Solved

Help with Microsoft Network Load Balancing Setup in Server 2008 R2 NIC Setup Virtual Machines

Posted on 2014-01-24
4
758 Views
Last Modified: 2014-01-24
I am in the process of setting up MS NLB on a IIS server which are both 2008 R2.  Both servers a virtual servers (ESXi 5.0).  I have set up NLB using a dedicated IP on both servers and using the IGMP Multicast.  I have tested and the setup works on my developement network.  Of course I had to add static ARP entry into my switch.  My current nic setup is as follows:

Server 1 NIC 1 = IP 10.0.0.1
Server 2 NIC 1 = IP 10.0.0.2

I configured the cluster and added the cluster IP of 10.0.0.3.  Is this how it should be designed?  Should the Cluster IP be on the same NIC's as my dedicated IP?

Do I need a second NIC on each server for heartbeat messages?  

If so, is it best practice to set the second NICs up with a private non routable IP on both servers e.g. 192.168.1.1 or something simular?  

What happens if I need the heartbeat NIC and I don't assign it?  Will NLB fail?
0
Comment
Question by:Conrad_Bel
  • 2
  • 2
4 Comments
 
LVL 18

Accepted Solution

by:
Peter Hutchison earned 500 total points
ID: 39806371
1. Yes, each server will havew its own unique IP address.
2. Yes,T te Cluster IP should be added to the TCPIP v4 properties on each server.
3. It is a good idea for a private non-routable IP on 2nd nics. Although, we have had NLBs without a heartbeat network.
4. Also, in NLB you can configure which protocols are Load balanced, such as port 80 and 443 for Web servers. By default all TCP ports are load balanced, which is not really necessary.
0
 

Author Comment

by:Conrad_Bel
ID: 39806406
SO my current setup is correct then in which the Cluster (VirtualIP) is using the same NIC and IP range of my Dedicated NICS?
0
 
LVL 18

Expert Comment

by:Peter Hutchison
ID: 39806826
Yes, that is correct.
0
 

Author Comment

by:Conrad_Bel
ID: 39806916
Thank you very much for your quick responses and excelent help.
0

Featured Post

Do You Know the 4 Main Threat Actor Types?

Do you know the main threat actor types? Most attackers fall into one of four categories, each with their own favored tactics, techniques, and procedures.

Join & Write a Comment

Redirected folders in a windows domain can be quite useful for a number of reasons, one of them being that with redirected application data, you can give users more seamless experience when logging into different workstations.  For example, if a use…
Possible fixes for Windows 7 and Windows Server 2008 updating problem. Solutions mentioned are from Microsoft themselves. I started a case with them from our Microsoft Silver Partner option to open a case and get direct support from Microsoft. If s…
To efficiently enable the rotation of USB drives for backups, storage pools need to be created. This way no matter which USB drive is installed, the backups will successfully write without any administrative intervention. Multiple USB devices need t…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

759 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

16 Experts available now in Live!

Get 1:1 Help Now