Hello everyone,
I've been struggling with a GNS3 VM issue for months and would appreciate your insights. Below I'll detail my troubleshooting efforts step-by-step:
Background:
Until recently, my GNS3 VM worked flawlessly on:
Windows 11 Home Edition
Victus by HP Laptop 16-d0xxx
Problem Timeline
Initial Error:
Suddenly started receiving "Virtualized Intel VT-x/EPT is not supported on this platform" without any configuration changes.
Upgrade Attempt:
Upgraded to Windows 11 Pro (current version: 10.0.26100 Build 26100) - no resolution.
Troubleshooting Steps Taken
1. Hyper-V/Virtualization Features Disabled
Turned off all virtualization-related features in:
Windows Features > Hyper-V, Virtual Machine Platform, Windows Hypervisor Platform
Executed PowerShell commands:
powershell
bcdedit /set hypervisorlaunchtype off
Disable-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V-All
Disable-WindowsOptionalFeature -Online -FeatureName VirtualMachinePlatform
2. Core Isolation & Memory Integrity
Disabled Memory Integrity in:
Windows Security > Core Isolation
3. Group Policy & Registry Edits
Group Policy (gpedit.msc):
Computer Configuration > Administrative Templates > System > Turn On Virtualization Security = Disabled
Registry Modifications:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Hypervisor\EnableHypervisor = 0
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\LSA\LsaCfgFlags = 0
4. Validation Checks
Hyper-V Status:
powershell
Get-WindowsOptionalFeature -Online -FeatureName Microsoft-Hyper-V
# Output: State = Disabled
System Information:
sysinfo returns:
"Hyper-V Requirements: A hypervisor was detected. Features required for Hyper-V will not be displayed."
5. Device Guard/Credential Guard Attempts
Tried disabling (unsuccessfully):
powershell
Disable-WindowsOptionalFeature -Online -FeatureName Windows-Defender-DefaultGuard
Disable-WindowsOptionalFeature -Online -FeatureName Windows-Defender-ApplicationGuard
Errors:
Feature name [...] is unknown
Device Guard Status Check:
powershell
Get-CimInstance -ClassName Win32_DeviceGuard -Namespace root\Microsoft\Windows\DeviceGuard
# Output shows VirtualizationBasedSecurityStatus = 2 (Enabled?)
Additional Checks
BIOS:
Virtualization (VT-x) remains enabled. No recent BIOS updates.
Cross-Platform Test:
Installed Linux + VMware Workstation 17 Pro (17.6.2). GNS3 VM works here, confirming hardware capability.
System Specs
Host OS: Windows 11 Pro 10.0.26100
Software:
GNS3 2.2.53/2.2.54
VMware Workstation 17 Pro
Hardware: HP Victus Laptop 16-d0xxx
Key Observations
The VM works under VMware but not natively, suggesting a Windows configuration conflict.
VirtualizationBasedSecurityStatus = 2 and Hypervisor detection persist despite disabling features.
Request:
Any insights into why Hyper-V components still appear active?
Could the Device Guard output indicate residual virtualization security?
Are there undocumented dependencies in Windows 11 24H2 (Build 26100)?
Thank you for your time!
Original Message:
Sent: Mar 13, 2022 11:26 PM
From: tkdreamer2
Subject: VMware Workstation does not support nested virtualization on this host. Module 'HV' power on failed
Hello
When trying to deploy a 64bits VM from VMware Workstation 16 hosted on a Windows 11 family edition, I have this error message:
"VMware Workstation does not support nested virtualization on this host.
Module 'HV' power on failed.
Virtualized Intel VT-x/EPT is disabled for this ESX virtual machine. You will only be able to run 32-bit nested virtual machines.
Failed to start the virtual machine."
VT is enabled and I tried everything written in the forums:
Verify Virtualization-based Security (VBS) is Enabled/Not Enabled:
1. Open msinfo32/system information on Windows 10
2. Under System Summary on the Right-hand page, scroll down to Virtualization-based Security and
ensure the Value is set to Not enabled.
3. If the value is set to enabled follow the steps given below according to disable Hyper-V.
1. Turn Off Hyper-V
- Go to "Turn Windows features on or off"
- Make sure Hyper-v is not ticked.
- If it is Ticked, untick it and click "Ok".
2. Open command prompt window as an administrator
- Run "bcdedit /enum {current}"
- Note down the hypervisorlaunchtype in case this needs to be reverted
- Run "bcdedit /set hypervisorlaunchtype off" to disable hypervisor Close the command prompt after executing the commands and restart the system.
And I have also done this: "make sure that Memory Integrity is OFF
Windows Security -> Device Security -> Core Isolation details"