Network XML format
This page provides an introduction to the network XML format. For background information on the concepts referred to here, consult the network driver architecture page.
Element and attribute overview
The root element required for all virtual networks is
named network
and has no attributes.
General metadata
The first elements provide basic metadata about the virtual network.
<network> <name>default</name> <uuid>3e3fce45-4f53-4fa7-bb32-11f34168b82b</uuid> ...
name
- The content of the
name
element provides a short name for the virtual network. This name should consist only of alpha-numeric characters and is required to be unique within the scope of a single host. It is used to form the filename for storing the persistent configuration file. uuid
- The content of the
uuid
element provides a globally unique identifier for the virtual network. The format must be RFC 4122 compliant, eg3e3fce45-4f53-4fa7-bb32-11f34168b82b
. If omitted when defining/creating a new network, a random UUID is generated.
Connectivity
The next set of elements control how a virtual network is provided connectivity to the physical LAN (if at all).
... <bridge name="virbr0" /> <forward type="nat"/> ...
bridge
- The
name
attribute on thebridge
element defines the name of a bridge device which will be used to construct the virtual network. The virtual machines will be connected to this bridge device allowing them to talk to each other. The bridge device may also be connected to the LAN. It is recommended that bridge device names started with the prefixvir
, but the namevirbr0
is reserved for the "default" virtual network. This element should always be provided when defining a new network forward
- Inclusion of the
forward
element indicates that the virtual network is to be connected to the physical LAN. If no attributes are set, NAT forwarding will be used for connectivity. Firewall rules will allow forwarding to any other network device whether ethernet, wireless, dialup, or VPN. If thedev
attribute is set, the firewall rules will restrict forwarding to the named device only. If thetype
attribute is set toroute
then the traffic will not have NAT applied. This presumes that the local LAN router has suitable routing table entries to return traffic to this host.
Addressing
The final set of elements define the IPv4 address range available, and optionally enable DHCP sevices.
... <ip address="192.168.122.1" netmask="255.255.255.0"> <dhcp> <range start="192.168.122.2" end="192.168.122.254" /> </dhcp> </ip> </network>
ip
- The
address
attribute defines an IPv4 address in dotted-decimal format, that will be configured on the bridge device associated with the virtual network. To the guests this address will be their default route. Thenetmask
attribute defines the significant bits of the network address, again specified in dotted-decimal format. dhcp
- Immediately within the
ip
element there is an optionaldhcp
element. The presence of this element enables DHCP services on the virtual network. It will further contain one or morerange
elements. range
- The
start
andend
attributes on therange
element specify the boundaries of a pool of IPv4 addresses to be provided to DHCP clients. These two addresses must lie within the scope of the network defined on the parentip
element.
Example configuration
NAT based network
This example is the so called "default" virtual network. It is provided and enabled out-of-the-box for all libvirt installations. This is a configuration that allows guest OS to get outbound connectivity regardless of whether the host uses ethernet, wireless, dialup, or VPN networking without requiring any specific admin configuration. In the absence of host networking, it at least allows guests to talk directly to each other.
<network> <name>default</name> <bridge name="virbr0" /> <forward type="nat"/> <ip address="192.168.122.1" netmask="255.255.255.0"> <dhcp> <range start="192.168.122.2" end="192.168.122.254" /> </dhcp> </ip> </network>
Routed network config
This is a variant on the default network which routes traffic
from the virtual network to the LAN without applying any NAT.
It requires that the IP address range be pre-configured in the
routing tables of the router on the host network. This example
further specifies that guest traffic may only go out via the
eth1
host network device.
<network> <name>local</name> <bridge name="virbr1" /> <forward type="route" dev="eth1"/> <ip address="192.168.122.1" netmask="255.255.255.0"> <dhcp> <range start="192.168.122.2" end="192.168.122.254" /> </dhcp> </ip> </network>
Isolated network config
This variant provides a completely isolated private network
for guests. The guests can talk to each other, and the host
OS, but cannot reach any other machines on the LAN, due to
the omission of the forward
element in the XML
description.
<network> <name>private</name> <bridge name="virbr2" /> <ip address="192.168.152.1" netmask="255.255.255.0"> <dhcp> <range start="192.168.152.2" end="192.168.152.254" /> </dhcp> </ip> </network>