Home | Troubleshooting |  Quick Setup  |  Cisco How to  |  Data Recovery  |  Forums   | Blog | IT Exam Practice | Services  | About Us | Chicagotech MVP  | Search  | Contact Us  |                 

 

 

How to Add a Host on a Perimeter Network of VMM

 

1. Install the VMM agent locally on the host computer.

2.

 

Note 1: For a host that is on a perimeter network or that is not joined to a domain that has a trust relationship with the domain that the VMM server is in, you must install an agent locally on the host before you can add the host to VMM.

When you install a VMM agent locally on a host on a perimeter network, the Agent Setup Wizard prompts you for an encryption key and other information needed by VMM to access and manage the host and its virtual machines. The wizard generates a set of agent credentials and uses the key to encrypt the credentials and the other agent access information into a security file.

After you have installed an agent locally on the host, you use the security file to add the host by using the Add Hosts Wizard in the VMM Administrator Console.

Note
When you add a host, VMM automatically installs or upgrades to Virtual Server 2005 R2 with Service Pack 1.



The following procedure shows how to add a host on a perimeter network after installing the agent locally.

To add a host on a perimeter network
Install the VMM agent locally on the host computer, specifying in the Agent Setup wizard that the host is on a perimeter network. For more information about installing an agent locally on a host, see the VMM Setup Help.

Important
Make note of the encryption key that you use to create the security file. You must enter the same key to successfully add the host.



Before adding the host by using the Add Hosts Wizard in the Administrator Console, you must do one of the following:

Transfer the security file from the host computer to the computer on which you will use the VMM Administrator Console to add the host.

Place the security file in a share that can be accessed by the computer on which you will use the VMM Administrator Console to add the host.

In any view in the VMM Administrator Console, on the Actions pane, click Add hosts.

On the Select Host Location page, click Yes to indicate that the host is on a perimeter network.

On the Select Host Server page, do the following:

In the Host server name or IP address box, type the name of the computer or the IP address of the computer you want to add.
Note
You must specify the same address type for contacting the agent as you did when you installed the VMM agent on the host.



In the Encryption key box and in the Confirm encryption key box, type the same encryption key you used to create the security file when you installed the VMM agent on the host.

In the Security file path box, type the path of the security file for the host, or click Browse to navigate to the file. The name of this file is SecurityFile.txt.

On the Configuration Settings page, do the following:

In the Host group list, select a host group to contain the host or accept the default host group, All Hosts.
The host group determines host reserves, virtual machine placement defaults, and self-service policies for users who create and manage their own virtual machines by using the VMM Self-Service Portal. For more information about host groups, see About Host Groups.

If one or more of the computers you are adding is a host or a library server that is currently associated with another VMM server, select the Reassociate agent with Virtual Machine Manager server check box to associate the VMM agents on those computers with the current VMM server.

Configure Virtual Machine Remote Control (VMRC) access to virtual machines on the hosts. For more information, see How to Modify VMRC Settings on a Host.

On the Virtual Machine Paths page, you can optionally specify one or more default paths for storing new virtual machines on the host. These paths are added along with the default path configured by Virtual Server.

For more information about virtual machine paths, see About Default Virtual Machine Paths.

 

 

 

 

 

 

Post your questions, comments, feedbacks and suggestions

Contact a consultant

Related Topics


 

 


 

 

Hit Counter   This web is provided "AS IS" with no warranties.
Copyright © 2002-2018 ChicagoTech.net, All rights reserved. Unauthorized reproduction forbidden.