vNetwork : reject-promiscuous-mode-StandardSwitch

Information

Ensure that the "Promiscuous Mode" policy is set to reject

When promiscuous mode is enabled for a virtual switch all virtual machines connected to the Portgroup have the potential of reading all packets across that network, meaning only the virtual machines connected to that Portgroup. Promiscuous mode is disabled by default on the ESXI Server, and this is the recommended setting. However, there might be a legitimate reason to enable it for debugging, monitoring or troubleshooting reasons. Security devices might require the ability to see all packets on a vSwitch. An exception should be made for the Portgroups that these applications are connected to, in order to allow for full-time visibility to the traffic on that Portgroup. Promiscous mode can be set at the vSwitch and/or the Portgroup level. You can override switch level settings at the Portgroup level.

http://pubs.vmware.com/vsphere-65/topic/com.vmware.vsphere.security.doc/GUID-92F3AB1F-B4C5-4F25-A010-8820D7250350.html

Solution

From the vSphere Web Client select the host and click "Configure" -> "Networking" -> "Virtual Switches". For each virtual switch and for each port group within that virtual switch, click Edit. Go to "Security" and set the "Promiscuous Mode" to "Reject".

See Also

https://www.vmware.com/content/dam/digitalmarketing/vmware/en/files/xls/vmware-6-5-update-1-security-configuration-guide.xlsx

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(12)

Plugin: VMware

Control ID: b379ceb259f1d307db734459f12f82310c5484c893e02039f23ffd07a9e3fdce