VMware NSX
When the WatchGuard VM modifies the ethX interface MAC address to a virtual MAC (vMAC), both the active and standby firewalls use the same MAC address.
This vMAC is reported to the NSX Central Control Plane and shared to all Transport Nodes including the Tier-0 Edges. The Edge treats this vMAC as a static MAC, which prevents dynamic learning or updates from user traffic (such as ARP or GARP).
As a result, if both firewalls advertise the same vMAC, and the last vMAC-to-VTEP mapping is reported from the standby VM/ESXi host, the return traffic is directed to the standby node, where it is dropped.
Do not modify the ethX interface MAC address to a vMAC.
Each WatchGuard VM (active and standby) should retain its unique VMware-assigned MAC address.
This configuration ensures that:
If the MAC change cannot be avoided due to product limitation, there is no current workaround available from Broadcom.
This behavior does not occur with FortiGate VMs in similar Active-Standby configurations, as FortiGate does not overwrite the vNIC MAC address with the vMAC.