- You are using NSX for vSphere
- After redeployment of ESG, backend servers are unavailable
- Disabling and enabling the edge firewall re-establishes the connection
- ESG uplink interface has multiple primary IPs
- Checking vshield_edge_flow_table in the edge logs you can see the SYN_RECV reply from the backend server reaching the ESG:
node-0-disabled$ cat vshield_edge_flow_table | grep ##.##.##.##
37: tcp 6 29 SYN_RECV src=##.##.##.## dst=##.##.##.## sport=53084 dport=443 pkts=1 bytes=52 src=##.##.##.## dst=##.##.##.## sport=443 dport=53084 pkts=4 bytes=208 mark=262144 rid=173458 use=1
- In a working environment we expect to see the connection ESTABLISHED as per the below example:
node-0-disabled$ cat vshield_edge_flow_table | grep ##.##.##.##
14: tcp 6 21369 ESTABLISHED src=##.##.##.## dst=##.##.##.## sport=59813 dport=443 pkts=2 bytes=92 src=##.##.##.## dst=##.##.##.## sport=443 dport=59813 pkts=1 bytes=52 [ASSURED] mark=262144 rid=173458 use=2
- The expected packet flow is as follows:
- Ingress to ESG > DNAT > To DST > From DST > SNAT > Egress ESG
- Witnessed packet flow:
- Ingress to ESG > DNAT > To DST > From DST > SNAT
- Packet capturing on the uplink interface of the ESG you can see ARP requests.
NOTE: The preceding log excerpts are only examples. Date, time and environmental variables may vary depending on your environment.