6.7

Table Of Contents
n
Disable Traffic Filtering and Marking on a Distributed Port or Uplink Port
Disable the traffic filtering and marking policy on a port to let traffic flow to a virtual machine or a
physical adapter without filtering for security or marking for QoS.
Enable Trac Filtering and Marking on a Distributed Port or Uplink Port
Enable the traffic filtering and marking policy on a port to configure traffic security and marking on a virtual
machine network adapter, VMkernel adapter, or uplink adapter.
Prerequisites
To override a policy on distributed port level, enable the port-level override option for this policy. See
Configure Overriding Networking Policies on Port Level.
Procedure
1 Navigate to a distributed switch and then navigate to a distributed port or an uplink port.
n
To navigate to the distributed ports of the switch, click Networks > Distributed Port Groups,
double-click a distributed port group from the list, and click the Ports tab.
n
To navigate to the uplink ports of an uplink port group, click Networks > Uplink Port Groups,
double-click an uplink port group from the list, and click the Ports tab.
2 Select a port from the list.
3 Click Edit distributed port settings.
4 Select Traffic filtering and marking.
5 Select the Override check box, and from the Status drop-down menu, select Enabled.
6 Click OK.
What to do next
Set up traffic filtering or marking for the data flowing through the distributed port or through the uplink port.
See Mark Traffic on a Distributed Port or Uplink Port and Filter Traffic on a Distributed Port or Uplink Port.
Mark Trac on a Distributed Port or Uplink Port
Assign priority tags in a rule for traffic that needs special treatment such as VoIP and streaming video.
You can mark the traffic for a virtual machine, VMkernel adapter, or physical adapter with a CoS tag in
Layer 2 of the network protocol stack or with a DSCP tag in Layer 3.
Priority tagging is a mechanism to mark traffic that has higher QoS demands. In this way, the network can
recognize different classes of traffic. The network devices can handle the traffic from each class
according to its priority and requirements.
You can also re-tag traffic to either raise or lower the importance of the flow. By using a low QoS tag, you
can restrict data tagged in a guest operating system.
vSphere Networking
VMware, Inc. 123