DESKTOP

Windows 8 : Using Hyper-V - Configuring virtual machine networking and storage (part 2) - Hyper-V virtual switch

8/22/2014 4:10:42 AM

Hyper-V virtual switch

As mentioned previously, the Hyper-V virtual switch can operate three modes: external, internal, and private. Each of these switch modes has different characteristics that need to be considered before placing VMs on them.

By far, the external virtual switch type is the most commonly used option. External mode places a virtual machine (with its 00-15-5D-xx-xx-xx MAC address) on the same Ethernet network as the computer running Windows 8 with the Hyper-V feature enabled. When this happens, the virtual machine can communicate with other network systems and externally with the Internet if routed correctly. The TCP/IP address will also be the same as physical systems in this configuration. Other networking protocols can also be used. The external mode operates much like an uplink function on a physical switch.

The external virtual switch type has granular configuration options, which can be important if technologies such as virtual local area networks (VLANs) are used in your environment. If a VLAN configuration is necessary, the Hyper-V virtual switch can deliver multiple external virtual switches on multiple VLANs—much like the Hyper-V configuration found frequently in Windows Server 2012 virtualized infrastructures. The external virtual switch can use dedicated interfaces or can share traffic with the computer running Windows 8 with the Hyper-V feature enabled, as shown in Figure 3.

The external network and sharing the network adapter

Figure 3. The external network and sharing the network adapter

The internal virtual switch type (Figure 4) enables virtual machines to interact with the computer running Windows 8 with the Hyper-V feature enabled and with one another but does not allow communication with the physical network. This is good when you need to move files between the virtual machines and the Windows 8–based computer; however, you might not want to allow the virtual machines to communicate externally. Network placement situations with earlier operating systems without critical updates and service packs might not be desirable. With the internal virtual switch, their presence is off the physical network.

If the virtual machines on the internal switch type need to interact with resources on the network or Internet when the external type is not an option, it might be possible to have software on the Windows 8–based computer with the Hyper-V feature enabled run a router or proxy service. In this manner, outbound traffic to the network would be sent directly from the computer running Windows 8 and not from the virtual machines (as is the case with the external virtual switch type). Traffic on the internal switch type does not travel on an actual network interface; it is provided by the Hyper-V engine itself. This situation might arise when there are restrictions on the physical network of what type of systems can be connected; also, the virtual machines might not meet the requirements for the network (security, updates, operating system type, and so on).

Internal type limiting traffic for virtual machines to the computer running Windows 8 with the Hyper-V feature enabled and the virtual machines

Figure 4. Internal type limiting traffic for virtual machines to the computer running Windows 8 with the Hyper-V feature enabled and the virtual machines

The last type option for the Hyper-V virtual switch is the private type (see Figure 5), which keeps traffic contained to the virtual machines on the computer running Windows 8 with the Hyper-V feature enabled. Although the Windows 8–based computer provides the virtual switch for the virtual machines, it is not connected to it. In this situation, the only way to interact with the virtual machines is to use the Virtual Machine Connection screen to access the virtual console. The private type is useful for specific and isolated testing situations when minimal networking is required.

Private type limiting VM network traffic to VMs on the computer running Windows 8 with the Hyper-V feature enabled

Figure 5. Private type limiting VM network traffic to VMs on the computer running Windows 8 with the Hyper-V feature enabled

Other  
  •  Windows 8 : Using other management tools remotely (part 3) - Microsoft Management Console
  •  Windows 8 : Using other management tools remotely (part 2) - Windows PowerShell
  •  Windows 8 : Using other management tools remotely (part 1) - Netsh, Windows Remote Shell
  •  Windows 8 : Configuring, managing, and troubleshooting connections (part 3) - Connecting to VPNs in Windows 8
  •  Windows 8 : Configuring, managing, and troubleshooting connections (part 2) - Using Troubleshooter
  •  Windows 8 : Configuring, managing, and troubleshooting connections (part 1) - Troubleshooting network problems
  •  Windows 8 : Configuring and using Remote Desktop (part 3) - Programs, Experience, Advanced
  •  Windows 8 : Configuring and using Remote Desktop (part 2) - Opening the Remote Desktop application - General, Display, Local Resources
  •  Windows 8 : Configuring and using Remote Desktop (part 1) - Configuring Remote Desktop
  •  Windows 8 : Working with Remote Assistance - Initiating Remote Assistance, Providing remote assistance
  •  
    Top 10
    3 Tips for Maintaining Your Cell Phone Battery (part 2) - Discharge Smart, Use Smart
    3 Tips for Maintaining Your Cell Phone Battery (part 1) - Charge Smart
    OPEL MERIVA : Making a grand entrance
    FORD MONDEO 2.0 ECOBOOST : Modern Mondeo
    BMW 650i COUPE : Sexy retooling of BMW's 6-series
    BMW 120d; M135i - Finely tuned
    PHP Tutorials : Storing Images in MySQL with PHP (part 2) - Creating the HTML, Inserting the Image into MySQL
    PHP Tutorials : Storing Images in MySQL with PHP (part 1) - Why store binary files in MySQL using PHP?
    Java Tutorials : Nested For Loop (part 2) - Program to create a Two-Dimensional Array
    Java Tutorials : Nested For Loop (part 1)
    REVIEW
    - First look: Apple Watch

    - 3 Tips for Maintaining Your Cell Phone Battery (part 1)

    - 3 Tips for Maintaining Your Cell Phone Battery (part 2)
    VIDEO TUTORIAL
    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 1)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 2)

    - How to create your first Swimlane Diagram or Cross-Functional Flowchart Diagram by using Microsoft Visio 2010 (Part 3)
    Popular Tags
    Microsoft Access Microsoft Excel Microsoft OneNote Microsoft PowerPoint Microsoft Project Microsoft Visio Microsoft Word Active Directory Biztalk Exchange Server Microsoft LynC Server Microsoft Dynamic Sharepoint Sql Server Windows Server 2008 Windows Server 2012 Windows 7 Windows 8 Adobe Indesign Adobe Flash Professional Dreamweaver Adobe Illustrator Adobe After Effects Adobe Photoshop Adobe Fireworks Adobe Flash Catalyst Corel Painter X CorelDRAW X5 CorelDraw 10 QuarkXPress 8 windows Phone 7 windows Phone 8 BlackBerry Android Ipad Iphone iOS