Module10
Module10
Contents:
Lesson
Module
Network Load Balancing (NLB) is a feature available to computers that run the
Windows Server operating system. NLB uses a distributed algorithm to balance an IP
traffic load across multiple hosts, which in turn helps to improve the scalability and
availability of business-critical, IP-based services. NLB also provides high availability,
because it detects host failures and automatically redistributes traffic to surviving
hosts.
1 of 43 3/12/2019, 1:30 PM
about:blank
This module introduces you to NLB and shows you how to deploy this technology.
This module also discusses the situations for which NLB is appropriate, how to
configure and manage NLB clusters, and how to perform maintenance tasks on NLB
clusters.
Objectives
After you will be able to:
• Describe
• Configure cluster.
This lesson provides an overview of NLB, and its features in Windows Server 2016. It
also describes how NLB works under normal circumstances, and how it works during
server recovery.
Lesson
After lesson, you will be able to:
2 of 43 3/12/2019, 1:30 PM
about:blank
What
NLB is a scalable, high-availability feature that you can install on all editions of
Windows Server 2016. NLB distributes network traffic across a set of servers,
balancing the workload each server must handle. It is scalable because it enables
you to also called nodes or in an NLB
cluster is a computer, either is
running 2016 operating system. runs a copy
of the are also running on cluster.
Windows Server 2016 NLB clusters can have between 2 and 32 nodes. When you
create an NLB cluster, it creates a virtual network address and virtual network
3 of 43 3/12/2019, 1:30 PM
about:blank
adapter. The virtual network adapter has an IP address and a media access control
(MAC) address. Network traffic to this address is distributed evenly across the nodes
in the cluster. In a basic NLB configuration, each node in an NLB cluster services
requests at a rate that is approximately equal to that of all other nodes in the cluster.
When an NLB cluster receives a request, it forwards that request to the node that
currently is the least used. You also can configure NLB to direct traffic to a specific
host,
4 of 43 3/12/2019, 1:30 PM
about:blank
When you configure an application to use NLB, clients address the application using
the NLB than the address the NLB
cluster. address is a virtual address NLB cluster
share.
• All hosts in the NLB cluster receive the incoming traffic, but only one node in the
cluster—which is determined through the NLB process—accepts that traffic. All
other nodes in the NLB cluster drop the traffic.
NLB also sends traffic to nodes based on current node use. It directs new traffic to
5 of 43 3/12/2019, 1:30 PM
about:blank
nodes that are the least used. For example, if you have a four-node cluster where
three nodes respond to requests from 10 clients and one node responds to requests
from five clients, the node that has fewer clients will receive more incoming traffic
until use is more evenly balanced across the nodes.
NLB can detect the failure of cluster nodes. When a cluster node is in a failed state,
NLB removes it from the cluster, and the hosts in the cluster do not direct new traffic
to the node. It uses heartbeats to detect the failure. NLB cluster heartbeats transmit
every second between nodes in a cluster. A node is removed automatically from an
NLB consecutive heartbeats. over a
network from the network access the
cluster.
6 of 43 3/12/2019, 1:30 PM
about:blank
can only occur if you configure each node with the same port rules.
You can configure nodes to rejoin a cluster automatically, by configuring the Initial
host state setting on the node’s properties by using the Network Load Balancing
Manager. By default, a host that is a member of a cluster will attempt to rejoin that
cluster automatically. For example, after you apply a software update, if you restart a
server NLB cluster, the server
automatically process completes.
7 of 43 3/12/2019, 1:30 PM
about:blank
The most substantial change to NLB features after Windows Server 2008 is the
inclusion PowerShell support. The NetworkLoadBalancingClusters
module NLB–related cmdlets. This module on a
server install the NLB Remote Administration Tools
(RSATs).
The Windows PowerShell NLB-related cmdlets have the nouns and verbs listed in
the following table.
8 of 43 3/12/2019, 1:30 PM
about:blank
Note: To see the list of Windows PowerShell cmdlets for NLB, use the
following command:
NetworkLoadBalancingClusters
Other
9 of 43 3/12/2019, 1:30 PM
about:blank
• You can manage multiple clusters and hosts from a remote or local computer.
• You can configure each host as part of multiple clusters when using multiple
network adapters.
Discovery
What server failure and application does that
difference availability solution?
Show solution
16
32
64
10 of 43 3/12/2019, 1:30 PM
about:blank
To deploy NLB successfully, you must first have a good understanding of its
deployment must also plan how port rules
and that traffic to the application hosted on the
NLB appropriately.
Lesson objectives
After you will be able to:
• Describe requirements.
• Describe NLB.
11 of 43 3/12/2019, 1:30 PM
about:blank
There are several requirements that you must meet while designing and deploying an
NLB
12 of 43 3/12/2019, 1:30 PM
about:blank
• Use only the TCP/IP protocol with network adapters that participate in NLB
clusters. NLB supports IPv4 and IPv6. Do not add any other protocols to the
adapter that is part of the NLB cluster.
• Ensure that IP addresses of servers that participate in NLB cluster are static.
When Dynamic Host Configuration disabled
on configure to participate
Demonstration steps
Create an NLB cluster in Windows Server 2016
13 of 43 3/12/2019, 1:30 PM
about:blank
• When you finish the demonstration, leave the virtual machines running for the next
demonstration.
14 of 43 3/12/2019, 1:30 PM
about:blank
Configuring NLB clusters involves specifying how hosts in the cluster will respond to
incoming NLB directs traffic protocol
that client has an existing host in the
cluster. these settings by using settings.
Port
With port rules, you can configure how the NLB cluster directs requests to specific IP
addresses, ports, and protocols. For example, you can load balance traffic on
Transmission Control Protocol (TCP) port 80 across all nodes in an NLB cluster,
while directing all requests to TCP port 25 to a specific host. Which ports you choose
to load the specific server
• Multiple hosts. When you configure this mode, all NLB nodes respond according
15 of 43 3/12/2019, 1:30 PM
about:blank
Note: The highest priority is the lowest number, with a priority of one being a
higher priority than a priority of 10.
You can use the following Windows PowerShell cmdlets to manage port rules:
16 of 43 3/12/2019, 1:30 PM
about:blank
Note: Each node in a cluster must have identical port rules. The exception to
this is the load weight (in multiple-hosts filter mode) and handling priority (in
single-host filter mode). Otherwise, if the port rules are not identical, the
Affinity
• None. In this mode, any cluster node responds to any client request, even if the
client is reconnecting after an interruption. For example, the first webpage on a
web retrieved from the third webpage from
the webpage from the mode is
suitable applications.
• Network. When you set this mode, a single node will respond to all requests from
a uses the 255.255. mode is
useful applications where the client cluster
through servers. These proxy different IP
addresses, within the same class
Host parameters
17 of 43 3/12/2019, 1:30 PM
about:blank
You configure the host parameters for a host by clicking the host in the Network
Load Balancing Manager console, and then from the Host menu, clicking
Properties. You can configure the following host settings for each NLB node:
• Priority. Each NLB node is assigned a unique priority value. If no existing port
rule matches the traffic that is addressed to the cluster, traffic is assigned to the
NLB the lowest priority value.
• Subnet mask. When you select a subnet mask, ensure that there are enough
host bits to support the number of servers in the NLB cluster, and any routers that
connect the NLB cluster to the rest of the organizational network. For example, if
you plan to have a cluster that has 32 nodes and supports two routes to the NLB
cluster, subnet mask that more—
such
o Started. This value makes the host rejoin the NLB cluster automatically.
o Suspended. This value pauses the host, and allows you to perform operations
that require multiple reboots without triggering cluster convergence.
18 of 43 3/12/2019, 1:30 PM
about:blank
Demonstration steps
Configure affinity for NLB cluster nodes
Mkdir c:\porttest
2.
19 of 43 3/12/2019, 1:30 PM
about:blank
• Port range: 80 to 80
5. • Protocols:
Create a port Both
rule with the following properties:
• Port
Filtering
range:
mode:
5678
Multiple
to 5678Host
• Protocols:
Affinity: None
Both
Host
6. LON-SVR1 (Ethernet).
When you finish the demonstration, revert the virtual machine to its initial state. To do
this, complete the following steps:
20 of 43 3/12/2019, 1:30 PM
about:blank
When you design a network to support an NLB cluster, you must consider several
factors. whether you want cluster to use
the unicast cluster operation mode.
Unicast
When you configure NLB cluster to use the unicast mode, cluster hosts use the
same unicast MAC address. The cluster host’s priority setting determines the
modified MAC address that outgoing traffic uses. This prevents the switch that
handles outbound traffic from having problems with all cluster hosts using the same
MAC address.
21 of 43 3/12/2019, 1:30 PM
about:blank
When you use the unicast mode with two or more network adapters, one adapter is
used for dedicated cluster communications, and the other adapter or adapters can be
used for management tasks. When you use the unicast mode with multiple network
adapters, you can perform cluster management tasks such as connecting to the
server by using Windows PowerShell remoting to add or remove roles and features.
Multicast
When you configure an NLB cluster to use the multicast mode, each cluster host
keeps its original MAC address but also is assigned an additional multicast MAC
address. cluster is assigned the multicast
address. multicast mode when each network adapter
installed, communicate directly multicast
mode switches and routers that addresses.
IGMP
22 of 43 3/12/2019, 1:30 PM
about:blank
Network considerations
You can improve NLB cluster performance when you use unicast mode by using
separate virtual local area networks (VLANs) for cluster traffic and management
traffic. traffic, you can prevent from
affecting you host NLB nodes using
Windows can use network
management traffic.
Discovery
Describe a situation where the single affinity setting would be appropriate.
Show solution
Check
Discovery
When would you want to use port rules other than the default port rule?
23 of 43 3/12/2019, 1:30 PM
about:blank
Lesson objectives
After completing this lesson, you will be able to:
Because client traffic can be directed to any node in an NLB cluster, each node in the
24 of 43 3/12/2019, 1:30 PM
about:blank
cluster must be able to provide a consistent experience. Therefore, when you are
designing applications and storage support for NLB applications, you must ensure
that you configure each node in the same way, and that each node has access to the
same data.
When a highly available application has multiple tiers—such as a web application that
includes database tier—the web application an NLB
cluster. stateful application, is not by using
NLB. technologies such as failover
AlwaysOn to make the SQL Server available.
You should configure all hosts in an NLB cluster in the same way, and they should
run the same applications. When you are using web applications, you can use the
Internet Information Services (IIS) 8.0 shared configuration functionality to ensure
that all nodes in the NLB cluster are configured in the same manner.
When configuring NLB hosts, you can avoid the extra expense of configuring
redundancy into local storage. If a drive fails and the server fails as a result, other
servers in the NLB cluster take on the extra workload. This means there is little
advantage local drivers to use Independent
Disks ( tolerance.
25 of 43 3/12/2019, 1:30 PM
about:blank
You should place NLB cluster nodes on separate hard disks on the Hyper-V host.
That way, if a disk or disk array fails, and if one node becomes unavailable, other
NLB hosted on the same Hyper-V online. We
recommend the Hyper-V host including
redundant adapters, and power supplies. the
chance the Hyper-V host NLB
cluster unavailable. When you use multiple adapters, configure
the network teaming to ensure that virtual machines are able to maintain access to
the network even in the event that individual network adapter hardware suffers a
failure.
26 of 43 3/12/2019, 1:30 PM
about:blank
Where possible, deploy NLB cluster nodes running as virtual machines on separate
Hyper-V hosts. This protects the NLB cluster from other types of server failure, such
as the failure of a motherboard, or any other single point of failure. When you plan
this type of configuration, ensure that the virtual machines that participate in the NLB
cluster are located on the same TCP/IP subnet.
Virtual configuration
27 of 43 3/12/2019, 1:30 PM
about:blank
Highly available virtual machines do not allow an application to scale because you
cannot add nodes to increase capacity. However, it is possible to deploy NLB cluster
nodes as highly available virtual machines. In this scenario, the NLB cluster nodes
fail over to a new Hyper-V host if the original Hyper-V host fails.
28 of 43 3/12/2019, 1:30 PM
about:blank
When you secure NLB clusters, you must first ensure that you create port rules to
block traffic to all ports other than those that applications hosted on the NLB cluster
use. When you do this, it drops all incoming traffic that is not addressed specifically to
applications that are running on the NLB cluster. If you do not perform this first step,
all incoming managed by a port cluster node
with value.
Configure
You also should ensure that Windows Firewall with Advanced Security is configured
on each NLB cluster node. When you enable NLB on a cluster node, the following
firewall rules that allow NLB to function and communicate with other nodes in the
cluster are created and enabled automatically:
• Network DCOM-In)
• Network ICMP4-ERQ-In)
• Network ICMP4-ER-In)
• Network ICMP6-DU-In)
When created, these firewall rules do not include scope settings. In high-security
29 of 43 3/12/2019, 1:30 PM
about:blank
When you configure additional firewall rules, remember the following guidelines:
Note: Whenever possible, use two or more network adapters in each cluster
host. This will allow you to customize firewall and port rules to limit remote
access so that it is not possible to connect remotely through the adapter used
for NLB traffic, known as the cluster adapter
You should configure applications on each node to respond only to traffic that is
addressed to the cluster, and to ignore application traffic that is addressed to the
individual node. For example, if you deploy a web application that is designed to
30 of 43 3/12/2019, 1:30 PM
about:blank
Principle privilege
Ensure that you delegate permissions to users, only for tasks that they need to
31 of 43 3/12/2019, 1:30 PM
about:blank
perform on the NLB node. Members of the local Administrators group on any single
node can add and remove cluster nodes, even if they are not members of the local
Administrators group on those nodes. You should configure applications that run on
NLB clusters so that they do not require application administrators to have local
Administrator privileges on the servers that host the application. Only users whose
job role requires them to make remote management connections to NLB cluster
nodes those connections.
Privileged Management
32 of 43 3/12/2019, 1:30 PM
about:blank
Scaling is the process of increasing the capacity of an NLB cluster. For example, if
you have cluster, and each cluster point where
the cluster more traffic, you can add Adding nodes
will spread across more computers, each current
cluster capacity increases because similarly
configured can manage a higher workload number of
similarly configured computers.
An NLB cluster supports up to 32 nodes. This means that you can scale out a single
NLB cluster so that 32 separate nodes participate in that cluster. When you consider
scaling is hosted on a 32-node remember that
each be on the same TCP/IP
33 of 43 3/12/2019, 1:30 PM
about:blank
receives the second address, the third receives the third address, and so forth. When
you use DNS round robin with NLB, you associate the IP addresses of each cluster
with the hostname that the application uses.
Distributing traffic between NLB clusters by using DNS round robin also allows you to
deploy NLB clusters across multiple sites. You can use DNS round robin in
conjunction ordering. Using DNS round clients on a
subnet address of a host one is
available. might deploy three four-node the cities of
Sydney, Canberra, and use DNS traffic
between netmask ordering, a client in accessing the
application in Sydney will be directed by DNS to the NLB cluster hosted in Sydney. A
client that is not on the same subnet as the NLB cluster nodes, such as a client in the
city of Brisbane, would be directed by DNS round robin to either the Sydney,
Melbourne, or Canberra NLB cluster.
34 of 43 3/12/2019, 1:30 PM
about:blank
Upgrading NLB clusters involves moving cluster nodes from one host operating
system—for example, Windows Server 2008 or Windows Server 2012—to Windows
Server 2016. Upgrading the cluster might not require you to perform an operating
system upgrade on each node, because in some cases the original host operating
system might not support a direct upgrade to Windows Server 2016. In cases where
the original host operating system does not support a direct upgrade to Windows
Server 2016, migration.
When you perform an NLB cluster upgrade, you can use one of the following
strategies:
• Rolling upgrade. During this type of upgrade, you upgrade one node in the cluster
35 of 43 3/12/2019, 1:30 PM
about:blank
at a time. You do this by taking the node offline, performing the upgrade, and then
rejoining the node back to the cluster.
Check
Discovery
Why do you use both port rules and firewall rules when securing NLB?
Discovery
Why principle of least privilege permission to NLB
servers?
Show solution
Scenario
Adatum engineering and manufacturing organization
is based and is quickly expanding
company scalable web applications To address
this need, develop a pilot program to of NLB on
hosts that are running the Windows Server 2016 operating system.
36 of 43 3/12/2019, 1:30 PM
about:blank
Because you intend to automate the process of deploying Windows NLB clusters,
you will use Windows PowerShell to perform many of the cluster setup and
configuration tasks. You also will configure port rules and affinity, which will allow you
to deploy multiple load-balanced web applications on the same NLB clusters.
Objectives
After will be able to:
• Implement
Lab setup
Estimated
User Adatum\Administrator
Password: Pa55w.rd
For this lab, you will use the available virtual machine environment. Before you begin
the lab, following steps:
3. In the Actions pane, click Connect. Wait until the virtual machine starts.
37 of 43 3/12/2019, 1:30 PM
about:blank
o Password: Pa55w.rd
o Domain: Adatum
Scenario
You want to automate the process of deploying Windows Server 2016 NLB clusters.
To accomplish Windows PowerShell majority of the
NLB
2. Install NLB
4. cluster
5.
Detailed Steps
Detailed Steps ▼
38 of 43 3/12/2019, 1:30 PM
about:blank
Detailed Steps ▼
Detailed Steps ▼
Detailed Steps ▼
Result: After completing this exercise, you should have successfully implemented
an
Scenario
As part of the pilot, you want to deploy multiple separate websites to the NLB cluster,
and then differentiate these websites based on port address. To do this, you want to
ensure that you can configure and validate port rules. You also want to experiment
with that requests are distributed the hosts.
1. and affinity
Detailed Steps
Detailed Steps
Detailed Steps
Result: After completing this exercise, you should have successfully configured
and managed an NLB cluster.
39 of 43 3/12/2019, 1:30 PM
about:blank
Scenario
3. module
Detailed Steps
Detailed Steps ▼
Detailed Steps ▼
Result: After completing this exercise, you should have successfully validated high
availability
Review
Check Knowledge
Discovery
40 of 43 3/12/2019, 1:30 PM
about:blank
How many additional nodes can you add to the LON-NLB cluster?
Discovery
What ensure that LON-SVR1 requests for web
traffic port rules that were established this set of
exercises?
Show solution
Discovery
What Stop and a Drainstop
Show solution
Module takeaways
A default host is handling all the workload Please see Student Companion Content for this course.
41 of 43 3/12/2019, 1:30 PM
about:blank
Review Question(s)
Check
Discovery
You have four-node Windows Server 2016 cluster hosts a
website IIS. What happens to the you down the World
Wide Web publishing service on one of the nodes?
Check
Discovery
You want contoso.com, www.adatum. fabrikam.com
websites cluster. The cluster IP address,
and each domain name (FQDN) is mapped cluster's public
IP address. What steps should you take on each node to ensure that traffic is directed to
the appropriate site?
Check
Discovery
You have Windows NLB cluster that You want to
ensure client that uses the cluster same node
throughout their session, but that traffic from separate clients distributes equitably
across all nodes. Which option do you configure to accomplish this goal?
42 of 43 3/12/2019, 1:30 PM
about:blank
43 of 43 3/12/2019, 1:30 PM