For this tutorial, we used 6 virtual machines running Windows 10 that we placed on the same host.
These 6 virtual machines use an IP address "10.0.0.2x" and a name "win10-vm-x" where "x" corresponds to the number of the VM concerned.
Important : It is important that these virtual machines are on the same host for private VLANs (PVLANs) to work as expected (regardless of your physical hardware).
Indeed, this allows you to use only the virtual network available on your host (and more precisely the "Host proxy switch" implemented from the configuration of your vDS).
Otherwise, you will need a switch that supports private VLANs (PVLANs).
For example, the "Cisco Catalyst 3750" switch: Catalyst 3750 Switch Software Configuration Guide, 12.2(25)SEE - Chapter: Configuring Private VLANs.
To test network connectivity within each private VLAN (PVLAN) and between private VLANs (PVLANs), place at least 2 virtual machines per private VLAN.
In our case, we will connect:
To begin, modify the settings of the 1st VM.
Click on the port group to which its network adapter is connected and click: Browse.
In the "Select Network" list that appears, you will see the existing port groups on your virtual distributed switch(es) (vDS). Including, the new port groups "vDS_PVLAN_xxx_..." that you have just created to use your new private VLANs.
For VM 1 and 2, select the "vDS_PVLAN_101_Promiscuous" port group so that they are connected to your private VLAN in "Promiscuous" mode (VLAN ID: 101), then click OK.
Then click: OK.
For VMs 3 and 4, select "vDS_PVLAN_102_Isolated".
For VMs 5 and 6, select "vDS_PVLAN_103_Community".
Once your virtual machines are configured, select each distributed port group and go to the “VM” tab.
You should get this.
To demonstrate how the different modes of private VLANs (PVLANs) work, we will attempt to ping the virtual machine present in the same private VLAN as the source virtual machine, as well as virtual machines connected to other types of private VLANs.
To begin with, you can see that VM 1 (IP: 10.0.0.21) can communicate with VM 2 (IP: 10.0.0.22) which is in the same private VLAN in "Promiscuous" mode.
Since the virtual machine is in a private VLAN in "Promiscuous" mode, it can also communicate with other virtual machines that are in other private VLANs.
In this case, it can communicate with VMs 3 and 4 which are in the private VLAN in "Isolated" mode and it can also communicate with VMs 5 and 6 which are in the private VLAN in "Community" mode.
As expected, VM 3 which is in a private VLAN in "Isolated" mode cannot communicate with virtual machine 4 despite being in the same private VLAN in "Isolated" mode.
This VM 3 also cannot communicate with virtual machines 5 and 6 located in a private VLAN in "Community" mode.
On the other hand, VM 3 can communicate with virtual machines located in a private VLAN in “Promiscuous” mode.
Indeed, all virtual machines in a private VLAN in "Promiscuous" mode can communicate with all virtual machines in your private VLANs.
As expected, VM 5 can communicate with VM 6 which is in the same private VLAN in "Community" mode.
It can also communicate with virtual machines located in a private VLAN in "Promiscuous" mode.
As explained previously, virtual machines connected to a private VLAN in "Promiscuous" mode can communicate with any virtual machine connected to one of your private VLANs (regardless of the private VLAN mode used).
On the other hand, VM 5 and VM 6 cannot communicate with virtual machines located in a private VLAN in "Isolated" mode.
Indeed, virtual machines connected to a VLAN in "Isolated" mode are only accessible from virtual machines connected to a private VLAN in "Promiscuous" mode.
Finally, be aware that by default, without configuring the physical switch where your VMware ESXi host is connected, none of the virtual machines connected to private VLANs will have access to the physical network and the Internet.
Indeed, even your physical switch (default gateway) will not be reachable by your virtual machine.
VMware 12/9/2022
VMware 2/14/2024
VMware 3/15/2024
VMware 7/17/2024
Pinned content
Contact
® InformatiWeb-Pro.net - InformatiWeb.net 2008-2022 - © Lionel Eppe - All rights reserved.
Total or partial reproduction of this site is prohibited and constitutes an infringement punishable by articles L.335-2 and following of the intellectual property Code.
No comment