get firewall <uuid> ruleset [type <rule-type>] stats as admin user on the NSX-T Edge Node CLI we can see the L7 profile reject gets hit.Firewall rule count: 2Rule ID : 1039 Input bytes : 2772 Output bytes : 1251 Input packets : 10 Output packets : 12 Evaluations : 3 Hits : 1 Active connections : 0 L7 profile allow : 0L7 profile reject : 2 <<<<<<-------- It gets a HITL7 profile reject page : 0get tls-inspection traffic-stats lr-uuid <uuid> as admin user on the NSX-T Edge Node CLI you can see the TLS rules are being hit.rule hits : 1 <<<<<<-------- It gets a HITcached certs : 1cached cert hits : 0cached cert misses : 1open connections : 0total connections : 1decrypted connections : 1bypassed due to rules : 0bypassed due to failures : 0failed connections : 0client-to-server bytes : 114server-to-client bytes : 367# curl -vk --tlsv1.2 --resolve www.example.com:443:10.1.1.10 https://www.example.com --http1.1* Added www.example.com:443:1.1.1.10 to DNS cache* Rebuilt URL to: https://www.example.com/* Hostname www.example.com was found in DNS cache* Trying 10.1.1.10...* TCP_NODELAY set* Connected to www.example.com (10.1.1.10) port 443 (#0)* ALPN, offering http/1.1* successfully set certificate verify locations:* CAfile: /etc/ssl/certs/ca-certificates.crt CApath: /etc/ssl/certs* TLSv1.2 (OUT), TLS handshake, Client hello (1):* TLSv1.2 (IN), TLS handshake, Server hello (2):* TLSv1.2 (IN), TLS handshake, Certificate (11):* TLSv1.2 (IN), TLS handshake, Server key exchange (12):* TLSv1.2 (IN), TLS handshake, Server finished (14):* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):* TLSv1.2 (OUT), TLS change cipher, Client hello (1):* TLSv1.2 (OUT), TLS handshake, Finished (20):* TLSv1.2 (IN), TLS handshake, Finished (20):* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256* ALPN, server accepted to use http/1.1* Server certificate:* subject: C=IN; ST=MH; L=Pune; O=trustsign; OU=servercert; CN=www.example.com; [email protected]* start date: Sep 16 16:56:00 2021 GMT* expire date: Sep 16 16:56:00 2029 GMT* issuer: C=IN; ST=MH; L=Pune; O=trustsign; OU=certissuer; CN=Enterprise Trusted Root CA; emailAddress=enterprise_trusted_root_ca@trustsign* SSL certificate verify result: unable to get local issuer certificate (20), continuing anyway.VMware NSX-T Data Center 3.x
VMware NSX 4.x
You have configured TLS and layer 7 access on your Gateway firewall.
You have configured an ANY ANY rule to reject traffic
This issue is resolved in VMware NSX 4.1.1
Workaround:
Instead of configuring APPID as HTTP2 in L7 profile, you can configure HTTP2 APPID in GW Firewall Rule directly and make the action as REJECT.
This needs to be configured carefully as per requirements. See NSX-T Documentation