This article describes how to enable MACVLAN in vSphere Client.
When using MACVLAN adapters within a Virtual Machine (VM) guest operating system, network traffic between VMs or to the external network may be dropped. This occurs because MACVLAN creates sub-interfaces with their own unique MAC addresses that differ from the VM's primary virtual NIC hardware address. By default, vSphere standard switches (VSS) and distributed switches (VDS) security policies prevent traffic from addresses not associated with the specific vNIC.
The default vSwitch security policy is designed to prevent MAC spoofing and unauthorized traffic. Because MACVLAN generates multiple MAC addresses behind a single virtual interface, the vSwitch drops the frames unless the security "Forged Transmits" and "Promiscuous Mode" policies are specifically configured to allow them.
To enable MACVLAN traffic, you must adjust the security settings on the Port Group or vSwitch where the VMs are connected. Follow these steps: