Mac Address Spoofing broken in Hyper-V 2019 RRS feed

  • General discussion

  • I believe we have come accross a bug in Windows Server 2019 Hyper-V.
    Does anyone in here know how to report this to Microsoft?

    To make some virtual network appliances work, we need to activate the function "Mac Address Spoofing" on the vNIC of the VM's internal interface.

    This is needed for VPLS setup and for a VPN concentrator setup.

    The function is working, but with highly reduced performance, especially upload goes from 800 Mbit/s to 30 Mbit/s, and ping latency from 1-2 ms to 5-8 ms.

    We have tried Mikrotik routers, pfSense, SoftEther on Windows, and we even set up a Windows Server as a router, and the issue is present i all cases.

    It only appears then the VM acts as a router, that is traffic coming in through one interface and out through another, and only when Mac Address Spoofing is activated.

    We have tried similar setup on VMware where the similar setup requires something called "promiscuous mode", and it works fne with the same VM's.

    To make the test complete, we also tested with a Server 2016 Hyper-V, and that works as well.

    So Mac Address Spoofing Works in Windows server Hyper-V 2016, but not in Windows server Hyper-V 2019.

    Best regards, Ulrich - novaram

    Wednesday, August 14, 2019 12:54 PM

All replies


    Simply call Microsoft and open a support case.  If Microsoft determines that it is a bug and not a configuration issue, they will not charge you for it.


    Wednesday, August 14, 2019 1:48 PM
  • Hi Tim,

    Thank you for that. I cannot find a phone number on, only a wizzrd to create a ticket, and it wants me to pay for creating a ticket.

    can you help me get a nnumber for them?

    Thank you


    Best regards, Ulrich - novaram

    Wednesday, August 14, 2019 1:59 PM
  • Yes, you create a ticket.  If it is a bug, they don't charge you.


    Thursday, August 15, 2019 1:55 PM