![Acronis Disaster Recovery Cloud: enabling Promiscuous mode and Forged transmits (ESXi) or MAC address spoofing (Hyper-V) for the VPN connection | Knowledge Base Acronis Disaster Recovery Cloud: enabling Promiscuous mode and Forged transmits (ESXi) or MAC address spoofing (Hyper-V) for the VPN connection | Knowledge Base](https://kb.acronis.com/system/files/content/2018/06/ajax/03.png)
Acronis Disaster Recovery Cloud: enabling Promiscuous mode and Forged transmits (ESXi) or MAC address spoofing (Hyper-V) for the VPN connection | Knowledge Base
![networking - Configuring Promiscuous Mode in VMware Workstation running on Windows 10 serving two Linux guests - Super User networking - Configuring Promiscuous Mode in VMware Workstation running on Windows 10 serving two Linux guests - Super User](https://i.stack.imgur.com/xNrJn.png)
networking - Configuring Promiscuous Mode in VMware Workstation running on Windows 10 serving two Linux guests - Super User
![Inline versus Promiscuous Mode > Introduction to and Design of Cisco ASA with FirePOWER Services | Cisco Press Inline versus Promiscuous Mode > Introduction to and Design of Cisco ASA with FirePOWER Services | Cisco Press](https://www.ciscopress.com/content/images/chap2_9781587144462/elementLinks/02fig02.jpg)