7.3.3 Ensure that the vSwitch Promiscuous Mode policy is set to reject

Information

http://kb.vmware.com/kb/1004099

Solution

Using the vSphere Client, connect to the vCenter Server and as administrator-1. Go to 'Home > Inventory > Hosts and clusters'.
2. Select each ESXi host with active virtual switches connected to active VM's requiring
securing.
3. Go to tab 'Configuration > Network > vSwitch name > Properties > Ports > vSwitch >
Default Policies > Security'
4. Set 'Promiscuous Mode' = 'Reject'Additionally, perform the following to implement the recommended configuration state via
the ESXi shell-# esxcli network vswitch standard policy security set -v vSwitch2 -p false

Impact-Security devices that require the ability to see all packets on a vSwitch will not operate
properly if the Promiscuous Mode parameter is set to Reject.

Default Value-The prescribed state is the default state.

See Also

https://workbench.cisecurity.org/files/902

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(12), CSCv6|9.2

Plugin: VMware

Control ID: 3e954345ebfbfa336ee6e5af50e210cf3edf95db0956e68c1b754b4ee08f1237