- A VM is experiencing network connectivity loss when attached to a distributed portgroup that has "MAC address changes", "Promiscuous mode" or "Forged transmits" set to "Accept".
- The VM, or an application on the VM, is intentionally operating in a way that would require one or more of the security policies to be enabled, such as a MAC address requesting to be changed from within the guest OS for CARP/VIP failover.
- The logs show the VM's port is blocked due to a L2 security violation - despite the configuration in the vCenter UI showing the policy for such changes is set to "Accept."

- Example logs in the vmkernel.log file:
cpu#:cccc)etherswitch: L2Sec_EnforcePortCompliance: client <vmname> requested mac address change to <mac> on port 0x# #######, disallowed by vswitch policy
cpu#:cccc)etherswitch: L2Sec_EnforcePortCompliance: client <vmname> has policy violations on port 0x#######. Port is blocked
- "net-dvs -l " command output shows the effective parameters: deny mac change and Allow Mac Change = False
com.vmware.vswitch.port.security = deny promiscuous; deny mac change; deny forged frames
propType = POLICY
com.vmware.vswitch.port.macManagement:
Allow MAC Change = False
MAC Learning = False
Unknown Unicast Flooding = False
MAC Limit = 4096
MAC Limit Policy = ALLOW
propType = CONFIG