Top 5 Microsoft Hyper-V Network Virtualization Q&A

The top 5 Hyper-V questions with answers provided by Nirmal Sharma, a MCSEx3, MCITP and Microsoft MVP in Directory Services.

Microsoft Hyper-V Network Virtualization (HNV) enables hosting providers to host customer virtual machines (VMs) without requiring any changes to the physical network topology. Customers can bring their own IP address and network topologies and easily move enterprise services to a shared IaaS cloud.

HNV Questions and Answers

Courtesy of ServerWatch, here are the top 5 Hyper-V questions with answers provided by Nirmal Sharma, a MCSEx3, MCITP and Microsoft MVP in Directory Services.

Q. What are all the configuration approaches available with Hyper-V Network Virtualization?
A. Two: NVGRE and IP Rewrite.

Q. What is the mechanism used by NVGRE?
A. NVGRE uses the GRE mechanism to encapsulate and de-capsulate methods. You can take a closer look at the NVGRE protocol draft here: http://tools.ietf.org/html/draft-sridharan-virtualization-nvgre-00

Q. Can virtual machines talk to outside networks?
A. No, this is what HNV is lacking at the moment. Virtual Machines participating in Hyper-V Network Virtualization cannot access the Internet or an outside network unless you implement a forwarding agent. Forwarding agents such as CISCO Nexus 1000v or an NVGRE gateway must be implemented in order to allow virtual machines to access the Internet or enterprise premises networks.

Q. Does HNV virtualize Host IP also?
A. No, HNV only virtualizes CA IP Addresses.

Q. Does PA Address need to be routable across the datacenter network?
A. Yes, PA Address must be routable and unique across the datacenter network. In other words, PAs communicate with each other, so they must be unique on the physical network.

This article was originally published on May 07, 2014

Webopedia Staff
Webopedia Staff
Since 1995, more than 100 tech experts and researchers have kept Webopedia’s definitions, articles, and study guides up to date. For more information on current editorial staff, please visit our About page.

Related Articles

@ Sign

Pronounced at sign or simply as at, this symbol is used in e-mail addressing to separate the user' name from the user's domain name,...

Munging

(MUHN-jing) Munging (address munging), is the act of altering an email address posted on a Web page to make it unreadable to bots and...

How to Create an RSS Feed

In the second installment of RSS how-to, we look at some of the nonrequired (optional) channel and item tags, discuss RSS specifications in-depth and...

Dictionary Attack

(n.) (1) A method used to break security systems, specifically password-based security systems, in which the attacker systematically tests all possible passwords beginning with...

Accenture

Accenture is a global professional services company that specializes in information technology (IT)...

Gartner

Gartner is a world-renowned information technology (IT) consultancy and advisory firm that conducts...

Coursera

Coursera is an online education platform that offers a variety of courses and...