root nsxdp-cli vswitch instance list |grep -i <vm-name>pktcap-uw -- switchport <switch-port-id>-- capture VnicRx, VnicTx -c 15 -o- | tcpdump-uw -r - -nnee 16:18:21.270870 <Source MAC Address> > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has <Destination IP Address> tell <Source-IP-Address>, length 46
16:18:21.430823 <Source MAC Address> > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has <Destination IP Address> tell <Source-IP-Address>, length 46
16:18:21.620257 <Source MAC Address> > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has <Destination IP Address> tell <Source-IP-Address>, length 46
16:18:22.077921 <Source MAC Address> > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has <Destination IP Address> tell <Source-IP-Address>, length 46
16:18:22.226125 <Source MAC Address> > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has <Destination IP Address> tell <Source-IP-Address>, length 46
16:18:22.273179 <Source MAC Address> > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 60: Request who-has <Destination IP Address> tell <Source-IP-Address>, length 46
pktcap-uw --switchport <switch-port-id> --trace 'MAC Forgery Drop' and Drop Function is 'L2Sec_FilterSrcMACForgeries'VMware NSX 3.2.2
Networking -->Segments --> Edit the specific Segment --> Go to the Segment Profiles and verify the "MAC discovery segment profile" used.
This issue is resolved in VMware NSX 3.2.3, 4.1.2 and above available at Broadcom downloads.