This section provides information on unique use cases and the recommended configurations.
Use Case 1: Default (No VPN and no Bridging function on a virtual machine)
On the Virtual Switch:
- Under Security Properties of the port group, change Forged Transmit to Reject. This configuration stops the BPDU frames going out to the physical switch ports.
On the Physical Switch:
- Keep the PortFast and BPDU guard configuration.
Use Case 2: To resolve the issue of VPN deployment on a virtual machine, you must do these configuration changes:
On the Virtual Switch
- Under Security Properties of the port group, change Forged Transmit to Accept. This configuration allows the BPDU frames to go out on the physical switch ports.
On the Physical Switch
- Keep the PortFast configuration.
- Configure BPDU filter on individual physical switch port. With this configuration, when a BPDU is received on the physical port, those packets are filtered out. Do not configure BPDU filter globally. If configured globally, the PortFast mode is disabled and all physical switch ports perform full STP functions.
Use Case 3: Bridge
Bridge running on a virtual machine with two vnics connected to the same layer 2 network. This is the suggested configuration with such deployments.
On the Virtual Switch
- Under Security Properties of the port group, change Forged Transmit to Accept. This configuration allows the BPDU frames to go out on the physical switch ports.
On the Physical Switch
- Do not choose PortFast configuration. Run STP on the ports where the virtual bridge device is connected to the external switch ports.
- Do not choose BPDU guard or BPDU filter.
Use Case 4: In Security Vulnerability cases, this configuration protects from any DoS attack
On the Virtual Switch
- Under security properties of the port group, change Forged Transmit to Reject. This configuration stops the BPDU frames that go out on the physical switch ports with different source MAC address.
On the Physical Switch
- Keep the PortFast configuration.
- Configure BPDU filter on an individual physical switch port. With this configuration, when a BPDU is received on the physical port, those packets are filtered out. Do not configure BPDU filter globally. If configured globally, the PortFast mode is disabled and all physical switch ports perform full STP functions.
Some customers may experience more than one of the issues described in the use cases while running in their virtual infrastructure. These customers can support various use cases by creating different port group configurations for each use case. Customers can define the security specific configuration such as Forged Transmit as Reject or Accept per port group. Depending on the physical switch port configuration requirements, customers can assign the same or different physical NICs to these port groups.
For example, if customers have default use cases 1 and 2 in their environment, they can create two different port groups and configure the Forged Transmit Reject on one port group and Forged Transmit Accept on another. Due to the separate configuration required on the physical switch port side, customers have to associate different physical NICs with the different port groups in this deployment.