{"id":1734,"date":"2025-12-01T19:26:53","date_gmt":"2025-12-02T01:26:53","guid":{"rendered":"https:\/\/zewwy.ca\/?p=1734"},"modified":"2025-12-23T20:31:03","modified_gmt":"2025-12-24T02:31:03","slug":"hyper-v-networking","status":"publish","type":"post","link":"https:\/\/zewwy.ca\/index.php\/2025\/12\/01\/hyper-v-networking\/","title":{"rendered":"Hyper-V Networking"},"content":{"rendered":"<p>Install Hyper-V, and let&#8217;s learn it&#8217;s Networking<\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Hyper-V_Networking\"><\/span>Hyper-V Networking<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>On VMware, when you install the OS (ESXi) on the hardware in the DCUI you simply set the VLAN tag right on the network interface you configure, and bind it to a physical NIC in the menu area, simple.<\/p>\n<div class=\"min-h-[calc(100dvh-60px-var(--chat-details-container-height)-var(--composer-container-height)-(2*var(--layout-offset-y)))] sm:min-h-[calc(100dvh-120px-var(--composer-container-height)-(2*var(--layout-offset-y)))] flex flex-col\" data-testid=\"highlighted-chats\">\n<div tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" data-content=\"ai-message\" aria-labelledby=\"EQ3VZKxebA1B7woxqStUv-author EQ3VZKxebA1B7woxqStUv-content-0\">\n<div class=\"space-y-3 mt-3\">\n<div id=\"EQ3VZKxebA1B7woxqStUv-content-0\">\n<p>We leave the network connected to a non tagged, internet allowed connection. Now we can configure our networks.<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"1_Create_one_external_switch\"><\/span>1. Create one external switch<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Bind it to your physical NIC (configured as a trunk on the upstream switch).<\/li>\n<li>Check \u201cAllow management OS to share this network adapter\u201d once \u2014 this creates the first host vNIC.<\/li>\n<\/ul>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"2_Add_more_host_vNICs_via_PowerShell\"><\/span>2. Add more host vNICs via PowerShell:<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div>\n<div class=\"rounded-b-xl bg-background-static-850 px-4 pb-1.5 dark:bg-background-static-900\">\n<pre><code># Add another vNIC for the host bound to the same external switch\r\nAdd-VMNetworkAdapter -ManagementOS -Name \"HostVLAN20\" -SwitchName \"ExternalSwitch\"\r\nSet-VMNetworkAdapterVlan -ManagementOS -VMNetworkAdapterName \"HostVLAN20\" -Access -VlanID 6<\/code><\/pre>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"3_Verify_in_Windows\"><\/span>3. Verify in Windows<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>You\u2019ll now see multiple <strong>vEthernet adapters<\/strong> in the host OS (e.g., \u201cvEthernet (HostVLAN20)\u201d, \u201cvEthernet (HostVLAN30)\u201d).<\/li>\n<li>Assign IP addresses or enable DHCP as needed.<\/li>\n<\/ul>\n<p>*Note* this is for doing it on a single network server (for my lab use) usually you&#8217;d have dedicated NICs for other networks designated on those servers&#8230; anyway.. where was I&#8230; right now that we got additional network on the server we can work on a shared storage, you know how I like my iSCSI.<\/p>\n<div id=\"A6UYPnGq9fv6ZkxBoozvo-user-message\" tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" aria-labelledby=\"A6UYPnGq9fv6ZkxBoozvo-user-message\">\n<div>\n<div>\n<div data-content=\"user-message\">\n<div>So, when I setup Hyper-V, and connect a VM to the &#8220;default&#8221; virtual switch, the Hyper-V server acts as a DHCP provider and NATs the connections from that vSwitch to whatever other network the host is connected to?<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" data-content=\"ai-message\" aria-labelledby=\"UBiuKp41CRTjgo1SLrFAa-author UBiuKp41CRTjgo1SLrFAa-content-0\">\n<div><\/div>\n<div class=\"space-y-3 mt-3\">\n<div id=\"UBiuKp41CRTjgo1SLrFAa-content-0\">\n<p>Great question \u2014 this trips up a lot of people when they first use Hyper\u2011V! Let\u2019s break it down clearly:<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"%F0%9F%96%A7_Hyper%E2%80%91V_Default_Switch_Behavior\"><\/span>\ud83d\udda7 Hyper\u2011V Default Switch Behavior<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>Introduced in Windows 10 (1709)<\/strong>: The &#8220;Default Switch&#8221; is automatically created by Hyper\u2011V and cannot be deleted or modified.<\/li>\n<li><strong>NAT (Network Address Translation)<\/strong>: Yes \u2014 the host machine provides NAT services. This means your VM\u2019s traffic is translated and routed through the host\u2019s network connection, regardless of whether that\u2019s Wi\u2011Fi, Ethernet, or even VPN.<\/li>\n<li><strong>DHCP Services<\/strong>: The host also runs a lightweight DHCP service for the Default Switch. This is what hands out IP addresses to your VMs automatically (usually in the <code>172.16.x.x<\/code> range).<\/li>\n<li><strong>Connectivity<\/strong>: VMs connected to the Default Switch can reach the internet and other devices on the host\u2019s network, but inbound connections from the LAN to the VM are limited. It\u2019s designed for convenience, not for complex networking setups.<\/li>\n<\/ul>\n<h3 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"%E2%9A%96%EF%B8%8F_Comparison_with_Other_Switch_Types\"><\/span>\u2696\ufe0f Comparison with Other Switch Types<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<div>\n<div>\n<table>\n<thead>\n<tr>\n<th>Switch Type<\/th>\n<th>Provides DHCP?<\/th>\n<th>Provides NAT?<\/th>\n<th>Use Case<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td><strong>Default Switch<\/strong><\/td>\n<td>\u2705 Yes (host DHCP)<\/td>\n<td>\u2705 Yes (host NAT)<\/td>\n<td>Quick setup, internet access without config<\/td>\n<\/tr>\n<tr>\n<td><strong>External Switch<\/strong><\/td>\n<td>\u274c No (relies on external network DHCP)<\/td>\n<td>\u274c No<\/td>\n<td>VM directly on physical network, full LAN visibility<\/td>\n<\/tr>\n<tr>\n<td><strong>Internal Switch<\/strong><\/td>\n<td>\u274c No<\/td>\n<td>\u274c No<\/td>\n<td>Communication between host and VMs only<\/td>\n<\/tr>\n<tr>\n<td><strong>Private Switch<\/strong><\/td>\n<td>\u274c No<\/td>\n<td>\u274c No<\/td>\n<td>Communication between VMs only<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div><\/div>\n<\/div>\n<p>\u2705 So to answer directly:<\/p>\n<p>Yes \u2014 when you connect a VM to the <strong>Default Switch<\/strong>, Hyper\u2011V\u2019s host <strong>acts as a DHCP provider<\/strong> and <strong>NATs the VM\u2019s traffic<\/strong> to whatever network the host is connected to. It\u2019s essentially a convenience bridge so you don\u2019t have to manually configure networking.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"xYj7RYvrQzx1xTpzzg6cE-user-message\" class=\"space-y-1\" tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" aria-labelledby=\"xYj7RYvrQzx1xTpzzg6cE-user-message\">\n<div>\n<div class=\"flex flex-col gap-1\">\n<div data-content=\"user-message\">\n<div>&#8220;That&#8217;s what I did configured a external virtual switch so the hosts NIC would be VLAN tagged in a certain network, I was figuring the default switch would act more like a &#8230; well switch at layer2 of the hosts Nic, so VMs on it would get DHCP from the main network, as if it was connected to a switch in the base network, not layer3 and then 4 NAT like c&#8217;mon&#8230;&#8221;<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" data-content=\"ai-message\" aria-labelledby=\"AtA16zaecYXdCEFA9yx64-author AtA16zaecYXdCEFA9yx64-content-0\">\n<div><\/div>\n<div class=\"space-y-3 mt-3\">\n<div id=\"AtA16zaecYXdCEFA9yx64-content-0\">\n<p>Exactly \u2014 you\u2019ve nailed the distinction. The <strong>Default Switch<\/strong> in Hyper\u2011V is deliberately <em>not<\/em> a true Layer\u20112 bridge to your host NIC. It\u2019s a convenience construct that Microsoft built to \u201cjust work\u201d for internet access without requiring you to mess with VLANs, external switches, or DHCP servers on your LAN.<\/p>\n<p>Here\u2019s the breakdown:<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"%F0%9F%94%8C_Why_the_Default_Switch_behaves_like_NAT\"><\/span>\ud83d\udd0c Why the Default Switch behaves like NAT<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>It\u2019s implemented using <strong>Windows Internet Connection Sharing (ICS)<\/strong> under the hood.<\/li>\n<li>ICS is a Layer\u20113 service: it provides a private subnet (usually <code>172.16.0.0\/12<\/code>), runs a DHCP service, and NATs traffic out through whatever adapter the host is using.<\/li>\n<li>That\u2019s why VMs on the Default Switch don\u2019t see your LAN\u2019s DHCP server \u2014 they only see the host\u2019s mini DHCP\/NAT service.<\/li>\n<li>It\u2019s intentionally isolated so you don\u2019t accidentally expose VMs directly to your corporate or home LAN without realizing it.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\u2696\ufe0f Why it\u2019s not Layer\u20112 bridging<\/p>\n<ul>\n<li>A true Layer\u20112 bridge would forward broadcasts (like DHCP Discover) from the VM to your LAN. That\u2019s what an <strong>External Virtual Switch<\/strong> does.<\/li>\n<li>The Default Switch instead terminates those broadcasts at the host and answers them itself. That\u2019s why you only ever get the host\u2011provided DHCP.<\/li>\n<li>VLAN tagging, trunking, or other advanced networking features aren\u2019t supported on the Default Switch \u2014 it\u2019s locked down.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\u2705 When to use each<\/p>\n<ul>\n<li><strong>Default Switch (NAT + DHCP)<\/strong>: Quick internet access, testing, dev boxes, laptops where you don\u2019t want to reconfigure NICs.<\/li>\n<li><strong>External Switch (Layer\u20112 bridge)<\/strong>: When you want VMs to behave like physical machines on your LAN, get DHCP from the real network, or use VLAN tagging.<\/li>\n<li><strong>Internal\/Private Switches<\/strong>: For host\u2011VM communication or VM\u2011VM only networks.<\/li>\n<\/ul>\n<div><\/div>\n<p>So your expectation \u2014 that the Default Switch would act like a transparent Layer\u20112 bridge \u2014 makes sense, but Microsoft intentionally designed it as a Layer\u20113 NAT gateway instead. If you want \u201creal switch\u201d behavior, the <strong>External Switch<\/strong> is the only way to go.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"KxNzX3t1p4VuVFTaemzVS-user-message\" class=\"space-y-1\" tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" aria-labelledby=\"KxNzX3t1p4VuVFTaemzVS-user-message\">\n<div>\n<div class=\"flex flex-col gap-1\">\n<div data-content=\"user-message\">\n<div>&#8220;So, whatever my host machine is allowed to do, the guest VMs in the default switch are also allowed to do? like access the internet, and the firewall that gave the host the ability to access the internet would never see the private NATed IP address the Hyper-V host is dishing out to those VMs?&#8221;<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" data-content=\"ai-message\" aria-labelledby=\"u9S543PNHGsL9QX1uQrhX-author u9S543PNHGsL9QX1uQrhX-content-0\">\n<div><\/div>\n<div class=\"space-y-3 mt-3\">\n<div id=\"u9S543PNHGsL9QX1uQrhX-content-0\">\n<p>You\u2019ve got it \u2014 that\u2019s exactly how the <strong>Default Switch<\/strong> works in Hyper\u2011V. Let me spell it out clearly:<\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"%F0%9F%8C%90_How_traffic_flows_with_the_Default_Switch\"><\/span>\ud83c\udf10 How traffic flows with the Default Switch<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>VMs get private IPs<\/strong>: Each VM connected to the Default Switch is assigned an IP from the host\u2019s internal DHCP service (usually <code>172.16.x.x<\/code>).<\/li>\n<li><strong>Host does NAT<\/strong>: The Hyper\u2011V host translates those private IPs into its own IP before sending traffic out to the physical network.<\/li>\n<li><strong>Firewall visibility<\/strong>: From the perspective of your upstream firewall or router, all traffic from those VMs looks like it\u2019s coming from the host\u2019s IP. The firewall never sees the VM\u2019s private NATed addresses.<\/li>\n<li><strong>Permissions<\/strong>: Whatever the host is allowed to do (e.g., access the internet, reach certain networks), the VMs can also do \u2014 because their traffic is piggybacking on the host\u2019s connection.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\u2696\ufe0f Important implications<\/p>\n<ul>\n<li><strong>Outbound access<\/strong>: VMs can reach the internet or LAN resources as long as the host can. They inherit the host\u2019s connectivity.<\/li>\n<li><strong>Inbound access<\/strong>: External devices cannot directly initiate connections to those VMs, because NAT blocks unsolicited inbound traffic unless you set up port forwarding (which the Default Switch doesn\u2019t expose for configuration).<\/li>\n<li><strong>Firewall rules<\/strong>: The upstream firewall only enforces rules against the host\u2019s IP. If you need per\u2011VM visibility or control, you\u2019ll need an <strong>External Switch<\/strong> so each VM gets its own LAN IP.<\/li>\n<\/ul>\n<div><\/div>\n<p>\u2705 So yes: the Default Switch makes your VMs \u201cride along\u201d with the host\u2019s network permissions. They\u2019re hidden behind NAT, which is why your firewall only ever sees the host\u2019s traffic.<\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"Additional_Information\"><\/span>Additional Information<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>If you want to apply a VLAN tag to a physical NIC that&#8217;s not a Hyper-V host on Windows:<\/p>\n<p>Since I didn&#8217;t see anything in the usual Network\u00a0 IPv4 configuration window in Windows. I decided to see how useful this AI stuff is.. so I asked it&#8230;<\/p>\n<div>\n<div id=\"yWx18A8Pn5CuNmVxQ7yMG-user-message\" tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" aria-labelledby=\"yWx18A8Pn5CuNmVxQ7yMG-user-message\">\n<div class=\"flex flex-col gap-1\">\n<div data-content=\"user-message\">\n<div>\n<div id=\"yWx18A8Pn5CuNmVxQ7yMG-user-message\" tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" aria-labelledby=\"yWx18A8Pn5CuNmVxQ7yMG-user-message\">\n<div>\n<div class=\"flex flex-col gap-1\">\n<div data-content=\"user-message\">\n<div>&#8220;how do I VLAN tag the IP on windows 11 interface?&#8221;<\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" data-content=\"ai-message\" aria-labelledby=\"V3ooejud6Au2bKSxsZVkn-author V3ooejud6Au2bKSxsZVkn-content-0\">\n<div class=\"space-y-3 mt-3\">\n<div id=\"V3ooejud6Au2bKSxsZVkn-content-0\">\n<p><strong>Quick Answer:<\/strong> On Windows 11, VLAN tagging isn\u2019t enabled by default. You need a NIC that supports IEEE 802.1Q VLAN tagging, then configure the VLAN ID either through the NIC\u2019s <strong>Device Manager properties<\/strong> (Advanced tab \u2192 VLAN ID) or by using <strong>Intel PROSet\/ANS tools<\/strong> or <strong>PowerShell (<\/strong><code>Set-NetAdapter -VlanID<\/code><strong>)<\/strong> if your driver supports it.<\/p>\n<div class=\"relative pb-6 w-full after:border-b after:border-stroke-300 after:w-full after:absolute after:mt-3\"><\/div>\n<h2><span class=\"ez-toc-section\" id=\"%F0%9F%96%A5%EF%B8%8F_Steps_to_Configure_VLAN_Tagging_on_Windows_11\"><\/span>\ud83d\udda5\ufe0f Steps to Configure VLAN Tagging on Windows 11<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: center;\">1. Check NIC Compatibility<\/p>\n<ul>\n<li>VLAN tagging requires a <strong>network card (NIC) that supports IEEE 802.1Q<\/strong>.<\/li>\n<li>Not all NICs expose VLAN options in Windows. Intel and Broadcom NICs often support it, but you may need vendor-specific drivers.<\/li>\n<\/ul>\n<p class=\"text-base-strong sm:text-lg-strong pb-1 [&amp;:not(:first-child)]:pt-3.5\" style=\"text-align: center;\">2. Configure via Device Manager<\/p>\n<ul>\n<li>Press <strong>Win + R<\/strong>, type <code>devmgmt.msc<\/code>, and hit Enter.<\/li>\n<li>Expand <strong>Network adapters<\/strong>, right-click your NIC \u2192 <strong>Properties<\/strong>.<\/li>\n<li>Go to the <strong>Advanced<\/strong> tab.<\/li>\n<li>Look for <strong>VLAN ID<\/strong> or <strong>Priority &amp; VLAN<\/strong>.<\/li>\n<li>Enter the VLAN ID (e.g., <code>100<\/code>) and click OK.<\/li>\n<\/ul>\n<p class=\"text-base-strong sm:text-lg-strong pb-1 [&amp;:not(:first-child)]:pt-3.5\" style=\"text-align: center;\">3. Configure via Intel PROSet\/ANS (if supported)<\/p>\n<ul>\n<li>Install <strong>Intel PROSet\/Advanced Network Services (ANS)<\/strong>.<\/li>\n<li>In the NIC properties, Intel\u2019s tab allows creating <strong>multiple VLAN interfaces<\/strong> with different IDs.<\/li>\n<li>Each VLAN interface can then be assigned its own IP address.<\/li>\n<\/ul>\n<p class=\"text-base-strong sm:text-lg-strong pb-1 [&amp;:not(:first-child)]:pt-3.5\" style=\"text-align: center;\">4. Configure via PowerShell<\/p>\n<ul>\n<li>Open PowerShell as Administrator.<\/li>\n<li>Run:\n<div>\n<div class=\"rounded-b-xl bg-background-static-850 px-4 pb-1.5 dark:bg-background-static-900\">\n<div>\n<pre><code>Set-NetAdapter -Name \"Ethernet\" -VlanID 100\r\n<\/code><\/pre>\n<\/div>\n<\/div>\n<\/div>\n<\/li>\n<li>Replace <code>\"Ethernet\"<\/code> with your adapter name and <code>100<\/code> with your VLAN ID.<\/li>\n<li>Note: This only works if your NIC driver supports VLAN tagging. Otherwise, you\u2019ll get an error like <em>\u201cRequested operation not supported on adapter\u201d<\/em>.<\/li>\n<\/ul>\n<p class=\"text-base-strong sm:text-lg-strong pb-1 [&amp;:not(:first-child)]:pt-3.5\" style=\"text-align: center;\">5. Assign IP Address<\/p>\n<ul>\n<li>Once VLAN tagging is enabled, go to <strong>Network &amp; Internet settings<\/strong> \u2192 <strong>Change adapter options<\/strong>.<\/li>\n<li>Right-click the VLAN-enabled adapter \u2192 <strong>Properties<\/strong> \u2192 <strong>Internet Protocol Version 4 (TCP\/IPv4)<\/strong>.<\/li>\n<li>Assign the IP address, subnet mask, and gateway for that VLAN.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\u26a0\ufe0f Important Notes<\/p>\n<ul>\n<li><strong>Driver Support is Key:<\/strong> If your NIC driver doesn\u2019t expose VLAN options, you cannot tag VLANs directly in Windows without Hyper-V or third-party tools.<\/li>\n<li class=\"ps-2\"><strong>Hyper-V Alternative:<\/strong> You can create VLAN-tagged virtual NICs using Hyper-V\u2019s Virtual Switch Manager if your hardware doesn\u2019t support native tagging.<\/li>\n<li class=\"ps-2\"><strong>Testing:<\/strong> Use <code>ping<\/code> or <code>tracert<\/code> to verify connectivity once VLAN tagging is applied.<\/li>\n<\/ul>\n<div><\/div>\n<p>\u2705 <strong>Bottom Line:<\/strong> To VLAN tag an IP on Windows 11, you must enable VLAN tagging on the NIC (via Device Manager, Intel PROSet\/ANS, or PowerShell if supported), then assign the IP to that VLAN interface. If your NIC doesn\u2019t support VLAN tagging, you\u2019ll need Hyper-V or vendor-specific utilities.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<div id=\"rTMPPoTHCgT4jnTFB4Cdq-user-message\" class=\"space-y-1\" tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" aria-labelledby=\"rTMPPoTHCgT4jnTFB4Cdq-user-message\">\n<div>\n<div class=\"flex flex-col gap-1\">\n<div data-content=\"user-message\">\n<div>My response &#8220;I&#8217;ve got an intle 82579LM Gig NIC, I see it says VLAN enabled in the advanced tab, but I don&#8217;t see an area to configure it, I&#8217;m sure the NIC supports it since I was using ESXi with vlan tagging just fine.&#8221;<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" data-content=\"ai-message\" aria-labelledby=\"MbFca5zCmzoPsPgoHLbKv-author MbFca5zCmzoPsPgoHLbKv-content-0\">\n<div><\/div>\n<div class=\"space-y-3 mt-3\">\n<div id=\"MbFca5zCmzoPsPgoHLbKv-content-0\">\n<p>That\u2019s a great observation \u2014 the Intel 82579LM definitely supports VLAN tagging at the hardware level, but here\u2019s the catch: <strong>Windows drivers for that NIC don\u2019t expose VLAN configuration in the same way ESXi or Linux does.<\/strong><\/p>\n<h2 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"%F0%9F%94%8E_Why_You_Dont_See_VLAN_Config_in_Windows\"><\/span>\ud83d\udd0e Why You Don\u2019t See VLAN Config in Windows<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>The <strong>Advanced tab<\/strong> in Device Manager shows \u201cPriority &amp; VLAN\u201d or \u201cVLAN Enabled,\u201d but that option only toggles whether the NIC can process VLAN-tagged frames.<\/li>\n<li>Unlike ESXi, Windows doesn\u2019t let you directly assign VLAN IDs to a physical NIC unless the driver provides a <strong>VLAN interface creation utility<\/strong> (like Intel PROSet\/ANS).<\/li>\n<li>For the 82579LM, Intel stopped including VLAN configuration in their Windows drivers after Windows 8\/10. On Windows 11, the driver exposes VLAN capability but <strong>no UI to configure VLAN IDs<\/strong>.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">\u2705 Workarounds<\/p>\n<p>Here are the practical options:<\/p>\n<p style=\"text-align: center;\">1. <strong>Intel PROSet\/ANS (if available)<\/strong><\/p>\n<ul>\n<li>Older Intel drivers came with <strong>Advanced Network Services (ANS)<\/strong>, which let you create VLAN sub-interfaces.<\/li>\n<li>On Windows 11, Intel no longer bundles ANS with drivers for the 82579LM, so you won\u2019t see the VLAN tab.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">2. <strong>PowerShell Command<\/strong><\/p>\n<ul>\n<li>Windows has a <code>Set-NetAdapter -VlanID<\/code> cmdlet, but it only works if the NIC driver supports VLAN tagging through the OS.<\/li>\n<li>On the 82579LM with current Windows 11 drivers, this usually fails with <em>\u201cRequested operation not supported\u201d<\/em>.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">3. <strong>Hyper-V Virtual Switch<\/strong><\/p>\n<ul>\n<li>If you enable Hyper-V, you can create a <strong>virtual NIC<\/strong> and assign VLAN IDs there.<\/li>\n<li>This is the most reliable way to do VLAN tagging on Windows when the physical NIC driver doesn\u2019t expose VLAN config.<\/li>\n<\/ul>\n<p style=\"text-align: center;\">4. <strong>Third-Party NIC Utilities<\/strong><\/p>\n<ul>\n<li>Some OEMs (Dell, HP) ship custom drivers\/utilities that re-enable VLAN tagging. If your system vendor has one, that\u2019s worth checking.<\/li>\n<\/ul>\n<div><\/div>\n<p style=\"text-align: center;\">\u26a0\ufe0f Bottom Line<\/p>\n<p>Your Intel 82579LM <strong>can tag VLANs<\/strong>, but on Windows 11 the Intel driver doesn\u2019t expose VLAN configuration. That\u2019s why you don\u2019t see a place to set the VLAN ID.<\/p>\n<ul>\n<li>On ESXi\/Linux \u2192 VLAN tagging works natively.<\/li>\n<li>On Windows \u2192 You need Intel PROSet\/ANS (no longer supported for this NIC), Hyper-V, or vendor-specific drivers.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"min-h-[calc(100dvh-60px-var(--chat-details-container-height)-var(--composer-container-height)-(2*var(--layout-offset-y)))] sm:min-h-[calc(100dvh-120px-var(--composer-container-height)-(2*var(--layout-offset-y)))] flex flex-col\" data-testid=\"highlighted-chats\">\n<div tabindex=\"0\" role=\"article\" data-tabster=\"{&quot;groupper&quot;:{&quot;tabbability&quot;:2},&quot;focusable&quot;:{}}\" data-content=\"ai-message\" aria-labelledby=\"EQ3VZKxebA1B7woxqStUv-author EQ3VZKxebA1B7woxqStUv-content-0\">\n<div class=\"space-y-3 mt-3\">\n<div id=\"EQ3VZKxebA1B7woxqStUv-content-0\">\n<p>Well ok I guess once we install Hyper-V hopefully it&#8217;ll be more like ESXi in a sense and we can tag.<\/p>\n<h1 style=\"text-align: center;\"><span class=\"ez-toc-section\" id=\"UPDATE_ExternalSwitch_WiFi_NIC\"><\/span>*UPDATE* ExternalSwitch, WiFi NIC<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>I was trying to use a Hyper-V server with an External Switch, bound to a WiFi NIC. and was getting unexpected results based on the above information. but my results were NOT as I had expected, I was assuming Default Switch behavior. You may be asking, &#8220;Why would you expect that behavior if you&#8217;re creating an External Switch?&#8221;\u00a0 Now, if you read my Wireless ESXi host blog, you probably are well aware of the VLAN limitations of WiFi, and can never truly be used as a trunk port (Limitation of the 802 standard, not of OS or software).<\/p>\n<p>So how could a ExternalSwitch work, via WiFi if the layer 2 broadcast doesn&#8217;t work and can&#8217;t &#8220;speak&#8221; with the rest of the layer 2 stack? Yet I create a VM and it DOES get a DHCP lease address from my local subent?! What the heck is going on here&#8230;<\/p>\n<p>So I had to ask AI, what was going on here, it says, yeah&#8230; that&#8217;s expected&#8230; here&#8217;s the deets&#8230; get ready.. it&#8217;s a long one&#8230;.<\/p>\n<\/div>\n<p>BAH-LETED, there was way tooooo much BS from the AI response to justify keeping this data in here&#8230; long story short&#8230; Local subnet VMs work fine (it does ARP Masquerading), VLANs will never work per the usual BS I&#8217;ve talked about in my Wireless ESXi host blog.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Install Hyper-V, and let&#8217;s learn it&#8217;s Networking Hyper-V Networking On VMware, when you install the OS (ESXi) on the hardware in the DCUI you simply set the VLAN tag right on the network interface you configure, and bind it to a physical NIC in the menu area, simple. We leave the network connected to a &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/zewwy.ca\/index.php\/2025\/12\/01\/hyper-v-networking\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Hyper-V Networking&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","footnotes":""},"categories":[5,6,8],"tags":[489,485,490,491],"class_list":["post-1734","post","type-post","status-publish","format-standard","hentry","category-hypervisors","category-networking","category-server-administration","tag-complex","tag-hyper-v","tag-networking","tag-pita"],"_links":{"self":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/comments?post=1734"}],"version-history":[{"count":6,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1734\/revisions"}],"predecessor-version":[{"id":1761,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/posts\/1734\/revisions\/1761"}],"wp:attachment":[{"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/media?parent=1734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/categories?post=1734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/zewwy.ca\/index.php\/wp-json\/wp\/v2\/tags?post=1734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}