Forst,
KVM is an “Enterprise” virtualization technology.
That means that its defaults are generally optimized to be used in Production, with the security you’d expect to be in place for serious use… and that means that you won’t automatically be set up with the lax security you often find in technologies that target use on personal machines. If you want that kind of experience out of the box, you might be happier with Virtualbox or VMware Workstation and Player.
But,
If you’re set on using and learning KVM, then these kinds of issues should be just part of the learning experience.
I suspect you aren’t following a set guide when you set up the wheel account for your User.
I recommend you follow the SLES 11 SP4 KVM documentation for learning…
Although the installation for SLES is very different compared to openSUSE, once installed almost everything can be followed step by step. If you have specific questions about what you find in this guide, go ahead and post about that
https://www.suse.com/documentation/sles11/singlehtml/book_kvm/book_kvm.html
Later you can look at the SLES 12 SP3 KVM documentation, but I don’t recommend that for beginners… Some concepts are described differently, and IMO the SLES 11 documentation is more accurate.
And, also don’t recommend looking at the openSUSE LEAP virtualization documentation until you are experienced with what is in the SLES 11 documentation.
A few additional comments regarding specifics you described…
Bridge devices like virbr0 and br0 are security agnostic. Used correctly, they should be accessible by any Guest. The bridge devices themselves should never be “used” by anything other than a VM (even User accoutns) although to view and manage the devices <may> require elevated permissions. Your error can’t happen unless you’re trying to use the bridge device incorrectly.
To use a bridge device, nothing more should be required than to simply point/select to that device in the VM’s Network Properties.
Doing so exposes the features of the virtual or physical network associated with the device to the VM.
Then, from within the VM you should set up your networking as an ordinary wired adapter (typically eth0).
The Bridge device itself is completely invisible to the inside of the VM, and the OS should set up eth0 without any knowledge what is happeing outside the VM.
This is why I always recommend that a NAT bridge device be used for the first VM created by a new User… typically a NAT device will be configured with its own internal DHCP and the Guest only has to be set as a DHCP client and everything will “just work.”
On the other hand, many try to set up with br0 or create a new device with the same network bridging as a default br0… And then you can set up a DHCP client only if a DhCP server exists on the physical network which is often more than new Users can set up properly.
Maybe someone should write up a Wiki or insert in documentation a cookbook for KVM newbies describing the steps to do this…
TSU