I am a little confused as to if this is the right question, but I have a number of KVM hosts with multiple bridges on (sometimes)bonded interfaces, and each bridge is mapped to its own distinct VLAN.
(A KVM host can have possibly a router guest, a load balancer guest, and maybe a dns server, and internal server guests on them, each to its own bridge).
KVM host OSes are CentOS 6-8. Guests are any Linux OS that is necessary. The network switches are Cisco 2960s, configured with trunks for the KVM hosts connections.
Ive noticed when I am doing things like tcpdump, or even looking at traffic between internal and external switches, I find MAC addresses and internal IPs that I feel shouldn't be visible.
(eg, some of the kvm guests are routers, and are bridged to VLANs that have access to an external switch, in order to reach internet/external resources, and some are load balancers, and some run NTOPNG/traffic sniffers).
In effect guests on different VLAN bridges can see/receive traffic not meant for them, and I see internal traffic on external switches.
Is there a way of preventing the guests from seeing traffic not meant for their bridge? Is this wise?