Administrators managing an NSX environment may experience a unidirectional multicast failure where outbound traffic from a virtual machine drops before reaching the physical underlay.
While inbound multicast streams from physical devices successfully reach the virtualized workloads, VMs cannot send multicast traffic outward.
This control plane disconnect typically occurs when physical switches are configured with IGMP Snooping but lack an active IGMP Querier to manage group memberships. Consequently, the physical Top-of-Rack switches prune or age out the ports, silencing outbound traffic. The configuration of the vSphere Distributed Switch (vDS) must also correctly process IGMP control packets to ensure host uplinks are properly registered.
For example, when sending multicast traffic from a physical workstation to a VM in a VxRail cluster using NSX 4.2.3.3, it works correctly; however, traffic from the VM to the physical workstation fails (no traffic received). Multicast traffic functions correctly when sent from physical devices to virtual machines in a VxRail/NSX cluster, but fails (no traffic received) when originating from a VM to a physical destination.
When you send multicast traffic from a physical DT to a VM... it works correctly, however, when we send multicast traffic from VM to the physical DT it doesn’t work.
| Direction | Status | Context |
|---|---|---|
| Physical → VM | 🟢 Success | Inbound traffic is forwarded by physical switches. |
| VM → Physical | 🔴 Failure | Virtual switch prunes traffic due to missing IGMP Querier. |
The virtual switch (vDS/NSX Segment) prunes outbound multicast traffic when it fails to detect an active IGMP Querier on the physical network.
The virtual switch requires an active IGMP Querier to maintain a list of physical receivers. Without queries, the switch assumes no listeners exist on the physical network and prunes the traffic to prevent unnecessary flooding.
This behavior is by design for IGMP Snooping environments. To resolve, configure an active IGMP Querier. See the VMware NSX Administration Guide for architectural requirements
To resolve the outbound multicast traffic failure, network administrators must configure IGMP Snooping and an active IGMP Querier on the physical Layer 2/Layer 3 underlay devices providing connectivity to the ESXi host transport nodes.
To verify that the NSX configuration is properly established and not contributing to the issue, perform the following operational validation checks:
1. Gateway Configuration Validation (NSX Manager UI)
Tier-0 Gateway Checks:
Tier-1 Gateway Checks:
2. NSX Segment Verification
Verify the MAC Discovery segment profile applied to your multicast-enabled segments has IGMP Snooping enabled:
3. Physical Underlay Validation
Verify that the physical Top of Rack (ToR) Layer 2 switches connected to the ESXi host transport nodes are properly configured:
For further information regarding multicast routing and segment profiles, refer to the VMware NSX Administration Guide.
For instructions on how to perform packet captures in NSX, refer to KB 345925 Troubleshooting NSX using Packet Captures