"net-dvs -l" displays: com.vmware.vswitch.port.security = 0x 5. 0 vsish -e get /net/portsets/<dvs_portset>/ports/<port_id>/inputStats
example output (snip):
FILTER <vswitch-l2sec:0x0>
pktsStarted:16407
pktsPassed:16407
pktsDropped:432VMware vSphere ESX 8.0
The allow forged transmits setting is not propagated properly to the host itself so the setting is effectively set to "Deny". Therefore when a guest OS or application in a VM acts in a way related to the policy, such as forging a MAC address it is detected as a violation and packet is dropped or port blocked.