VMware Networking Community
rajeevsrikant
Expert
Expert
Jump to solution

NSX DFW Firewall

I am running NSX version 6.2.2 & I have configured the below DFW.

pastedImage_0.png

I was testing the ACL with the trace flow feature of NSX. The source was selected as 10.10.10.10 VM & the destination as 20.20.20.20 VM with TCP destination port as 22.

The trace flow shows that the traffic was dropped by the deny rule (The rule ID was showing that of the Deny rule)

Not sure why they rule of SSH was not followed.

But when the actual real SSH session was initiated from 10.10.10.10 VM  to 20.20.20.20 VM  it was working & the SSH session was established.

But when tested via trace flow it is showing it is dropped by the Deny rule.

Any idea what could be the reason.

I was not able to see the logs since they are in production.

23 Replies
rajeevsrikant
Expert
Expert
Jump to solution

Thanks all for your inputs.

Since not able to identify the reason for this will try to reach VMware Tech support if they can provide some insight to this.

Reply
0 Kudos
rajeevsrikant
Expert
Expert
Jump to solution

Thanks all for your inputs.

Since not able to identify the reason for this will try to reach VMware Tech support if they can provide some insight to this.

Reply
0 Kudos
dumlutimuralp2
VMware Employee
VMware Employee
Jump to solution

This is expected behaviour . Traceflow feature , by default, sets TCP flag as "ACK" - Acknowledge. You need to clear Ack and instead choose "Syn" as the TCP flag on Traceflow settings. The SSH rule would look for new session requests which means , SSH packets coming in with a "Syn" TCP flag.

rajeevsrikant
Expert
Expert
Jump to solution

it worked thanks....

Reply
0 Kudos