VMware Cloud Community
AdamLowe
Contributor
Contributor

networking issue

Hey guys,

I've got ESX 4 set up and am p2v'ing serveral servers that are in different subnets. When i go into the VM, i put in the ip 10.0.x.x. The esx host is on a 10.10.x.x subnet. The network port on the switch is fully open to accept any VLAN. So that is not an issue. When i go into the VM, i cannot access the internet or network. Anyone have any ideas of what the problem could be?

Also, has VMware came out with a vsphere client that will work on windows 7?

Thanks!

0 Kudos
13 Replies
gary1012
Expert
Expert

When you say you put the VM into 10.0.x.x, is that IP on the VM, the port group on the vswitch, or both?

Community Supported, Community Rewarded - Please consider marking questions answered and awarding points to the correct post. It helps us all.
0 Kudos
AdamLowe
Contributor
Contributor

Yes, that is the IP of the VM itself.

0 Kudos
gary1012
Expert
Expert

OK, you'll need to create a new port group(s) with a VLAN tag(s) to get to the appropriate networks. Go to Host and Cluster --> Configuration Tab --> Networking --> Properties --> Add --> VM Networking and then add in the port group properties. Also, you should consider separating the Service Console away from the virtual machines and vMotion if possible onto separate vSwitches. This is a security best practice. You'll need additional pNICs to host the separate vSwitches.

Community Supported, Community Rewarded - Please consider marking questions answered and awarding points to the correct post. It helps us all.
0 Kudos
AdamLowe
Contributor
Contributor

I'm on Configuration > Networking > i see the Virtual Switch: vSwitch0 and the VM's listed underneathe it. If i hit properties on that one i see the VM Network. If i click Add, i see Virtual Machine (Add a labeled network to handle virtual machine network traffic) and VMKernel and Service Console. Can you clarify it a little?

Thanks!

0 Kudos
swisst
Contributor
Contributor

the ip address you need to give to your VMs should be on the same subnet as the "observed" VM network....your VMkernel has access to the 10.10.0.0 255.255.0.0, if you were to put your vms in this same subnet you should be up and running.

if you wish to organise your network config you could use the third octet 10.10._1_.X to allow this.....

0 Kudos
AdamLowe
Contributor
Contributor

swisst, I agree with you on that. But unfortunately, i can't re-ip them right now. I will be doing that in the future, but i have a couple of different subnets that need to go on this box. We are trying to consolidate these and then we will re-ip everything to be on the 10.10.x.x subnet.

0 Kudos
swisst
Contributor
Contributor

ah ok, got ya.

you would need to implement a couple of new pNICs that are physically attached to the required subnets, upon these you will need to create new vSwitches and connect your guests to these.

I think you should be able to change your IP addresses on the P2V'd guests if you booted them into Safe mode.

0 Kudos
AdamLowe
Contributor
Contributor

Yeah, i could change them, but that will require alot of DNS changes that we can't make at the moment.

0 Kudos
gary1012
Expert
Expert

Adam, the only network that can be seen will be the native VLAN on that vSwitch. There isn't a way for the the VLAN tag assignment to occur now unless you're using the OS to perform that action (usually Linux only). If you setup a separate port group and add the VLAN ID to that port group, you should be able to get your 10.0.x.x VMs to see the appropriate VLAN. Once you setup the VLAN IDs on new port groups, you'll need to change the VMs network label to match the correct port group.

Community Supported, Community Rewarded - Please consider marking questions answered and awarding points to the correct post. It helps us all.
0 Kudos
swisst
Contributor
Contributor

If the pNIC has been specifically allocated a certain VLAN on the pSwitch then there's not a lot you can do with VLAN tagging.

You may be able get your friendly neighbouhood network chap to reconfigure your pSwtich port to create a trunk port.

Basically this would leave the port open to allow VLAN tagging within the esx port group to indicate which network you wish to access...

you could in theory then add several port groups with different VLAN tags to the same pNIC.

...to be fair I haven't seen this working and when I asked my network chap he started shaking his head whilst stroking his chin, he added in theory it should work but it removed someof the controls that he had put in place.

I must admit I am with him.

one pSwitch port = one VLAN....

0 Kudos
gary1012
Expert
Expert

It appears that the configuration is trunked based on what was mentioned eariler. "The network port on the switch is fully open to accept any VLAN." If this is the case, then the multiple VLANs are traversing over vmnic0 as illustrated in previously attached jpg. Since this is a trunked connection and not an access port, VLAN assignment must occur somewhere (OS or vSwitch). If I had to guess, the vast majority of implementations are using VLAN tagging on the vSwitch as the mechanism to assign VMs to specific networks on a trunked port. I personally have 21 VLANs (aka Port Groups) traversing two pNICs into a single vSwitch.

Community Supported, Community Rewarded - Please consider marking questions answered and awarding points to the correct post. It helps us all.
0 Kudos
Texiwill
Leadership
Leadership

Hello,

I am with your network guy and at the same time not. Your network guy things the pSwitch is the edge switch in his network and quite frankly it is not, there is a vSwitch that is the real edge switch.

The network team should be able to see, manipulate and manage those edge switches. If you use the Nexus 1000V you would get this capability, but with the regular VMware vSwitch the virtualization admin needs to give the networking folks the controls to do what is necessary.

So now you have to work with the network folks to allow you to do VST, else you may have some serious cabling issues. In the case mentioned, you would need 21 network ports to support a 1 to 1 mapping between pNIC/VLAN. This is just not optimal.

Instead I would say the pNIC is used to distinguish the difference between 'security' zones not VLANs themselves. Unless you are also using VLANs as a security mechanism (which they are not).


Best regards,
Edward L. Haletky VMware Communities User Moderator, VMware vExpert 2009

Virtualization Practice Analyst[/url]
Now Available: 'VMware vSphere(TM) and Virtual Infrastructure Security'[/url]
Also available 'VMWare ESX Server in the Enterprise'[/url]
[url=http://www.astroarch.com/wiki/index.php/Blog_Roll]SearchVMware Pro[/url]|Blue Gears[/url]|Top Virtualization Security Links[/url]|
[url=http://www.astroarch.com/wiki/index.php/Virtualization_Security_Round_Table_Podcast]Virtualization Security Round Table Podcast[/url]

--
Edward L. Haletky
vExpert XIV: 2009-2023,
VMTN Community Moderator
vSphere Upgrade Saga: https://www.astroarch.com/blogs
GitHub Repo: https://github.com/Texiwill
0 Kudos
swisst
Contributor
Contributor

hey Adam,

I got an answer for your second, somewhat forgotten about, question....

I think it's answered on these boards somewhere but I found that this post listed below really helpful when I was having problems...

0 Kudos