IDFW traffic being dropped due to rule replacement
book
Article ID: 372744
calendar_today
Updated On:
Products
VMware vDefend Firewall
Issue/Introduction
- You are using Guest Introspection(VMtools) or Event log scraping for log user log in events.
- You observe IDFW rules present on the host using the below commands:
[root@<ESXI-HostName>~] summarize-dvfilter | grep -A 9 <VM-Name>
port 67108898 UPSAv2-02.eth0
vNic slot 2
name: nic-34829825-eth0-vmware-sfw.2 <<< VM-Filter-Name
agentName: vmware-sfw
state: IOChain Attached
vmState: Attached
failurePolicy: failClosed
serviceVMID: 4
filter source: Dynamic Filter Creation
moduleName: nsxt-vsip-20737187
[root@<ESXI-HostName>~] vsipioctl getrules -f <VM-Filter-Name>
- You Observe that user Log in events are detected in the UI.
- You observe the AD group SID is populated on the host using the below command
[root@localhost:~] vsipioctl getsidcache -f VM-Filter-Name>
- If the IDFW rules are applied to the gateway firewall they can be checked in the CLI as admin user.
- You observe that that the network traffic (e.g RDP ) is not reaching the destination VM.
NOTE: The preceding log excerpts are only examples. Date, time and environmental variables may vary depending on your environment
Resolution
Rule placement for IDFW should work depending on needs to be achieved.
- For VM to VM communication the IDFW rule published should be created as per below:
- The source in the rule should be the AD group.
- The Destination should be the destination group or IP
- The source VM in the "applied to" field.
- When we add the source VM to the applied to filed the rule will only be published to the host where that source VM resides.
- For Physical devices to VM communication the IDFW rule should be created as per below:
- The source in the rule should be the AD group.
- The Destination should be the destination group or IP
- The destination VM in the "applied to" field.
- When we are add the destination to the applied to filed the rule will only be published to the host where that destination VM resides.
- From Physical to VM communication using the Identity with Gateway Firewall the rule should be created as per below:
- The source in the rule should be the AD group.
- The Destination should be the destination group or IP
- The rule will be applied to the Gateway firewall. By default this is the gateway uplink unless it is specified.
Feedback
thumb_up
Yes
thumb_down
No