Networking

Loopback Adapter Installation on Windows Server 2012

How do I install the loopback adapter in Windows Server 2012?

While there is a tendency for vendors to assume that we are always connected to a network or the Internet, there are occasions when network connectivity is not available but we’d still like to use an application that requires an IP address. One example is Hyper-V, which when used without a network connection has limited functionality if there is no IP address available on the host.

Install Loopback Adapter

Microsoft’s loopback adapter can be installed to provide a virtual network connection and IP address. Here’s how you do it.

  • Logon to Windows Server 2012 as a local administrator.
  • Right-click the far bottom left of the Taskbar, over the Start charm when it appears, and select Device Manager from the menu.
  • In the Device Manager window, right-click the server name and select Add legacy hardware from the menu.
  • Click Next on the welcome screen of the Add Hardware Wizard.
  • Select Install the hardware that I manually select from a list (Advanced) and click Next.
  • Under Common hardware types, scroll down the menu, select Network adapters and click Next.
  • On the Select Network Adapter screen, select Microsoft from the list of manufacturers.
  • Select Microsoft KM-TEST Loopback Adapter from the list of network adapters on the right and click Next.

Loopback Adapter Installation

  • Click Next again to confirm that you want to install the loopback adapter.
  • Click Finish once the installation has completed.

Configure Loopback Adapter

Now that the loopback adapter is installed on the server, you can configure it via the Network and Sharing Center.

Sponsored Content

What is “Inside Microsoft Teams”?

“Inside Microsoft Teams” is a webcast series, now in Season 4 for IT pros hosted by Microsoft Product Manager, Stephen Rose. Stephen & his guests comprised of customers, partners, and real-world experts share best practices of planning, deploying, adopting, managing, and securing Teams. You can watch any episode at your convenience, find resources, blogs, reviews of accessories certified for Teams, bonus clips, and information regarding upcoming live broadcasts. Our next episode, “Polaris Inc., and Microsoft Teams- Reinventing how we work and play” will be airing on Oct. 28th from 10-11am PST.

  • Right-click the network icon in the bottom right corner of the desktop Taskbar and select Open Network and Sharing Center from the menu.
  • In the Network and Sharing Center window, click Change adapter settings.
  • In the Network Connections window, right-click the Microsoft KM-Test Loopback Adapter and select Properties from the menu.
  • On the Networking tab, select Internet Protocol Version 4 (TCP/IPv4) and click Properties.
  • In the Properties dialog on the General tab, configure IP address network and DNS settings as required and click OK.
  • Close the adapter’s Properties dialog.

Related Topics:

IT consultant, Contributing Editor @PetriFeed, and trainer @Pluralsight. All about Microsoft, Office 365, Azure, and Windows Server.
External Sharing and Guest User Access in Microsoft 365 and Teams

This eBook will dive into policy considerations you need to make when creating and managing guest user access to your Teams network, as well as the different layers of guest access and the common challenges that accompany a more complicated Microsoft 365 infrastructure.

You will learn:

  • Who should be allowed to be invited as a guest?
  • What type of guests should be able to access files in SharePoint and OneDrive?
  • How should guests be offboarded?
  • How should you determine who has access to sensitive information in your environment?

Sponsored by:

 
Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: