Original Publication Date: 12/18/2014
This release note documents the version 11.6.0 release of BIG-IP Policy Enforcement Manager (PEM).
This version of the software is supported on the following platforms:
|Platform name||Platform ID|
|BIG-IP 5000s, 5050s, 5200v, 5250v||C109|
|BIG-IP 7000s, 7050s, 7200v, 7250v||D110|
|BIG-IP 10000s, 10050s, 10200v, 10250v||D113|
|VIPRION B2100 Blade (for evaluation only)||A109|
|VIPRION B2150 Blade||A113|
|VIPRION B2250 Blade||A112|
|VIPRION B4200, B4200N Blade (for evaluation only)||A107, A111|
|VIPRION B4300, B4340N Blade||A108, A110|
|VIPRION C2200 Chassis||D114|
|VIPRION C2400 Chassis||F100|
|VIPRION C4400, C4400N Chassis||J100, J101|
|VIPRION C4480, C4480N Chassis||J102, J103|
|VIPRION C4800, C4800N Chassis||S100, S101|
|Virtual Edition (VE)||Z100|
These platforms support various licensable combinations of product modules. This section provides general guidelines for module support.
Most of the support guidelines relate to memory. The following list applies for all memory levels:
All licensable module-combinations may be run on platforms with 12 GB or more of memory, and on VE guests provisioned with 12 GB or more of memory. Note that this does not mean that all modules may be simultaneously provisioned on all platforms with 12 GB or more of memory. The BIG-IP license for the platform determines which combination of modules are available for provisioning.
The following guidelines apply to the BIG-IP 2000s, 2200s, 3900, 6900 platforms, to the VIPRION B4100 and B4100N platforms, and to VE guests configured with 8 GB of memory.
The following guidelines apply to platforms, and to VE guests provisioned with less than 8 GB and more than 4 GB of memory.
The following guidelines apply to the BIG-IP 1600 and 3600 platforms, and to VE guests provisioned with 4 GB or less of memory.
The BIG-IP Configuration Utility supports these browsers and versions:
For a comprehensive list of documentation that is relevant to this release, refer to the BIG-IP PEM / VE11.6.0 Documentation page.
|404047||The BIG-IP system comes with a publisher called local-db-publisher. This publisher can now be used as an HSL endpoint for reporting.|
|406311||The client will not see any resets, when the gate status disabled action is enforced while using profile FastL4, after waiting for two or more flows for the connection.|
|406349||If the dynamic_spm_bwc_policy is not created, dynamic PCC rules are not applied. To work around this issue, ensure that the dynamic_spm_bwc_policy is configured with proper parameters prior to getting dynamic PCC rules from the PCRF.|
|409201||Currently, PEM does not support policy reevaluation for profile change in the middle of a flow.|
|454498||If you want to support broadcasting DHCP traffic, then the DHCP virtual has to be configured in relay mode rather than the forwarding mode.|
|432950||The BIG-IP GUI and QoS model uses uplink, downlink, total terminology which corresponds to input, output and total terms respectively, defined by RFC 4006.|
|403154||When updating signatures,/classification_base.conf is now manually updated from the tmsh.|
|404047||The BIG-IP system comes with a publisher called local-db-publisher. This publisher can now be used as hsl endpoint for reporting.|
|406311||Wait for 2 or more flows for the connection to not reset while dropping. After that, the user will not see any resets on that specific connection.|
|408153||Now, diameter messages (CCR and RAA messages) generated by the BIG-IP system, have the P bit (proxy-able) set.|
|419729||The auto-sync works for syncing the custom-created SPM (PEM) profiles with PEM policies.|
|422993||PEM is now listed as a module and can be provisioned in platform B4340N.|
|425821||No crash occurs when invalid classification ID is skipped.|
This release provides support for the capabilities in PEM to enforce policies for subscribers with more than one IP address. Subscribers can be provisioned with one or more IP addresses, either IPv4 or IPv6. The maximum number of IPv4 and IPv6 addresses is configurable, within a limit of 16 IP addresses per subscriber in total.
PEM can discover subscribers based on DHCP, which is essential for fixed line networks. Both DHCPv4 and DHCPv6 are supported. The DHCP module can function as a Relay Agent, or as a pass through forwarder.
This feature includes the addition of a custom URL database that can be leveraged for adding custom URLs and categories. A system DB variable provides the option to look up the custom DB and uses the category returned for policy purposes.
This feature enhances PEM analytics by means of tighter integration with the Application Visibility and Reporting (AVR) module. This provides the ability for operators to view aggregate, application level reporting information on the BIG IP system using PEM with AVR.
Transactional reporting provides the ability to report each HTTP transaction within a single TCP connection. The PEM reporting records are enhanced to reflect transaction level information.
This feature adds a capability for sending PEM reporting records (session, flow, transaction) over IPFIX. The feature utilizes the existing system logging infrastructure, known as BIG-IP Unified Logging Infrastructure (ULI).
This feature provides the capability to configure multiple ICAP services in dynamic service chaining. PEM is able to enforce service chaining of HTTP traffic for various ICAP adaptations. It is now possible to perform adaptation for Request only, Request and Response, or Request in addition to Request and Response.
A bandwidth measurement (rate or bytes) per subscriber, per application, or per flow is provided in this feature. Other elements in the network can use this information to dynamically apply relevant services, such as video encoding.
|397397||When multiple static subscriber information is loaded from a .csv file, the subscriber information is lost if enter or CRLF is not entered at the end of each record line. To workaround this issue, press the Enter key or insert the CRLF character at the end of each row in the .csv file.|
|398416||In this release, volume threshold is supported. However, time threshold does not qualify for Gx reporting as it is not specified in the standard. To workaround this issue, do not use time threshold.|
|398922||Only a single instance of the diameter-endpoint profile is supported in this release: the system-supplied default gx-endpoint profile. As a result, diameter-endpoint profiles cannot be created or deleted in the GUI or in tmsh.|
|399119||If a policy rule matched with flow filters drop or redirect the traffic, that traffic will not match other policy rules that use classification filters.|
|400372||The protocol msn_video is used by MSN Messenger for video conversations and is supported for MSN Messenger 8 and earlier.|
|400893||The .csv file for uploading static subscribers has multiple lines with Mac end-of-line. To work around this issue, convert the file into WIN file format and upload from the GUI or tmsh. This resolves the issue.|
|403374||On rare occasions, when a policy is installed with 15 rules and reporting is configured on them, only 14 of the reports are generated when multiple flows (traffic) are sent matching all of them. Maximum usage reports per subscriber is supported.|
|410763||If the monitoring key is longer than 1053 characters, an error message is issued. To work around this issue, use monitoring keys fewer than 1053 characters.|
|417139||Modifying Session state through iRules may cause issues over Gx. To work around this issue, do not modify the session state if session is active.|
|427429||No statistics are available for troubleshooting with the new "show pem irule" stats command.|
|427844||Any tunneling traffic such IPsec, GRE, and IPIP cannot be steered by the BIG-IP system to a different endpoint. This is because the traffic is encapsulated and targets only the destination endpoint.|
|428178||All IP addresses that are identified as frequent are not stored in the database, and thus are not categorized.|
|428420||Some IP addresses are categorized as unknown on the BIG-IP system, even though they are categorized in the cloud database of webroot.|
|428456||Usage monitoring count received via CCA does not work. It will be always 0.|
|430344||A URL categorization limitation is that a small set of URLs are categorized as unknown on the BIG-IP system, even though they may get categorized in the cloud database of webroot.|
|435596||The CEC hitless upgrade does not sync files between active-standby setup, using device group. To work around this issue, change standby to active to do CEC hitless upgrade.|
|438549||If you turn on the SNAT pool or SNAT Automap on IPOther virtual, no traffic passes through in most cases. In some cases, the traffic passes but the out stats (packets and bytes) is zero. To workaround this, do not turn on SNAT pool or SNAT Automap on IPOther virtual that processes IPsec traffic.|
|441197||With PEM enabled, non-TCP,UDP or ICMP traffic is not forwarded by a NAT-enabled ipother virtual. To workaround this, set snat.anyipprotocol to enable.|
|453959||The UDP virtual used by PEM treats TTL differently than the standard UDP forwarding virtual. The standard UDP forwarding virtual decrements TTL whereas the UDP virtual reinitializes TTL to 255. In the event that there is a routing loop in the network, which traverses a BIG-IP running PEM, this behavior would prevent TTL from expiring and thus exacerbate the effects of the loop.|
|461531||The tower column in the Active Sessions table (Policy Enforcement > Subscribers) is displayed incorrectly.|
|465937||If a virtual server's port is specified as ANY for Gx/Gy(address is 0.0.0.0, MCP validation does not allow us to create it. A virtual-destination has to be unique.|
|465946||If both DHCP and RADIUS protocol is used to discover subscriber, the subscriber discovery is unpredictable. Both methods cannot be used simultaneously for subscriber discovery.|
|466891||If a classification profile is disabled in virtual server settings, the PEM policy Flow Reporting action and PEM policy Header Insert Action are not applied. To work around this issue, enable classification on the Virtual Server settings page.|
|470890||While adding virtual servers from the listener data plane page, (in the GUI) only the first VLAN in the list is selected. To work around this, select all VLANs from the list, or go to the virtual server page and modify there.|
|472713||Sometimes in IE8, while searching for a particular active session by session IP, an error message appears stating that the error is trying to process the request.|
For additional information, please visit http://www.f5.com.
You can find additional support resources and technical documentation through a variety of sources.
Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology.
AskF5 is your storehouse for thousands of solutions to help you manage your F5 products more effectively. Whether you want to search the knowledge base periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source.
The F5 DevCentral community helps you get more from F5 products and technologies. You can connect with user groups, learn about the latest F5 tools, and discuss F5 products and technology.