O'Reilly logo

Hyper-V Security by Andy Syrewicze, Eric Siron

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using the virtual switch's isolating technologies

The Hyper-V virtual switch provides a number of features you can use to isolate traffic. Before diving into specific features, we'll discuss its basic switching capability. The virtual switch parses the Ethernet header, just like a typical physical switch. It knows only to deliver frames to the MAC address that they are bound for. This means that one virtual machine isn't going to be able to snoop traffic meant for another port without compromising the Hyper-V configuration.

There are a number of other techniques that Hyper-V's switch uses to enable isolation.

Multiple switch types

Most virtual switches will use an external virtual switch. This bonds to a physical network adapter or a team of adapters, ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required