Windows 11 VLAN Tagging for Nested Virtualization

Paul Dirmann 0 Reputation points
2025-10-22T15:25:39.94+00:00

Hey, all.

I'm running Windows 11 Enterprise 25H2 with and Intel I219-V onboard NIC with driver version 12.19.2.64 from Intel's site. This NIC is dedicated for VM traffic, and I have a separate interface for my actual OS. On this PC, I have VMware Workstation with an ESXi VM that I want to run some VMs under. I've been struggling trying to get the I219-V to act as a trunk and allow VLAN tags to reach and be sent from the ESXi VM (once this is fixed, I believe the VMs running in the nested ESXi instance would be reachable as well).

Open to suggestions to try, but I've already tried a slew of different things. The most recent being similar to this -

https://taeffner.net/2022/04/multiple-vlans-windows-10-11-onboard-tools-hyper-v/

The difference is that instead of making it an "access port" like he does in his config, I need to make it a trunk so I use -

Add-VMNetworkAdapter -ManagementOS -Name "vTrunk" -SwitchName "VLAN-vSwitch" -Passthru | Set-VMNetworkAdapterVlan -Trunk -AllowedVlanIdList A,B,C -NativeVlanId X

Could it just be a limitation in the NIC? If so, does anyone have any suggestions on NICs that would allow? I've tried Broadcom chipsets, and other Intels, both older models, but still.

Windows for home | Windows 11 | Internet and connectivity
0 comments No comments
{count} votes

2 answers

Sort by: Most helpful
  1. Jason Roberts 2,015 Reputation points Independent Advisor
    2025-10-22T16:15:02.19+00:00

    From my experience The Likely Culprit: The Intel I219-V Driver and it is a common problem.

    The Intel I219-V is a very common integrated NIC, but it's infamous for having its driver's built-in VLAN filtering/acceleration features interfere with the Hyper-V Virtual Switch.

    When you create an external vSwitch, Hyper-V takes over the physical NIC. The NIC's driver, despite being current, might be "helpfully" stripping or filtering the VLAN tags before the Hyper-V switch can handle the traffic correctly for your trunk.

    The Fix: Disable Hardware Offloading

    You need to disable the NIC's own filtering capabilities so the Hyper-V virtual switch handles all the tagging. This is usually done in the device's Advanced Properties or via the Windows Registry.

    Device Manager Method:

    Go to Device Manager $\to$ Network Adapters $\to$ Intel(R) Ethernet Connection (2) (or whatever your I219-V is named).

    Right-click and choose Properties > Advanced tab.

    Look for properties like:

    VLAN ID (should be 0 or "None").

    VLAN Filtering (or VLAN Tagging). Try setting this to Disabled or 0.

    Priority & VLAN or QoS (try disabling this, too).

    Registry Method (More Technical): If the Device Manager option isn't available, you might need to directly edit the registry, setting the VlanFiltering value to 0 for that specific adapter's key. This is a common fix for Intel NICs in Hyper-V environments.

    1. Your PowerShell Command is Correct, But Needs Confirmation

    The PowerShell command you are using is the correct approach for setting the Hyper-V switch's port to your ESXi VM as a trunk:

    PowerShell

    Add-VMNetworkAdapter -ManagementOS -Name "vTrunk" -SwitchName "VLAN-vSwitch" -Passthru | Set-VMNetworkAdapterVlan -Trunk -AllowedVlanIdList A,B,C -NativeVlanId X

    Key Verification Steps:

    VM Network Adapter: Double-check that you are applying this trunk setting to the VM's network adapter within the Windows 11 Hyper-V layer, not to the Management OS adapter.

    For a VM: Set-VMNetworkAdapterVlan -VMName "ESXi-VM" -VMNetworkAdapterName "Network Adapter" -Trunk

    If you are connecting the host OS to the trunk for testing: Use the original -ManagementOS command you posted. Native VLAN: Ensure the NativeVlanId X you set matches the untagged VLAN on your physical switch port, or set it to 0 if you don't need a native VLAN. The physical switch port must also be configured for 802.1Q trunking and allow the specified VLAN IDs (A, B, C).

    1. Alternative NIC Suggestion (The Broadcom Advantage)

    If the Intel I219-V simply refuses to cooperate, even with offloading disabled, a separate PCIe NIC is the reliable solution.

    Typically Intel I350-based or Broadcom/QLogic chips would be preferential, as they have historically offered better Hyper-V compatibility for this specific trunking scenario.

    Recommendation: Look for a PCIe card using the Intel I350 chipset (often available in dual or quad-port configurations). Their drivers generally have fewer conflicts with the Windows Hyper-V stack, and if they do, the official Intel drivers usually provide clearer "VLAN Filtering" options to disable.

    Give the driver offloading fix a shot first, as it's the most likely software solution to your recurrent problem! How ever I do love a good nested virtualisation so let me know if you need further help.

    0 comments No comments

  2. Paul Dirmann 0 Reputation points
    2025-10-23T21:12:07.6666667+00:00

    In the 'Advanced' tab of the interface, VLAN and VLAN Filtering are not there. Priority Packet & VLAN is though. I have disabled it. Looking at the registry, the VlanFiltering string is there and set to 0 already.

    I rebuilt the VMSwitch in Hyper-V. For the record, only using Hyper-V for the vNetworking capabilities. I turn around and bridge the vmnetX in VMware Workstation to the Hyper-V Virtual Adapter that is created.

    So far, no luck. I'm hesitant to buy other NICs only because I've tried two others with no luck. As I mentioned, one was Broadcom and the other was another Intel. I guess I could always try and return it if it doesn't work.

    0 comments No comments

Your answer

Answers can be marked as 'Accepted' by the question author and 'Recommended' by moderators, which helps users know the answer solved the author's problem.