Netherlands: Software

Introductie Windows Server 2016

Issue link:

Contents of this Issue


Page 96 of 173

88 C H A P T E R 4 | Networking Ready for cloud scale, including scale-out capability and scale-up capability for multiplexers and host agents. Software Load Balancing has been specifically designed to handle throughput on a scale of tens of gigabytes per cluster, making this a viable alternative to traditional hardware load balancers. At this point, before we dive into the Software Load Balancing, let's define a few terms: Virtual IP Address This is the IP that to which external connections will route Dynamic IP Address This is the set of IPs on the VMs backing the service When you have a service that requires Software Load Balancing, Network Controller is notified of the request and provisions a Software Load Balancing multiplexer. You can have several different multiplexers in an environment. Each multiplexer will be assigned a virtual IP address. The BGP then announces the virtual IP address to the network. The multiplexer is also responsible for accepting connections and routing them to the VMs backing the service. Because the virtual IP address is announced through BGP and is controlled by Network Controller, in the event of a multiplexer failure, Network Controller has the ability to recover by initiating a new multiplexer and reannouncing the routes through BGP. Figure 4-5 shows the Software Load Balancing architecture. Figure 4-5: An overview of Software Load Balancing More info Software Load Balancing requires that Network Controller be installed and configured. For instructions on how to do this, go to view the TechNet article at Datacenter firewall Introduced in Windows Server 2016 Technical Preview, the datacenter firewall is designed to be a network-layer firewall with the following features: Stateful packet inspection Multitenant Five-tuple rule matching (Protocol, source and destination port numbers, source and destination IP addresses) This is a multitenant option; you can use it to protect tenant VM workloads and configure it via the tenant administrators. This means that it can implement the security policies by which your organization is governed. Figure 4-6 illustrates the datacenter firewall.

Articles in this issue

Links on this page

Archives of this issue

view archives of Netherlands: Software - Introductie Windows Server 2016