WilliamLam.com

  • About
    • About
    • Privacy
  • VMware Cloud Foundation
  • VKS
  • Homelab
    • Resources
    • Nested Virtualization
  • VMware Nostalgia
  • Apple
You are here: Home / Uncategorized / Why is Promiscuous Mode & Forged Transmits required for Nested ESXi?

Why is Promiscuous Mode & Forged Transmits required for Nested ESXi?

11.19.2013 by William Lam // 28 Comments

Many of us who run Nested ESXi in our home labs for development/testing purposes are pretty familiar with the requirements to properly setup a Nested ESXi environment such as CPUs supporting both Intel-VT+EPT or AMD-V+RVI and enabling both Promiscuous Mode and Forged Transmits on the portgroup that your Nested ESXi VM is connected to. Though these requirements have become second nature to most of us, it may not always be obvious on why they are required, especially for new users of Nested ESXi.

UPDATE 09/01/2014 - Take a look at this article for an updated solution to the problem mentioned below.

I specifically wanted to focus on the networking requirements where both Promiscuous Mode and Forged Transmits are required to be enabled. At a high level, most of us have understood this as a prerequisite for proper network connectivity for the Nested Virtual Machines running inside of your Nested ESXi host, but why is that?

Promiscuous Mode:
Both VMware VSS (Virtual Standard Switch) and VDS (vSphere Distributed Switch) do not implement MAC Learning like a traditional network switch, since the vSphere platform already knows which MAC addresses are assigned to a particular Virtual Machine. This means that the virtual switch will only forward network packets to a Virtual Machine if the destination MAC Address matches the ESXi vmnic's (pNIC) MAC Address.

In a Nested ESXi environment where you can have Nested Virtual Machines, the destination MAC Address for network packets destined to those Virtual Machines will differ from the Nested ESXi vmnic's MAC Address. Due to this, the physical ESXi host's virtual switch will drop the packet if Promiscuous Mode is not enabled. Promiscuous Mode allows the underlying Nested ESXi VM vmnic to monitor all traffic of the virtual switch it is connected to and thus providing connectivity to the underlying Nested Virtual Machines.

An interesting observation was recently made by Anthony Spiteri with his article about Reduced Network Throughput with Promiscuous Mode PortGroups. Since Promiscuous Mode allows all traffic from the virtual switch to be visible on the configured portgroup, there is definitely going to be some amount of overhead when enabling this setting. If you drive a large amount of network traffic for your regular Virtual Machines, you may want to consider separating out your Nested ESXi environment.

Forged Transmits:
Chris Wahl has already written an excellent article on Forged Transmits and its implication with Nested ESXi. I highly recommend you check out this blog post for the details.

Additional Resources:

  • How to enable Nested ESXi using VXLAN
  • Having Difficulties Enabling Nested ESXi in vSphere?

More from my site

  • New VMware Fling to improve Network/CPU performance when using Promiscuous Mode for Nested ESXi
  • Native MAC Learning in vSphere 6.7 removes the need for Promiscuous mode for Nested ESXi
  • Virtual NVMe and Nested ESXi 6.5?
  • Nested ESXi Enhancements in vSphere 6.5
  • VM serial logging to the rescue for capturing Nested ESXi PSOD

Categories // Uncategorized Tags // distributed virtual switch, forged transmit, nested, nested virtualization, promiscuous mode, virtual switch

Comments

  1. *protectedJim Snyder says

    11/20/2013 at 11:50 pm

    Great information and quite timely for me. Article caught my eye immediately. Thanks.

    Reply
  2. *protectedRalf Groß says

    11/22/2013 at 12:34 pm

    I've just setup a new nested environment. I didn't want to enable promiscous mode on the production portgroups so I added 3 new vESXi portgroups for Mgmt/vMotion/Guests on the dvSwitch of the hosts the vESXi will be running on. Will this prevent the probleme of the reduced network performance?

    Reply
  3. *protectedUri Simchoni says

    04/24/2014 at 9:17 am

    Thanks!
    The bit about VSS/vDS not doing mac learning was the missing piece for me to make sense of all of this.

    Reply
  4. *protectedharnor6 says

    06/22/2014 at 7:00 pm

    If you have a two-level nested environment, make sure you only have one NIC enabled at the first level. I found that by even using a standby adapter, packets got duplicated at this level despite that the second vmnic was in standby mode. By removing the standby adapter, the duplication of packets disappeared. This was tested with ESX 5.1.

    The reason for this may be related to the promiscuous mode on the physical level. With two adapters enabled at the first nested level, any packet arriving on nic1 will be forwarded to nic2 - despite that this adapter is listed as standby in the host of vESX-level1.

    By the way, thanks to Lam for this great reference !

    Reply
  5. *protectedakacletus says

    08/05/2014 at 6:33 pm

    From a related conversation with VMW engineers on this topic: "By default when you install ESX and create the initial VMkernel interface for management traffic the MAC address of the management NIC takes the on the MAC address of the lowest ordered physical NIC of the host. In other words the management interface MAC and physical MAC are the same. You can apply this technique to any nested vVM. That is to say that you create a portgroup that has a single uplink via the underlying vESX host. You change the MAC address of the vVM to match that of of the vESX hosts’ uplink on the associated portgroup that the VM is connected to. By doing this, you are essentially faking the vVM into looking like the vESX hosts’ “physical” NIC so traffic will be sent to the VM.

    Expanding on this technique, if you nest an L3 device within a vESX host and assign one of its NICs MAC address to be the same as the underlying vESX host then you can redirect all vVM traffic to this L3 device, out the vESX host and onto the network. In this case the L3 device serves to learn the MAC addresses of the vVMs.

    Another technique would involve using NSX to create vxlan backed networks across vESX hosts and then use L2 bridging to get the traffic back onto unnested L2 segment."

    Reply
  6. *protectedSamsonite801 says

    10/15/2016 at 9:07 pm

    I have 8 virtual ESXi hosts nested (for lab use), 4 VMs are on a 4-host physical VSAN cluster, and the other 4 VMs are on a 2-node physical VSAN cluster (w/ witness VM).

    All of the 8 virtual ESXi hosts are network attached to an NSX (VxLAN vDS portgroup), and I was having the above issue described in this article. From a Windows VM 'jump server' connected to this same VxLAN portgroup I could ping the ESXi management VMK, but not a second VMK I created, nor could I get to any VMs running on the virtual host.

    I had tried enabling Promiscuous mode on the virtual ESXi host switches (had been going off memory where I thought I read about the requirement to turn that on), but that didn't help of course.

    I later figured out that it had to be something in the 'NSX' network but then found this article and realized that you make the above setting changes on the physical cluster, not the nested cluster (Duh, hehe).

    So it was 'kind of' in the NSX but not really. I simply had to go into the VxLAN (NSX-created vDS portgroup) in vCenter, and enable promiscuous mode, and forged transmits only on the one portgroup and then the pings came right up.

    THANKS

    Reply

Trackbacks

  1. Network configuration for nested ESXi 5.5 in vSphere 5.5 | Piszki Lab | EN says:
    03/21/2014 at 11:31 pm

    […] set the "promiscuous mode" and "Forget transmit" to "Accept", here is thoroughly explained why. If you want to, and certainly we want to use VLANs inside nested ESXi, […]

    Reply
  2. VIRTUALIZATION IS LIFE!VMware Fling: ESXi Mac Learning dvFilter - VIRTUALIZATION IS LIFE! says:
    09/08/2014 at 12:15 pm

    […] http://www.virtuallyghetto.com/2013/11/why-is-promiscuous-mode-forged.html […]

    Reply
  3. Nested ESXi in vCloud Air – Routed Edition ← Grok the Cloud says:
    04/30/2015 at 3:18 am

    […] lab in vCloud Air. There was one well documented limitation of using vCloud Air, the fact that Promiscuous Mode & Forge Transmits was not enabled. Just recently there was an excellent article posted that described how to setup […]

    Reply
  4. New VMware Fling to improve Network/CPU performance when using Promiscuous Mode for Nested ESXi | virtuallyGhetto says:
    08/20/2015 at 12:56 am

    […] wrote an article awhile back Why is Promiscuous Mode & Forged Transmits required for Nested ESXi? and the primary motivation behind the article was in regards to an observation a customer made […]

    Reply
  5. Lab 13 – Modifying a Virtual Machine | nmitnetjournaljmp says:
    11/09/2015 at 12:14 am

    […] configured the network settings for my Windows Server virtual machines correctly. I checked out one of the links on the assessment schedule and found that I had not enabled Promiscuous Mode or Forged Transmits on […]

    Reply
  6. Nested Virtualization Resources | virtuallyGhetto says:
    12/15/2015 at 9:08 am

    […] Why is Promiscuous Mode & Forged Transmits required for Nested ESXi? […]

    Reply
  7. Nested virtualization. Виртуальный ЦОД VMWare или ESXi 5.5 на ESXi 5.5. Часть 1. | Sergey Seregin's Blog says:
    08/17/2016 at 4:29 am

    […] Почему достаточно подробно описано в этой статье http://www.virtuallyghetto.com/2013/11/why-is-promiscuous-mode-forged.html/ Сразу хочу сказать, что если вы собираетесь […]

    Reply
  8. Configurando o ESXi Nested no VMware vSphere 6 - Solutions4Crowds says:
    10/02/2016 at 3:05 pm

    […] saber mais sobre estes dois modos, leia o artigo Why is Promiscuous Mode & Forged Transmits required for Nested ESXi? (excelente […]

    Reply
  9. Set up a SW iSCSI adapter on ESXi – Just Fucking Google It Already says:
    04/28/2017 at 2:49 am

    […] http://www.virtuallyghetto.com/2013/11/why-is-promiscuous-mode-forged.html […]

    Reply
  10. Configurando o Hyper-V Nested no VMware vSphere 6 - Solutions4Crowds says:
    05/15/2017 at 11:09 am

    […] saber mais sobre estes dois modos, leia o artigo Why is Promiscuous Mode & Forged Transmits required for Nested ESXi? (excelente […]

    Reply
  11. Môj domáci VMware LAB – part #2 – konfigurácia, datastores a nESXi – PSGuy.eu says:
    01/06/2018 at 11:36 am

    […] aby sme mohli plnohodnotne využívať vnorenú virtualizáciu. Viac informácií získate v článku Williama […]

    Reply
  12. 在vCloud Director中建立二層虛擬化環境 – Samuel's Lab says:
    07/16/2018 at 1:09 am

    […] 若是想了解這兩個模式的詳細說明可以參考以下網址 Why is Promiscuous Mode & Forged Transmits required for Nested ESXi? […]

    Reply
  13. OpenStack Networking : Network Concepts – Oshari-Tech says:
    02/06/2019 at 5:14 am

    […]  https://www.williamlam.com/2013/11/why-is-promiscuous-mode-forged.html  […]

    Reply
  14. VMware vs Hyper-V Nested Virtualization - Virtualization Howto says:
    04/22/2019 at 1:33 pm

    […] Why is promiscuous mode & forged transmits required for nested ESXi? […]

    Reply
  15. VMware NSX Lab on ESXi – VCP6-NV Part2 – Cloud Networking and Automation says:
    04/11/2020 at 11:54 pm

    […] answer is HERE – Promiscuous Mode & Forged Transmits are required to be enabled on the dSwitch ! Makes […]

    Reply
  16. PERMITINDO TRÁFEGOS BRIDGES NO VSWITCH - VMWARE | BFnetworks says:
    05/29/2020 at 2:26 pm

    […] Why is Promiscuous Mode & Forged Transmits required for Nested ESXi? […]

    Reply
  17. Server Bug Fix: ARP response is not present on the other port of linux bridge based on ubuntu 13.10 - TECHPRPR says:
    06/19/2020 at 1:57 am

    […] https://www.williamlam.com/2013/11/why-is-promiscuous-mode-forged.html […]

    Reply
  18. Подготовка шаблона vApp тестовой среды VMware vCenter + ESXi | INFOS.BY says:
    02/25/2021 at 3:56 am

    […] Убедитесь, что в нашей локальной сети на уровне vCenter облачного провайдера переключены в состоянии Accept политики Promiscuous mode и Forged transmits. Иначе не будет связи между сетью виртуального дата-центра и сетью внутри подготавливаемого шаблона. Здесь об этом ра&#1089…. […]

    Reply
  19. NSX-T : Section & Promiscuous mode (et Terraform) says:
    12/04/2021 at 8:02 am

    […] VMware Esxi Nested […]

    Reply
  20. NSX-T : Segment & Promiscuous mode (et Terraform) - My VM World says:
    12/08/2021 at 5:53 am

    […] VMware Esxi Nested […]

    Reply
  21. Nested ESXi 7 interoperability with ESXi 6.7 - vCloud Vision says:
    06/17/2022 at 3:55 am

    […] did contain the MAC address of the gateway. Now I know when hosting nested VMs you need to either enable Promiscuous Mode and Forged Transmits or configure the MAC Learning feature that was shipped with vSphere 6.7 and onwards. But the […]

    Reply
  22. Refresher on Nested ESXi Networking Requirements says:
    05/17/2023 at 1:26 pm

    […] Transmit OR MAC Learning on the virtual switch of your the physical ESXi host. See this blog post HERE for the reason why this is needed and this blog post HERE to understand the performance impact to […]

    Reply

Leave a Reply to Nested ESXi in vCloud Air – Routed Edition ← Grok the CloudCancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search

Thank Author

Author

William is Distinguished Platform Engineering Architect in the VMware Cloud Foundation (VCF) Division at Broadcom. His primary focus is helping customers and partners build, run and operate a modern Private Cloud using the VMware Cloud Foundation (VCF) platform.

Connect

  • Bluesky
  • Email
  • GitHub
  • LinkedIn
  • Mastodon
  • Reddit
  • RSS
  • Twitter
  • Vimeo

Recent

  • Programmatically accessing the Broadcom Compatibility Guide (BCG) 05/06/2025
  • Quick Tip - Validating Broadcom Download Token  05/01/2025
  • Supported chipsets for the USB Network Native Driver for ESXi Fling 04/23/2025
  • vCenter Identity Federation with Authelia 04/16/2025
  • vCenter Server Identity Federation with Kanidm 04/10/2025

Advertisment

Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy

Copyright WilliamLam.com © 2025