01-17-2018 10:52 AM - edited 03-08-2019 01:27 PM
Can VMs on server connected to a routed port talk to VMs tagged with VLAN (same exact subnet as VMs on routed port that are not tagged) on server connected to trunk port?
Basically, I can easily build SVIs and have them all ping the associated sub-interface on the router or each other all throughout the LAN. I CAN't however ping the routed interface that is in the same subnet nor ping any of the VMs (still same subnet) from any other device in the LAN. The routed port is on a switch module on the 3800 series router. Assuming all my configs are right (once again SVIs can all ping each other excluding the routed port) would this ever be possible? Doesn't the VMs all in the same subnet all need to be tagged with the same VLAN?
Solved! Go to Solution.
01-18-2018 05:35 AM - edited 01-18-2018 05:36 AM
Hello,
I've never tried that before, however from theoretical point of view it could work. If you configure a port as routed port and then assign a NIC on ESXi host to VM network without any tag. Then you create a VM in this VM network and assign an IP address form the same subnet as routed port. Default gateway should be an IP address on a switch of this routed port.
As it is said before it is not a best practice from VMware point of view: port in general should be either an access or trunk port.
However with small or particular environments such setup could take place.
01-17-2018 12:19 PM
01-17-2018 01:39 PM
01-18-2018 05:17 AM
01-18-2018 05:35 AM - edited 01-18-2018 05:36 AM
Hello,
I've never tried that before, however from theoretical point of view it could work. If you configure a port as routed port and then assign a NIC on ESXi host to VM network without any tag. Then you create a VM in this VM network and assign an IP address form the same subnet as routed port. Default gateway should be an IP address on a switch of this routed port.
As it is said before it is not a best practice from VMware point of view: port in general should be either an access or trunk port.
However with small or particular environments such setup could take place.
01-25-2018 08:09 AM
01-25-2018 09:17 AM
01-25-2018 11:57 PM - edited 01-25-2018 11:59 PM
Hello,
It is hugely depending on your network setup and what you want to achieve. If you want this VLAN not to be propagated on Layer 2 than VACL. If you are OK with broadcast and Multicast traffic to be sent inside of a LAN from that VLAN than ACL.
If you want a complete isolation of this VLAN inside of a LAN than do not define SVI on a switch. Just create a VLAN, assign necessary ports and tag this VLAN on ESXi end for VMs. Then you will need to figure out how to route a traffic within a LAN for this VMs of course, but from security point of view - it is a most robust method to separate traffic.
01-26-2018 06:54 AM
02-05-2018 02:52 AM
Hello,
Well, I am a bit confused. Please provide a network diagram to understand you situation and what you are trying to achieve.
02-05-2018 02:05 PM
Sorry I know I am making it more confusing. See attachment I made real quick. All connections are trunks and not pruned.
It is basically just a VM hosts on same subnet however one group of hosts is tagged and other isn't. I am used to making configs for hosts by tagging everything or nothing at all - the normal way I would say. I plan on having all VM hosts tagged, as well as VLANs with the SVIs but wanted to know if it would work without tagging everything - it does not right now.
02-12-2018 02:19 AM - edited 02-12-2018 02:19 AM
Hello,
You can't have two interfaces on a router in the same subnet. If you want to have a complete isolation of VM traffic, please use separate subnet and do not expose it to Router or Switch as SVI or routed port. Just a VLAN.
However, as I said, then you will need to figure out how to access this VMs. In general such scenario is often used for testing purposes.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide