I'm hosting a server in a big datacenter.
VMware is running on the top of the Linux Host OS.
When i'm booting the bridged guest OS (FreeBSD), the vmnet0-eth0 link moves to promisc mode:
May 28 03:34:47 mainframe bridge-eth0: enabled promiscuous mode
When this done, the incoming traffic increases rapidly from nearly zero to:
Incoming rates: 2130.8 kbytes/sec
11050.4 packets/sec
If i look at `iftop` for example, i see all connections on the network from other servers which don't communicate with my server.
As I am in promiscuous mode i see it like a sniffer.... i think...
But that's the problem... i need vmware's bridge mode (it's not the default linux kernels bridge mode), because the vmware guest os has it's own public ip.
Does anyone have an idea how i could filter the unnecessary traffic which passes the interface without interfering the guest os?
Or should i contact my isp to solve this problem? Is there an possibility to restrict this directly at the (managed) switch? If true, how is it called?