VMware NSX
In a NIC teamed environment where multiple uplinks are configured for a virtual switch and a port channel or LACP is not configured on the physical switch, the vSwitch will receive a multicast or broadcast packet from the physical network on each vSwitch uplink in the NIC team. All traffic received by the vSwitch will be forwarded to the NSX segment in promiscuous mode so the virtual machine guest OS will receive multiple multicast or broadcast packets.
For more information on promiscuous mode, see How promiscuous mode works at the virtual switch and portgroup levels
To configure the requested security and traffic settings in NSX (4.x/5.x/9.x), you must modify two distinct segment profiles: the Segment Security Profile and the MAC Discovery Profile.
Enable Promiscuous Mode, MAC Changes, and Forged Transmits
These settings are part of the Segment Security Profile.
You can edit the default-segment-security-profile (not recommended) or click Add Segment Security Profile to create a new one.
Disable Unknown Unicast Flooding
This setting is managed within the MAC Discovery Profile.
While still in Networking > Segments > Segment Profiles, click the MAC Discovery tab.
Note: Disabling this prevents the segment from flooding frames with unknown destination MACs to all ports, which is often used to prevent traffic storms
Apply Profiles to the Segment
The settings will not take effect until the profiles are attached to your specific segment.
If multiple physical ports/uplinks exist on the same vSwitch, then the Net.ReversePathFwdCheckPromisc option must be enabled in order to work around a vSwitch bug where the multicast traffic loops back to the host, which causes the CARP to not function with link states coalesced messages.
Complete these steps in order to modify the Net.ReversePathFwdCheckPromisc option:
Complete these steps for each VMware host where the vms will be executed, especially if it is an ESXi cluster:
In order for the setting to take effect, promiscuous mode must be toggled off and on (portgroup level). An operation such as a guest OS reboot or a vMotion to another ESXi host with the /Net/ReversePathFwdCheckPromisc setting enabled is sufficient.
Note: The setting does not require a reboot of the ESXi host to take effect.
This setting will discard packets coming from uplinks that are not associated with the particular client when promiscuous mode is enabled and will prevent duplicate packets from being received by the guest operating system.