Just to be complete, here's the config on the switch. I've reconfigured it several times, making sure that I made matching changes on the ESXi host. For instance, when I destroyed the trunk and untagged the consituent ports in the VLAN, I made sure that I set the VLAN ID on the port groups to 0, and ditto when I untagged trk1 in the VLAN. But, AFAICT, that really shouldn't make a difference, since communication to/from resources outside of the ESXi host work just fine - it's only between VMs on that host that don't work.
Oh, and BTW, I've got a similarly configured host that has been fired up in our other overseas office, and it's suffering from the same problem. Kurt Running configuration: ; J9280A Configuration Editor; Created on release #Y.11.12 hostname "au-sw-03" max-vlans 50 time timezone 600 mirror-port 48 console inactivity-timer 60 trunk 3,6 Trk1 Trunk ip default-gateway 192.168.61.1 sntp server 192.168.61.31 logging 192.168.61.5 snmp-server community "**********" Operator vlan 1 name "DEFAULT_VLAN" untagged 48 ip address dhcp-bootp no untagged 1-2,4-5,7-47,Trk1 exit vlan 161 name "VLAN161" untagged 1-2,4-5,7-47 ip address 192.168.61.17 255.255.255.0 tagged Trk1 exit interface 1-47 monitor exit fault-finder bad-driver sensitivity high fault-finder bad-transceiver sensitivity high fault-finder bad-cable sensitivity high fault-finder too-long-cable sensitivity high fault-finder over-bandwidth sensitivity high fault-finder broadcast-storm sensitivity high fault-finder loss-of-link sensitivity high fault-finder duplex-mismatch-HDx sensitivity high fault-finder duplex-mismatch-FDx sensitivity high no stack spanning-tree spanning-tree 1 bpdu-protection spanning-tree 2 bpdu-protection spanning-tree 4 bpdu-protection spanning-tree 5 bpdu-protection spanning-tree 7 bpdu-protection spanning-tree 8 bpdu-protection spanning-tree 9 bpdu-protection spanning-tree 10 bpdu-protection spanning-tree 11 bpdu-protection spanning-tree 12 bpdu-protection spanning-tree 13 bpdu-protection spanning-tree 14 bpdu-protection spanning-tree 15 bpdu-protection spanning-tree 17 bpdu-protection spanning-tree 18 bpdu-protection spanning-tree 19 bpdu-protection spanning-tree 20 bpdu-protection spanning-tree 21 bpdu-protection spanning-tree 22 bpdu-protection spanning-tree 23 bpdu-protection spanning-tree 24 bpdu-protection spanning-tree 25 bpdu-protection spanning-tree 26 bpdu-protection spanning-tree 27 bpdu-protection spanning-tree 28 bpdu-protection spanning-tree 29 bpdu-protection spanning-tree 30 bpdu-protection spanning-tree 31 bpdu-protection spanning-tree 32 bpdu-protection spanning-tree 33 bpdu-protection spanning-tree 34 bpdu-protection spanning-tree 35 bpdu-protection spanning-tree 36 bpdu-protection spanning-tree 37 bpdu-protection spanning-tree 38 bpdu-protection spanning-tree 39 bpdu-protection spanning-tree 40 bpdu-protection spanning-tree 41 bpdu-protection spanning-tree 42 bpdu-protection spanning-tree 43 bpdu-protection spanning-tree 44 bpdu-protection spanning-tree 45 bpdu-protection spanning-tree 46 bpdu-protection spanning-tree 47 bpdu-protection spanning-tree Trk1 priority 4 spanning-tree bpdu-protection-timeout 600 priority 0 loop-protect 1-2,4-5,7-48 loop-protect trap loop-detected loop-protect disable-timer 1800 password manager password operator On Fri, Apr 4, 2014 at 9:54 AM, Kurt Buff <[email protected]> wrote: > Port security is not configured on the switch. > > Also, I just tried the following: > > I've changed the NIC teaming on the vSwitch to use each option (MAC > Hash, Virtual Port ID and Explicit failover order), and have even > moved one of the NICs to standby. > > I've verified that all of the VMs are using the same NIC with esxtop. > > Still no go. Anything not on the host can ping and talk with the VMs, > but the VMs cannot ping or otherwise talk with each other. > > Kurt > > On Fri, Apr 4, 2014 at 9:20 AM, Mathew Shember > <[email protected]> wrote: >> Did you try disabling port security on the switch? >> >> >> >> -----Original Message----- >> From: [email protected] [mailto:[email protected]] >> On Behalf Of Kurt Buff >> Sent: Friday, April 4, 2014 9:11 AM >> To: [email protected] >> Subject: Re: [NTSysADM] No communication between VMs on an ESXi host >> >> Update: I've tried several configuration changes with no success: >> >> >> o- The trunk on the HP switch was tagged to the VLAN. I changed the port >> group configurations to reside in VLAN 0, and then set the trunk on the >> switched to untagged in the VLAN. This has made no difference - the VMs >> still cannot ping each other >> >> o- I destroyed the trunk, and then untagged the individual switch ports in >> the vlan. Also no go. >> >> In both cases, the VMs can talk to the rest of the environment (and vice >> versa) but not to each other. >> >> Kurt >> >> On Thu, Apr 3, 2014 at 5:20 PM, Dave Hardyman <[email protected]> wrote: >>> Remove the trunking on the switch ports that your uplinks are connected to. >>> >>> >>> ________________________________________ >>> From: [email protected] [[email protected]] >>> On Behalf Of Kurt Buff [[email protected]] >>> Sent: Thursday, April 03, 2014 6:44 PM >>> To: [email protected] >>> Subject: Re: [NTSysADM] No communication between VMs on an ESXi host >>> >>> They're trunked... >>> >>> Kurt >>> >>> On Thu, Apr 3, 2014 at 4:16 PM, Sean Martin <[email protected]> wrote: >>>> If you're uplinks aren't trunked, don't specify the VLAN ID within >>>> the port group settings. Try leaving the VLAN type set to none. >>>> >>>> >>>> On Thu, Apr 3, 2014 at 12:39 PM, Kurt Buff <[email protected]> wrote: >>>>> >>>>> All, >>>>> >>>>> My search-fu is failing, so I turn to you for help... >>>>> >>>>> I have a small ESXi 5.5 host, about to go into production. >>>>> >>>>> The three VMs (2008R2 for all of them, a DC, Exchange 2010 and a >>>>> PRTG >>>>> box) on it can communicate with machines not on the ESXi host - >>>>> ping, RDP, etc. - and vice versa. No problems. >>>>> >>>>> However, the three VMs on this host cannot talk with each other. No >>>>> ping, no RDP. When pinging from one of the VMs to another, I get a >>>>> mix of unreachables from the VMs own address and straight timeouts. >>>>> >>>>> There is only one vSwitch, which has two NICs bound to it, and the >>>>> vswitch is set up to route based on IP hash. The physical switch to >>>>> which they are connect (and this shouldn't matter, but...) is an HP >>>>> 2510G-48, and the ports for the host are in a simple trunk - no LACP. >>>>> >>>>> I've turned off the Domain profile of the firewall on one of the >>>>> machine, which seems to make no difference. >>>>> >>>>> I've examined the VMware host security settings to no avail. I've >>>>> turned off the Windows firewall. >>>>> >>>>> I've got 3 ESXi hosts in a vSphere Standard cluster that doesn't >>>>> have this problem. >>>>> >>>>> Kurt >>>>> >>>>> >>>> >>> >> >> > >

