0% found this document useful (0 votes)
139 views

MCSA Lab Scenario - Erfan Taheri

The document describes a lab scenario for configuring a new branch office network at A. Datum Corporation. It includes instructions for identifying subnets, implementing DHCP, and installing a domain controller using IFM. The network team needs to separate clients and servers onto different subnets. The user is tasked with configuring DHCP, creating address reservations, and promoting a member server to a read-only domain controller using IFM to avoid slow WAN connections during deployment. This will improve sign-in performance for users in the new Yorkshire branch office.

Uploaded by

Hedieh Madah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
139 views

MCSA Lab Scenario - Erfan Taheri

The document describes a lab scenario for configuring a new branch office network at A. Datum Corporation. It includes instructions for identifying subnets, implementing DHCP, and installing a domain controller using IFM. The network team needs to separate clients and servers onto different subnets. The user is tasked with configuring DHCP, creating address reservations, and promoting a member server to a read-only domain controller using IFM to avoid slow WAN connections during deployment. This will improve sign-in performance for users in the new Yorkshire branch office.

Uploaded by

Hedieh Madah
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

MCSA Lab Scenario - A.

Datum Corp – Part 1 Erfan Taheri

Scenario
A. Datum Corporation is a global engineering and manufacturing company with a head office
based in London, England. A. Datum Corporation has an IT office and data center in London,
which supports the London location and branch offices in other locations as well. A. Datum has
recently deployed a Windows 2012 R2 Server infrastructure with Windows 8.1 clients.
You have been working for A. Datum for several years as a desktop support specialist and you
have recently accepted a promotion to the server support team. One of your first assignments is
deploying and configuring the infrastructure services for a new branch office in Yorkshire.

LAB Setup

Virtual Machines (London) Lon-DC1.Adatum.local


Lon-SRV1.Adatum.local
Virtual Machines (Yorkshire) York-DC1.Adatum.local
York-SRV1.Adatum.local
York-Host1.Adatum.local
York-CL1.Adatum.local
Username Adatum\Administrator
Password Pa$$w0rd

Lon-DC1.Adatum.local is a promoted writable domain controller in the London data center for
the Adatum.local domain. You will configure Lon-SRV1.Adatum.local as a printer server for
Yorkshire during the Scenario.
You need to deploy 3 new servers in Yorkshire site, all using windows server 2012 R2 and they
are member-servers. York-CL1 is a windows 8.1 client.

1
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 1: Identifying Appropriate Subnets


The new branch office is configured with a single subnet. After a security review, all branch office
network configurations are being modified to place servers on a separate subnet from the client
computers. You need to calculate the new subnet mask and the default gateways for the subnets
in your branch.
The current network for your branch office is 192.168.98.0/24. This network needs to be
subdivided into three subnets that meet the following requirements:
• One subnet with at least 100 IP addresses for clients.
• One subnet with at least 10 IP addresses for servers.
• One subnet with at least 40 IP addresses for future expansion. The main tasks for this exercise
are as follows:
1. Calculate the bits required to support the hosts on each subnet.
2. Calculate subnet masks and network IDs.

Task 1: Calculate the bits required to support the hosts on each subnet
1. How many bits are required to support 100 hosts on the client subnet?
2. How many bits are required to support 10 hosts on the server subnet?
3. How many bits are required to support 40 hosts on the future expansion subnet?
4. If all subnets are the same size, can they be accommodated?
5. Which feature allows a single network to be divided into subnets of varying sizes?
6. How many host bits will you use for each subnet? Use the simplest allocation possible, which
is one large subnet and two equal-sized smaller subnets.

Task 2: Calculate subnet masks and network IDs


1. Given the number of host bits allocated, what is the subnet mask that you will use for the
client subnet? Calculate the subnet mask in binary and decimal.
o The client subnet is using 7 bits for the host ID. Therefore, you can use 25 bits for the subnet
mask.

Binary Decimal

2
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

2. Given the number of host bits allocated, what is the subnet mask that you will use for the
server subnet? Calculate the subnet mask in binary and decimal.
o The server subnet is using 6 bits for the host ID. Therefore, you will use 26 bits for the
subnet mask.

Binary Decimal

3. Given the number of host bits allocated, what is the subnet mask that you can use for the
future expansion subnet? Calculate the subnet mask in binary and decimal.
o The future expansion subnet is using 6 bits for the host ID. Therefore, you will use 26
bits for the subnet mask.

Binary Decimal

4. For the client subnet, define the network ID, first available host, last available host, and
broadcast address. Assume that the client subnet is the first subnet allocated from the available
address pool. Calculate the binary and decimal versions of each address.

Binary Decimal
Network ID
First Host
Last Host
Broadcast

5. For the server subnet, define the network ID, first available host, last available host, and
broadcast address. Assume that the server subnet is the second subnet allocated from the
available address pool. Calculate the binary and decimal versions of each address.

Binary Decimal
Network ID
First Host
Last Host
Broadcast

6. For the future allocation subnet, define the network ID, first available host, last available host,
and broadcast address. Assume that the future allocation subnet is the third subnet allocated
from the available address pool.

3
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 2: Implementing DHCP Scenario


As part of configuring the infrastructure for the new branch office, you need to configure a DHCP
server that will provide IP addresses and configuration to client computers. Servers are
configured with static IP addresses and usually do not use DHCP for obtaining IP addresses.
One of the client computers in the branch office needs to access an accounting app in the head
office. The network team uses firewalls based on IP addresses to restrict access to this app. The
network team has requested that you assign a static IP address to this client computer. Rather
than configuring a static IP address on the client computer manually, you decide to create a
reservation in DHCP for the client computer.
The main tasks for this exercise are as follows:
1. Install the Dynamic Host Configuration Protocol (DHCP) server role.
2. Configure the DHCP scope and options.
3. Configure the client to use DHCP, and then test the configuration.
4. Configure a lease as a reservation.

Task 1: Install the Dynamic Host Configuration Protocol (DHCP) server role
1. Sign in to York-SRV1.
2. Open Server Manager, and then install the DHCP Server role.
3. In the Add Roles and Features Wizard, accept all defaults.

Task 2: Configure the DHCP scope and options


1. In Server Manager, open the DHCP console.
2. Authorize the SRV1.adatum.com server in AD DS.
3. In DHCP, in the navigation pane, browse to IPv4, right-click IPv4, and then click New Scope.
4. Create a new scope with the following properties:
o Name: Branch Office
o IP Address Range: Client Subnet (Part 4, Task 2, Exercise 1)
o Exclusions: first 3 addresses of the Client Subnet
o Configure Scope Options Router: first addresses of the Client Subnet

4
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

o DNS Server: York-DC1


o For all other settings use default values
5. Activate the scope.

5
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 3: Installing a Domain Controller Scenario


Users are experiencing slow sign-ins in Yorkshire during peak use times. The server team has
determined that the domain controllers are overwhelmed when many users authenticate
simultaneously and WAN links are unable to handle the traffic. To improve sign-in performance,
you will add a new Read-only domain controller in the Yorkshire branch office. A faster network
connection will be installed in a few weeks. Until then, network connectivity will be very slow.
The branch office requires a domain controller to support local sign-ins. To avoid problems with
the slow network connection, you will use IFM to install the domain controller in the branch
office.

Task 1: Use the ntdsutil tool to generate IFM Media


1. On LON-DC1, open an administrative command-line interface, and then use ntdsutil to create
an IFM backup of both the AD DS database and the SYSVOL folder.

Task 2: Add an Active Directory Domain Services (AD DS) role to a member server
1. Add the Active Directory Domain Services server role to York-DC1. Add all required features as
prompted. Installation will take several minutes.
2. When the installation completes, click Close to close the Add Roles and Features Wizard.

Task 3: Use IFM to configure a member server as a new domain controller


1. On York-DC1, at the command prompt, copy the IFM backup from K: to C:\ifm.
2. On York-DC1, use Server Manager with the following options to perform the post-deployment
configuration of AD DS:
o Add a domain controller to the existing Adatum.local domain
o Use Adatum\Administrator with the password Pa$$w0rd for credentials
o Use Pa$$w0rd for the DSRM password
o Use the IFM media to configure and install AD DS. Use the location C:\IFM for the IFM media
o Accept all other defaults

6
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 4: Managing Active Directory objects and Delegating Administration Scenario


A. Datum delegates management of each branch office to a specific group. This allows an
employee who works onsite to be configured as an administrator when required. Each branch
office has a branch administrators group that can perform full administration within the branch
office OU. There is also a branch office help desk group that is able to manage users in the
branch office OU, but not other objects. You need to create these groups for the new branch
office and delegate permissions to the groups.
The main tasks for this exercise are as follows:
1. Delegate administration for Branch Administrators.
2. Delegate a user administrator for the Branch Office Help Desk.
3. Add a member to the Branch Administrators.
4. Add a member to the Branch Help Desk group.

Task 1: Delegate administration for Branch Administrators.


1. Open Active Directory Users and Computers, and then in the Adatum.com domain, create a
new OU named Yorkshire.
2. Create the following global security groups in the Yorkshire OU:
o Yorkshire Help Desk
o Yorkshire Administrators
o Yorkshire Users
3. use the Delegate Control Wizard to delegate administration of the Yorkshire OU to the
Yorkshire Administrators security group by delegating the following common and custom tasks:
a. Delegate the following common tasks:

 Create, delete, and manage user accounts


 Reset user passwords and force password change at next logon
 Read all user information
 Create, delete and manage groups
 Modify the membership of a group
 Manage Group Policy links
b. Delegate the following custom tasks:

 Create and delete computer objects in the current OU

7
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

 Full control of computer objects in the current OU


Delegate the following common tasks to Yorkshire Helpdesk:

 Reset user passwords and force password change at next logon


 Read all user information
 Modify the membership of a group

Task 2: Creating Yorkshire user accounts


Human Resource department has provided you a list of Yorkshire users containing information of
300 employees. You need to create user accounts for the employees using random passwords.
Write a PowerShell script in order to create user for the Yorkshire. All user accounts must be
created in the Yorkshire OU and have the membership of Yorkshire Users security group.
1. Use PowerShell in order to accomplish all the tasks.

8
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 5: Implementing DNS Scenario


Contoso is a partner organization that is working closely with users in the new branch office. To
support name resolution between A Datum’s branch office and Contoso, you decide to enable
DNS forwarding between the two DNS domains.
As part of configuring the infrastructure for the new branch office, you must configure a DNS
server that provides name resolution for the branch office. This includes the forwarding for
Contoso.com. The DNS server in the branch office will be a domain controller. The Active
Directory integrated zones required to support logons will be replicated automatically to the
branch office.
In order to facilitate accessing A. Datum ERP web apps, you have decided make it possible for the
user to access the website simply by typing adatum.erp. However, your manager approved to
make it possible only in the Yorkshire site.

Task 1: Creating Conditional Forwarder


1. On York-DC1 create a new active directory integrated conditional forwarder for
contoso.com to the server 172.16.0.10

Task 2: Configure Internet name resolution to forward to the head office


1. Configure DNS forwarder in order to resolve internet namespace. All Internet name
queries must be forwarded to Lon-Dc1.

Task 3: Create host records for ERP web apps in the Adatum.erp Namespace
1. On York-DC1, open DNS Manager. Create a new Primary Zone for the Adatum.erp namespace.
This zone must not be active directory integrated since this zone must be available in the
Yorkshire branch office only.
2. Go to the Adatum.erp. Create a new A record with empty host name for IP Address of
172.16.0.15.
3. Using Internet Explorer, Open Adatum.erp to check the configuration.

Task 4: Managing the DNS Server Cache

9
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

After contoso changed some host records in its own DNS server, you noticed that clients that use
York-SRV1 as their DNS server were still receiving old IP addresses during the name-resolving
process. You need to clear server cache.

10
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 6: Implementing File and Print Services Scenario


Your manager has asked you to create a new shared folder, which all departments will use.
There will be a single file share, with separate folders, for each department. To ensure that users
see only the folders and files to which they have access, you need to set the file permissions on
the departmental folders and enable access-based enumeration on the share.
There have been problems in other branch offices with multiple versions of files when offline
files were used for shared data structures. To avoid these conflicts, you need to disable Offline
Files for this share.

Task 1: Create the folder structure for the new share


• On York-SRV1, open File Explorer and create the following folders:
o E:\Data
o E:\Data\Development
o E:\Data\Marketing
1. In File Explorer, block the file permissions inheritance for E:\Data\Development and
E:\Data\Marketing, and when prompted, convert inherited permissions into explicit permissions.
2. In File Explorer, remove permissions for York-SRV1\Users on E:\Data\Development and
o E:\Data\Marketing
3. Add the following file permissions for the folder structure and share the folders.
o E:\Data No change
o E:\Data\Development Modify: Adatum\Development
o E:\Data\Marketing Modify: Adatum\Marketing
You may also create security groups if required.

Task 2: Enable access-based enumeration


1. Switch to York-SRV1.
2. Open Server Manager.
3. Click File and Storage Services.
4. Click Shares.
5. Open the Properties dialog box for the Data share, and then on the Settings page, enable

11
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Access-based enumeration.

12
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Task 3: Creating and Configuring a Printer Pool Scenario


Your manager has asked you to create a new shared printer for your branch office. However,
instead of creating the shared printer on the local server in the branch office, he has asked you
to create the shared printer in the head office and use Branch Office Direct Printing. This allows
people in the head office to manage the printer, but prevents print jobs from traversing WAN
links. To ensure high availability of this printer, you need to format it as a pooled printer. Two
physical print devices of the same model have been installed in the branch office for this
purpose.
Install the Print and Document Services server role
1. On LON-SRV1, open Server Manager.
2. Install the Print and Document Services role, and then accept the default settings.
3. On LON-SRV1, use the Print Management console to install a printer with following
parameters:
o IP Address: 172.16.0.200
o Driver: Microsoft XPS Class Driver
o Name: Branch Office Printer
o Share the printer.
o List the printer in AD DS.
o Enable Branch Office Direct Printing.
4. On LON-SRV1, in the Print Management console, create a new port with the following
configuration:
o Type: Standard TCP/IP port
o IP Address: 172.16.0.201
o Connection: Generic Network Card
5. Open the Branch Office Printer Properties dialog box, and then on the Ports tab, enable
printer pooling. Select port 172.16.0.201 as the second port.
6. Deploy the printer using group policy for all Yorkshire users.

13
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 7: Creating GPOs


After a recent meeting of the IT Policy committee, management has decided that A. Datum will
use Group Policy to restrict user access to the General page of Internet Explorer.
Your manager has asked you to create a starter GPO that can be used for all departments, with
default restriction settings for Internet Explorer. You then need to create the GPOs that will
deliver the settings for members of all departments except for the IT department.

Task 1: Create a Windows Internet Explorer Restriction default starter GPO


1. Open the GPMC, and then create a starter GPO named Internet Explorer Restrictions.
2. Type a comment that states This GPO disables the General page in Internet Options.

Task 2: Configure the Internet Explorer Restriction starter GPO


1. Configure the starter GPO to disable the General page of Internet Options, and then name it
Internet Explorer Restrictions.
Hint: To select all the content, click in the details pane, and then press CTRL+A.
2. Close the Group Policy Management Editor window.

Task 3: Create an Internet Explorer Restrictions GPO from the Internet Explorer Restrictions
starter GPO
• Create a new GPO named IE Restrictions that is based on the Internet Explorer Restrictions
starter GPO, and then link it to the Adatum.com domain.

Task 4: Use security filtering to exempt the IT Department from the Internet Explorer Restrictions
policy
1. On LON-DC1, open the GPMC.
2. Configure security filtering on the Internet Explorer Restrictions policy to deny access to the IT
department.

14
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 8: Using Group Policy to Secure Member Servers Scenario


Your manager has given you some security-related settings that need to be implemented on all
member servers in Yorkshire. You also need to implement file system auditing for a file share
used by the Marketing department. Finally, you need to implement auditing for domain logons.
A. Datum Corporation uses the Computer Administrators group to provide administrators with
permissions to administer member servers. As part of the installation process for a new server,
the Computer Administrators group from the domain is added to the local Administrators group
on the new server. Recently, this important step was missed when configuring several new
member servers.
To ensure that the Computer Administrators group is always given permission to manage
member servers, your manager has asked you to create a GPO that sets the membership of the
local Administrators group on member servers to include Computer Server Administrators. This
GPO also needs to enable Admin Approval Mode for UAC.
Your manager has also asked you to configure new AppLocker policies to control the use of
applications on user workstations. The new configuration should allow applications to be run
only from approved locations. All users must be able to run applications from C:\Windows and
C:\Program Files.
You also need to add an exception to run a custom-developed application that resides in a
nonstandard location. The first stage of the implementation records from which locations
applications are being run now. Thesecond stage of implementation prevents unauthorized
applications from running.

Task 1: Create a Member Servers organizational unit (OU) and move servers into it
1. Create a new OU named Member Servers OU under Yorkshire OU.
2. Move servers York-SRV1 and York-SVR2 to Member Servers OU.

Task 2: Create a Member Server Security Settings Group Policy Object (GPO) and link it to the
Member Servers OU
1. Open the Group Policy Management Console.
2. In the Group Policy Management Console, in the Group Policy Objects container, create a new
GPO with a name Yorkshire Member Server Security Settings.
3. In the Group Policy Management Console, link the Member Server Security Settings to
Member Servers OU.

15
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Task 3: Configure group membership for local administrators to include Server Administrators
and Domain Admins
1.for the Yorkshire Member Server Security Settings, open the Group Policy Management Editor
window.
2. In the Group Policy Management Editor window, go to Computer Configuration\Policies
\Windows Settings\Security Settings\Restricted Groups.
3. Add the Yorkshire Administrators and Domain Admins groups to the Administrators group.

Task 4: Modify the Member Server Security Settings GPO to enable User Account Control: Admin
Approval Mode for the Built-in Administrator account
1. in the Group Policy Management Editor window, go to Computer Configuration
\Policies\Windows Settings\Security Settings\Local Policies\Security Options.
2. Enable User Account Control: Admin Approval Mode for the Built-in Administrator account.

Task 5: Modify the Member Server Security Settings GPO to enable object access auditing
1. In the Group Policy Management Editor window, go to Computer Configuration\Policies
\Windows Settings\Security Settings\Local Policies\Audit Policy.
2. Enable Audit object access with both Success and Failure settings.
3. Close the Group Policy Management Editor window.

Task 6: Enable auditing on the Marketing folder for Domain Users


1. On York-SRV1, configure auditing on the Marketing folder, with the following settings:
o Select a principal: Domain Users
o Type: All o Permission: Read & execute, List folder content, Read, Write
o Leave other settings with their default values
2. Refresh Group Policy on York-SRV1.

16
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Task 7: View the results in the security log on the domain controller
1. Switch to York-SRV1, and then start Event Viewer.
2. In the Event Viewer window, expand Windows Logs, and then open Security.
3. Verify that following event and information is displayed: o Source: Microsoft Windows Security
Auditing o Event ID: 4663 o Task category: File System
o An attempt was made to access an object

Task 8: Create an OU for client computers


1. Switch to LON-DC1.
2. Open Active Directory Users and Computers.
3. Create new OU called Client Computers under Yorkshire OU.
4. LON-DC1, in Active Directory Users and Computers, move LON-CL1 to the Client Computers
OU.

Task 9: Create a Software Control GPO and link it to the Client Computers OU
1. On LON-DC1, open the Group Policy Management Console.
2. In the Group Policy Management Console, in the Group Policy Objects container, create a new
GPO named Software Control.
3. For the Software Control GPO, open the Group Policy Management Editor window.
4. In the Group Policy Management Editor window, go to Computer Configuration\Policies
\Windows Settings\Security Settings\Application Control Policies\AppLocker.
5. Create default rules for the following:
o Executable Rules
o Windows Installer Rules o Script Rules
o Packaged app Rules
6. Configure rule enforcement with the Audit only option for the following:
o Executable Rules
o Windows Installer Rules

17
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

o Script Rules
o Packaged app Rules
7. In the Group Policy Management Editor window, go to Computer Configuration\Policies
\Windows Settings\Security Settings.
8. Click System Services, and then double-click Application Identity.
9. In the Application Identity Properties dialog box, click Define this policy setting.
10. Under Select service startup mode, click Automatic, and then click OK.
11. Close the Group Policy Management Editor window.
12. In the Group Policy Management Console, link the Software Control GPO to the Client
Computers OU.

18
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 9: Installing and Configuring a New Disk Scenario


The file server in your branch office is low on disk space. You need to add a new disk to the
server and create volumes based on specifications provided by your manager.
Your servers does not have a hardware-based RAID card, but you have been asked to configure
redundant storage. To support this feature, you need to create a storage pool on York-Host1.
After creating the storage pool, you need to create a redundant virtual disk. Because the data is
critical, the request for redundant storage specifies that you must use a three-way mirrored
volume. Shortly after the volume is in use, a disk fails, and you have to replace it by adding
another disk to the storage pool.

Task 1: Initialize a new disk


1. Sign in to York-SRV1 with the username Adatum\Administrator and the password Pa$$w0rd.
2. In Server Manager, open Computer Management, and then access Disk Management.
3. Initialize Disk2, and then configure it to use GPT (GUID Partition Table).

Task 2: Create and format two simple volumes on the disk


1. In the Computer Management console, on Disk 2, create a Simple Volume with the following
attributes: o Volume size: 4000 MB o Drive Letter: F o File system: NTFS o Volume label:
Volume1
2. In the Computer Management console, on Disk 2, create a Simple Volume with the following
attributes:
o Volume size: 5000 MB o Drive Letter: G o File system: ReFS o Volume label: Volume2

Task 3: Verify the drive letter in a File Explorer window


1. Use File Explorer to make sure you can access the following volumes: o Volume1 (F:) o
Volume2 (G:)
2. On Volume2 (G:), create a folder named Folder1.
Results: After completing this exercise, you should have initialized a new disk, created two simple
volumes, and then formatted them. Additionally, you should have verified

19
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Task 4: Create a storage pool from five disks that are attached to the server
1. On York-SVR2, open Server Manager.
2. In the left pane, click File and Storage Services, and then in the Servers pane, click Storage
Pools. 3. Create a storage pool with the following settings:
o Name: StoragePool1
o Physical disks:

 PhysicalDisk3
 PhysicalDisk4
 PhysicalDisk5
 PhysicalDisk6
 PhysicalDisk7

Task 5: Create a three-way mirrored virtual disk


1. On York-SVR2, in Server Manager, in the VIRTUAL DISKS pane, create a virtual disk with the
following settings:
o Storage pool: StoragePool1
o Name: Mirrored Disk
o Storage Layout: Mirror
o Resiliency settings: Three-way mirror
o Provisioning type: Thin
o Virtual disk size: 500 GB
2. In the New Volume Wizard, create a volume with the following settings:
o Virtual disk: Mirrored Disk
o Drive letter: H
o File system: ReFS
o Volume label: Mirrored Volume

20
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

Exercise 10: Implementing Server Virtualization with Hyper-V Scenario


Your assignment is to configure the infrastructure service for a new branch office. To use the
server hardware that is available currently at branch offices more effectively, your manager has
decided that all branch office servers will run as virtual machines. You must now configure a
virtual network and a new virtual machine for Yorkshire branch office.
After installing the Hyper-V role on the new server, you need to configure the virtual network.
You need to create a network that connects to the physical network and a private network that
you can use only for communication between virtual machines. You will use the private network
when you configure the virtual machines for high availability. You also need to configure a
specific range of media access control (MAC) addresses for the virtual machines.
You have been asked to deploy two virtual machines to York-HOST1. You are in the process of
developing a strategy to mitigate the impact of incorrectly applied change requests. As a part of
this strategy development, you are testing the speed and functionality of virtual machine
checkpoints to roll back to a previously existing stable configuration.
In this exercise, you will deploy Windows Server 2012 R2 in a virtual machine. You then will
create a stable configuration for that virtual machine, and create a virtual machine checkpoint.
Finally, you will modify the configuration, and roll back to the checkpoint.

Task 1: Install the Hyper-V role onto a server


1. Install Hyper-V server role on York-Host1.

Task 2: Complete the Hyper-V role installation, and verify the settings
1. Open the Hyper-V Manager console, and then click York-Host1.
4. Edit the Hyper-V settings of York-Host1, and then configure the following settings:
o Keyboard: Use on the virtual machine
o Virtual Hard Disks: H:\Virtual Hard Disks

Task 3: Configure the external network


1. Open the Hyper-V Manager console, and then click York-HOST1.
2. Use the Virtual Switch Manager to create a new External virtual network switch with the
following properties:

21
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

o Name: Switch for External Adapter


o External Network: Mapped to the host computer’s physical network adapter. (This varies
depending on the host computer.)

Task 4: Create a private network


In the Hyper-V Manager console use the Virtual Switch Manager to create a new virtual switch
with the following properties:
o Name: Private Network
o Connection type: Private network

Task 5: Create an internal network


Use the Virtual Switch Manager to create a new virtual switch with the following properties:
o Name: Internal Network
o Connection type: Internal network

Task 6: Configure the MAC address range


Use the Virtual Switch Manager to configure the following MAC Address Range settings:
o Minimum: 00-15-5D-0F-AB-A0
o Maximum: 00-15-5D-0F-AB-EF

Task 7: Create virtual machine


1. On York-HOST1, in the Hyper-V Manager console, in the Actions pane, click New, and then
click Virtual Machine.
2. Create a virtual machine with the following properties:
o Name: York-GUEST1
o Location: H:\York-GUEST1\
o Generation: Generation 2
o Memory: 1024 MB

22
MCSA Lab Scenario - A. Datum Corp – Part 1 Erfan Taheri

o Use Dynamic Memory: Yes


o Networking: Private Network
o New Virtual Hard Disk: H:\Virtual Hard Disks\York-GUEST1.vhdx

Task 8: Deploy Windows Server 2012 in a virtual machine


Open the Virtual Machine Connection Window and install Windows Server Server 2012 R2 on
York-Guest1.

Task 9: Create a virtual machine checkpoint


Create a checkpoint of York-GUEST1, and name the checkpoint Before Change.

Task 10: Modify the virtual machine


Sign in to the York-GUEST1 virtual machine, and use the Server Manager console to change the
computer’s name to LON-Computer1. Reboot York-Guest1

Task 11: Revert to the existing virtual machine checkpoint


1. Use the Virtual Machine Connection window to revert the virtual machine.
2. Verify that the Computer Name of the virtual machine now is set to York-GUEST1.
3. On York-HOST1, issue the following command: Measure-VM York-GUEST1
2. Note the average central processing unit (CPU), average random access memory (RAM), and
total disk use figures, and then close Windows PowerShell.

23

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy