VMware vCenter Server
The vCenter Server firewall allow rules are not configured correctly to permit the necessary traffic.
CLI Troubleshooting Example:
As an example of CLI-based troubleshooting, let's review a scenario involving an SSH connection attempt from <ip_address_#1> to <vcsa_ip>.
root@vcsa [ ~ ]# iptables -L inbound -v -n
Chain inbound (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- eth0 * <ip_address_#2> 0.0.0.0/0
0 0 REJECT all -- eth0 * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0
root@vcsa [ ~ ]# tcpdump -i eth0 "port 22 and host <ip_address_#1>" -s0 -vv -n
tcpdump: listening on eth0, link-type EN10MB (Ethernet), snapshot length 262144 bytes
07:09:31.080779 IP (tos 0x10, ttl 64, id 61914, offset 0, flags [DF], proto TCP (6), length 60)
<ip_address_#1>.<tcp_port> > <vcsa_ip>.22: Flags [S], cksum 0x04c4 (correct), seq 3257251379, win 64240, options [mss 1460,sackOK,TS val 94662466 ecr 0,nop,wscale 7], length 0
root@vcsa [ ~ ]# iptables -L inbound -v -n
Chain inbound (1 references)
pkts bytes target prot opt in out source destination
0 0 ACCEPT all -- eth0 * <ip_address_#2> 0.0.0.0/0
2 424 REJECT all -- eth0 * 0.0.0.0/0 0.0.0.0/0 reject-with icmp-port-unreachable
0 0 RETURN all -- * * 0.0.0.0/0 0.0.0.0/0