Applies To:

Show Versions Show Versions

Archived Release Note: BIG-IP Controller PTF Notes, version 4.2 PTF-03
Release Note

Original Publication Date: 10/06/2002

This article has been archived, and is no longer maintained.

Summary:

This product temporary fix (PTF) provides enhancements and fixes for the BIG-IP, version 4.2.  The PTF includes all fixes released since version 4.2. 

Contents:

- Installing the PTF
- Software enhancements and fixes
- Required configuration changes
- Optional configuration changes
     - Layer 2 forwarding transparency
- Known Issues


Installing the PTF

Use the following instructions to apply the PTF to the BIG-IP, version 4.2. 

Important:  If you are upgrading an IP Application Switch use the installation instructions here.

Apply the PTF to the BIG-IP, version 4.2 using the following process.  The install script saves your current configuration.

  1. Connect to the F5 Networks FTP site (ftp.f5.com).

    Use FTP in passive mode from the BIG-IP to download the file.  To place FTP in passive mode, type pass at the command line before transferring the file. 

  2. Download the correct PTF file to the /var/tmp/ directory on the target BIG-IP.
    • For crypto BIG-IP units, choose PTF-4.2-3-BSD_OS-4.1.im.
    • For non-crypto units, choose NOCRYPTOPTF-4.2-3-BSD_OS-4.1.im.
  3. Change your directory to /var/tmp/ by typing:
    cd /var/tmp/
  4. Enter the following command to install this PTF:
    • For crypto, type:  im PTF-4.2-3-BSD_OS-4.1.im
    • For non-crypto, type:  im NOCRYPTOPTF-4.2-3-BSD_OS-4.1.im

    The BIG-IP automatically reboots once it completes installation.

To upgrade an IP Application Switch or a Compact Flash media drive (SSD), use the following process:

  1. Create a memory file system, by typing the following:
    mount_mfs -s 200000 /mnt
  2. Type the following command:
    cd /mnt
  3. Connect to the FTP site (ftp.f5.com).
  4. If you are running the crypto version of the BIG-IP, download the file PTF-4.2-3-BSD_OS-4.1.im from the /crypto/bigip/ptfs/bigip42ptf3/ directory.
    If you are running the non-crypto version, download the file NOCRYPTOPTF-4.2-3-BSD_OS-4.1.im from the /crypto/bigip/ptfs/bigip42ptf3/ directory.
  5. On the BIG-IP, run the im upgrade script, using the file name from the previous step as an argument:
    im /mnt/<file name>

    When the im script is finished, the BIG-IP reboots automatically.

Note:  This procedure provides over 90MB of temporary space on /mnt.  The partition and the im package file are deleted upon rebooting.


[ Top ]

Software enhancements and fixes

What's new in this PTF (PTF-03)

Link down on standby failover feature  (CR20821)
The link-down-on-standby failover feature now works properly on the IP application switch when autonegotiation is disabled.

L7 with large requests   (CR20875) (CR20885)
BIG-IP now works properly with L7 features and large requests.

What's new from PTF-02

Shell interpreted characters in monitors
Monitors can now pass shell interpreted characters, such as &, <, and > in parameters.

Port mirroring on the IP Application Switch  (CR18435)
Ports not configured in a VLAN are now mirrored on the IP Application Switch.

T/TCP session pass through to L4 virtual servers  (CR18792)
This version supports T/TCP session initiation to layer 4 (L4) virtual servers. If a session times out without a 4-way close, it will be removed from the connection table without sending a TCP reset (RST).

VLAN-keyed connections feature  (CR19388)
The BIG-IP now supports VLAN-keyed connections. VLAN-keyed connections are used when traffic for the same connection must pass through the BIG-IP several times, on multiple pairs of VLANs (or in different VLAN groups). This feature has several applications, including but not limited to, firewall sandwiches where there is only one set of BIG-IP units and both sides of the firewall sandwich are connected to the units. The VLAN-keyed connections feature is enabled by default. To disable this feature use the following bigpipe command:
b internal set honor_vlans = 0

Sequence number tracking  (CR19393)
Out of order packets sent to a delayed binding virtual server no longer cause sequence number tracking to become out of sync.

TCP 4-way close  (CR19591)
TCP 4-way close is now properly detected in all cases when packets are dropped or sent out of order by an upstream device.

Resets from a virtual server to a proxy  (CR19667)
A reset from a virtual server due to a denial (such as port not enabled) now has last hop routing support. This means a RST from a virtual server to a proxy will go through the proxy instead of from the external interface to the client.

iControl messages through ITCMSystemService  (CR19714)
Intermittent problems using the iControl ITCMSystem interfaces no longer cause instability.

iControl  (CR19809)
iControl SOAP mappings for IP address parameters are now correct.

iControl user access  (CR19892)
iControl user access is now consistent for BIG-IP CORBA and SOAP portals.

proxyd: 90%+ CPU utilization  (CR19896)
There are no longer issues with proxyd and high CPU utilization.

Insert cookie mode  (CR19930)
Insert cookie mode in certain circumstances no longer causes the BIG-IP to become unstable.

iControl LocalLB::Pool  (CR19967)
iControl LocalLB::Pool can now query the persistence table.

OneConnect state engine  (CR20010)
The OneConnect state engine no longer incorrectly changes states when chunking.

Setup utility  (CR20127)
The Setup utility now only writes VLANs which have associated interfaces to bigip_base.conf.

get_router_address  (CR20137)
The iControl get_router_address command can now return all strings.

iControl SOAP interface  (CR20237)
iControl can now connect to the SOAP interface on a shared address.

Sending packets on GVRP/GMRP  (CR20242)
Sending packets on GVRP/GMRP no longer causes a multicast storm.

iControl  (CR20243)
iControl ITCMSystem::enable_ntpd and get_ntpd_status commands now use bigstart.

Fallback host names without quotes  (CR20266)
bigpipe now handles fallback host names correctly in all circumstances.

Allocating strings for internal VLAN names and checkd  (CR20272)
checkd no longer exhausts system resources.

iQuery over UDP  (CR20287)
When using iQuery over UDP messages are now routed over the correct interface and have the correct source address.

SSL-to-Server with late binding connections  (CR20408)
SSL-to-Server now functions correctly with late binding connections.

FTP port collision resolution through a SNAT  (CR20417)
Active FTP port collision resolution through a SNAT now functions correctly.

VLAN groups can now be configured to bridge at L2  (CR20467)
The BIG-IP now supports transparent L2 forwarding. For more information on configuring this feature see Layer 2 forwarding transparency in the Optional configuration changes section of this PTF note.

Standby unit  (CR20502)
The standby unit no longer attempts L2 or L3 forwarding.

L2 proxy ARP forwarding exclusion list  (CR20647)
In order to prevent the active unit from forwarding ARP requests for the standby unit (or other hosts to which proxy ARP forwarding is not desired), you can now define a proxy arp exclusion list. To configure this feature, you can define a proxy_arp_exclude class and add any self-IPs on the standby and active units to it. BIG-IP will not forward ARP requests to or from the hosts defined in this class.
For example, to create a proxy_arp_exclude class use the following syntax:
b class proxy_arp_exclude { host <self IP 1> host <self IP 2> ... host <self IP N> }

VLAN group active/standby pair  (CR20648)
When a BIG-IP in a VLAN group switches from active to standby mode, it now drops the links on its interfaces. This is so that any connected switches will recognize that all proxy arped MAC addresses are on the currently active BIG-IP, not on the standby. This feature can be configured with a new BIG-IP internal variable standby_link_down_time. This value specifies how long a unit that just went standby should keep all of its links down. The value is in tenths of a second, so a value of 50 would be equivalent to 5 seconds. The default is 0, and this disables the feature.
For example, to enable this feature and set the variable standby_link_downtime to 50 use following syntax:
b internal set standby_link_down_time = 50

What's new from PTF-01

SSL Proxy: Improved traffic throttling  (CR20229)
The SSL Proxy is now much more efficient at handling the scenario when the bandwidth between the client and the proxy is significantly less than the bandwidth from the proxy to the server. This is done by limiting the server-to-proxy bandwidth to the bandwidth of the proxy-to-client.

Akamaizer Proxy performance  (CR20167)
Performance of the akamaizer proxy has been improved.

BIG-IP now sends a TCP RST when no routes are available   (CR20114)
BIG-IP now sends a reset (RST) when auto-lasthop is enabled and no route is available. This enhances the performance of clients that do not resend TCP packets.

SSL Proxy: 100% CPU utilization freezes existing connections   (CR19966)
Improved the way the SSL proxy handles prematurely disconnected clients.

Broadcast pings originating from the BIG-IP  (CR19901)
BIG-IP is not adversely affected by broadcast pings originating from itself.


[ Top ]

Required configuration changes

There are no required configuration changes in this PTF.

Optional configuration changes

Layer 2 forwarding transparency

In previous releases, VLAN groups have been a hybrid of layer 2 (L2) proxy ARP with layer 3 (L3) forwarding. In this release you can configure pure L2 operation for VLAN groups. To configure this, you can set the internal variable transparent_vlangroups to one of the following three values:

0 (default) - traditional proxy ARP with L3 forwarding
1 - L2 forwarding with locally unique bit toggled in ARP response across the VLANs
2 - L2 forwarding with original MAC address of remote system preserved across VLANs
For more information on configuring this feature, see solution brief 1541 at tech.f5.com.


[ Top ]

Known Issues

The following items are known issues in the current release.

Status lights  (CR18605)
In the Configuration utility the status lights in an active-active configuration display as green and yellow instead of green.

VLAN headers for tagged interfaces  (CR18623)
The BIG-IP may inserts random QoS values into 802.1Q VLAN headers.

Extra characters in log file  (CR18879)
When UDP port * is enabled and UDP timeout is set to 0 (zero), extra characters may be entered in the log file.

RADIUS_pinger  (CR19271)
RADIUS_pinger may intermittently marks nodes down.

bigip.conf file  (CR19361)
In certain circumstances bigip.conf file may load slowly.

Permissions of .crt files (SSL proxy)  (CR19438)
CA files (.crt) or chain files (.chain) no longer fail to load in certain situations, because of file permission problems. These errors are presented in the /var/log/proxyd log file.

Setting active-active mode using the web-based Configuration utility  (CR19794)
With network failover enabled you will not be able to configure active-active mode using the Configuration utility. When you have network failover enabled, use the command line interface to set active-active mode.

IMAP_pinger default folder  (CR20043)
You must specify an IMAP_pinger folder when defining a monitor based on the IMAP_monitor, because the default folder "INBOX" will not be used.

Default TCP timeout for SNATs  (CR29270)
Loading a SNAT with a default TCP timeout may cause errors.

SSL proxy under heavy load  (CR20276)
Running an SSL proxy under heavy load for extended periods of time may take up abnormal amounts of system resources. In very extreme circumstances this issue may exhaust system resources.

Active FTP port collision resolution  (CR20417)
Active FTP port collision resolution through a SNAT may functions incorrectly.

Setting port 0 timeout  (CR20469)
Setting port 0 timeout causes SNAT connections to be reaped with that timeout.

Setup utility  (CR20543)
The Setup utility may add deleted icmp monitors.

Sequence numbers on out of order packets  (CR20567)
When in layer 7 (L7) forwarding mode, the BIG-IP may adjust sequence numbers before checking to make sure that packets from the server are in the correct order.

+ characters in filenames  (CR20595)
The IM does not accept the + character in filenames for configuration installation.

Late binding connections through fast path  (CR20598)
Late binding connections that go through fast path may not be closed properly.

Loading the previous configuration after upgrade  (CR20616)
In some cases, after you upgrade to PTF-02, the previous configuration will not be loaded automatically. If this happens, you should load your configuration by typing /sbin/sod

Node limits  (CR20661)
Node limits are not enforced if there is a short time between connections.

SNAT automap with OneConnect  (CR20710)
Using SNAT automap with OneConnect may slow performance.

Display address names for long host names  (CD20712)
bigpipe may create errors when displaying long hostnames.

proxyd HTTP parsing  (CR20722) (CR20726)
proxyd HTTP parsing may take up abnormal amounts of system resources.

TOS values on delayed binding connections  (CR20733)
In certain circumstances the BIG-IP may set illegal TOS values on delayed binding connections.

Class strings is 64 bytes or longer  (CR20772)
bigpipe may create errors when a class string is 64 bytes or longer.

Occasional hang on reboot at 'syncing disks...'  (CR20778)
BIG-IP may occasionally hangs when rebooted or halted during a period of filesystem activity.

Multicast traffic and auto-lasthop  (CR20822)
Auto-lasthop is not disabled for multicast traffic.

FQDN and bigpipe virtual commands  (CR20859)
Specifying FQDN in a bigpipe virtual command may cause bigpipe to become unstable.


[ Top ]

Was this resource helpful in solving your issue?




NOTE: Please do not provide personal information.



Incorrect answer. Please try again: Please enter the words to the right: Please enter the numbers you hear:

Additional Comments (optional)