Information Technology Reference
In-Depth Information
Examine the options for third-party virtual switches in your environment. In addition
to the vSphere Standard Switch and the vSphere Distributed Switch, vSphere also supports a
number of third-party virtual switches. These third-party virtual switches support a range of
features.
Master It What three third-party virtual switches are, at the time of this topic's writing,
available for vSphere environments?
Coni gure virtual switch security policies. Virtual switches support security policies
for allowing or rejecting Promiscuous mode, allowing or rejecting MAC address changes,
and allowing or rejecting forged transmits. All of the security options can help increase
layer 2 security.
Master It You have a networking application that needs to see trafi c on the virtual net-
work that is intended for other production systems on the same VLAN. The networking
application accomplishes this by using Promiscuous mode. How can you accommodate
the needs of this networking application without sacrii cing the security of the entire vir-
tual switch?
Master It Another vSphere administrator on your team is trying to coni gure the se-
curity policies on a distributed switch but is having some difi culty. What could be the
problem?
Search WWH ::




Custom Search