Resolution:
The issue is resolved in NCP versions 4.1.0.5, 4.1.1.5, 4.1.2.2, and 4.2.0
Workaround:
If you have encountered this issue after upgrade and traffic from TAS applications is being impacted, you can apply the following workaround:
- Update the two firewall rules in the default isolation section for the foundation.
- For the deny_all_egress rule with source equal to the container CIDR and destination ANY, the rule's direction must be changed from IN_OUT to OUT.
- For the deny_all_ingress rule rule with destination equal to the container CIDR and source any, the rule's direction must be changed from IN_OUT to IN.
- If the TAS foundation is configured to use a NSX principal identity, this operation must be performed via API specifying the X-Allow-Overwrite:True header.
- NCP restart is not required. In case of NCP restarts the rule direction won’t be updated back to IN_OUT.