Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases now! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft Hyper-V Cluster Design

You're reading from   Microsoft Hyper-V Cluster Design To achieve a Windows Server system that virtually takes care of itself, you need to master Hyper-V cluster design. This book is the perfect tutorial on the subject, providing clear instruction on expanding into the virtualized environment.

Arrow left icon
Product type Paperback
Published in Oct 2013
Publisher
ISBN-13 9781782177685
Length 462 pages
Edition 1st Edition
Tools
Arrow right icon
Author (1):
Arrow left icon
Eric Siron Eric Siron
Author Profile Icon Eric Siron
Eric Siron
Arrow right icon
View More author details
Toc

Table of Contents (14) Chapters Close

Preface 1. Hyper-V Cluster Orientation FREE CHAPTER 2. Cluster Design and Planning 3. Constructing a Hyper-V Server Cluster 4. Storage Design 5. Network Design 6. Network Traffic Shaping and Performance Enhancements 7. Memory Planning and Management 8. Performance Testing and Load Balancing 9. Special Cases 10. Maintaining and Monitoring a Hyper-V Server Cluster 11. High Availability 12. Backup and Disaster Recovery Index

Virtual adapter networking control


A few traffic control and shaping technologies are specific to virtual adapters, or are handled differently than on their physical counterparts. All of these settings are parameters of the Set-VMNetworkAdapter cmdlet.

IPSec offloading can also be enabled on individual virtual adapters. There is a checkbox in the GUI in the same location as the VMQ and SR-IOV settings (see the VMQ section for navigation instructions and a screenshot). It can be changed for any virtual adapter using the IPsecOffloadMaximumSecurityAssociation parameter of the Set-VMNetworkAdapter cmdlet.

Applications and guest operating systems have the ability to assign 802.1p tags to their traffic. You can instruct the host operating system to respect these tags with the IeeePriorityTag parameter. If it is set to On, tags will be allowed; if Off, they will be ignored. Tagged packets will be handled according to the system's QoS policies and/or DCB settings.

By setting the DhcpGuard parameter...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime