6.0

Table Of Contents
8 Expand Security and accept or reject promiscuous mode, MAC address changes, and forged transmits
of the virtual machines aached to the standard switch.
Option Description
Promiscuous mode
n
Reject. The VM network adapter receives only frames that are
addressed to the virtual machine.
n
Accept.The virtual switch forwards all frames to the virtual machine in
compliance with the active VLAN policy for the port to which the VM
network adapter is connected.
N Promiscuous mode is insecure mode of operation. Firewalls, port
scanners, intrusion detection systems, must run in promiscuous mode.
MAC address changes
n
Reject. If the guest OS changes the eective MAC address of the
virtual machine to a value that is dierent from the MAC address of
the VM network adapter (set in the .vmx conguration le), the switch
drops all inbound frames to the adapter.
If the guest OS changes the eective MAC address of the virtual
machine back to the MAC address of the VM network adapter, the
virtual machine receives frames again.
n
Accept. If the guest OS changes the eective MAC address of the
virtual machine to a value that is dierent from the MAC address of
the VM network adapter, the switch allows frames to the new address
to pass.
Forged transmits
n
Reject. The switch drops any outbound frame from a virtual machine
adapter with a source MAC address that is dierent from the one in
the .vmx conguration le.
n
Accept. The switch does not perform ltering, and permits all
outbound frames.
9 (Optional) Expand NIC teaming and congure the following components.
Option Description
Load Balancing
Specify how to choose an uplink.
n
Route based on IP hash. Choose an uplink based on a hash of the
source and destination IP addresses of each packet. For non-IP packets,
whatever is at those osets is used to compute the hash.
n
Route based on source MAC hash. Choose an uplink based on a hash
of the source Ethernet.
n
Route based on originating port ID. Choose an uplink based on the
originating port ID.
n
Use explicit failover order. Always use the highest order uplink from
the list of Active adapters which passes failover detection criteria.
N IP-based teaming requires the physical switch to be congured
with etherchannel. For all other options, etherchannel must be disabled.
Network Failover Detection
Specify the method to use for failover detection.
n
Link Status only. Relies only on the link status that the network
adapter provides. This option detects failures, such as cable pulls and
physical switch power failures, but not conguration errors, such as a
physical switch port being blocked by spanning tree or that is
miscongured to the wrong VLAN or cable pulls on the other side of a
physical switch.
n
Beacon only. Sends out and listens for beacon probes on all NICs in
the team and uses this information, in addition to link status, to
determine link failure. This detects many of the failures previously
mentioned that are not detected by link status alone.
N Do not use beacon probing with IP-hash load balancing.
Chapter 5 Networking in the VMware Host Client
VMware, Inc. 115