After a physical to virtual (P2V) conversion of a machine, you cannot assign an IP address to a NIC, the ip address which used in physical is existing.
What we do is uninstall the physical adapter and driver in the vm.
- Right-click the My Computer desktop icon and choose Properties.
- Click the Advanced tab and select Environment Variables.
- In the System variables section, click New.
- Set the Variable name to devmgr_show_nonpresent_devices and set the Variable value to 1 to enable the parameter.
- Click OK to add the variable to Windows.
- Start the Device Manager by running this command from the same command prompt:
start devmgmt.msc
- Click View > Show Hidden Devices.
- Expand the Network Adapters tree (click the plus sign next to the Network adapters entry).
- Right-click the dimmed network adapter, then click Uninstall.
- Once all of the grayed out NICs are uninstalled, assign the IP address to the virtual NIC.
detail ref.: http://kb.vmware.com/selfservice/microsites/search.do?language=en_US&cmd=displayKC&externalId=1179
Basic on named default setting, here just highlight the additional option/setting for security issue. FYI :-)
option {
......
......
version "invisible dns version"; //Hide the dns version
minimal-responses yes; //For detail, see https://www.isc.org/software/bind/advisories/cve-2012-5166
allow-recursion {192.168.1.0/24;}; // or you can set recursion no
allow-transfer {none;}; //For master, allow slave dns to get the record
allow-notify {192.168.1.135;}; //For slave, allow master dns to update the record
};
logging {
channel default_log {
file "data/named.run";
severity dynamic;
print-time yes;
};
channel audit_log {
file "/var/log/named/audit_log";
severity debug;
print-time yes;
};
channel queries_log {
file "/var/log/named/queries.log"
severity dynamic;
print-time yes; };
category default {default_log;};
category general {default_log;};
category security {audit_log;};
category config {audit_log;};
category notify {audit_log;};
category queries {queries_log;};
};
view inner {
match-client {192.168.1.0/24;};
zone mydomain.com {
......
allow-transfer {192.168.1.246;}; //For master, allow slave dns to get the record
};
zone localhost {
......
allow-update {none;};
};
}; //inner
view outer { match-client {any;};
zone mydomain.com {
......
};
}; //outer