6.7

Table Of Contents
The security policy of a standard or distributed switch is implemented in Layer 2 (Data Link Layer) of the
network protocol stack. The three elements of the security policy are promiscuous mode, MAC address
changes, and forged transmits. See the vSphere Security documentation for information about potential
networking threats.
Configure the Security Policy for a vSphere Standard Switch or
Standard Port Group
For a vSphere standard switch, you can configure the security policy to reject MAC address and
promiscuous mode changes in the guest operating system of a virtual machine. You can override the
security policy that is inherited from the standard switch on individual port groups.
Procedure
1 In the vSphere Web Client, navigate to the host.
2 On the Configure tab, expand Networking and select Virtual switches.
3 Navigate to the Security policy for the standard switch or port group.
Option Action
vSphere Standard Switch a Select a standard switch from the list.
b Click Edit settings.
c Select Security.
Standard port group a Select the standard switch where the port group resides.
b In the topology diagram, select a standard port group.
c Click Edit settings.
d Select Security and select Override next to the options to override.
vSphere Networking
VMware, Inc. 107