1 | <?xml version="1.0" encoding="UTF-8"?>
|
---|
2 | <!DOCTYPE chapter PUBLIC "-//OASIS//DTD DocBook XML V4.4//EN"
|
---|
3 | "http://www.oasis-open.org/docbook/xml/4.4/docbookx.dtd">
|
---|
4 | <chapter id="networkingdetails">
|
---|
5 | <title>Virtual networking</title>
|
---|
6 |
|
---|
7 | <para>As briefly mentioned in <xref linkend="settings-network" />,
|
---|
8 | VirtualBox provides up to eight virtual PCI Ethernet cards for each virtual
|
---|
9 | machine. For each such card, you can individually select<orderedlist>
|
---|
10 | <listitem>
|
---|
11 | <para>the hardware that will be virtualized as well as</para>
|
---|
12 | </listitem>
|
---|
13 |
|
---|
14 | <listitem>
|
---|
15 | <para>the virtualization mode that the virtual card will be operating
|
---|
16 | in with respect to your physical networking hardware on the
|
---|
17 | host.</para>
|
---|
18 | </listitem>
|
---|
19 | </orderedlist></para>
|
---|
20 |
|
---|
21 | <para>Four of the network cards can be configured in the "Network" section
|
---|
22 | of the settings dialog in the graphical user interface of VirtualBox. You
|
---|
23 | can configure all eight network cards on the command line via VBoxManage
|
---|
24 | modifyvm; see <xref linkend="vboxmanage-modifyvm" />.</para>
|
---|
25 |
|
---|
26 | <para>This chapter explains the various networking settings in more
|
---|
27 | detail.</para>
|
---|
28 |
|
---|
29 | <sect1 id="nichardware">
|
---|
30 | <title>Virtual networking hardware</title>
|
---|
31 |
|
---|
32 | <para>For each card, you can individually select what kind of
|
---|
33 | <emphasis>hardware</emphasis> will be presented to the virtual machine.
|
---|
34 | VirtualBox can virtualize the following six types of networking
|
---|
35 | hardware:<itemizedlist>
|
---|
36 | <listitem>
|
---|
37 | <para>AMD PCNet PCI II (Am79C970A);</para>
|
---|
38 | </listitem>
|
---|
39 |
|
---|
40 | <listitem>
|
---|
41 | <para>AMD PCNet FAST III (Am79C973, the default);</para>
|
---|
42 | </listitem>
|
---|
43 |
|
---|
44 | <listitem>
|
---|
45 | <para>Intel PRO/1000 MT Desktop (82540EM);</para>
|
---|
46 | </listitem>
|
---|
47 |
|
---|
48 | <listitem>
|
---|
49 | <para>Intel PRO/1000 T Server (82543GC);</para>
|
---|
50 | </listitem>
|
---|
51 |
|
---|
52 | <listitem>
|
---|
53 | <para>Intel PRO/1000 MT Server (82545EM);</para>
|
---|
54 | </listitem>
|
---|
55 |
|
---|
56 | <listitem>
|
---|
57 | <para>Paravirtualized network adapter (virtio-net).</para>
|
---|
58 | </listitem>
|
---|
59 | </itemizedlist></para>
|
---|
60 |
|
---|
61 | <para>The PCNet FAST III is the default because it is supported by nearly
|
---|
62 | all operating systems out of the box, as well as the GNU GRUB boot
|
---|
63 | manager. As an exception, the Intel PRO/1000 family adapters are chosen
|
---|
64 | for some guest operating system types that no longer ship with drivers for
|
---|
65 | the PCNet card, such as Windows Vista.</para>
|
---|
66 |
|
---|
67 | <para>The Intel PRO/1000 MT Desktop type works with Windows Vista and
|
---|
68 | later versions. The T Server variant of the Intel PRO/1000 card is
|
---|
69 | recognized by Windows XP guests without additional driver installation.
|
---|
70 | The MT Server variant facilitates OVF imports from other platforms.</para>
|
---|
71 |
|
---|
72 | <para>The <emphasis role="bold">"Paravirtualized network adapter
|
---|
73 | (virtio-net)"</emphasis> is special. If you select this, then VirtualBox
|
---|
74 | does <emphasis>not</emphasis> virtualize common networking hardware (that
|
---|
75 | is supported by common guest operating systems out of the box). Instead,
|
---|
76 | VirtualBox then expects a special software interface for virtualized
|
---|
77 | environments to be provided by the guest, thus avoiding the complexity of
|
---|
78 | emulating networking hardware and improving network performance. Starting
|
---|
79 | with version 3.1, VirtualBox provides support for the industry-standard
|
---|
80 | "virtio" networking drivers, which are part of the open-source KVM
|
---|
81 | project.</para>
|
---|
82 |
|
---|
83 | <para>The "virtio" networking drivers are available for the following
|
---|
84 | guest operating systems:</para>
|
---|
85 |
|
---|
86 | <para><itemizedlist>
|
---|
87 | <listitem>
|
---|
88 | <para>Linux kernels version 2.6.25 or later can be configured to
|
---|
89 | provide virtio support; some distributions also back-ported virtio
|
---|
90 | to older kernels.</para>
|
---|
91 | </listitem>
|
---|
92 |
|
---|
93 | <listitem>
|
---|
94 | <para>For Windows 2000, XP and Vista, virtio drivers can be
|
---|
95 | downloaded and installed from the KVM project web page.<footnote>
|
---|
96 | <para><ulink
|
---|
97 | url="http://www.linux-kvm.org/page/WindowsGuestDrivers">http://www.linux-kvm.org/page/WindowsGuestDrivers</ulink>.</para>
|
---|
98 | </footnote></para>
|
---|
99 | </listitem>
|
---|
100 | </itemizedlist></para>
|
---|
101 |
|
---|
102 | <para>VirtualBox also has limited support for so-called <emphasis
|
---|
103 | role="bold">jumbo frames</emphasis>, i.e. networking packets with more
|
---|
104 | than 1500 bytes of data, provided that you use the Intel card
|
---|
105 | virtualization and bridged networking. In other words, jumbo frames are
|
---|
106 | not supported with the AMD networking devices; in those cases, jumbo
|
---|
107 | packets will silently be dropped for both the transmit and the receive
|
---|
108 | direction. Guest operating systems trying to use this feature will observe
|
---|
109 | this as a packet loss, which may lead to unexpected application behavior
|
---|
110 | in the guest. This does not cause problems with guest operating systems in
|
---|
111 | their default configuration, as jumbo frames need to be explicitly
|
---|
112 | enabled.</para>
|
---|
113 | </sect1>
|
---|
114 |
|
---|
115 | <sect1 id="networkingmodes">
|
---|
116 | <title>Introduction to networking modes</title>
|
---|
117 |
|
---|
118 | <para>Each of the eight networking adapters can be separately configured
|
---|
119 | to operate in one of the following modes:<glosslist>
|
---|
120 | <glossentry>
|
---|
121 | <glossterm>Not attached</glossterm>
|
---|
122 |
|
---|
123 | <glossdef>
|
---|
124 | <para>In this mode, VirtualBox reports to the guest that a network
|
---|
125 | card is present, but that there is no connection -- as if no
|
---|
126 | Ethernet cable was plugged into the card. This way it is possible
|
---|
127 | to "pull" the virtual Ethernet cable and disrupt the connection,
|
---|
128 | which can be useful to inform a guest operating system that no
|
---|
129 | network connection is available and enforce a
|
---|
130 | reconfiguration.</para>
|
---|
131 | </glossdef>
|
---|
132 | </glossentry>
|
---|
133 |
|
---|
134 | <glossentry>
|
---|
135 | <glossterm>Network Address Translation (NAT)</glossterm>
|
---|
136 |
|
---|
137 | <glossdef>
|
---|
138 | <para>If all you want is to browse the Web, download files and
|
---|
139 | view e-mail inside the guest, then this default mode should be
|
---|
140 | sufficient for you, and you can safely skip the rest of this
|
---|
141 | section. Please note that there are certain limitations when using
|
---|
142 | Windows file sharing (see <xref linkend="nat-limitations" /> for
|
---|
143 | details).</para>
|
---|
144 | </glossdef>
|
---|
145 | </glossentry>
|
---|
146 |
|
---|
147 | <glossentry>
|
---|
148 | <glossterm>Bridged networking</glossterm>
|
---|
149 |
|
---|
150 | <glossdef>
|
---|
151 | <para>This is for more advanced networking needs such as network
|
---|
152 | simulations and running servers in a guest. When enabled,
|
---|
153 | VirtualBox connects to one of your installed network cards and
|
---|
154 | exchanges network packets directly, circumventing your host
|
---|
155 | operating system's network stack.</para>
|
---|
156 | </glossdef>
|
---|
157 | </glossentry>
|
---|
158 |
|
---|
159 | <glossentry>
|
---|
160 | <glossterm>Internal networking</glossterm>
|
---|
161 |
|
---|
162 | <glossdef>
|
---|
163 | <para>This can be used to create a different kind of
|
---|
164 | software-based network which is visible to selected virtual
|
---|
165 | machines, but not to applications running on the host or to the
|
---|
166 | outside world.</para>
|
---|
167 | </glossdef>
|
---|
168 | </glossentry>
|
---|
169 |
|
---|
170 | <glossentry>
|
---|
171 | <glossterm>Host-only networking</glossterm>
|
---|
172 |
|
---|
173 | <glossdef>
|
---|
174 | <para>This can be used to create a network containing the host and
|
---|
175 | a set of virtual machines, without the need for the host's
|
---|
176 | physical network interface. Instead, a virtual network interface
|
---|
177 | (similar to a loopback interface) is created on the host,
|
---|
178 | providing connectivity among virtual machines and the host.</para>
|
---|
179 | </glossdef>
|
---|
180 | </glossentry>
|
---|
181 |
|
---|
182 | <glossentry>
|
---|
183 | <glossterm>Generic networking</glossterm>
|
---|
184 |
|
---|
185 | <glossdef>
|
---|
186 | <para>Rarely used modes share the same generic network interface,
|
---|
187 | by allowing the user to select a driver which can be included with
|
---|
188 | VirtualBox or be distributed in an extension pack.</para>
|
---|
189 |
|
---|
190 | <para>At the moment there are potentially two available
|
---|
191 | sub-modes:</para>
|
---|
192 |
|
---|
193 | <para><glosslist>
|
---|
194 | <glossentry>
|
---|
195 | <glossterm>UDP Tunnel</glossterm>
|
---|
196 |
|
---|
197 | <glossdef>
|
---|
198 | <para>This can be used to interconnect virtual machines
|
---|
199 | running on different hosts directly, easily and
|
---|
200 | transparently, over existing network
|
---|
201 | infrastructure.</para>
|
---|
202 | </glossdef>
|
---|
203 | </glossentry>
|
---|
204 |
|
---|
205 | <glossentry>
|
---|
206 | <glossterm>VDE (Virtual Distributed Ethernet)
|
---|
207 | networking</glossterm>
|
---|
208 |
|
---|
209 | <glossdef>
|
---|
210 | <para>This option can be used to connect to a Virtual
|
---|
211 | Distributed Ethernet switch on a Linux or a FreeBSD host.
|
---|
212 | At the moment this needs compiling VirtualBox from
|
---|
213 | sources, as the Oracle packages do not include it.</para>
|
---|
214 | </glossdef>
|
---|
215 | </glossentry>
|
---|
216 | </glosslist></para>
|
---|
217 | </glossdef>
|
---|
218 | </glossentry>
|
---|
219 | </glosslist></para>
|
---|
220 |
|
---|
221 | <para>The following sections describe the available network modes in more
|
---|
222 | detail.</para>
|
---|
223 | </sect1>
|
---|
224 |
|
---|
225 | <sect1 id="network_nat">
|
---|
226 | <title>Network Address Translation (NAT)</title>
|
---|
227 |
|
---|
228 | <para>Network Address Translation (NAT) is the simplest way of accessing
|
---|
229 | an external network from a virtual machine. Usually, it does not require
|
---|
230 | any configuration on the host network and guest system. For this reason,
|
---|
231 | it is the default networking mode in VirtualBox.</para>
|
---|
232 |
|
---|
233 | <para>A virtual machine with NAT enabled acts much like a real computer
|
---|
234 | that connects to the Internet through a router. The "router", in this
|
---|
235 | case, is the VirtualBox networking engine, which maps traffic from and to
|
---|
236 | the virtual machine transparently. In VirtualBox this router is placed
|
---|
237 | between each virtual machine and the host. This separation maximizes
|
---|
238 | security since by default virtual machines cannot talk to each
|
---|
239 | other.</para>
|
---|
240 |
|
---|
241 | <para>The disadvantage of NAT mode is that, much like a private network
|
---|
242 | behind a router, the virtual machine is invisible and unreachable from the
|
---|
243 | outside internet; you cannot run a server this way unless you set up port
|
---|
244 | forwarding (described below).</para>
|
---|
245 |
|
---|
246 | <para>The network frames sent out by the guest operating system are
|
---|
247 | received by VirtualBox's NAT engine, which extracts the TCP/IP data and
|
---|
248 | resends it using the host operating system. To an application on the host,
|
---|
249 | or to another computer on the same network as the host, it looks like the
|
---|
250 | data was sent by the VirtualBox application on the host, using an IP
|
---|
251 | address belonging to the host. VirtualBox listens for replies to the
|
---|
252 | packages sent, and repacks and resends them to the guest machine on its
|
---|
253 | private network.</para>
|
---|
254 |
|
---|
255 | <para>The virtual machine receives its network address and configuration
|
---|
256 | on the private network from a DHCP server integrated into VirtualBox. The
|
---|
257 | IP address thus assigned to the virtual machine is usually on a completely
|
---|
258 | different network than the host. As more than one card of a virtual
|
---|
259 | machine can be set up to use NAT, the first card is connected to the
|
---|
260 | private network 10.0.2.0, the second card to the network 10.0.3.0 and so
|
---|
261 | on. If you need to change the guest-assigned IP range for some reason,
|
---|
262 | please refer to <xref linkend="changenat" />.</para>
|
---|
263 |
|
---|
264 | <sect2 id="natforward">
|
---|
265 | <title>Configuring port forwarding with NAT</title>
|
---|
266 |
|
---|
267 | <para>As the virtual machine is connected to a private network internal
|
---|
268 | to VirtualBox and invisible to the host, network services on the guest
|
---|
269 | are not accessible to the host machine or to other computers on the same
|
---|
270 | network. However, like a physical router, VirtualBox can make selected
|
---|
271 | services available to the world outside the guest through <emphasis
|
---|
272 | role="bold">port forwarding.</emphasis> This means that VirtualBox
|
---|
273 | listens to certain ports on the host and resends all packets which
|
---|
274 | arrive there to the guest, on the same or a different port.</para>
|
---|
275 |
|
---|
276 | <para>To an application on the host or other physical (or virtual)
|
---|
277 | machines on the network, it looks as though the service being proxied is
|
---|
278 | actually running on the host. This also means that you cannot run the
|
---|
279 | same service on the same ports on the host. However, you still gain the
|
---|
280 | advantages of running the service in a virtual machine -- for example,
|
---|
281 | services on the host machine or on other virtual machines cannot be
|
---|
282 | compromised or crashed by a vulnerability or a bug in the service, and
|
---|
283 | the service can run in a different operating system than the host
|
---|
284 | system.</para>
|
---|
285 |
|
---|
286 | <para>You can set up a guest service which you wish to proxy using the
|
---|
287 | command line tool <computeroutput>VBoxManage</computeroutput>; for
|
---|
288 | details, please refer to <xref linkend="vboxmanage-modifyvm" />.</para>
|
---|
289 |
|
---|
290 | <para>You will need to know which ports on the guest the service uses
|
---|
291 | and to decide which ports to use on the host (often but not always you
|
---|
292 | will want to use the same ports on the guest and on the host). You can
|
---|
293 | use any ports on the host which are not already in use by a service. For
|
---|
294 | example, to set up incoming NAT connections to an
|
---|
295 | <computeroutput>ssh</computeroutput> server in the guest, use the
|
---|
296 | following command: <screen>VBoxManage modifyvm "VM name" --natpf1 "guestssh,tcp,,2222,,22"</screen>With
|
---|
297 | the above example, all TCP traffic arriving on port 2222 on any host
|
---|
298 | interface will be forwarded to port 22 in the guest. The protocol name
|
---|
299 | <computeroutput>tcp</computeroutput> is a mandatory attribute defining
|
---|
300 | which protocol should be used for forwarding
|
---|
301 | (<computeroutput>udp</computeroutput> could also be used). The name
|
---|
302 | <computeroutput>guestssh</computeroutput> is purely descriptive and will
|
---|
303 | be auto-generated if omitted. The number after
|
---|
304 | <computeroutput>--natpf</computeroutput> denotes the network card, like
|
---|
305 | in other parts of VBoxManage.</para>
|
---|
306 |
|
---|
307 | <para>To remove this forwarding rule again, use the following command:
|
---|
308 | <screen>VBoxManage modifyvm "VM name" --natpf1 delete "guestssh"</screen></para>
|
---|
309 |
|
---|
310 | <para>If for some reason the guest uses a static assigned IP address not
|
---|
311 | leased from the built-in DHCP server, it is required to specify the
|
---|
312 | guest IP when registering the forwarding rule: <screen>VBoxManage modifyvm "VM name" --natpf1 "guestssh,tcp,,2222,10.0.2.19,22"</screen>This
|
---|
313 | example is identical to the previous one, except that the NAT engine is
|
---|
314 | being told that the guest can be found at the 10.0.2.19 address.</para>
|
---|
315 |
|
---|
316 | <para>To forward <emphasis>all</emphasis> incoming traffic from a
|
---|
317 | specific host interface to the guest, specify the IP of that host
|
---|
318 | interface like this:<screen>VBoxManage modifyvm "VM name" --natpf1 "guestssh,tcp,127.0.0.1,2222,,22"</screen>This
|
---|
319 | forwards all TCP traffic arriving on the localhost interface (127.0.0.1)
|
---|
320 | via port 2222 to port 22 in the guest.</para>
|
---|
321 |
|
---|
322 | <para>It is not possible to configure incoming NAT connections while the
|
---|
323 | VM is running. However, you can change the settings for a VM which is
|
---|
324 | currently saved (or powered off at a snapshot).</para>
|
---|
325 | </sect2>
|
---|
326 |
|
---|
327 | <sect2 id="nat-tftp">
|
---|
328 | <title>PXE booting with NAT</title>
|
---|
329 |
|
---|
330 | <para>PXE booting is now supported in NAT mode. The NAT DHCP server
|
---|
331 | provides a boot file name of the form
|
---|
332 | <computeroutput>vmname.pxe</computeroutput> if the directory
|
---|
333 | <computeroutput>TFTP</computeroutput> exists in the directory where the
|
---|
334 | user's <computeroutput>VirtualBox.xml</computeroutput> file is kept. It
|
---|
335 | is the responsibility of the user to provide
|
---|
336 | <computeroutput>vmname.pxe</computeroutput>.</para>
|
---|
337 | </sect2>
|
---|
338 |
|
---|
339 | <sect2 id="nat-limitations">
|
---|
340 | <title>NAT limitations</title>
|
---|
341 |
|
---|
342 | <para>There are four <emphasis role="bold">limitations</emphasis> of NAT
|
---|
343 | mode which users should be aware of:</para>
|
---|
344 |
|
---|
345 | <glosslist>
|
---|
346 | <glossentry>
|
---|
347 | <glossterm>ICMP protocol limitations:</glossterm>
|
---|
348 |
|
---|
349 | <glossdef>
|
---|
350 | <para>Some frequently used network debugging tools (e.g.
|
---|
351 | <computeroutput>ping</computeroutput> or tracerouting) rely on the
|
---|
352 | ICMP protocol for sending/receiving messages. While ICMP support
|
---|
353 | has been improved with VirtualBox 2.1
|
---|
354 | (<computeroutput>ping</computeroutput> should now work), some
|
---|
355 | other tools may not work reliably.</para>
|
---|
356 | </glossdef>
|
---|
357 | </glossentry>
|
---|
358 |
|
---|
359 | <glossentry>
|
---|
360 | <glossterm>Receiving of UDP broadcasts is not reliable:</glossterm>
|
---|
361 |
|
---|
362 | <glossdef>
|
---|
363 | <para>The guest does not reliably receive broadcasts, since, in
|
---|
364 | order to save resources, it only listens for a certain amount of
|
---|
365 | time after the guest has sent UDP data on a particular port. As a
|
---|
366 | consequence, NetBios name resolution based on broadcasts does not
|
---|
367 | always work (but WINS always works). As a workaround, you can use
|
---|
368 | the numeric IP of the desired server in the
|
---|
369 | <computeroutput>\\server\share</computeroutput> notation.</para>
|
---|
370 | </glossdef>
|
---|
371 | </glossentry>
|
---|
372 |
|
---|
373 | <glossentry>
|
---|
374 | <glossterm>Protocols such as GRE are unsupported:</glossterm>
|
---|
375 |
|
---|
376 | <glossdef>
|
---|
377 | <para>Protocols other than TCP and UDP are not supported. This
|
---|
378 | means some VPN products (e.g. PPTP from Microsoft) cannot be used.
|
---|
379 | There are other VPN products which use simply TCP and UDP.</para>
|
---|
380 | </glossdef>
|
---|
381 | </glossentry>
|
---|
382 |
|
---|
383 | <glossentry>
|
---|
384 | <glossterm>Forwarding host ports < 1024 impossible:</glossterm>
|
---|
385 |
|
---|
386 | <glossdef>
|
---|
387 | <para>On Unix-based hosts (e.g. Linux, Solaris, Mac OS X) it is
|
---|
388 | not possible to bind to ports below 1024 from applications that
|
---|
389 | are not run by <computeroutput>root</computeroutput>. As a result,
|
---|
390 | if you try to configure such a port forwarding, the VM will refuse
|
---|
391 | to start.</para>
|
---|
392 | </glossdef>
|
---|
393 | </glossentry>
|
---|
394 | </glosslist>
|
---|
395 |
|
---|
396 | <para>These limitations normally don't affect standard network use. But
|
---|
397 | the presence of NAT has also subtle effects that may interfere with
|
---|
398 | protocols that are normally working. One example is NFS, where the
|
---|
399 | server is often configured to refuse connections from non-privileged
|
---|
400 | ports (i.e. ports not below 1024).</para>
|
---|
401 | </sect2>
|
---|
402 | </sect1>
|
---|
403 |
|
---|
404 | <sect1>
|
---|
405 | <title id="network_bridged">Bridged networking</title>
|
---|
406 |
|
---|
407 | <para>With bridged networking, VirtualBox uses a device driver on your
|
---|
408 | <emphasis>host</emphasis> system that filters data from your physical
|
---|
409 | network adapter. This driver is therefore called a "net filter" driver.
|
---|
410 | This allows VirtualBox to intercept data from the physical network and
|
---|
411 | inject data into it, effectively creating a new network interface in
|
---|
412 | software. When a guest is using such a new software interface, it looks to
|
---|
413 | the host system as though the guest were physically connected to the
|
---|
414 | interface using a network cable: the host can send data to the guest
|
---|
415 | through that interface and receive data from it. This means that you can
|
---|
416 | set up routing or bridging between the guest and the rest of your
|
---|
417 | network.</para>
|
---|
418 |
|
---|
419 | <para>For this to work, VirtualBox needs a device driver on your host
|
---|
420 | system. The way bridged networking works has been completely rewritten
|
---|
421 | with VirtualBox 2.0 and 2.1, depending on the host operating system. From
|
---|
422 | the user perspective, the main difference is that complex configuration is
|
---|
423 | no longer necessary on any of the supported host operating
|
---|
424 | systems.<footnote>
|
---|
425 | <para>For Mac OS X and Solaris hosts, net filter drivers were already
|
---|
426 | added in VirtualBox 2.0 (as initial support for Host Interface
|
---|
427 | Networking on these platforms). With VirtualBox 2.1, net filter
|
---|
428 | drivers were also added for the Windows and Linux hosts, replacing the
|
---|
429 | mechanisms previously present in VirtualBox for those platforms;
|
---|
430 | especially on Linux, the earlier method required creating TAP
|
---|
431 | interfaces and bridges, which was complex and varied from one
|
---|
432 | distribution to the next. None of this is necessary anymore. Bridged
|
---|
433 | network was formerly called "Host Interface Networking" and has been
|
---|
434 | renamed with version 2.2 without any change in functionality.</para>
|
---|
435 | </footnote></para>
|
---|
436 |
|
---|
437 | <para><note>
|
---|
438 | <para>Even though TAP is no longer necessary on Linux with bridged
|
---|
439 | networking, you <emphasis>can</emphasis> still use TAP interfaces for
|
---|
440 | certain advanced setups, since you can connect a VM to any host
|
---|
441 | interface -- which could also be a TAP interface.</para>
|
---|
442 | </note>To enable bridged networking, all you need to do is to open the
|
---|
443 | Settings dialog of a virtual machine, go to the "Network" page and select
|
---|
444 | "Bridged network" in the drop down list for the "Attached to" field.
|
---|
445 | Finally, select desired host interface from the list at the bottom of the
|
---|
446 | page, which contains the physical network interfaces of your systems. On a
|
---|
447 | typical MacBook, for example, this will allow you to select between "en1:
|
---|
448 | AirPort" (which is the wireless interface) and "en0: Ethernet", which
|
---|
449 | represents the interface with a network cable.</para>
|
---|
450 |
|
---|
451 | <para>Depending on your host operating system, the following limitations
|
---|
452 | should be kept in mind:<itemizedlist>
|
---|
453 | <listitem>
|
---|
454 | <para>On <emphasis role="bold">Macintosh</emphasis> hosts,
|
---|
455 | functionality is limited when using AirPort (the Mac's wireless
|
---|
456 | networking) for bridged networking. Currently, VirtualBox supports
|
---|
457 | only IPv4 over AirPort. For other protocols such as IPv6 and IPX,
|
---|
458 | you must choose a wired interface.</para>
|
---|
459 | </listitem>
|
---|
460 |
|
---|
461 | <listitem>
|
---|
462 | <para>On <emphasis role="bold">Linux</emphasis> hosts, functionality
|
---|
463 | is limited when using wireless interfaces for bridged networking.
|
---|
464 | Currently, VirtualBox supports only IPv4 over wireless. For other
|
---|
465 | protocols such as IPv6 and IPX, you must choose a wired
|
---|
466 | interface.</para>
|
---|
467 |
|
---|
468 | <para>Also, setting the MTU to less than 1500 bytes on wired
|
---|
469 | interfaces provided by the sky2 driver on the Marvell Yukon II EC
|
---|
470 | Ultra Ethernet NIC is known to cause packet losses under certain
|
---|
471 | conditions.</para>
|
---|
472 |
|
---|
473 | <para>Some adapters strip VLAN tags in hardware. This does not allow
|
---|
474 | to use VLAN trunking between VM and the external network with
|
---|
475 | pre-2.6.27 Linux kernels nor with host operating systems other than
|
---|
476 | Linux.</para>
|
---|
477 | </listitem>
|
---|
478 |
|
---|
479 | <listitem>
|
---|
480 | <para>On <emphasis role="bold">Solaris</emphasis> hosts, there is no
|
---|
481 | support for using wireless interfaces. Filtering guest traffic using
|
---|
482 | IPFilter is also not completely supported due to technical
|
---|
483 | restrictions of the Solaris networking subsystem. These issues would
|
---|
484 | be addressed in a future release of Solaris 11.</para>
|
---|
485 |
|
---|
486 | <para>Starting with VirtualBox 4.1, on Solaris 11 hosts (build 159
|
---|
487 | and above), it is possible to use Solaris' Crossbow Virtual Network
|
---|
488 | Interfaces (VNICs) directly with VirtualBox without any additional
|
---|
489 | configuration other than each VNIC must be exclusive for every guest
|
---|
490 | network interface. With VirtualBox 2.0.4 and above, VNICs can be
|
---|
491 | used but with the following caveats:</para>
|
---|
492 |
|
---|
493 | <itemizedlist>
|
---|
494 | <listitem>
|
---|
495 | <para>A VNIC cannot be shared between multiple guest network
|
---|
496 | interfaces, i.e. each guest network interface must have its own,
|
---|
497 | exclusive VNIC.</para>
|
---|
498 | </listitem>
|
---|
499 |
|
---|
500 | <listitem>
|
---|
501 | <para>The VNIC and the guest network interface that uses the
|
---|
502 | VNIC must be assigned identical MAC addresses.</para>
|
---|
503 | </listitem>
|
---|
504 | </itemizedlist>
|
---|
505 |
|
---|
506 | <para>When using VLAN interfaces with VirtualBox, they must be named
|
---|
507 | according to the PPA-hack naming scheme (e.g. "e1000g513001"), as
|
---|
508 | otherwise the guest may receive packets in an unexpected
|
---|
509 | format.</para>
|
---|
510 | </listitem>
|
---|
511 | </itemizedlist></para>
|
---|
512 | </sect1>
|
---|
513 |
|
---|
514 | <sect1 id="network_internal">
|
---|
515 | <title>Internal networking</title>
|
---|
516 |
|
---|
517 | <para>Internal Networking is similar to bridged networking in that the VM
|
---|
518 | can directly communicate with the outside world. However, the "outside
|
---|
519 | world" is limited to other VMs on the same host which connect to the same
|
---|
520 | internal network.</para>
|
---|
521 |
|
---|
522 | <para>Even though technically, everything that can be done using internal
|
---|
523 | networking can also be done using bridged networking, there are security
|
---|
524 | advantages with internal networking. In bridged networking mode, all
|
---|
525 | traffic goes through a physical interface of the host system. It is
|
---|
526 | therefore possible to attach a packet sniffer (such as Wireshark) to the
|
---|
527 | host interface and log all traffic that goes over it. If, for any reason,
|
---|
528 | you prefer two or more VMs on the same machine to communicate privately,
|
---|
529 | hiding their data from both the host system and the user, bridged
|
---|
530 | networking therefore is not an option.</para>
|
---|
531 |
|
---|
532 | <para>Internal networks are created automatically as needed, i.e. there is
|
---|
533 | no central configuration. Every internal network is identified simply by
|
---|
534 | its name. Once there is more than one active virtual network card with the
|
---|
535 | same internal network ID, the VirtualBox support driver will automatically
|
---|
536 | "wire" the cards and act as a network switch. The VirtualBox support
|
---|
537 | driver implements a complete Ethernet switch and supports both
|
---|
538 | broadcast/multicast frames and promiscuous mode.</para>
|
---|
539 |
|
---|
540 | <para>In order to attach a VM's network card to an internal network, set
|
---|
541 | its networking mode to "internal networking". There are two ways to
|
---|
542 | accomplish this:</para>
|
---|
543 |
|
---|
544 | <para><itemizedlist>
|
---|
545 | <listitem>
|
---|
546 | <para>You can use a VM's "Settings" dialog in the VirtualBox
|
---|
547 | graphical user interface. In the "Networking" category of the
|
---|
548 | settings dialog, select "Internal Networking" from the drop-down
|
---|
549 | list of networking modes. Now select the name of an existing
|
---|
550 | internal network from the drop-down below or enter a new name into
|
---|
551 | the entry field.</para>
|
---|
552 | </listitem>
|
---|
553 |
|
---|
554 | <listitem>
|
---|
555 | <para>You can use <screen>VBoxManage modifyvm "VM name" --nic<x> intnet</screen>
|
---|
556 | Optionally, you can specify a network name with the command <screen>VBoxManage modifyvm "VM name" --intnet<x> "network name"</screen>
|
---|
557 | If you do not specify a network name, the network card will be
|
---|
558 | attached to the network <computeroutput>intnet</computeroutput> by
|
---|
559 | default.</para>
|
---|
560 | </listitem>
|
---|
561 | </itemizedlist></para>
|
---|
562 |
|
---|
563 | <para>Unless you configure the (virtual) network cards in the guest
|
---|
564 | operating systems that are participating in the internal network to use
|
---|
565 | static IP addresses, you may want to use the DHCP server that is built
|
---|
566 | into VirtualBox to manage IP addresses for the internal network. Please
|
---|
567 | see <xref linkend="vboxmanage-dhcpserver" /> for details.</para>
|
---|
568 |
|
---|
569 | <para>As a security measure, the Linux implementation of internal
|
---|
570 | networking only allows VMs running under the same user ID to establish an
|
---|
571 | internal network.</para>
|
---|
572 | </sect1>
|
---|
573 |
|
---|
574 | <sect1 id="network_hostonly">
|
---|
575 | <title>Host-only networking</title>
|
---|
576 |
|
---|
577 | <para>Host-only networking is another networking mode that was added with
|
---|
578 | version 2.2 of VirtualBox. It can be thought of as a hybrid between the
|
---|
579 | bridged and internal networking modes: as with bridged networking, the
|
---|
580 | virtual machines can talk to each other and the host as if they were
|
---|
581 | connected through a physical ethernet switch. Similarly, as with internal
|
---|
582 | networking however, a physical networking interface need not be present,
|
---|
583 | and the virtual machines cannot talk to the world outside the host since
|
---|
584 | they are not connected to a physical networking interface.</para>
|
---|
585 |
|
---|
586 | <para>Instead, when host-only networking is used, VirtualBox creates a new
|
---|
587 | software interface on the host which then appears next to your existing
|
---|
588 | network interfaces. In other words, whereas with bridged networking an
|
---|
589 | existing physical interface is used to attach virtual machines to, with
|
---|
590 | host-only networking a new "loopback" interface is created on the host.
|
---|
591 | And whereas with internal networking, the traffic between the virtual
|
---|
592 | machines cannot be seen, the traffic on the "loopback" interface on the
|
---|
593 | host can be intercepted.</para>
|
---|
594 |
|
---|
595 | <para>Host-only networking is particularly useful for preconfigured
|
---|
596 | virtual appliances, where multiple virtual machines are shipped together
|
---|
597 | and designed to cooperate. For example, one virtual machine may contain a
|
---|
598 | web server and a second one a database, and since they are intended to
|
---|
599 | talk to each other, the appliance can instruct VirtualBox to set up a
|
---|
600 | host-only network for the two. A second (bridged) network would then
|
---|
601 | connect the web server to the outside world to serve data to, but the
|
---|
602 | outside world cannot connect to the database.</para>
|
---|
603 |
|
---|
604 | <para>To change a virtual machine's virtual network interface to "host
|
---|
605 | only" mode:<itemizedlist>
|
---|
606 | <listitem>
|
---|
607 | <para>either go to the "Network" page in the virtual machine's
|
---|
608 | settings notebook in the graphical user interface and select
|
---|
609 | "Host-only networking", or</para>
|
---|
610 | </listitem>
|
---|
611 |
|
---|
612 | <listitem>
|
---|
613 | <para>on the command line, type <computeroutput>VBoxManage modifyvm
|
---|
614 | "VM name" --nic<x> hostonly</computeroutput>; see <xref
|
---|
615 | linkend="vboxmanage-modifyvm" /> for details.</para>
|
---|
616 | </listitem>
|
---|
617 | </itemizedlist></para>
|
---|
618 |
|
---|
619 | <para>For host-only networking, like with internal networking, you may
|
---|
620 | find the DHCP server useful that is built into VirtualBox. This can be
|
---|
621 | enabled to then manage the IP addresses in the host-only network since
|
---|
622 | otherwise you would need to configure all IP addresses
|
---|
623 | statically.<itemizedlist>
|
---|
624 | <listitem>
|
---|
625 | <para>In the VirtualBox graphical user interface, you can configure
|
---|
626 | all these items in the global settings via "File" -> "Settings"
|
---|
627 | -> "Network", which lists all host-only networks which are
|
---|
628 | presently in use. Click on the network name and then on the "Edit"
|
---|
629 | button to the right, and you can modify the adapter and DHCP
|
---|
630 | settings.</para>
|
---|
631 | </listitem>
|
---|
632 |
|
---|
633 | <listitem>
|
---|
634 | <para>Alternatively, you can use <computeroutput>VBoxManage
|
---|
635 | dhcpserver</computeroutput> on the command line; please see <xref
|
---|
636 | linkend="vboxmanage-dhcpserver" /> for details.</para>
|
---|
637 | </listitem>
|
---|
638 | </itemizedlist></para>
|
---|
639 | <para><note>On Linux and Mac OS X hosts the number of host-only interfaces is
|
---|
640 | limited to 128. There is no such limit for Solaris and Windows hosts.</note></para>
|
---|
641 | </sect1>
|
---|
642 |
|
---|
643 | <sect1 id="network_udp_tunnel">
|
---|
644 | <title>UDP Tunnel networking</title>
|
---|
645 |
|
---|
646 | <para>This networking mode allows to interconnect virtual machines running
|
---|
647 | on different hosts.</para>
|
---|
648 |
|
---|
649 | <para>Technically this is done by encapsulating Ethernet frames sent or
|
---|
650 | received by the guest network card into UDP/IP datagrams, and sending them
|
---|
651 | over any network available to the host.</para>
|
---|
652 |
|
---|
653 | <para>UDP Tunnel mode has three parameters:<glosslist>
|
---|
654 | <glossentry>
|
---|
655 | <glossterm>Source UDP port</glossterm>
|
---|
656 |
|
---|
657 | <glossdef>
|
---|
658 | <para>The port on which the host listens. Datagrams arriving on
|
---|
659 | this port from any source address will be forwarded to the
|
---|
660 | receiving part of the guest network card.</para>
|
---|
661 | </glossdef>
|
---|
662 | </glossentry>
|
---|
663 |
|
---|
664 | <glossentry>
|
---|
665 | <glossterm>Destination address</glossterm>
|
---|
666 |
|
---|
667 | <glossdef>
|
---|
668 | <para>IP address of the target host of the transmitted
|
---|
669 | data.</para>
|
---|
670 | </glossdef>
|
---|
671 | </glossentry>
|
---|
672 |
|
---|
673 | <glossentry>
|
---|
674 | <glossterm>Destination UDP port</glossterm>
|
---|
675 |
|
---|
676 | <glossdef>
|
---|
677 | <para>Port number to which the transmitted data is sent.</para>
|
---|
678 | </glossdef>
|
---|
679 | </glossentry>
|
---|
680 | </glosslist></para>
|
---|
681 |
|
---|
682 | <para>When interconnecting two virtual machines on two different hosts,
|
---|
683 | their IP addresses must be swapped. On single host, source and destination
|
---|
684 | UDP ports must be swapped.</para>
|
---|
685 |
|
---|
686 | <para>In the following example host 1 uses the IP address 10.0.0.1 and
|
---|
687 | host 2 uses IP address 10.0.0.2. Configuration via command-line:<screen> VBoxManage modifyvm "VM 01 on host 1" --nic<x> generic
|
---|
688 | VBoxManage modifyvm "VM 01 on host 1" --nicgenericdrv<x> UDPTunnel
|
---|
689 | VBoxManage modifyvm "VM 01 on host 1" --nicproperty<x> dest=10.0.0.2
|
---|
690 | VBoxManage modifyvm "VM 01 on host 1" --nicproperty<x> sport=10001
|
---|
691 | VBoxManage modifyvm "VM 01 on host 1" --nicproperty<x> dport=10002</screen>
|
---|
692 | and <screen> VBoxManage modifyvm "VM 02 on host 2" --nic<y> generic
|
---|
693 | VBoxManage modifyvm "VM 02 on host 2" --nicgenericdrv<y> UDPTunnel
|
---|
694 | VBoxManage modifyvm "VM 02 on host 2" --nicproperty<y> dest=10.0.0.1
|
---|
695 | VBoxManage modifyvm "VM 02 on host 2" --nicproperty<y> sport=10002
|
---|
696 | VBoxManage modifyvm "VM 02 on host 2" --nicproperty<y> dport=10001</screen></para>
|
---|
697 |
|
---|
698 | <para>Of course, you can always interconnect two virtual machines on the
|
---|
699 | same host, by setting the destination address parameter to 127.0.0.1 on
|
---|
700 | both. It will act similarly to "Internal network" in this case, however
|
---|
701 | the host can see the network traffic which it could not in the normal
|
---|
702 | Internal network case.</para>
|
---|
703 |
|
---|
704 | <para><note>
|
---|
705 | On Unix-based hosts (e.g. Linux, Solaris, Mac OS X) it is not possible to bind to ports below 1024 from applications that are not run by
|
---|
706 |
|
---|
707 | <computeroutput>root</computeroutput>
|
---|
708 |
|
---|
709 | . As a result, if you try to configure such a source UDP port, the VM will refuse to start.
|
---|
710 | </note></para>
|
---|
711 | </sect1>
|
---|
712 |
|
---|
713 | <sect1 id="network_vde">
|
---|
714 | <title>VDE networking</title>
|
---|
715 |
|
---|
716 | <para>Virtual Distributed Ethernet (VDE<footnote>
|
---|
717 | <para>VDE is a project developed by Renzo Davoli, Associate Professor
|
---|
718 | at the University of Bologna, Italy.</para>
|
---|
719 | </footnote>) is a flexible, virtual network infrastructure system,
|
---|
720 | spanning across multiple hosts in a secure way. It allows for L2/L3
|
---|
721 | switching, including spanning-tree protocol, VLANs, and WAN emulation. It
|
---|
722 | is an optional part of VirtualBox which is only included in the source
|
---|
723 | code.</para>
|
---|
724 |
|
---|
725 | <para>The basic building blocks of the infrastructure are VDE switches,
|
---|
726 | VDE plugs and VDE wires which inter-connect the switches.</para>
|
---|
727 |
|
---|
728 | <para>The VirtualBox VDE driver has one parameter:<glosslist>
|
---|
729 | <glossentry>
|
---|
730 | <glossterm>VDE network</glossterm>
|
---|
731 |
|
---|
732 | <glossdef>
|
---|
733 | <para>The name of the VDE network switch socket to which the VM
|
---|
734 | will be connected.</para>
|
---|
735 | </glossdef>
|
---|
736 | </glossentry>
|
---|
737 | </glosslist></para>
|
---|
738 |
|
---|
739 | <para>The following basic example shows how to connect a virtual machine
|
---|
740 | to a VDE switch:</para>
|
---|
741 |
|
---|
742 | <para><orderedlist>
|
---|
743 | <listitem>
|
---|
744 | <para>Create a VDE switch: <screen>vde_switch -s /tmp/switch1</screen></para>
|
---|
745 | </listitem>
|
---|
746 |
|
---|
747 | <listitem>
|
---|
748 | <para>Configuration via command-line: <screen>VBoxManage modifyvm "VM name" --nic<x> generic</screen>
|
---|
749 | <screen>VBoxManage modifyvm "VM name" --nicgenericdrv<x> VDE</screen>
|
---|
750 | To connect to automatically allocated switch port, use: <screen>VBoxManage modifyvm "VM name" --nicproperty<x> network=/tmp/switch1</screen>
|
---|
751 | To connect to specific switch port <n>, use: <screen>VBoxManage modifyvm "VM name" --nicproperty<x> network=/tmp/switch1[<n>]</screen>
|
---|
752 | The latter option can be useful for VLANs.</para>
|
---|
753 | </listitem>
|
---|
754 |
|
---|
755 | <listitem>
|
---|
756 | <para>Optionally map between VDE switch port and VLAN: (from switch
|
---|
757 | CLI) <screen>vde$ vlan/create <VLAN></screen> <screen>vde$ port/setvlan <port> <VLAN></screen></para>
|
---|
758 | </listitem>
|
---|
759 | </orderedlist></para>
|
---|
760 |
|
---|
761 | <para>VDE is available on Linux and FreeBSD hosts only. It is only
|
---|
762 | available if the VDE software and the VDE plugin library from the
|
---|
763 | VirtualSquare project are installed on the host system<footnote>
|
---|
764 | <para>For Linux hosts, the shared library libvdeplug.so must be
|
---|
765 | available in the search path for shared libraries</para>
|
---|
766 | </footnote>. For more information on setting up VDE networks, please see
|
---|
767 | the documentation accompanying the software.<footnote>
|
---|
768 | <para><ulink
|
---|
769 | url="http://wiki.virtualsquare.org/wiki/index.php/VDE_Basic_Networking">http://wiki.virtualsquare.org/wiki/index.php/VDE_Basic_Networking</ulink>.</para>
|
---|
770 | </footnote></para>
|
---|
771 | </sect1>
|
---|
772 |
|
---|
773 | <sect1 id="network_bandwidth_limit">
|
---|
774 | <title>Limiting bandwidth for network I/O</title>
|
---|
775 |
|
---|
776 | <para>Starting with version 4.2, VirtualBox allows for limiting the
|
---|
777 | maximum bandwidth used for network transmission. Several network adapters
|
---|
778 | of one VM may share limits through bandwidth groups. It is possible
|
---|
779 | to have more than one such limit.</para>
|
---|
780 |
|
---|
781 | <para>Limits are configured through
|
---|
782 | <computeroutput>VBoxManage</computeroutput>. The example below creates a
|
---|
783 | bandwidth group named "Limit", sets the limit to 20 Mbit/s and assigns the
|
---|
784 | group to the first and second adapters of the VM:<screen>VBoxManage bandwidthctl "VM name" add Limit --type network --limit 20m
|
---|
785 | VBoxManage modifyvm "VM name" --nicbandwidthgroup1 Limit
|
---|
786 | VBoxManage modifyvm "VM name" --nicbandwidthgroup2 Limit</screen></para>
|
---|
787 |
|
---|
788 | <para>All adapters in a group share the bandwidth limit, meaning that in the
|
---|
789 | example above the bandwidth of both adapters combined can never exceed 20
|
---|
790 | Mbit/s. However, if one disk doesn't require bandwidth the other can use the
|
---|
791 | remaining bandwidth of its group.</para>
|
---|
792 |
|
---|
793 | <para>The limits for each group can be changed while the VM is running,
|
---|
794 | with changes being picked up immediately. The example below changes the
|
---|
795 | limit for the group created in the example above to 100 Kbit/s:<screen>VBoxManage bandwidthctl "VM name" set Limit --limit 100k</screen></para>
|
---|
796 | </sect1>
|
---|
797 | </chapter>
|
---|