Connecting to a vCenter Server from SSPI fails with the following error :
/usr/local/bin/govc: Post "https://vcenter-fqdn/sdk":
read tcp SSPI-IP:34310 -> vCenter-server-IP:443: read: connection reset by peer
Common observations include:
DNS resolution for the vCenter FQDN is successful from SSPi
TCP connectivity to port 443 is reachable from SSPI
SSP 5.x
This behavior can be commonly caused by the below :
Follow the steps below to validate connectivity and isolate the root cause :
1. Application-Level HTTPS Connectivity Test
Validate basic HTTPS connectivity from the SSPI VM to the vCenter Server.
Command:
curl -vk https://vCenterFQDN
Expected Result:
TLS handshake completes
HTTPS response is received
If the connection resets after handshake completion, proceed to the next steps.
2. TLS Handshake Verification :
To performs a complete TLS handshake with the vCenter HTTPS endpoint and provides low-level visibility into each phase of the negotiation.
openssl s_client -connect vCenter-FQDN:443 -debug -state -showcerts
This confirms:
TLS handshake fully completed
Cipher negotiation succeeded
Certificate exchange completed
No interruption during TLS negotiation
Explicit TLS 1.2 validation
Below command explicitly validates TLS connectivity using TLS 1.2, which is commonly required by SSPI and vCenter integrations.
openssl s_client -connect vCenterFQDN:443 -tls1_2
Successful output confirms TLS version compatibility between SSPI and vCenter.
3. Review vCenter Logs
Check the following logs to confirm vCenter services are healthy and not rejecting the connection:
/var/log/vmware/rhttpproxy/rhttpproxy.log
/var/log/vmware/vpxd/vpxd.log
4. Packet Capture Analysis :
Capture traffic on the SSPI VM to observe if the connection is terminated.
sudo tcpdump -i any host vCenter-FQDN and port 443 -nnvv
If you observe below output :
vCenterIP.443 > SSPI-IP.50280: Flags [R.], seq 1842, ack 644, win 548, length 0
note :
A TCP RST packet was sent from vCenter endpoint to the SSPI VM.
This confirmed the connection was being actively reset on the server-side network path, not by the SSPI VM.
5. Firewall and Micro-Segmentation Validation
Validate the following network components with assistance of Firewall Team :
Destination zone configuration on perimeter or internal firewalls
Any third-party firewall policies
NSX micro-segmentation rules
vCenter Server IPs and node pool IPs are not blocked or partially allowed
Ensure :
HTTPS application traffic is explicitly permitted
No policy allows TLS handshake but resets application data