On the destination Folder page, accept the default location or click Change to specify a different location, and then click Next.

650) this.width=650; "height=" 484 "title=" clip_image007 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image007 "src=" http://s3.51cto.com/wyfs02/M00/6F/84/ Wkiol1wfhfsjmrinaafhslrhj10623.jpg "border=" 0 "/>

6. On the Security File Folder page, do the following:

A. Select the this host is located in the perimeter network check box.

B. In the Security file encryption key box, enter the encryption key, and then enter it again in the Confirm encryption key box.

Security Safety Note

The encryption key is the value that you select. We recommend that you enter an encryption key that contains a combination of uppercase and lowercase letters, numbers, and symbols.

Note: You need to write down the encryption key used to create the security file. You must enter this same key again when you add a host in the VMM console.

C. Accept the default storage location for encrypted security files, or click Change to specify a different location where the encrypted security files are stored.

Note: Make a note of where the security files are stored. During the ensure that the Security.txt files are available for VMM, you must transfer the security files to a location that is accessible to the computer where the VMM console is installed.

D. To encrypt communication between the VMM Management Server and the host by using a certificate, select the use CA-signed certificate to encrypt communication with this host check box. In the thumbprint of the certificate box, enter the thumbprint of the certificate. (To obtain the thumbprint of the certificate, open the Certificates snap-in, and then select Computer account.) In the Certificates snap-in, locate and then double-click the certificate that you want to use. On the Details tab, select the Thumbprint field. In the lower pane, highlight the thumbprint value, and then press CTRL + C to copy the value to the Clipboard. )

650) this.width=650; "height=" 484 "title=" clip_image008 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image008 "src=" http://s3.51cto.com/wyfs02/M01/6F/84/ Wkiol1wfhfwscaxgaahr0kieovg785.jpg "border=" 0 "/>

When you are finished, click Next.

7. On the Host Network Name page, specify how the VMM Management Server will contact the host, and then click Next. You can select any of the following options:

A. Use the local computer name

B. Use IP Address

If you select Use IP address, click an IP address in the list.

Note: You need to note the computer name or IP address of the host. You must enter this same information again when you add a host in the VMM console.

650) this.width=650; "height=" 484 "title=" clip_image009 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image009 "src=" http://s3.51cto.com/wyfs02/M02/6F/84/ Wkiol1wfhfxa2difaafc9aelsto173.jpg "border=" 0 "/>

8. On the Configuration Settings page, accept the default port settings or specify a different port, and then click Next.

Note: We recommend that you do not change the default port 5986 for agent communication. The port settings assigned to the agent must exactly match the port settings used by the VMM Management Server. By default, the VMM Management Server uses port 5986 for proxy communication with hosts in the perimeter network and for file transfers using port 443.

650) this.width=650; "height=" 484 "title=" clip_image010 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image010 "src=" http://s3.51cto.com/wyfs02/M00/6F/84/ Wkiol1wfhfxi8f3waagjsl1kg9m437.jpg "border=" 0 "/>

9. On the Ready to install page, click Install.

650) this.width=650; "height=" 484 "title=" clip_image011 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image011 "src=" http://s3.51cto.com/wyfs02/M01/6F/84/ Wkiol1wfhfwhqawnaafn6v7ztu0775.jpg "border=" 0 "/>

Installation Complete:

650) this.width=650; "height=" 484 "title=" clip_image012 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image012 "src=" http://s3.51cto.com/wyfs02/M02/6F/84/ Wkiol1wfhfbgdklkaaf1lcakxri845.jpg "border=" 0 "/>

Make sure that the SecurityFile.txt file is available for VMM

1. On the target host, navigate to the folder where the security files are stored. By default, the location is C:\Program Files\Microsoft System Center 2012\virtual machine Manager. The name of the security file is SecurityFile.txt.

2. Transfer the security files to a location that is accessible to the computer where the VMM console is installed. For example, transfer the file to a computer that has the VMM console installed, an internal file share, or a USB flash drive.

Copy the "SecurityFile.txt" file to the computer where the VMM console is installed:

On the computer that has VMM installed (VMMSCVMM), do the following:

Access to the perimeter computer to be added via network path:

650) this.width=650; "height=" 380 "title=" clip_image014 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image014 "src=" http://s3.51cto.com/wyfs02/M00/6F/84/ Wkiol1wfhfbaw7zsaadm0gg9qs0586.jpg "border=" 0 "/>

You can see that it has been successfully copied:

650) this.width=650; "height=" 479 "title=" clip_image016 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image016 "src=" http://s3.51cto.com/wyfs02/M01/6F/84/ Wkiol1wfhfaxpv_4aae19iqcrnc212.jpg "border=" 0 "/>

To add a Hyper-V host in a perimeter network

1. In the VMM console, open the fabric workspace.

650) this.width=650; "height=" 483 "title=" clip_image018 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image018 "src=" http://s3.51cto.com/wyfs02/M02/6F/84/ Wkiol1wfhfergn1kaagbeiv_vf0116.jpg "border=" 0 "/>

2. In the fabric pane, click Servers.

650) this.width=650; "height=" 480 "title=" clip_image020 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image020 "src=" http://s3.51cto.com/wyfs02/M00/6F/84/ Wkiol1wfhffj7yz5aagtizamn9k600.jpg "border=" 0 "/>

3. On the Home tab, in the Add Group, click Add Resource, and then click Hyper-V Hosts and clusters, and the Add Resource Wizard starts.

650) this.width=650; "height=" 484 "title=" clip_image022 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image022 "src=" http://s3.51cto.com/wyfs02/M01/6F/84/ Wkiol1wfhferf2vhaahp3tziagc431.jpg "border=" 0 "/>

4. On the Resource Location page, click Windows Server computers in the perimeter network, and then click Next.

650) this.width=650; "height=" 484 "title=" clip_image024 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image024 "src=" http://s3.51cto.com/wyfs02/M02/6F/84/ Wkiol1wfhfedsbpwaaga35_1qku710.jpg "border=" 0 "/>

5. On the target Resources page, do the following:

A. In the Computer Name box, enter the NetBIOS name or IP address of the host in the perimeter network.

B. In the Encryption key box, enter the encryption key that was created when the agent was installed on the target host.

C. In the Security File path box, enter the path to the SecurityFile.txt file, or click Browse to locate the file.

D. In the Host group list, click the host group in which you want to add the hosts.

E. Click Add.

650) this.width=650; "height=" 484 "title=" clip_image026 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image026 "src=" http://s3.51cto.com/wyfs02/M00/6F/84/ Wkiol1wfhffw1onwaafaipuserq943.jpg "border=" 0 "/>

The computer is listed under computer name in the lower pane.

650) this.width=650; "height=" 484 "title=" clip_image028 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image028 "src=" http://s3.51cto.com/wyfs02/M00/6F/87/ Wkiom1wfhcbxrkudaafqytstkfw304.jpg "border=" 0 "/>

F. Repeat this step to add additional hosts in the perimeter network. When you are finished, click Next.

6. On the Host Settings page, in the Add the following path box, enter the path on the host where you want to store the virtual machine files that are deployed on the host, and then click Add. If you leave this box blank, the default path,%systemdrive%\programdata\microsoft\windows\hyper-v, is used. Note that it is best not to add the default path on the drive where the operating system files are located.

650) this.width=650; "height=" 480 "title=" clip_image030 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image030 "src=" http://s3.51cto.com/wyfs02/M01/6F/87/ Wkiom1wfhcatvz-1aagau-oxbrc790.jpg "border=" 0 "/>

Repeat this step if you want to add multiple paths. When you are finished, click Next.

Note: The "Reconnect this host to this Virtual machine Manager environment" check box can be ignored here. This setting does not apply to hosts in the perimeter network.

7. On the summary page, confirm the settings, and then click Finish.

650) this.width=650; "height=" 481 "title=" clip_image032 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image032 "src=" http://s3.51cto.com/wyfs02/M02/6F/87/ Wkiom1wfhcbxmcqdaae99o0p6ry840.jpg "border=" 0 "/>

The Jobs dialog box appears to display the job status. Make sure that the status of the job is completed, and then close the dialog box.

650) this.width=650; "height=" 438 "title=" clip_image034 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image034 "src=" http://s3.51cto.com/wyfs02/M00/6F/87/ Wkiom1wfhcfig-okaaifivzqang813.jpg "border=" 0 "/>

8. To verify that the host was successfully added, in the Fabric pane, expand Servers, expand all hosts, expand the host group where you added the hosts, and then click Hosts. In the hosts pane, verify that the host status is normal.

650) this.width=650; "height=" 451 "title=" clip_image036 "style=" border:0px;padding-top:0px;padding-right:0px; Padding-left:0px;background-image:none, "alt=" clip_image036 "src=" http://s3.51cto.com/wyfs02/M01/6F/84/ Wkiol1wfhfngw3kuaag6oi_oqu0957.jpg "border=" 0 "/>

Tips:

To view details about the status of the host, in the VMM console, right-click the host, and then click Properties. On the Status tab, you can view the health status of different regions, such as overall health, host agent Health, and Hyper-V role health. If there is a problem, you can click Repair All. VMM will try to fix the problem automatically.

This article is from the "Wu Yuzhang Microsoft blog" blog, make sure to keep this source http://wuyvzhang.blog.51cto.com/9992636/1672736

SCVMM R2 Operations Management 10: Adding a perimeter network computer

Related Article

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.