Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Windows 2008 R2 Hyper-v 4 nics and using all nics

Posted on 2011-03-22
1
Medium Priority
?
659 Views
Last Modified: 2012-05-11
I have a Windows 2008 Hyper-V servers running in a 2 node cluster and Cluster Shared Volumes.
I have one nic assigned to my primary network.
I have one nic assigned to an iSCSI Lun to my Netapp Appliance.
Is it best practice to assign my 3rd nic to an iSCSI Lun for my quorum disk?
Can I assign my 4th nic to my Hyper-V virtual machines I create on the server?
Can the nic I assign to my Hyper-V virtual machines be on the same subnet as my primary nic?
I.E.  172.44.16.45  and 172.44.16.50?

Is this best practices?
0
Comment
Question by:lanman777
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
1 Comment
 
LVL 42

Accepted Solution

by:
kevinhsieh earned 2000 total points
ID: 35196108
When you create a virtual network using Hyper-V manager, uncheck "Allow management operating system to share this network adapter". That will remove it from the cluster host, and it won't have an IP address. All of your VMs can then use that NIC.

Instead of trying to dedicate a NIC to your CSV and another NIC to the disk quorum, you should use MPIO to connect to all of your iSCSI volumes using two NICs. That is standard good practice. I am not familiar with NetApp, but they do have an MPIO package that you need to pay for, so you may or may not have it. Otherwise just install the Microsoft MPIO package.

http://communities.netapp.com/message/13153

http://technet.microsoft.com/en-us/library/ee619752(WS.10).aspx
0

Featured Post

Threat Trends for MSPs to Watch

See the findings.
Despite its humble beginnings, phishing has come a long way since those first crudely constructed emails. Today, phishing sites can appear and disappear in the length of a coffee break, and it takes more than a little know-how to keep your clients secure.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

In this article, I will show you HOW TO: Perform a Physical to Virtual (P2V) Conversion the easy way from a computer backup (image).
Giving access to ESXi shell console is always an issue for IT departments to other Teams, or Projects. We need to find a way so that teams can use ESXTOP for their POCs, or tests without giving them the access to ESXi host shell console with a root …
This tutorial will give a short introduction and overview of Backup Exec 2012 and how to navigate and perform basic functions. Click on the Backup Exec button in the upper left corner. From here, are global settings for the application such as conne…
This course is ideal for IT System Administrators working with VMware vSphere and its associated products in their company infrastructure. This course teaches you how to install and maintain this virtualization technology to store data, prevent vuln…

636 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question