Logo Atlas
  • Home
  • About Me
  • Skills
  • Education
  • Recent Posts
  • Certifications
  • Posts
  • English
    Español English
  • Dark Theme
    Light Theme Dark Theme System Theme
Logo Inverted Logo
  • Posts
  • CI / CD Jenkins
    • CI / CD practice with Jenkins
    • Workshop 1 Ortho-rector of markdown documents (test)
    • Workshop 2 Valid HTML5 check and surge.sh deployment (test and deploy)
    • Workshop 3 Continuous integration of django application (Test)
  • Database
    • Install MariaDB in Debian
    • Interconnection of database servers
    • Oracle 19c installation under Debian 12
    • PostgreSQL installation in Debian 12
    • Remote access configuration in Oracle
    • Remote access in MariaDB
  • Docker
    • Docker Compose Installation on Ubuntu 24
    • Docker Installation on Ubuntu 24
    • Workshop 1 Storage and networks in Docker
    • Workshop 2 Multicontainer Scenarios in Docker
    • Workshop 3 Image creation Docker
  • Firewall
    • Fortinet CLI
    • Perimetral with Fortinet I
    • Perimetral with Fortinet II
    • Perimetral with Nftables I
    • Perimetral with Nftables II
  • Linux Drivers
    • Drivers Nvidia
    • How to choose which graph to use on my laptop with Linux
  • Networks
    • Android GNS3-KVM
    • Basic IPv6 scenario
    • GNS3 and Wireshark installation
    • GNS3 installation in Debian 12
    • GNS3 switch configuration
    • IPV6 Tunnels
    • NAT in Cisco and Linux
    • Network monitoring commands
    • OpenStack routing
    • Protocol ARP
    • Underworld
    • Underworld evolution
  • Observability
    • Metrics
      • Prometheus
        • Installation of Prometheus with Docker Compose and Node Exporter on Debian 12
  • Security
    • Forensic computer
    • HTTPS
  • Services
    • Apache
    • DHCP
      • Installation and Configuration of a DHCP Server on Linux
    • DNS
      • BIND9
        • Configuring a Slave DNS Server with BIND9
        • Installation and Configuration of BIND9 on Linux
      • DNSMASQ
        • Local Server with DNSMasq
    • FTP
    • NAT with iptables
    • SSH
  • Systems
    • Active Directory in Ubuntu
    • Centralized collection of logs journald
    • Compilations in LINUX
      • Compilation of a C-program using a Makefile
      • Compilation of a kernel
    • Creation of an automated installation system
    • Install and configure samba in Debian
    • Linux Command
      • Kernel parameter modification exercises
      • Linux processes
      • Module management exercises
      • Package management
      • Packaging and compressors
      • Paid management exercises
      • Task programming
    • Migration in Linnux
      • File system
      • Migtation from CentOS stream 8 to CentOS stream 9
      • Systemd elimination
      • Transformation instance cloud
    • NFS in Debian
    • SELinux activation configuration
    • Share resources in Windows
    • Ssh service in Windows
    • Storage Spaces in Windows Server
  • Virtualization (KVM on Linux)
    • Introduction to virtualization with KVM
      • Virtualization basics in Linux
      • Types of hypervisors
      • KVM architecture and operation
    • Installation and configuration
      • Install KVM and libvirt
      • Validate KVM host
    • Virtual machine management
      • Create VM with virt-install
      • VM components
      • Manage with virsh
      • Clone and rename VMs
      • Expand VM resources
      • Snapshots in KVM
      • Virtual machine templates
    • Networking in KVM
      • Network types in KVM
      • Create and configure private virtual networks
      • Create bridge interface
    • Storage in KVM
      • Introduction to storage
      • Managing pools
      • Volumes (virsh)
      • Resizing disks (VMs)
  • VPN
    • OpenVPN and Wireguard Comparative
    • OpenVPN remote access
    • Remote access Ipsec StrongSwan
    • Site-to-Site IPsec Cisco
    • Site-to-Site IPsec Fortinet
    • Site-to-Site OpenVPN
    • Site-to-Site Wireguard
    • Wireguard remote access
  • Web applications
    • LAMP stack installation
    • LEMP stack installation
    • WordPress LAMP
    • WordPress LEMP
Hero Image
Network types in KVM (NAT, isolated and bridged)

In KVM, network virtualization is mainly managed through libvirt, which lets us create and administer various kinds of virtual networks to which our virtual machines connect. Understanding the available network types is key to properly configuring guest connectivity and the host interaction. There are two broad categories of networks in KVM: Private virtual networks: Internal networks isolated from the outside, managed via virtual bridges created by libvirt. Bridged networks: Networks that connect virtual machines directly to the host’s physical network. Private virtual networks These networks are created on the host and provide a controlled environment for virtual machines. They fall into three main types:

  • KVM
  • Virtualization
  • Libvirt
  • Networking
  • Linux
Saturday, October 18, 2025 | 3 minutes Read
Hero Image
How to create and configure private virtual networks

In this step-by-step guide you’ll create three types of virtual networks managed by libvirt and learn simple ways to verify them: NAT (Network Address Translation) Isolated Very isolated (L2 only) We’ll use virsh and XML definitions (you can do the same with virt-manager, but we’ll focus on the CLI). After each creation, there’s a quick check to confirm everything looks good. Before you start: quick requirements Packages: libvirt-daemon and libvirt-daemon-system (or your distro equivalents). Optional: virt-manager. Run commands as root or with sudo. Service: systemctl status libvirtd should be active. See current networks: virsh net-list --all Persistent config paths: /etc/libvirt/qemu/networks/ Tip: avoid subnet conflicts; choose ranges that don’t collide with your physical LAN or other libvirt networks.

  • KVM
  • Virtualization
  • Libvirt
  • Networking
  • Linux
Saturday, October 18, 2025 | 4 minutes Read
Hero Image
How to create a bridge interface on the KVM host

A bridge on the host allows your virtual machines to connect directly to the physical network as if they were another machine on the LAN. It’s the basis for “bridged networks” covered in the network types section. Important: if you perform these changes over remote SSH you may lose connectivity. Whenever possible use local/console access or have a recovery plan (KVM/IPMI, a second interface, maintenance window, etc.). 0. Preparation: identify your physical interface and back up configs Identify the physical interface connected to your LAN/Internet (for example: enp1s0, enp3s0, eth0): ip -br link ip -br addr Back up your network configuration files before changing anything — use the command appropriate to your setup: sudo cp -a /etc/netplan /etc/netplan.bak.$(date +%F) 2>/dev/null sudo cp -a /etc/network/interfaces /etc/network/interfaces.bak.$(date +%F) 2>/dev/null Important note: the IP must live on the bridge (br0), not on the physical interface. The physical interface will be left without an IP and become a slave of the bridge. Option A: Netplan (modern Ubuntu/Debian) Applies to systems using Netplan (Ubuntu Server ≥ 18.04, Debian when migrated). The most common renderer is networkd, but NetworkManager can also be used. Here we configure br0 and enslave the physical interface to the bridge.

  • KVM
  • Virtualization
  • Libvirt
  • Networking
  • Linux
  • Bridge
Saturday, October 18, 2025 | 5 minutes Read
Navigation
  • About Me
  • Skills
  • Education
  • Recent Posts
  • Certifications
Contact me:
  • contacto@javiercd.es
  • javierasping
  • Francisco Javier Cruces Doval

Liability Notice: This theme is under MIT license. So, you can use it for non-commercial, commercial, or private uses. You can modify or distribute the theme without requiring any permission from the theme author. However, the theme author does not provide any warranty or takes any liability for any issue with the theme.


Toha Theme Logo Toha
© 2023 Copyright.
Powered by Hugo Logo