Professional Documents
Culture Documents
6.5.1
Issue 10
Date 2020-08-07
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://e.huawei.com
Preface
Purpose
This document provides guidance for administrators to perform service
provisioning, service adjustment, service reclaiming, and service management.
Intended Audience
This document is intended for:
● Technical support engineers
● Maintenance engineers
Symbol Conventions
The symbols that may be found in this document are defined as follows.
Symbol Description
Symbol Description
Change History
Iss Date Description
ue
Contents
Preface........................................................................................................................................... ii
1 Basic Concepts.......................................................................................................................... 1
2 VM Types................................................................................................................................... 3
3 Service Provisioning................................................................................................................ 8
3.1 Service Provisioning Process................................................................................................................................................ 8
3.2 Obtaining Software................................................................................................................................................................ 9
3.3 Creating VM Users................................................................................................................................................................ 13
3.3.1 Creating a User OU...........................................................................................................................................................13
3.3.2 Creating a User Group..................................................................................................................................................... 14
3.3.3 Creating a Domain User..................................................................................................................................................15
3.4 Creating VM Templates...................................................................................................................................................... 18
3.4.1 Creating a Bare VM.......................................................................................................................................................... 18
3.4.2 Installing an OS on the Bare VM................................................................................................................................. 23
3.4.3 Configuring the VM OS................................................................................................................................................... 26
3.4.4 Creating a VM Template (Full Copy).......................................................................................................................... 29
3.4.5 Creating a VM Template (Linked Clone or QuickPrep)........................................................................................34
3.4.6 Checking AD Group Policies...........................................................................................................................................39
3.5 Provisioning VMs................................................................................................................................................................... 42
3.5.1 Creating a VM OU............................................................................................................................................................. 42
3.5.2 Creating a Naming Rule..................................................................................................................................................44
3.5.3 Quickly Provisioning Desktops...................................................................................................................................... 47
3.5.4 Planning and Creating Policies..................................................................................................................................... 52
3.6 Logging In to a VM.............................................................................................................................................................. 70
3.6.1 Logging In to a VM Using a Windows PC.................................................................................................................70
3.6.2 Logging In to a VM Using a TC.................................................................................................................................... 71
3.6.3 Logging In to a Desktop Using a Mac PC................................................................................................................. 73
3.6.4 Logging In to a Desktop from a Mobile Terminal................................................................................................. 75
4 Service Adjustment............................................................................................................... 78
4.1 Modifying VM Specifications............................................................................................................................................ 78
4.2 Adding VM Users.................................................................................................................................................................. 79
4.3 Adding VMs............................................................................................................................................................................. 81
4.4 Upgrading a Common Desktop to a VIP Desktop..................................................................................................... 85
A Appendixes........................................................................................................................... 121
A.1 Logging In to FusionAccess............................................................................................................................................ 121
A.2 Installing a Windows OS................................................................................................................................................. 123
A.3 Deleting Local Users of Windows System................................................................................................................. 126
A.4 (Optional) Reset HDC information.............................................................................................................................. 127
A.5 Installing the Desktop Experience Package.............................................................................................................. 129
A.6 Domain Control Policy and Firewall Configuration Requirements................................................................... 143
A.7 Configuring a Browser for Accessing FusionAccess................................................................................................143
A.8 Exporting a VM Template............................................................................................................................................... 146
A.9 Copying a VM Template.................................................................................................................................................. 148
A.10 Converting a VM into a Template............................................................................................................................. 150
A.11 Configuring and Inheriting the Administrator Profiles....................................................................................... 151
A.12 Mounting a Floppy Drive.............................................................................................................................................. 156
A.13 Parameter Description................................................................................................................................................... 157
A.13.1 VM Quick Provisioning Parameters........................................................................................................................157
A.13.2 VM Specification Parameters................................................................................................................................... 164
A.13.3 Parameters for Adding VMs..................................................................................................................................... 167
B Glossary................................................................................................................................. 177
B.1 A-E........................................................................................................................................................................................... 177
B.2 F-J............................................................................................................................................................................................. 179
B.3 K-O.......................................................................................................................................................................................... 181
B.4 P-T............................................................................................................................................................................................ 184
B.5 U-Z...........................................................................................................................................................................................186
1 Basic Concepts
Figure 1-1 shows the relationships between templates, VMs, VM groups, user
groups, and desktop groups. The following uses full copy and linked clone VMs as
an example.
NOTE
After a pool desktop is provisioned, the user group preset during template creation is
retained in a linked clone VM, the assigned user group is retained in a full copy /hosting
VM, and all users in the user group have access permission on the computer.
User or user group A user or a group of users. Users must use domain
accounts to log in to VMs.
2 VM Types
Windows desktop management involves five types of computers, full copy VMs,
QuickPrep VMs, linked clone VMs, and hosting computers. Table 2-2 shows their
features and application scenarios.
3 Service Provisioning
NOTE
Prerequisites
You have logged in to the active AD server using an administrator account.
Data
Table 3-3 lists the data to be obtained.
Procedure
Step 1 On the active AD server, choose > Windows Administrative Tools > Active
Directory Users and Computers.
Step 2 In the navigation tree, right-click Domain Name and choose New >
Organizational Unit.
Step 3 Enter the user OU name in the Name text box and click OK.
NOTE
To create a child OU, right-click the name of the parent OU and choose New >
Organizational Unit.
----End
Scenarios
Create a user group in the user OU of the active AD server so that the system
administrator can centrally manage users in different user groups.
Prerequisites
You have logged in to the active AD server using an administrator account.
Data
Table 3-4 lists the data to be obtained.
Procedure
Step 1 On the active AD server, choose > Windows Administrative Tools > Active
Directory Users and Computers.
Step 2 In the navigation tree, right-click Name of an existing user OU and choose New
> Group.
Step 3 Set Group name, retain the default values of Group scope and Group type, and
click OK.
NOTE
The group name consists of digits, letters, Chinese characters, spaces, and special
characters, such as `~!#$%^&()-_{}.
----End
Scenarios
Create a domain user in the user OU on the active AD server and add the domain
user to a user group so that the system administrator can manage the domain
users with different rights.
Prerequisites
You have logged in to the active AD server using an administrator account.
Data
Table 3-5 lists the data to be obtained before this operation.
Procedure
Create a domain user.
Step 1 On the active AD server, choose > Windows Administrative Tools > Active
Directory Users and Computers.
Step 2 In the navigation tree, right-click OU Name and choose New > User.
Step 3 Set registration information of the domain user, as shown in Figure 3-2.
NOTE
● User logon name specifies the domain account of the user. The parameter value is used
when a virtual machine (VM) is assigned.
● If User logon name is different from User logon name (pre-Windows 2000), User
logon name (pre-Windows 2000) is used when a VM is assigned.
Step 5 Enter the new password of the domain user in Password and Confirm password.
Step 6 Select User must change password at next logon and click Next.
Step 9 In the right pane, right-click User Name and choose Add to a group.
Step 10 In the Enter the object names to select area, enter the user group name.
----End
Prerequisites
● The computing, storage, and network resources required for creating VMs are
available.
● You have logged in to FusionCompute.
Data
For details about key data and parameters, see the description given in specific
procedures.
Procedure
Step 1 In Common Operations, click Create VM.
Step 2 Click Next, and set related parameters, as shown in Table 3-6.
● You can click before a parameter name to view detailed configuration items
of this parameter.
Grap Cirrus/4MB
hics
Card
Grap Cirrus/4MB
hics
Card
Step 3 Retain default values for other parameters, confirm information about the VM to
be created, and create a bare VM as prompted.
----End
Scenarios
On the FusionCompute portal, install an operating system (OS) and patches on
the bare VM, configure the daylight saving time (DST), and initialize disks.
Windows 7 SP1 and Windows 10 OSs are supported in desktop cloud scenarios.
NOTE
Prerequisites
● You have obtained the ISO file for the OS to be installed.
NOTE
Obtain the Windows ISO image file from official channels. Do not use an OS Ghost
image that is manually simplified.
● You have logged in to FusionCompute.
Data
For details about key data and parameters, see the description given in specific
procedures.
Procedure
Mount a CD-ROM drive.
Step 1 After the VM is created, on Configuration tab page, choose Hardware > CD/
DVD-ROM Drive.
NOTE
Do not close the window during the mounting process. Otherwise, the ISO file or CD–ROM
drive will be automatically unmounted.
Step 4 Mount the ISO files to a VM. Select Restart the VM now to install the OS and
click Confirm twice.
Step 5 On the top of the Configuration tab page, choose Log In Using VNC.
NOTE
● The temporary account must be set to LocalAccount when you install the OS.
Otherwise, the template tool cannot delete the temporary account automatically, which
poses a security risk.
● If you need to manually delete local users, refer to A.3 Deleting Local Users of
Windows System.
● After Windows 7 is installed, install the SP1 patch before performing other operations.
Step 10 Choose Computer Management(Local) > System Tools > Local Users and
Groups and select Users.
Step 12 On the General tab page, deselect Account is disabled and click OK.
NOTICE
Set the password for the Administrator account. If the password is left blank, this
task will fail.
Step 15 Set the Administrator password as required, confirm the password, and click OK.
Step 17 Log out of the OS and log in to the VM using the Administrator account.
● This operation ensures that the VM provisioned by using the template can be remotely
accessed.
● The following operations are not required for Windows 10 French Edition.
Step 19 Choose Computer Management(Local) > Services and Applications and select
Services.
Step 20 In the list on the right, right-click Remote Desktop Services and choose
Properties from the shortcut menu.
Step 21 On the General tab, set Startup type to Automatic and click OK.
----End
NOTE
Prerequisites
There are no special conditions for this operation.
Data
For details about key data and parameters, see the description given in specific
procedures.
Procedure
Install the Driver Tools.
Step 1 In the navigation tree on the left of the FusionCompute portal, click , select the
VM tab, and click the VM name to be operated.
Step 2 On the top of the Summary tab page, choose More > Tools > Mount Tools and
click Confirm.
Step 3 On the VNC login page, switch to the CD-ROM drive on the VM, right-click Setup,
and choose Run as Administrator from the shortcut menu. Install the software as
prompted. During the installation, retain the default settings.
Step 4 On the FusionCompute portal, on the top of the Summary tab page, choose More
> Tools > Unmount Tools and click Confirm.
Step 5 Copy non-ISO files, such as the OS patches, and the installation programs of
application software and peripheral drivers, to C:\ on the VM by using file sharing.
c. On the Time Zone Settings page, select a time zone based on the actual
region and click OK twice.
NOTE
If Automatically adjust clock for Daylight Saving Time is displayed on the Time Zone
Settings page, select it.
● If your Windows OS does not support DST, obtain TZEDIT.exe from DST
modification tool, and set the DST as prompted.
VM OS Procedure
Step 8 Copy the .NET Framework package to the VM C:\ directory and double-click to run
the installation.
Install Visual Studio 2017 running library.
Step 9 Copy the vc_redist.x86.exe package or vc_redist.x64.exe package to the VM C:\
directory and double-click to run the installation.
Step 10 Restart the VM.
(Optional) Install the peripheral drivers.
Step 11 Install the peripheral drivers as required.
Search the C:\ directory on the VM for the peripheral driver installation programs
and install them.
NOTE
If a driver can be installed only when the peripheral is connected to a TC, copy the driver
installation programs to the VM and ask the user to install the driver when the peripheral is
connected.
If the disk to be initialized is in the Offline state, right-click the disk and choose Online
from the shortcut menu, and then right-click the disk again and choose Initialize Disk.
Step 15 In the right area similar to Figure 3-3, right-click the disk and choose New Simple
Volume from the shortcut menu.
The New Simple Volume Wizard window is displayed.
After volumes are created for a full copy template, you must manually change the drive
letters. In the Disk Management window, right-click each volume, choose Change Drive
Letter and Paths, and change the drive letters of data disks and CD-ROM. You are advised
to change the drive letters in alphabetical order of D and E because they will be rearranged
in alphabetical order after template encapsulation.
NOTE
----End
Prerequisites
● You have obtained the template tool
FusionAccess_WindowsDesktop_Installer_6.5.1.SPC003.iso.
● You have logged in to the VM using the Administrator account.
Data
For details about key data and parameters, see the description given in specific
procedures.
Procedure
Use the template tool to configure the VM OS.
On some VMs, after you double-click the CD-ROM, the FusionAccess Windows Installer
window is displayed.
NOTICE
The installation method varies with the format of the application software to be
installed:
● If the application software is an .iso file, mount the CD-ROM drive to the VM
and run the installation program.
● If the application software is not an .iso file, find the application software in
C:\ on the VM and run the installation program.
NOTE
● After the installation is complete, unmount the CD-ROM drive from the VM. Otherwise,
the CD-ROM drive cannot be mounted to another VM that runs on the same host.
● To avoid affecting VM connections, disable any firewall in antivirus software or enable
the ports required by the HDP on the firewall before installing the application software.
For details about the ports required by the HDP, see Description > Communication
Matrix in FusionAccess Desktop Solution 6.5.1 Product Documentation.
● After installing the application software, you are advised to clone the VM. If the VM
data storage type is not virtual storage, power off the VM and clone it:
In the row of the VM to be cloned, choose More > Clone VM and click Next as
prompted. Then click Finish to perform the VM cloning operation.
The VM cloning progress is displayed on the task center. Ensure that the cloned VM is in
stopped status.
If this operation is not performed, you need to create a bare VM again and install and
configure the VM OS when template encapsulation fails. To reduce repeated operations,
you are advised to clone the VM.
Cloning a VM takes about 20 minutes. You are advised to perform this operation during
off-peak hours.
NOTE
A local user of the Windows system can log in to each Windows VM created by the image.
For security reasons, you are advised to delete unnecessary local users in the Windows
system as needed.
Step 7 Delete unnecessary local users in the Windows system as needed. For details, see
A.3 Deleting Local Users of Windows System.
NOTICE
Before using Sysprep, confirm that the IP address and the DNS server address can
be automatically obtained.
Step 12 In the navigation tree on the left of the FusionCompute portal, click , select the
VM tab, and select the VM to be operated.
Step 13 Choose Operation > Template > Convert to Template.
----End
Prerequisites
● You have obtained the template tool
FusionAccess_WindowsDesktop_Installer_6.5.1.SPC003.iso.
● You have logged in to the VM using the Administrator account.
Data
For details about key data and parameters, see the description given in specific
procedures.
Procedure
(Optional) Deleting local users
NOTE
A local user of the Windows system can log in to each Windows VM created by the image.
For security reasons, you are advised to delete unnecessary local users in the Windows
system as needed.
Step 1 Delete unnecessary local users in the Windows system as needed. For details, see
A.3 Deleting Local Users of Windows System.
On some VMs, after you double-click the CD-ROM, the FusionAccess Windows Installer
window is displayed.
Step 5 Click Create Template and create a linked clone or QuickPrep VM template as
prompted.
NOTE
Linked clone Set the following parameters on the page shown in Figure 3-8:
● Set Domain to the domain where the VM is to be added.
● Set Account to a domain account that has the rights to add
other domain accounts.
● Set Password to the password of the domain account that
has the rights to adding other domain accounts.
● Set OU to the OU where the VMs reside. The OU must exist in
the domain and domain accounts can be delegated to it. If
domain accounts cannot be delegated to the domain, this
item is mandatory.
For example, OU1/OU2/OU3, where / indicates hierarchical
relationships.
● Set Domain user (group) to the domain user (group) to
which the VMs provisioned using the template will be
assigned. The domain user (group) is an existing domain user
(group) in the active AD server.
● Local user group controls the permissions of a domain user
(group) on VMs.
If you want to set Local user group to Users, select
Configure user login on the Function page. Users in the
Users group do not have the administrator rights and can
perform operations in a limited range. For example, a user in
the Users group cannot modify the OS settings and registry.
QuickPrep Set the following parameters on the page shown in Figure 3-9:
● Set Domain to the domain where the VM is to be added.
● Set Account to a domain account that has the rights to add
other domain accounts.
● Set Password to the password of the domain account that
has the rights to adding other domain accounts.
● Set OU to the OU where the VMs reside. The OU must exist in
the domain and domain accounts can be delegated to it. If
domain accounts cannot be delegated to the domain, this
item is mandatory.
For example, OU1/OU2/OU3, where / indicates hierarchical
relationships.
NOTICE
The installation method varies with the format of the application software to be
installed:
● If the application software is an .iso file, mount the CD-ROM drive to the VM
and run the installation program.
● If the application software is not an .iso file, find the application software in
C:\ on the VM and run the installation program.
NOTE
● After the installation is complete, unmount the CD-ROM drive from the VM. Otherwise,
the CD-ROM drive cannot be mounted to another VM that runs on the same host.
● To avoid affecting VM connections, disable any firewall in antivirus software or enable
the ports required by the HDP on the firewall before installing the application software.
For details about the ports required by the HDP, see Description > Communication
Matrix in FusionAccess Desktop Solution 6.5.1 Product Documentation.
● After installing the application software, you are advised to clone the VM. If the VM
data storage type is not virtual storage, power off the VM and clone it:
In the row of the VM to be cloned, choose More > Clone VM and click Next as
prompted. Then click Finish to perform the VM cloning operation.
The VM cloning progress is displayed on the task center. Ensure that the cloned VM is in
stopped status.
If this operation is not performed, you need to create a bare VM again and install and
configure the VM OS when template encapsulation fails. To reduce repeated operations,
you are advised to clone the VM.
Cloning a VM takes about 20 minutes. You are advised to perform this operation during
off-peak hours.
Step 9 On FusionCompute, click Stop above the Summary tab to stop the computer. On
the displayed Information dialog box, click OK.
NOTICE
Before shutting down the VM, ensure that the IP address and DNS server
addresses can be obtained automatically.
Step 10 In the navigation tree on the left of the FusionCompute portal, click , select the
VM tab, and select the VM to be operated.
Step 15 In the right pane, locate the row that contains the VM template to be provisioned,
and set parameters based on application scenarios.
● Service type: Select VDI.
● Type: Select the corresponding template type.
----End
Scenarios
This section describes how to configure group policies on an AD server in the
following scenarios.
● The group policies for changing the password of a machine account need to
be disabled in linked clone VM template creation scenarios.
● If you select Configure user login when creating a template using the
template tool, you need to configure the Allow log on locally policy.
NOTE
● By default, only users or user groups that have been added to the local administrator
group can log in to the VMs. In this scenario, selecting Configure user login indicates
that users (including domain users) in the Users group can log in to the VMs. You need
to configure the Allow log on locally policy for the AD server to make the login policy
take effect.
● After the local login group policy is configured, FusionCompute administrators may log
in to any VMs in the system through the VNC by using any domain account.
Prerequisites
You have obtained the domain administrator account and password for logging in
to the AD server in the user domain.
Data
For details about key data and parameters, see the description given in specific
procedures.
Procedure
Disable machine account password changing.
NOTICE
Step 1 Log in to the AD server in the user domain using the domain administrator
account.
Step 5 Right-click the group policy that has taken effect on the user VM, for example,
right-click Default Domain Policy, and click Edit.
NOTICE
Select the group policy that has taken effect on the user VM.
Step 6 In the navigation tree, choose Computer Configuration > Policies > Windows
Settings > Security Settings > Local Policies > Security Options, as shown in
Figure 3-11.
Step 7 In the right pane, view and record the value of Domain member: Disable
machine account password changes and Domain controller: Refuse machine
account password changes in the Policy Setting row.
Step 9 In the navigation tree, choose Computer Configuration > Windows Settings >
Security Settings > Local Policies > User Rights Assignment. For details, see
Step 1 to Step 6.
Step 10 In the right pane, view and record the value of Policy Setting in the Allow log on
locally row.
● If Policy Setting is set to Not Defined, no further operation is required.
● If Policy Setting has been set but the value does not include the Users group,
add the Users group to the value.
● If Policy Setting has been set but the value includes the Users group, no
further operation is required.
----End
3.5.1 Creating a VM OU
Scenarios
Create an organization unit (OU) in the user domain on the active AD server to
manage user VMs.
NOTE
Child OUs can also be created in the OU based on the enterprise's organizational structure.
Prerequisites
You have logged in to the active AD server using an administrator account.
Data
Table 3-9 lists the data to be obtained.
Procedure
Create an OU.
Step 1 On the active AD server, choose > Windows Administrative Tools > Active
Directory Users and Computers.
Step 2 In the navigation tree, right-click Domain Name and choose New >
Organizational Unit.
Step 3 Enter the VM OU name in the Name text box and click OK.
NOTE
To create a child OU, right-click the parent OU and choose New > Organizational
Unit.
Step 4 Determine whether delegate control for the domain has been configured.
● If yes, apply the remote assistance policy to the OU or configure the OU.
● If no, configure delegate control for the VM OU created in Step 3. For details,
see section Preparing for AD/DNS/DHCP > Configuring Domain
Administrator Accounts in the FusionAccess Desktop Solution 6.5.1
Software Installation Guide.
Step 7 Expand the navigation tree, right-click the newly created VM OU and choose Link
an Existing GPO.
Step 8 In the Group Policy objects area, select remote assistance policies.
NOTE
The remote assistance policies have been configured during the software installation
process.
Step 10 Log in to the FusionAccess portal. For details, see A.1 Logging In to FusionAccess.
----End
Scenarios
On the FusionAccess portal, create naming rules for VMs.
Prerequisites
You have logged in to FusionAccess. For details, see A.1 Logging In to
FusionAccess.
Data
Table 3-10 lists the data to be obtained.
Procedure
Step 1 On the FusionAccess portal, click Desktop.
Step 2 In the navigation tree, choose Service Configuration > VM Naming Rule.
Step 3 Click Add.
The page for configuring the naming rule parameters is displayed.
Step 4 Set the following parameters based on the data plan:
● Contain AD domain account
● Rule name
● Computer name prefix
● Number of digits
● Start value
● The digits in names ascend for a single user
NOTE
If you select Contain AD domain account, you must also configure The digits in names
ascend for a single user.
----End
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● VM templates have been created.
● VM users or user groups have been created.
Data
For details about the parameters required for this task, see A.13.1 VM Quick
Provisioning Parameters.
Procedure
Create and configure VMs.
● The VM group name is 1 to 55 characters. It can contain digits, letters, spaces, and
special characters ~!@%^_+-; it cannot start with !@%^.
● You are advised to add the VMs created by the same template to the same VM group.
For example, if you use the Win7_32_template template to create multiple VMs, set the
VM group name to Win7_32_VMGroup.
Step 3 Select the site, resource cluster, and host to which the VM to be created belongs
respectively from the Site, Resource cluster, and Host drop-down lists.
Step 4 Choose Local area.
NOTE
Local area is the area to which a VM belongs. The area is configured in advance in System
> Rights Management > Area Management.
Step 5 Click Select next to VM template, select a VM template, and click OK.
Step 6 Use the parameter values in the template or reconfigure the following parameters
based on the actual requirements.
● Number of CPUs
● Memory size
● QoS information
● Number of disks and disk information
NOTE
● The preceding parameters are automatically associated with the parameter values set in
the template. Configure the parameters as required.
● Configure 1 to 64 CPUs and 1024 MB to 1024000 MB memory. For Windows 10 (32-
bit/64-bit) OS, configure at least four CPUs, and at least 4096 MB memory size.
● QoS information: When creating common VMs, retain the default value.
Step 8 In the Disk area, click in the Operation column, and you can configure the
system disk and user disk information in the dialog box that is displayed. Click
Add next to Disk, and you can add user disk information in the dialog box that is
displayed.
NOTE
Table 3-11 describes the rules for configuring system disk information.
Data store ● The data store provides system disk resources for users. The
system disk capacity cannot be greater than the remaining
space of the data store. The unit is GB.
● For a linked clone VM, you are advised to use the high-
performance storage instead of the low-performance
storage, such as NL-SAS and SATA.
There is no limit on the configuration mode of user disks. Table 3-12 shows the
recommended configuration.
Data Store For all types of VMs, user disks must be deployed on non-
IOTailor storage.
Step 9 Click Add next to NIC and configure the NIC information.
NOTE
The number of VMs is a positive integer less than or equal to 100. If the IP address
of the first NIC is a static IP address (Obtain IP is set to Static in the NIC
configuration), the value of Number of VMs ranges from 1 to the maximum
number of VMs allowed in the IP segment. The maximum number of VMs cannot
exceed 100. If the assigned IP addresses are already used in the network segment,
the value of Number of VMs is the difference between the maximum number of
VMs allowed in the IP segment and the number of used IP addresses. For example,
if 80 VMs are allowed in a network segment and five IP addresses are used, the
maximum number of VMs to be created is 75 (80 - 5).
Step 12 Customize a VM naming rule or select an existing naming rule from the drop-
down list.
● Customize a VM naming rule: A VM name consists of a prefix and a number.
The prefix must start with a letter or digit and contain letters, digits, and
hyphen (-). The number is represented by one or multiple number signs (#).
The total length of a VM name cannot exceed 15 characters.
● Select an existing rule from the drop-down list: The naming rules in the drop-
down list are defined in advanced in Desktop > Service Configuration > VM
Naming Rule.
NOTE
The VM naming rule specified for linked clone or VMs cannot contain an AD domain
account name.
Step 13 Set VM name prefix, that is, the prefix of created VMs that are not assigned.
NOTE
The value contains 0 to 5 characters and comprises uppercase and lowercase letters and
digits.
Step 14
WARNING
If delegate control is not configured for the domain, you must select an OU that
has been configured with delegate control.
For details about delegate control for domains and OUs, see "Configuring Domain
Administrator Accounts" in FusionAccess Desktop Solution 6.5.1 Software
Installation Guide.
If delegate control is not configured for domains or OUs during system
installation, configure delegate control before performing the following
operations.
● For a QuickPrep or linked clone template, the domain name must be the same as the
domain name of the domain to which the VM template is added during the template
creation.
● If the administrator needs to perform remote assistance operations on user VMs in an
OU, select an OU with remote assistance policies.
● Administrators can perform remote assistance operations on user VMs only after users
have logged in to the user VMs.
Assign desktops.
Desktop is the desktop ID configured in advance in System > Initial Configuration >
Desktop Components > Desktop Information.
Step 17 Create a desktop group or select an existing desktop group from the drop-down
list.
The desktop groups in the drop-down list are defined in advanced in Desktop >
Desktop Group > Create Desktop Group.
NOTE
● The desktop group name is 1 to 55 characters. It comprises digits, letters, spaces, and
special characters ~!@%^_+-; it cannot start with !@%^.
● You are advised to plan desktop groups according to service purposes.
For example, if you want to allocate VMs to department A, B, and C, create desktop
groups A_dept, B_dept, and C_dept.
Step 18 If VM group type is Full Copy, set Set assignment type, Add User, and Set User
Group. If VM group type is Linked Clone , set Number of VMs and Add User
(Group).
If VM group type is Full Copy, you can set Add User, Set User Group, Static IP,
and Computer Name in batches by importing the user list.
NOTE
You can also go to Step 19 without setting Add User and Set User Group. If VMs
need to be assigned, see Assigning VMs.
Provision desktops.
The Task Tracing page is displayed, showing the status of all tasks and subtasks.
If the desktop provisioning fails, see A.6 Domain Control Policy and Firewall
Configuration Requirements to check the domain control policy and firewall
configuration.
NOTE
----End
Scenarios
Based on the actual environments and requirements of end users, plan and
customize application policies for all the VMs in a desktop group, a VM, or VMs of
a user in the following aspects:
● Peripherals
● Audio
● Multimedia
● Client
● Display
● File & Clipboard
● Access control
● Session
● Bandwidth
● Virtual Channel
● Watermark
● Keyboard & Mouse
● Audio and Video Bypass
● Personalized Data Mgmt
● Custom
Prerequisites
You have logged in to FusionAccess. For details, see A.1 Logging In to
FusionAccess.
NOTE
The policy takes effect after the user logs in to the VM next time.
Data
For details about how to set the parameters involved in this task, see the
FusionAccess Online Help.
Procedure
Step 1 On FusionAccess, choose Desktop > Policy Management, and click Create Policy
Group in the right pane.
Step 2 On the Create Template page, set Policy Group Name and Description, select
New Policy Group for Edit Mode, and click Next, as shown in Figure 3-13.
Step 3 On the Specify Policies page, set application policies and click Next.
1. Create peripheral policies.
Table 3-14 describes the typical scenarios of peripheral policy configuration.
Examples:
– HP LaserJet 3015dn USB printer (VID:03F0 PID:8D17)
i. Enable Main Switch, Print Device, and Other USB Devices in USB
Port Redirection, as shown in in Figure 3-14.
ii. If the printer is still unavailable, configure a policy with the ID ID:
03F0:8D17:0:0 in USB Port Redirection and enable Printer
– USB camera
Enable Camera Redirection, as shown in Figure 3-16.
– The user can only use the smartcard EPASS 3000 (VID:96E PID:401) to
ensure security.
Configure a policy with the ID ID:96E:0401:1:0, and select Enabled only
for Main Switch in USB Port Redirection, as shown in Figure 3-20.
▪ Bandwidth
(Kbps): a
value from
20000 to
25000.
▪ Lossy
Compression
Recognition
Threshold: a
value from
50 to 60.
▪ Lossy
Compression
Quality: a
value from
85 to 95.
▪ Bandwidth
(Kbps): a
value from
25000 to
35000.
▪ Video Frame
Rate (fps): a
value from
35 to 45.
▪ Lossy
Compression
Recognition
Threshold: a
value from
20 to 60.
▪ Lossy
Compression
Quality: a
value from
90 to 100.
▪ Quality/
Bandwidth
First: Quality
First.
▪ Average
Video Bit
Rate (Kbps):
a value from
25000 to
30000.
▪ Peak Video
Bit Rate
(Kbps): a
value from
28000 to
35000.
▪ Bandwidth
(Kbps):
enter the
actual
bandwidth
allocated for
each user.
▪ Video Frame
Rate (fps): a
value from
15 to 23
▪ Lossy
Compressio
n
Recognition
Threshold: a
value from
80 to 250
▪ Lossless
Compressio
n Mode: 1
▪ Deep
Compressio
n Level: a
value from 3
to 9
▪ Lossy
Compressio
n Quality: a
value from
50 to 70
▪ Quality/
Bandwidth
First:
Bandwidth
First
▪ Average
Video Bit
Rate (Kbps):
a value from
500 to 2000
▪ Peak Video
Bit Rate
(Kbps): a
value from
500 to 2000.
The value
must be
greater than
or equal to
the value of
Average
Video Bit
Rate (Kbps).
– Duplicate Display
▪ For details about how to use the duplicate display function, see
Configuration Management > Configuring Duplicate Display in
FusionAccess Desktop Solution 6.5.1 System Management Guide.
5. Create a file and clipboard policy.
Create a file and clipboard policy based on the actual situation and
parameters. If there is no special requirement, retain the default settings.
6. Create an access control policy.
Customize IP access control policies based on the actual situation to control
user access rights.
Set the policies by using the following methods:
– Leave the client IP address segment empty, which indicates that users can
access VMs from any IP address segment.
– Specify a client IP address segment, which indicates that users can access
VMs from only the specified IP address segment.
NOTE
The access control policy is implemented by the vAG based on client IP addresses.
Therefore, this function has the following restrictions:
– Users must access the network through the vAG server.
– If uses access the network using NAT and the source IP addresses are replaced, the
vAG cannot obtain the real client IP addresses. In this case, the function cannot be
used.
7. Create a session policy.
If a VM is not used for a long time after being connected, resources are
wasted. After the session automatic disconnection policy is set, the system will
automatically disconnect the VM when the VM is locked for a certain period.
Resources of the VM are allocated to other users, which improves resource
utilization.
The session automatic disconnection policy is disabled by default. If there is
no special requirement, retain the default settings.
8. Create a bandwidth policy.
Refer to the FusionAccess Online Help to set related parameters based on
actual requirements.
9. Create a virtual channel policy.
– Virtual Channel Control: enables or disables the policy. The default value
is Disable.
– Custom Virtual Channel Registered Name: when custom virtual channel
registered name and ITA-defined channel name (also known as an
authorized channel name) is the same, this virtual channel will take
effect. Naming rules: for example vchello1, vchello2, can be separated
by commas. If all control is fully open, you can fill in All.
– Third-Party Plug-in Name: specifies the third-party plug-ins that are
loaded on demand to only Windows clients, for example,
LyncVdiPluginLib. Multiple plug-in names can be entered and must be
separated by spaces or commas (,).
10. Create a watermark policy.
Refer to the FusionAccess Online Help to set related parameters based on
actual requirements.
11. Create a keyboard and mouse policy.
Refer to the FusionAccess Online Help to set related parameters based on
actual requirements.
12. Create an audio and video bypass policy.
– Common Audio and Video Switch: enables or disables the policy. The
default value is Disable.
– Software Path: used to configure the path and start parameters for
software that uses common audio and video policies. Use semicolons (;)
to separate multiple software paths. If a path includes spaces, use double
quotation marks ("") to quote the path.
13. Create personalized data mgmt policies.
NOTE
▪ Local Path of Roamed Files (Folders): specifies the path of the files or
folders to be roamed in the user configuration files. Only the files
and folders under the Roaming directory are supported. Wildcard
characters are supported. If you want to add multiple paths, separate
them from each other using semicolons (;).
▪ If roaming and redirection are configured for the same directory, file
redirection is implemented preferentially.
– Configuration File Processing
▪ Disable: The locally stored user configuration file is not deleted upon
user logout.
– Network Drive Mapping
Step 4 On the Specify Target page, select objects to which the policy applies.
● Add policy application objects: In the left area, query policy application
objects based on search criteria, select application object names in the query
result list, and click > to add them to the right area.
● Remove policy application objects: In the right area, select existing application
object names and click <.
NOTE
If the name of the selected application object contains the Desktop Group object type, the
policy will be applied to all the VMs in the related desktop group.
Step 5 Click OK & Return when "The policy group has been created successfully" is
displayed.
----End
3.6 Logging In to a VM
Scenarios
This section describes how to use the Windows PC to log in to a user VM using
CloudClient in domain authentication mode.
NOTE
● The initial configuration described in this section needs to be performed only once on
each terminal device.
● The data required for the initial configuration and specific configuration procedure can
be customized based on the actual situation.
● You are not advised to use a browser to access the WI. In this mode, only basic functions
are supported, which affects user experience.
Procedure
Step 1 Perform initial configuration.
1. Configure the local IP address for the PC.
2. Install the CloudClient.
NOTICE
a. On the browser of the PC, enter the cloud server address, for example,
https://vdesktop.huawei.com or https://192.168.131.61, and press
Enter.
b. On the login page, enter the user domain account and password.
c. Click click here to download and install the CloudClient.
3. Choose AccessClient > CloudClient from the Start menu.
4. In the dialog box that is displayed, click Add.
5. In the dialog box that is displayed, set Server Name and Server Address and
click OK.
NOTE
The cloud server address is the fully qualified domain name (FQDN) or service plane
IP address of the WI server. For FQDN, you need to configure the DNS server address.
6. Click Quit.
----End
● A cloud client
● A connection manager
NOTE
● The initial configuration described in this section needs to be performed only once on
each terminal device.
● The data required for the initial configuration and specific configuration procedure can
be customized based on the actual situation.
● For details about how to configure a TC, see the user manual delivered with the TC.
Procedure
Determine the login mode.
● The automatic login function stores usernames and encrypted passwords in the server
address configuration file. The encrypted passwords vary according TCs. That is, the
encrypted passwords generated on different TCs for the same password are different.
● When the configuration file that contains automatic login information is pushed by a
patch, the encrypted password is invalid on other TCs.
● After automatic login fails, the login page is displayed on the client. If you enter the
correct account and password and log in, the account password is automatically saved
to the current server configuration and a new account password will be used in the next
automatic login.
The cloud clients on TCs are installed by performing the client upgrade. For details, see
Terminal Management > Upgrading Clients in FusionAccess Desktop Solution 6.5.1
System Management Guide.
● Configure the local IP address for the TC.
● Configure or select the cloud server address.
a. On the TC OS, choose Start > CloudClient.
b. In the dialog box that is displayed, click New.
c. In the dialog box that is displayed, set Name and Address and click OK.
NOTE
▪ Set Address to the fully qualified domain name (FQDN) or service plane IP
address of the WI server. For FQDN, you need to configure the DNS server
address.
Step 3 On the TC OS, choose Start > CloudClient to run the cloud client.
Step 4 Enter the correct username and password, and press Enter.
NOTICE
Ensure that the network connection between the TC and the VM is normal.
Step 6 Perform initial configuration based on initial configuration data and procedures.
● Configure the local IP address for the TC.
● Configure or select the cloud server address. The configuration process varies
with terminals. The following uses the CT6200 as an example.
a. On the TC OS, choose Start > Connection Manager.
b. In the dialog box that is displayed, click Add.
c. Set Connection Type to RDP and click Next.
d. In the dialog box that is displayed, set Session Name and Server address
and click OK.
NOTE
– Set Server address to the fully qualified domain name (FQDN) or service plane IP
address of the WI server. For FQDN, you need to configure the DNS server address.
– Select Automatic Login and set related parameters to configure automatic login
for the TC.
Step 7 Select the newly created RDP connection and click Connect.
Step 8 Enter the correct username and password, and press Enter.
----End
Scenarios
If domain authentication is used for user login, you can log in to your VM using a
Mac PC.
NOTE
Prerequisites
The installation package of the Mac Software Client is available.
Data
Key data and parameters required for this task are described in the specific
procedures.
Software
Table 3-16 lists the required software.
Procedure
Install the Mac Software Client.
If you want to change the installation location, click Change Install location.
Step 6 In the window that is displayed, enter the username and the password and click
Install Software.
The cloud server IP address is the FQDN or service plane IP address of the WI server. For
FQDN, you need to configure the DNS server address.
Step 13 Open the browser on the Mac OS, enter the cloud server address in the address
box, and press Enter.
NOTE
● Ensure that the local IP address of the Mac PC is interconnected with the plane of the
cloud server.
● The cloud server IP address is the FQDN or service plane IP address of the WI server. For
FQDN, you need to configure the DNS server address.
----End
NOTE
The data and specific procedure of the initial configuration can be customized based on the
actual situation.
Procedure
Select a login method.
Step 1 Select a login method based on the OS installed on the mobile terminal.
● For Android 5.0 to 9.0, go to Step 2.
● For iOS 8.0 to 12.3, go to Step 10.
Step 2 Open a browser, and enter app.vmall.com in the address box to go to Huawei
HiSpace Store.
Step 7 Configure the cloud server IP address based on the data and specific procedure of
the initial configuration.
NOTE
The cloud server address is the fully qualified domain name (FQDN) or service plane IP
address of the WI server. For FQDN, you need to configure the DNS server address.
Step 8 Enter the correct domain, user name, and password, and click save.
NOTE
In multi-domain scenarios, enter the correct domain information to ensure successful login,
for example, vdesktop.huawei.com.
Step 9 Click the account information. The system automatically switches to the virtual
desktop login page, and then enters the virtual desktop.
Step 13 Click .
Step 14 Configure the cloud server IP address based on the data and specific procedure of
the initial configuration.
NOTE
The cloud server address is the FQDN or service plane IP address of the WI server. For
FQDN, you need to configure the DNS server address.
NOTE
In multi-domain scenarios, enter the correct domain information to ensure successful login,
for example, vdesktop.huawei.com.
----End
4 Service Adjustment
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You can open the Desktop page using the browser.
● The VM has been created.
● The VM is in the Stopped state.
Data
For details about the parameters required for this task, see A.13.2 VM
Specification Parameters.
Procedure
Modify VM specifications as an administrator.
NOTE
The VM needs to be started for the modification of VM CPU and memory specifications to
take effect.
----End
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You can open the Desktop page using the browser.
● The VM is running and its assignment type is Assign a VM to multiple users.
Data
Table 4-1 lists the data to be obtained.
Procedure
Step 1 On the FusionAccess portal, choose Desktop > All Computers.
Step 2 Select the VM to be added with users and click Advanced Function.
The assignment type of the VM must be Assign a VM to multiple users.
Step 3 Choose Add User from the drop-down menu.
The page for adding users is displayed.
Step 4 Set user information based on the data plan.
Step 5 Click OK.
The system displays The command for adding the user is successfully issued.
Step 6 Click Return to VM List.
The VM list page is displayed. You can view the users added to the VM on this
page.
----End
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You can open the Desktop page using the browser.
● VM templates have been created.
● VM users have been created.
Data
For details about the parameters required for this task, see A.13.3 Parameters for
Adding VMs.
Procedure
Add VMs.
● The preceding parameters are automatically associated with the parameter values set in
the template. Configure the parameters as required.
● Configure 1 to 64 CPUs and 1024 MB to 1024000 MB memory. For Windows 10 (32-
bit/64-bit) OS, configure at least four CPUs, and at least 4096 MB memory size.
● QoS information: When creating common VMs, retain the default value.
Step 8 In the Disk area, click in the Operation column, and you can configure the
system disk and user disk information in the displayed dialog box. Click Add next
to Disk, and you can add user disk information in the dialog box that is displayed.
NOTE
Table 4-2 describes the rules for configuring system disk information.
Data store The data store provides system disk resources for users. The
system disk capacity cannot exceed the remaining space in the
data store. The unit is GB.
There is no limit on the configuration mode of user disks. Table 4-3 shows the
recommended configuration.
Data For all types of VMs, user disks must be deployed on non-IOTailor
Store storage.
Step 9 Click Add next to NIC area and configure the NIC information in the displayed
dialog box.
NOTE
Table 4-4 Rules for configuring Port group and Obtain IP address
Assign VMs.
The page for managing desktop groups is displayed. You can view the information
about the desktop group on the page.
NOTE
----End
NOTE
● Only assigned full copy, linked clone VMs can be upgrade to VIP desktops.
● You are advised to retain default values of the VIP desktop resource assurance and real-
time monitoring policies for all VIP desktop VMs in the FusionAccess system.
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● The VMs have been provisioned.
● The VIP desktop policies have been configured on the VIP Desktop Policy
page.
Data
Data preparation is not required for this operation.
Procedure
Step 1 On the FusionAccess portal, choose Desktop > All Computers > VM.
Step 2 In the VM list, select one or multiple VMs to be upgraded and click Upgrade to
VIP Desktop.
The VM automatically shut down and restart. After the VM starts, the icon is
displayed before the VM name.
----End
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● There is a VIP desktop to be restored to a common desktop.
Data
Data preparation is not required for this operation.
Procedure
Step 1 On the FusionAccess portal, choose Desktop > All Computers > VM.
Step 2 In the VM list, select one or multiple VIP desktop VMs to be restored and click
Advanced Function > Restore to Common Desktop.
The VM automatically shut down and restart. After the VM starts, the icon
before the VM name disappears.
----End
Prerequisites
● You have logged in to FusionAccess.
● The VMs have been assigned to a user or user group.
Data
Data preparation is not required for this operation.
Procedure
Step 1 On the FusionAccess, choose Desktop > All Computers > VM.
You can view the assignment result. If Assignment status is Unassigned, the VMs
are successfully unassigned.
NOTE
----End
● Access Time Control: Multiple periods are set, and some objects are
forbidden to log in to VMs during these periods.
● Device and User Binding: After users and devices are bound, users can log in
to VMs by using bound devices only, ensuring the security of sensitive
information in VMs. The administrators can group users or devices for batch
binding, simplifying the input operation by the administrators.
NOTE
Prerequisites
● You have logged in to FusionAccess. For details, see A.1 Logging In to
FusionAccess.
● You can open the Desktop page using the browser.
Data
For details about how to set the parameters involved in this task, see FusionAccess
Online Help.
Procedure
Set the access time control policy.
Step 1 On the FusionAccess portal, choose Desktop > Service Configuration > Access
Control Policy Management > Access Time Control.
Step 3 Enter the policy name and description based on Table 4-5, select time segments
and click Add to add them to the time segment list.
objects in the available area, and click to add the selected objects to the
Selected area.
Step 6 Click Save.
Step 7 If the name of the selected object contains the Desktop Group target type, the
policy will be applied to all the VMs in the related desktop group.
When The access time control policy is created successfully is displayed, click
OK & Return.
Step 8 Click Publish all policies to HDC to publish all policies to HDC as prompted.
Bind users and devices.
Step 9 On the FusionAccess portal, choose Desktop > Service Configuration > Access
Control Policy Management > Device and User Binding.
The Device and User Binding page is displayed.
Step 10 Click Set Device Binding.
The Set Device Binding Switch page is displayed.
Step 11 Check whether the WI cluster is enabled with the Device binding function and
Device binding security mode.
NOTICE
The configuration of the Device binding function and Device binding security
mode takes effect only for a single WI cluster.
Step 12 Click , and enable the Device binding function and Device binding security
mode as prompted.
NOTE
● Select Enable Automatic Binding Upon the First Login based on site requirements. If
this function is enabled, skip Step 16 and Step 17. The system automatically binds a
user to the fixed or mobile device to which the user logs in initially. A user can be bound
to a maximum of one fixed device and one mobile device.
● After the Device binding function and Device binding security mode are enabled, the Set
Device Binding Switch page is automatically closed.
● Only user passwords and dynamic passwords are supported for authentication in
automatic binding upon the first login.
Step 13 Check whether you need to set the access mode for users who use unbound
Devices in the WI cluster.
NOTICE
The configuration of the user access mode takes effect for global WI clusters.
The Set Access Mode page is automatically closed. The access mode for users who use
unbound devices is set.
Step 17 Select a TC Group, TC or Mobile device, and specify TC group name, MAC
address, Mobile device id, User (group) name, Domain, and Description.
Complete the binding following the instructions.
NOTE
● If there are multiple physical NICs when you configure the binding relationships
between MAC addresses and domain users, you need to enter at least one MAC address
of these NICs.
● If you select TC Group, enter TC group name; If you select TC, enter MAC address; If
you select Mobile device, enter the MAC address of the Android device or UUID of the
iOS device.
Step 18 On the FusionAccess portal, choose Desktop > Service Configuration > Access
Control Policy Management > TC and Computer Binding.
The TC and Computer Binding page is displayed.
Step 19 Click Set Binding.
The Set Binding page is displayed.
Step 20 Select Enable and click OK.
Step 21 Click Manual Input.
The TC and Computer Binding page is displayed.
Step 22 Configure information and complete the binding following the instructions. For
details, see Table 4-6.
----End
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You can open the Desktop page using the browser.
Data
Data preparation is not required for this operation.
Procedure
Check the MAC binding status of the VM.
MAC binding must be Disable if Obtain IP is DHCP, that is, VM IP addresses are allocated
by the DHCP server.
● If no, go to 4.
Step 4 Select the VM to be modified from the VM list, click Advanced Function, and
select Modify VM IP from the drop-down list.
The Modify VM IP address list page is displayed.
Step 5 Deselect MAC binding and click OK.
NOTE
You cannot change the MAC address binding status for the VMs in the Migrating or
Recovering state.
Perform IP synchronization.
Step 9 Select the VM from the VM list, click Advanced Function, and select Modify VM
IP from the drop-down list.
The Modify VM IP address list page is displayed.
IP synchronization is complete.
Step 13 Select the VM from the VM list, click Advanced Function, and select Modify VM
IP from the drop-down list.
You cannot change the MAC address binding status for the VMs in the Migrating or
Recovering state.
----End
Scenarios
Modify the original VM template by installing additional software on the guest
OS. You can only modify the following types of templates:
NOTICE
If you use the template to create VMs, deselect Generate initial password on the
Customize OS page.
Prerequisites
● You have logged in to FusionCompute.
● You have obtained the software packages to be installed.
● You have obtained the template tool
FusionAccess_WindowsDesktop_Installer_6.5.1.SPC003.iso.
Data
Data preparation is not required for this operation.
Procedure
Convert the template into a VM.
Step 1 On the FusionCompute portal, click , select VM Template, and select the
template to be converted into a VM.
Step 2 Choose Operation > Convert to VM, and convert the template into a VM as
prompted.
The VM converted from the template is displayed on the VM tab page.
Step 3 Choose VM converted from the template > Power on, and start the VM as
prompted.
NOTE
Step 4 Locate the row that contains the VM, and choose VNC login.
Step 5 Check whether the software package is an .iso file.
● If yes, go to Step 6.
● If no, go to Step 9.
Step 6 Mount ISO files to the VM.
Step 7 On the VM, double-click the CD-ROM.
The CD-ROM window is displayed. You can see the software package in the
window.
Step 8 Go to Step 14.
Step 9 On the VM desktop displayed in the VNC window, set the IP address of the PC or
laptop used for installation to an IP address in the system management plane.
Step 10 Choose Start > Run.
Step 11 In Open, enter \\IP address of the PC or laptop\Letter of the drive that
contains the software package$ and click OK.
The Windows Security dialog box is displayed.
Step 12 Enter the username and password of the PC or laptop and click OK.
Go to the task manager of the PC or laptop.
Step 13 Copy the software installation packages to C:\ on the VM.
Step 14 Double-click each installation program and install the software as prompted.
NOTE
After the software is installed, unmount the CD-ROM drive from the VM.
Step 15
NOTICE
Encapsulate a VM template.
Step 20 Convert the VM into a template. For details, see A.10 Converting a VM into a
Template.
----End
NOTE
● If you use the template to create VMs, deselect Generate initial password on the
Customize OS page.
● After updating a linked clone template, you can delete the VMs and provision new VMs,
or 4.11 Recomposing System Disks for existing VMs.
● Deleting and provisioning VMs affect live network services. You need to make
preparations in advance to ensure proper service running.
Prerequisites
● You have logged in to FusionCompute.
● You have obtained the software packages to be installed.
● You have obtained the template tool
FusionAccess_WindowsDesktop_Installer_6.5.1.SPC003.iso.
Data
Data preparation is not required for this operation.
Procedure
Clone the template.
Step 1 On the FusionCompute portal, click , select VM Template, and select the
template to be cloned as a new template.
Step 2 choose Operation > Clone to Template.
The Create Template page is displayed.
Step 3 Select the computing resource. The default computing resource, that is,
ManagementCluster, is recommended. Clone the template as prompted.
Step 4 On the FusionCompute portal, click , select VM Template, and select the
template (generated after cloning) to be converted into a VM.
Step 5 Choose Operation > Convert to VM, and convert the template into a VM as
prompted.
The VM converted from the template is displayed on the VM tab page.
Step 6 Choose VM converted from the template > Power on, and start the VM as
prompted.
The CD-ROM window is displayed. You can see the software package in the
window.
Step 14 On the VM desktop displayed in the VNC window, set the IP address of the PC or
laptop to an IP address in the system management plane.
Step 16 In Open, enter \\IP address of the PC or laptop\Letter of the drive that
contains the software package$ and click OK.
Step 17 Enter the username and password of the PC or laptop and click OK.
Step 19 Double-click each installation program and install the software as prompted.
NOTE
After the software is installed, unmount the CD-ROM drive from the VM.
Step 20 Convert the VM into a template. For details, see A.10 Converting a VM into a
Template.
----End
NOTE
● After the system disk is restored, only data stored on data disks of full copy VMs/linked
clone VMs will be remained. Data on the system disk such as that on the desktop and in
Favorites will be lost. If you want to keep such data, inform the users of backing up it in
advance. For full copy VMs, the original system disk can be retained and repurposed as
a data disk.
● You can restore the VMs that meet the following conditions:
● The running status is Running or Stopped.
● The assignment status is Assigned.
● The login status is not In use.
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You can open the Desktop page using the browser.
● All the VMs in a VM group have been assigned to users.
● VMs exist in desktop groups.
Data
Data preparation is not required for this operation.
Procedure
Determine the task to be performed.
Step 1 Determine the method to restore the system disk in a linked clone, or full copy
VM.
● To restore the system disk in a linked clone/full copy VM, go to Step 2.
● To restore the system disks of VMs in a linked clone, or full copy VM group,
go to Step 8.
● To restore the system disks of VMs in a linked clone, or full copy desktop
group, go to Step 14.
Restore the system disks of VMs in a linked clone, or full copy VM.
Step 2 On the FusionAccess portal, choose Desktop > All Computers > VM or Desktop >
All Computers > Hosting Computer.
Step 3 Select the VM to be restored, click Advanced Function, and select Restore
System Disk from the drop-down list.
NOTE
You can select multiple VMs of the same type and restore the system disks in a unified
manner. However, you cannot perform this operation for VMs of different types.
Do not select hosting computers of different service types (VDI and SBC) to restore system
disks at the same time.
Restore the VMs' system disks in a linked clone or full copy VM group.
Step 9 Select the VM group to be restored and click Restore System Disk.
Restore the system disks of VMs in a linked clone or full copy desktop group.
Step 15 Select the desktop group to be restored and click Restore System Disk.
The Set Restore Policy dialog box is displayed.
Step 16 Set the restore policy and notification message as prompted.
● If the VMs in the desktop group are in use or have important data to save
later, select Next startup (Not now).
● If the VMs in the desktop group are not in use or have no important data to
save, select Immediately (Forced restore).
Step 17 Click OK.
The Warning dialog box is displayed.
Step 18 Click OK.
The Succeeded dialog box is displayed.
Step 19 Click OK.
----End
NOTICE
● After the system disk is recomposed, only data stored on data disks of full copy
VMs/linked clone VMs will be remained. Data on the system disk such as that
on the desktop and in Favorites will be lost. If you want to keep such data, ask
users to back up data in advance. For full copy VMs, the original system disk
can be retained and repurposed as a data disk.
● Before updating a VM, you need to use the updated template to provision a
VM to test the template. After the VM is successfully provisioned, you can use it
for VM update.
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You can open the Desktop page using the browser.
● A VM group is created, and new software has been installed on the template
used to create the VMs in the VM group.
● VMs exist in desktop groups.
Data
Data preparation is not required for this operation.
Procedure
Select the mode to recompose system disks.
Step 1 Select the mode to recompose the system disks of full copy, linked clone VMs.
● To recompose the system disks of a full copy VM group (VMs in the group are
created using the same template), or linked clone VM group, go to Step 2.
● To recompose the system disks of a full copy VM group (VMs in the group are
created using different templates), go to Step 9.
● To recompose the system disks of a full copy VM group (VMs in the group are
created using the same template), go to Step 16.
Recompose the system disks of a full copy VM group (VMs in the group are
created using the same template), or linked clone VM group.
You can view task status in Task > Task Tracing. The task is executed successfully
when its status changes to Success.
Recompose the system disks of a full copy VM group (VMs in the group are
created using different templates).
Step 9 On the FusionAccess portal, choose Desktop > All Computers > VM or Desktop >
All Computers > Hosting Computer.
Do not select hosting computers of different service types (VDI and SBC) to recompose
system disks at the same time.
Step 12 Set the update policy and notification message as prompted on the Set Update
Policy page.
● If the VMs in the VM group are in use or have important data to save later,
select Next startup (Not now).
● If the VMs in the VM group are not in use or have no important data to save,
select Immediately (Forced update).
Step 14 On the displayed Recompose System Disk page, select the updated VM template
and click Finish.
You can view task status in Task > Task Tracing. The task is executed successfully
when its status changes to Success.
Recompose the system disks of a full copy VM group (VMs in the group are
created using the same template).
Step 17 Search for the desktop group to be updated by specifying search criteria.
Step 18 Select the full copy desktop group to be updated and click Recompose System
Disk.
Step 19 Set the update policy and notification message as prompted on the Set Update
Policy page.
● If the VMs in the desktop group are in use or have important data to save
later, select Next startup (Not now).
● If the VMs in the desktop group are not in use or have no important data to
save, select Immediately (Forced update).
Step 20 Click OK.
Step 21 On the displayed Recompose System Disk page, select the updated VM template
and click Finish.
The Warning dialog box is displayed.
Step 22 Click Confirm.
You can view task status in Task > Task Tracing. The task is executed successfully
when its status changes to Success.
----End
NOTE
Before using the template tool to configure a template VM, set Location of the Huawei
desktop controller (HDC) to Manual, and enter the HDC address.
Prerequisites
● VMs have been created on FusionCompute.
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You have configured the browser. The Desktop page can be properly
displayed.
Data
For details about the parameters required for this task, see A.13.3 Parameters for
Adding VMs.
Procedure
Use the template tool to configure the VM OS.
Step 6 When only one template is created, you can reset the HDC information and apply
the template to other HDCs. For details, see A.4 (Optional) Reset HDC
information.
Discover VMs.
Step 7 On the FusionAccess portal, choose Desktop > All Computers > Unmanaged
Computer.
The Desktop is the HDC server configured in System > Initial Configuration > Desktop
Components.
NOTE
The discovery task automatically stops when the preset end time reaches, or you can
manually stop the task.
Import VMs.
Step 14 Set VM group type to Full Copy, and click Import VM.
NOTE
If there is no corresponding VM group in the list, click Create VM Group, enter related
information, and click Finish.
● Service Type: VDI
● VM group name: Set this parameter based on the actual plan.
● VM group description: Set this parameter based on the actual plan.
● VM group type: Full copy
Assign VMs.
Step 21 On the desktop group management page, select the target desktop group in the
list, and click Assign VM.
NOTE
If there is no corresponding desktop group in the list, click Create Desktop Group, enter
related information, and click Finish.
● Desktop: Desktop01
● Desktop group name: Set this parameter based on the actual plan.
● Desktop group type: Set this parameter based on the actual plan.
● VM type: Full copy
● Desktop group description: Set this parameter based on the actual plan.
Step 22 Configure basic information about the desktop group based on the data plan.
NOTE
The page for managing desktop groups is displayed. You can view the information
about the desktop group on the page.
NOTE
When logging in to the VM for the first time, change the Administrator password
immediately.
----End
FusionAccess according to the content in this section and based on the actual
scenario requirements.
NOTE
Prerequisites
● VMs have been created on the other third-party platforms.
● Ensure that the network connection between the hosting computer and
FusionAccess is always normal.
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You have configured the browser. The Desktop page can be properly
displayed.
● You have obtained the template tool
FusionAccess_WindowsDesktop_Installer_6.5.1.SPC003.iso.
Data
For details about the parameters required for this task, see A.13.3 Parameters for
Adding VMs.
Procedure
Use the template tool to configure the VM OS.
Step 6 When only one template is created, you can reset the HDC information and apply
the template to other HDCs. For details, see A.4 (Optional) Reset HDC
information.
Step 7 On the FusionAccess portal, choose Desktop > All Computers > Unmanaged
Computer.
The Desktop is the HDC server configured in System > Initial Configuration > Desktop
Components.
NOTE
The discovery task automatically stops when the preset end time reaches, or you can
manually stop the task.
Step 13 Check whether the hosting computers to be imported are being used.
● If no, go to Step 14.
● If yes, go to Step 26.
If there is no corresponding VM group in the list, click Create VM Group, enter related
information, and click Finish.
● Service Type: VDI
● VM group name: Set this parameter based on the actual plan.
● VM group description: Set this parameter based on the actual plan.
● VM group type: Hosting Computer
Assign VMs.
Step 22 On the desktop group management page, select the target desktop group in the
list, and click Assign VM.
NOTE
If there is no corresponding desktop group in the list, click Create Desktop Group, enter
related information, and click Finish.
● Desktop: Desktop01
● Desktop group name: Set this parameter based on the actual plan.
● Desktop group type: Set this parameter based on the actual plan.
● VM type: Hosting Computer
● Desktop group description: Set this parameter based on the actual plan.
Step 23 Configure basic information about the desktop group based on the data plan.
NOTE
The page for managing desktop groups is displayed. You can view the information
about the desktop group on the page.
NOTE
When logging in to the VM for the first time, change the Administrator password
immediately.
NOTE
If the hosting computers to be imported are being used, the following conditions must be
met:
● The third-party computers to be added have been added to a domain.
● The third-party computers to be added have been assigned to end users.
● In application virtualization scenarios, third-party computers cannot be imported as
hosting computers.
● In a pool desktop scenario, to ensure all users in user group A can log in to the pool
desktop that is allocated to user group A, all the users must directly belong to user
group A.
For example, in a scenario where user a belongs to department A and department A
belongs to department C, user a can directly log in to the pool desktop if the pool
desktop is allocated to department A but cannot log in to the pool desktop if the pool
desktop is allocated to department C.
Step 27 On the page for managing desktop groups, select the desktop group whose VM
Type is Hosting Computer.
NOTE
If there is no corresponding desktop group in the list, click Create Desktop Group, enter
related information, and click Finish.
● Desktop: Desktop01
● Desktop group name: Set this parameter based on the actual plan.
● Desktop group type: Set this parameter based on the actual plan.
● VM type: Hosting Computer
● Desktop group description: Set this parameter based on the actual plan.
----End
Prerequisites
● You have obtained the domain administrator account and its password.
● An account with the local administrator permissions is available in the user
VM.
● You have logged in to FusionCompute.
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You have obtained the template tool
FusionAccess_WindowsDesktop_Installer_6.5.1.SPC003.iso.iso.
Data
Data preparation is not required for this operation.
Procedure
Reset the password of the built-in administrator.
Step 1 Use the VNC to log in to the VM using the account with local administrator
permissions.
Step 2 Click and choose Run. In the Run edit box, enter compmgmt.msc. The
Computer Management window is displayed.
Step 3 In the navigation pane on the left, choose Computer Management(Local)>
System Tools > Local Users and Group, and select Users.
Step 4 In the pane on the right, right-click Administrator (select a built-in administrator
as required), choose Set Password For Administrator, and reset the password as
prompted.
Step 5 Log out of the OS and log in to the VM as user Administrator (select a built-in
administrator as required).
Step 6 Click and choose Control Panel > User Accounts and Family Safety > User
Accounts > Manage Accounts.
Step 7 Choose User Accounts > User, and delete all domain users.
Step 9 Click and choose Run. In the Run edit box, enter sysdm.cpl. The System
Properties window is displayed.
Step 10 On the Computer Name tab page, click Change. The Computer Name/Domain
Changes dialog box is displayed.
Step 11 In the Member of area, select Workgroup and enter the name of the workgroup
to be added, for example, WorkGroup.
The You must restart your computer to apply these changes dialog box is
displayed.
Create a template.
NOTE
On some VMs, after you double-click the CD/DVD-ROM drive, the FusionAccess Windows
Installer page is directly displayed.
Step 23 Click Create Template, as shown in Figure 4-1, and create a template as
prompted.
Step 26 In the navigation tree on the left of the FusionCompute portal, click , select the
VM tab, and select the VM to be operated.
Step 27 Choose Operation > Template > Convert to Template.
Step 28 Click Confirm.
Step 29 On the FusionCompute portal, click , select VM Template, and click the
template whose name you want to change.
Step 30 On the Summary tab page, click on the right of the template name.
On the page for changing the template name that is displayed, change the
template name.
Step 31 Click Confirm.
Step 33 In the navigation pane on the left, choose Service Configuration > VM Template.
Step 34 In the pane on the right, locate the VM template to be provisioned and configure
the following parameters as required:
● Service type: Select a service type as required.
● Type: Select a template type as required.
NOTE
After being used to create a template, the VM cannot be used any more. However, the VM
record can be queried in the FusionAccess Portal VM list. To delete the record, click
Unassign next to the VM and click Delete.
----End
NOTE
● Supported desktop types: desktops in a 1:1 distribution mode in a private desktop group,
and users' desktops in a static pool desktop group.
● Data storage types supported on FusionCompute: virtualized SAN storage, virtualized
local storage, FusionStorage, and NAS storage.
● Disk types that are not supported on FusionCompute: shared disks, independent disks,
non-persistent disks, and system disks for linked-clone VMs.
Prerequisites
Conditions
Procedure
Step 1 On FusionAccess, choose Desktop > All Computers > VM.
The VM page is displayed.
Step 2 In the VM list, select the target VM, and choose Advanced Function > Set User
Self-service Backup.
The Set User Self-service Backup function of the VM page is displayed.
Step 3 Select an operation type: Open user self-service backup or Close user self-
service backup.
Step 4 Click OK to return to the Successful operation page.
Step 5 Click Confirm. The VM user self-service backup function setting is complete.
----End
5 Service Reclaiming
NOTE
● Desktop group types include dynamic pool and static pool, and the pool modes consists
of the dynamic pool and static pool.
● The pool mode corresponds to the user assignment type of Assign VMs to a desktop
group.
Prerequisites
You have logged in to the AD server as an administrator.
Data
Table 5-1 lists the data to be obtained.
Procedure
(Optional) Delete a VM.
Perform this operation if the desktop group type is static pool and ignore this
operation if the desktop group type is dynamic pool.
Delete a user from the user group whose type is Assign VMs to a desktop
group.
Step 10 On the AD server, choose Start > Administrative Tools > Active Directory Users
and Computers.
Step 11 In the navigation tree, choose the name of the domain to which the user belongs.
The domain information of the user to be deleted is displayed in the right pane.
----End
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You can open the Desktop page using the browser.
Data
Table 5-2 lists the data to be obtained.
Procedure
Step 1 On the FusionAccess portal, choose Desktop > All Computers.
Step 2 Click Advanced Search, enter the domain account of the user to be deleted in
Login user or the name of the user group to which the user belongs in User
(group), and click Query.
Step 3 Select the VM whose Assignment type is Assign a VM to multiple users.
Step 4 Choose Advanced Function > Delete User.
Step 5 Move the users who share the VM from Existing users to User to be deleted.
Step 6 Click OK.
A message is displayed indicating that the command for deleting the users is
successfully issued.
Step 7 Click Return to VM List.
The VM list is displayed.
----End
Prerequisites
● You have logged in to the FusionAccess portal. For details, see A.1 Logging In
to FusionAccess.
● You can open the Desktop page using the browser.
● The VM has been assigned only to the user.
Data
Table 5-3 lists the data to be obtained.
VM to be deleted - -
Procedure
Step 1 On the FusionAccess portal, choose Desktop > All Computers.
Step 2 Click Advanced Search, enter the domain account of the user to be deleted in
Login user or the name of the user group to which the user belongs in User
(group), and click Query.
Step 3 Select the VM whose Assignment type is Assign a VM to a user and click
Unassign VM.
Step 4 Click OK.
Step 5 Click OK.
Assignment Status of the VM is changed to Unassigned, and the Running
Status is changed to Stopped.
----End
A Appendixes
Prerequisites
The FusionAccess portal supports the following types of browsers:
Tips:
● Firefox 50, Firefox 58, Google Chrome 55, and Google Chrome 64 are
recommended for a local computer running Windows 7 Service Pack 1 or
Windows 10.
● Microsoft Edge 15 is recommended for a local computer running Windows 10.
● Safari 10, Firefox 63, and Google Chrome 72 are recommended for a local
computer running Mac OS 10 to 10.14.5.
● Do not use browsers that are not listed here; otherwise, some buttons may be
invalid and the GUI may be displayed abnormally.
Data
Table A-1 lists the data to be obtained.
Procedure
Step 1 Open Internet Explorer on the local PC, enter the FusionAccess login address in
the address box, and press Enter.
Step 3 Check whether the system displays a message indicating that the browser version
does not meet requirements.
● If yes, go to Step 4.
● If no, go to Step 11.
Step 5 Deselect Include updated website lists from Microsoft, Display intranet sites in
Compatibility View, and Display all websites in Compatibility View, and click
Close.
Step 7 Open Internet Explorer again and repeat Step 1 and Step 2.
Step 8 Check whether the system displays a message indicating that the browser version
does not meet requirements.
● If yes, go to Step 9.
● If no, go to Step 11.
Step 9 Press F12 and set Browser to Internet Explorer 8 in the menu bar of the
Developer Tools window.
By default, Document Mode is set to Internet Explorer 8(Standards).
Step 10 Close the Developer Tools window.
Step 11 Select a language, enter the username and password, and click Login.
By default, the username is admin and the password is Cloud12#$.
The FusionAccess portal is displayed, and no further action is required.
NOTE
● If the FusionAccess portal cannot be displayed due to a certificate problem, see A.7
Configuring a Browser for Accessing FusionAccess.
● After your first login, the system asks you to change the user admin password. Change
the password as prompted.
The password must conform to the following rules:
– Contain at least one uppercase letter (A-Z), one lowercase letter (a-z), one digit
(0-9), and one special character (~!@#$%^&*()-_=+\|{};:'",<.>/? or space).
– Contain 8 to 32 characters.
– Cannot be same as the recent three passwords.
– Cannot contain the username or the username in reversed order.
– Contains at least two characters that are different from those in the old password.
– Cannot be any weak password by default, such as Huawei@, Huawei123@, or
huawei_123.
----End
Prerequisites
You have logged in to the VM and opened the OS installation window.
Data
For details about key data and parameters, see the description given in specific
procedures.
The password must conform to the following rules:
● Contain at least one uppercase letter (A-Z), one lowercase letter (a-z), one
digit (0-9), and one special character (~!@#$%^&*()-_=+\|{};:'",<.>/? or space).
● Contain 8 to 32 characters.
● Cannot be same as the recent three passwords.
Procedure
Determine the type of the OS to be installed.
NOTICE
Do not shut down the VM before the OS installation is complete, or the OS will
not be installed successfully.
This section describes how to install Windows 7 SP1 Professional Edition as an example. The
specific operations may vary with the release time and language of the OS ISO file.
Step 2 In the Windows 7 SP1 OS installation window, specify Language to install, Time
and currency format, and Keyboard or input method as required, and click
Next.
Step 3 Click Install now.
The Please read the license terms dialog box is displayed.
Step 4 Select I accept the license terms and click Next.
A dialog box is displayed, asking you to select the OS type.
Step 5 Click Customer(Advanced).
The installation disk window is displayed.
Step 6 Click Load the Driver.
Step 7 Click Browse.
Step 8 Select the driver that matches the ISO version, and click OK.
Step 9 Click Next, use the default disk.
Step 10 Click Next.
The OS installation starts. The VM restarts several times during the installation
process. Each time after the VM restarts, log in to the VM using VNC. The
installation process takes about 30 minutes.
When the installation is complete, a dialog box is displayed asking you to set a
username.
Step 11 Enter LocalAccount in Type a user name, and click Next.
The Set a password for you account window is displayed.
Step 12 Set Type a password and Type a password hint, and click Next.
The Type your Windows product key window is displayed.
Step 13 Enter Windows product key, and click Next.
The Help product your computer and improve Windows automatically window
is displayed.
Step 14 Select Use recommended settings.
The Review your time and date settings window is displayed.
Step 15 Set Time zone, Date, and Time, and click Next.
The Select your computer's location window is displayed.
Step 16 Click Work network.
The system automatically completes OS configuration and connects to the VM OS
using the LocalAccount account.
Step 17 In the Windows 10 OS installation window, specify Language to install, Time and
currency format, and Keyboard or input method as required, and click Next.
Step 18 Click Install now.
The Enter the product key to activate Windows page is displayed.
Step 19 Enter the product key and click Next.
NOTE
Obtain the serial number of the Windows 10 OS from Microsoft, Huawei, or other official
channels.
Step 20 In the displayed License terms dialog box, select I accept the license terms and
click Next.
The page for selecting an OS type is displayed.
Step 21 Click Custom: Install Windows only (advanced).
The disk installation window is displayed.
Step 22 Click Load the Driver.
Step 23 Click Browse.
Step 24 Select the driver that matches the ISO version, and click OK.
Step 25 Click Next, use the default disk.
Step 26 Click Next.
The OS installation starts and the entire installation process takes about 30
minutes.
After the installation is complete, the Get going fast page is displayed.
Step 27 Click Use Express settings.
The Create an account for this PC page is displayed.
Step 28 Set Who's going to use this PC? to LocalAccount, enter Password and Password
hint, and click Next.
The system automatically completes OS installation and configuration based on
configuration information and uses the LocalAccount account to log in to the ISO
VM OS.
----End
Procedure
Deleting the User Configuration File
NOTE
If the user to be deleted has not logged in to the VM, the user configuration file is not
generated. Run Step 4.
Step 3 On the User Profiles page, select the user to be deleted and click Delete.
Deleting Users
Step 4 On the VM, click . On the page that is displayed, enter compmgmt.msc and
press Enter.
The Computer Management window is displayed.
Step 5 In the navigation tree, choose Local Users and Groups > Users.
Step 6 In the right pane, right-click the username to be deleted and select Delete.
Step 7 Close the Computer Management window.
----End
You only need to create a template and apply the template to other HDCs by
resetting HDC information
NOTE
● When you issue this task, it is recommended not to perform the task of quick provision
and quick import at the same time.
● HDC information for fast-distributed and managed computers cannot be reset.
● Resetting HDC information does not support Linux system computers.
Prerequisites
Conditions
Data
Procedure
Step 1 On the FusionAccess, choose Desktop > All Computers > Unmanaged Computer.
----End
Prerequisites
The user prepares the wallpaper and lock screen image for replacement.
Data
For details about key data and parameters, see the description given in specific
procedures.
Procedure
Installing the Windows 7 SP1 desktop experience package
Step 5 After the installation, click Close and restart the VM as prompted.
Step 6 Log in to the VM as user Administrator. After the window indicating that the
installation is successful is displayed, click Close, close the Server Manager
window.
Step 7 On the taskbar, right-click , and click Unpin this program from taskbar.
Step 8 On the VM, click Start. In the Search programs and files text box, enter
services.msc and press Enter.
Step 15 Double-click Windows Audio Endpoint Builder and set Startup type to
Automatic.
Step 24 Name your desired unlock image as backgroundDefault.jpg. The image must be
in the .jpg file format and is less than 256 KB.
Step 25 Create the C:\Windows\System32\oobe\info\backgrounds directory on the VM
and copy your desired unlock image to the directory.
Step 26 On the VM, click Start. In the Search programs and files text box, enter regedit.
The Registry Editor window is displayed.
Step 27 On the left navigation tree, choose Computer > HKEY_LOCAL_MACHINE >
SOFTWARE > Microsoft > Windows > CurrentVersion > Authentication >
LogonUI > Background. Double-click OEMBackground.
Step 28 In the dialog box that is displayed, change the value of Value data from 0 to 1,
and click OK. The Registry Editor window is closed.
Step 29 Click Start. In the Search programs and files text box, enter gpedit.msc. The
Local Group Policy Editor window is displayed.
Step 30 Set Always use custom logon background to Enabled, as shown in Figure A-2.
Step 31 Click Start. In the Search programs and files text box, enter sysdm.cpl. The
System Properties window is displayed.
Step 32 In the Advanced tab, click Settings under Startup and Recovery.
Step 33 Set the system according to Figure A-3. Click OK.
Step 43 Click . In the Search programs and files text box, enter gpedit.msc. The
Local Group Policy Editor window is displayed.
Step 44 Set the status of both Activate Shutdown Event Tracker System Start Data
feature and Display Shutdown Event Tracker to Disabled, as shown in Figure
A-5.
Step 45 Set the status of Interactive logon: Do not require CTRL+ALT+DEL to Enabled,
as shown in Figure A-6.
Step 47 On the right pane of the Server Manager that is displayed, locate Security
Information, and click Configure IE ESC, as shown in Figure A-7.
Using the profile of user Administrator as the profile of the default user
Step 59 Deregister the user Administrator and log in to the VM using the newly created
user profilehelp.
Step 60 Click Start. In the Search programs and files text box, enter regedit. The
Registry Editor window is displayed.
Step 61 On the left navigation tree, choose Computer > HKEY_LOCAL_MACHINE >
SOFTWARE > Microsoft > Windows NT > CurrentVersion > ProfileList. Double-
click Default.
Step 62 In the dialog box that is displayed, change the value of Value data to
%SystemDrive%\Users\Administrator, and click OK.
Step 63 Click Start. In the Search programs and files text box, enter sysdm.cpl. The
System Properties window is displayed.
Step 64 In the Advanced tab, click Settings under User Profiles.
Step 65 Select Default Profile and click Copy To.
Step 66 In the Copy To window that is displayed, click Browse. Select C:\Users\Default, as
shown in Figure A-11.
Step 67 Click OK. On the dialog box that is displayed, click Yes, as shown in Figure A-12.
Step 72 Click . Choose Control Panel > User Accounts > Add or remove user
accounts.
Step 73 Select profilehelp and click Delete the account, as shown in Figure A-13.
Step 77 Click and choose Control Panel > User Accounts > Change account type.
Select profilehelp and click Remove, as shown in Figure A-14.
A prompt is displayed.
Step 80 Click . In the Search programs and files text box, enter sysdm.cpl. The
System Properties window is displayed. In the User Profiles area on the
Advanced tab page, click Settings. Select Account Unknown and click Delete.
Step 81 In the dialog box that is displayed, click Yes.
Step 82 Double-click OK and the System Properties window is closed.
End.
----End
Choose Run, enter gpedit.msc, and press Enter. The Local Group Policy Editor
window of the user domain AD server is displayed. Choose Computer
Configuration > Windows Settings > Security Settings > Local Policies >
Security Options, and set Network security: LAN Manager authentication level
to Send NTLMv2 response only.
Prerequisites
The FusionAccess home page cannot be displayed properly.
Data
Data preparation is not required for this operation.
Procedure
Perform operations based on the browser type.
Step 1 Enter the FusionAccess address in the address box of your browser and press
Enter.
NOTE
Step 3 Click Certificate Error on the address bar of Internet Explorer, and click View
certificates in the displayed dialog box.
The Certificate dialog box is displayed.
Step 4 Click Install Certificate.
The Certificate Import Wizard dialog box is displayed.
Step 5 Click Next.
The Certificate Store dialog box is displayed.
Step 6 Select Place all certificates in the following store and click Browse.
The Select Certificate Store dialog box is displayed.
Step 7 Select Trusted Root Certification Authorities and click OK.
The Certificate Store dialog box is displayed.
Step 8 Click Next.
The Completing the Certificate Import Wizard dialog box is displayed.
Step 9 Click Finish.
The Security Warning dialog box is displayed.
Step 10 Click Yes.
The Certificate Import Wizard dialog box is displayed.
Step 11 Click OK.
Step 12 In the Certificate dialog box, click OK.
Step 13 On Internet Explorer, choose Tools > Internet Options.
The Internet Options dialog box is displayed.
Step 14 Click the Advanced tab.
Step 15 In the Settings area, select Use TSL 1.1 and Use TSL 1.2, deselect Warn about
certificate address mismatch and click OK.
No further action is required.
----End
Prerequisites
● You have logged in to FusionCompute.
● You have shared the folder to which the template is to be exported with the
local personal computer (PC) or remote server user and enabled read/write
permission on the folder. The shared folder name must be the same as the
name of the folder containing the template to be exported.
● You have disabled the firewall on the local PC.
Data
Table A-3 lists the data to be obtained.
Procedure
Convert a VM into a template.
Step 1 On the FusionCompute portal, click , select the VM tab, and click the VM name
to be converted into a template.
Step 3 After the VM is stopped, choose More > Template > Convert to Template.
Step 5 Locate the row that contains the VM to be exported and choose Export Template.
Step 6 Select the destination to which the template is exported, and click Next.
If the protocol type is CIFS, select Use the username and password of the share
computer, and enter the username and password as prompted.
Step 8 Decide whether to overwrite the template of the same name in the destination
folder.
● If yes, go to Step 9.
● If no, go to Step 10.
You can view the template export progress on the Task Center page.
NOTE
----End
NOTE
During the operation, you can modify parameter values to make the new template different
from the original template.
Prerequisites
● You have obtained the template tool
FusionAccess_WindowsDesktop_Installer_6.5.1.SPC003.iso.
● You have obtained and shared the VM template, which is accessible to
FusionCompute. The shared folder name and the name of the folder where
the template is stored are the same.
● The firewall on the maintenance terminal is disabled.
● You have logged in to FusionCompute.
Data
Data preparation is not required for this operation.
Procedure
Check the location of the template.
Step 1 Check whether the template is locally stored or located in the FusionCompute
system.
● If the template exists on the FusionCompute system, go to Step 2.
● If the template is locally stored, go to Step 6.
Step 2 On the FusionCompute portal, click , select VM Template, and select the
template to be cloned as a new template.
Step 9 In the row that contains the VM, choose VNC Login.
Step 10 Enter the username and password for logging in to the VM.
Step 16 Convert the VM into a template. For details, see A.10 Converting a VM into a
Template.
----End
Prerequisites
You have logged in to FusionCompute.
Data
Data preparation is not required for this operation.
Procedure
Convert a VM into a template.
Step 1 On the FusionCompute portal, click , select the VM tab, click the VM name to
be converted into a template.
Step 3 After the VM is stopped, choose More > Template > Convert to Template.
Step 4 Click Confirm.
----End
NOTE
Procedure
Use the profile of user Administrator as that of the default user.
Step 1 Click and then click Run. In the Run edit box, enter compmgmt.msc to go
to the Computer Management window.
Step 2 In the left navigation tree, choose Computer Management(Local) > System
Tools > Local Users and Groups. Click Users, and right-click New User.
Step 3 Enter profilehelp for User name and the password, as shown in Figure A-16.
Step 8 Deregister the user Administrator and log in to the VM using the newly created
user profilehelp.
Step 9 Click Start. In the Search programs and files text box, enter regedit. The
Registry Editor window is displayed.
Step 10 On the left navigation tree, choose Computer > HKEY_LOCAL_MACHINE >
SOFTWARE > Microsoft > Windows NT > CurrentVersion > rofileList. Double-
click Default.
Step 11 In the dialog box that is displayed, change the value of Value data to
%SystemDrive%\Users\Administrator, and click OK.
Step 12 Click Start. In the Search programs and files text box, enter sysdm.cpl. The
System Properties window is displayed.
Step 13 In the Advanced tab, click Settings under User Profiles.
Step 14 Select Default Profile and click Copy To.
Step 15 In the Copy To window that is displayed, click Browse. Select C:\Users\Default, as
shown in Figure A-18.
Step 16 Click OK. On the dialog box that is displayed, click Yes, as shown in Figure A-19.
Step 20 Click and choose Control Panel > User Accounts > Change account type.
Select profilehelp and click Remove, as shown in Figure A-20.
A prompt is displayed.
Step 23 Click . In the Search programs and files text box, enter sysdm.cpl. The
System Properties window is displayed. In the User Profiles area on the
Advanced tab page, click Settings. Select Account Unknown and click Delete.
Step 24 In the dialog box that is displayed, click Yes.
Step 25 Double-click OK and the System Properties window is closed.
----End
NOTE
You can mount a floppy drive to a VM using the following two methods:
● Automatically Match: FusionCompute automatically mounts the target VIRTIO driver
to the VM based on the VM OS type (only Windows OSs are supported).
● Manually Assign: Some common VIRTIO drivers exist on FusionCompute. Users can
mount required VIRTIO drivers to VMs.
Procedure
Select the floppy drive mounting method.
Step 1 In the navigation tree on the left of the FusionCompute portal, click and select
the VM tab.
Step 2 Click the VM name to which the drive is to be mounted.
Step 3 On the Configuration tab, choose Hardware > Floppy Drive.
----End
VM group type ● Linked clone: The VMs in a linked clone Full copy
group share the same system disk. A linked
clone is made from a snapshot of the
parent. This conserves disk space and allows
multiple VMs to use the same software
installation. Linked clones are created from
linked clone templates.
● Full copy: Each VM in a full copy VM group
has its own system disk. Both Full copy and
QuickPrep templates can be used to create
full copy VMs.
Host If you specify a host, the data store for the VM CNA01
will be created on the host. If you specify a
cluster, the data store for the VM will be
randomly created on a host in the cluster.
VM naming rule The naming rule specifies how VMs are named. Fast#
The VM name consists of a prefix and a
number expressed by one or multiple number
signs (#). The prefix starts with a letter or a
digit. It consists of letters, digits, and -. The VM
name is 1 to 15 characters long.
NOTE
Names of linked clone VMs cannot contain the AD
domain account name.
Add User ● The added users must first be defined on the User01
(Full copy) LiteAD server. The username must be the
same as the username set when the VM user
is created.
● Use commas (,) to separate multiple
usernames, for example, vdesktop\User01,
vdesktop\User02,….
● You can enter usernames with or without
domain names. A username can be in any of
the following formats:
– NetBIOS name\username, for example,
vdesktop\User01
– Fully qualified domain name (FQDN)
\username, for example,
vdesktop.huawei.com\User01
– Username@NetBIOS name, for example,
User01@vdesktop
– Username@FQDN, for example,
User01@vdesktop.huawei.com
Set User If the user group Users is configured when the Administrat
Group (Full VM template is created, set this parameter to ors
copy) Users. Otherwise, set this parameter to
Administrators.
If the OS you use is not in Chinese or English, set
this parameter to the name of the administrator
group in your language.
Add User ● The user (group) added must first be defined UserGroup0
(Group) on the LiteAD server. The username (group) 1
(Linked must be the same as the value of Username
clone) or Group name set when the VM user is
created.
● Use commas (,) to separate multiple
usernames, for example, vdesktop
\UserGroup01, vdesktop\UserGroup02,….
● You can enter usernames with or without
domain names. A username containing a
domain name can be in any of the following
formats:
– NetBIOS name\username, for example,
vdesktop\UserGroup01
– FQDN\username, for example,
vdesktop.huawei.com\UserGroup01
– Username@NetBIOS name, for example,
UserGroup01@vdesktop
– Username@FQDN, for example,
UserGroup01@vdesktop.huawei.com
Table A-7 Data required for adding full copy or QuickPrep VMs
Parameter Description Example
Value
B Glossary
B.1 A-E
A
● alarm severity
The extent of the impact of a fault on services.
● Application Delivery Controller
A component that identifies applications allocated to users and delivers the
applications to virtual desktops.
● application VM
A VM running dedicated server software to implement specific functions. For
example, a VM running SQL Server is an application VM.
B
● bare VM
A VM that is assigned an identifier but does not occupy any CPU, memory,
storage, or network resources.
● baseboard management controller
A dedicated micro controller embedded in the main board of a computer
(especially a server).
● basic input/output system
Firmware installed on the computer main board that contains basic input/
output control programs, power-on self test (POST) programs, bootstraps, and
system setting information. The BIOS provides the hardware setting function
and control function for the computer.
● BMC
See baseboard management con....
● BIOS
See basic input/output syste....
C
● Charging Gateway
The gateway between the cloud system and an external billing center.
● cloud computing
A scheme that provides computing resources for users over the Internet by
using large data centers or super computer clusters.
● Cluster Monitor Node
The cluster-level monitoring manager.
● CMN
See Cluster Monitor Node.
● CNA
See Computing Node Agent.
● Computing Node Agent
A component that is deployed on a computing node and manages VMs and
VM mounting on the computing node.
D
● data center
A system used by enterprises and organizations with deployed networks to
store, manage, and share information
● DC
See data center.
● DHCP
See Dynamic Host Configurati....
● dom0
See domain 0.
● domain
Domains include domain 0 and domain U.
● domain 0
A modified Linux kernel and the only VM that operates on the Xen Hypervisor.
Domain 0 can access physical I/O resources and interwork with other VMs
operating on the system. Domain 0 must be started before other domains.
● domain U
Paravirtualized VMs operating on the Xen Hypervisor are called Domain U PV
Guests, which support the operating system whose kernel has been modified,
such as Linux, Solaris, FreeBSD, and other UNIX operating systems. Fully
virtualized VMs are called Domain U HVM Guests, which support the
operating system whose kernel does not need to be modified, for example,
Windows.
● Dynamic Host Configuration Protocol
A type of TCP/IP that enables a network to access the Internet and
automatically assign a temporary IP address to a host accessing the network.
E
● EC
See elastic computing.
● elastic computing
A cloud service that allocates computing resources to users as required.
● equipment serial number
An unique ID for a set of equipment.
● ESN
See equipment serial number.
B.2 F-J
F
● facility operating system
A system that intelligently controls facilities, such as air conditioners and
uninterruptible power systems (UPSs), in an equipment room, and exposes
and manages the API.
● fast Ethernet
An extension and enhancement of the traditional Ethernet that is based on
shared media. The maximum data transmission rate is 100 Mbit/s. FE
complies with the IEEE 802.3u standard.
● FE
See fast Ethernet
● File Transfer Protocol
A type of TCP/IP used to copy files between computers over the Internet. In
FTP transmission, one computer must serve as the FTP client and the other as
the FTP server.
● FOS
See facility operating syste....
● FTP
See File Transfer Protocol.
● full copy
A complete and independent copy of a VM. It shares nothing with the parent
VM after the cloning operation. A full copy can have independent system
disks and different software from the parent VM. Full copy applies to various
scenarios, for example, office automation (OA).
G
● GE
See Gigabit Ethernet.
● Gigabit Ethernet
A collection of technologies for transmitting data at a rate of 1 Gbit/s in
compliance with IEEE 802.3 standards.
● Guest OS
The operating system on domain U.
H
● HDC
See Huawei Desktop Controlle....
● HDP
See Huawei Desktop Protocol.
● host
A physical server that runs virtual software. VMs can be created on a host.
● HTTP
See Hypertext Transfer Proto....
● Hypertext Transfer Protocol
A request-response protocol in the client-server computing model. In HTTP, a
Web browser submits an HTTP request message to the server, and the server
returns a response message to the client.
● Hypervisor
The software layer on a virtual server, which manages the VMs on the server
and helps VMs share the hardware resources of the virtual server. The Xen
Hypervisor is a software layer between the hardware and operating system,
which performs CPU scheduling and partitioning between VMs. The Xen
Hypervisor controls VM migration between hardware devices and other VM-
related operations (because the VMs share a processing environment). The
Xen Hypervisor does not process networks, storage devices, videos, or other
I/O resources.
● Huawei Desktop Controller
A unit that controls the desktop policy of a user VM.
● Huawei Desktop Protocol
A desktop protocol that controls user VMs.
I
● I/O
input/output
● ICP
See information content prov....
● IDC
See Internet Data Center.
● information content provider
Any person or entity that creates or develops information provided over the
Internet or other interactive computer services.
● Internet Data Center
The data center that carries Internet services.
● Internet Small Computer Systems Interface
J
● Java Runtime Environment
An environment that provides libraries, Java Virtual Machine, and other
components to run applets and applications written in the Java programming
language.
● JRE
See Java Runtime Environment.
B.3 K-O
L
● linked clone
A technology that allows VMs to be made from a snapshot of the parent.
● linked clone VM
A duplicate of a VM that uses the same base disk as the parent VM and a
chain of delta disks to keep track of the differences between the original and
the clone. The linked clone technology reduces the need for disk space and
increases the maintenance efficiency. Linked clones apply to scenarios in
which the VMs use the same software, for example, call centers. The
differences between the parent VM and the linked clones are stored on the
delta disks for the linked clones.
● live migration
A method of migrating VMs without interrupting services.
● LLA
See Local Log Agent.
● LMA
See Local Monitor Agent.
● log node
Records system operation logs.
● logical unit number
An unique identifier of a LUN device. A RAID group can be divided into
multiple LUNs. Each LUN contains one or more physical disks.
● LUN
See logical unit number.
M
● MAC
● management module
The management module of a server.
● Media Access Control
A protocol at the media access control sublayer and the lower part of the
data link layer in the OSI model that is responsible for controlling and
connecting the physical media at the physical layer. When transmitting data,
the MAC protocol checks whether the data can be transmitted. If it can,
certain control information is added to the data, and then it is transmitted in
a specific format to the physical layer. Upon receiving the data, the MAC
protocol checks whether the control information is correct and the data was
transmitted correctly. If both of these are true, the control information is
removed from the data, which is then transmitted to the logical link control
(LLC) layer.
● MM
See management module.
N
● NC
See Network Computer.
● Network Computer
A device that provides virtual desktop service.
O
● OM
See operation and maintenanc....
● operation and maintenance
The operations and maintenance performed on the system by maintenance
engineers.
B.4 P-T
P
● power-off
The process of shutting down the physical servers.
● preboot execution environment
A technology that enables computers to boot from the network. This
technology is the successor of Remote Initial Program Load (RPL). The PXE
works in client/server mode. The PXE client resides in the ROM of a network
card. When the computer boots up, the BIOS invokes the PXE client to the
memory. The PXE client obtains an IP address from the DHCP server and
downloads the operating system from the remote server through TFTP.
● PXE
See preboot execution enviro....
R
● RAID
See Redundant Array of Indep....
● RDP
See Remote Desktop Protocol.
● Red Hat Package Manager
A packeting and installation tool for packages downloaded from the Internet.
The RPM is contained in certain Linux distribution versions and it
generates .rpm files.
● Redundant Array of Independent Disks
A technology that provides a hard disk group (logical hard disk) consisting of
multiple physical hard disks combined in different modes. The hard disk group
features higher storage performance over a single hard disk and supports
data redundancy. The different combination modes for disk arrays are called
RAID levels. At present, there are seven basic RAID levels, RAID 0 to RAID 6.
These basic RAID levels can be further combined to form new RAID levels,
such as RAID 10 (a combination of RAID 1 and RAID 0) and RAID 50 (a
combination of RAID 5 and RAID 0).
● Remote Desktop Protocol
A Microsoft virtual desktop protocol.
● Remote Procedure Call
A computer communication protocol that allows programs running on a
computer to invoke subprograms on another computer. The programmer does
not need to program for the interaction.
● resource cluster
A cloud service unit that contains resources of the same attributes. A cloud
system may contain one or more clusters. Clusters are categorized as
management clusters and virtual clusters.
● resource pool
A component that discovers physical resources and manages and schedules
physical and virtual resources.
● RPC
See Remote Procedure Call.
● RPM
See Redhat Package Manager.
● RPOOL
See resource pool.
S
● SAN
See storage area network.
● SC
See software client.
● SDRAM
synchronous dynamic random access memory
● serial over LAN
An interface complying with the IPMI V2.0 standard that controls serial data
transmission over a LAN connection. SOL specifies the packet formats and
protocols for serial data transmission between a remote workstation and the
computers it manages. SOL is based on the IPMI-over-LAN specification.
● server farm
A group of network servers with the same location that streamlines internal
processes by distributing the workload to the individual components of the
farm and expedites computing processes by harnessing the power of multiple
servers.
● service level agreement
A service contract between a customer and a service provider that specifies
the forwarding service a customer should receive and under what conditions.
The customer may be a user organization (source domain) or a differentiated
services domain (upstream domain). An SLA may consist wholly or partially of
traffic conditioning rules.
● service private cloud
Cloud infrastructure operated solely for a single organization.
● Simple Network Management Protocol
A network management protocol of TCP/IP that enables remote users to view
and modify the management information on a network element. This
protocol ensures the transmission of management information between any
two points. The polling mechanism is adopted to provide basic function sets.
In accordance with SNMP, both hardware and software agents can monitor
the activities of various devices on the network and report these activities to
the network console workstation. Control information about each device is
maintained by a management information block.
● SLA
See service level agreement.
● SNMP
See Simple Network Managemen....
● software client
Software running on a common PC to process the virtual desktop protocol.
● SOL
See serial over LAN.
● SPC
See service private cloud.
● storage area network
A network dedicated to transporting data for storage and retrieval.
● storage node
A storage server.
T
● TC
See thin client.
● TFTP
See Trivial File Transfer Pr....
● thin client
A terminal with lower processing power than a Thick Client that processes the
virtual desktop protocol, serves as the client of the remote desktop, and
provides an access method for users.
● Trivial File Transfer Protocol
A type of FTP that does not require a user name and password and is used for
automatic downloading.
B.5 U-Z
U
● Unified Virtualization Platform
Virtual management software that divides each computing resource into
multiple VM resources.
● UVP
See Unified Virtualization P....
● UVP Black Box
A component that collects and stores kernel logs and diagnosis information
provided by the diagnosis tool before the physical machine where the UVP
(that is, domain 0) is installed crashes. After the system crashes, the logs and
information are exported for analysis.
V
● VBD
virtual block device
● VFS
See virtual file system.
● VIF
See virtual interface (VM NI....
● virtual disk
A file in the host file system. For a customer operating system, it functions as
a physical disk drive. The file can be configured on the host or a remote file
system. After configuring a VM with a virtual disk, you can install a new
operating system to the disk file without having to repartition a physical disk
or restart the host. Virtual disks on the VMware Workstation can be mapped
to the partitions on the host.
● virtual file system
A system that provides a versatile object-oriented interface for all file systems
in the integrated file system.
● virtual interface (VM NIC)
An entity with an IP address that processes service data in a virtual device. In
the virtual system, it is identified as vif.
● virtual local area network
An end-to-end logical network across different network segments and
networks, constructed using the network management software based on the
switching LAN. Network resources and users are logically divided based on a
certain principle and a physical LAN is logically divided into multiple
broadcasting domains (VLANs). The hosts on a VLAN can directly
communicate with each other whereas different VLANs cannot. This
efficiently suppresses broadcasting packets.
● virtual machine
One or multiple computer systems virtualized from a physical server.
● VM IP address
An IP address assigned to a VM, unlike the IP address assigned to a physical
machine. The VM can communicate with other devices on the network
through the IP address.
● virtual memory
Virtualized memory for a VM allocated based on the physical memory. Even if
the memory is not physically contiguous, it is contiguous for the VM. The VM
can randomly save and obtain data in its virtual memory without affecting
the memory accessibility of other VMs on the same physical machine.
● Virtual NIC
An NIC for VMs, unlike an NIC for a physical machine. Multiple virtual
network cards can be created for a single VM. The virtual network card can
connect to the physical network card in bridge mode for data transmission.
● Virtual Private Server
The service for leasing servers to enterprises.
● virtual server
A device on which the operating system and applications run based on
various virtualization technologies, unlike the original physical server. When
using certain resources of the physical server, the virtual server is the same as
the physical server for users. Both partitions and VMs are considered virtual
servers.
● Virtual Software Switch
A device that is deployed on a computing node and performs the virtual
network switching function for the VMs on the node.
● virtual storage
A technology used to uniformly manage multiple storage devices to provide
storage systems featuring customized capacity, high reliability, and high I/O
performance for users.
● virtual switch
A software program created on a physical server to implement data switching
between VMs on the same or different servers.
● virtualization technology
A technology that enables a single physical server to operate multiple
independent virtual OSs.
● VLAN
See virtual local area netwo....
● VM
See virtual machine.
● VM high availability
A feature that enables the O&M system to continuously monitor all physical
hosts and automatically migrate all VMs off a faulty host.
● VM migration
A technology used to migrate VMs to another hardware resource for VM
operations.
● VM specifications
A set of predefined VM attributes for creating VMs with unified specifications.
● VM template
A template used to create VMs that have the same specifications. A template
is a VM in essence. A VM and a VM template can convert to each other as
required. After a VM is converted to a template, only its isTemplate field is
changed to true.
● volume
The logical storage volume of a VM, which can either be system volume or
user volume.
● VPS
See Virtual Private Server.
● VSS
See Virtual Software Switch.
● VT
Y
● Yast
A central management and installation tool in SUSE Linux.