6.5.1

Table Of Contents
2 Navigate to the Security policy for the distributed port group or port.
Option Action
Distributed port group a From the Actions menu, select Distributed Port Group > Manage
Distributed Port Groups.
b Select Security.
c Select the port group and click Next.
Distributed port a On the Networks tab, click Distributed Port Groups and double-click a
distributed port group .
b On the Ports tab, select a port and click the Edit distributed port settings
icon.
c Select Security.
d Select Override next to the properties to override.
3 Reject or accept promiscuous mode activation or MAC address changes in the guest operating
system of the virtual machines attached to the distributed port group or port.
Option Description
Promiscuous mode
n
Reject. The VM network adapter receives only frames that are addressed to
the virtual machine.
n
Accept.The virtual switch forwards all frames to the virtual machine in
compliance with the active VLAN policy for the port to which the VM network
adapter is connected.
Note Promiscuous mode is insecure mode of operation. Firewalls, port
scanners, intrusion detection systems, must run in promiscuous mode.
MAC address changes
n
Reject. If the guest OS changes the effective MAC address of the virtual
machine to a value that is different from the MAC address of the VM network
adapter (set in the .vmx configuration file), the switch drops all inbound
frames to the adapter.
If the guest OS changes the effective MAC address of the virtual machine
back to the MAC address of the VM network adapter, the virtual machine
receives frames again.
n
Accept. If the guest OS changes the effective MAC address of the virtual
machine to a value that is different from the MAC address of the VM network
adapter, the switch allows frames to the new address to pass.
Forged transmits
n
Reject. The switch drops any outbound frame from a virtual machine adapter
with a source MAC address that is different from the one in the .vmx
configuration file.
n
Accept. The switch does not perform filtering, and permits all outbound
frames.
4 Review your settings and apply the configuration.
Trac Shaping Policy
A traffic shaping policy is defined by average bandwidth, peak bandwidth, and burst size. You can
establish a traffic shaping policy for each port group and each distributed port or distributed port group.
vSphere Networking
VMware, Inc. 112