NSX Troubleshooting
Troubleshooting DFW
Use Loginsight to verify rules are being dropped
- Connect to lan-pw-ts01 or lan-pw-ts02 via RDP
- Open web browser and go to: https://loginsight.zsp.sas.com/
- Make sure “Active directory” is select not “local (built-in)”
- Username will be your ZSP ID like: dazfre
- Password is your zeus password
- Hit login
- Interactive Analysis at the top.
- Click “add filter”
- Then type “src” and select “vmw_nsx_firewall_src”
- Contains
- Then the IP address you are troubleshooting
- Click “add filter”
- Then type “action” and select “vmw_nsx_firewall_action”
- Contains
- “drop”
- This will show you what is being dropped.
- If you don’t see it’s dropped… continue… to the next section
How to see what rules are applied
- SSH to ESXi host where VM is located
- Username is Root
- And use the VCS admin password
- Find the filter name on slot2 for the VM
- summarize-dvfilter | grep -A2 ‘{vmname}’
- copy the name: for slot 2
- to see the rules
- vsipioctl getrules -f {filter Name:}
Example:
[root@shqzspesx01d:~] summarize-dvfilter | grep -A2 ‘itdba-pw-ts01′
world 181522 vmm0:itdba-pw-ts01 vcUuid:’50 2f 99 9b a6 69 8b b0-4e d3 6e 37 8e 8 a 18 3e’
port 50331680 itdba-pw-ts01.eth0
vNic slot 2
name: nic-181522-eth0-vmware-sfw.2
[root@shqzspesx01d:~] vsipioctl getrules -f nic-181522-eth0-vmware-sfw.2
[root@shqzspesx01d:~] vsipioctl getrules -f nic-181522-eth0-vmware-sfw.2 | grep 170
rule 1107 at 33 inout protocol tcp from addrset ip-securitygroup-171 to addrset ip-securitygroup-170 port 1433 accept with log;
rule 1106 at 34 inout protocol tcp from addrset ip-securitygroup-169 to addrset ip-securitygroup-170 port 5022 accept with log;
rule 1106 at 35 inout protocol tcp from addrset ip-securitygroup-169 to addrset ip-securitygroup-170 port 3389 accept with log;
rule 1106 at 36 inout protocol tcp from addrset ip-securitygroup-169 to addrset ip-securitygroup-170 port 5985 accept with log;
rule 1106 at 37 inout protocol tcp from addrset ip-securitygroup-169 to addrset ip-securitygroup-170 port 1433 accept with log;
rule 1104 at 157 inout protocol tcp from addrset ip-securitygroup-170 to addrset ip-securitygroup-41 port 22 accept with log;
rule 1104 at 158 inout protocol tcp from addrset ip-securitygroup-170 to addrset ip-securitygroup-41 port 443 accept with log;
rule 1052 at 170 inout protocol tcp from addrset ip-securitygroup-89 to addrset ip-securitygroup-28 port 9443 accept with log;