In Federation environments, traffic continues to be blocked by DFW even after adding VMs to the exclusion list via the Global Manager UI under Security > Distributed Firewall > Settings > Exclusion List.
Check for the Issue:
[root@esx-04:~] summarize-dvfilter | grep -A 9 UPSAv2-02.eth0
port ####### UPSAv2-02.eth0
vNic slot 2
name: nic-########-eth0-vmware-sfw.2 <--- Slot 2 Filter
agentName: vmware-sfw
state: IOChain Attached
vmState: Attached
failurePolicy: failClosed
serviceVMID: 4
filter source: Dynamic Filter Creation
moduleName: nsxt-vsip-########
vsipioctl getrules -f <Slot 2 Filter>
[root@esx-04:~] vsipioctl getrules -f nic-#########-eth0-vmware-sfw.2
No rules.
Example of rules applied:
[root@esx-04:~] vsipioctl getrules -f nic-#########-eth0-vmware-sfw.2
rule 2145 at 1, 20497799 evals, 178006 hits, 172331 sessions, in 1164179 out 0 pkts, in 65754432 out 0 bytes
rule 2267 at 2, 3567 evals, 375 hits, 373 sessions, in 20463 out 16733 pkts, in 1754851 out 87609052 bytes
rule 3124 at 3, 2799 evals, 178006 hits, 172331 sessions, in 13459 out 0 pkts, in 3345644432 out 0 bytes
rule 4179 at 4, 38451 evals, 455 hits, 383 sessions, in 28963 out 18933 pkts, in 17784851 out 86789052 bytes
If you see rules applied, refer to the workaround and resolution section.
VMware NSX 4.1.2.0 - 4.1.2.4
Workaround
If rules are applied to the slot-2 of the VM please login to the Local Manager UI > Security > Settings > Distributed Firewall > Exclusion list
Add VM to the exclusion list. You should not have rules applied to this VM anymore and can use the check process above to confirm.
Permanent Fix
This is corrected in 4.2.x and 4.1.2.5