This document guides NSX administrators in systematically troubleshooting NSX ELS based Identity Firewall (IDFW) issues. IDFW allows administrators to implement security policies based on user identity, thus securing environments where applications are accessed based on user roles or identities. However, due to its complexity, issues may arise with deployment or performance, requiring a structured approach to troubleshooting.
This KB will take you through the step-by-step process of identifying and resolving potential issues related to ELS based IDFW.
VMware vDefend Firewall
The purpose of ELS IDFW is to detect logins on physical devices and to use those logins to allow/block connections to VM's in the NSX environment. ELS can be used to detect logins to VM's, however Guest Introspection is the recommended method to be used in this case.
world ###### vmm0:test-vm vcUuid:'## ## ## ## ## ## ##-## ## ## ## ## ## ## ##'
port ######### test-vm.eth1
vNic slot 2
name: nic-######-eth1-vmware-sfw.2 <---- This is the dvfilter ID we'll use in the next command.
agentName: vmware-sfw
state: IOChain Attached
vmState: Attached
failurePolicy: failClosed
serviceVMID: 1
filter source: Dynamic Filter Creation
moduleName: nsxt-vsip-#########
ruleset mainrs {
# generation number: 0
# realization time : 2026-03-27T17:41:38
# FILTER (APP Category) rules
rule 4079 at 6 inout protocol tcp strict from any to addrset de0cfb61-3c7b-4948-b7e4-########### port 3389 with extended src 6663cd67-c20c-4264-9463-############ with attribute profile da8fa8a4-2dbd-4bcd-8162-############ accept with log tag 'IDFW RDP to jumpbox from physical machine';
}
addrset de0cfb61-3c7b-4948-b7e4-############ {
# generation number: 0
# realization time : 2026-03-27T17:41:38
# refs: 1, 0 flags: 0x30000025 (ROOT,GLOBAL,PER,ACT,ANCREF)
ip ##.##.##.## <----- Destination VM must be part of this NSX Group and IP must be displayed here
container 6663cd67-c20c-4264-9463-############ {
# generation number: 1
# realization time : 2026-03-27T17:41:38
# refs: 2, 0 flags: 0x30000025 (ROOT,GLOBAL,PER,ACT,ANCREF)
WIN_SID : S-#-#-##-##########-##########-##########-####, <----- The extended src group must contain the SID of the AD Group(s) that contain the significant users
}
container da8fa8a4-2dbd-4bcd-8162-############ { <---- This rule has a context profile for RDP. Context Profiles are not necessary for an IDFW rule but only here as an example.
# generation number: 1731025376652
# realization time : 2026-03-27T17:41:38
# refs: 2, 0 flags: 0x30000025 (ROOT,GLOBAL,PER,ACT,ANCREF)
APP_ID : APP_RDP,
}rule 4079 at 6 inout protocol tcp strict from any to addrset de0cfb61-3c7b-4948-b7e4-########### port 3389 with extended src 6663cd67-c20c-4264-9463-############ with ext_src_ip addreset rextip4079 with attribute profile da8fa8a4-2dbd-4bcd-8162-############ accept with log tag 'IDFW RDP to jumpbox from physical machine';