<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Virtual switching between VMs in NFVIS Solutions</title>
    <link>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311066#M35</link>
    <description>&lt;P&gt;David,&lt;/P&gt;
&lt;P&gt;From my point of view, the architecture assume that each vSwitch acts independently, representing a separate L2 domain inside the hypervisor. If 2 vSwitches need to communicate, this typically happen through a Vm or a virtual router that has interfaces connected to both vSwitches, effectively routing or bridging trafic between them.&lt;/P&gt;
&lt;P&gt;A key design principle is that vSwitches are optimized to ensure VM isolation and security within the virtual environment.&lt;/P&gt;</description>
    <pubDate>Fri, 18 Jul 2025 11:37:54 GMT</pubDate>
    <dc:creator>M02@rt37</dc:creator>
    <dc:date>2025-07-18T11:37:54Z</dc:date>
    <item>
      <title>Virtual switching between VMs</title>
      <link>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311058#M34</link>
      <description>&lt;P&gt;Hello, everyone.&lt;/P&gt;
&lt;P&gt;I have a quick question. I understand that inside our virtualized environment, we can run a virtual switch between our VMs. Some hypervisors come with pre-built switches and we can also deploy our own Cisco products (I think vNexus was one of them?) inside the hypervisor and configure like we would on a real hardware switch.&lt;/P&gt;
&lt;P&gt;My book states the following:&lt;/P&gt;
&lt;P&gt;&lt;EM&gt;Multiple vSwitches can be created under a virtualized server, but network traffic&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;cannot flow directly from one vSwitch to another vSwitch within the same host, and the&lt;/EM&gt;&lt;BR /&gt;&lt;EM&gt;vSwitches cannot share the same pNIC.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Mitrixsen_0-1752835647184.png" style="width: 999px;"&gt;&lt;img src="https://community.cisco.com/t5/image/serverpage/image-id/248570iEC8180E96C9C423A/image-size/large?v=v2&amp;amp;px=999" role="button" title="Mitrixsen_0-1752835647184.png" alt="Mitrixsen_0-1752835647184.png" /&gt;&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;Credit:&amp;nbsp;CCNP and CCIE Enterprise Core ENCOR 350-401 Official Cert Guide page 832&lt;/P&gt;
&lt;P&gt;Why do these restrictions exist? Why cannot we connect say vSW1 to vSW2 and why cannot these switches share the same pNIC?&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Why is it all implemented this way? I understand that vSwitches might forward traffic a bit differently than normal switches?&lt;/P&gt;
&lt;P&gt;Thank you&lt;BR /&gt;David&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2025 10:51:07 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311058#M34</guid>
      <dc:creator>Mitrixsen</dc:creator>
      <dc:date>2025-07-18T10:51:07Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual switching between VMs</title>
      <link>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311066#M35</link>
      <description>&lt;P&gt;David,&lt;/P&gt;
&lt;P&gt;From my point of view, the architecture assume that each vSwitch acts independently, representing a separate L2 domain inside the hypervisor. If 2 vSwitches need to communicate, this typically happen through a Vm or a virtual router that has interfaces connected to both vSwitches, effectively routing or bridging trafic between them.&lt;/P&gt;
&lt;P&gt;A key design principle is that vSwitches are optimized to ensure VM isolation and security within the virtual environment.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2025 11:37:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311066#M35</guid>
      <dc:creator>M02@rt37</dc:creator>
      <dc:date>2025-07-18T11:37:54Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual switching between VMs</title>
      <link>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311068#M36</link>
      <description>&lt;P&gt;Book mention one vendor VM and one type of virtual Switch&amp;nbsp;&lt;/P&gt;
&lt;P&gt;There are other vendor and different types of virtual switch without this limitations&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://www.techtarget.com/searchitoperations/definition/virtual-switch" target="_blank"&gt;https://www.techtarget.com/searchitoperations/definition/virtual-switch&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;MHM&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2025 11:46:57 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311068#M36</guid>
      <dc:creator>MHM Cisco World</dc:creator>
      <dc:date>2025-07-18T11:46:57Z</dc:date>
    </item>
    <item>
      <title>Re: Virtual switching between VMs</title>
      <link>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311077#M37</link>
      <description>&lt;P&gt;Trying to keep this simple, a vswitch cannot connect directly to one another within the same host, as they are meant for vm to hardware network connection, not internal virtual networking. By doing this it is enforcing a correct traffic flow and help keep security boundaries. The second thing is tey cannot share the same physical network, this helps isolation and seperation between networks.&amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you keep these two things in mind, both the&amp;nbsp;restrictions exist because a vswitch are just simplified network to our standard hardware/physical switches, and are optimizations for specific traffic patterns and hypervisor integration.&amp;nbsp;If your requires are to have inter vswitch communication, the design is to route traffic through your physical network infrastructure, as teh diagram shows.&lt;/P&gt;
&lt;P&gt;Hope this helps.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 18 Jul 2025 12:25:55 GMT</pubDate>
      <guid>https://community.cisco.com/t5/nfvis-solutions/virtual-switching-between-vms/m-p/5311077#M37</guid>
      <dc:creator>bigevilbeard</dc:creator>
      <dc:date>2025-07-18T12:25:55Z</dc:date>
    </item>
  </channel>
</rss>

