Traffic Disruption on K8s Containers in NAPP Setup When Applying IDS/IPS Rules
search cancel

Traffic Disruption on K8s Containers in NAPP Setup When Applying IDS/IPS Rules

book

Article ID: 386491

calendar_today

Updated On:

Products

VMware vDefend Firewall VMware vDefend Firewall with Advanced Threat Prevention

Issue/Introduction

When IDS/IPS rules are applied to the Distributed Firewall (DFW) in a Network Application Platform (NAPP) setup, the traffic within Kubernetes containers ceases to function properly. This results in the NAPP entering a degraded state accompanied by an error code 403.

Environment

NAPP 4.2

Cause

The issue arises because VXLAN/Geneve encapsulated traffic (used by Tanzu workloads) is being improperly handled by the Intrusion Detection and Prevention System (IDPS). The root cause is a failure to preserve Checksum (CSUM) and TCP Segmentation Offload (TSO) attributes across the service hop when the traffic passes through the IDPS.

 

Resolution

Add the relevant Workload and Management Virtual Machine names to the Distributed Firewall (DFW) exclusion list. Post-exclusion, the NAPP dashboard will function correctly, allowing successful loading of the application. Alternatively, the IDS rules can be fine tuned to exclude the IDPS service for these flows.