Base security qeustion port

The environment I work uses the following

In addition to switchport

In addition to switchport max #.

switchport addition time age 2

and in my CCNA class, they talk with switchport port-security sticky mac (may or may not be good syntax). This sticky command should be activate commands above for correct use or it is enabled by default for the switch learns the address and forget about in 2 minutes.

Yes as soon as 3 macs are seen the port closes, also you must use err - disable recovery psecure-violation and violation of security so when it arrives the port stops but when the mac 3 is removed the port back upwards in the case otherwise you'll go around manually bringing the ports backonline

I wouldn't sticking in your scenario, sticky learns dynamic Mac put in the safe basically array making it static as well as 2 and is it will be able to join until you clear the port security, without sticky all continuous 2 macs will be able to reach the port. It depends on if you know the first 2 macs that reach the port will always be there so sticky is good if different Mac constantly join but only 2 at a time while he use not sticky

Tags: Cisco Security

Similar Questions

  • Table of base security in application of ADF/FACES

    Hi people, can someone point me in the right direction to implement the base table of database security in an ADF/FACES application that must be deployed on Apache/Tomcat. I have seen a few articles on WLS, but this is obviously not very applicable. Maintenance/user role has been designed in the application on a self-service basis, what I'm struggling with is how to implement these roles in the ADF security.

    The reason would be that WLS is the only platform supported for deployment of applications of 11g ADF

    John

  • Make a PC to connect to a range extender without having to re - enter the router base security code each time.

    An Extender from Netgear, I installed and it works well, except that whenever I want to connect my PC I have to enter long the router security code.  Somehow, my PC says that when I connect to my PC to the router system (directly, without going through the extender).  How can I make the connection extender remember whenever I want to connect to it so that I don't have re - enter it each time?

    Hello

    Welcome to the Microsoft community.

    I understand that you have a question about connecting to the router without going the router security code.

    There is an option to remove the security code, but the settings differ from different service provider and the model.

    I ask you to communicate with the respective forum NETGEAR support for assistance.

    http://forum1.NETGEAR.com/

    You can also contact the Internet service provider for more help on this issue.

    Hope this information helps you. If you have any further questions with Windows, feel free to answer us.

    Thank you.

  • Dynamic context menu and the base security

    Hi gurus,

    I have a case, where I want to put the role and the menu access on the database.

    I saw edwin biemond tutorial to create a navigation page that is based on the database role.

    but in this tutorial, I realize that still can access another page that are not show in the page navigation (menu)

    so, how can I conduct the user that is not authenticated to access multiple page (based on the role and the database menu) to the default page (home page)

    for example.

    userJUW have as a turnover.

    sales role have access only to the menu: salesInput, salesReport*.txt

    When userJUW tried to access the other example of menu: productReport (the menu access others via by typing the url in the url bar of the browser), then userJUW must be informed that he is not authenticated to access the productReport page and then redirect to the home page.

    pls throw some light

    Thank you

    Hi Juw,

    Yes, you can do this using the API OPSS.

    Develop with the user and role API

    Identification information, policies and identities of understanding

    I've worked before, but I got an LDAP authenticator based in weblogic. I don't know if OPSS requires that you have an LDAP authenticator however. But if everything is OK you can allow users and assign roles programmatically and they persist in your provider.

    Another option but less attractive and is based on your analysis and solution architecture could be as you said to begging, having roles in DB, and questioning the roles once the user connects and assign programmatically according to the information in the DB.

    https://oralublog.WordPress.com/2013/11/17/ADF-tutorial-how-to-map-roles-to-user-when-logging-in/

    You should do some homework this weekend hehe have fun.

    Concerning

  • PowerConnect 35XX port security

    Hello. I am trying to locate a CLI command that will allow me quickly clear course MAC addresses for a port secure with port security.

    My configuration of the interface is fairly simple.

    dot1x multiple-host
    dry port max 2
    dry port stop throw

    If I connect to a different host, the original at the port this as it should and travel to port security. Now, everything is fine, if I plan on the reconnection of the original host. Issue the global command "set interface active ethernet eth #" and the port is back online. The problem comes when I want to change the host. I have to completely remove the dot1x and the security configuration of the port [minus the max], 'set active interface' and then add security dot1x port for the interface configuration.

    Is there a way to quickly clean the secure the port addresses so that the new addresses can be learned?

    Thanks in advance.

    -Andrew

    Try this command and see if it works. Console # dot1x to re-authenticate ethernet 1/eXX

  • Allowing a blocked by port-security device

    Lets say that I have set up on ports on a switch port as this security:

    Secure the security Port MaxSecureAddr CurrentAddr SecurityViolation Action
    (County)       (County)          (County)
    ---------------------------------------------------------------------------
    Et0/2 1 1 0 stop
    ---------------------------------------------------------------------------

    And also that I have to use sticky to allow all connected devices.

    Now let's say that an admin unplug the computer that is plugged into the port and taken in another. Port of the switch as planned closures. Now the admin name and asked that the currently connected computer to be granted access. What is the proper way to allow access to that computer?

    I ran it again on this specific interface and did one not closed, but it's still stop. I have to completely disable and re-enable the security of ports on this interface to allow the new device?

    Hello

    In the command line, write:

    Switch(conf-IF) #shutdown

    and

    interface Dynamics-security of the ports of the switch #clear XX/XX

    and

    dynamic interface of the switch #clear XX/XX mac address table

    and

    Switch(conf-IF) #no shutdown

    In the 2 interfaces - interfaces of old and new.

    Thank you.

  • Laboratory of port security exercise - do not behave as expected.

    Hello

    I'm working on a CCENT training lab to demonstrate the configuration of port security.

    I have a Catalyst 3550 switch software Cisco's IOS, software of C3550 (C3550-IPSERVICESK9-M), SE Version 12.2 (52), VERSION of the SOFTWARE (fc3). I have two computers connected on ports fa0/1 and fa0/2 with IP addresses of 10.0.0.20/24 and 10.0.0.12/24 respectively. Without active port security, each computer can ping successfully the other.

    As soon as I change the configuration to add port security on fa0/1 I am not able to ping between the two computers, nor can I ping 10.0.0.20 from the console of the switch, but I don't know why! If I delete it again the pings succeed again.

    I expect that the switch must learn the computer connected to fa0/1 MAC and stop if there is subsequently any traffic from another Mac.

    Interestingly, the 'show mac address-table' command shows that the MAC connected to fa0/1 when port security is not enabled. I don't know if this is relevant.

    Can someone help me diagnose what is happening?

    Thank you.

    Configuration before change:

    interface FastEthernet0/1

    switchport mode access

    Speed 100

    full duplex

    spanning tree portfast

    !

    interface FastEthernet0/2

    switchport mode access

    Speed 100

    full duplex

    spanning tree portfast

    !

    Configuration after modification:

    interface FastEthernet0/1

    switchport mode access

    switchport port-security

    Speed 100

    full duplex

    spanning tree portfast

    !

    interface FastEthernet0/2

    switchport mode access

    Speed 100

    full duplex

    spanning tree portfast

    !

    Other diagnoses (after change):

    S1 # show ip interface brief

    Interface IP-Address OK? Method State Protocol

    Vlan1 10.0.0.5 YES NVRAM up up

    FastEthernet0/1 no YES unset upward, upward

    FastEthernet0/2 not assigned YES unset upward, upward

    #show S1 port-security

    Secure the security Port MaxSecureAddr CurrentAddr SecurityViolation Action

    (County)       (County)          (County)

    ---------------------------------------------------------------------------

    FA0/1 1 0 0 stop

    ---------------------------------------------------------------------------

    Total addresses in the system (with the exception of a mac per port): 0

    Limit Max addresses in the system (with the exception of a mac per port): 5120

    S1 #show - interface fa0/1 port security

    Port security: enabled

    Port State: Secure-up

    Mode of violation: stop

    Aging time: 0 mins

    Type of aging: absolute

    Aging of SecureStatic address: disabled

    Maximum MAC addresses: 1

    MAC addresses total: 0

    Configured MAC addresses: 0

    Sticky MAC addresses: 0

    Last Source address: Vlan: 0000.0000.0000:0

    Security Violation count: 0

    S1 #show interfaces fa0/1

    FastEthernet0/1 is up, line protocol is up (connected)

    Material is Fast Ethernet, the address is 000f.f796.d781 (bia 000f.f796.d781)

    MTU 1500 bytes, BW 100000 Kbit, DLY 100 usec,

    reliability 255/255, txload 1/255, rxload 1/255

    Encapsulation ARPA, loopback not set

    KeepAlive set (10 sec)

    Full-duplex, 100 MB/s, media type is 10/100BaseTX

    input stream control is turned off, output flow control is not supported

    Type of the ARP: ARPA, ARP Timeout 04:00

    Last entry exit ever, 00:00:01, blocking exit ever

    Final cleaning of "show interface" counters never

    Input queue: 0/75/0/0 (size/max/drops/dumps); Total output drops: 0

    Strategy of queues: fifo

    Output queue: 0/0 (size/max)

    5 minute input rate 0 bps, 0 packets/s

    5 minute output rate 0 bps, 0 packets/s

    3494 packets input, 587250 bytes, 0 no buffer

    Received 1593 broadcasts (0 multicasts)

    0 Runts, 0 giants, 0 shifters

    entry 0, 0 CRC errors, frame 0, saturation 0, 0 ignored

    0 watchdog, 1254 multicast, break 0 comments

    entry packets 0 with condition of dribble detected

    39631 packets output, 3311977 bytes, 0 underruns

    0 output errors, 0 collisions, 1 interface resets

    0 babbles, collision end 0, 0 deferred

    carrier, 0 no carrier, lost 0 0 output BREAK

    output buffer, the output buffers 0 permuted 0 failures

    #show mac address table S1 | include DYN

    1 b827.ebed.e2d9 DYNAMICS Fa0/2

    S1 #show ip arp

    Protocol of age (min) address Addr Type Interface equipment

    Internet 10.0.0.12 5 b827.ebed.e2d9 ARPA Vlan1

    Internet 10.0.0.5 - 000f.f796.d780 ARPA Vlan1

    Internet 10.0.0.20 32 10dd.b1f1.0c64 ARPA Vlan1

    Do you have any other platform to configure your lab? because it should work ideally and the configuration is fine. However, to complete your lab, you already have workaround...

    I suspect that this question is something related to the hardware you use or due to a BUG.

    Please note the useful comment

  • Security of the port on a SF300 problem

    Hello world

    We recently bought a new SF300, the main goal was to using the security of the port as a CNA.

    I expect to be able to define a list of allowed MAC addresses, but unfortunately, it is not the case.

    I used the "Classic Lock" port security.

    knowing that I can't have all the computers being connected at the same time (for cause of displacement), when a person to be allowed is here I am forced to disable security so that the switch can learn its MAC address.

    the problem is that when I do, the MAC addresses that are already learned are forgotten if disconnected from the LAN and when someone changes his position in the local network, it is blocked from access to the network.

    I remember that my goal is to give access to the network based on the MAC address or the domain name (allow computers part of OurDoamin.com).

    N.B: In our architecture, each room has a small switch and these switches are connected "central one" which is the Cisco SF300.

    Thank you.

    Dynamic arp for this inspection. Specify a mac IP on the trust list, the client connection to the "secure" ports (meaning subject to inspection of the arp) then do 'secure' interconnection ports (that is, not subject to inspection arp).

    I'll tell you one thing... before playing with DAI, make sure to enter at least the host you are using, otherwise you will be hose to the top of this switch.

    -Tom
    Please mark replied messages useful

  • I keep getting invited to add security exception. What was asked in Jan - no solution?

    cobraflex asked this question in January and I don't see where anyone did. I had this problem all year also - it's a REAL PAIN IN THE BUTT and I (like cobraflex) I'm looking for another customer. The only thing that keeps me is that my schedule is on tuberculosis.

    thread cobraflex describes the problem exactly. I use WinXP sp3, tuberculosis is up to date. My ISP is shaw.ca cable with a Cisco portal. My computer is a wired connection to a router (linksys) using DD - WRT. No other problems!

    Here's cobraflex "post...

    "im constantly wondered, sometimes several times per minute, to"confirm security exception". I always make sure that "permanently store this exception", before you click on "confirm security exception", but it doesn't seem to work, because a few minutes later I get exactly the same pop up once again, for all my email accounts.

    Ive been using thunderbird for years and usually in that case only, just once, after ive turned my anti-virus and turn it back on. But this time it started to happen on its own and has been tirelessly harassing me. Sometimes the pop up will appear while im in the middle of typing an email and cut me in my stride, so the program is almost impossible to use now.

    Do you know why this could happen? "

    Well, my 2nd pet irritate? It is absolutely amazing how people don't understand that the DATA is completely useless if it is not accompanied by a DATE! People NEVER delete data from their databases so that you can't tell if it's 6 months or 6 years!

    Not quite the case here - your last post was close enough so that when I called Shaw, we were able to sort it out.

    They specify no inbound security - defaults to what we have implemented under "outgoing server".

    Therefore, it seems more like this...

        Incoming Server: pop.shaw.ca
       Server Type: POP Mail Server (can't change this)
       Security Type: none
       Authentication: Normal Password (or  Password, transited insecurely)
       Port: 110
    

    Mail out with authentication server

    SMTP server

       Description: Shaw
       Server Name: mail.shaw.ca
       Connection Security: STARTTLS
       Port: 587
       Authentication: Normal Password
       Remote Access: We don't have access to this setting but worth
       checking maybe - S/B Enabled
    

    OH! AND you must make sure that his is the DEFAULT Server!

    It seems to work so far. I will return if it happens again (like keeping the full thread for others).

    Thanks for all your help - REALLY appreciate your persistence, now I can go back to being a happy user of Mozilla!

    Thanks again,

  • Exactly what ports are used to communicate with a cRIO?

    Can you provide this information (or point me to it). I want to implement a cRIO remotely through the internet, and I put it behind a firewall. I would like to know exactly what ports need to be forwarded to allow MAX to connect (when I say that it connects directly to a URL).

    Thank you

    Chris

    Chris

    Show This Article in the Knowledge Base that software ports OR use. Please refer to the Kb for more details.

    The cRIO, guests using

    44525 (discovery of target device Ethernet)

    3079 (front of LabVIEW RT TCP connections)

    3580 (OR Locator Service)

    80 (LabVIEW Web server)

    96 (FPGA compile server)

    (3537 if using VISA)

    (81 if you use Internet toolkit)

    (20 and 21 If you use FTP server).

    What are the Ports I need to open on my Firewall for National Instruments software products?

  • Open the client view ports

    Hello

    I've seen a lot of different information about ports and which must be open for vmware view customers that connects to a server behind a firewall.

    What I need to confirm is the following

    Make the need for firewall to open the port UDP 4172 source security server and out to the Internet since it is UDP packet response?

    I saw links that provide information on this subject, and the links that doesn't... problem are related to black screen and disconnect when we use works ok with rdp and pcoip.

    Thanks for the replies.

    / R

    OLE

    All the required ports for the display of the security in the DMZ servers, etc. are listed in 5.2 view Safety Guide. http://pubs.VMware.com/view-52/topic/com.VMware.ICbase/PDF/horizon-view-52-security.PDF

    You can watch here Server Security special rules - see 5.2 and 5.3 for servers security DMZ Firewall rules

    It is best to simply look at the official documentation for VMware for the particular version of the view you are using.

    It is true that if you block all the necessary ports for PCoIP (in a firewall or a proxy, etc.), you will get a black screen. There are other reasons as well if it is not configured properly. There are three stages of important configuration for remote access PCoIP and these are described here https://communities.vmware.com/docs/DOC-14974

    In response to your specific question on ports back to the client, the firewall rules for PCoIP State:

    PCoIP between Client and server security

    • Port of destination TCP 4172 of Client to server security
    • Port destination UDP 4172 of Client Security Server
    • Source port UDP 4172 security server to Client (this is the answer of UDP data)

    PCoIP between Security Server and virtual desktop

    • Destination port TCP 4172 security server to the virtual desktop
    • Destination port UDP 4172 security server to the virtual desktop
    • Source port UDP 4172 of Virtual Office for Security Server (this is the answer of UDP data)

    This is the third line of each of these sets of rules referring to ports to the customer. In general however, when you allow the UDP data through the firewall (for example, the port UDP 4172 from the Internet to the DMZ) the rule for the UDP data response from the source UDP 4172 at the client port is implied and does not need to be implemented explicitly.

    Recheck the three steps and it should solve your problem. If you still cannot put in place, pass the video at the bottom of the above link that he speaks to you through the correct configuration for remote access PCoIP.

    Let us know what it was.

    Mark

  • Problem with USB auto connect with clients that connect through the Security server...

    Lack of VMware View 5.0.1 with 2 servers connection and a security server. When the clients connect directly to the server connection, USB connection works very well... users can use their USB drives and other devices with their VM. The problem occurs when they attempt to use their USB devices when negotiated through the Security server.

    I know that port 32111 (TCP) must be open between the server security and the connection to the server, but even after doing so it does not always work... customers just to get the scrolling message of office in the USB menu initialization.

    Our current facility is:

    External IP address-> DMZ (Security Server)-> connect to server

    Entrust us our firewall config through our ISP (we are not overloaded with scientists here, it's just me, so things like little help my work load). They are certainly not incompetent (or at least were not in the past). I had to open the external 32111 IP port to the DMZ, then of the DMZ to our connection server that is used for external connections. Everything about VMware View works perfectly for the clients that connect this way, but not USB devices.

    One thing I give is if our having a configuration of VLAN dedicated for customers views influence what either. I'm trying to keep an eye on what ports are open that for our firewall for my records, but I do not see where I openly opened ports on the internal side of security server to our internal network. He must have the port opened directly from the internal face of security server of vmware 32111 discovers clients?

    The firewall Guys tell me that they checked over and over that port 32111 is open throughout the. They also said that they tried to telnet 32111 to our security server port and have nothing back (should have gotten garbage at least according to them).

    An idea of the next steps to take? It is obviously a blocked port, I just have no idea why at this stage.

    I know that port 32111 (TCP) must be open between the server security and the connection to the server, but even after doing it still does not work

    This is not what it takes. The agent is listening on the port 32111, you must open the firewall to allow connections to the Security server for the desktop on port 32111 (same thing you must allow RDP and PCoIP).

    Mike

  • Securing publication for FMS 3.

    I have a FMS 3 on a linux server and I have a ViewCast Niagara Pro II encoder.  Can I publish to FMS 3 without any problem, but how do I limit who can post to the server, because currently, I use Adobe Media Encoder for free to connect to the server and publish with no permission which tells me that everyone could do the same if they just grab the rtmp url and feed name.

    Thank you

    You have reason... There is no effective way to prevent publishers not permitted on the streaming server. The port used to connect a has nothing to do with it (any connection on any port has equal rights, in order to get a local IP address would be useless). In your scenario, even if secure you port 1930 on one of the IP, users could always connect on port 1935 on the other IP address. In the end, if you can connect, you can publish.

    I'm pretty confident in saying that your options are to be upgraded to Interactive Server, wait as the team FMS patch the problem or choose another server technology (although when it comes to servers no-scripting-required for live streaming, I don't know of any truly viable option).

  • Window update 80070641 error code

    error code keeps appearing after trying to download updated kb963707 and 1601 error when you try to update to Skype

    Hi thespudman,
     
    Please use the forum of responses of Microsoft Windows Vista.
     
    We will get the updates of windows works and who could take Skype as well.

    The update, you are not able to install is .NET Framework Assistant for Firefox.
     
    This problem occurs only with this particular update?
     
    Try to install the update manually from the link below:
     
    http://www.Microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=cecc62dc-96A7-4657-af91-6383ba034eab

    This error means that you cannot connect to the update server.  If the step above does not work, try the following steps.

    Review the settings on the computer

    Open Internet Properties

    Verify the language settings Reset Internet zone security Add the Windows Update Web site and the Microsoft Update Web site to the trusted sites list

    1. Click Start, open the properties of Internet
    2. In the Internet Properties dialog box, click the Security tab.
    3. In the Select a content area Web to specify its security settings , click Trusted sites, and then click Sites.
    4. In the Trusted sites dialog box, click to clear the requires a secure server (https :) for all sites in this zone check.)
    5. Add the following Web sites:
    6. Click OK twice and then visit the Windows Update Web site or the Microsoft Update Web site to determine if the problem is solved.

    Check your Internet Explorer settings are configured correctly

    1. Click Start, open the Properties of Internet .
    2. In the Internet Properties dialog box, click the Security tab.
    3. In the Select a content area Web to specify its security settings , click Internet, and then click custom level.
    4. On the Security list, click enable under run ActiveX and plug-ins controls.
    5. Under download, click Activate.
    6. Under Java permissions, click medium security.
    7. In virtue launching applications and files in an IFRAME, click Activate.
    8. Under Active Scripting, click enable.

    Check that the date and time are set correctly

    1. Click Start, in the search box, type timedate.cpl, and then click OK.
    2. In the dialog box properties of Date and time, click the Date and time tab and then set the date and time. To do this, follow these steps:
      1. In the Date box, click month in the month list.
      2. In the list of the year, click on the course of the year.
      3. In the calendar, click the current date.
      4. In the time box, click to select time, then up or down to set the time. Repeat this procedure for the minute and second settings.
      5. Click AM or PM, and then use the top or down arrow to change AM or PM.
      6. Click the time zone tab, and then click the time zone of your location in the zone list.
    3. Click applyand then click OK.

    Test Internet connection and LAN settings Click to clear the automatically detect settings and use an Automatic Configuration Script in LAN settings check boxes

    1. Click Start, in the search box, type inetcpl.cpl, and then click OK.
    2. In the Internet Properties dialog box, click the connections tab, and then click LAN settings
    3. Clear the check boxes automatically detect connection settings and use automatic configuration script , and then click OK twice.

    Check that you can connect to SSL Web sites allowed

    The computer uses a secure HTTP port to connect to Windows Update and Microsoft Update. To test whether port 443 is open, follow these steps:

    1. Click Start, open Internet Explorer, type https://www.microsoft.com:443, and then click OK.
    2. If you cannot connect to s.microsoft.com, or you receive an error message, the port may be blocked.

    Determine whether a file or a program is you from loading the Windows Update site

    To determine that a file or a program is preventing you from loading the Windows Update site, you can use the System Configuration utility to perform the boot in diagnostic mode. For more information, click on the number below to view the article in the Microsoft Knowledge Base:

    Disable the antivirus programs, Web accelerators, and ad removal programs

    Disable the programs ad removal, Web accelerators, and antivirus programs before that you try to access the Windows Update Web site or the Microsoft Update Web site. These programs may cause script errors.

     

    Thank you for using answers Forum. Please let us know how it works.

    Sharath
    Microsoft Answers Support Engineer

  • ESXi Network Setup?

    Hi people

    I have a question for you guys, maybe it's "s too bad for you, but I am quite unsure of what follows. If I have an ESXi server with an edge quadport NIC and I have a Cisco switch with spanning tree active what happens when I:

    Set all 4 ports on the switch, create a vSwitch standard on the ESXi and attach all 4 cards active network with political LB "based on the original Port ID.

    Based on my understanding he will distribute all my virtual machines in all of these NICs attached and all virtual machines are able to communicate (send AND receive) through these 4 vNIC/NICs. There are toggled a virtual machine which is pinned to a VNIC to an another VNIC when I unplug the specific cable.

    BUT

    My colleagues told me NOT! You will only be able to send data on all cards, but receive vNIC alone due to the MAC source/destination of the virtual machines respectively address the NIC in the host.

    Is this true? Exactelly what this policy process "origin port ID". Because there is additional one called "Mac-based..".

    Often, we set up systems like this:

    A server has 2 x quad port NIC. There is a vswitch with 2 cards attached (initially 1, first on a 2nd map) and we set up "based on the source port ID. Further we do NOT set a battery or an Etherchanne on switches connected to the NICs (via cross).

    We want to only have simpe LB and failover in the event of a path failure. It will work correctly (sending and receiving)? My colleagues told me that will not work as long as the switches are not stacked? Why should it not? My understanding of the VM switch vNIC another that is connected to an another NIC which even once, is connected to another standalone switch.

    When the wenn must configure "based MAC" or "HASH IP"? Well, I know when configuring "IP pole" then you must implement an Etherchannel between the host and the switch and set the IP hash strategy or you do not have the additional bandwidth.

    Why would we need to assign adapters Eve and not active? Which is used to deny the problems with loops in an environment no spanning tree?

    How to configure the network (amount of NIC, vSwitches, portgroup assignment, vmotion, etc. and switches)?

    Thank you very much

    What happens when I:

    Set all 4 ports on the switch, create a vSwitch standard on the ESXi and attach all 4 cards active network with political LB "based on the original Port ID.

    Based on my understanding he will distribute all my virtual machines in all of these NICs attached and all virtual machines are able to communicate (send AND receive) through these 4 vNIC/NICs. There are toggled a virtual machine which is pinned to a VNIC to an another VNIC when I unplug the specific cable.

    BUT

    My colleagues told me NOT! You will only be able to send data on all cards, but receive vNIC alone due to the MAC source/destination of the virtual machines respectively address the NIC in the host.

    Is this true? Exactelly what this policy process "origin port ID". Because there is additional one called "Mac-based..".

    It is quite simple, in the default configuration of "based on the original ID Port" each vNIC a VM has only a single active physical uplink at some point in time. This physical NETWORK adapter is used by the host to send as well as receive traffic for this particular vNIC (because your physical switch will learn the VM vNIC MAC on the currently active port only will pass the traffic through this link).

    The distribution is static and only changes when you add/remove/connect/disconnect rising physics or the vNIC (power/power on, disconnect/connect the vNIC). The behavior is the same for the standard vSwitches but also distributed with this policy. You can see the current mapping in the sight of esxtop (r) network:

    The route in source option MAC hash function is very similar, but instead of using the internal ID virtual port, it establishes a static mapping based on the MAC address of an Ethernet frame transmitted by a vNIC source. This approach also maintains a static table of MAC on your physical switch to prevent the beating of MAC. A unique vNIC VM traffic will use several ports, if the virtual machine uses several source MAC addresses. Who should never usually happen unless you do some fancy stuff of networking within the virtual machine and multiple virtual interfaces and it means also you must allow forged passes and MAC changes in security of port vSwitch group options. This article summarizes very well:

    Hostile coding: VMware: MAC LB hash function

    A server has 2 x quad port NIC. There is a vswitch with 2 cards attached (initially 1, first on a 2nd map) and we set up "based on the source port ID. Further we do NOT set a battery or an Etherchanne on switches connected to the NICs (via cross).

    We want to only have simpe LB and failover in the event of a path failure. It will work correctly (sending and receiving)? My colleagues told me that will not work as long as the switches are not stacked? Why should it not? My understanding of the VM switch vNIC another that is connected to an another NIC which even once, is connected to another standalone switch.

    Your colleague is wrong, you don't need any special configuration to the ID load balancing mechanism base port. It will work very well with the recovery, due to the static mapping simple explained above. It will be just like plugging a system of one switch on the other (in the same broadcast domain).

    When the wenn must configure "based MAC" or "HASH IP"? Well, I know when configuring "IP pole" then you must implement an Etherchannel between the host and the switch and set the IP hash strategy or you do not have the additional bandwidth.

    MAC based transmission is also static, but based on the source MAC and has nothing to do with etherchannel/LACP. See my explanation and article above.

    Why would we need to assign adapters Eve and not active? Which is used to deny the problems with loops in an environment no spanning tree?

    vSwitches form loops unless you do really bad things in a VM with multiple network cards to configure some ornithology within this VM operating system. The active settings / standby are basically just primary/secondary hierarchy in case you want the traffic to a group of particular port through a specific binding, unless a failover occurs.

    How to configure the network (amount of NIC, vSwitches, portgroup assignment, vmotion, etc. and switches)?

    Depends on. On a lot of factors.

    To summarize:

    -separate your network with VLAN slipped into a totally physical configuration

    -vMotion put on a non-routed private VLAN with a dedicated physical connection (or active / standby time of team settings ensure vMotion is not shared with other traffic except in a case of failover)

    -use physical rising as much as you want for a bandwidth

    -for IP (NFS, iSCSI) storage or FT, use dedicated as well physical uplink

Maybe you are looking for