This section describes VMCI isolation mechanisms as they apply to VMware Workstation and ESXi hosts.ESX/ESXi 4.0 until ESXi 5.0 supported the ability to have several groups of virtual machines per physical host, where a virtual machine could see only the virtual machines that were a member of the same group. Groups were not hierarchical and could not overlap. Each host could belong to one or more VMCI domains, and guest virtual machines could see other virtual machines in the same domain, and the hypervisor context. Context IDs had to be unique across domains on the host. VMCI domains were specified in a virtual machine’s .vmx file – no user interface was provided to manage VMCI domains.
■ Linux – A process with the capability CAP_NET_ADMIN can create trusted endpoints.
■ ESXi – A system process with access privileges dgram_vsocket_trusted or stream_vsocket_trusted can create trusted datagram or stream sockets, respectively.The vSockets API also supports the notion of reserved ports (with port numbers under 1024), where a process must have capability CAP_NET_BIND_SERVICE so it can bind to a port within the reserved < 1024 port range. On Windows, only members of the Administrator group are allowed to bind to ports under 1024.