Skip to main content

vSphere Distributed Switch Part 16 – Configuring dvPortGroup Security Settings

In this Post, I am going to explain in detail about the Security settings of dvPortGroup. Which works in exact way in both Standard and distributed switch. Only difference in the security settings between the standard switch and distributed switch is its default settings against the security policy.
Default Security Settings for all the below 3 settings (Promiscuous mode, MAC address changes & Forged Transmits is set to Reject)  in distributed Virtual Switch.
Promiscuous mode = Reject
 MAC address changes = Reject
 Forged Transmits = Reject
Default Security Settings of Standard Switch will be different than the dvswitch setting. In standard Switch, Below are the default settings:
Promiscuous mode = Reject
 MAC address changes = Accept
 Forged Transmits = Accept

Promiscuous Mode

Accept: If you set dvportgroup Security setting (Promiscuous mode to Accept), Virtual Machine adapter connect to this port group, will receive all frames passed on the switch in compliance with the VLAN policy of the port. This settings can only be useful in Firewalls, Intrusion detection systems and also in Packet capturing software. You can run packet capturing software like wireshark on the Guest operating system of the virtual machine connected to the port group with Promiscuous mode is set to Accept to capture the frames passing on that switch for network troubleshooting and analysis.
Reject: If you set dvportgroup Security setting (Promiscuous mode to Reject), Virtual Machine adapter will not receiving frames which is send for other virtual machines. By default, Promiscuous mode is set to reject. Don’t set it to Accept unless and until it is required. Enabling promiscuous mode without any prominent use will create a unnecessary load on the virtual machines.

MAC Address Changes

MAC address is a unique number assigned to networking components like Network adapters. Each virtual machine will be assigned with atleast one virtual network adapter (vNIC). each vNIC will be assigned with a MAC address when VM powers on first time. MAC address of the Virtual network adapter will be saved in the virtual machine configuration file (.VMX).which will be stored in the virtual machine directory on your datastore. The MAC address which is saved in .VMX file aslo termed as Initial address.
 Usually this initial address will be copied by the Guest operating system to the network adapters as effective address unless you have bind some other MAC address at Guest OS level. Binding MAC address at Guest OS level will be useful when performing the P2V migration of the physical server in which installed application license is bind to the MAC address of physical host. This application will not work with other MAC address. In that case ,you can manually assign MAC address to network adapter inside the Guest operating system.
Runtime address is the address which is viewed by a port on the virtual switch. Runtime address will be same as the effective address which is assigned by Guest operating system.
Accept: If you set MAC Address Changes policy to accept and the guest operating system changes the MAC address of a  virtual network adapter other than the address specified in the .VMX (virtual machine configuration file)(Initial address), The switch allows the  inbound frames to pass with the new address.  In other terms, If initial address is not same the effective address,this policy allows the frames to pass the switch if this security policy is set as Accept.
Reject: If you set MAC Address changes to Reject and the Guest operating system changes the MAC address of the virtual network adapter other than the address specified in the .VMX file (Initial address), the switch drops all the inbound frames to that virtual machine adapter In other terms,. If initial address is not same the effective address,it does not allow incoming traffic to the VM.

Forged Transmits

Forged Transmits works as same as the MAC address changes policy. Only difference is it works on Outgoing traffic whereas MAC address changes works on Incoming traffic
Accept: If the Forged Transmits is set to Accept, Switch does not perform any security filtering and permits all the outbound frames from the virtual machine network adapter even if the source MAC address is different from the one saved in virtual machine configuration file (.VMX)
Reject: If the Forged Transmits is set to Reject, Switch drops any outbound frames from the virtual machine network adapter, if the source MAC address is different from the one saved in virtual machine configuration file.
I hope this is informative for you. Thanks for Reading!!!.

Comments

Popular posts from this blog

Quick Guide to VCF Automation for VCD Administrators

  Quick Guide to VCF Automation for VCD Administrators VMware Cloud Foundation 9 (VCF 9) has been  released  and with it comes brand new Cloud Management Platform –  VCF Automation (VCFA)  which supercedes both Aria Automation and VMware Cloud Director (VCD). This blog post is intended for those people that know VCD quite well and want to understand how is VCFA similar or different to help them quickly orient in the new direction. It should be emphasized that VCFA is a new solution and not just rebranding of an old one. However it reuses a lot of components from its predecessors. The provider part of VCFA called Tenenat Manager is based on VCD code and the UI and APIs will be familiar to VCD admins, while the tenant part inherist a lot from Aria Automation and especially for VCD end-users will look brand new. Deployment and Architecture VCFA is generaly deployed from VCF Operations Fleet Management (former Aria Suite LCM embeded in VCF Ops. Fleet Management...
  Issue with Aria Automation Custom form Multi Value Picker and Data Grid https://knowledge.broadcom.com/external/article?articleNumber=345960 Products VMware Aria Suite Issue/Introduction Symptoms: Getting  error " Expected Type String but was Object ", w hen trying to use Complex Types in MultiValue Picker on the Aria for Automation Custom Form. Environment VMware vRealize Automation 8.x Cause This issue has been identified where the problem appears when a single column Multi Value Picker or Data Grid is used. Resolution This is a known issue. There is a workaround.  Workaround: As a workaround, try adding one empty column in the Multivalue picker without filling the options. So we can add one more column without filling the value which will be hidden(there is a button in the designer page that will hide the column). This way the end user will receive the same view.  
  "Cloud zone insights not available yet, please check after some time" message on Aria Automation https://knowledge.broadcom.com/external/article?articleNumber=314894 Products VMware Aria Suite Issue/Introduction Symptoms: The certificate for Aria operations has been replaced since it was initially added to Aria Automation as an integration. When accessing the Insights pane under  Cloud Assembly  ->  Infrastructure  ->  Cloud Zone  ->  Insights  the following message is displayed:   "Cloud zone insights not available yet, please check after some time." The  /var/log/services-logs/prelude/hcmp-service-app/file-logs/hcmp-service-app.log  file contains ssl errors similar to:   2022-08-25T20:06:43.989Z ERROR hcmp-service [host='hcmp-service-app-xxxxxxx-xxxx' thread='Thread-56' user='' org='<org_id>' trace='<trace_id>' parent='<parent_id>' span='<span_id>'] c.v.a.h.a.common.AlertEnu...