SV-239313r674868_rule
V-239313
SRG-OS-000480-VMM-002000
ESXI-67-000059
CAT II
10
From the vSphere Client, go to Configure >> Networking >> Virtual Switches.
For each virtual switch and port group, click Edit settings (dots) and change "Forged Transmits" to reject.
or
From a PowerCLI command prompt while connected to the ESXi host, run the following commands:
Get-VirtualSwitch | Get-SecurityPolicy | Set-SecurityPolicy -ForgedTransmits $false
Get-VirtualPortGroup | Get-SecurityPolicy | Set-SecurityPolicy -ForgedTransmitsInherited $true
From the vSphere Client, go to Configure >> Networking >> Virtual Switches.
View the properties on each virtual switch and port group and verify "Forged Transmits" is set to reject.
or
From a PowerCLI command prompt while connected to the ESXi host, run the following commands:
Get-VirtualSwitch | Get-SecurityPolicy
Get-VirtualPortGroup | Get-SecurityPolicy
If the "Forged Transmits" policy is set to accept (or true, via PowerCLI), this is a finding.
V-239313
False
ESXI-67-000059
From the vSphere Client, go to Configure >> Networking >> Virtual Switches.
View the properties on each virtual switch and port group and verify "Forged Transmits" is set to reject.
or
From a PowerCLI command prompt while connected to the ESXi host, run the following commands:
Get-VirtualSwitch | Get-SecurityPolicy
Get-VirtualPortGroup | Get-SecurityPolicy
If the "Forged Transmits" policy is set to accept (or true, via PowerCLI), this is a finding.
M
5326