dfwpktlogs show DROP for incoming packets, when nic bonding is enabled on the guest VM
book
Article ID: 411588
calendar_today
Updated On:
Products
VMware vDefend FirewallVMware vDefend Firewall with Advanced Threat Prevention
Issue/Introduction
In dfwpktlogs, for a VM, it is observed that there is a flow logged for the outgoing packet via a vnic VIF ID
Example:
2025-09-12T17:25:53.891Z No(13) FIREWALL-PKTLOG[2108423]: ######31 INET match PASS 1111 OUT 60 TCP 10.10.33.2/34111->10.164.17.14/8080 S <=== Outgoing packet logged as PASS on VIF ID ending in 31
However, there is a flow logged for the incoming packet with same Src IP / Port & Dest IP / Port on a different vnic VIF ID for the same VM
2025-09-12T17:25:53.896Z No(13) FIREWALL-PKTLOG[2108423]: ######74 INET match DROP 1112 IN 60 TCP 10.164.17.14/8080->10.10.33.2/34111 SA <=== Incoming packet logged as DROP on VIF ID ending in 74
This happens when nic bonding is enabled (using LACP) on the guest VM
There is no impact to the traffic as the incoming packet is also sent over the vnic where the traffic originated. The DROP is only for the incoming packet on the second vnic.
Environment
VMware NSX
vDefend Firewall
VMs with nic bonding enabled on the Guest OS
Resolution
As mentioned in this KB , Running LACP inside any guest OS (including nested ESXi hosts) is not supported. It is recommended to the use the feature on the ESXi's vSphere Distributed Switch (VDS) to bond physical NICs on the host for increased bandwidth and availability.
Additional Information
For more info on the dfwpktlogs format, review this doc.