Supplemental Document : BIG-IP 11.5.1 Hotfixes :: Fixes and Known Issues

Applies To:

Show Versions Show Versions

BIG-IP AAM

  • 11.5.1

BIG-IP APM

  • 11.5.1

BIG-IP GTM

  • 11.5.1

BIG-IP Link Controller

  • 11.5.1

BIG-IP Analytics

  • 11.5.1

BIG-IP LTM

  • 11.5.1

BIG-IP AFM

  • 11.5.1

BIG-IP PEM

  • 11.5.1

BIG-IP ASM

  • 11.5.1
Original Publication Date: 03/18/2018 Updated Date: 04/18/2019

BIG-IP Hotfix Release Information

Version: BIGIP-11.5.1
Build: 207.0
Hotfix Rollup: 11

Cumulative fixes from BIG-IP v11.5.1 Hotfix 10 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 9 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 8 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 7 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 6 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 5 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 4 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 3 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 2 that are included in this release
Cumulative fixes from BIG-IP v11.5.1 Hotfix 1 that are included in this release
Known Issues in BIG-IP v11.5.x

Vulnerability Fixes

ID Number CVE Solution Article(s) Description
600662-6 CVE-2016-5745 SOL64743453 CGNAT: NAT64 vulnerability CVE-2016-5745
599168-6 CVE-2016-5700 SOL35520031 BIG-IP virtual server with HTTP Explicit Proxy and/or SOCKS vulnerability CVE-2016-5700
598983-6 CVE-2016-5700 SOL35520031 BIG-IP virtual server with HTTP Explicit Proxy and/or SOCKS vulnerability CVE-2016-5700
569467-10 CVE-2016-2084 SOL11772107 BIG-IP and BIG-IQ cloud image vulnerability CVE-2016-2084.
580596-6 CVE-2013-0169 CVE-2016-6907 SOL14190 SOL39508724 TLS/DTLS 'Lucky 13' vulnerability CVE-2013-0169 / TMM SSL/TLS virtual server vulnerability CVE-2016-6907


Functional Change Fixes

None


TMOS Fixes

ID Number Severity Description
595874-2 3-Major Upgrading 11.5.x/11.6.x hourly billing instances to 12.1.0 fails due to license SCD.
556277-7 3-Major Config Sync error after hotfix installation (chroot failed rsync error)
547047-9 3-Major Older cli-tools unsupported by AWS
499537-4 3-Major Qkview may store information in the wrong format
494029-2 5-Cosmetic During boot the econsole shows "/etc/rc3.d/S15cluster: line 225: ebtables: command not found"


Local Traffic Manager Fixes

ID Number Severity Description
557645-8 3-Major Communication between devices in a high availability (HA) configuration might occasionally fail on VIPRION 2200 and 2400 platforms.

 

Cumulative fix details for BIG-IP v11.5.1 Hotfix 11 that are included in this release

600662-6 : CGNAT: NAT64 vulnerability CVE-2016-5745

Vulnerability Solution Article: SOL64743453


599168-6 : BIG-IP virtual server with HTTP Explicit Proxy and/or SOCKS vulnerability CVE-2016-5700

Vulnerability Solution Article: SOL35520031


598983-6 : BIG-IP virtual server with HTTP Explicit Proxy and/or SOCKS vulnerability CVE-2016-5700

Vulnerability Solution Article: SOL35520031


595874-2 : Upgrading 11.5.x/11.6.x hourly billing instances to 12.1.0 fails due to license SCD.

Component: TMOS

Symptoms:
BIG-IP Virtual Edition (VE) instances that use the Amazon Web Services (AWS) hourly billing license model may fail when upgrading to version 12.1.0.

As a result of this issue, you may encounter the following symptom:

After upgrading to version 12.1.0, the BIG-IP VE instance license is invalid.

Conditions:
This issue occurs when all of the following conditions are met:

-- You have BIG-IP VE instances that use the hourly billing licensing model.
-- Your BIG-IP VE instances are running 11.5.x or 11.6.x software versions.
-- Your BIG-IP VE instances are running within the AWS EC2 environment.
-- You upgrade the BIG-IP VE instance using the liveinstall method.

Impact:
BIG-IP VE instance licenses are not valid after upgrading to software version 12.1.0.

Workaround:
To work around this issue, you can use the liveinstall method on the hotfix image directly (instead of installing the base software image and then the hotfix image). To do so, perform the following procedure:

Impact of workaround: Performing the following procedure requires rebooting the system and should be performed only during a maintenance window.

Download the BIGIP-12.1.0.0.0.1434.iso and Hotfix-BIGIP-12.1.0.1.1.1447-HF1-ENG.iso files to your workstation. For more information about downloading software, refer to SOL167: Downloading software and firmware from F5.
Copy the downloaded files from your workstation to the /shared/images directory on the VE instance.
To perform the installation by using the liveinstall method, and reboot the BIG-IP VE instance to the volume running the new software, use the following command syntax:

tmsh install sys software hotfix Hotfix-BIGIP-12.1.0.1.1.1447-HF1-ENG.iso volume <volume-number> reboot

For example, to install the hotfix to volume HD1.3 and reboot to the volume running the newly installed software, type the following command:

tmsh install sys software hotfix Hotfix-BIGIP-12.1.0.1.1.1447-HF1-ENG.iso volume HD1.3 reboot
 
Verify the installation progress by typing the following command:
tmsh show sys software

Output appears similar to the following example:

Sys::Software Status
Volume Product Version Build Active Status
----------------------------------------------------------------
HD1.1 BIG-IP 12.0.0 0.0.606 yes complete
HD1.2 BIG-IP 12.1.0 0.0.1434 no complete
HD1.3 BIG-IP 12.1.0 0.0.1434 no installing 6.000 pct

Fix:
BIG-IP VE instances that use the AWS hourly billing license model now complete successfully when upgrading to version 12.1.0.


580596-6 : TLS/DTLS 'Lucky 13' vulnerability CVE-2013-0169 / TMM SSL/TLS virtual server vulnerability CVE-2016-6907

Vulnerability Solution Article: SOL14190 SOL39508724


569467-10 : BIG-IP and BIG-IQ cloud image vulnerability CVE-2016-2084.

Vulnerability Solution Article: SOL11772107


557645-8 : Communication between devices in a high availability (HA) configuration might occasionally fail on VIPRION 2200 and 2400 platforms.

Component: Local Traffic Manager

Symptoms:
Communication between devices in a high availability (HA) configuration might occasionally fail on VIPRION 2200 and 2400 platforms.

Conditions:
VIPRION 2200 and 2400 platforms with more than one blade.

Multiple devices in an HA configuration.

TMM incorrectly identifies which TMM should handle host connections from an HA peer.

The host connection will be reset after the SYN retransmits are exceeded between TMM and the host process.

Impact:
Periodic reported failures in host-to-host communication. This could affect config sync, and other HA related communication.

Workaround:
None.

Fix:
Host communication on VIPRION 2200 and 2400 platforms behaves the same as host communication on non-VIPRION 2200 and 2400 platforms, as expected.


556277-7 : Config Sync error after hotfix installation (chroot failed rsync error)

Component: TMOS

Symptoms:
Once an installation has been booted into, applying a hotfix over that installation does not change the SELinux policy, but instead uses the previously installed SELinux policy.

Conditions:
This affects installations of a later hotfix atop an earlier hotfix, or onto a base build of the same software version. Installation onto a new volume is unaffected.

To determine whether the configuration will experience this issue, use md5sum to see whether the following have the same checksums:
-- /etc/selinux/targeted/modules/active/modules/f5_mcpd.pp
-- /usr/share/selinux/targeted/f5_mcpd.pp.

If the checksums are the same, the system will use the SELinux policy installed with the previous hotfix, and this issue will occur.

Impact:
Sync of file objects might fail with an error similar to the following:

01071488:3: Remote transaction for device group [name] to commit id [number] failed with error 01070712:3: Caught configuration exception (0), verify_sync_result:() :Failed to sync files. - sys/validation/FileObject.cpp, line 6276..

Workaround:
Instead of installing the hotfix over an existing installation of the base build of that version (or an earlier hotfix), install the base ISO (for example 11.5.4) into a volume, and then install the hotfix onto that volume, without booting the volume in between.

Fix:
Installing a hotfix over an existing base install now rebuilds the SELinux policy as expected.


547047-9 : Older cli-tools unsupported by AWS

Component: TMOS

Symptoms:
Older EC2 tools stopped working in some AWS regions.

Conditions:
This can happen in some AWS regions.

Impact:
BIG-IP high availability configurations may stop working in some AWS regions.

Workaround:
None.

Fix:
F5 Networks added the latest available version (1.7.5.1) of EC2 tools in this release/hotfix.


499537-4 : Qkview may store information in the wrong format

Component: TMOS

Symptoms:
When creating a new monitor, some information may be stored in the wrong format.

Conditions:
Create a new monitor. Run qkview.

Impact:
Occasionally, some information stored for the new monitor will be in the incorrect format.

Workaround:
None.

Fix:
Monitor information is now stored in the correct format.


494029-2 : During boot the econsole shows "/etc/rc3.d/S15cluster: line 225: ebtables: command not found"

Component: TMOS

Symptoms:
During boot the console shows "/etc/rc3.d/S15cluster: line 225: ebtables: command not found"

Conditions:
The issue occurs during startup on BIG-IP systems which do not support vCMP.

Impact:
This issue is purely cosmetic, it does not affect the BIG-IP operation in any way.

Fix:
Console messages about a missing ebtables command no longer appear during BIG-IP system startup.




Cumulative fixes from BIG-IP v11.5.1 Hotfix 10 that are included in this release

Note: F5 has recently changed the bug numbering scheme in our bug tracking database. Now all bugs have a single version assigned to them and so bugs can now have sub bugs denoted by a '-' and then the sub bug number, i.e. 404716-4 with 404716 being the parent bug. The release notes for previous rollups will also reflect this change so some bugs may now contain a sub bug prefix.

Local Traffic Manager Fixes

ID Number Description
511651-1 Performance improvement in packet processing.

 

Cumulative fix details for BIG-IP v11.5.1 Hotfix 10 that are included in this release

511651-1 : Performance improvement in packet processing.

Component: Local Traffic Manager

Symptoms:
There is a potential memory leak.

Conditions:
Undisclosed conditions for fragmented packet processing.

Impact:
Memory leak.

Workaround:
1. External Firewall 2. F5 AFM product can be used.

Fix:
Fixed memory leak related to packet processing.




Cumulative fixes from BIG-IP v11.5.1 Hotfix 9 that are included in this release


TMOS Fixes

ID Number Description

523032-4

Resolves CVE-2015-3456 security vulnerability, known as "Venom".


Cumulative fixes from BIG-IP v11.5.1 Hotfix 8 that are included in this release


TMOS Fixes

ID Number Description

481410-2

Automated Phone Home update check time is randomized to prevent intermittent problem when all machines would access the service at once.

492809-1

Ensured the APM stats code no longer leaks memory.

494078-2

The fix strengthens certificate validation, including hostname verification.

503237-6

CVE-2015-0235 : glibc vulnerability known as Ghost.

453489

Suppressed extraneous warning messages caused by ssh connections from peers on the 127.0.0.0/8 subnet.


Application Security Manager Fixes

ID Number Description

496849-4

We fixed a vulnerability in the ASM/DPI/FPS signature update mechanism.


Cumulative fixes from BIG-IP v11.5.1 Hotfix 7 that are included in this release


TMOS Fixes

ID Number Description

490577-1

An issue has been corrected which could result in the TMM process crashing and leaving a core during process shutdown.

492367-2

CVE-2014-8500.

492368-2

CVE-2014-8602.

497579-2

An issue has been corrected which can prevent a vCMP guest from processing SSL and compression traffic.


Access Policy Manager Fixes

ID Number Description

493993-1

In APM HA environments, the system now prevents global status from being updated before the initialization is completed on a standby device. TMM on the standby no longer dumps core files on startup.


Cumulative fixes from BIG-IP v11.5.1 Hotfix 6 that are included in this release


TMOS Fixes

ID Number Description

439559-1

If an APM policy sync puts the new policy on a member of a sync-failover device group then the sync of the sync-failover group used to fail. This now succeeds.

449100-2

Tunnel interfaces can be used by iRUle nexthop/lasthop commands to set a flow's nexthop/lasthop behaviors. 1. To send traffic to the tunnel, use "nexthop tun0 ..." on CLIENT_ACCEPTED iRule event, or "lasthop tun0 ..." on SERVER_CONNECTED iRule event. 2. A point-to-point tunnel can be supplied with an IP address, although it does not have an effect. 3. A wild-card tunnel can be supplied with the IP address of the remote-point to build the tunnel on the fly.

455311-3

vCMP guests access to the management network of the hypervisor has been restricted.

457166-1

An issue has been resolved which affected the ability to modify a vCMP guest's management network mode.

459155-4

Included the physdev netfilter module into the BIG-IP kernel package.

459694-1

vCMP guests ability to interfere with the management network of the hypervisor has been restricted.

459753-3

"bigstart restart" on a secondary blade no longer causes clusterd to restart continuously.

459973-3

You can now disable the Include Cluster option using the GUI.

462315-2

Saving a single partition out of the configuration ('save sys config' with the 'partitions { p1 }' option) now writes the configuration file properly. It previously appended to the file but now overwrites it as it should.

462943-4

Resolved issue where rewrite CSS filter/parser may use stale iovs in declaration_state resulting in SIGSEGV.

470796-3

CVE-2014-4023

471070-1

Users with access to the client SSL profile now have access to the clientssl_certkeychain configuration items.

471704-4

The vcmpd process is no longer vulnerable to malicious data passed from a vCMP guest.

476157-12

Security patches applied to krb5 library.

477959-1

Internal structure improvements, no customer facing functionality changes have been made.

478922-4

Resolved issue that ICSA logging did not contain information that is required for certification.

481648-2

The ipaddrTable's ipAdEntIfIndex value now matches the ifTable's ifIndex value for the same interface.

483436-2

Update to AWS License files

484453-1

Reduced the log level for registering with the LOP (lights out processor) to the debug level.

484635-2

CVE-2014-3513 CVE-2014-3567 CVE-2014-3566 CVE-2014-3568: Update OpenSSL to latest.

487800-3

The guest-specific configuration information blocks are now isolated from each other and the hypervisor is protected against invalid data injected by a vCMP guest.

474805

Internal build improvement.

476521

Use true timeout instead of retries limit in when to give up initializing FIPS device, and subsequently power cycle the unit to recover FIPS device.

477611

Apply DAG Round Robin to icmp echo only.

477888

ICSA logging no longer missing information that is required for certification.

479152

This release includes functionality to leverage hardware parity error mitigation capabilities, which reduces the number of fatal errors.

483762

MAC address conflicts no longer occur between vVMP guests.

484399

OVA will only create 1 slot and leave the remaining disk space free.

486514

The crash that happens in AFM logging module, when the TCP connection to a log destination server is re-established is fixed.

488461

Improve base build process and remove duplicate code.

492333

Resolved an sys-icheck bug that caused an auto_schema misconfiguration. This occured on all platforms.

492460

This error message used to occur intermittently when trying to delete a virtual and using sFlow: 01070265:3: The Virtual Server () cannot be deleted because it is in use by a sflow http data source (). This no longer occurs.


Local Traffic Manager Fixes

ID Number Description

226892-11

Resolved intermittent issue when return packets were dropped after configuring packet filters for DNS traffic or traffic with IP fragments.

424931-6

Creation of a large file, such as a UCS archive is now handled correctly, and csyncd process no longer causes high CPU utilization.

428864-2

Lowering the virtual server connection limit now works, even when traffic is already being processed

433946-1

Benign rsync errors are no longer logged in /var/log/ltm and instead are tracked via stats in the 'csync_stat' table.

436097-1

when the tmm restarts, pkcs11d also must be restarted automatically if present.

436811-4

Pool member status are updated correctly if there are multiple database monitors configured to the same ip::port destination.

437875-3

This spurious error message may have previously been displayed when the local user database feature is configured: 01071704:3: Not running command (/usr/libexec/localdb_mysql_restore.sh) because the request came from an untrusted connection. This error message has always been harmless, but now it no longer is displayed.

437906-3

WebSockets and the HTTP CONNECT method now work with OneConnect.

439424-1

SafeNet HSM install now needs to be done only on the primary slot on the BIG-IP cluster-mode chassis systems such as VIPRION. A single install on the primary slot will take care of installing SafeNet on all active slots. On any already-open sessions to the BIG-IP slot(s), the PATH environment variable will need to be reloaded by executing 'source ~/.bash_profile' in order to be able to use SafeNet utilities. If at a later stage, a new blade is added or a disabled or powered-off blade is made active or is powered-on, the user will have to run 'safenet-sync.sh -p ' *only* on the new secondary slot. If the new slot is made primary before running safenet-sync.sh on it, then the regular install procedure using nethsm-safenet-install.sh will be required on the new primary slot.

439490-3

The BIG-IP system now reconnects to SafeNet HSM if the connection is interrupted, so connections continue as expected.

439513-1

NETHSM: Initial few connection drops after each tmm restart

439540-2

To fix this issue, restart the pkcs11d process. The command is "tmsh restart sys service pkcs11d".

441894-1

Pkcs11d watchdog functionality to avoid manual restart.

443098-6

The Proxy SSL feature no longer leaks memory.

447515-3

Resolved intermittent issue that could cause an eventual crash when an iRule was parked longer than the time-out which caused the flow to be deleted but then the iRule is resumed and becomes in a bad state due to the missing flow.

449798-4

An issue has been corrected that potentially caused blade failures on secondary blades in a VIPRION chassis to have subsequent issues executing health monitors.

450031-2

Log messages are no longer observed when tm.rejectunmatched is set to false.

450804-2

Improved TLS finish messages.

451218-3

CVE-2014-8730: Corrected Nitrox TLS padding.

452121-1

BIG-IP now supports multiple SafeNet network-HSMs configured in a HA group.

452628-2

Add a bigdb variable for the pkcs11d threads.

453358-3

The memory leak is fixed.

454465-3

CVE-2014-8730: Corrected TMM TLS padding

454476-2

In the event of an invalid parameter in the clienthello, the correct TLS version will be set in the alert.

454636-4

The logging destination IP address only matches virtual servers, so no HSL logging is lost.

454692-2

Assigning 'after' object to a variable no longer causes memory leaks.

456859-3

Interface to hardware compression has improved allocation strategy.

458556-1

tmm will no longer core on startup when traffic arrives before transitioning to cmp ready.

460868-1

TMM no longer crashes if network HSM is improperly configured.

461578-2

This release provides improved handling of large objects in the session database.

462163-1

Allow Non Blade 0 MPI communication even after congestion.

462649-2

TMM no longer crashes under heavy load.

463902-1

Flat-buffer allocator for hardware compression tuned to be less greedy.

464163-2

Customized cert-key-chain of the child client-ssl profile is reverted to parent's profile cert-key-chain during config load.

467868-1

Previously, mcpd might leak memory when returning an error message that contained the reason for a monitor failure. The message now reports the reason without leaking memory.

469705-3

TMM will set a known route domain when processing SIP Requests to prevent panics caused by an invalid route domain.

471073-1

Now, when tmm is restarted, all HA connections are reestablished.

474757-16

OpenSSL Security Advisory 8/6/14 (1.0.1i Update).

477967-1

MPTCP component now correctly applies TSO processing to outbound packets, so tmm no longer segfaults.

480113-1

FIPS exported keys can now be successfully installed in FIPS cards without causing config-sync failure.

480699-1

Increased the maximum statemirror.queuelen db variable limits. If necessary, the statemirror.queuelen can now be increased beyond 256 MB up to 1 GB. Note that increasing the statemirror.queuelen increases memory requirements to approximately twice the queuelen multiplied by the number of tmms, and also increases the time required to detect an error in the mirroring connection. The statemirror.queuelen should be kept as low as possible to prevent repeated failure.

483328-1

SSL virtual servers now successfully negotiate SSL handshake, so the device no longer logs the following message: crit tmm[14270]: 01260000:2: Profile name-of-profile: could not load key/certificate.

485188-2

When the SSL ClientHello contains the SCSV marker, if the client protocol offered is not the latest that the virtual server supports, a fatal alert will be sent.

488208-3

Proper upgrade to OpenSSL 1.0.1j.

470394

The BIG-IP system calculates the correct number of members in the active priority group when the slow ramp feature is triggered.

470994

tmm now correctly applies TSO processing to outbound packets, so tmm no longer segfaults.

475055

Resolved core caused by accounting miscalculation of Nitrox I/O flows

477753

This change allows to use immediate idle timeout on UDP serverside flows as a workaround for SIP message loss and/or connection failures if (and only if) the logic of the SIP processing does not expect any return traffic to match the serverside connections. Configuration that require this workaround, but which expect return traffic to match the serverside flow could not have worked correctly (without specific iRule based band-aids) even prior to the first affected version.

480299

The Virtual Address throttling delayed update mechanism has been made more robust, and will now send delayed updates (roughly 3 seconds after change) regardless of previous status, guaranteeing that Virtual Address status will reach all subscribers.

483974

Unrecognized options are now ignored.

484429

TMM still log critical-level messages, but the system function properly and traffic is not affected.

486066

tmm does not core


Global Traffic Manager Fixes

ID Number Description

477240-1

SSL properly renegotiates rather than terminates connections when the session expires.

487808-2

Link cost and inbound link path load balancing software support has reached EOL. (See Solution 15834)


Application Security Manager Fixes

ID Number Description

248487-5

The enforcer does not convert parameter values into the web application language when parameters are defined as "file upload" or "ignore value" in the security policy.

434461-4

Improved the system's integration with IBM Guardium.

435520-3

We fixed an issue that sometimes stopped you from deleting an ASM security policy that was created using a template after you rolled-forward the policy's configuration from a previous version.

454142-1

Resolved intermittent Enforcer crash due to specific requests

461028-1

vCMP: We fixed an issue that caused the Enforcer to crash in a clustered environment.

471103-2

There is a new internal parameter: "ignore_null_in_multipart_text". When the internal parameter is set, a null in request violation is not issued when a null appears in the request. If the parameter is defined as file upload in the security policy, no violation is issued. If the parameter is defined as something else, the violation "null in multipart request" is issued. If the parameter is not defined in the security policy, the violation "null in request" is issued.

476179-2

Brute force reporting: The brute force reported operation mode (Transparent or Blocking) is now the same when the attack starts and ends. Previously, sometimes the system would change the operation mode logged when the attack ended.

476191-2

To enable you to bypass unicode validation on XML and JSON profiles, we added two internal parameters: - relax_unicode_in_xml: The default is 0 which is the current behavior. When the value is changed to 1, a "bad unicode character" does not produce an XML malformed violation. A "bad unicode character" might be a legal unicode character that does not appear in the mapping of the system's XML parser. - relax_unicode_in_json: The default is 0 which is the current behavior. When the value is changed to 1, a "bad unicode character" does not produce a JSON malformed violation. A "bad unicode character" might be a legal unicode character that does not appear in the mapping of the system's JSON parser.

481572-2

We fixed an issue that caused the system to not report a navigation parameter that appeared in the POST data.

481792-2

We fixed an issue of specific requests the sometimes caused the Enforcer to crash.

476621

We fixed an issue where Bot Detection in the Web Scraping feature created JavaScript errors in the web application using Internet Explorer.

483491

We fixed a memory corruption issue.


Application Visibility and Reporting Fixes

ID Number Description

481541-2

Memory leak in the monpd daemon that occurred in some situations has been resolved.

486327-1

Web Application Security Administrator added to the list of allowed administrators.


Access Policy Manager Fixes

ID Number Description

337178-4

BIG-IP Edge Client falls back to TLS from DTLS if http-proxy is used.

398657-7

The active session count graphs no longer becomes significantly large at times due to a counter underflow.

403660-4

Application icons (Finder, Spotlight, Launchpad, Notification Center, Dock, Menu Bar) have been updated for retina displays.

418850-2

AD may now be the last auth agent in the VMWare view access policy. Username/password/domain preserved and then passed to the backend.

420989-3

When using an access policy with Windows Logon Integration, if you are denied access once, you can try again.

420990-3

Support for smart cards was added to Client Cert Inspection and On Demand Cert Inspection with Windows Logon Integration.

421901-1

showrestorebutton:i:0 can be specified in RDP Custom Parameters. Users just won't see this 'Restore down' button anymore.

422818-4

"Store information about client software in session variables" setting is removed from the Visual Policy Editor for these Endpoint Security (Client-Side) software checks: Antivirus, Anti-Spyware, Firewall, Hard Disk Encryption, Patch Management, Peer-to-peer, and Windows Health Agent.

426623-13

Improved PAC file download mechanisms

427830-6

Network Access connection will not be established if PAC file specified in NA resource cannot be downloaded within 30 seconds.

429362-7

EDGE Client properly reconnects when network connectivity is restored. Previously full reconnection was done in this case and the previous session was not removed.

430531-3

Computer group policy settings are updated after establishing VPN connection with Windows Logon Integration.

431810-4

Processing is now provided for exceptions that could occur when using a Kerberos auth agent in a multi-domain SSO configuration.

432333-13

Java Application Tunnels now work when Microsoft Internet Explorer 11 runs with Enhanced Protected Mode. However, the tunnel is bound to 127.0.0.1 due to limitations of this mode.

433243-5

BIG-IP IdP subtracts three minutes from the NotBefore timestamp in an assertion to accommodate Service Providers whose clocks might be behind.

436177-5

Fixed arbitrary commands execution: check cab file and webpage are located on same server.

436180-6

Edge Client will only install controls from trusted hosts.

436183-5

Check if critical section object was initialized before deleting it.

438292-8

Resolved issue of Web AppTunnel re-using wrong existing loopback for different backend server IP.

438730-3

Fixed BSOD caused by DNS relay filtering driver in very specific condition on Windows XP SP3.

439280-14

When installing VPN driver on Windows 8.1 with partially uninstalled VPN driver, BSOD no longer occurs.

440792-6

Client proxy settings specified in a Network Access resource are applied without an occasional miss now.

441318-2

The special character "." can now be used for a user name.

441355-2

Improved VMWare View native client error reporting and prompting for the new password.

441507-4

SWF parser now correctly rewrites a compressed object when the compressed body is followed by data.

441830-8

Incorrect overriding of VPN driver was causing BSOD. Old driver is now uninstalled before new one is installed.

442598-1

Do not close session if session timeout check request fails.

447013-3

Browser detection JavaScript improved to support Internet Explorer 11

447302-2

APM correctly supports 'redirect' ending in an access policy for web browser clients when deployed for Citrix Web Interface in proxy mode.

449141-4

Notifications to the user when the BIG-IP Edge Client must reboot to complete updates have been improved.

450155-5

Fixed incorrect handling of component installer which was resulting in a MSI installer to believe that installation had failed.

451213-2

Added logs to distinguish static ip allocation from dynamic ip allocation.

451864-4

Always preserve locally configured DNS suffixes when establishing VPN connection.

452614-5

Edge client now contains RSA SecurID software token support for OS X

452618-4

LDAP servers in a pool will now timeout correctly if a node can not be reached

452621-4

Logon page changes for integrating RSA Soft token SDK with edge client.

452625-7

Edge client cannot automatically retrieve RSA SecurID software token if configured on Logon page

453188-2

Custom Dialer no longer stays in an Authenticated state for 40 seconds to negotiate the IPv6 protocol when IPv6 is not enabled.

454322-3

When Allow Local DNS Servers option is enabled, DNS servers from interfaces which are down, won't be added to VPN exclusion list.

456911-2

A certain scenario in GTM deployement was fixed where access to certain corporate resource might be denied despite network access connection.

458167-4

Improve logging and error code checks for EAM / OAM component.

459870-3

Now BIG-IP Edge Client in Always Connected mode properly processes cancelling captive portal detection.

459953-2

When an LDAP query runs and the user password is not retrieved or necessary, a misleading error message about NULL cyphertext is no longer logged.

460265-1

apmd crashes with null tcl interpreter object. This is now fixed.

462258-4

after fix, a ldap operation times out in 3 minutes, so a thread will not block any other and service can recover as soon as connection to backend is restored.

462481-1

OAM code is fixed with proper exception handling where Oracle API calls are made.

463505-4

Added factor authentication support for to Edge Client soft token integration.

463538-4

Edge Client now correcting sends PIN for RSA Soft Token clients while in New Pin mode.

463735-4

[SecurID SDK] In case of PIN change user is prompted to input Passcode to PIN field.

463776-3

VMware View client does not freeze when APM PCoIP is used and user authentication fails against VCS 5.3

464313-2

Now dynamically created forms with absolute action path are handled correctly even with non-empty BASE tag.

464319-2

[SHP2013][IE10-IE11]: Calendar widget does not work in Announcement edit page. This is now fixed.

466605-3

JavaScript: Portal Access variable 'r' is now a local variable.

466617-2

Now routes for Exclude Addrress Space are correctly removed when NA connection is terminated if the client was switched to another network.

466797-5

Now EdgeClient shows warning about session exipartion when maximum session timeout is reached.

466898-2

Enterprise Manager reports now work correct when accessed via Portal Access.

467287-1

Previously, Policy Sync would add whitespace to Forms-based SSO configuration objects, which prevented the configuration from running. Now Forms-based SSO configuration will not have whitespace added and configuration runs as expected.

467597-5

InspectionHost plugin will now be installed to the "current user" profile (as opposed to all users) and therefore will no longer prompt for administrative password.

468478-4

When the 32k storage limit is reached, the oldest application cookie is discarded, allowing the application to continue processing new data.

469960-2

In this fix we implemented a throttling mechanism, so that when number of fds in the queue reaches a certain threshold, apd will stop accepting new requests, until the number of fds in the queue decreases to a defined level. We introduced three db-variables; - to enable/disabling throttling - to define a high water mark beyond which release of any connection handle will be stopped and - a low water mark to allow further connection from tmm.

470225-3

Machine Certificate checker now correctly works in Internet Explorer 11

471014-8

Openssl improvements.

471331-1

Fixed intermittent resets when access policy execution in progress simultaneously from multiple browser tabs.

471452-1

When URLs from multiple browser tabs starts access policy, the landing URL is set to the URL from the browser which finished the access policy execution.

471714-2

The APM Email agent now generates emails using CRLF at the end of the header and as a separator between the header and the email body, conforming to RFC 5322.

471825-2

The Email agent was updated to comply with RFC 5322 to include the "Date:" header.

471893-3

A problem in which the BIG-IP system when, configured as a SAML IdP , might reboot tmm when executing SLO protocol in certain conditions has been fixed.

472040-5

TMM with BZ 455113 is no longer crash when using ACCESS::session iRule comamnd.

472216-1

Fixed alignment of connection duration counter for customized Edge Clients

472825-3

Dashboard no longer displays a dip in active session count when primary blade is comes back from a reboot

473377-4

Fixed to accept NameID format urn:oasis:names:tc:SAML:1.1:nameid-format:unspecified

473386-3

Improved Machine Certificate Checker matching criteria for FQDN case

473697-5

HD Encryption check now provides a way to check encryption status of all drives or system drive only.

473728-2

Now absolute action path for any form in HTML page is rewritten correctly at submit time.

474392-5

Code signing of executables (app, plugin and installer) have been updated to Apple's latest (v2) signature requirement.

474532-4

Proper validation was added to check correct messages were received on proper URL. Logging was added for failing cases.

474730-4

Now forms with absolute action path and tag with id=action inside are handled correctly.

474757-3

OpenSSL Security Advisory 8/6/14 (1.0.1i Update).

475163-4

Now HTML forms without action attribute are handled correctly.

475262-2

Resolved issue when APM configured with URL ("https://....") Edge Client for Windows does not resolve APM hostname while reconnecting.

475360-5

Resolved issue when Edge client remembers specific VS URI after it is redirected.

475650-4

Issue is fixed that caused tmm to occasionally restart when processing SLO messages.

475682-5

EAM used to send multiple cookies headers in HTTP message. Multiple HTTP headers like this are treated as comma-separated by some receivers. Now EAM adds a single Cookie header with the cookies delimited by semi-colon.

475770-2

Improved routing table managment for 2 and more network interfaces

475847-2

Now tag end is determined correctly in case of dynamically created content.

476133-2

_lastUseTime in OAM ObSSOCookie is updated on successful authentication and authorization process.

477445-2

Client modified to restore routing table state and select active interface (on a system connected to the same network segment through multiple interfaces).

477474-1

HTML Attributes with names using '-' are now handled correctly in Portal Access.

477540-2

apmd no longer crashes with null tcl interpreter object when used with ACCESS::policy valuate irule command..

477642-4

In Portal Access assignment of empty string to location.hash property no longer causes page reload loop in Firefox.

477841-2

Safari 8 will now properly use the admin-defined proxy settings if available.

477966-1

User can restart bigip to fix custom report error. Make sure the table apm.log_param_metadata_ui is created in mysql db.

478115-4

The action attribute value of a form HTML tag is now properly rewritten in the Minimal Content Rewriting mode when it starts with a "/"

478222-2

Seven new categories and one category name changed category in URL Filter DB.

478285-1

An issue with routing table not being restored correctly in multi-homed environment when server settings disallow local subnet access is now fixed.

479524-4

Portal Access no longer crashes if URL in a "Refresh" header matches the a Portal Access bypass list entry.

479715-1

The errant behavior is caused by an improper URL being presented by the error page. When APM checks the improper URL, it causes it to issue the same error page. This has now been corrected.

480047-2

BIG-IP EdgeClient now allows to generate CTU report.

480247-4

Edge client doesn't update its application directory anymore, instead it uses /Libarary/Application\ Support/ directory.

480360-4

MAC edge client was fixed so that it doesn't block textexpander's functionality.

480995-2

APM client components are now using extended logging by default.

481020-2

Resolved intermittent routing table issue that caused Traffic not to flow through tunnel if proxy server is load balanced

481046-4

Wrapper for scriptTag.text='source script' is fixed to rewrite 'source script' for all browsers.

481203-1

While creating memcache entry, we no normalize the username into utf8 lowerecase. This makes sure, there is only one entry for all combination of usernames.

481257-4

CTU report now includes information on "OPSWAT Integration Libraries V3".

481663-4

If customer doesn't need optimized tunnels, app tunnels, remote desktop then he can safely disable run disable the db variable "isession.ctrl.apm" which disables isession. Then do "bigstart restart tmm apd" so that the db variable takes effect.

483113-2

A cosmetic issue with the server selection menu showing white background is now fixed.

483379-3

An issue with Edge Client consuming high CPU and having unresponsive menu icon is now fixed.

484315-1

Security patches applied to krb5 library.

485304-2

Fixed root cause of crash - improper memory managment.

485465-5

Issue causing tmm core is fixed.

486661-2

This is an RFE feature.

487472-2

An issue with Java installer failing to install the InspectionHost plugin and creating a zero byte file under ~/Library/Internet Plug-Ins/ is fixed.


WebAccelerator Fixes

ID Number Description

467633-2

Extra spaces are no longer added to the minified CSS.


Wan Optimization Manager Fixes

ID Number Description

426482-2

The Octeon now properly handle decompressing large files on 2100/2150 blades without any failures.

479889-4

This release resolves memory leaks that occurred when iSession and iControl were configured.

480305-2

Fixed icontrol / isession memory leak issue; set proper log level to prevent log flooding.


Service Provider Fixes

ID Number Description

472376-2

Drop processing the message if the ingress pcb is not present anymore.

478442

Core in sip filter no longer occurs when sending HUDEVT message while processing of HUDCTL message.


Advanced Firewall Manager Fixes

ID Number Description

429885-3

When operating in firewall (AFM) mode i.e. default deny, BigIP will now count and log (if enabled) any traffic that does not match a Virtual or SelfIP and is being dropped/rejected.

478816-1

An enhancement that allows logging the TCP events and errors on fastL4 virtual.

480194-1

Perform VS DWBL lookup after accept-decisive firewall rule match at global level

481189-1

The load factor controls the minimum percentage of fullness that need to be reached before the table is expanded to a larger size. Setting it to 25 by default prevent the firewall rule compiler from growing the table size too aggressively and results in big firewall BLOB.

481706-1

Improved security logging to reduce incorrect messages.

484013-1

This fixes a memory leak when tmm is overloaded and forwards flows to the peer, and packet classification is enabled with "log translation fields" in the logging profile.

478462

Whitelist counts now increment appropriately

480125

100+ rules may now be displayed in the active rules page.


Policy Enforcement Manager Fixes

ID Number Description

476904-1

Adjusted Logging levels to remove potentialy confusing messages.


Carrier-Grade NAT Fixes

ID Number Description

456963-2

TMM now gracefully handles this rare condition.


Global Traffic Manager Fixes

ID Number Description

482442-1

State changes for wideips should be updated correctly when the "Update" button is clicked in the GUI wideip properties page.


Cumulative fixes from BIG-IP v11.5.1 Hotfix 5 that are included in this release


TMOS Fixes

ID Number Description

365764-3

It is now possible to run a UCS load even if there are partitions still containing GTM objects.

376120-1

tmrouted no longer restarts when reconfiguring a previously deleted route domain.

404716-6

Decapsulated tunnel packets are correctly handled by packet filter.

405067-2

The system no longer adds the active bonus when the HA group score is 0 (zero). This is correct behavior.

413689-3

TMM no longer crashes with certain combinations of profiles.

421317-4

Virtual servers now correctly display a red status when its default pool's status is red, regardless of whether or not a connection or rate limit for the virtual server have been reached.

429871-4

F5 improvement of the integration of latest epsec packages

431985-5

Monitor instance is now correctly re-enabled, if it was previously user-down, on all devices after an incremental sync. In earlier versions it would only update properly on the source device of the sync.

438159-3

Users can now use pre-shared key with anonymous IKE peer for IKEv1 negotiation.

440179-2

Fixed memory leak in creating a wildcard DS-Lite tunnel.

441063-3

Adding DNS name-servers via tmsh no longer causes a momentary loss of access to tmsh.

441174-1

Do not handle fragmented packets in Round Robin DAG.

445924-5

Changed code to allow IP multicast packets to be delivered to all blades so that OSPF failover can occur.

446352-4

IKE negotiation is now successful and the IPsec tunnel comes up properly and passes traffic with NAT-T and floating tunnel end point address.

447266-8

Took steps to ensure that MCP would not attempt to modify an object that has been both created and deleted in the same transaction.

448054-2

Secondary blades are now sent the sync status information from primary blades, so the sync status will not be reset if the primary blade fails over.

450089-5

Add diagnostic code to the request_group to abort when it is being deleted while actively processing.

450129-10

LOP (Lights Out Processor) firmware version 2.08 for VIPRION B2100, B2150 resolves the following issues: (ID446907) Alarm LED may be Red upon powering up VIPRION B2100, B2150 blades (ID439435) AOM Command Menu no longer reports failure when successfully powering up VIPRION B2100 or B2150 blades.

450458-1

Resolved build creation issue due to the dependency of various objects that need to be built before compiling sources that use them.

450684-1

Corrected an internal report used for QA/testing.

450693-1

F5 Internal: Correction to internal firmware report.

450694-1

F5 Internal: Correction to internal firmware report.

450794-3

An issue with handling DHCP information in virtual environments has been corrected.

451424-1

This release corrects a condition that could cause snmpd or SNMP subagent daemons to generate a core and restart.

451458-1

fix leasepool stat to return data only for primary blade

451602-4

Changed the interface match to look up host interface instead of vlan interface.

453256-2

The save mechanism in TMSH has been updated to save the monitor parameter fields in correct format for a subsequent load.

453432-1

Fixed a number of NVGRE config cleanup issues that were causing the crash.

453700-2

Changed JVM default settings to use less memory and allow TMM to acquire needed memory during its startup.

453951-2

The sys db security.commoncriteria setting value no longer reverts.

455138-1

Fixed a memory leak that occurred when the route for the remote endpoint of a tunnel was misconfigured.

456064-1

Added code to allow MCP to continue processing profiles when it encounters this configuration.

456735-2

Tunnel objects are now properly freed after deletion.

456848-2

LBH firmware v4.08 for BIG-IP 2000-/4000-series appliances resolves the following issues: ID455728: PSU status/changes reported incorrectly ID450177: AOM controller resets when it has no IP configured ID451493: Fan speed higher than expected ID453493: Change fan control set points for less noise

457130-3

Configuration loads correct virtual-address icmp-echo values

457326-3

Make leasepool stats data structure consistent with leasepool stats table definition.

458198-2

ip6ip4 tunnel with fixed MTU passes traffic as expected.

459123-1

Updated name validation to throw an error when invalid characters are included in the name.

460593-1

The user can create multiple VXLAN tunnels with same local endpoint address when flooding type is multipoint or none.

461581-1

In the existing behavior, tunnel objects are config synced automatically to a standby device. The DB variable "iptunnel.configsync" can be set to "disable" in order to disable the automatic config sync of tunnel objects. The default value of the DB variable is "enable". Please note that before creating any tunnel objects, the DB variable should be set accordingly if needed, and toggling its value subsequently could lead to an unexpected behavior.

461592-1

The device can process inbound VXLAN packets even if it is in a standby mode.

462045-2

This release has a longer timeout for activating the new HSB bitfile after reboot, so the HSB bitfile-quarantined issue does not occur, and you can successfully boot from 11.5.x to 11.4.x or 11.3.x.

463603-4

IPv6 any address "::/0" is saved properly in configuration file.

464024-2

Ensure that all pipes are closed when a TMSH command is completed.

466034-2

Treat VxLAN packets as UDP packets by default in HW.

466752-2

Monitor instance is now correctly enabled or disabled after an incremental sync.

468021-4

"wom-default-clientssl" and "clientssl-insecure-compatible" were added to two fixup scripts, and code to prevent infinite recursion was added to another script.

471496-1

Standby node sends LSA summary for the default route with a value of 16777215. The ospf routers in the stub area pick active node as the gateway for the default route.

472613-4

Power supply status changes are now reported correctly on BIG-IP 5000/7000 Series platforms after power supply removal or insertion. LBH no longer watchdogs without a network address set.

474166-2

The ConfigSync operation completes successfully, and the sFlow error no longer occurs.

474465-1

Average system CPU and busiest CPU calculation is now based on the critical data plane processing.

477031-1

No TMM restart when deleting multiple VXLAN tunnels with flooding type multipoint.

479681-1

Run rsync-cmi in background so that we don't block (and slow down mcpd)

480248-1

Resolved DB 13 error while uploading the UCS.

480931-4

ShellShock bash vulnerability has been fixed with upstream patches for CVE-2014-6271, CVE-2014-6277, CVE-2014-6278, CVE-2014-7169, CVE-2014-7186, and CVE-2014-7187.

451446

Restored missing slot status and sensor tables.

460863

Changed the label to the right text as "Failover".

461580

Resolved intermittent kernel panic that causes crash using telnet with external monitor.

474332

F5 will start releasing "base installable" VM images as part of hotfix release. The VM images will consist of base RTM + installed hotfix on top of it. Such images are going to be ready for deployment without the need to apply hotfix as an additional step.

476126

The latest Emulex NIC driver was included in 11.5.1-HF5. It supports SR-IOV and VLAN tagging when Emulex NICs are used.

476815

We fixed a scenario that could lead to a crash in the logmysqld daemon.

479302

Remove the seldom used internal debug table which eliminates the periodic accesses.


Local Traffic Manager Fixes

ID Number Description

348194-5

Allow configuration of FIN_WAIT2 timeout

411101-5

Resolved an issue found in F5 testing for ability to tcpdump mgmt_bp_* and loopback. Also added vm_tap_* for guests.

416250-3

Added timeout to cancel incomplete SSL handshakes and retry

418889-5

A TMM crash bug has been fixed.

421964-5

BIG-IP system now correctly aggregates an LACP-enabled link.

435652-8

The timing differences in the Nitrox crypto accelerator have been eliminated: CVE-2014-4024

437612-5

Resolved issue when changing HTTP::uri in an HTTP_PROXY_REQUEST iRule doesn't take effect by adding HTTP::proxy command, allowing disabling of fwd-proxy functionality (enables proxy-chaining).

437905-4

Add db-var so the buffer size multiplier can be changed via tmsh.

439653-4

Long-lived connections consistently use policy settings from the beginning of the connection, and for the lifetime of that connection, regardless of any virtual server and policy configuration changes that occur in the interim.

439712-6

Single SSL transfers will perform much better on 4200/2200.

442410-6

Resolved TMM error message 'HUDEVT_EXPIRED (Connection expired) bad pcb magic (0x00585858)' and TMM core on standby member of HA configuration with connection mirroring and connection pooling (OneConnect) enabled.

442584-5

Making configuration changes, such as adding/removing a profile, to the targeted virtual will not adversely affect policy execution.

445411-2

The Nitrox crypto accelerator will no longer hang when performing RSA verification.

445571-3

Support Connection Mirroring with BigTCP.

446820-4

TMM no longer crashes due to a poorly formatted log call.

447091-9

Ensured that packet filters with orders greater than 32767 are able to be deleted.

447390-3

Loose-close no longer causes issues with traffic on FastL4 virtual servers.

448327-6

Prevent memory leak when iRule suspends or aborts an DNS command.

448606-2

The listener ref count no longer overflows and causes a TMM core and crash.

449636-4

'tmsh load sys config' now loads policy actions correctly, so some actions are no longer ineffective.

449845-6

DNS filter now formally enters framework.

450101-2

Option code 0x0008 to the client-subnet of the EDNS0 record is now recognized.

450202-2

Fix MSS calculation when using fastl4.

450584-3

Safenet HA is now supported

450640-1

Improved performance found by F5 internal testing with ssl.

450689-1

The statistic is now properly displayed.

450713-3

Out-of-order segments received after FIN will be forwarded as expected.

451340-1

Enable faster performing software client authentication and disable ec cert/keys.

451889-3

Made changes to once again allow the attr_type to be optional for all forms of RADIUS::avp.

452232-3

iRule no longer uses stale qname.

452264-1

A new iRule command [HTTP::proxy disable] has been added so (explicit) proxy request handing can be turned off and the request can be forwarded to another proxy.

452387-3

HTTP::header is_redirect now works correctly again.

452439-2

TMM will not crash when enabling DOS sweep/flood detection feature regardless of threading.

452579-2

Corrected calculation of server-side MSS.

454463-5

A memory leak when executing a suspended DNS iRule many times has been fixed.

454853-3

An LTM policy with incorrect http-header name or http-cookie name no longer causes a crash.

455361-3

Fixed improper handling of ICMP (Internet Control Message Protocol) 'Fragmentation Required' messages from routers. Bug resulted in extremely inefficient behavior by BIG-IP TCP segmentation offload if path MTU (Maximum Transmission Unit) was smaller than what TCP endpoints negotiated.

455553-1

No multiple retransmission of the entire send queue when the MSS size is improperly large.

456753-3

TMM no longer may restart on Virtual Edition systems when receiving an incoming packet on a tagged VLAN that need to be forwarded to a different TMM (e.g. a CMP-demoted virtual server).

456942-1

After the fix, if the domain name in the iRule is invalid or memory allocation failure happens when modifying the RR owner name using the DNS:name iRule, TMM will not crash.

458480-3

TCP Segmentation Offload (TSO) no longer causes the Traffic Management Microkernel (TMM) to restart during high memory usage.

458597-3

Now there is no memory leak when transfer a zone to zxfrd.

459001-1

PVA statistics for each flow are tracked in hardware and software. The software copy of the hardware flow statistics was not correctly reset when flows were evicted from the PVA hardware and then subsequently reloaded back into the hardware. This eventually resulted in a numeric underflow in the statistics counters that were then displayed with very large positive values.

460197-8

active_requests is updated when a flow using hardware acceleration is reset.

465866-6

The current tag file only indexes the sources for tmm. This makes it difficult when debugging customer issues that reference code within libraries, primary tmjail (xbuf/xfrags) and tmm_tcl. The fix is simple: index libraries that are commonly used, along with tmm.

466260-1

This release fixes a crash bug where TMM asserts 'we always have room in tx ring'.

467986-1

TMM no longer cores when running the command 'tmsh show ltm dns cache records key cache myCache' on a cache with stored DNS key records.

470715-2

A new db variable vlan.backplane.mtu is added to configure tmm_bp vlan mtu size, default to 1640.

472532-1

cipher id 0x006b (dhe-rsa-aes256-sha256) has been added

473396-1

TSO no longer leaks xfrags.

475231-4

Connection remains open after dispatching CLIENTSSL_CLIENTCERT iRule event, which prevents accessing invalid memory.

476386-1

Resolved issue found by f5 testing DHE-RSA-AES256-SHA256 and DHE-RSA-AES128-SHA256 to be supported for tls1.

467507

Use decrypted CCS flag instead of CCS flag. In renegotiation, sp->rxccs is set when encrypted CCS is received. Decrypted Client Key Exchange message could be received after encrypted CCS message is received. So BIGIP should use decrypted CCS flag instead of encrypted CCS flag.

474459

Resolved duplicate line issue found by F5 testing to ensure correct building of release.

479372

 


Performance Fixes

ID Number Description

447250-1

A TMM crash bug involving PEM under high load has been fixed.


Global Traffic Manager Fixes

ID Number Description

439854-5

An additional attempt is made to match virtual servers by addr:port, even if there is an LTM Name that does not match.

440284-2

The LTM big3d now correctly identifies and monitors 10.2.4 or earlier LTM virtual servers.

442133-4

Disabling Synchronize on one GTM no longer disables Sync on all GTMs in the sync group.

451985-1

We delay sending the configuration timestamp until the end transaction message has been received. This fixes the problem with sync becoming disabled

463369-2

Fix problem found by F5 testing that prevents GTM sync issues when changing configurations.


Application Security Manager Fixes

ID Number Description

438809-4

To improve brute force mitigation, we made the following changes: -We added a new internal parameter: bf_num_sec_per_value. This defines how many seconds is a single measure unit for a failed login. For example, if you want to configure 7 failed logins per 5 seconds, in the Configuration utility configure "7" as the threshold value (the "Failed Login Attempts Rate reached" setting in the Detection Criteria area of the Brute Force Protection Configuration screen), and from the command line configure "5" as the value of this internal parameter. If this value is configured, the system will detect an attack only by the threshold (and not by the increase). If this value is configured, all traffic from suspicious IP addresses are blocked. The default value for the internal parameter is 1 second. -In the Configuration utility, we removed the validation for all the threshold and minimal values. You can put now very low values such as 1 or 2 in the detection and suspicious criteria.

440057-1

We corrected how the system logs requested URLs that contain navigation parameters configured in the security policy.

449946-2

The Enforcer correctly sends information to the Policy Builder about specific value and name meta characters that were previously mishandled.

453568-6

The client side challenge mechanism now correctly reconstructs the referrer header.

460514-4

To prevent the system from running out of memory, the system requests a configuration sync 5 minutes after a failed one, and not sooner.

469798-1

We prevented a deadlock that occurred when sending synchronization events.

469825-1

We fixed an issue where rarely the Enforcer crashed when trying to match signatures on the body of a re-constructed POST request.


Access Policy Manager Fixes

ID Number Description

225651-5

The installation path for the BIG-IP Edge Client was updated to avoid collision with third-party software installations.

398134-1

Now APM supports non-ascii usernames and passwords when performing NTLM Front-end Authentication and NTLM Back-end SSO.

419809-1

An error message formatting issue was fixed.

425070-4

The HTML profile code was improved for security reasons.

425507-5

An issue in which logd could start to consume 99% of CPU after table rotation has been fixed.

425731-6

A TCP reset is not longer sent to a client during access policy execution.

431512-4

Now APM validates the origin header of the WebSocket handshake and accepts connections with correct origin only.

436569-1

Now icons are displayed for Citrix applications on an APM webtop when Kerberos SSO is used.

437326-6

Now APM supports Citrix Receiver for HTML5 version 2.1

437881-4

In an HA configuration, any users deleted from the localDB on the current unit are now deleted from the standby unit also.

438278-1

The Access Profile which is associated with one or more AAA server objects can be deleted with the fix provided.

439463-4

Now Citrix Receiver for Mac and iOS gets the correct config.xml file when working through a Wi-Fi router and APM is integrated with Citrix Web Interface.

439518-1

User now can sync over the changes to all the location specific configuration such as optimized-app in network-access or pool item in pool once that 'Use Source Configuration on Target' is set to YES in policy sync dialog.

440290-4

APM now prevents the retransmission of policy sync requests that caused status messages to fluctuate.

440385-4

Support of Internet Explorer 10 (without compatibility mode) for machine certificate checker was added.

441210-1

The tmm process provides more robust handling for PCoIP traffic.

441553-5

A Network Access client can now connect successfully after one or more failovers.

441659-4

Fixed User-mode installer service: it does not require admin rights for limited users anymore.

441681-2

You can now use the Firefox browser to successfully edit these actions from the Visual Policy Editor: Advanced Resource Assign, LDAP Group Mapping, AD Group Mapping, and BWC Resource Assign.

442393-4

APM will now attempt to terminate Citrix session when user logs out of APM Webtop.

442656-5

Fixed race condition of multiple establishments/teardown of PPP tunnels lead to loss of availability of leasepool addresses.

445399-5

Support was added for Network Access over PPPoE.

445970-8

[Java][Mac][NA][EPS] NA and EPS auto installation is now working with Java 7 update 51

448896-4

An HTML page with base URI (HREF attribute of the BASE tag) is rewritten correctly.

450033-1

Windows View client 2.3 can consistently launch desktops via APM

450298-8

Logging on to Outlook Web App 2013 (SP1) using portal access with Firefox browser now works without producing an error.

450360-4

Now Citrix Session Sharing works correctly for any version of XenApp.

450728-1

Now APM correctly handles VMware View client requests with empty body.

450845-2

Under logging stress, logd no longer writes duplicate fd errors in the log.

451260-2

After upgrading directly from 11.4.0 to 11.6.0, the configuration loads successfully now even if it contains "citrix-client-package" files that were uploaded (and unzipped) using the GUI.

451387-3

Support of button-less logon pages is added to BIG-IP Edge Client.

451588-4

Portal access renders the data correctly when creating a new item on Sharepoint 2013.

451777-3

If a connection issue or a database problem occurs the first time that a user tries to create a custom report, an error message displays now.

452182-4

Flash ActionScript 3 rewriter now correctly rewrites URLs containing "../".

452344-4

HexToBinReverse() is now ncorrectly converts unicode strings.

453164-6

Routes are restored after disconnecting from the Network Access connection.

453514-1

A problem in memcached causing intermittent failures was fixed.

453531-1

Multidomain SSO no longer resets on secondary authentication domains.

453722-1

Alleviate issues such as GUI unresponsiveness or even disconnect when policy sync is applied to a device group that contains 5 or more members.

454010-3

APM now recognizes Internet Explorer in compatibility mode on Windows 8.1 correctly.

454248-4

Fixed unnecessary localdbmgr messages logged in /var/log/apm every minute at the notice level.

454369-1

The URLDB plugin comes up properly now and traffic proceeds normally.

454370-4

The messages that communicate status of PolicySync between devices can arrive unordered. This is now fixed.

454547-1

Forms - Client Initiated SSO authentication handles decryption failure correctly.

454759-4

Now APM reports http error 500 when View Connection Server response is not 200 OK and writes an error log message.

454899-5

Guest user will get access denied response when use the token of admin user request to create/delete/modify local db user.

455039-1

Now Citrix HTML5 Receiver v.1.3 available with Storefront 2.5 can be hosted in APM Sandbox and launched from APM Full Webtop.

455113-4

ACCESS::session data get has been extended to return configuration variables: ACCESS::session data get [-sid ] [-secure] [-config] [-ssid ]

455284-2

Firewall rules no longer incorrectly interfere with TCP monitor traffic generated by the BIG-IP system on port 54321.

455426-4

Now user with apostrophe in the name can log in with Citrix Receiver successfully.

455892-1

Now APM support AGEE SSO to new Citrix StoreFront 2.5 backends.

456098-7

Remove the logic for specific internal requestID in XUI

456714-4

Fixed for cases when Assertion does not contain SessionIndex and SLO is configured.

457925-2

When BIG-IP as SAML SP, IdP initiated authentication now works with the first attempt.

458199-1

Resource delete handler should check for the reference by psync-dynamic-resource.

458211-6

The EAM module now continues to function correctly when the size of a cookie in the HTTP request is greater than 4095.

458447-4

An issue in Network access; where customer would see "IPv4 Addr collision" in logs has been fixed.

458485-1

The code is updated so that APD no longer crashes on certain VPE expressions, such as Date Time check or 'encoding' command due to a change introduced by fixing 424938.

459780-3

Added [APM] Network Access option: "Do not enforce IP scopes in Proxy-Auto-Configuration".

459977-2

If there is a space in value for radio or select type input, logon page does not show the input elements. This is now fixed.

460062-4

Access policy export works correctly even when a resource with a long name has been assigned in the policy.

460272-3

Additional logging included for troubleshooting captive portal detection.

460645-3

Users can now close logon window in "Locked Client" mode.

460715-3

Fixed using F5 captive portal probe URL in BIG-IP EDGE client for Windows instead of default Microsoft captive portal detection URL.

460762-2

Citrix apps consistently start from APM Webtop when using Kerberos SSO to XML Broker.

460939-1

Additional exception processing (for ObAccessException from the SDK) was added to the EAM module. The module now handles this exception by displaying an error.

460958-2

Cannot Start built-in PAC file server after multiple connecting/disconnecting edge client multiple times. This is now fixed.

461087-4

Fixed [APM] Crash in ActiveXDialer if proxy address is missing.

461624-1

A problem with APD in chassis that resulted in the portal access connection terminating has been fixed.

462143-3

Show main EDGE client UI when user click on Connect, Disconnect or Auto-Connect button in a system tray.

462669-2

For Windows Phone clients in BIG-IP APM 11.6 session.client.platform value changed from "WinP8" to "WindowsPhone".

463508-1

The slowness is due to an unnecessary sleep of 1 second even when creating configuration snapshot is successful. The fix is to re-factor the retry logic such that sleep is performed when creating configuration snapshot has failed.

464159-2

JavaScript: Now isolated submit() calls are handled correctly and form action paths are rewritten at such calls. The situation when a submit() call refers to a separate function is also supported.

464748-4

In portal access, a cookie with an empty or wrong expires field no longer causes a JavaScript failure.

465338-1

The curl-apd component (curl7.25.0) no longer enables SSL_MODE_RELEASE_BUFFERS; it is no longer affected by OpenSSL vulnerability CVE-2010-5298.

465339-1

The curl-apd component (curl7.25.0) no longer enables SSL_MODE_RELEASE_BUFFERS and is no longer affected by OpenSSL vulnerability CVE-2014-0198.

466317-8

The following OpenSSL vulnerabilities have been addressed in APM clients: CVE-2014-0221, CVE-2014-0224, CVE-2014-0195, CVE-2014-3470

466325-5

Continuous policy checks now doesn't kill the session if some configuration, configured to be ignored, changes on client side.

466488-4

Under high load conditions when the HTTP auth agent is configured in the access policy, now the access policy daemon (APD) continues to respond.

466877-5

Issue with signature validation is fixed

467849-2

Split tunnel is improved when connecting to a FirePass with a APM build of the edge client.

468889-2

Issue is now fixed when AFM is enabled with Optimized Tunnel and traffic is no longer dropped.

469100-4

Javascript index expressions with list of values are now correctly rewritten by Portal Access

469335-2

Validation is improved to ensure that a custom URL category includes at least one URL.

469754-1

Users deleted from the local user database are now prohibited from logging on using invalid credentials.

470382-1

Location-specific objects display correctly in the Policy Sync GUI whether the Location Specific check box is cleared or selected on the Static Resources screen.

470414-3

Portal Access no longer crashes when rewriting some incorrect flash files.

470675-3

Improved security found by internal F5 testing.

471125-1

Resolved rare condition that causes Edge-Client to work improperly when Client uses proxy to connect to BIG-IP.

473286-1

Resolved error deleting folder: Cannot remove directory with symlink to sandbox for partition

474657-1

Edge-Client stops after authenticating thru Captive Portal.

438117

OLH is now updated to reflect changes in Machine Certificate Auth certificate selection criteria.

455735

[OLH] "APM Access Profile Log - 404 ERROR" added.


WebAccelerator Fixes

ID Number Description

450030-2

The Vary on user-agent header is properly generated whenever WebP content is served.


Enterprise Manager Fixes

ID Number Description

449988-3

Values returned by big3d are now escaped so special characters do not create parse errors.


Service Provider Fixes

ID Number Description

450001-3

Flow control in SIPP filter no longer blocks flow improperly.

450019-3

LB::prime or mblb_connect now executes outside of the TCL execution. Priming will actually happen after one event cycle later.

450055-2

When the HTTP terminates its connection, BigIp receives an SSL encryption alert along with a FIN from the server (close SSL from the server), BigIP completes the HTTP response before closing the client connection.

452440-1

TMM CPU/Memory grows in accordance with the connections. If the SIP connections remains steady the resource utilization will be steady.

454348-1

BIG-IP delays closing the internal connection to the IVS after the final chuck of the ICAP response has been received, until all the payload has been transmitted to the HTTP destination.

455006-2

Invalid UDP datagrams that interfered with SIP processing are now dropped.


Advanced Firewall Manager Fixes

ID Number Description

462266-1

The issue is fixed now to clean up the memory associated with the old AFM policy on a SelfIP context when the context is modified to have a new AFM policy.

472801

This issue is now fixed so TMM will not be restarted if AFM is provisioned and 'tmsh load sys conf default' is done.

477769

TMM crash (panic) is fixed now and TMM no longer panics scenarios with SPDY or HTTP Prefetching enabled.


Policy Enforcement Manager Fixes

ID Number Description

426934-2

The max number of BWC categories per PEM subscriber has been increased to 32. This applies to the dynamic policies only, i.e. the policies defined within Gx provisioning messages.

441554-2

PEM can now handle a large number of new subscribers even when Gx connection is down.

442548-2

A TMM crash bug has been fixed. BIGIP/PEM will now work with PEM + fastL4 use cases with http profile enabled.

444770-1

This issue is fixed that a Rating Group can be assigned to different PEM rules without extra MSCC in CCR

449862-2

Fixed a crash bug involving the handling of RAR messages.

453548-1

A new PEM session will be created and replace any old existing session in an inconsistent state due to fail-over.

460006-5

Added support of numeric characters in PEM rule/policy names.

461089-2

This issues is fixed now. All subscribers are loaded properly after TMM restart.

464841-1

The max length of the Gy redirect address has been increased from 64 bytes to 256 bytes to accommodate the majority of the use case in real world.

464850-1

The issue has been fixed that BIGIP/PEM will handle a new flow that has no session created when quota management is specified in global policy.

466002-1

BIGIP/PEM will now properly handle the case when 2 or more policies from PCRF refer to the same existing rating group.

468123-2

Custom attributes will now be added and will be returned when session is queried.

468809-1

TMM no longer crashes during subscriber provisioning testing when the Gx connection is re-established.

470690-2

Session cleaning priority has been lowered and CPU will not spike when sessions are deleted or replaced with Gx enabled.

470850-1

PEM will now clean up the session if CCA-T received with 5002 error code.

471867-1

A memory leak when the CCR-I is dropped by iRule has been fixed.

471910-2

DB variable Tmm.pem.diameter.application.silentDelete.prov.error.sessions is available. It should be set to enabled if sessions need to be silently deleted.

472860-2

The session statistics for sessions created by RADIUS is now incremented whenever the user runs an irule on the RADIUS virtual, that creates a new session.

474638-2

Custom attribute for create or update no longer harms the policy list.


Global Traffic Manager Fixes

ID Number Description

448914-1

Object name field now has a correct input validation and escapes javascript.


Cumulative fixes from BIG-IP v11.5.1 Hotfix 4 that are included in this release


TMOS Fixes

ID Number Description

441573-3

The ultimate fix will involve some low-level changes in the UI framework to ensure that the proper query context (in MCP) is set when selecting [All].

442648-3

Modify UI to properly query for the interfaces in All [Read Only] view.

449017-2

F5 found potential data inconsistency between tmsh and icrd in date formats in testing and resolved to prevent customer issues.

453332-3

Fixed an issue with iControl REST calls timing out.

457300-4

Improved IControl REST resources to allow naming with spaces to meet customer requirements.

458109-1

Prevent icrd crashed on the BIG-IP while the BIG-IP was being discovered by BIG-IQ

463655

Fixes MCPd crash during certain iControl REST transactions.


Local Traffic Manager Fixes

ID Number Description

406649-2

Installing a hotfix will no longer cause apd to continuously restart.


Performance Fixes

ID Number Description

455733-1

Fixed crash in dwbld daemon.

432080

Data-plane (traffic) performance for Application Security Manager workloads is significantly improved.


Application Security Manager Fixes

ID Number Description

439758-5

We improved how the Policy Builder handles requests with multiple learning suggestions.

440378-1

Added tmctl stats for dcc, bd_agent, and correlation daemons. This allows visibility into internal state/processing of the daemons to provide external visibility into their internal state/processing to assist diagnostics/debugging.

441213-2

You can now modify a security policy created from iApps (iApps > Application Services).

450241-1

EM can now discover ASM devices.

455389-1

We improved how the system decides on the content profile when there is a request with multiple content-type headers.

455391-1

We improved how the system parses query strings in absolute URLs.

459255-2

We raised the limit of the Explicit File Type Name length from 8 characters to 255 characters.


Application Visibility and Reporting Fixes

ID Number Description

440763-1

We fixed an issue that caused TMM and avrd to core if you assign an Application Security policy, Analytics profile, and DoS Layer 7 Protection profile on a virtual server.

447693-3

We corrected an issue where some reports generated from the Configuration utility and/or from TMSH commands did not work.

448585-1

We fixed an issue when Throughput and Latency were reported incorrectly in cases of incomplete transactions when sampling is enabled.

457982-4

/var/avr/loader will no longer get filled with files that are written by avrd.

462561-5

We fixed a case that caused avrd to crash when external logging of traffic capturing is used.

462968-1

Subnet statistics are now migrated after a version upgrade.

464238-2

AVR profiles with identical names on different partitions can now be created.

466922-1

Now Max TPS and Throughput are displayed properly in HTTP Analytics (if configured in Analytics profile) when drilling down from virtual server to pool members.

464287

When an iRule with HTTP::respond command and Analytics profile are attached to the virtual server, HTTP responses from BIG-IP will not contain redundant chunk headers (at the end) anymore.


Access Policy Manager Fixes

ID Number Description

451777-4

If a connection issue or a database problem occurs the first time that a user tries to create a custom report, an error message displays now.


Advanced Firewall Manager Fixes

ID Number Description

440817-2

Sweeper would no longer reap a flow that would have matched a rule in either global or corresponding route-domain classifier with action = Accept Decisive in the scenario when this particular classifier did not change (and there are no matching rules in the corresponding VIP/SelfIP classifier and VIP/SelfIP default action is set to Drop or Reject).

442988-2

Previously, when searching the event logs using the drag-and-drop custom search, inserting a value from one of the existing timestamp columns triggered an error. This has been fixed.

443300-2

A new field, "Referencing Rule," displays the actual name of the rule that references a rule-list. If the rule is a regular, non referencing rule, the same rule name is displayed in the "Referencing Rule" field.

453377-3

Previously, when a network firewall rule was configured on a Self IP context, and an iRule was specified in the configuration, an error occurred. This configuration now processes traffic correctly.

453779-2

The commands place-before and place-after are now handled correctly in transactions that contain changes to multiple rules.

454435-1

Setting an iRule in a firewall rule attached to the virtual server using the iControl method Local.VirtualServer.set_fw_rule_irule no longer fails when the iRule name does not start with the folder name. The framework automatically prepends the folder name to the iRule name.

454953-2

self-ip and virtual server FW rules can't be converted from a regular rule to a reference to a rule-list with PUT

455744-2

Fixed a management IP firewall rules compilation failure.

456107-1

This behavior is being fixed to make AFM rule matching action consistent with logging for EPHEMERAL connections.

459719-1

Pccd BF Hash table changes to reduce pccd BLOB size

459758-1

Restart pccd to avoid blob-size growth (pccd always starts from scratch)

461582-1

AFM previously matched firewall and IP Intelligence rules against the first TCP packet of a new flow, even if that packet would later be dropped by LTM,for example a FIN or RST packet. AFM no longer matches these packets, and LTM continues to drop them.

462903-1

TMM getting aborted by SOD due to heartbeat miss (when trying to load huge firewall policies) is being fixed.

464774-1

A new db variable, pccd.rule.debug, was added to display micro-rules and micro-rule numbers for each firewall rule. This is a new debugging facility to help troubleshooting issues in configurations with very large firewall rule sets. The outputs collected can be used to analyze the firewall rules to help us make suggestions on how a configuration can be optimized for better compilation performance.

464916-1

Previously, in the active rules or security page, when the user was trying to view the second page of staged rules, the display showed the first page of enforced rules instead. This has been fixed.

464990-1

Previously, sometimes an error would occur when reordering a rule list. This has been fixed.

465963-1

Previously, tmsh reset-stats did not work when the policy rule was made up of rule lists. Now, reset-stats works with such policy rules.

468194-1

On some versions, an iRule would be run on a staged policy, and could drop traffic. Now iRules only run on enforced policies.

469129-1

Fixed a bug where the a crash could occur when compiling a firewall policy with a large number of IP addresses. Compiling such a policy can take several hours; to reduce compilation time set the variable pccd.hash.load.factor value to 25.

469507-1

Previously, when the db variable pccd.alwaysfromscratch was set to true, management port context rules did not always stop processing traffic when they were removed from the configuration. This has been fixed.

469512-1

TMM getting aborted by SOD due to heartbeat miss (when trying to load huge firewall policies) is being fixed.

469729-2

Automated the value for pccd.alwaysfromscratch to save customers from having to manually set.

470366-1

Fixed the regression issue introduced due to fix for BZ 469512

430237

add db variable that allows to define action for global default rule

458433

Compress empty blob spaces to reduce blob size and transient memory usage.

459716

Prevent pccd from using FBC as a compilation backend.

461411

Created a db variable to block IPv4 in IPv6 mapped addresses coming in from the wire.

461602

Fixes for icrd.conf file to support the iControl response for the newly added "Referencing Rule" field in TMSH show firewall policy commands.

463115

A new field "Referencing Rule" displays the actual name of the rule that references a rule-list. If the rule is a regular, non referencing rule, same rule name is displayed in the "Referencing Rule" field.

470820

Fixed the issue that overlapping checks for firewall rules may take several minutes if a rule with 'any' is inserted in the middle of the rule list.


Cumulative fixes from BIG-IP v11.5.1 Hotfix 3 that are included in this release


TMOS Fixes

ID Number Description

416496-6

TMM and mcpd now throttle the amount of data flowing through them for 'show sys connection' commands, so the processes do not run out of memory.

441512-1

Sync now completes successfully, without sflow error.

445919-4

Issuing the command "tmsh show sys connection" when you have over one million connections no longer causes TMM or MCPD to core.

446549-7

During a config sync, steps were taken to ensure that mcpd objects are not deleted until after they have been fully processed.

451507-6

When entering standby due to a failover condition, the BIG-IP system no longer incorrectly responds to ARP requests.

458676-6

Corrected possible internal Rsync port exposure.

459723-4

CMI rsync daemon will always restart now when necessary.

462191-4

Rsync security fix is updated to work in cluster environment.

465799-1

OpenSSL has been upgraded to eliminate the man in the middle attack.


Local Traffic Manager Fixes

ID Number Description

354161-3

DNS Express expires zones according to the expire value contained in the zone SOA record.

449903-1

Resolved intermittent issue under heavy DNS cache traffic for a timing issue that could cause a crash.

449920-3

A memory leak using compression on BIG-IP 2000-series and 4000-series appliances was resolved.

450698-4

Use a consistent method for storing external datagroups in TMM.

455267-1

When forwarding proxy requests to an IP address that results from a DNS resolution, the route-domain parameter is now used correctly and it now is possible to use the HTTP explicit proxy (or SWG) when the target of the connection is not in route-domain 0.

457598-2

Improved potential ssl security in LTM F5 testing.

459495-1

The HTTPS monitor has been improved to automatically attempt SSLv3/SSLv2-compatible protocol negotiation if TLSv1 protocol negotiation fails.

465908-1

BIG-IP TLS virtual servers will now reject the connection when an early CCS message is received.


Carrier-Grade NAT Fixes

ID Number Description

452225-2

Resolved when the BIGIP is configured to use SP DAG (src-ip on inbound/subscriber vLAN and dst-ip on outbound/internet VLAN) and LSN is under configured on outbount/internet VLAN (in this case, only one IP address), the unexpected teardown or deletion of a PPTP GRE serverside flow will cause TMM to core dump.


Cumulative fixes from BIG-IP v11.5.1 Hotfix 2 that are included in this release


TMOS Fixes

ID Number Description

442199-2

Ensure correct set up of system to prevent error messages and failure of HA pairing.

451917-3

Prevented leak in large traffic groups for secure mode for Common Criteria.

454562-2

Prevented memory leak in secure mode for Common Criteria and updated documentation for recommended system configuration.

450028

Updated documentation to match naming conventions for build identification.

469032

Improved security for F5 services.


Local Traffic Manager Fixes

ID Number Description

454053-2

Improved security with Secure state-mirroring SSL profiles requiring peer cert.


Access Policy Manager Fixes

ID Number Description

357360-1

Mac network access client now supports static host entries.

424008-3

APM now supports smart card logon on Windows-based systems with APM Windows Logon Integration.

438595-4

There is now backward compatibility with FirePass for EPS, so the rowser on the FirePass system no longer freezes on 'Checking running processes'.

454550-6

Proxy auto configuration now works with Internet Explorer when a URL cannot be resolved on a client.

455783-2

Low speed of ppp interface has been fixed.

456302-6

APM clients heartbeat read overrun issue is now fixed.

437820

The machine certificate check on Mac OS X now correctly lets clients, for which only a certificate and not the key are found, go through the "found" branch.


Policy Enforcement Manager Fixes

ID Number Description

465893

The action to drop was not applied as it is a delayed action. Adjusted the flag to apply the action.


Cumulative fixes from BIG-IP v11.5.1 Hotfix 1 that are included in this release


TMOS Fixes

ID Number Description

456033-5

Resolved potential openssl heartbleed issue with patch from openssl to make the system more secure.






Known Issues in BIG-IP v11.5.x


TMOS Issues

ID Number Severity Description
535806-5 1-Blocking Not enough free disk space for live install of BIG-IP 12.0.0 from 11.5.3 VE
493275-2 1-Blocking Restoring UCS file breaks auto-sync requiring forced sync.
477218-3 1-Blocking Simultaneous stats query and pool configuration change results in process exit on secondary.
475829-2 1-Blocking AWS - VE is locked out after live install on 2nd slot.
468175-3 1-Blocking IPsec interop with Cisco systems intermittent outages
467022-2 1-Blocking 11050 platform will not go active citing error 01071335:3: Invalid logical_disk (0) for application volume (mysqldb_.2).
465142-1 1-Blocking iControl LocalLB::ProfileClientSSL::create and create_v2 methods result in crash when not in /Common
456239-1 1-Blocking icrd and icrd_child processes crash when being shutdown
452656-1 1-Blocking NVGRE tunnel traffic might stall if the sys db variable tm.tcplargereceiveoffload is set to 'enable'
600396-4 2-Critical iControl REST may return 404 for all requests in AWS
596603-10 2-Critical AWS: BIG-IP VE doesn't work with c4.8xlarge instance type.
593536-4 2-Critical Device Group with incremental ConfigSync enabled can report "In Sync" when devices have differing configurations
583936-2 2-Critical Removing ECMP route from BGP does not clear route from NSM
570663-4 2-Critical Using iControl get_certificate_bundle_v2 causes a memory leak
568889-6 2-Critical Some ZebOS daemons do not start on blade transition secondary to primary.
563064-3 2-Critical Bringing up and tearing down an IPsec tunnel will slowly leak tmm memory
561814-2 2-Critical TMM Core on Multi-Blade Chassis
530903-3 2-Critical HA pair in a typical Active/Standby configuration becomes Active/Active after a software upgrade
529141-1 2-Critical Upgrade from 10.x fails on valid clientssl profile with BIGpipe parsing error
523434-2 2-Critical mcpd on secondary blades will restart with an error message about a sflow_http_virtual_data_source object
520380-2 2-Critical save-on-auto-sync can spawn multiple invocations of tmsh, starving system of memory
511559-1 2-Critical Virtual Address advertised while unavailable
511006-1 2-Critical Virtual address is advertised to ZebOS (as visible via imi shell) while unavailable.
510559-2 2-Critical Add logging to indicate that compression engine is stalled.
509503-1 2-Critical tmsh load sys config merge file 'filename' takes signficant time for firewall rulelist configuration
509276-5 2-Critical VXLAN tunnels with floating local addresses generate incorrect gratuitous ARPs on standby device
507487 2-Critical ZebOS Route not withdrawn when VAddr/VIP down and no default pool
506199-5 2-Critical VCMP guests on VDAG platforms can experience excessive tmm redirects after multiple guest provisioning cycles
505071-4 2-Critical Delete and create of the same object can cause secondary blades' mcpd processes to restart.
504508-3 2-Critical IPsec tunnel connection from BIG-IP to some Cisco ASA does not stay up when DPD (Dead Peer Detection) is enabled
504496-1 2-Critical AAA Local User Database may sync across failover groups
501343-6 2-Critical In FIPS HA setup, peer may use the FIPS public-handle instead of the FIPS private-handle
495335-5 2-Critical BWC related tmm core
487567-2 2-Critical Addition of a DoS Profile Along with a Required Profile May Fail
484733-2 2-Critical aws-failover-tgactive.sh doesn't skip network forwarding virtuals
479460-1 2-Critical SessionDb may be trapped in wrong HA state during initialization
479374-2 2-Critical Setting appropriate TX driver settings for 40 GB interfaces.
472202-1 2-Critical Potential false positive report of DMA RX lockup failure
470214-3 2-Critical Missing APM (or other module) sessions
469296-1 2-Critical MCPD config validation error resulting in error: requested integer (0) is invalid
467196-2 2-Critical Log files limited to 24 hours
466266-5 2-Critical In rare cases, an upgrade (or a restart) can result in an Active/Active state
464870-4 2-Critical Datastor cores and restarts.
464413-1 2-Critical Descriptor shortage might cause packet loss and/or tmm crash
460833-10 2-Critical MCPD sync errors and restart after multiple modifications to file object in chassis
460730-5 2-Critical On systems with multiple blades, large queries can cause TMM to restart
456461-2 2-Critical Creating a vlan-group after sflow receiver causes TMM sigsegv's (loop).
452293-2 2-Critical Tunneled Health Monitor traffic fails on Standby device
450699 2-Critical Configure member IP addresses on VIPRION before downgrading
449989-1 2-Critical Unable to save UCS when using iControl REST
445633 2-Critical Config sync of SecurID config file fails on secondary blades
438674-3 2-Critical When log filters include tamd, tamd process may leak descriptors
435555-2 2-Critical Cannot load UCS from different BIG-IP system using Secure Vault
430323-1 2-Critical VXLAN daemon may restart when 8000 VXLAN tunnels are configured
422460-6 2-Critical TMM may restart on startup/config-load if it has too many objects to publish back during config load
420107-4 2-Critical TMM could crash when modifying HTML profile configuration
418734-2 2-Critical vCMP guest unit_key empty
412160-2 2-Critical vCMP provisioning may cause continual tmm crash.
394236-1 2-Critical MCP unexpectedly exits, "failure has occurred, There is no active database transaction, status: 0 -
613415-6 3-Major Memory leak in ospfd when distribute-list is used
606540-2 3-Major DB variable changed via GUI does not sync across HA group
598039-1 3-Major MCP memory may leak when performing a wildcard query
596826-3 3-Major Don't set the mirroring address to a floating self IP address
596814-1 3-Major HA Failover fails in certain valid AWS configurations
595773-2 3-Major Cancellation requests for chunked stats queries do not propagate to secondary blades
591708 3-Major HSB may drop off of PCI bus
587821-3 3-Major vCMP Guest VLAN traffic failure after MCPD restarts on hypervisor.
584583-5 3-Major Timeout error when attempting to retrieve large dataset.
583754-3 3-Major When TMM is down, executing 'show ltm persist persist-records' results in a blank error message.
583475-4 3-Major The BIG-IP may core while recompiling LTM policies
579284-3 3-Major Potential memory corruption in MCPd
576305-6 3-Major Potential MCPd leak in IPSEC SPD stats query code
575735-7 3-Major Potential MCPd leak in global CPU info stats code
575726-7 3-Major MCPd might leak memory in vCMP interface stats.
575716-7 3-Major MCPd might leak memory in VCMP base stats.
575708-7 3-Major MCPd might leak memory in CPU info stats.
575671-7 3-Major MCPd might leak memory in host info stats.
575619-7 3-Major Potential MCPd leak in pool member stats query code
575608-7 3-Major MCPd might leak memory in virtual server stats query.
575587-6 3-Major Potential MCPd leak in BWC policy class stats query code
574045-1 3-Major BGP may not accept attributes using extended length
571210-5 3-Major Upgrade, load config, or sync might fail on large configs with large objects.
571019-5 3-Major Topology records can be ordered incorrectly.
565534-6 3-Major Some failover configuration items may fail to take effect
560510-2 3-Major Invalid /etc/resolv.conf when more than one DNS servers are set and MCPD is down.
560429 3-Major LTM iRule table set command cannot always set value of record with extremely short timeout
559080-1 3-Major High Speed Logging to specific destinations stops from individual TMMs
557155 3-Major BIG-IP Virtual Edition becomes completely unresponsive under very heavy load.
554340 3-Major IPsec tunnels fail when connection.vlankeyed db variable is disabled
553795-1 3-Major Differing certificate/key after successful config-sync
552585-1 3-Major AAA pool member creation sets the port to 0.
551927-5 3-Major ePVA snoop header's transform vlan should be set properly under asymmetric routing condition
549971-2 3-Major Some changes to virtual servers' profile lists may cause secondary blades to restart
547942-4 3-Major SNMP ipAdEntAddr indicates floating vlan IP rather than local IP
547532-4 3-Major Monitor instances in a partition that uses a non-default route domain can fail validation on secondary blades
545214-1 3-Major OSPF distance command does not persist across restarts.
544888-10 3-Major Idle timeout changes to five seconds when using PVA full or Assisted acceleration.
542860-3 3-Major TMM crashes when IPsec SA are deleted during HA Active to Standby or vice versa event
533813-1 3-Major Internal Virtual Server in partition fails to load from saved config
531986-4 3-Major Hourly AWS VE license breaks after reboot with default tmm route/gateway.
530242 3-Major SPDAG on VIPRION B2250 blades might cause traffic imbalance among TMMs
529977 3-Major OSPF may not process updates to redistributed routes
529524-4 3-Major IPsec IKEv1 connectivity issues
528295-3 3-Major Virtual ARP ICMP echo settings are flipped on reloading a 10.x configuration on 11.4.x or later.
524490-1 3-Major Excessive output for tmsh show running-config
524333-1 3-Major iControl command pkcs12_import_from_file_v2 may fail if httpd is restarted or session times out.
523922-2 3-Major Session entries may timeout prematurely on some TMMs
523527-5 3-Major Upgrade from 10.x to 11.2.0 or later does not add existing routing protocols to RD0.
522304-3 3-Major Some password policy changes are not reflected in /etc/shadow when synced in a CMI device group
522024 3-Major Config sync of SecurID config file fails on secondary blades
519394-4 3-Major Sync when licensed for ASM/AFM fails to sync pool with "Load balancing feature not licensed" error
517580-1 3-Major OPT-0015 on 10000-series appliance may cause bcm56xxd restarts
517209-1 3-Major tmsh save sys config file /var/tmp or /shared/tmp can make some BIG-IP functionality unusable
514726-3 3-Major Server-side DSR tunnel flow never expires
514450-1 3-Major VXLAN: Remote MAC address movement does not trigger ARL updates across TMMs.
512954-4 3-Major ospf6d might leak memory distribute-list is used
512485-1 3-Major Forwarding of flooded VXLAN-encapsulated unicast frames may introduce additional forwarding
512130 3-Major Remote role group authentication fails with a space in LDAP attribute group name
510580-2 3-Major Interfaces might be re-enabled unexpectedly when loading a partition
510381-6 3-Major bcm56xxd might core when restarting due to bundling config change.
510119-1 3-Major HSB performance can be suboptimal when transmitting TSO packets.
509782 3-Major TSO packets can be dropped with low MTU
509600-3 3-Major Global rule association to policy is lost after loading config.
509504-2 3-Major Excessive time to save/list a firewall rule-list configuration
507853-3 3-Major MCP may crash while performing a very large chunked query and CPU is highly loaded
507461 3-Major Net cos config may not persist on HA unit following staggered restart of both HA pairs.
507331-3 3-Major Using saved configuration with 11.5.2 on AWS may cause SSLv3 to be enabled.
506041-6 3-Major Folders belonging to a device group can show up on devices not in the group
504572 3-Major PVA accelerated 3WHS packets are sent in wrong hardware COS queue
503604-1 3-Major Tmm core when switching from interface tunnel to policy based tunnel
502238-5 3-Major Connectivity and traffic interruption issues caused by a stuck HSB transmit ring
501517-3 3-Major Very large configuration can cause transaction timeouts on secondary blades
501371 3-Major mcpd sometimes exits while doing a file sync operation
500234-1 3-Major TMM may core during failover due to invalid memory access in IPsec components
499538 3-Major Fragmented ESP packets were getting dropped in BIgIP with MTU = 576
498992-3 3-Major Troubleshooting enhancement: improve logging details for AWS failover failure.
497304-2 3-Major Unable to delete reconfigured HTTP iApp when auto-sync is enabled
496679-2 3-Major Configuration loads may fail because the 'default-device' on a traffic-group object does not contain a valid value.
495862 3-Major Virtual status becomes yellow and gets connection limit alert when all pool members forced down
494367 3-Major HSB lockup after HiGig MAC reset
491894 3-Major Sync status may temporarily go red during full sync
491556-3 3-Major tmsh show sys connection output is corrected
490537-7 3-Major Persistence Records display in GUI might cause system crash with large number of records
489750-1 3-Major Deletion of FIPS keys by-handle may delete key in FIPS-card even if key exists in BIG-IP config
489113-1 3-Major PVA status, statistics not shown correctly in UI
488374-1 3-Major Mismatched IPsec policy configuration causes racoon to core after failed IPsec tunnel negotiation
488262-3 3-Major moving VLAN from route-domain being deleted in the same transaction can cause errors
486512-6 3-Major audit_forwarder sending invalid NAS IP Address attributes
485833-6 3-Major The mcpd process may leak memory when using tmsh to modify user attributes
485352-3 3-Major TMM dumps core file when loading configuration or starting up
485232-3 3-Major Disabling and re-enabling an active blade in a HA group may result in the blade becoming standby
484861-3 3-Major A standby-standby state can be created when auto failback acts in a CRC disagreement scenario
484706-3 3-Major Incremental sync of iApp changes may fail
483683-2 3-Major MCP continues running after "Unexpected exception caught in MCPProcessor::rm_DBLowHighWide" error
483228 3-Major The icrd_child process generates core when terminating
483219-1 3-Major Guest secondary blade config load failure after vdisk reinstall
482434-2 3-Major Possible performance degradation in AWS cloud
481696-3 3-Major Failover error message 'sod out of shmem' in /var/log/ltm
481647 3-Major OSPF daemon asserts and generates core
481089 3-Major Request group incorrectly deleted prior to being processed
481082-1 3-Major Software auto update schedule settings can be reset during a full sync
477859-2 3-Major ZebOS config load may fail if password begins with numeric character
477789-1 3-Major SSL Certificate can accommodate & (ampersand) in the Common Name, Organization Name, Division and SAN.
476708-3 3-Major ZebOS using BGP ECMP may not correctly update the ECMP paths when one of the paths goes down and comes back up
473200 3-Major Renaming a virtual server causes unexpected configuration load failure
473088-5 3-Major Virtual server with RequestAdapt/ResponseAdapt profiles along with a OneConnect profile
472365-2 3-Major The vCMP worker-lite system occasionally stops due to timeouts
471901-1 3-Major Log publishers with failed HSL destinations continue to accept and deliver logs.
471042-4 3-Major Datastor High Velocity Traffic Pattern Changes
470788-5 3-Major Creating static ARP entry with unreachable IP address causes BIG-IP to be unreachable after reboot
468837-3 3-Major SNAT translation traffic group inheritance does not sync across devices
468517-3 3-Major Multi-blade systems can experience active/standby flapping after both units rebooted
468514-2 3-Major Receiving several ConfigSync requests in a short period of time may cause the mcpd process to restart and produce a core file
468235-1 3-Major The worldwide City database (City2) does not contain all of the appropriate Proxy strings.
464442-2 3-Major User cannot update SNAT pools that contains resolved hostname as a member
464225-1 3-Major 'tmsh list ltm message-routing' and 'tmsh show ltm message-routing' fail for non-admin users
464132 3-Major Serverside SSL cannot be disabled if Rewrite profile is attached
463715-2 3-Major syscalld logs erroneous and benign timeout messages
463652-1 3-Major Inconsistent Certificate/Key/Chain listing for child Client SSL profile when parent profile is modified.
463468-6 3-Major failed tmsh command generate double logs
462351-1 3-Major Error when resetting stats
462187-1 3-Major 'tmsh list net tunnels' and GUI tunnel access fail for non-admin users
460178-2 3-Major oamd may generate core during shutdown
460020-2 3-Major Rewrite profile might cause tmm core when trying to rewrite set cookie in HTTP response header
459096-4 3-Major GUI: Modifying Self IP Port lockdown from Allow All to Allow Default results in error
456573-2 3-Major Sensor read faults with DC power supply
455980-3 3-Major Home directory is purged when the admin changes user password.
455651-3 3-Major Improper regex/glob validation in web-acceleration and http-compression profiles
452689-2 3-Major Tunnels built over IPsec tunnel interface does not work
449453 3-Major Loading the default configuration may cause the mcpd process to restart and produce a core file.
447272-1 3-Major Chassis with MCPD audit logging enabled will sync updates to device group state
446493-1 3-Major foreign key index error on local traffic-only group
445968 3-Major Update traffic priority option appears for non-authorized users in GUI.
442993-2 3-Major An unexpected gateway may be selected for the management interface
442191-4 3-Major HTTP Class profiles globs are upgraded to a contains condition when it should be equals
440526 3-Major When collecting support information, log messages might appear in /var/log/ltm
440346-2 3-Major Monitors removed from a pool after sync operation
439343-5 3-Major Client certificate SSL authentication unable to bind to LDAP server
437773-6 3-Major Some LACP trunk members are missing after rebooting primary blade
435953-1 3-Major In the GUI, the search fails to return results for the Wide IP list
434730-5 3-Major Auto-sync may fail with many synchronizations in rapid succession
434573-5 3-Major Tmsh 'show sys hardware' displays Platform ID instead of platform name
433055-1 3-Major BFD GTSM IMI shell commands don't work
431634-5 3-Major tmsh: modify gtm server 'xxx' virtual-servers replace-all-with 'yyy' fails
427924-4 3-Major ipport hash type is not programmed in new blade
427357-2 3-Major Virtual address icmp-echo and arp properties get reset to disabled for network prefixes on config load
420204-1 3-Major FIPS key deletion by-handle does not post an error if corresponding key object exists but the keyname is more than 32 characters long
419664-3 3-Major SNMP sysIfxStat stats availability on 2000/4000 platforms
416292-2 3-Major MCPD can core as a result of another component shutting down prematurely
410398-4 3-Major sys db tmrouted.rhifailoverdelay does not seem to work
405752-6 3-Major Monitors sourced from specific source ports can fail
402115-2 3-Major System does not report tmm memory with consideration of threading
382157-6 3-Major Stats presented by the MIB sysVlanStatTable does not match sflow vlan stats
378967-3 3-Major Users are not synchronized if created in a partition
369352-6 3-Major No verification prompt when executing 'load sys config default' for resource administrator role
337934-3 3-Major remoterole: attributes ending in 'role' or 'deny' will be parsed incorrectly


Local Traffic Manager Issues

ID Number Severity Description
500303 1-Blocking Virtual Address status may not be reliably communicated with route daemon
471644-2 1-Blocking BIG-IP system total throughput stats two times higher than expected stats
442613 1-Blocking After applying a data group for FIX profile tag map, modifying datagroup may cause tag mapping function to be inconsistent
420341-7 1-Blocking Connection Rate Limit Mode when limit is exceeded by one client also throttles others
575011-7 2-Critical Fix memory leak.
565409-2 2-Critical Invalid MSS with HW syncookies and flow forwarding
559973-4 2-Critical Nitrox can hang on RSA verification
552151-3 2-Critical Continuous error report in /dev/log/ltm: Device error: n3-compress0 Nitrox 3, Hang Detected
537988-2 2-Critical Buffer overflow for large session messages
534795-2 2-Critical Swapping VLAN names in config results in switch daemon core and restart.
533388-4 2-Critical tmm crash with assert "resume on different script"
521556-5 2-Critical Assertion "valid pcb" in TCP4 with ICAP adaptation
521548-4 2-Critical Possible crash in SPDY
521336 2-Critical pkcs11d initialization retry might post misleading error messages and eventually result in a pkcs11d core
520105-1 2-Critical Possible segfault during hardware accelerated compression.
514108-4 2-Critical TSO packet initialization failure due to out-of-memory condition.
511924-4 2-Critical LTM Policy rule names are more strictly validated
511782-5 2-Critical The HTTP_DISABLED event does not trigger in some cases
509310 2-Critical Bad outer IPv4 UDP checksum observed on egressing VxLAN traffic on VIPRION chassis and 5000 series appliances
507611-2 2-Critical On BIG-IP 2000- and 4000-series platforms BGP sessions with TCP MD5 enabled might fail to establish connection to neighbors.
505222-1 2-Critical DTLS drops egress packets when traffic is large
503652 2-Critical Some SIP UDP connections are lost immediately after enabling a blade on the Active HA unit.
503620-5 2-Critical ECDHE_ECDSA and DHE_DSS ciphers do not work with OpenSSL 1.0.1k and later
503343-3 2-Critical TMM crashes when cloned packet incorrectly marked for TSO
502443 2-Critical After enabling a blade/HA member, pool members are marked down because monitoring starts too soon.
497299-2 2-Critical Thales install fails if the BIG-IP system is also configured as the RFS
495875-4 2-Critical Connection limit on nodes causes TMM infinite loop and heartbeat failure with heavy traffic
493558 2-Critical TMM core due to SACK hole value mismatch
492352-1 2-Critical Mismatch ckcName between GUI and TMSH can cause upgrade failure
491771-6 2-Critical Parking command called from inside catch statement
491030-4 2-Critical Nitrox crypto accelerator can sometimes hang when encrypting SSL records
490225-2 2-Critical Duplicate DNSSEC keys can cause failed upgrade.
489451-1 2-Critical TMM might panic due to OpenSSL failure during handshake generation
489217-5 2-Critical "cipher" memory can leak
486450 2-Critical iApp re-deployment causes mcpd on secondaries to restart
485189 2-Critical TMM might crash if unable to find persistence cookie
480370-4 2-Critical Connections to virtual servers with port-preserve property will cause connections to leak in TMM
479171-1 2-Critical TMM might crash when DSACK is enabled
478592-2 2-Critical When using the SSL forward proxy feature, clients might be presented with expired certificates.
476683 2-Critical Suspended DNS_RESPONSE events are not resumed
476599 2-Critical TMM may panic when resuming DNS_REQUEST iRule event
475460-3 2-Critical tmm can crash if a client-ssl profile is in use without a CRL
474974-1 2-Critical Fix ssl_profile nref counter problem.
472831-3 2-Critical FIPS-enabled DNSSEC can cause TMM core
472157-2 2-Critical Large file uploads abort for SPDY/3 and SPDY/3.1
470191 2-Critical Virtual with FastL4 with loose initiation and close enabled might result in TMM core
469139-3 2-Critical Fix for ID 429124 working but GUI statistics showing PVA connections not PVA'd
469071-1 2-Critical TMM segfault in mpctp_switch_conns
468375-1 2-Critical TMM crash when MPTCP JOIN arrives in the middle of a flow
462025 2-Critical SQL monitors do not handle route domains properly
459994-2 2-Critical tmm may crash if default gateway pool contains members that it cannot route to
459266-1 2-Critical SSL profile memory increases when SSL connection goes to disabled
459100-3 2-Critical TMM may crash when offloading one-way UDP FastL4 flow
457034-1 2-Critical Multipath TCP (MPTCP): TMM crash in stockpile management
456853-1 2-Critical DTLS cannot handle client certificate when client does not send CertVerify message.
454583-3 2-Critical SPDY may cause the TMM to crash if it aborts while there are stalled streams.
451059-3 2-Critical SSL server does not check and validate Change Cipher Spec payload.
451035-4 2-Critical On a 11050-FIPS BIG-IP, TMM may reset when loading a large number of FIPS keys
450814-7 2-Critical Early HTTP response might cause rare 'server drained' assertion
449770 2-Critical Using "CRYPTO::keygen -alg rsa" outside of RULE_INIT can cause TMM to time out
449526-1 2-Critical LB::prime iRule with SIP filter can result in a core
448787-5 2-Critical Monitors in non-default route domains may flap when large number of connections are originiated from that route-domain
434258-1 2-Critical SSL Forward Proxy versions prior to 11.6.0 do not fully support passthrough.
428467-1 2-Critical max-concurrent-udp/max-concurrent-tcp maximum values
426328-4 2-Critical Updating iRule procs while in use can cause a core
417068-2 2-Critical Key install or deletion failure on FIPS key names longer than 32 chars on some platforms
602329-1 3-Major syncookie header of HA channel mirror packets is not cleared
598874-6 3-Major GTM Resolver sends FIN after SYN retransmission timeout
597089-2 3-Major Connections are terminated after 5 seconds when using ePVA full acceleration
592784-6 3-Major Compression stalls, does not recover, and compression facilities cease.
591659-7 3-Major Server shutdown is propagated to client after X-Cnection: close transformation.
591476-4 3-Major Stuck nitrox crypto queue can erroneously be reported
589400-6 3-Major With Nagle disabled, TCP does not send all of xfrags with size greater than MSS.
588572-1 3-Major Unnecessary re-transmission of packets on higher ICMP PMTU.
588569-1 3-Major Don't include maximum TCP options length in calculating MSS on ICMP PMTU.
587705 3-Major Persist lookups fail for source_addr with match-across-virtuals when multiple entries exist with different pools.
586621-1 3-Major SQL monitors 'count' config value does not work as expected.
582234 3-Major When using a config merge load to disable and then later re-enable a monitored pool member, monitor checking will not start up again.
582207-2 3-Major MSS may exceed MTU when using HW syncookies
576296-7 3-Major MCPd might leak memory in SCTP profile stats query.
575626-3 3-Major Minor memory leak in DNS Express stats error conditions
575612-6 3-Major Potential MCPd leak in policy action stats query code
570617-3 3-Major HTTP parses fragmented response versions incorrectly
569288-1 3-Major Different LACP key may be used in different blades in a chassis system causing trunking failures
566361-4 3-Major RAM Cache Key Collision
563419-1 3-Major IPv6 packets containing extended trailer are dropped
560405-1 3-Major Optional target IP address and port in the 'virtual' iRule API is not supported.
559554-4 3-Major CHD congestion control can have erroneous very large cwnd.
554977 3-Major TMM might crash on failed SSL handshake
554761-7 3-Major Unexpected handling of TCP timestamps under syncookie protection.
552385-1 3-Major Virtual servers using an SSL profile and two UDP profiles may not be accepted
543993-1 3-Major Serverside connections may fail to detach when using the HTTP and OneConnect profiles
537964-2 3-Major Monitor instances may not get deleted during configuration merge load
534890-1 3-Major When using session tickets, the session id sent might be incorrect
533966-1 3-Major Double loopback nexthop release might cause TMM core.
530812-3 3-Major Legacy DAG algorithm reuses high source port numbers frequently
530795-2 3-Major In FastL4 TCP virtual servers, ICMP might send wrong SEQ number/ACK number.
528407-2 3-Major TMM may core with invalid lasthop pool configuration
528007-7 3-Major Memory leak in ssl
527742-3 3-Major The inherit-certkeychain field of a clientSSL profile is not synchronized correctly on the standby bigip
525958-5 3-Major TMM may crash if loadbalancing to node's IP in iRule routed towards an unreachable nexthop.
521813-2 3-Major Cluster is removed from HA group on restart
521774-1 3-Major Traceroute and ICMP errors may be blocked by AFM policy
521538-1 3-Major Keep-alive transmissions do not resume after failover of flows on an L4 virtual, when the sequence number is known
521522-1 3-Major Traceroute through BIG-IP may display destination IP address at BIG-IP hop
521408-1 3-Major Incorrect configuration in BigTCP Virtual servers can lead to TMM core
520604-3 3-Major Route domain creation may fail if simultaneously creating and modifying a route domain
518086 3-Major Safenet HSM Traffic failure after system reboot/switchover
517790-5 3-Major When non-HTTP traffic causes the server-side to receive unexpected data, the connection will be dropped
517124-1 3-Major HTTP::retry incorrectly converts its input
516598-2 3-Major Multiple TCP keepalive timers for same Fast L4 flow
516280 3-Major bigd process uses a large percentage of CPU
515759-7 3-Major Configuration objects with more than four vlans in vlan list may cause memory utilization to increase over time
515482-2 3-Major Multiple teardown conditions can cause crash
515139-2 3-Major Active FTP session with inherit profile and address translation disabled may not decrement pool member current connections statistics
515072-8 3-Major Virtual servers with priority groups reset incoming connections when a non-zero connection limit is increased
514975 3-Major Reset packet after connflow idle timout contains seq number 0 in nPath mode.
514604-4 3-Major Nexthop object can be freed while still referenced by another structure
514419-3 3-Major TMM core when viewing connection table
513530-2 3-Major Connections might be reset when using SSL::disable and enable command
513319-1 3-Major Incorrect of failing sideband connections from within iRule may leak memory
513243-2 3-Major Improper processing of crypto error condition might cause memory issues.
513213 3-Major FastL4 connection may get RSTs in case of hardware syncookie enabled.
512885 3-Major https monitor fails to work with MD5 with RSA as signature hash algorithm
512490-1 3-Major Increased latency during connection setup when using FastL4 profile and connection mirroring.
512383 3-Major Hardware flow stats are not consistently cleared during fastl4 flow teardown.
511517-5 3-Major Request Logging profile cannot be configured with HTTP transparent profile
511324-8 3-Major HTTP::disable does not work after the first request/response.
511130-1 3-Major TMM core due to invalid memory access while handling CMP acknowledgement
511057-1 3-Major Config sync fails after changing monitor in iApp
510720-4 3-Major iRule table command resumption can clear the header buffer before the HTTP command completes
510588 3-Major Cross blade trunk with balanced trunk.cluster.distribution has issues with re-enabling the only local trunk working member
510395 3-Major Disabling some events while in the event, then running some commands can cause tmm to core.
510264-4 3-Major TMM core associated with smtps profile.
508797 3-Major Clarification regarding differences in GARPs on different versions.
508067 3-Major Packet drop on 5200 platforms due to delayed MPI communication
507109-2 3-Major inherit-certkeychain attribute of child Client SSL profile can unexpectedly change during upgrade
506702-3 3-Major TSO can cause rare TMM crash.
506290-1 3-Major MPI redirected traffic should be sent to HSB ring1
505964-1 3-Major Invalid http cookie handling can lead to TMM core
505056-1 3-Major BIG-IP system might send an egress packet with a priority different from that of ingress packet on the same flow.
504827 3-Major Use of DHCP relay virtual server might result in tmm crash 'top filter'.
504633-6 3-Major DTLS should not update 'expected next sequence number' when the record is bad.
504396-1 3-Major When a virtual's ARP or ICMP is disabled, the wrong mac address is used
504306-8 3-Major https monitors might fail to re-use SSL sessions.
503741-12 3-Major DTLS session should not be closed when it receives a bad record.
503257-9 3-Major Persistence, connection limits and HTTP::respond or HTTP::redirect may result in RST
503214-5 3-Major Under heavy load, hardware crypto queues may become unavailable.
503118-4 3-Major clientside and serverside command crashes TMM
502747-7 3-Major Incoming SYN generates unexpected ACK when connection cannot be recycled
502683-4 3-Major Traffic intermittently dropped in syncookie mode, especially when hardware syncookie is on
502174-2 3-Major DTLS fragments do not work for ClientHello message.
502149-1 3-Major Archiving EC cert/key fails with error 'EC keys are incompatible for Webserver/EM/iQuery.'
501984 3-Major TMM may experience an outage when an iRule fails in LB_SELECTED.
501690-2 3-Major TMM crash in RESOLV::lookup for multi-RR TXT record
501516 3-Major If a very large number of monitors is configured, bigd can run out of file descriptors when it is restarted.
500786-1 3-Major Heavy memory usage while using fastL4/BIGTCP virtual with HTTP profile
500003-5 3-Major Incoming NTP packets from configured NTP server to non-local IP breaks outgoing NTP
499946-1 3-Major Nitrox might report bad records on highly fragmented SSL records
499615-5 3-Major RAM cache serves zero length documents.
499430-4 3-Major Standby unit might bridge network ingress packets when bridge_in_standby is disabled
499150-1 3-Major OneConnect does not reuse existing connections in VIP targeting VIP configuration
497742-4 3-Major Some TCP re-transmits on translucent vlangroup skip bit-flip on source MAC address
497584 3-Major The RA bit on DNS response may not be set
496758-1 3-Major Monitor Parameters saved to config in a certain order may not construct parameters correctly
496588-3 3-Major HTTP header that is larger than 64K can be analyzed incorrectly, leading to TMM crash
495574-1 3-Major DB monitor functionality might cause memory issues
495443-2 3-Major ECDH negotiation failures logged as critical errors.
495253-2 3-Major TMM may core in low memory situations during SSL egress handling
494322-1 3-Major The HTTP_REQUEST iRule event may cause the TMM to crash if the explicit proxy is used
494084-1 3-Major Certain rapidly-terminating UDP virtuals may core on standby
493140-4 3-Major Incorrect persistence entries are created when invoking cookie hash persistence within an iRule using offset and length parameters.
493117-4 3-Major Changing the netmask on an advertised virtual address causes it to stop being advertised until tmrouted is restarted
491518-1 3-Major SSL persistence can prematurely terminate TCP connection
491454-2 3-Major SSL negotiation may fail when SPDY profile is enabled
490817-4 3-Major SSL filter might report codec alerts repeatedly
490740-5 3-Major TMM may assert if HTTP is disabled by another filter while it is parked
490713-4 3-Major FTP port might occasionally be reused faster than expected
490480-2 3-Major UCS load may fail if the UCS contains FIPS keys with names containing dot
490121 3-Major Incorrect reporting of PVA current and maximum connection with SERVER_CONNECTED event
488876-1 3-Major SSL persistence uses noticeably more memory
488193-1 3-Major iRule nexthop is not considered after failover with IP forwarding virtual server.
487757-1 3-Major Hybrid higig/front panel port packet discard (Ingress back-pressure v.s. Egress queue discard) counts can be expected during bursty or severe MMU traffic congestion on B4300/B2200/10000/12000-family platforms.
487554 3-Major System might reuse TCP source ports too quickly on the server side.
487211 3-Major WOM IP fragmentation in v11.5.0 HF4
486724-1 3-Major After upgrading from v10 to v11 in a FIPS HA setup, config-sync fails
485472-1 3-Major iRule virtual command allows for protocol mismatch, resulting in crash
484305-4 3-Major Clientside or serverside command with parking command crashes TMM
483539 3-Major With fastL4, incorrect MSS value might be used if SYN has options without MSS specified
483157-1 3-Major Server-side flow uses 0 as TCP source port
481880-1 3-Major SASPD monitor cores
481844-2 3-Major tmm can crash and/or use the wrong CRL in certain conditions
481216-2 3-Major Fallback may be attempted incorrectly in an abort after an Early Server Response
480982-2 3-Major pkcs11d with a high thread count can result in high CPU utilization
480686-5 3-Major Packet loop in VLAN Group
479872-1 3-Major Corresponding protocol profiles must exist on both clientside/serverside
478617-11 3-Major Don't include maximum TCP options length in calculating MSS on ICMP PMTU.
478439-11 3-Major Unnecessary re-transmission of packets on higher ICMP PMTU.
478257-11 3-Major Unnecessary re-transmission of packets on ICMP notifications even when MTU is not changed
478195-1 3-Major Installation of FIPS .exp key files sets incorrect public exponent.
477742-1 3-Major DTLS message sequence number is off by one
477394-5 3-Major LTM might reset and cause out-of-ports
477375 3-Major SASP Monitor may core
476281-2 3-Major tmm crash on uninitialized variable
475791-2 3-Major Ramcache profile may dispatch internal messages out-of-order leading to assert
475677-1 3-Major Connections may hang until timeout if a LTM policy action failed
475322-1 3-Major cur_conns number different in tmstat and snmp output.
475125-1 3-Major Use of HTTP::retry may cause TMM crash
474771 3-Major bigtop global statistics not including pva statistics for BIG-IP row
474584-4 3-Major igbvf driver leaks xfrags when partial jumbo frame received
474226 3-Major LB_FAILED may not be triggered if persistence member is down
474002-2 3-Major Server SSL profile unable to complete SSL handshake when server selects DHE-based key exchange, and is configured with 2048-bit or larger DH keys
473759 3-Major Unrecognized DNS records can cause mcpd to core during a DNS cache query
472944 3-Major SMTPS race condition after STARTTLS may cause incorrect SMTP responses
472571-3 3-Major Memory leak with multiple client SSL profiles.
472148-6 3-Major Highly fragmented SSL records can result in bad record errors on Nitrox based systems
471821-3 3-Major Compression.strategy "SIZE" is not working
471625-2 3-Major After deleting external data-group, importing a new or editing existing external data-group does not propagate to TMM
471288-3 3-Major TMM might crash with session-related commands in iRules.
469361-1 3-Major Unexpected tmm restart, no core - beta tmm version
469115-1 3-Major Management client-ssl profile does not support multiple key/cert pair.
468542 3-Major Virtual servers with a SPDY profile ignore SNAT none setting
468472-4 3-Major Unexpected ordering of internal events can lead to TMM core.
465607-1 3-Major TMM cores with TMM log error 'Assertion "flow in use" failed.' when isuing FastHTTP.
465590-5 3-Major Mirrored persistence information is not retained while flows are active
464499-1 3-Major client-ssl profile loses cert-key-object When the cert-key-chain object exists in partition other than /Common
462714-5 3-Major Source address persistence record times out even while traffic is flowing on FastL4 profile virtual server
461818-1 3-Major Occasional extreme large value reported for tmm-info five-min-avg-usage-ratio
461587-4 3-Major TCP connection can become stuck if client closes early
460945-4 3-Major Memory leak when changing a policy that is in use by a virtual server
458348-1 3-Major RESOLV:: iRule commands and sFlow don't function correctly when using non-default CMP hashing.
457934-2 3-Major SSL Persistence Profile Causing High CPU Usage
457293-4 3-Major Clustered Multiprocessing (CMP) peer connection is not removed in certain race conditions.
456763-1 3-Major L4 forwarding and TSO can cause rare TMM outages
456378 3-Major On a virtual server with the ipother profile assigned, iRule firing on CLIENT_ACCEPTED with discard or reject action may cause TMM to core
455840-2 3-Major EM analytic does not build SSL connection with discovered BIG-IP system
454954-6 3-Major Messages dropped by iRULE DIAMETER::drop will be retransmitted
454209-2 3-Major TMM crash on UDP DNS virtual without datagram-load-balancing enabled
454018-4 3-Major Nexthop to tmm0 ref-count leakage could cause TMM core
453720-2 3-Major clientssl profile validation fails to detect config with no cert/key name and no cert/key
453171-2 3-Major High CPU usage leading to tmm/apd cores/restart
452643-6 3-Major Pool member's lb_value is not updated when transistioning from disabled to enabled
452516-4 3-Major Excessive memory consumption after extended use
452454-3 3-Major A RST will not be forwarded for a IP forwarding Virtual server with a fastL4 profile with loose initialization configured as well as an idle timeout that is less than the server idle timeout value.
452315-3 3-Major Connection rate limit is not working when pool is not configured for the virtual server.
451534 3-Major TMM SIGSEGV event with SSL forward proxy in PassThrough Mode
451319-3 3-Major HTTP CONNECT request with 4xx response with body results in RST
450087-7 3-Major Unacknowledged segments may fail to be retransmitted
449891-5 3-Major Fallback source persistence entry is not used when primary SSL persistence fails
448476-3 3-Major 10G SFP interfaces cannot be part of the same trunk.
447874-3 3-Major TCP zero window suspends data transfer
447080-6 3-Major VLAN tagged/untagged configuration change requires tmm restart
447043-7 3-Major Cannot have 2 distinct 'contains' conditions on the same LTM policy operand
446526-3 3-Major TCP virtual server/UDP virtual server without datagram-LB mode enabled running DNS cache and suspending iRules might cause TMM crash.
445335 3-Major Unlicensed LTM can be configured with Policy that requires license
444710-5 3-Major Out-of-order TCP packets may be dropped
444178-4 3-Major HTTP header replace always inserts header
442455-1 3-Major Hardware Security Module (HSM) CSR and certificate fields constraints: 15 characters and no spaces.
442391-7 3-Major Unsolicited neighbor advertisement cannot pass through VLAN group
442020-4 3-Major Neighbor discovery might not work correctly with VLAN group
441985-1 3-Major In client-ssl profile outside ckc key/cert/chain/passphrase and RSA pair inside ckc
441146 3-Major Delays with flooding on forwarding ports following STP blocked state changes.
441058-3 3-Major TMM can crash when a large number of SSL objects are created
440431-5 3-Major Response Logging generates a blank $HTTP_STATUS response when used with certain iRule commands.
439773-1 3-Major The TMM process may restart and produce a core file when a connection flow is in an invalid TCP state
438877-1 3-Major If the SASP monitor receives an unexpected message from the GWM server containing an expected message id then the monitor stops processing any further messages.
438792-7 3-Major Node flapping may, in rare cases, lead to inconsistent persistence behavior
437703-4 3-Major LTM policies do not accept special characters in HTTP header names
437627-6 3-Major TMM may crash if fastl4 vs has fragmeneted pkt
435335-4 3-Major SSL proxy session ID cache does not respect limit set by tmm.proxyssl.cachesize
435106-2 3-Major Message: notice panic: ../modules/hudfilter/hudnode.c:741: Assertion 'valid proxy failed.
434517-13 3-Major HTTP::retry doesn't work in an early server response
434400-4 3-Major tmm might core with rate-limiting on virtual server
434356-1 3-Major Data-group update doesn't propagate to SSL forward proxy configuration
433323-4 3-Major Ramcache handling of Cache-Control: no-cache directive in Response
429011-9 3-Major No support for external link down time on network failover
422107-6 3-Major Responses from DNS transparent cache will no longer contain RRSIG for queries without DO bit set
419217-2 3-Major LTM policy fails to decompress compressed http requests
401852-3 3-Major csyncd will intentionally dump core when the kernel event queue is full
384451-3 3-Major Duplicated cert/keys/chain might cause SIGABRTs and low-memory conditions
375887-2 3-Major Cluster member disable or reboot can leak a few cross blade trunk packets
374339-7 3-Major HTTP::respond/redirect might crash TMM under low-memory conditions
364994-10 3-Major TMM may restart or disabled connections may be reused when a OneConnect profile is configured and OneConnect reuse is disabled be an iRule.
352925-3 3-Major Updating a suspended iRule and TMM process restart
348000-5 3-Major HTTP response status 408 request timeout results in error being logged.
336255-6 3-Major OneConnect Connection Limits with Narrow Source Address Masks


Performance Issues

ID Number Severity Description
476144-2 1-Blocking TMM generates a core file when dynamically loading a shared library.
489259-1 2-Critical [AFM] packets from good ip's are being dropped by DoS Sweep & Flood logic
473485-2 2-Critical Fixed a few issues in HTTP Auth module
454949-1 2-Critical AFM Optimizations to improve run-time and memory usage.
496998-1 3-Major Update offenders more aggressively. Increase batch size for Dwbld processing.
426939-6 3-Major APM Polices does not work in VIPRION 4800 chassis if there is no slot1


Global Traffic Manager Issues

ID Number Severity Description
533658-1 2-Critical DNS decision logging can trigger TMM crash
515797-5 2-Critical Using qos_score command in RULE_INIT event causes TMM crash
469033-2 2-Critical Large big3d memory footprint.
442980-5 2-Critical GTM pool statistics incorrect if max-address-returned not set to 1 and r
442226-3 2-Critical Link Controller fails to auto-create a self-server
437025-7 2-Critical big3d might exit during loading of large configs or when a connection to mcpd is dropped.
526699-3 3-Major TMM might crash if BIG-IP DNS iRule nodes_up references invalid IP/Port.
496775 3-Major [GTM] [big3d] Unable to receive mark LTM virtual server up if there is another VS with same ltm_name for bigip monitor
479142-4 3-Major Deleting a virtual server does not delete the resource record (RR) in ZoneRunner Daemon (ZRD)
473577-3 3-Major Changes not synced or received by GTMd for GTM Wide IP Alias Items
473139-4 3-Major IMAP monitor works for LTM fails for BIG-IP DNS
468519-3 3-Major BIG-IP DNS configuration load failure from invalid bigip_gtm.conf file.
466756-1 3-Major Automating input to gtm_add script rather than running it interactively can result in script failure
420440-3 3-Major Multi-line TXT records truncated by ZoneRunner file import


Application Security Manager Issues

ID Number Severity Description
478674-2 1-Blocking ASM internal parameters for high availability timeout was not handled correctly
515728-3 2-Critical Repeated BD cores.
489705-4 2-Critical Running out of memory while parsing large XML SOAP requests
487420-2 2-Critical BD crash upon stress on session tracking
481476-4 2-Critical MySQL performance
477432-3 2-Critical Roll forward from 11.3.0 with iApp configured fails to load correctly and causes bd to core
476616-2 2-Critical Set active fails after accept learning suggestion for illegal metachar Policy with encoding iso-8859-1
468387-1 2-Critical Enforcer core related to specific error condition in the session db
451384-1 2-Critical "Differentiate between HTTP and HTTPS URLs" can't be disabled when Security Policy contains https URLs
451257-2 2-Critical ASM BD process may crash on missing cookie protection config data when traffic is being passed.
442153-1 2-Critical "Enforce" and "Accept" buttons do not work in Redirection Domains section
226473-5 2-Critical Apply Policy failures due to Null characters in entity names
535904-5 3-Major BD crashes when attempting to access a closed connection
529610-3 3-Major On HA setups ASM session tracking page display an empty list when in fact there are asm entries in session db
514061-2 3-Major False positive scenario causes SMTP transactions to hang and eventually reset.
513787-1 3-Major CSRF doesn't apply web application callback registered as XMLHttpRequest.onload in IE8-10
508519-3 3-Major Performance of Policy List screen
507905-2 3-Major Saving Policy History during UCS load causes DB deadlock/timeout
507289-2 3-Major User interface performance of Web Application Security Editor users
504973-3 3-Major Configuring a route domain with 32 bit subnet mask, 128 bit mask saved instead
502852-1 3-Major Deleting an in-use custom policy template
498189-2 3-Major ASM Request log does not show log messages.
497769-3 3-Major Policy Export: BIG-IP does not export redirect URL for "Login Response Page"
496011-5 3-Major Resets when session awareness enabled
490284-2 3-Major ASM user interface extremely slow to respond (e.g. >2 minutes to render policy list)
485764-1 3-Major WhiteHat vulnerability assessment tool is configured but integration does not work correctly
484079-6 3-Major Change to signature list of manual Signature Sets does not take effect.
482915-2 3-Major Learning suggestion for the maximum headers check violation appears only for blocked requests
475819-2 3-Major BD crash when trying to report attack signatures
465927-2 3-Major Response is halted or reset when the request has an ignore profile
465181-2 3-Major Unhandled connection error in iprepd causes memory leak in iprepd or merged
458295-3 3-Major Memory leaks while connecting to the IP reputation database server using a proxy.
451705-2 3-Major Illegal metachar override can be added to policy which prevents Apply Policy
449622-1 3-Major Issue while importing policy with customer violation conflict.
441601-5 3-Major Response is truncated in the log
441500-5 3-Major Fails over upon receiving updates from the IP reputation database.
441075-7 3-Major Newly added or updated signatures are erroneously added to Manual user-defined signature sets.
440263-1 3-Major HTTP profile gets set to http-transparent by ASM deployment wizard


Application Visibility and Reporting Issues

ID Number Severity Description
464366-2 2-Critical Devices are out of Sync when new analytics profile is created and assigned to a virtual server
461715-1 2-Critical AVR: Collecting geolocation IDs
441214-2 2-Critical monpd core dumps in case of MySQL crash
596945 3-Major AVR DNS record lost after upgrade.
574160 3-Major Publishing DNS statistics if only Global Traffic and AVR are provisioned
559060 3-Major AVR reads BIG-IP system's cookie incorrectly in multiple BIG-IP configuration.
535246-1 3-Major Table values are not correctly cleaned and can occupy entire disk space.
530952-2 3-Major MySql query fails with error number 1615 'Prepared statement needs to be re-prepared'
528031-4 3-Major AVR not reporting the activity of standby systems.
493825-3 3-Major Upgrade failure from version 11.4.0 due to incorrect configuration being saved
489682-2 3-Major Configuration upgrade failure due to change in an ASM predefined report name
479334-6 3-Major monpd/ltm log errors after Hotfix is applied
468874-4 3-Major Monpd errors appear when AVR loads data to MySQL
467945-2 3-Major Error messages in AVR monpd log
458823-3 3-Major TMM Crash can lead to crash of other processes
438604-4 3-Major AVR JavaScript injection takes place regardless of content-type value


Access Policy Manager Issues

ID Number Severity Description
553330-5 1-Blocking Unable to create a new document with SharePoint 2010
488986-3 1-Blocking Access policy cannot enter Windows Protected Workspace on Internet Explorer versions 10 and 11, and edge client.
488736-3 1-Blocking Fixed problem with iNotes 9 Instant Messaging
446881-3 1-Blocking OPSWAT library now needs scpt.dat file on MAC OS X
580817-6 2-Critical Edge Client may crash after upgrade
575609-2 2-Critical Zlib accelerated compression can result in a dropped flow.
572563-6 2-Critical PWS session does not launch on Internet Explorer
537227-4 2-Critical EdgeClient may crash if special Network Access configuration is used
525562-3 2-Critical Debug TMM Crashes During Initialization
520145-1 2-Critical [Policy Sync] OutOfMemoryError exception when syncing big and complex APM policy
516075-2 2-Critical Linux command line client fails with on-demand cert
514220-3 2-Critical New iOS-based VPN client may fail to create IPv6 VPN tunnels
507782-2 2-Critical TMM crashes for Citrix connection when Address field in the ICA file has non-patched/invalid data
507681-3 2-Critical Window.postMessage() does not send objects in IE11
505101 2-Critical tmm may panic due to accessing uninitialized memory
497118-1 2-Critical Tmm may restart when SAML SLO is triggered
495901-1 2-Critical Tunnel Server crash if probed on loopback listener.
494098-3 2-Critical PAC file download mechanism race condition
493360-3 2-Critical Fixed possible issue causing Edge Client to crash during reconnect
489328-6 2-Critical When BIG-IP virtual accessed with multiple tabs with long initial URLs before session creation can cause TMM crash.
487399-1 2-Critical VDI plugin crashes when View client disconnects prematurely
484454-1 2-Critical Users not able to log on after failover
480272-4 2-Critical During OAM SDK initialization, ObConfig initialization returns wrong accessgate ID
476736-1 2-Critical APM IPv6 Network Access connection may fail in some cases
475049-5 2-Critical Missing validation of disallowing empty DC configuration list
474058-4 2-Critical When the BIG-IP system is configured as Service Provider, APD may restart under certain conditions
471874-3 2-Critical VDI plugin crashes when trying to respond to client after client has disconnected
468908-2 2-Critical Session timeout settings doesn't work properly
458928-3 2-Critical APMD cores in Kerberos authentication, when the agent tries to derefence a null authparam session variable.
452163-2 2-Critical Cross-domain functionality is broken in AD Query
451469-2 2-Critical APM User Identity daemon doesn't generate core
450136-1 2-Critical Occasionally customers see chunk boundaries as part of HTTP response
447565-1 2-Critical Renewing machine-account password does not update the serviceId for associated ntlm-auth.
446187-3 2-Critical If manually started, bigip service(s) may consume 100% and become not functional
431980-3 2-Critical SWG Reports: Overview and Reports do not show correct data.
615522 3-Major VDI crashes while responding to clients with multiple VDI threads running
586718-7 3-Major Session variable substitutions are logged
586006-7 3-Major Failed to retrieve CRLDP list from client certificate if DirName type is present
580421-6 3-Major Edge Client may not register DLLs correctly
570064-6 3-Major IE gives a security warning asking: "Do you want to run ... InstallerControll.cab"
563135-1 3-Major SWG Explicit Proxy uses incorrect port after a 407 Authentication Attempt
558870-8 3-Major Protected workspace does not work correctly with third party products
558631-7 3-Major APM Network Access VPN feature may leak memory
554228-6 3-Major OneConnect does not work when WEBSSO is enabled/configured.
544992-1 3-Major Virtual server profile changes are ignored if it has /Common/remotedesktop and /Common/vdi assigned (Citrix/Vmware View iApp)
541622-5 3-Major APD/APMD Crashes While Verifying CAPTCHA
525429-5 3-Major DTLS renegotiation sequence number compatibility
523222-3 3-Major Citrix HTML5 client fails to start from Storefront in integration mode when Access Policy is configured with Redirect ending.
521506-5 3-Major Network Access doesn't restore loopback route on multi-homed machine
520849 3-Major [PolicySync] Access Profile with "default-log-setting" fails
519415-2 3-Major apm network access tunnel ephemeral listeners ignore irules (related-rules from main virtual )
519198-1 3-Major [Policy Sync] UI General Exception Error when sync a policy in non-default partition as non-default admin user
519059-1 3-Major [PA] - Failing to properly patch webapp link, link not working
518583-4 3-Major Network Access on disconnect restores redundant default route after looped network roaming for Windows clients
517441-3 3-Major apd may crash when RADIUS accounting message is greater than 2K
516462-6 3-Major Gateways for excluded address space routes are not adjusted correctly during roaming between networks on Windows machines
514912-1 3-Major Portal Access scripts had not been inserted into HTML page in some cases
513969-5 3-Major UAC prompt is shown for machine cert check for non-limited users, even if machine cert check service is running
513953-5 3-Major RADIUS Auth/Acct might fail if server response size is more than 2K
513706-4 3-Major Incorrect metric restoration on Network Access on disconnect (Windows)
513165 3-Major SAML Service Provider generated SLO requests do not contain 'SessionIndex' attribute
513098-5 3-Major localdb_mysql_restore.sh failed with exit code
512345-3 3-Major Dynamic user record removed from memcache but remains in MySQL
512245-4 3-Major Machine certificate agent on OS X 10.8 and OS X 10.9 uses local host name instead of hostname
511961-5 3-Major BIG-IP Edge Client does not display logon page for FirePass
511854-1 3-Major Rewriting URLs at client side does not rewrite multi-line URLs
511648-1 3-Major On standby TMM can core when active system sends leasepool HA commands to standby device
510709-2 3-Major Websso start URI match fails if there are more than 2 start URI's in SSO configuration.
510337-1 3-Major Page-not-found result for APM uses the incorrect stylesheet, resulting in incorrect page formatting (404 response).
509758-6 3-Major EdgeClient shows incorrect warning message about session expiration
509677-3 3-Major Edge-client crashes after switching to network with Captive Portal auth
508719-3 3-Major APM logon page missing title
508630-7 3-Major The APM client does not clean up DNS search suffixes correctly in some cases
507318-1 3-Major JS error when sending message from DWA new message form using Chrome
507116-2 3-Major Web-application issues and/or unexpected exceptions.
506349-1 3-Major BIG-IP Edge Client for Mac identified as browser by APM in some cases
505755-5 3-Major Some scripts on dynamically loaded html page could be not executed.
504606-1 3-Major Session check interval now has minimum value
503319-1 3-Major After network access is established browser sometimes receives truncated proxy.pac file
502441-3 3-Major Network Access connection might reset for large proxy.pac files.
502016-1 3-Major MAC client components do not log version numbers in log file.
501498-3 3-Major APM CTU doesn't pick up logs for Machine Certificate Service
499620-3 3-Major BIG-IP Edge Client for MAC shows wrong SSL protocol version; does not display the protocol version that was negotiated.
499427-5 3-Major Windows File Check does not work if the filename starts with an ampersand
498469-2 3-Major Mac Edge Client fails intermittently with machine certificate inspection
497436-1 3-Major Mac Edge Client behaves erratically while establishing network access connection
497325-4 3-Major New users cannot log in to Windows-based systems after installing BIG-IP EDGE client in certain deployment
496817-6 3-Major Big-IP Edge client for Windows fails to connect to Firepass server if tunnel is established through a proxy
495702-5 3-Major Mac Edge Client cannot be downloaded sometimes from management UI
495319-1 3-Major Connecting to FP with APM edge client is causing corporate network to be inaccessible
495265-2 3-Major SAML IdP and SP configured in same access profile not supported
495128-4 3-Major Safari 8 continues using proxy for network access resource in some cases when it shouldn't
494284-1 3-Major Mac Edge Client, with primary language of German shows unneeded text shown under disconnected status.
494176-4 3-Major Network access to FP does not work on Yosemite using APM Mac Edge Client.
494088-2 3-Major APD or APMD should not assert when it can do more by logging error message before exiting.
494008-1 3-Major tmm crash while initializing the URL filter context for SWG.
493487-1 3-Major Function::call() and Function::apply() wrapping does not work as expected
493164-1 3-Major flash.net.NetConnection::connect() has an erroneous security check
493023-2 3-Major Export of huge policies might ends up with 'too many pipes opened' error
492701-1 3-Major Resolved LSOs are overwritten by source device in new Policy Sync with new LSO
492238-4 3-Major When logging out of Office 365 TMM may restart
492153-6 3-Major Edge clients shuts down the DTLS channel if the state of IP address on the adapter that was used to build the tunnel, changes to deprecated.
491478-2 3-Major EAM is a CMP plugin and spins up one thread per TMM.
491233-4 3-Major Rare deadlock in CustomDialer component
490844-1 3-Major Some controls on a web page might stop working.
490811-3 3-Major Proxy configuration might not to be restored correctly in some rare cases
490681-3 3-Major Memcache entry for dynamic user leaks
490675-2 3-Major User name with leading or trailing spaces creates problems.
489382-4 3-Major Machine Cert allows mismatched SubjectCN and FQDN for browsers in case of valid cert
488892-1 3-Major JavaRDP client disconnects
487170-2 3-Major Enahnced support for proxy servers that resolve to multiple IP addresses
486597-4 3-Major Fixed Network Access renegotiation procedure
486268-2 3-Major APM logon page missing title
485948-4 3-Major Machine Info Agent should have a fallback branch
484582-1 3-Major APM Portal Access is inaccessible.
483792-7 3-Major when iSession control channel is disabled, don't assign app tunnel, MSRDP, opt tunnel resources
483601-2 3-Major APM sends a logout Bookmarked Access whitelist URL when session is expired.
482699-1 3-Major VPE displaying "Uncaught TypeError"
482260-2 3-Major Location of Captive portal configuration registry entry in 64 bit windows is incorrect
480761-3 3-Major Fixed issue causing TunnelServer to crash during reconnect
480242-1 3-Major APD, APMD, MCPD communication error failure now reported with error code
478751-4 3-Major OAM10g form based AuthN is not working for a single/multiple domain.
478333-2 3-Major Edge-Client client shows an error about corrupted config file, when User's profile and temp folders located on different partitions
476038-4 3-Major Mac Edge Client crashes on OS X 10.7 if a user adds new server using its IP address rather than DNS name
476032-3 3-Major BIG-IP Edge Client may hang for sometime when disconnecting from Firepass server
475735-1 3-Major Failed to load config after removing peer from sync-only group
475505-5 3-Major Windows Phone 8.1 built-in browser is not properly detected by BIG-IP system.
475363-4 3-Major Empty or invalid configuration, or during exception in NTLM, handling might not work as expected.
474779-7 3-Major EAM process fails to register channel threads (MPI channel) with TMM, and subsequent system call fails.
474698-1 3-Major BIG-IP as IdP can send incorrect 'Issuer' element for some SLO requests under certain conditions.
474231-3 3-Major RAM cache evictions spikes with change of access policy which may lead to slow webtop rendering
473488-4 3-Major In AD Query agent, resolving of nested groups may cause apd to spin
473344-4 3-Major Kerberos Request-Based Auth (RBA) failure when session is initially created on a different VIP.
473255-1 3-Major Javascript sibmit() method could be rewritten incorrectly inside of 'with' statement.
473129-4 3-Major httpd_apm access_log remains empty after log rotation
472446-8 3-Major Customization group template file might cause mcpd to restart
472256-5 3-Major tmsh and tmctl report unusually high counter values
472062-1 3-Major Unmangled requests when form.submit with arguments is called in the page
471421-3 3-Major Ram cache evictions spikes with change of access policy leading to slow webtop rendering
471117-1 3-Major iframe with JavaScript in 'src' attribute not handled correctly in IE11
470205-3 3-Major /config/.../policy_sync_d Directory Is 100% Full
469986 3-Major Drive mapping paths lose backslash when entered using the GUI
469824-6 3-Major Mac Edge client on Mac mini receives settings for iOS Edge Client
468395-1 3-Major IPv4 Allocation failure ... is out of addresses
465863 3-Major Error: Object doesn't support property or method 'trim'
463651-3 3-Major PPP tunnels remain open after session gets closed
463230-7 3-Major Aced service does not recover if child process dies.
461189-3 3-Major Generated assertion contains HEX-encoded attributes
458770-1 3-Major [Mac][Edge] Edge client doesn't handle ending redirects to the same box if second access policy assumes interaction
456927 3-Major iOS Edge Client is not able to establish per-app VPN connections with APM when it has VPE with On-Demand certificate authentication or iRule event agent without assigned webtop resource.
456608-2 3-Major Direct links for frame content, with 'Frame.src = url'
455493-1 3-Major Cancel button remains enabled
454306-3 3-Major HTML style attribute with HTML entities need to be fixed
452527-4 3-Major Machine Certificate Checker Agent always works in "Match Subject CN to FQDN" mode
452464-3 3-Major iClient does not handle multiple messages in one payload.
452416-2 3-Major tmctl leasepool_stat and snmp apmLeasepoolStatTable return incorrect values
452010-1 3-Major RADIUS Authentication fails when username or password contain non-ASCII characters
451867 3-Major Adobe Flash (SWF) parser should patch the flash object even if compressed body is followed by some data
451806-1 3-Major Preserve Source Port Strict has moved from Client Settings (Advanced) to General Settings
451233-3 3-Major Radius authentication fails if the NAS IP address is configured with route domain
451083-2 3-Major Citrix Wyse clients when working with StoreFront in integration mode
449793-3 3-Major Edge client doesn't use new Oesis SDK libraries unless it is restarted
449225-3 3-Major Fixed APM client crash caused by regression introduced with ID430962
446573 3-Major Username shown as "(anonymous)"
442038-2 3-Major Symantec AV 12.1.x fails to be detected on Mac OS X 10.9
441913-4 3-Major Empty Webtop when large number of resources assigned to access policy.
440505-6 3-Major Default port should be removed from Location header value in http redirect
440488-3 3-Major Inadvertent Dissociation of Sandbox and APM Access Profile
439461-3 3-Major Citrix Receiver for Linux is unable to receive full applications list.
437744-5 3-Major SAML SP service metadata exported from APM may fail to import.
437743-4 3-Major Import of Access Profile config that contains ssl-cert is failing
436616-3 3-Major Now CTU correctly enables logs for 64bit services on Windows.
436201-4 3-Major JavaScript can misbehave in case of the 'X-UA-Compatible' META tag when a client uses IE11
433972-11 3-Major New Event dialog widget is shifted to the left and Description field does not have action widget
433847-3 3-Major APD crashes with a segmentation fault.
433752-7 3-Major Web applications might rewrite their event handlers
432900-1 3-Major APM configurations can fail to load on newly-installed systems
432469-9 3-Major State of Microsoft Windows Firewall is not detected
432102-4 3-Major HTML reserved characters not supported as part of SAML RelayState
431149-4 3-Major APM config snapshot disappears and users see "Access Policy configuration has changed on gateway"
428387-3 3-Major SAML SSO could fail if SAML configuration contains special XML characters (&,<,>,",')
426209-5 3-Major exporting to a CSV file may fail and the Admin UI is inaccessible
421446-4 3-Major Fixed bug in APM which doesn't allow InstallerService to update.
415299-2 3-Major Recurring check failures not logged
412138-2 3-Major If there's resource that has acl order 0 and it's been used by profile, that has been exported, you'd not be able to import it back
409323-1 3-Major OnDemand cert auth redirect omits port information
405348-5 3-Major ActiveSync POST fails when body is larger than 64k.
404141-2 3-Major Standby system offers option to Apply Access Policy even though it has been synced
389328-6 3-Major RSA SecurID node secret is not synced to the standby node


WebAccelerator Issues

ID Number Severity Description
446248 2-Critical Memory leak seen with WAM when ICC enabled without inlining
575631-7 3-Major Potential MCPd leak in WAM stats query code
562644-2 3-Major TMM may crash when AAM receives a pipelining HTTP request while shutting down the connection
551010-4 3-Major Crash on unexpected WAM storage queue state
522231-1 3-Major TMM may crash when a client resets a connection
521455-3 3-Major Images transcoded to WebP format delivered to Edge browser
517551-3 3-Major Assembly Can Create Response Stalls
511534-3 3-Major A large number of regular expressions in match rules on path-segments may cause an AAM policy to take too long to load,
506315-3 3-Major WAM/AAM is honoring OWS age header when not honoring OWS maxage.
476476-5 3-Major Occasional inability to cache optimized PDFs and images
459851-7 3-Major Connection aborted when using GET request If-Match header in Policy Node with No-Proxy(request)/Always_Proxy(response) setting.
443262 3-Major When ICC is enabled, content gets inlined even though it exists in client's local storage
421791-5 3-Major Out of Memory Error


Wan Optimization Manager Issues

ID Number Severity Description
445330 2-Critical Incorrect values are displayed for iSession profile optimized bits
485182-1 3-Major wom_verify_config does not recognize iSession profile in /Common sub-partition


Service Provider Issues

ID Number Severity Description
516057-2 2-Critical Assertion 'valid proxy' can occur after a configuration change with active IVS flows.
421612-5 2-Critical CGNAT traffic through SIP-ALG will not have outbound connections and addresses logged
421611-1 2-Critical SIP messages through the SIP-ALG may be hairpinned when the destination address is not inside the NAT
550434-3 3-Major Diameter connection may stall if server closes connection before CER/CEA handshake completes
512054-2 3-Major CGNAT SIP ALG - RTP connection not created after INVITE
511326-4 3-Major SIP SUBSCRIBE message not forwarded by BIG-IP when configured as SIP ALG with translation.
500365-2 3-Major TMM Core as SIP hudnode leaks
499701 3-Major SIP Filter drops UDP flow when ingressq len limit is reached.
480311-2 3-Major ADAPT should be able to work with OneConnect
476886-2 3-Major When ICAP cuts off request payload, OneConnect does not drop the connection
474069-2 3-Major ICAP can assert "valid node" on resumption after long-running iRule
472092-2 3-Major ICAP loses payload at start of request in response to long execution time of iRule
466761-3 3-Major Heartbeat, UDP packet with only double CRLF, on existing SIP flow results in connection loss.
466281-2 3-Major Internal virtual does not inherit traffic-group from parent virtual server
464116-3 3-Major HTTP responses are not cached when response-adapt is applied
453705-1 3-Major iRule command "SIP::header insert Via <index>" does not respect specified index
448493-2 3-Major SIP response from the server to the client get dropped


Advanced Firewall Manager Issues

ID Number Severity Description
550926-4 2-Critical AFM rule with "unknown" source Geo-entity stops functioning when another entity (geolocation or otherwise) is added to the same list of addresses in the rule
534343 2-Critical Sync of sync-only device group removes global policy
513403-2 2-Critical TMM asserts when certain ICMP packets (e.g multicast echo) are classified by AFM and match rules at Global and Route Domain context with logging enabled for these rules and also log-translations is enabled in AFM Logging configuration.
503541 2-Critical Use 64 bit instead of 10 bit for Rate Tracker library hashing.
501480 2-Critical AFM DoS Single Endpoint Sweep and Flood Vectors crash TMM under heavy traffic.
500925 2-Critical Introduce a new sys db variable to control number of merges per second of Rate Tracker library.
498227-3 2-Critical Incorrect AFM firewall rule counter update after pktclass-daemon restarts.
497342-3 2-Critical TMM crash while executing FLOW_INIT event (with multiple commands that abort the connection) in an iRule attached to an AFM firewall rule.
480903-2 2-Critical AFM DoS ICMP sweep mitigation performance impact
421016-1 2-Critical AFM + APM configurations and traffic drop
575582-6 3-Major MCPd might leak memory in FW network attack stats.
575571-5 3-Major MCPd might leak memory in FW DOS SIP attack stats query.
575569-5 3-Major MCPd might leak memory in FW DOS DNS stats query.
575565-5 3-Major MCPd might leak memory in FW policy rule stats query.
575564-5 3-Major MCPd might leak memory in FW rule stats query.
575557-5 3-Major MCPd might leak memory in FW rule stats.
575321-6 3-Major MCPd might leak memory in firewall stats.
541836 3-Major GUI disconnect when we try to access last hour request report in ASM
532189 3-Major CIDR masks for blacklist classes lacks validation for /0
515187-4 3-Major Certain ICMP packets are evaluated twice against Global and Route Domain ACL rules.
515112-3 3-Major Delayed ehash initialization causes crash when memory is fragmented.
510728-6 3-Major Create and Delete buttons should be disabled for Security :: Protocol Security : Security Profiles : DNS when accessed as Firewall Manager.
507493 3-Major Cannot reset counter for rules of Management Port and Global
504384 3-Major ICMP attack thresholds
503085 3-Major Make the RateTracker threshold a constant
502414 3-Major Make the RateTracker tier3 initialization number less variant.
497732-3 3-Major Enabling specific logging may trigger other unrelated events to be logged.
497667-3 3-Major Configuring of ICMPv4/ICMPv6 ip-protocol in mgmt port ACL Rules generated error
497263 3-Major Global whitelist count exhausted prematurely
496498-2 3-Major Firewall rule compilation will fail in certain scenario when there are multiple scheduled AFM rules and one of the non scheduled AFM rule is modified.
496278-3 3-Major Disabling/enabling Rule within Rule List causes disabling/enabling of other Rule with the same name
495928-2 3-Major APM RDP connection gets dropped on AFM firewall policy change
495698-2 3-Major iRule can be deleted even though it exists in a rule-list
495390-3 3-Major An error occurs on Active Rules page after attempting to reorder Rules in a Policy
493234 3-Major Device version in AFM log message could be empty
485787-2 3-Major Firewall ACL counters for staged policy attached to a Virtual/SelfIP are not incremented when a policy with a similar rule to drop/reject packets is enforced by the Global or Route Domain context
472125 3-Major IP Intelligence report data is not roll-forwarded between installations as it should
464972-1 3-Major Wrong parsing of Country Code (Geo) from address region list if Country name contains parentheses.
442535-2 3-Major Time zone changes do not apply to log timestamps without tmm restart
441597 3-Major Statistics of IP intelligence network category are always 0.


Policy Enforcement Manager Issues

ID Number Severity Description
469702 2-Critical Steering should be allowed with performace Layer 4 and classification disabled.
469519-2 2-Critical tmm assert "l4hdr set"
577814-1 3-Major MCPd might leak memory in PEM stats queries.
526295-1 3-Major BigIP crashes in debug mode when using PEM irule to create session with calling-station-id and called-station-id
495913-1 3-Major TMM core with CCA-I policy received with uninstall
485176-2 3-Major RADIUS::avp replace command cores TMM when only two arguments are passed to it
484278-1 3-Major BIG-IP crash when processing packet and running iRule at the same time
478399-1 3-Major PEM subscriber sessions are created without PEM licensed, if "radiusLB-subscriber-awre" profile is configured.
472565 3-Major Gx session "Created" and "Terminated" counters are increased on subscriber discovery when Gx is disabled
458286 3-Major Adding called_station_id and calling_station_id attributes to PEM::session create/info iRule commands


Carrier-Grade NAT Issues

ID Number Severity Description
521329 2-Critical CGNAT - Rare TMM core with Deterministic NAT
515646-2 2-Critical TMM core when multiple PPTP calls from the same client
494743-3 2-Critical Port exhaustion errors on VIPRION 4800 when using CGNAT
494280-1 2-Critical TMM crashes when PPTP finds a redirected flow when checking for an existing tunnel
494122-4 2-Critical Deterministic NAT state information from HSL is not usable on VIPRION B4300 blades
493807-6 2-Critical TMM might crash when using PPTP with profile logging enabled
490893-1 2-Critical Determinstic NAT State information incomplete for HSL log format
477232-3 2-Critical CGNAT translations have a higher chance of port reuse when address persistence is enabled
471292-1 2-Critical Deterministic NAT: incorrect mapping on platforms with PDE trunk size greater than 1
470175-1 2-Critical DNAT utility (dnatutil) does not support rfc5424 structured log format
468388-2 2-Critical Connection flows leak when service provider DAG is configured and/or under-provisioned LSN pools are configured
467706-2 2-Critical Deterministic NAT: incorrect mapping for VIPRION C4800/C4800N
465133-1 2-Critical SIP-ALG: When Proxy authentication is enabled, SIP-ALG will not set up media flows
464148 2-Critical Deterministic NAT: incorrect mapping on htsplit platforms
449896-1 2-Critical CGNAT DNAT connection failures with ECMP or route pools
448533-5 2-Critical Poor source port selection in CGNAT deterministic mode
431240-4 2-Critical RTSP ALG when used with CGNAT, the media connections do not have the data session translation address:port logged as LSN translations
431239-2 2-Critical RTSP established media connections do not honor LSN pool translation port ranges or configuration
394278-2 2-Critical SIP-ALG does not use translation ports consistent with a subscriber's Deterministic mappings when LSN "Deterministic Mode" is configured
500424-1 3-Major dnatutil exits when reverse mapping one of the snippet results in "No tmms on the blade" error
487660 3-Major LSN translation failures when persistence is enabled, cmp-hash is set to src-ip on ingress VLAN and to dst-ip on egress VLAN and using a small port range
463470-1 3-Major Active Translation Mappings count is too high
453328-1 3-Major Dnatutil logs must be grouped by TMM number issuing the logs
453239-2 3-Major lsndb application can only be run on primary blade in chassis.
450091-1 3-Major Log state information when the TMM is ready for traffic can appear incorrect.
429368-4 3-Major SIP RTP/RTCP connections do not honor LSN pool translation port ranges
429365-3 3-Major FTP data connections do not honor LSN pool translation port ranges
422094-7 3-Major Data connections created through FTP Active-mode transactions through the CGNAT do not have the data session translation address:port logged as LSN translations


Global Traffic Manager (DNS) Issues

ID Number Severity Description
499719 3-Major Order Zones statistics would cause database error


Device Management Issues

ID Number Severity Description
462827-5 1-Blocking Headers starting with X-F5 may cause problems if not X-F5-REST-Coordination-Id
479773-1 2-Critical SR C1800930 - GUI crashs - and SQL errors
463380-2 3-Major URIs with space characters may not work properly in ODATA query
428071 3-Major REST framework must be installed on each blade of a VIPRION

 

Known Issue details for BIG-IP v11.5.x

615522 : VDI crashes while responding to clients with multiple VDI threads running

Component: Access Policy Manager

Symptoms:
VDI crash dump is seen in bigip/var/core/ directory while accessing VDI resources.

Conditions:
VDI profile is attached to Virtual server and VDI resources are being used from webtop or from native client

Impact:
VDI access is interrupted

Workaround:
None.


613415-6 : Memory leak in ospfd when distribute-list is used

Component: TMOS

Symptoms:
Memory might be leaked when a distribute-list is used to filter routes between OSPFv2 and the Routing Information Base (RIB). The leak may lead to a the daemon being terminated via the oom-killer.

Conditions:
OSPFv2 in use with a distribute-list, and Link State Advertisements (LSAs) in the database whose prefixes will be filtered by the distribute-list.

Impact:
ospfd may leak memory until the system terminates the process via the oom-killer.

Workaround:
Position the BIG-IP system in the network so there are no LSAs that need to be filtered using a distribute-list, such as in a stub area.


606540-2 : DB variable changed via GUI does not sync across HA group

Component: TMOS

Symptoms:
If a configuration change is made in the BIG-IP GUI which is backed by a DB variable, the change is not synced to other devices in the same sync-failover device group.
If the same db variable change is made using the Traffic Management Shell (tmsh), the db variable change will be synced to other devices in the same sync-failover device group.

Note that db variable changes are never synced to devices in sync-only device groups.

Conditions:
1. BIG-IP systems in HA group, provisioned with modules (in addition to LTM) which create their own device groups (for example, ASM).
2. Original sync-failover device group replaced by a different sync-failover device group.
3. Using the GUI to change a configuration item which is backed by a DB variable.
Examples include:
failover.standby.linkdowntime (GUI: Device Management :: Device Groups : <fodg_name> : Failover : Link Down Time on Failover )
statemirror.clustermirroring (GUI: Device Management :: Devices : <device_name> : Cluster Options )

Impact:
Configuration of devices within a sync-failover device group may not be synchronized as expected.

Workaround:
To force synchronization of a db variable change made via the GUI, a tmsh command of the following form may be used:

tmsh modify cm device-group <sync-failover device group name> devices modify { <device name> { set-sync-leader } }

If the sync-failover device group is not automatically synced, manually sync the device group:

tmsh run cm config-sync to-group <sync-failover device group name>


To avoid creating a db variable change that will not be synchronized across sync-failover device group members, change the configuration or db variable using tmsh:

tmsh modify sys db <variable name> value <new value>

If the sync-failover device group is not automatically synced, manually sync the device group:

tmsh run cm config-sync to-group <sync-failover device group name>


602329-1 : syncookie header of HA channel mirror packets is not cleared

Component: Local Traffic Manager

Symptoms:
You notice that L7 connections on the standby unit are increasing and may not be cleared until the tcp timeout.

Conditions:
This can occur when using mirroring when syn cookies are enabled. It is more severe with hardware syn cookies but still occurs with software syn cookies.

Impact:
Connections increase unnecessarily on the standby unit.

Workaround:
Although it does not completely clear the condition, you can disable hardware syncookies to work around this problem.

In tmsh:
modify /ltm profile tcp <profile_name> hardware-syn-cookie disable


600396-4 : iControl REST may return 404 for all requests in AWS

Component: TMOS

Symptoms:
iControl REST queries may fail against specific versions of BIG-IP in AWS. When this issue is encountered, all queries fail for the entirety of the BIG-IP uptime. An error message mentioning "RestWorkerUriNotFoundException" will be returned. For instance, this basic query will always return 404:

curl -k -u admin:ADMINPASSWORD -sv -X GET https://1.2.3.4/mgmt/tm/ltm

* Trying 1.2.3.4...
* Connected to 1.2.3.4 (1.2.3.4) port 443 (#0)
* TLS 1.2 connection using TLS_DHE_RSA_WITH_AES_256_CBC_SHA256
* Server certificate: localhost.localdomain
* Server auth using Basic with user 'admin'
> GET /mgmt/tm/ltm HTTP/1.1
> Host: 1.2.3.4
> Authorization: Basic ....
> User-Agent: curl/7.43.0
> Accept: */*
>
< HTTP/1.1 404 Not Found
< Date: 20 Jun 2016 17:49:39 UTC
< Server: com.f5.rest.common.RestRequestSender
...
{ [1093 bytes data]
* Connection #0 to host 1.2.3.4 left intact
{
   "errorStack" : [
      "com.f5.rest.common.RestWorkerUriNotFoundException: http://localhost:8100/mgmt/tm/ltm",
      "at com.f5.rest.workers.ForwarderPassThroughWorker.cloneAndForwardRequest(ForwarderPassThroughWorker.java:293)",
      "at com.f5.rest.workers.ForwarderPassThroughWorker.onForward(ForwarderPassThroughWorker.java:211)",
      "at com.f5.rest.workers.ForwarderPassThroughWorker.onGet(ForwarderPassThroughWorker.java:370)",
      "at com.f5.rest.common.RestWorker.callDerivedRestMethod(RestWorker.java:1009)",
      "at com.f5.rest.common.RestWorker.callRestMethodHandler(RestWorker.java:976)",
      "at com.f5.rest.common.RestServer.processQueuedRequests(RestServer.java:850)",
      "at com.f5.rest.common.RestServer.access$000(RestServer.java:43)",
      "at com.f5.rest.common.RestServer$1.run(RestServer.java:147)",
      "at java.util.concurrent.ThreadPoolExecutor.runWorker(ThreadPoolExecutor.java:1145)",
      "at java.util.concurrent.ThreadPoolExecutor$Worker.run(ThreadPoolExecutor.java:615)",
      "at java.lang.Thread.run(Thread.java:722)\n"
   ],
   "restOperationId" : 8827,
   "code" : 404,
   "referer" : "4.3.2.1",
   "message" : "http://localhost:8100/mgmt/tm/ltm"
}

Conditions:
It is not known what triggers this, it intermittently affects new BIG-IP instances running in Amazon Web Services (AWS EC2) cloud environments.

Impact:
All iControl REST queries (GETs, PUTs, POSTs, DELETEs) will fail always until the BIG-IP is restarted.

Workaround:
Restart the BIG-IP.


598874-6 : GTM Resolver sends FIN after SYN retransmission timeout

Component: Local Traffic Manager

Symptoms:
If a DNS server is not responding to TCP SYN, GTM Resolver sends a FIN after a retransmission timeout (RTO) of the SYN.

Conditions:
GTM Resolver tries to open a TCP connection to a server that does not respond.

Impact:
Firewalls may log the FIN as a possible attack.


598039-1 : MCP memory may leak when performing a wildcard query

Component: TMOS

Symptoms:
MCP's umem_alloc_80 cache (visible using tmctl -a) increases in size after certain wildcard queries. Accordingly, the MCP process shows increased memory usage.

Conditions:
Folders must be in use, and the user must execute a wildcard query for objects that are in the upper levels of the folder hierarchy (i.e. not at the very bottom of the folder tree).

Impact:
MCP loses available memory with each query. MCP could eventually run out of memory and core, resulting in an outage or failover (depending on whether or not the customer is running in a device cluster).

Workaround:
Do not perform wildcard queries.


597089-2 : Connections are terminated after 5 seconds when using ePVA full acceleration

Component: Local Traffic Manager

Symptoms:
When using a fast L4 profile with ePVA full acceleration configured, the 5-second handshake timeout is not being updated to the idle timeout after the handshake is completed. The symptom is an unusually high number of connections getting reset in a short period of time.

Conditions:
It is not known all of the conditions that trigger this, but it is seen when using the fast L4 profile with pva-acceleration set to full

Impact:
High number of connections get reset, performance issue

Workaround:
Disabling the pva resolves the issue.


596945 : AVR DNS record lost after upgrade.

Component: Application Visibility and Reporting

Symptoms:
After upgrading to 11.5.1 through 11.6.0, you are unable to view DNS stats in AVR.

Conditions:
AVR enabled, DNS statistics visible in a version prior to 11.5.1, then upgrade to versions 11.5.1 through 11.6.0.

Impact:
You will be unable to view the DNS statistics.


596826-3 : Don't set the mirroring address to a floating self IP address

Component: TMOS

Symptoms:
Using tmsh, you can configure the mirroring IP address using the command tmsh modify cm device devicename mirror-secondary-ip ip_address

It is possible to set ip_address to a floating self IP address when using tmsh, but BIG-IP can't mirror to a floating self IP address.

Conditions:
Accidentally setting the mirroring IP address to the floating self IP address using tmsh.

Impact:
Mirroring does not work in this case.

Workaround:
Change the mirroring address to a non floating self IP address. The GUI will only present non floating self IP addresses.

For more information about mirroring, see SOL13478: Overview of connection and persistence mirroring at https://support.f5.com/kb/en-us/solutions/public/13000/400/sol13478.html


596814-1 : HA Failover fails in certain valid AWS configurations

Component: TMOS

Symptoms:
Some of the floating object's IPs might not be reattached to the instance acting as the new active device.

Conditions:
AWS deployments where there are multiple coincidences for the provided IP address (corresponding to other Amazon VPCs in the same Availability Zone containing unrelated instances but having the same IP address as the BIG-IP's floating IP address.

Impact:
Potential traffic disruption. Some of the floating object's IPs might not be reattached to the instance acting as the new active device.

Workaround:
Do not have AWS deployments with multiple VPCs sharing the same IP address as the BIG-IP's floating IP address.


596603-10 : AWS: BIG-IP VE doesn't work with c4.8xlarge instance type.

Component: TMOS

Symptoms:
When deploying BIG-IP VE in AWS with c4.8xlarge instance type, the system never boots and remains in "Stopped" state after briefly trying to start-up.

Conditions:
BIG-IP VE is deployed with c4.8xlarge instance type in AWS.

Impact:
c4.8xlarge instance type are not supported for BIG-IP VE in AWS.

Workaround:
Choose c4.4xlarge or other instance types in AWS.


595773-2 : Cancellation requests for chunked stats queries do not propagate to secondary blades

Component: TMOS

Symptoms:
Canceling a request for a chunked stats query (e.g. hitting ctrl-c during "tmsh show sys connection") does not stop data flowing from secondary blades.

Conditions:
A chassis-based system with multiple blades. Users must execute a chunked stats query (e.g. "tmsh show sys connection") and then cancel it before it finishes (e.g. with ctrl-c in tmsh).

Impact:
Unnecessary data will be sent from TMM to secondary mcpd instances, as well as from secondary mcpd instances to the primary mcpd instance. This could cause mcpd to restart unexpectedly.


593536-4 : Device Group with incremental ConfigSync enabled can report "In Sync" when devices have differing configurations

Component: TMOS

Symptoms:
Devices do not have matching configuration, but system reports device group as being "In Sync".

Conditions:
Device Service Cluster Device Group with incremental sync enabled. A ConfigSync occurred where a configuration transaction failed validation, and then a subsequent (or the final) configuration transaction was successful.

Impact:
BIG-IP incorrectly reports configuration is in-sync, despite the fact that it is not in sync. All sorts of failures or odd behavior or traffic impact can result from this.

Workaround:
Turn off incremental sync (by enabling "Full Sync" / "full load on sync") for affected device groups.


592784-6 : Compression stalls, does not recover, and compression facilities cease.

Component: Local Traffic Manager

Symptoms:
Compression stalls, does not recover, and compression facilities may cease.

Conditions:
A device error of any kind, or requests that result in the device reporting an error (for example, attempting to decompress an invalid compression stream).

Impact:
In general, compression stops altogether. Under some circumstances, compression requests may end up routed to zlib (software compression), but generally the SSL hardware accelerator card does not correctly report that it is unavailable when it stalls.

Workaround:
Select the softwareonly compression provider by running the following tmsh command: tmsh modify sys db compression.strategy value softwareonly.


591708 : HSB may drop off of PCI bus

Component: TMOS

Symptoms:
The HSB may drop off of the PCI bus. This results failure to read the HSB registers, which is indicated by the following log entries in the tmm logfile:

Device error: hsb_lbb1 hde1_crc_errs count 65535.
Device error: hsb_lbb1 hde2_crc_errs count 65535.

This is usually followed by SIGABRT. The subsequent TMM reload fails to load the HSB device.

Querying the PCI bus (using lspci), shows that the HSB device is unavailable:

03:00.0 Ethernet controller: F5 Networks Inc. Device 0006 (rev ff) (prog-if ff)
!!! Unknown header type 7f

Conditions:
Unknown.

Impact:
Disruption of traffic. Request unit reboot.

Workaround:
Reboot unit.


591659-7 : Server shutdown is propagated to client after X-Cnection: close transformation.

Component: Local Traffic Manager

Symptoms:
Server shutdown is propagated to client after X-Cnection: close transformation.

Conditions:
In OneConnect configurations, when a server's maximum number of keep-alives is exceeded, the server closes the connection between itself and the BIG-IP system. This Connection: Close is transformed to an X-Cnection: close and sent to the Client along with a TCP FIN.

Impact:
Client side connections are closed by the BIG-IP system too early, causing subsequent requests to be dropped.

Workaround:
None.


591476-4 : Stuck nitrox crypto queue can erroneously be reported

Component: Local Traffic Manager

Symptoms:
In some cases, a stuck crypto queue can be erroneously detected on Nitrox systems (Nitrox PX and Nitrox 3). When the tmm/crypto stats are examined, they show no queued requests. The message "Device error: crypto codec cn-crypto-0 queue is stuck." will appear in the ltm log file.

Conditions:
Nitrox based system performing SSL under heavy load.

Impact:
Device errors reported in logs and crypto HA action is taken, possibly resulting in failing over.


589400-6 : With Nagle disabled, TCP does not send all of xfrags with size greater than MSS.

Component: Local Traffic Manager

Symptoms:
With Nagle disabled, TCP does not send all of xfrags with size greater than MSS.

Conditions:
Congestion window is small relative to message size; abc is enabled; also might manifest when serverside MTU is greater than clientside MTU.

Impact:
Additional connection latency.

Workaround:
Enabling proxy-mss on the serverside TCP profile significantly reduces incidence of this problem in observed cases.

If init-cwnd is low, raising it might also help.

Disabling abc can also reduce the problem, but might have other negative network implications.


588572-1 : Unnecessary re-transmission of packets on higher ICMP PMTU.

Component: Local Traffic Manager

Symptoms:
LTM re-transmits TCP segments even when ICMP Path maximum transmission unit (PMTU) is higher than existing MTU.

Conditions:
ICMP PMTU is higher than existing MTU. User enables MPTCP, Rate Pacing, or any of the following congestion controls:
Vegas, Illinois, Woodside, CHD, CHG

Impact:
Burst traffic generated.

Workaround:
Disable Path MTU Discovery by entering the command: tmsh modify sys db tm.enforcepathmtu value disable.


588569-1 : Don't include maximum TCP options length in calculating MSS on ICMP PMTU.

Component: Local Traffic Manager

Symptoms:
TCP segment size is 40 bytes less.

Conditions:
ICMP implementation using Path MTU (PMTU). User enables MPTCP, Rate Pacing, or any of the following congestion controls:
Vegas, Illinois, Woodside, CHD, CHG

Impact:
The impact of this issue is less data per TCP segment.

Workaround:
Disable Path MTU Discovery by doing the following,

"tmsh modify sys db tm.enforcepathmtu value disable"


587821-3 : vCMP Guest VLAN traffic failure after MCPD restarts on hypervisor.

Component: TMOS

Symptoms:
On the affected slot, the vCMP guest is unable to pass traffic to or from the VLANs. If the guest has multiple slots, the CMP state logged in /var/log/tmm on that slot differs from the CMP state logged by other slots of the same guest.

In the vCMP guest, 'tmsh show net interface -hidden' shows 0.x interfaces for the affected slot that differ from the 0.x interfaces shown by 'tmsh show vcmp guest all-properties' on the vCMP hypervisor for the same guest slot.

Conditions:
The MCPD daemon on one of the blades of the vCMP hypervisor crashes or restarts.

Impact:
The vCMP guests that are still running since before the MCPD daemon restarted may be unable to communicate to VLAN networks. Incoming traffic may also be affected, even though the vCMP guest has other functional slots to process traffic.

Workaround:
On the hypervisor, modify the vCMP guest configuration to not run on the affected slot. Wait to confirm the vCMP guest has stopped on the affected slot. Then modify the vCMP guest to run on the previously affected slot.

Alternatively, modify the vCMP guest to the Configured state, and wait to confirm the vCMP guest has stopped on all slots. Then return the vCMP guest to the Deployed state.


587705 : Persist lookups fail for source_addr with match-across-virtuals when multiple entries exist with different pools.

Component: Local Traffic Manager

Symptoms:
Persist lookups fail for source_addr with match-across-virtual servers when multiple entries exist for the client, but pointing to different pools.

Conditions:
'Match_across_virtual' enabled. Multiple persistence entries for a client address exist, and some of these persistence entries point to poolmembers from different pools. Some of these poolmembers do not belong to any of the current virtual server's pools.

Impact:
Source address persistence fails for this client, even though there is a valid persistence entry that can be used.

Workaround:
None.


586718-7 : Session variable substitutions are logged

Component: Access Policy Manager

Symptoms:
With the log level set to debug, session variable substitutions are logged, including the encrypted password if you are substituting the password variable. You may see the following logs: debug apmd[3531]: 01490000:7: Util.cpp func: "ScanReplaceSessionVar()" line: 608 Msg: data: '%{session.logon.last.password}' start_pos: 0, count: 30 on 'session.logon.last.password' with the encrypted password logged

Conditions:
APM Access Policy log level set to debug, and session variable substitution is performed.

Impact:
Session variable substitution should not be logged, even if it is secure.

Workaround:
Set log level to informational or notice for normal operations. Logging at debug level is not recommended unless absolutely needed for specific troubleshooting as it adversely affects system performance.


586621-1 : SQL monitors 'count' config value does not work as expected.

Component: Local Traffic Manager

Symptoms:
SQL monitors 'count' config value does not work as expected.

Conditions:
SQL monitor in use with the 'count' config value specified. The 'count' value is intended to record the number of times the connection to the back-end database is re-used before it is disconnected. However, the value is not correctly recording the number in this release.

Impact:
SQL monitor might use a 'count' value that is incorrect.

Workaround:
Add 101 to the desired value. For example, if the desired count is '5', use '106' instead.


586006-7 : Failed to retrieve CRLDP list from client certificate if DirName type is present

Component: Access Policy Manager

Symptoms:
Client certification revocation check will fail.

Conditions:
Two conditions will trigger this problem:
1. A CRLDP agent is configured in the access policy without server hostname and port, which is needed for DirName type processing. AND
2. At least one DirName type CRLDP is present in the client certification and it is the first in the list.

Impact:
Users may fail access policy evaluation when client certification is used.

Workaround:
Configure an LDAP server for the CRLDP object. It need not return a valid CRL.


584583-5 : Timeout error when attempting to retrieve large dataset.

Component: TMOS

Symptoms:
The Rest API can timeout when attempting to retrieve large dataset, such as a large GTM pool list. The error signature when using the Rest API looks like "errorStack":["java.util.concurrent.TimeoutException: remoteSender:127.0.0.1, uri:http://localhost:8110/tm/gtm/pool, method:GET "

Conditions:
Configuration containing a large number of GTM pools and pool members (thousands).

Impact:
If using the Rest API to retrieve the pool list, you may receive timeout errors.


583936-2 : Removing ECMP route from BGP does not clear route from NSM

Component: TMOS

Symptoms:
When configured to install multiple routes into the routing table, ZebOS does not withdraw BGP routes when a neighbor is shut down and it has more than two routes already installed for the same route prefix.

Conditions:
ECMP routing must be enabled and in-use.

Impact:
ECMP routes are not properly removed from the main routing table.


583754-3 : When TMM is down, executing 'show ltm persist persist-records' results in a blank error message.

Component: TMOS

Symptoms:
Executing 'show ltm persist persist-records' results in a blank error message.

Conditions:
TMM must be down.

Impact:
Non-obvious / unhelpful error message is generated, leading to customer confusion.

Workaround:
N/A


583475-4 : The BIG-IP may core while recompiling LTM policies

Component: TMOS

Symptoms:
In some rare and still unknown situations the BIG-IP Mcpd process may core when creating or modifying LTM policies. While the root cause of the crash is not fully understood at this time, one of the symptoms points to a nonexistent or invalid LTM policy.

Conditions:
Creating or modifying LTM policies.

Impact:
The BIG-IP control plane services restart thus affecting both, control plane and data plane functionality.

Workaround:
A possible workaround could be to attempt re-creating the LTM policy producing the crash under a different name. Avoid any special characters (or spaces) in the name of the LTM policy.


582234 : When using a config merge load to disable and then later re-enable a monitored pool member, monitor checking will not start up again.

Component: Local Traffic Manager

Symptoms:
When using a config merge load to disable and then later re-enable a monitored pool member, monitor checking will not start up again.

Conditions:
A monitored pool member is initially disabled, and a config merge re-enables it

Impact:
Monitoring does not resume when pool member is re-enabled via config merge.

Workaround:
You can re-enable monitoring by running the following commands:

tmsh save sys config
tmsh load sys config


582207-2 : MSS may exceed MTU when using HW syncookies

Component: Local Traffic Manager

Symptoms:
Packets larger than the interface's MTU can be transmitted.

Conditions:
A SYN packet is received with an MSS that exceeds the interface's MTU.

Impact:
Potential packet loss.

Workaround:
Disable HW syncookie mode.


580817-6 : Edge Client may crash after upgrade

Component: Access Policy Manager

Symptoms:
The Edge client may crash after upgrading to 11.4.1 through 12.0.0.

Conditions:
Access Policy with Firewall Checker
Update BIG-IP to 12.1.0

Impact:
Users are unable to use the Edge client


580421-6 : Edge Client may not register DLLs correctly

Component: Access Policy Manager

Symptoms:
After an end-user confirms that they want to install InstallerControll.cab, the browser gets stuck in 'Checking client'.

Conditions:
Client is using Internet Explorer

Impact:
Clients are unable to install the Edge client components


579284-3 : Potential memory corruption in MCPd

Component: TMOS

Symptoms:
Memory in mcpd could get corrupted. The effect of this is unpredictable.

Conditions:
Varies. One way (but not the only way) this could be seen is by cancelling a chunked stats query (e.g. hitting ctrl-c during "show sys connection").

Impact:
Varies. Sometimes nothing will happen; other times MCP could start acting unpredictably. In one case it closed its connection to TMM, which caused all TMMs to restart.


577814-1 : MCPd might leak memory in PEM stats queries.

Component: Policy Enforcement Manager

Symptoms:
System may be unresponsive or crash due to being out of memory.

Conditions:
Can occur when a PEM stats query is processed.

Impact:
System may be unresponsive or crash due to being out of memory.

Workaround:
None.


576305-6 : Potential MCPd leak in IPSEC SPD stats query code

Component: TMOS

Symptoms:
MCPd leaks memory.

Conditions:
In some cases, querying IPSEC SPD stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


576296-7 : MCPd might leak memory in SCTP profile stats query.

Component: Local Traffic Manager

Symptoms:
The memory allocation for mcpd might grow by a small amount if SCTP profile stats are queried. In order to begin to impact the performance of the system, the stats would have to be queried many thousands of times.

Conditions:
An SCTP profile is configured, and the stats are displayed in TMSH or the GUI.

Impact:
Performance may be degraded.

Workaround:
None.


575735-7 : Potential MCPd leak in global CPU info stats code

Component: TMOS

Symptoms:
MCPd leaks memory; the umem_alloc_8 cache will grow.

Conditions:
In some cases, querying global CPU information stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


575726-7 : MCPd might leak memory in vCMP interface stats.

Component: TMOS

Symptoms:
MCPd might leak memory in vCMP interface stats.

Conditions:
The memory leak occurs when viewing VCMP interface statistics.

Impact:
Over time this can cause MCPd to run out of memory and core.

Workaround:
None.


575716-7 : MCPd might leak memory in VCMP base stats.

Component: TMOS

Symptoms:
MCPd might leak memory in VCMP base stats.

Conditions:
This occurs when looking at VCMP base statistics.

Impact:
Over time this might cause MCPd to run out of memory and core.

Workaround:
None.


575708-7 : MCPd might leak memory in CPU info stats.

Component: TMOS

Symptoms:
MCPd might leak memory in CPU info stats.

Conditions:
In some cases, querying CPU information stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


575671-7 : MCPd might leak memory in host info stats.

Component: TMOS

Symptoms:
MCPd might leak memory in host info stats.

Conditions:
In some cases, querying host information stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


575631-7 : Potential MCPd leak in WAM stats query code

Component: WebAccelerator

Symptoms:
MCPd leaks memory.

Conditions:
In some cases, querying WAM stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


575626-3 : Minor memory leak in DNS Express stats error conditions

Component: Local Traffic Manager

Symptoms:
A minor memory leak might occur in certain error conditions relating to DNS Express statistics.

Conditions:
There are no known DNS Express configurations that lead to this issue. The problem was detected through standard code review practices.

Impact:
Memory leaks might eventually lead to system reboots.

Workaround:
None.


575619-7 : Potential MCPd leak in pool member stats query code

Component: TMOS

Symptoms:
MCPd leaks memory; the umem_alloc_8 cache will grow.

Conditions:
In some cases, querying pool member stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


575612-6 : Potential MCPd leak in policy action stats query code

Component: Local Traffic Manager

Symptoms:
MCPd leaks memory.

Conditions:
In some cases, querying policy action stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


575609-2 : Zlib accelerated compression can result in a dropped flow.

Component: Access Policy Manager

Symptoms:
Some compression requests would fail when the estimated compression output block was too small. Such errors deposit an error in the log similar to: Device error: n3-compress0 Zip engine ctx eviction (comp_code=2): ctx dropped.

Conditions:
A block that will not compress can generate a compression output that exceeds the estimated output block size.

Impact:
The flow that encounters the error is dropped.

Workaround:
Disable hardware accelerated compression.


575608-7 : MCPd might leak memory in virtual server stats query.

Component: TMOS

Symptoms:
MCPd might leak memory in virtual server stats query.

Conditions:
In some cases, querying virtual server stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


575587-6 : Potential MCPd leak in BWC policy class stats query code

Component: TMOS

Symptoms:
MCPd leaks memory.

Conditions:
In some cases, querying BWC policy stats can leak memory.

Impact:
MCPd might eventually run out of memory and core.

Workaround:
None.


575582-6 : MCPd might leak memory in FW network attack stats.

Component: Advanced Firewall Manager

Symptoms:
MCPd might leak memory in FW network attack stats.

Conditions:
This occurs when looking at firewall network attack statistics.

Impact:
Over time this can cause MCPd to run out of memory and core.


575571-5 : MCPd might leak memory in FW DOS SIP attack stats query.

Component: Advanced Firewall Manager

Symptoms:
MCPd might leak memory in FW DOS SIP attack stats query.

Conditions:
This occurs when looking at firewall DOS SIP stats.

Impact:
Over time this can cause MCPd to run out of memory and core.


575569-5 : MCPd might leak memory in FW DOS DNS stats query.

Component: Advanced Firewall Manager

Symptoms:
MCPd might leak memory in FW DOS DNS stats query.

Conditions:
This occurs when looking at firewall DOS DNS statistics.

Impact:
Over time this can cause MCPd to run out of memory and core.


575565-5 : MCPd might leak memory in FW policy rule stats query.

Component: Advanced Firewall Manager

Symptoms:
MCPd might leak memory in FW policy rule stats query.

Conditions:
This occurs when looking at firewall policy rule stats.

Impact:
Over time this can cause MCPd to run out of memory and core.


575564-5 : MCPd might leak memory in FW rule stats query.

Component: Advanced Firewall Manager

Symptoms:
MCPd might leak memory in FW rule stats query.

Conditions:
This occurs when looking at firewall rule statistics.

Impact:
Over time this can cause MCPd to run out of memory and core.


575557-5 : MCPd might leak memory in FW rule stats.

Component: Advanced Firewall Manager

Symptoms:
MCPd might leak memory in FW rule stats.

Conditions:
This occurs when looking at firewall rule statistics.

Impact:
Over time this can cause MCPd to run out of memory and core.


575321-6 : MCPd might leak memory in firewall stats.

Component: Advanced Firewall Manager

Symptoms:
MCPd might leak memory in firewall stats.

Conditions:
This occurs when looking at firewall stats.

Impact:
Over time this can cause MCPd to run out of memory and core.


575011-7 : Fix memory leak.

Component: Local Traffic Manager

Symptoms:
System exhausts available memory due to compression memory leak. Prior to running out of memory, repeatedly logs "Nitrox3 Hang Detected".

Conditions:
Compression device unavailable during creation of a new context.

Impact:
System can run out of memory.

Workaround:
Disable hardware compression using tmsh:

% tmsh modify sys db compression.strategy softwareonly


574160 : Publishing DNS statistics if only Global Traffic and AVR are provisioned

Component: Application Visibility and Reporting

Symptoms:
AVR does not publish DNS statistics if LTM is not provisioned.

Conditions:
LTM is not provisioned.

Impact:
The DNS chart does not show statistics.


574045-1 : BGP may not accept attributes using extended length

Component: TMOS

Symptoms:
If a BGP peer sends a path attribute using the "extended length" flag and field, the attribute may be rejected and the BGP connection terminated.

Conditions:
Neighbor sends path attributes using extended length.

Impact:
The BGP adacency will repeatedly bounce and the RIB will never converge.


572563-6 : PWS session does not launch on Internet Explorer

Component: Access Policy Manager

Symptoms:
Internet Explorer (IE) gets stuck entering Protected Work Space (PWS).

Conditions:
One of the DLLs provided by APM, vdeskctrl.dll, provides COM services. Internet Explorer (IE), consumes the COM services. The DLL is loaded by IE during upgrade of PWS components. For some reason (especially on slow systems), IE does not unload the the old DLL promptly after upgrading PWS. When COM services are invoked to initialize PWS after upgrade, old DLL provides the service. Due to the recent renewal of our signing certificate, old DLL can't certify the integrity of the new PWS components. We have researched the issue, but we have not found a way to instruct IE to unload the old DLL after upgrade.

Impact:
PWS session does not launch.

Workaround:
After upgrade, if Internet Explorer(IE) does not enter into PWS within 60 seconds, close IE and start a new session. This is an one time event.


571210-5 : Upgrade, load config, or sync might fail on large configs with large objects.

Component: TMOS

Symptoms:
Attempting to load a large config with large objects may result in the following error message:

err mcpd[7366]: 01070710:3: Database error (52), Can't write blob data, attribute:implementation status:52 - EdbBlobData.cpp, line 57

Attempting to synchronize a large change may result in the following error messages and a crash of the MCPD process:

err mcpd[8210]: 01071693:3: Incremental sync: Caught an exception while adding a transaction to the incremental config sync cache: unexpected exception.

err mcpd[8210]: 01070734:3: Configuration error: MCPProcessor::processRequestNow: Can't write blob data, attribute:msgs status:52

err mcpd[8210]: 01070596:3: An unexpected failure has occurred, request_group destroyed while processing, exiting...

Conditions:
The config must be approximately 19.75 MB (slightly less) prior to processing a large object in the config that exceeds 256 KB.

Or, once config exceeds 19.75 MB and 2 MB of additional memory has been allocated, processing config objects that exceed 256 KB (the larger, the more likely to occur) lead to the error.

Impact:
Upgrade, load config, or sync might fail, and a system crash and restart might occur.

Workaround:
Stagger the load, or reduce the size of particularly large objects within a config.


571019-5 : Topology records can be ordered incorrectly.

Component: TMOS

Symptoms:
Topology records can contain missing order numbers, duplicate order numbers, and differences in the ordering of topology records on BIG-IP's in a sync group.

Conditions:
When adding or deleting topology records or modifying the order of existing topology records, the resulting ordering of the topology records can be inconsistent. This can lead to ordering issues including differences in the ordering of topology records on BIG-IP's in a sync group.

Impact:
It is difficult to manage the order of topology records. Topology records are evaluated in different orders on different BIG-IP's in a sync group.

Workaround:
None.


570663-4 : Using iControl get_certificate_bundle_v2 causes a memory leak

Component: TMOS

Symptoms:
Using iControl call get_certificate_bundle_v2() causes a memory leak. iControlPortal memory use grows unbounded every time the method is called.

Conditions:
This occurs anytime the method is invoked; BIG-IP devices managed by Enterprise Manager can be especially impacted.

Impact:
Eventually iControlPortal will run out of memory and crash.


570617-3 : HTTP parses fragmented response versions incorrectly

Component: Local Traffic Manager

Symptoms:
When a fragmented response is parsed by HTTP, the version field may be incorrectly bounded. HTTP correctly determines the version of the response. However, other filters that re-scan the version field might see a truncated value. The filters then miss-parse the HTTP version.

Conditions:
A fragmented response where the HTTP version field appears in multiple packets. Another filter, for example VDI, re-scans the HTTP version field.

Impact:
The detected version of HTTP may be incorrect. Typically, the response is detected as a HTTP/0.9 response rather than the 1.0 or 1.1 response it actually uses.

Workaround:
None.


570064-6 : IE gives a security warning asking: "Do you want to run ... InstallerControll.cab"

Component: Access Policy Manager

Symptoms:
When logging into a VPN connection using Internet Explorer, Internet Explorer may prompt "Do you want to run ... InstallerControll.cab"

Conditions:
BIG-IP APM configured and is accessed by Internet Explorer. This can happen after an upgrade of BIG-IP.

Impact:
The prompt should not occur.


569288-1 : Different LACP key may be used in different blades in a chassis system causing trunking failures

Component: Local Traffic Manager

Symptoms:
In rare conditions, different blades in a chassis system may use different LACP keys for the same trunk in the LACP control frames. This will cause some of the LACP trunk members not able to aggregate successfully with peer switch.

Conditions:
This only happens in a chassis based system when certain race condition causes trunk id being modified after initial trunk creation.

Impact:
Non aggregated trunk members won't be able to pass traffic.

Workaround:
Restart lacpd in all the blades in the chassis by running command "clsh bigstart restart lacpd"


568889-6 : Some ZebOS daemons do not start on blade transition secondary to primary.

Component: TMOS

Symptoms:
In some specific cases the standby unit's secondary blade ZebOS daemons might not get started when it becomes active.

Conditions:
If the failover occurs as a result of the primary blade's mcpd restarting

Impact:
The new primary blade does not start some ZebOS daemons resulting in ospf not working as expected on the standby unit.

Workaround:
Run the following tmsh command on the new active unit: bigstart restart tmrouted.


566361-4 : RAM Cache Key Collision

Component: Local Traffic Manager

Symptoms:
Intermittent tmm SIGSEGV when RAM Cache is enabled

Conditions:
This occurs when RAM cache is enabled in certain circumstances.

Impact:
Invalid response format, and/or serving the wrong object from cache, and/or tmm crash, interruption of service.

Workaround:
None.


565534-6 : Some failover configuration items may fail to take effect

Component: TMOS

Symptoms:
These symptoms apply to version 12.0.0 and higher:

When only multicast failover is configured, traffic-groups are active on all devices in the device-group. If unicast failover is also configured, the traffic-group unexpectedly switches to a different device.

These symptoms can occur on all versions:

When the unicast address list is changed at the same time as other device properites, sod (the failover daemon) may fail to recognize one of the other changes.

Conditions:
For version 12.0.0 and higher:

Multicast failover is configured and the system loads the configuration from the configuration files. For example during the first boot of a new boot location or after performing the procedure in Sol13030.

For all versions:

A change is made to the cm device configuration that includes a unicast-address change along with something else.

Impact:
When only multicast failover is configured, traffic-groups may become active on all devices in the device-group. If unicast failover is also configured, the traffic-group might switch to a different device.

Workaround:
Mitigation for v12.0.0 symptom:

To restore multicast failover, disable and re-enable multicast failover.

CLI:
This must be done on the the local device:
Determine which interface is being used for multicast failover:
tmsh> list cm device bigip1 multicast-interface
Disable and re-enable multicast failover.
tmsh> modify cm device bigip1 { multicast-interface none }
tmsh> modify cm device bigip1 { multicast-interface eth0 }


Mitigation for all versions symptoms:
Do not make cm device unicast-address changes simultaneously with changes to other cm device properties.


565409-2 : Invalid MSS with HW syncookies and flow forwarding

Component: Local Traffic Manager

Symptoms:
A packet may have an MSS set to 65536 when using HW syncookies and flow forwarding.

Conditions:
The conditions which cause this are not fully known.

Impact:
TMM core/reboot.

Workaround:
Disable HW syncookies or TSO.


563419-1 : IPv6 packets containing extended trailer are dropped

Component: Local Traffic Manager

Symptoms:
Some IPv6 packets are dropped

Conditions:
IPv6 packet contains trailing bytes after payload

Impact:
Packet loss


563135-1 : SWG Explicit Proxy uses incorrect port after a 407 Authentication Attempt

Component: Access Policy Manager

Symptoms:
When the SWG Explicit Proxy is configured to perform a 407 Authentication Request, if the client accesses a non-standard HTTP port (e.g. http://www.example.com:8080) the first request after authentication will fail.

Conditions:
SWG Explicit Proxy configured
HTTP 407 Authorization configured in Per-Request Policy for authentication
Client requests a non-standard HTTP port in request

Impact:
The first request after authentication will fail.

Workaround:
If the user refreshes their browser request, subsequent requests will work as expected.


563064-3 : Bringing up and tearing down an IPsec tunnel will slowly leak tmm memory

Component: TMOS

Symptoms:
Cipher memory initialized when an IPsec tunnel is created is not cleaned up when IPsec tunnel is removed.

Conditions:
Every time an IPsec tunnel is established and then removed will leave the allocated cipher memory in the system.

Impact:
Slowly leak TMM memory


562644-2 : TMM may crash when AAM receives a pipelining HTTP request while shutting down the connection

Component: WebAccelerator

Symptoms:
In rare conditions when a client sends pipelining HTTP requests and AAM is configured it may incorrectly process a consequent request resulting in crashing of TMM.

Conditions:
AAM and ASM licensed and provisioned
HTTP compression profile configured on a virtual server

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


561814-2 : TMM Core on Multi-Blade Chassis

Component: TMOS

Symptoms:
TMM core.

Conditions:
On a multi-blade chassis with WAM caching in use, where the datastor daemon is stopped and restarted, and where traffic is being cached by datastor.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


560510-2 : Invalid /etc/resolv.conf when more than one DNS servers are set and MCPD is down.

Component: TMOS

Symptoms:
When MCPD is not in the running state, dhclient directly writes domain-name-server information into /etc/resolv.conf. If multiple domain-name-servers are given by DHCP server, they are written in the incorrect format with multiple domain-name-servers in a single line comma-separated. Each domain-name-servers entry should be written in a single line with "nameserver" prefix.

Conditions:
- MCPD is not in the running state.
 - DHCP is enabled.
 - DHCP server has provided multiple domain-name-server entries in the lease.

Impact:
Domain name resolution doesn't work.

Workaround:
Bring up MCPD which would write the resolv.conf in the correct format. Alternatively, user can manually modify /etc/resolv.conf to write multiple nameserver entry one per line.


560429 : LTM iRule table set command cannot always set value of record with extremely short timeout

Component: TMOS

Symptoms:
If you have a record with an extremely low timeout value and you attempt to constantly set/reset the value, you may intermittently attempt to access the record while it is expired, in which case the value you attempt to set it to is not accepted.

Conditions:
Using table set command with a timeout of less than 8 seconds.

Impact:
iRule operates incorrectly

Workaround:
Refresh the timeout on the entry before attempting to set it, via table lookup.


560405-1 : Optional target IP address and port in the 'virtual' iRule API is not supported.

Component: Local Traffic Manager

Symptoms:
In certain scenarios there is a need to redirect an HTTP request through a given virtual server to a another virtual server (or remote endpoint). Such an operation is also known as 'vip-to-vip' forwarding. The available iRule API (specifically, the 'virtual' command) does not currently support this functionality.

Conditions:
Using an iRule to forward a request through a given virtual server to another virtual server or remote endpoint.

Impact:
Cannot implement HTTP Forward Proxy plus Transparent redirection to Web-Cache Pool.

Workaround:
None.


559973-4 : Nitrox can hang on RSA verification

Component: Local Traffic Manager

Symptoms:
With certain signatures, RSA verification can hang the Nitrox crypto accelerator chip. Errors in the ltm log show crit tmm[11041]: 01010260:2: Hardware Error(Co-Processor): n3-crypto2 request queue stuck

Conditions:
RSA verification with certain signatures.

Impact:
Nitrox crypto accelerator can hang.


559554-4 : CHD congestion control can have erroneous very large cwnd.

Component: Local Traffic Manager

Symptoms:
At times, CHD congestion control can store a very large congestion window, resulting in release of data well beyond that warranted by network conditions.

Conditions:
The client advertises a receive window less than 1 MSS, and CHD tries to decrease the window.

Impact:
Possible network congestion.

Workaround:
Change congestion control algoirhtm from CHD.


559080-1 : High Speed Logging to specific destinations stops from individual TMMs

Component: TMOS

Symptoms:
High Speed Logging to specific destinations stops from individual TMMs. The flows appear to have very large idle times. Attempts to delete the flows sets the idle time to zero, but does not kill the flow.

Conditions:
This appears to be the result of a failure on the part of the log destination (for example, a log server) wherein the server's TCP stack ACKs a FIN request from the TMM, but does not follow through with a matching FIN or RST. The logging code expects another timeout (essentially a FIN-WAIT2 timeout), but never receives one because the flow has already been marked as expired. As a result, the flow goes into a state in which it appears to be viable but is not actually delivering.

Impact:
Logs are silently lost.

Workaround:
Create an additional virtual server to act as a proxy for the log server, and sent the logs to this virtual server. This essentially uses the TMM itself as a sanitizing proxy.


559060 : AVR reads BIG-IP system's cookie incorrectly in multiple BIG-IP configuration.

Component: Application Visibility and Reporting

Symptoms:
AVR presents incorrect data in the GUI statistics (for example, unexpected pool members, and so on, with hitcount 0).

Conditions:
Multiple BIG-IP systems are configured, one is acting as server for the other and both have 'collect client latency' enabled.

Impact:
Invalid data is presented in the statistics.

Workaround:
Turn off 'collect client latency' in the AVR profile on the BIG-IP system that is acting as the server.


558870-8 : Protected workspace does not work correctly with third party products

Component: Access Policy Manager

Symptoms:
1) Internet Explorer and Firefox cannot be launched in Windows protected workspace if Norton Internet Security 22.x is present on user's machines.
2) Microsoft OneDrive does not work correctly inside protected workspace.

Conditions:
Norton Internet Security 22.x is installed on user's desktop.
Protected workspace is used.

Impact:
User cannot launch Internet Explorer or Firefox inside protected workspace.
Files cannot be synced to OneDrive.

Workaround:
There is no workaround.


558631-7 : APM Network Access VPN feature may leak memory

Component: Access Policy Manager

Symptoms:
VPN connections may cause memory usage to increase with the memory never being reclaimed.

Conditions:
The APM Network Access feature is configured and VPN connections are being established.

Impact:
Slow memory leak over time with eventual out-of-memory condition, performance degradation, and traffic outage.

Workaround:
No workaround short of not using the APM Network Access feature.


557155 : BIG-IP Virtual Edition becomes completely unresponsive under very heavy load.

Component: TMOS

Symptoms:
BIG-IP Virtual Edition becomes completely unresponsive under very heavy load.

Conditions:
Sustained high packet rate with a very small payload.

Impact:
Traffic through the guest stops until the guest/BIG-IP system is reset. However, this issue is reproduced during a test that over provision a 2-vCPU guest and is unlikely to happen in normal operation.

Workaround:
Try ones of the following workarounds (first on is the most preferred and so ):
1. Increase guest memory.
2. Significantly reduce the value of the content in '/sys/module/unic/rx_queue_size'. For example running the following command substantially decreases throughput: echo 1048576 > /sys/module/unic/rx_queue_size.
3. Set panic on OOM. Try this as the last option.
   sysctl vm.panic_on_oom=1


554977 : TMM might crash on failed SSL handshake

Component: Local Traffic Manager

Symptoms:
SSL handshake failures may crash in ssl_verify().

Conditions:
Certain types of failed SSL handshakes in versions 11.5.0 through 11.5.4.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Modifying serverssl cipher string to exclude ECDHE_RSA and ECDHE_ECDSA might help prevent the crash.


554761-7 : Unexpected handling of TCP timestamps under syncookie protection.

Component: Local Traffic Manager

Symptoms:
The BIG-IP system experiences intermittent packet drops.

Despite being negotiated during TCP handshake, the BIG-IP system fails to present timestamp option in subsequent segments.

The BIG-IP system calculates invalid round trip time immediately after handshake, which might result in delayed retransmissions.

Conditions:
This occurs when the following conditions are met:
- Virtual server configured with a TCP profile with timestamps enabled.

- The syncookie mode has been activated.

- Clients that support timestamps.

Impact:
Connection might be reset by remote TCP stack (e.g., NetBSD and FreeBSD), which requires timestamps to be maintained once negotiated.

Retransmission timeout (RTO) value may be skewed. Segments that are subject to RTO might take up to 64 segments to retransmit.

Workaround:
Choose or create a TCP profile that has timestamps disabled.


554340 : IPsec tunnels fail when connection.vlankeyed db variable is disabled

Component: TMOS

Symptoms:
When connection.vlankeyed db variable is disabled, if the data traffic coming out of IKEv1 tunnels that needs to be secured using IKEv2 tunnels lands on tmm's other than tmm0, it will be dropped. The system establishes the IKEv2 tunnel but the data traffic will not be secured.

Conditions:
This issue is seen when the interesting data traffic lands on tmm's other than tmm0. The reason for this issue is due to incorrectly creating a flow on another TMM that is the owner of the outbound SA (IKEv2 tunnel).

Impact:
The system drops the data traffic to be secured using IPsec and connections fail.

Workaround:
Disable the cmp in the virtual server configuration.


554228-6 : OneConnect does not work when WEBSSO is enabled/configured.

Component: Access Policy Manager

Symptoms:
OneConnect is a feature that reuses server-side connections. When WEBSSO is enabled, it always creates a new server-side connection, and doesn't reuse pooled connections.

Conditions:
WEBSSO and OneConnect.

Impact:
Idle serverside connections that should be eligible for reuse by the virtual server are not used. This might lead to build-up of idle serverside connections, and may result in unexpected 'Inet port exhaustion' errors.

Workaround:
None.


553795-1 : Differing certificate/key after successful config-sync

Component: TMOS

Symptoms:
1) If you change a client-ssl profile to a different certificate/key, delete the original certificate/key, create a new certificate/key with the same name as the original one, associate the new certificate/key with the original client-ssl profile, then do a config-sync, the peer system(s)' FIPS chip will retain a copy of the original key.

2) If you change a client-ssl profile to a different certificate/key, delete the original certificate/key, create a new certificate/key with a different name from the original one, associate the new certificate/key with the original client-ssl profile, then do a config-sync, the peer's client-ssl profile will still use the original certificate/key instead of the new one.

Conditions:
1) High Availability failover systems with FIPS configured with Manual Sync.

2) High Availability failover systems configured with Manual Sync.

Impact:
1) An abandoned FIPS key is left behind.

2) The systems claim to be synced, but one system's client-ssl profile uses one certificate/key pair, while the other system(s)' same client-ssl profile uses a different certificate/key pair.

Workaround:
1) Workaround #1: Run an extra config-sync before the second change of the client-ssl profile.
   Workaround #2: Delete the FIPS key by-handle on the peer system(s).

2) Workaround #1: Run an extra config-sync before the second change of the client-ssl profile.
   Workaround #2: Manually update the client-ssl profile then delete the old certificate/key on the peer system(s).


553330-5 : Unable to create a new document with SharePoint 2010

Component: Access Policy Manager

Symptoms:
VPN users are unable to create a new document with SharePoint 2010

An error is given: "The Internet address https://ip:port/shared documents/forms/template.dotx" is not valid

Conditions:
Create a new document using the"New Document button".

Impact:
User cannot create a new document with SharePoint 2010.

Workaround:
none


552585-1 : AAA pool member creation sets the port to 0.

Component: TMOS

Symptoms:
When the AAA server pool member is created (for Radius mode BOTH and for AD), the port is set to 0 (Any) as there are more than one ports for that pool member.

Conditions:
Create AAA pool member while creating an AAA RADIUS server or Active Directory server. The created pool member does not support the ability of having multiple port numbers and for that reason is updated with 0 (Any) as the port number for the pool member. If the user continues to modify using the Admin UI, the port changes made using tmsh will be overwritten again to 0.

Impact:
AAA pool member port is set to 0 (Any) rather than the port specified in the GUI. This is correct as the pool member does not support more and 1 port number.


552385-1 : Virtual servers using an SSL profile and two UDP profiles may not be accepted

Component: Local Traffic Manager

Symptoms:
Error message:
01070711:3: Found disallowed profile: Not Profile profile_clientssl
or
01070711:3: Found disallowed profile: Not Profile profile_serverssl

Conditions:
Create a virtual server with a client-ssl profile and/or a server-ssl profile and two different UDP profiles (one on the server side and one on the client side).

Impact:
When using either a client-ssl profile or a server-ssl profile, depending on the sort order of the UDP profiles, the configuration may not be accepted.

When using both a client-ssl profile and a server-ssl profile, the configuration is not accepted.

Workaround:
When using either a client-ssl profile or a server-ssl profile, either use a common UDP profile for both client and server side or try renaming one of the UDP profiles to alter the sort order.

When using both a client-ssl profile and a server-ssl profile, try using one UDP profile for both the client and server side.


552151-3 : Continuous error report in /dev/log/ltm: Device error: n3-compress0 Nitrox 3, Hang Detected

Component: Local Traffic Manager

Symptoms:
Hardware compression slowly and progressively fails to handle compression operations. The system posts the following errors in ltm.log: crit tmm3[14130]: 01010025:2: Device error: n3-compress0 Nitrox 3.

Conditions:
This occurs when the system encounters errors during hardware compression handling. This occurs on the BIG-IP 5000-, 7000-, 10000-, and 12000-series platforms, and on VIPRION B22xx blades.

Impact:
Compression is (eventually) performed by software. This can result in high CPU utilization.

Workaround:
Disable compression if CPU usage is too high.


551927-5 : ePVA snoop header's transform vlan should be set properly under asymmetric routing condition

Component: TMOS

Symptoms:
On ePVA capable platform with fastl4 profile and asymetric routing on client side, ltm sends packets to the client with wrong vlan/correct mac address (or correct vlan and wrong mac-address) and undecremented ttl.

Conditions:
fastl4 profile and asymetric routing on client side

Impact:
Return traffic could use the wrong vlan

Workaround:
none


551010-4 : Crash on unexpected WAM storage queue state

Component: WebAccelerator

Symptoms:
In rare circumstances WAM may enter an unexpected queue state and crash.

Conditions:
WAM configured on virtual with request queuing enabled

Impact:
Crash

Workaround:
none


550926-4 : AFM rule with "unknown" source Geo-entity stops functioning when another entity (geolocation or otherwise) is added to the same list of addresses in the rule

Component: Advanced Firewall Manager

Symptoms:
When an AFM rule is configured to "unknown" geographic location, the rule stops functioning when another entity (geolocation or IP address) is added to the same list of addresses in the rule.

Conditions:
Configure an address list of AFM rule with "unknown" source Geo-entity and at least one other entity (geolocation or IP address).

Impact:
Confusing, inconsistent, and apparently broken behavior.

Workaround:
Do not configure "unknown" geographic locations as one of the entities in an address list. Known geographic locations work correctly.


550434-3 : Diameter connection may stall if server closes connection before CER/CEA handshake completes

Component: Service Provider

Symptoms:
Serverside connection stalls. Connection is not torn down and packets are not forwarded to serverside.

Conditions:
Selected pool member closes (via FIN) connection before sending CEA as part of Diameter handshake.

Impact:
Connection stalls until handshake timeout and then it is reset.

Workaround:
none


549971-2 : Some changes to virtual servers' profile lists may cause secondary blades to restart

Component: TMOS

Symptoms:
If a virtual server's ip-protocol is not set, then some changes to the list of attached profiles may cause a validation error on secondary blades. This will cause those blades to restart.

Conditions:
This may happen in some cases when changing the list of profiles attached to a virtual server, but does not happen if 'ip-protocol' was explicitly set by the user.

Impact:
mcpd will restart on secondary blades. This will cause most other daemons on those blades to restart as well, including the TMM. Traffic will be lost.

Workaround:
You should explicitly set the ip-protocol when changing the profiles of a virtual server. Then this bug will not occur.


547942-4 : SNMP ipAdEntAddr indicates floating vlan IP rather than local IP

Component: TMOS

Symptoms:
An SNMP query response for ipAdEntAddr would sometimes return floating IPs rather than local IPs. This was due to the supporting software returning the first found IP address for a given vlan.

Conditions:
Problem started after upgrading to v11.5.1 Eng-HF7, from v10.2.4.

Impact:
No impact to Big-IP services, but the returned information to the SNMP query is sometimes incorrect.

Workaround:
None.


547532-4 : Monitor instances in a partition that uses a non-default route domain can fail validation on secondary blades

Component: TMOS

Symptoms:
Error messages similar to this are present in the ltm log:

-- err mcpd[9369]: 01020036:3: The requested monitor instance (/part10/test_mon 90.90.90.90%10 443 ltm-pool-member) was not found.
-- err mcpd[9369]: 01070734:3: Configuration error: Configuration from primary failed validation: 01020036:3: The requested monitor instance (/part10/test_mon 90.90.90.90%10 443 ltm-pool-member) was not found.

Conditions:
A chassis-based system with multiple blades. A monitor is attached to an object that is configured in a partition that uses a non-default route domain, but the address of the monitor is explicitly using the default route domain (e.g. %0).

Impact:
Monitor instances in a partition that uses a non-default route domain can fail validation on secondary blades. mcpd restarts.

Workaround:
Move the monitor to the /Common/ partition and do not specify %0 in the Alias Address.


545214-1 : OSPF distance command does not persist across restarts.

Component: TMOS

Symptoms:
When ospfd is restarted, the value configured for the OSPF distance command is lost.

Conditions:
The distance command is configured in OSPF and the ospfd process is restarted.

Impact:
The distance command does not function as configured, which affects OSPF behavior.

Workaround:
None.


544992-1 : Virtual server profile changes are ignored if it has /Common/remotedesktop and /Common/vdi assigned (Citrix/Vmware View iApp)

Component: Access Policy Manager

Symptoms:
Changes to the profiles that are assigned to a virtual server are ignored if the /Common/remotedesktop and /Common/vdi profiles are already assigned to it. Some iApps that F5 provides to create Citrix or VMware View configurations assign those profiles to a virtual server.

Conditions:
/Common/remotedesktop and /Common/vdi profiles are assigned to a virtual server.

Impact:
Changes to the profiles assigned to a virtual server (adding a new new profile, deleting a profile, changing existing profiles) have no effect until either of these occurs: The /Common/vdi profile is removed from the virtual server or tmm is restarted.

Workaround:
Use tmsh to remove /Common/vdi from the profiles for the virtual server.
(There is no option in the GUI that allows you to do this.)


544888-10 : Idle timeout changes to five seconds when using PVA full or Assisted acceleration.

Component: TMOS

Symptoms:
When FastL4 performs hardware acceleration during the TCP handshake, the FastL4 handshake timeout is not updated to match the profile timeout value after the connection is established.

Conditions:
Accelerated, established TCP flows with no traffic for more than five seconds.

Impact:
TCP flows in the established state are dropped if they have more than five seconds of inactivity.

Workaround:
Disable embedded Packet Velocity Acceleration (ePVA) acceleration.


543993-1 : Serverside connections may fail to detach when using the HTTP and OneConnect profiles

Component: Local Traffic Manager

Symptoms:
Serverside connection does not detach when using OneConnect profile

Conditions:
An HTTP/1.1 response without Content-Length header is received in response to an HTTP/1.0 HEAD request

Impact:
HTTP requests on the same connection are not LB'ed across pool members.

Workaround:
Remove OneConnect profile


542860-3 : TMM crashes when IPsec SA are deleted during HA Active to Standby or vice versa event

Component: TMOS

Symptoms:
TMM can crash when IPsec SA's are deleted using TMSH or racoonctl utility during HA Active to Standby or vice versa.

Conditions:
During the HA Active to standby or vice versa event, Use of TMSH or racoonctl utility to delete IPsec SA's can cause TMM crash. This is a race condition and can occur rarely.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


541836 : GUI disconnect when we try to access last hour request report in ASM

Component: Advanced Firewall Manager

Symptoms:
GUI times out when database query takes too long

Conditions:
Database query takes too long.

Impact:
GUI becomes unusable.

Workaround:
Increasing the timeout value for the GUI can reduce the number of disconnections but might have other side effects.


541622-5 : APD/APMD Crashes While Verifying CAPTCHA

Component: Access Policy Manager

Symptoms:
APD (pre v12.0.0) or APMD (v12.0.0) crashes in libcurl function when verifying CAPTCHA

Conditions:
This issue shows up when multiple sessions are being verified for CAPTCHA at SimpleLogonPageAgent.

Impact:
Authentication service will be disrupted until APD/APMD is up again.


537988-2 : Buffer overflow for large session messages

Component: Local Traffic Manager

Symptoms:
System with multiple blades may crash when when configured with functionality that utilizes SessionDB.

Conditions:
On a multi-blade machine, send an MPI message larger than 64K between blades (typically a session message).

Impact:
Core or potential data corruption.

Workaround:
None.


537964-2 : Monitor instances may not get deleted during configuration merge load

Component: Local Traffic Manager

Symptoms:
After performing a configuration merge load (for example, "tmsh load sys config merge ...") that changes an existing pool's monitor, old monitor instances may not get deleted.

This can result in a system generating monitor requests that are no longer part of the configuration. It can also result in the system logging messages such as the following:

err mcpd[8793]: 01070712:3: Caught configuration exception (0), Can't find monitor rule: 42.

Conditions:
Pools with monitors configured must exist. The merge load must replace the pool's monitor.

Impact:
Multiple monitor instances may be active on some pool members. This may result in incorrect monitoring status.

Workaround:
Once a system is affected by this issue, the misbehavior can be resolved by doing the following:

1. Save and re-load the configuration to correct the incorrect information in mcpd:

    tmsh save sys config partitions all && tmsh load sys config partitions all

2. Restart bigd:

    On an appliance:
    bigstart restart bigd

    On a chassis:
    clsh bigstart restart bigd


537227-4 : EdgeClient may crash if special Network Access configuration is used

Component: Access Policy Manager

Symptoms:
EdgeClient crashes during connect or disconnect process. Exact time may differ from time to time.

Conditions:
EdgeClient may crash if Network Access contains configuration which includes:
Full-tunnel
Allow DHCP or Allow Local subnets is used
There is a proxy between client and APM

Impact:
EdgeClient crashes prevent Access Network to work

Workaround:
Remove on of conditions causing crash to happen


535904-5 : BD crashes when attempting to access a closed connection

Component: Application Security Manager

Symptoms:
The Enforcer Application system generates a BD core file to the /shared/core directory.

Conditions:
One or more of these features is turned on - Session tracking, web scraping, ICAP, ASM irules. The client side or the server side pre-maturely closes the connection.
Some load happens on this traffic.

Impact:
The Enforcer Application system may temporarily fail to process traffic.

Workaround:
N/A


535806-5 : Not enough free disk space for live install of BIG-IP 12.0.0 from 11.5.3 VE

Component: TMOS

Symptoms:
Not enough free disk space for live install of 12.0.0.

Conditions:
Initial install of BIG-IP VE GOOD 11.5.3. Upgrade to 12.0.0

Impact:
Unable to install 12.0.0 on 2nd slot.

Workaround:
Grow the virtual disk before installing 12.0.0.


535246-1 : Table values are not correctly cleaned and can occupy entire disk space.

Component: Application Visibility and Reporting

Symptoms:
AVR data in MySQL might grow to fill all disk space.

Conditions:
This might occur when DNS table receives a large number of entries that are not being evicted when they are no longer needed.

Impact:
MySQL stops responding. Site might experience down time due to full disk.

Workaround:
If monitoring disk space and AVR data takes more than 70% of the space, reset AVR data by running the following commands sequentially: -- touch /var/avr/init_avrdb. -- bigstart restart monpd.


534890-1 : When using session tickets, the session id sent might be incorrect

Component: Local Traffic Manager

Symptoms:
Under some circumstances, when SSL session is resumed using session tickets, the BIG-IP system might send an incorrect session id.

Conditions:
Session tickets are enabled.

Impact:
The session id sent might be incorrect

Workaround:
Do not enable session tickets.


534795-2 : Swapping VLAN names in config results in switch daemon core and restart.

Component: Local Traffic Manager

Symptoms:
Changing names of configured VLANs directly in the configuration file and reloading results in a bcm56xxd switch daemon core and restart.

Conditions:
Applies to all switch based platforms, when modifying the VLAN names directly in the configuration file and reloading.

Impact:
Switch daemon drops core, restarts, and reconfigures the switch.

Workaround:
First delete any existing VLANs, and then recreate then with new names.


534343 : Sync of sync-only device group removes global policy

Component: Advanced Firewall Manager

Symptoms:
Sync of sync-only device group removes global firewall policy on device being synced to.

This problem does not manifest on sync-failover groups.

Conditions:
Sync-only device group.

Impact:
Loss of global firewall policy on device being sync'd to.

Workaround:
None


533966-1 : Double loopback nexthop release might cause TMM core.

Component: Local Traffic Manager

Symptoms:
TMM might restart after logging an 'Assertion "nexthop ref valid" failed' message.

Conditions:
Traffic is sent from one tmm to a tunnel in another tmm, but the tunnel does not exist.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


533813-1 : Internal Virtual Server in partition fails to load from saved config

Component: TMOS

Symptoms:
Loading a successfully configured internal Virtual Server from the config fails with the following message:

-- 01070712:3: Values (/part2/0.0.0.0%2) specified for Virtual Server (/part2/ICAP_request): foreign key index (name_FK) do not point at an item that exists in the database.

Conditions:
This occurs when the following conditions are met:
-- You are running a BIG-IP system with no configuration.
-- You have created an external VLAN with an interface.
-- You have created a non-default route domain, and associated it with a newly created VLAN.
-- You have created a virtual server, and configured a pool in a partition other than /Common.
-- You have saved the configuration.

Here is an example of how this might occur. Run the following commands.

- tmsh
- create net vlan external interfaces add { 1.2 }
- create net route-domain 2 vlans add { external }
- create auth partition part2 default-route-domain 2
- cd ../part2
- create ltm pool icap_pool members add { 10.10.10.10:8080 }
- create ltm virtual ICAP_request destination 0.0.0.0:0 mask 0.0.0.0 internal ip-protocol tcp profiles add { tcp } pool icap_pool
- save sys config
- load sys config partitions all verify.

Impact:
The operation creates a virtual server but cannot load it from saved config.

Workaround:
To work around this issue, you can use the Common partition to complete the configuration.


533658-1 : DNS decision logging can trigger TMM crash

Component: Global Traffic Manager

Symptoms:
Applying load balance decision logging to the DNS profile can cause TMM to crash when a query is load balanced to a last resort pool that is unavailable.

Conditions:
-- DNS load balance decision logging is enabled on the DNS profile,
A Wide IP is configured with a last resort pool.
-- The last resort pool is unavailable.
-- A query is load balanced to the last resort pool.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable decision logging for the DNS profile, or discontinue use of the last resort pool feature.


533388-4 : tmm crash with assert "resume on different script"

Component: Local Traffic Manager

Symptoms:
In a rare race condition involving stalled server-side TCP connections on which a RST is received and a asynchronously executing client-side iRule for event CLIENT_CLOSED the tmm can crash with assert "resume on different script".

Conditions:
The conditions under which this assert/crash is triggered are hard to reproduce.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Avoid asynchronously executing CLIENT_CLOSED iRules (e.g. those that use 'after' or 'table' or 'session' commands - this is not an exhaustive list).


532189 : CIDR masks for blacklist classes lacks validation for /0

Component: Advanced Firewall Manager

Symptoms:
IP Intelligence will accept Feed List entries with a CIDR mask of /0, which is all addresses. If an IP Intelligence policy drops traffic for that blacklist category, all traffic will be dropped.

Conditions:
A feedlist entry with a CIDR mask of /0

Impact:
Every address will match the blacklist category, causing all traffic to be blocked.

Workaround:
None


531986-4 : Hourly AWS VE license breaks after reboot with default tmm route/gateway.

Component: TMOS

Symptoms:
In AWS Hourly instances, if a default gateway is added, the hourly license may fail, causing BIG-IP to fail to come up to a running state. Error messages will resemble the following:

Jul 6 19:26:14 ip-10-0-0-104 err mcpd[22186]: 01070734:3: Configuration error: MCPProcessor::check_initialization:
Jul 6 19:26:17 ip-10-0-0-104 err mcpd[22186]: 010717ff:3: [Licensing]: Failure in establishing instance identity.

Conditions:
Hourly instance in AWS with default tmm route added.

Impact:
BIG-IP VE will fail to fully start, rendering the instance unusable.

Workaround:
Temporary removal of default tmm route resolves this problem. The tmm route can be added back once MCPD is in the running state.


530952-2 : MySql query fails with error number 1615 'Prepared statement needs to be re-prepared'

Component: Application Visibility and Reporting

Symptoms:
MySql query fails with error number 1615 'Prepared statement needs to be re-prepared'. Errors in monpd.log similar to the following:

[DB::mysql_query_safe, query failed] Error (error number 1615) executing SQL string ...

Conditions:
This is due to a MySql bug. For information, see 'Prepared-Statement fails when MySQL-Server under load', available here: http://bugs.mysql.com/bug.php?id=42041

Impact:
Monpd loses functionality

Workaround:
Restart monpd.


530903-3 : HA pair in a typical Active/Standby configuration becomes Active/Active after a software upgrade

Component: TMOS

Symptoms:
HA pair should remain in active/standby state after the software upgrade but instead goes into an active/active state.

Conditions:
Occurs in an active/standby HA pair which has a medium size configuration of pools and virtual servers (at least 30 objects total). The standby device is upgraded first and then it is rebooted. After reboot, the HA pair goes into an Active/Active state. Upgrades to 11.5.0 through 11.5.3 as well as to 11.6.0 are impacted.

Impact:
Active/Standby configuration is lost.

Workaround:
Reconfigure the HA pair back to active/standby.


530812-3 : Legacy DAG algorithm reuses high source port numbers frequently

Component: Local Traffic Manager

Symptoms:
A service on a pool member will receive connections frequently with a source port number above 65400, especially when the incoming connections to the Virtual IP listener are generated by test tools that increment their source port numbers sequentially. This could lead to premature SNAT port exhaustion, if SNAT is also being used.

Conditions:
The issue appears to be limited to the legacy DAG algorithm on the VIPRION PB100 and PB200 blades. All supported versions of BIG-IP will exhibit this issue on this hardware when this DAG algorithm is used. The problem is not exhibited when the incoming sessions' source port numbers have a reasonable amount of entropy (as one would normally see with real Internet traffic); however, the use of test tools, or even intentional malicious traffic may cause this issue to be seen.

Impact:
The issue could result in resource contention (such as SNAT pool port exhaustion), or problems with the pool member services distinguishing between sessions. A notable exception: Port reuse before TIME_WAIT expires is specifically NOT an impact of this issue.

Workaround:
To work around SNAT pool port exhaustion, increase the pool size, or change to auto-map. An iRule may be used to help pool member services better distinguish incoming sessions.


530795-2 : In FastL4 TCP virtual servers, ICMP might send wrong SEQ number/ACK number.

Component: Local Traffic Manager

Symptoms:
The BIG-IP system may send ICMP messages that contain an incorrect tcp seq ack number in the embedded msg body.

Conditions:
FastL4 TCP virtual servers. Syncookie mode.

Impact:
The TCP connflow might be aborted if an ICMP message (such as More fragment) is received.

Workaround:
None.


530242 : SPDAG on VIPRION B2250 blades might cause traffic imbalance among TMMs

Component: TMOS

Symptoms:
When SPDAG is turned on VIPRION B2250 blades, the traffic imbalance among TMMs might be observed.

Conditions:
Enable SPDAG on VIPRION B2250 blades.

Impact:
The traffic imbalance can lower the throughput of VIPRION B2250 blades.

Workaround:
Adding or removing B2250 blades might mitigate the imbalance.


529977 : OSPF may not process updates to redistributed routes

Component: TMOS

Symptoms:
When routes redistributed into OSPF are rapidly added and removed, OSPF may not reflect all of the updates in its LSA database.

Conditions:
External routes, such as kernel or static, redistributed into OSPF being rapidly added and removed. This my happen when using Route Health Injection and enabling/disabling a virtual address.

Impact:
The OSPF may have stale or missing LSAs for redistributed routes.

Workaround:
Identify the OSPF process ID for the affected route domain using "ps | grep ospfd" and terminate it using the kill command.

This disrupts dynamic routing using OSPF.


529610-3 : On HA setups ASM session tracking page display an empty list when in fact there are asm entries in session db

Component: Application Security Manager

Symptoms:
When session tracking actions are enabled in ASM policy, an HTTP request may be blocked based on HTTP session or username and illegal traffic that has been sent from this session. The blocked request is reported in the security events log, but there is no option to release the username using the Configuration utility.

Conditions:
High availability (HA) setup, and ASM with Session tracking actions enabled.

Impact:
Usernames and HTTP sessions are blocked by ASM without an option to release them from the Configuration utility.

Workaround:
Stop and start tmm on all devices in the HA group by running the following commands:
-- bigstart stop tmm
-- bigstart start tmm


529524-4 : IPsec IKEv1 connectivity issues

Component: TMOS

Symptoms:
IPsec IKEv1 tunnels do not come up and IKE negotiations is not initiated/ or does not complete.

Conditions:
1. Configure the BIG-IP system with IPsec IKEv1 tunnel.
2. Send traffic to match the selectors, and it fails. Although it may succeed intermittently.

The following chassis scenario might also cause the issue:
1. Configure the VIPRION chassis with IPsec IKEv1 tunnel.
2. Send traffic to match the selectors, and the intended traffic is secured. IPsec IKEv1 tunnels are established.
3. Perform bigstart restart on the secondary blade.
4. Observe Traffic does not pass, and shows IKE negotiation failures.

Impact:
IPsec IKEv1 tunnels do not get established and the intended traffic is not secured. Traffic does not pass, and shows IKE negotiation failures.

Workaround:
There is a workaround for the chassis platform: Perform bigstart restart of tmm on all blades. There is no workaround for non-chassis platforms.


529141-1 : Upgrade from 10.x fails on valid clientssl profile with BIGpipe parsing error

Component: TMOS

Symptoms:
Upgrade from 10.x fails with the error 'emerg load_config_files: '/usr/libexec/bigpipe load' - failed. -- BIGpipe parsing error (/config/bigpipe/bigip.conf Line 67): 012e0020:3: The requested item (myclientssl {) is invalid (profile_arg ` show ` list ` edit ` delete ` stats reset) for 'profile'."

Conditions:
Attempting to upgrade from 10.x to 11.x (prior to 11.5.4 HF2) or 11.6.0 or 11.6.1 with custom Certificate and Key in clientssl profile.

Impact:
Unable to upgrade successfully.

Workaround:
Comment out the following line in bigip.conf: inherit-certkeychain false.


528407-2 : TMM may core with invalid lasthop pool configuration

Component: Local Traffic Manager

Symptoms:
In certain circumstances, TMM may core if the unit is configured with an invalid, non-local lasthop pool,

Conditions:
1) BIG-IP system with VIP and lasthop pool with non-local pool member.
2) Sys db tm.lhpnomemberaction set to 2.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Configure lasthop pool to use local members/addresses.


528295-3 : Virtual ARP ICMP echo settings are flipped on reloading a 10.x configuration on 11.4.x or later.

Component: TMOS

Symptoms:
A 10.x UCS containing LTM virtual servers with ARP set to disable. Loading the 10.x UCS on 11.4.x or later system leads to the ARP and ICMP echo setting value being flipped each time the load occurs.

Conditions:
Reloading a 10.x UCS containing virtual servers on 11.4.x or later system.

Impact:
ARP and ICMP echo setting value being flipped each time the load occurs. Note that the ICMP echo virtual field will be flipped even if ARP is enabled.

Workaround:
Delete the LTM virtual servers on the 11.x/12.x version system prior to re-loading the 10.x UCS.


528031-4 : AVR not reporting the activity of standby systems.

Component: Application Visibility and Reporting

Symptoms:
When working in Active/Standby configurations, the standby system is completely ignored when generating an AVR report. The standby system might have been an active system in the past, so its statistics should also be counted.

Conditions:
Configuration with Active and Standby systems.

Impact:
Some historical activity might not be reported by AVR.

Workaround:
None.


528007-7 : Memory leak in ssl

Component: Local Traffic Manager

Symptoms:
An intermittent memory leak was encountered in SSL

Conditions:
This can occur under certain conditions when using Client SSL profiles

Impact:
The amount of memory leaked is quite small, but over time enough memory would leak that TMM would have to reboot.

Workaround:
none


527742-3 : The inherit-certkeychain field of a clientSSL profile is not synchronized correctly on the standby bigip

Component: Local Traffic Manager

Symptoms:
When creating a clientSSL profile at the active big-ip, its inherit-certkeychain field is true by default, however, it appears to be false on the standby big-ip.

Conditions:
Bigips are deployed as HA pair.

Impact:
A HA pair is supposed to have the same configuration and the same behavior. Mismatching configuration on a HA pair could lead to unexpected mismatching behavior.


526699-3 : TMM might crash if BIG-IP DNS iRule nodes_up references invalid IP/Port.

Component: Global Traffic Manager

Symptoms:
A BIG-IP DNS system configured with an iRule that makes use of the command nodes_up in its ip_address :: port version might lead to a crash.

Conditions:
- BIG-IP DNS iRule processing traffic with nodes_up IP/Port command.
 - IP/Port references an invalid LTM virtual server.
 - Client sends requests to the BIG-IP DNS wide IP.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Specify correct IP/Port in the nodes_up iRule command


526295-1 : BigIP crashes in debug mode when using PEM irule to create session with calling-station-id and called-station-id

Component: Policy Enforcement Manager

Symptoms:
When using PEM irule to create session with calling-station-id and called-station-id, BigIP will crash in debug mode

Conditions:
1. PEM is provisioned.
2. Bigip is running in debug mode
3. PEM iRule is used to create session with calling-station-id and called-station-id

Impact:
Causing the bigip to crash

Workaround:
Creating PEM session with irules that do not have calling-station-id and called-station-id. And add the two attributes using separately using PEM info iRule


525958-5 : TMM may crash if loadbalancing to node's IP in iRule routed towards an unreachable nexthop.

Component: Local Traffic Manager

Symptoms:
In a specific combination of events TMM may core.

Conditions:
This occurs when the following conditions are met:
  - Load balancing a flow to an ip_tuple (e.g., the Tcl 'node' command).
  - That address is not directly connected.
  - The matched route is a gateway pool that contains a pool member that is not reachable.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Ensure correct routing to all destinations with reachable next hops.


525562-3 : Debug TMM Crashes During Initialization

Component: Access Policy Manager

Symptoms:
Debug version of TMM (tmm.debug) generates core file and fails to start up.

Conditions:
This issue happens when running debug version of TMM on a multi-blade chassis/vCMP.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Revert to use default version of TMM (tmm.default)


525429-5 : DTLS renegotiation sequence number compatibility

Component: Access Policy Manager

Symptoms:
OpenSSL library was modified to keep it compatible with RFC 6347 complaint DTLS server renegotiation sequence number implementation.

Conditions:
The old OpenSSL library is not compatible with RFC6347, the new OpenSSL library is modified to be compatible with RFC6347.
The current APM client is compatible with old OpenSSL library, not the new OpenSSL library.

Impact:
The current APM client is not compatible with new OpenSSL libary.


524490-1 : Excessive output for tmsh show running-config

Component: TMOS

Symptoms:
The tmsh show running-config displays many default configuration items. Although the output does display the user-configuration items as expected, it is not expected to include default configuration items in the output.

Conditions:
tmsh show sys running-config.

Impact:
The presence of excessive default configuration items makes the tmsh show running-config output parsing difficult.

Workaround:
None.


524333-1 : iControl command pkcs12_import_from_file_v2 may fail if httpd is restarted or session times out.

Component: TMOS

Symptoms:
When pkcs12_import_from_file_v2 is used immediately after httpd is restarted, or when pkcs12_import_from_file_v2 is used after the session-timeout period, an 'Internal error' response is received.

This issue is not seen if another iControl call is made and pkcs12_import_from_file_v2 is tried after that.

Conditions:
pkcs12_import_from_file_v2 is used immediately after httpd is restarted, or when pkcs12_import_from_file_v2 is used after the session-timeout period.

Impact:
iControl command may fail if httpd is restarted or session times out.

Workaround:
None.


523922-2 : Session entries may timeout prematurely on some TMMs

Component: TMOS

Symptoms:
In certain scenarios, session entries may not be refreshed when the TMM that owns the entry is used to process the connection.

Conditions:
When the TMM owning the session entry is a different one to the TMM handling the connection and the entry is retrieved, for example via irule, "session lookup uie"; the timeout will be extended.

When the TMM owning the entry and the one handling the connection is the same, then the entry may not have its timeout changed and lead to premature removal.

Impact:
Different TMMs may behave differently and cause confusion when using the session table.

Workaround:
None


523527-5 : Upgrade from 10.x to 11.2.0 or later does not add existing routing protocols to RD0.

Component: TMOS

Symptoms:
If you are directly upgrading from version 10.x to version 11.2.0 or later with a working dynamic routing protocols configuration may encounter that the routing protocol is disabled on upgrade to 11.2.0 or later.

Conditions:
- Upgrade from 10.x to 11.2.0 or later.
- Routing protocol enabled in tmrouted dbkeys.
- No route domain 0 (zero) (RD0) configuration, that is defaults of all VLANs in RD0, no comment, leading to no existing configuration in bigip_base.conf

Impact:
Routing protocol information is missing from RD0, ZebOS is not running (although configured).

Workaround:
There are several workarounds to this issue:
  - Causing the RD0 configuration to exist by adding a comment to the 10.x description field and saving prior to upgrade.
  - Re-adding the routing protocol to the RD0 configuration after the upgrade.
  - Perform an intermediate upgrade from 10.x to 11.0.0 or 11.1.0 prior to upgrading to an 11.2.0 or later version.


523434-2 : mcpd on secondary blades will restart with an error message about a sflow_http_virtual_data_source object

Component: TMOS

Symptoms:
mcpd on secondary blades may restart and log an error of the following form: 01070734:3: Configuration error: Configuration from primary failed validation: 01070734:3: Configuration error: DB validation exception, unique constraint violation on table (sflow_http_virtual_data_source) object ID (44). A duplicate value was received for a non-primary key unique index field. DB exception text (Cannot update_indexes/checkpoint DB object, class:sflow_http_virtual_data_source status:13)... failed validation with error 17237812.

Conditions:
The exact conditions under which this occurs are not well understood. The immediately triggering event is a change in the cluster's primary blade.

Impact:
All services on an affected blade restart.

Workaround:
None.


523222-3 : Citrix HTML5 client fails to start from Storefront in integration mode when Access Policy is configured with Redirect ending.

Component: Access Policy Manager

Symptoms:
Citrix HTML5 client fails to start from Storefront in integration mode when Access Policy is configured with Redirect ending.

If an access policy has Redirect ending, the Citrix HTML5 client will fail to start with HTTP 400 error.

Conditions:
Citrix Storefront configured in integration mode through APM.

Impact:
HTML5 client not usable for this sort of integration


522304-3 : Some password policy changes are not reflected in /etc/shadow when synced in a CMI device group

Component: TMOS

Symptoms:
Some password policy settings (maximum and minimum durations, expiration warning) are reflected in /etc/shadow when a user's password is changed. In a CMI device group, changes to password policy are correctly synced, but the settings reflected in /etc/shadow are not.

Conditions:
CMI device group configured; maximum or minimum duration, or expiration warning, settings of password policy are used; user password is changed.

Impact:
Password policy may not be enforced consistently across all devices.

Workaround:
None.


522231-1 : TMM may crash when a client resets a connection

Component: WebAccelerator

Symptoms:
When a client resets a connection while AAM is preparing to serve a response from cache TMM may crash causing failover and restart of AAM. A profile on a virtual from another BIG-IP module (other than AAM and LTM) may contribute to the issue.

Conditions:
1) AAM must be provisioned.
2) A response to the requested URL must be cached and fresh.
3) Client resets a connection immediately after the request is done and the response has not started to serve.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Install the fix.


522024 : Config sync of SecurID config file fails on secondary blades

Component: TMOS

Symptoms:
After uploading a new SecurID config file using the GUI, mcpd restarts and fails to sync the file to the secondary.

Conditions:
If APM is provisioned, and upload a new SecurID config file via the GUI. This can also happen on device group peers.

Impact:
The secondary blade restarts mcpd, which in turn restarts several other daemons. The secondary blade never receives the config file, so if it becomes primary, it does not have the correct configuration.

Workaround:
Use tmsh: tmsh modify apm aaa securid secureid-name config-files modify { sdconf.rec { local-path /path/to/sdconf.rec } }.


521813-2 : Cluster is removed from HA group on restart

Component: Local Traffic Manager

Symptoms:
When the system is rebooted (or "bigstart restart" is executed), any HA groups with clusters in them will have those clusters removed.

Conditions:
Chassis-based system with an ha-group and ha-group-cluster configured. All blades have to reboot, since if a single blade is rebooted it pulls the running-config from the primary slot.

Impact:
HA cluster configuration is missing every time all the blades are rebooted.


521774-1 : Traceroute and ICMP errors may be blocked by AFM policy

Component: Local Traffic Manager

Symptoms:
ICMP error packets for existing connections can be blocked by AFM policy. Diagnostics that use ICMP error messages, such as traceroute, may fail to display information beyond the AFM device.

Conditions:
The AFM policy has a rule to drop or reject that can match the IP header of ICMP messages going from a router IP address back to the client or server IP address that sent the original packet.

Impact:
Network diagnostics such as traceroute through an AFM device will not display information from routers between the AFM device and the destination IP address.

Workaround:
If possible and allowed, create an AFM rule matching the affected ICMP packets with an action of accept-decisively.


521556-5 : Assertion "valid pcb" in TCP4 with ICAP adaptation

Component: Local Traffic Manager

Symptoms:
TMM crashes with assertion "valid pcb" in tcp4.c

Conditions:
Virtual server with request-adapt or response-adapt profile.
Congested client or TCP small window (flow-control is active).
Multiple HTTP requests in a single client connection.
More likely with iRules that park.

Impact:
Intermittent crash under load.


521548-4 : Possible crash in SPDY

Component: Local Traffic Manager

Symptoms:
In very rare circumstances related to SPDY protocol handling together with a compression profile a crash may occur.

Conditions:
This is very rare and the exact circumstances are unclear, It involves SPDY, a compression profile and a congested client connection and a stream being reset by the browser (using a RST_STREAM frame).

Impact:
Very rarely a crash may occur.

Workaround:
Don't apply the compression profile.


521538-1 : Keep-alive transmissions do not resume after failover of flows on an L4 virtual, when the sequence number is known

Component: Local Traffic Manager

Symptoms:
After failover of an L4 flow that is using keep-alive, the keep-alive transmissions do not resume after traffic has flowed through the BIG-IP system.

Conditions:
Using HA mirroring of L4 connections, with keep-alive enabled on the profile for TCP. After a failover, there was traffic before the flow timed out, then the traffic becomes idle. If there is no traffic after failover, the correct sequence numbers are unknown, then this is expected behavior: the flow times out due to inactivity. If there is traffic after failover, the correct TCP sequence numbers are known; if there is traffic after failover, and then the flow becomes idle, keep-alive transmissions should resume.

Impact:
Flows after failover with TCP keep-alive age out and expire even if traffic is available to set the sequence numbers. Depending on the configuration options, subsequent packets may reset or transparently create a new flow (if TCP loose initiation is enabled).

Workaround:
None.


521522-1 : Traceroute through BIG-IP may display destination IP address at BIG-IP hop

Component: Local Traffic Manager

Symptoms:
When performing traceroute through a BIG-IP device, the traceroute utility may display the destination IP in place of the hop where BIG-IP is located, instead of a Self IP address of the BIG-IP device at that hop.

Conditions:
No return route for the client IP address exists on the BIG-IP device.

Impact:
There is no impact to the performance of traffic through the BIG-IP device. The impact occurs only when reading and interpreting the results of a traceroute utility.

Workaround:
If possible and allowed, add route entry for the traceroute client subnet.


521506-5 : Network Access doesn't restore loopback route on multi-homed machine

Component: Access Policy Manager

Symptoms:
Network Access on Windows doesn't restore loopback route for one adapter on multi-homed (Ethernet + Wi-Fi) machine.

Conditions:
This issue happens if:
1. Network Access was established via Ethernet
2. Ethernet cable was unplugged
3. Network Access reconnects using Wi-Fi
4. Ethernet cable is plugged in back

Impact:
Minor routing issues may occur if one special loopback is removed. To restore this route affected adapter should be disabled and enabled.


521455-3 : Images transcoded to WebP format delivered to Edge browser

Component: WebAccelerator

Symptoms:
The Microsoft Edge browser does not support, and cannot render WebP format images. The AAM image optimization framework improperly classifies the Edge browser as being capable of supporting WebP and delivers WebP-transcoded images to such clients.

Conditions:
The AAM system's image optimization as well as the "optimize for client" setting must both be enabled, and the associated acceleration policy and application associated with one or more virtual servers.

Impact:
Some images will fail to render on the Edge browser.

Workaround:
Disable the "optimize for client" attribute in the applicable policies' acceleration assembly settings.


521408-1 : Incorrect configuration in BigTCP Virtual servers can lead to TMM core

Component: Local Traffic Manager

Symptoms:
An incorrect configuration on an irule associated to a BigTCP virtual server can lead to TMM to core.

Conditions:
The following circumstances are needed:
   - BigTCP Virtual server
   - FastL4 profile with syncookies enabled.
   - Invalid iRule that will fail to execute, on LB_FAILED
   - Syncookie currently activated in that moment.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Correct or remove the irule event and coring will no longer occur.


521336 : pkcs11d initialization retry might post misleading error messages and eventually result in a pkcs11d core

Component: Local Traffic Manager

Symptoms:
The retry of pkcs11d initialization might post misleading error messages and eventually result in a pkcs11d core.

Conditions:
When pkcs11d retries to wait for other services such as tmm or mcpd.

Impact:
After the system reboots, the /var/log/ltm shows initialize errors and the /var/log/daemon.log shows pkcs11_initialize messages: -- err pkcs11d[6247]: 01680002:3: Pkcs11 Initialize error (this is misleading; pkcs11d is actually retrying). -- err pkcs11d[6247]: Nethsm: pkcs11_initialize C_GetSlotList error 0x00000000, number of slots 0.

Workaround:
Retry pkcs11d restart when tmm and mcpd are both ready.


521329 : CGNAT - Rare TMM core with Deterministic NAT

Component: Carrier-Grade NAT

Symptoms:
Under some circumstances TMM may core when using deterministic NAT due to a divide by zero error.

Conditions:
CGNAT using deterministic NAT mode and persistence enabled. This error only occurs if a previous connection created an address persistence entry using the second address.

This crash is dependent on both the configuration and the traffic.

When the number of subscriber addresses that disaggregates to a TMM is not evenly divided by the number of translation addresses that disaggregates to the same TMM, connections from one or more subscribers may be assigned to blocks from two translation addresses. Depending on the exact address ratio, there may be only one port using the second address.

Due to an off-by-one error, the number of ports available for the second address may be set to zero when it should be set to one. This causes the divide by zero fault.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


520849 : [PolicySync] Access Profile with "default-log-setting" fails

Component: Access Policy Manager

Symptoms:
Policy Sync failed with profile configured with "default-log-setting"

Conditions:
Config "default-log-setting" for profile then do a policy sync

Impact:
Policy Sync fails.

Workaround:
"default-log-setting" is actually not supposed to be configured for APM profile, it's supposed to be used by SWG. Just do not config it.


520604-3 : Route domain creation may fail if simultaneously creating and modifying a route domain

Component: Local Traffic Manager

Symptoms:
Failure trying to create and modify a route domain in a single operation.

Conditions:
Performing create and modify operations in the same transactions, as can be done using tmsh and iControl.

Impact:
Transaction fails. Even though an ID is passed in with the create method, the system posts an error similar to the following: 01070734:3: Configuration error: route-domain Name /Common/test_rd_200 is non-numeric, so an ID must be specified.

Workaround:
Perform create and modify operations in different transactions.


520380-2 : save-on-auto-sync can spawn multiple invocations of tmsh, starving system of memory

Component: TMOS

Symptoms:
Unit demonstrates behaviors consistent with out-of-memory condition. 'top' and 'ps' may show multiple tmsh processes waiting to run.

Conditions:
Enable auto-sync and save-on-auto-sync.

Impact:
Low memory condition may result in system instability.

Workaround:
None.


520145-1 : [Policy Sync] OutOfMemoryError exception when syncing big and complex APM policy

Component: Access Policy Manager

Symptoms:
Policy sync fails with out-of-memory error on target device with big and complex policy.

Conditions:
Profile of big size, for example, excessive use of ACL resource.

Impact:
Policy Sync fails.


520105-1 : Possible segfault during hardware accelerated compression.

Component: Local Traffic Manager

Symptoms:
Segfault and core-dump of tmm when using gzip, deflate, or zlib hardware accelerated compression compress or decompress operations.

Conditions:
Requests for compression on the hardware accelerator might cause a segfault.

Impact:
Tmm restarts when the issue is encountered.

Workaround:
Disable hardware accelerated compression.


519415-2 : apm network access tunnel ephemeral listeners ignore irules (related-rules from main virtual )

Component: Access Policy Manager

Symptoms:
If you want to change timeout values for server-side initiated flows inside Network Access tunnels, ephemeral listeners ignore irules.
There seems to be a workaround for this through tmsh (not ui) by attaching iRules (related-rules) to main virtual that gets run on ephemeral listeners. (These ephemeral listeners are created by Network Access tunnels for lease-pool IPs.) The command for this is (for example):
 tmsh modify ltm virtual vs_dtls related-rules { idle_time }

The problem here was APM Network Access used to ignore the related-rules on main virtual and the rules weren't triggered.

Conditions:
APM Network access use case.

Impact:
Related rules on main virtual are not applied to ephmeral listeners; (these ephemeral listeners are created by Network Access tunnels for lease-pool IPs).

Workaround:
none.


519394-4 : Sync when licensed for ASM/AFM fails to sync pool with "Load balancing feature not licensed" error

Component: TMOS

Symptoms:
When adding a single pool member to a pool associated to a virtual server, the sync fails with error message 'Load balancing feature not licensed.' from peer.

Conditions:
ASM/AFM licensed, a pool assigned to a virtual server, a single pool member is added.

Impact:
Sync fails.

Workaround:
Perform a sync between the creation of the pool and the pool members.


519198-1 : [Policy Sync] UI General Exception Error when sync a policy in non-default partition as non-default admin user

Component: Access Policy Manager

Symptoms:
Failed to sync a policy in non-Common partition as a non-default admin user.

Conditions:
Log in as different admin user than the default "admin".
Sync a policy that was created in a non-Common partition..

Impact:
Policy Sync fails

Workaround:
Log in as default "admin" user.


519059-1 : [PA] - Failing to properly patch webapp link, link not working

Component: Access Policy Manager

Symptoms:
Any attribute URL in a HTML content is rewritten as "javascript:location=..." if is <base> tag is situated before the tag with the attribute, a content hint is not set in the HTML rules for the attribute and it's not the cookieless mode.

Conditions:
Webapp link is not properly patched.

Impact:
Rewritten links are not accessible.


518583-4 : Network Access on disconnect restores redundant default route after looped network roaming for Windows clients

Component: Access Policy Manager

Symptoms:
Windows Network Access restores redundant default route if client roaming from networks in loop e.g.:
NetworkA -> NetworkB -> NetworkA.

Conditions:
* Connect NIC to NetworkA
* Connect to VPN
* Roam to another wifi network SSID (NetworkB)
* Roam back to the original wifi SSID in step #1 (NetworkA)

Impact:
Incorrect default route may cause routing issues on client machine if metric of interfaces connected to NetworkB is lower than metric of interfaces connected to NetworkA

Workaround:
N/A


518086 : Safenet HSM Traffic failure after system reboot/switchover

Component: Local Traffic Manager

Symptoms:
SafeNet hardware security module (HSM) Traffic failure after system reboot/switchover.

Conditions:
Restart of services on primary or secondary blade.

Impact:
Now traffic will fail. There will be no pkcs11 connection on new primary blade.

Workaround:
The workaround is to restart pkcs11d on the secondary blade.


517790-5 : When non-HTTP traffic causes the server-side to receive unexpected data, the connection will be dropped

Component: Local Traffic Manager

Symptoms:
Non-HTTP traffic can have the server-side send data outside the usual request-response pairing. (Either before a request, or extra data after a response is complete.)

If so, HTTP will reject the connection as the server state is now unknown. However, if HTTP is acting as a Transparent proxy, switching to pass-through mode and disabling HTTP may be a better course of action.

Conditions:
Non-HTTP data sent to the server-side not belonging to a response.

Impact:
Banner protocols, where the a server will respond before seeing any data will not pass through the Transparent HTTP proxy.

Non-HTTP protocols that start with a pseudo-HTTP response, followed by extra data will reject the connection when the extra data is seen.

Workaround:
It may be possible to use HTTP::disable to disable the HTTP filter when some signature of the non-HTTP protocol is seen.


517580-1 : OPT-0015 on 10000-series appliance may cause bcm56xxd restarts

Component: TMOS

Symptoms:
Changing configuration (enable/disable/auto-negotiation) on copper SFPs on 10000-series appliance might cause an internal bus to hang. Symptoms are bcm56xxd process restarts, and the interfaces may show as unknown.

Conditions:
Only copper SFPs OPT-0015 on 10000-series appliances exhibit this problem.

Impact:
The bcm56xxd process restarts, and the interfaces may show as unknown.

Workaround:
To work around this issue, follow these steps:
1) Force the system offline.
2) Reboot the system.
3) Release the system's offline status.


517551-3 : Assembly Can Create Response Stalls

Component: WebAccelerator

Symptoms:
In some rare cases, if a document is 'assembled', it can stall, giving little or no response to the client.

Conditions:
This might occur when the original document is smaller than the small object cache size limit, but grows to be larger than the small object cache size limit during assembly. In rare cases, this can cause the document to be unservable.

Impact:
Requests for that document results in client timeouts.

Workaround:
Create a policy node for that specific document, and set to 'proxy always.'


517441-3 : apd may crash when RADIUS accounting message is greater than 2K

Component: Access Policy Manager

Symptoms:
If the RADIUS Acct agent is configured for an access policy, and there are a lot of attributes with total size greater than 2K, apd may crash.

Conditions:
RADIUS Acct agent is configured and an AP
with numerous attributes in RADIUS Acct request

Impact:
service becomes unavailable while restarting apd process


517209-1 : tmsh save sys config file /var/tmp or /shared/tmp can make some BIG-IP functionality unusable

Component: TMOS

Symptoms:
The tmsh save sys config file /var/tmp or /shared/tmp or a relative path to these directories (for example, /config/../shared/tmp) saves the scf with the specified real path. However, since the /var/tmp directory is used internally by BIG-IP daemons, some functionality may be rendered unusable till the /var/tmp symlink to /shared/tmp is restored.

Conditions:
Saving the sys config file /var/tmp or /shared/tmp (or a relative patch to one of these directories).

Impact:
Some system functionality may be rendered unusable.

Workaround:
Use the following commands to delete the scf and restore the symlink: -- rm -f /var/tmp. -- ln -s /shared/tmp /var/. -- bigstart restart.


517124-1 : HTTP::retry incorrectly converts its input

Component: Local Traffic Manager

Symptoms:
The HTTP::retry iRule converts its input into UTF8. If the input is a bytearray using some other locale, then bytes with the high-bit set may be corrupted.

The resulting corrupted request will then be sent to the server as the retried request.

Conditions:
The input to HTTP::retry is a TCL bytearray rather than a TCL string. The output from some commands i.e. HTTP::payload is a bytearray. Strings are in the UTF8 format, Bytearrays are not.

Impact:
Non-ascii characters may be corrupted when HTTP::retry is used.


516598-2 : Multiple TCP keepalive timers for same Fast L4 flow

Component: Local Traffic Manager

Symptoms:
Multiple TCP keepalive timers for same Fast L4 flow.

Conditions:
Fast L4 profile with TCP Keepalive option enabled.

Impact:
TMM core.

Workaround:
Disable TCP Keepalive option from the Fast L4 profile.


516462-6 : Gateways for excluded address space routes are not adjusted correctly during roaming between networks on Windows machines

Component: Access Policy Manager

Symptoms:
Gateways for excluded address space routes are not adjusted correctly during roaming between networks on Windows machines.

Conditions:
Client Windows machine roams between different networks (Wi-Fi or Ethernet) when the BIG-IP system has configured split-tunneling.

Impact:
Excluded address space routes are not applied.


516280 : bigd process uses a large percentage of CPU

Component: Local Traffic Manager

Symptoms:
With a very large number of monitors, the bigd process can consume more than 80% CPU when a slow HTTP server returns an error.

Conditions:
~8000 HTTP/HTTPS monitors, and a slow HTTP server returns a 500 error.

Impact:
bigd process uses a large percentage of CPU.

Workaround:
None.


516075-2 : Linux command line client fails with on-demand cert

Component: Access Policy Manager

Symptoms:
Linux command line client fails with On-Demand Cert Auth.

Conditions:
End user needs to be running Linux command line client and the On-Demand Cert Auth agent.

Impact:
Depending upon the access policy, the user might fail to log in and establish a Network Access connection.

Workaround:
none


516057-2 : Assertion 'valid proxy' can occur after a configuration change with active IVS flows.

Component: Service Provider

Symptoms:
When a configuration update or sync takes place while there are active connections on an affected internal virtual server (IVS), and a new connection is initiated during the update, the TMM can assert 'valid proxy' and crash.

If there were are no preexisting active connections, the assertion does not occur, but connections initiated during the configuration update might be in a bad state and cause unpredictable effects.

Conditions:
1. Active flows exist on an internal virtual server (IVS). Necessary to trigger the assertion.
2. A configuration update or sync affecting that IVS is in
progress.
3. A new connection is initiated to that IVS during the update.

Impact:
This is intermittent and rarely encountered. When all preexisting connection flows on this IVS tear down, a 'valid proxy' assertion can trigger and cause a TMM crash and restart, resulting in lost connections across the BIG-IP system or blade. New IVS connection flows initiated during the configuration update might be in a bad state and exhibit unpredictable effects, even if there is no crash.

Workaround:
Try to avoid configuration changes affecting any IVS while connections are active. This is intermittent so most likely will not manifest, even with active connections.


515797-5 : Using qos_score command in RULE_INIT event causes TMM crash

Component: Global Traffic Manager

Symptoms:
TMM crashes when the iRule with qos_score command in RULE_INIT event is added to a wide IP.

Conditions:
Configured iRule with qos_score command in RULE_INIT event that is added to a wide IP.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Mitigation: Do not use qos_score command in RULE_INIT event.


515759-7 : Configuration objects with more than four vlans in vlan list may cause memory utilization to increase over time

Component: Local Traffic Manager

Symptoms:
tmm memory growth over time.

Conditions:
Conditions leading to this issue include: one or more virtual servers, NATs, SNATs, or LSNs with more than four VLANS in a vlan allow or vlan deny list.

Impact:
tmm memory usage can grow over time eventually causing memory exhaustion.

Workaround:
Mitigation: Minimize the number of VLANs in the VLAN list for virtual servers, NATs, SNATs and LSNs. Minimize the number of configurations changes to Self-IPs, virtual servers, NATs, SNATs and LSNs.


515728-3 : Repeated BD cores.

Component: Application Security Manager

Symptoms:
The bd process crashes and produces a core file in the /var/core directory.

Conditions:
It is not known what conditions trigger the crash.

Impact:
Traffic disrupted while bd restarts.


515646-2 : TMM core when multiple PPTP calls from the same client

Component: Carrier-Grade NAT

Symptoms:
TMM can core when there are multiple PPTP calls arrive from the same client.

Conditions:
PPTP ALG VS with CGNAT.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


515482-2 : Multiple teardown conditions can cause crash

Component: Local Traffic Manager

Symptoms:
When iRules direct the teardown of a TCP connection after some delay, another event might tear down the connection during the delay. When the iRule-directed abort finally arrives, the system crashes.

Conditions:
(1) An iRule or other cross-layer message can trigger a ABORT after teardown.

(2) The TCP profile has settings that invoke the correct TCP implementation:
(a) 11.5.x: mptcp is enabled
(b) 11.6.x: mptcp, rate-pace, or tail-loss-probe are enabled, OR TCP uses Vegas, Illinois, Woodside, CHD, CDG, Cubic, or Westwood congestion control.

Impact:
TMM crashes.

Workaround:
Suspend iRules with this behavior.


515187-4 : Certain ICMP packets are evaluated twice against Global and Route Domain ACL rules.

Component: Advanced Firewall Manager

Symptoms:
Certain ICMP packets (such as ICMPv6 Destination Unreachable) match twice against Global and Route-Domain ACL rules.

Conditions:
AFM provisioned and licensed.

Create a Global and/or Route Domain ACL policy with a rule matching ICMP traffic. Send ICMP packet such as Destination Unreachable.

Impact:
Global and Route-Domain ACL rules are evaluated twice under conditions specified above. This causes the rule counters to be incremented by 2 (instead of 1) and may cause double logging if enabled.

Workaround:
None


515139-2 : Active FTP session with inherit profile and address translation disabled may not decrement pool member current connections statistics

Component: Local Traffic Manager

Symptoms:
Current connections seen in the poolmember statistics via tmsh might show a non-decremented number over time.

Conditions:
This occurs when the following conditions are met: - FTP virtual server with address translate disabled. - FTP profile with inherit parent profile. - Active FTP session. Running the command: tmsh show ltm pool pool_name.

Impact:
The current connections statistics value does not decrement upon data connection closure. While this is primarily cosmetic, it might impact connections when used in combination with limit calculations.

Workaround:
Disable inherit parent profile in the FTP profile.


515112-3 : Delayed ehash initialization causes crash when memory is fragmented.

Component: Advanced Firewall Manager

Symptoms:
When first using a new feature (fpm, firewall) under memory fragmentation conditions, if the feature uses an ehash table, TMM may crash.

Conditions:
Severe memory fragmentation, where contiguous allocations are not satisfied, combined with initial use of a new feature.

Impact:
TMM crashes.

Workaround:
Utilize all features shortly after TMM comes up, so all initial allocations are performed.


515072-8 : Virtual servers with priority groups reset incoming connections when a non-zero connection limit is increased

Component: Local Traffic Manager

Symptoms:
When a virtual server has priority groups and connection limit configured, if the connection limit is reached and is increased while the member is limited, then subsequent connections will be reset rather than allowed.

Conditions:
Using priority groups and a non-zero connection limit, with one of the following load balancing methods: least-connections-member, least-sessions, ratio-member, ratio-least-connections-member, ratio-session. The issue occurs when the connection limit is adjusted higher when the connection limit is reached on the high-priority pool.

Impact:
New connections are reset without being able to send traffic.

Workaround:
If it is feasible to adjust the priorities, adjust the connection limit to its initial value, and adjust the priority groups so that the traffic currently on the limited pool drains out. When the pool has no connections, increase the limit to restore the correct priorities.


514975 : Reset packet after connflow idle timout contains seq number 0 in nPath mode.

Component: Local Traffic Manager

Symptoms:
When a reset is triggered after the connflow idle timeout expiry, the packet contains the sequence number 0 to the client side. Due to this, client rejects it as an invalid packet.

Conditions:
Fast L4 profile with loose init and loose close enabled for nPath mode.

Impact:
The client connection is left idle.

Workaround:
None.


514912-1 : Portal Access scripts had not been inserted into HTML page in some cases

Component: Access Policy Manager

Symptoms:
If HTML page contains forms with absolute action paths, Portal Access scripts must be inserted into this page. But if there are no other reasons to include them, these scripts were not included.

Conditions:
HTML page which consists of the form with absolute action path, for instance:

<form action='/cgi-bin/a.gci">
</form>

Impact:
The form can not be submitted because browser fires JavaScript error.

Workaround:
It is possible to use iRule to insert Portal Access scripts into rewritten HTML page.


514726-3 : Server-side DSR tunnel flow never expires

Component: TMOS

Symptoms:
TMM cores and memory exhaustion using Direct Server Return (DSR). DSR establishes a one-way tunnel between the BIG-IP system and the back-end servers using the clients' IP addresses as the tunnel local-address on the BIG-IP system. These flows never expire.

Conditions:
BIG-IP virtual servers using DSR tunnels to send client traffic to the server.

Impact:
Server-side DSR tunnel flow never expires. Because the DSR tunnels use client's IP address as the tunnel local-address and the server's IP address as the tunnel remote-address, a single DSR setup might introduce as many tunnels as the clients' requests. When these tunnels do not expire, the BIG-IP system memory resource might be used up eventually, causing TMM cores.

Workaround:
None.


514604-4 : Nexthop object can be freed while still referenced by another structure

Component: Local Traffic Manager

Symptoms:
Use after free of the Nexthop object may cause memory corruption or tmm core.

Conditions:
This can happen if the proxy connection takes some time to complete, creating a large enough time window where the nexthop object might be freed.

Impact:
The BIG-IP system might crash. This is a very timing/memory-usage dependent issue that is rarely encountered.

Workaround:
None.


514450-1 : VXLAN: Remote MAC address movement does not trigger ARL updates across TMMs.

Component: TMOS

Symptoms:
In a VXLAN tunnel, a remote MAC address movement from one endpoint to another does not trigger ARL updates across all TMMs. As a result, some TMMs may contain stale ARL entries which can impact traffic forwarding. Also, when using 'tmsh show net fdb tunnel', there is a duplicated MAC address associated with different endpoints in the same tunnel.

Conditions:
When a remote MAC address is moved from one endpoint to another. For example, when a BIG-IP system in an HA setup configured with a masquerading MAC address changes its state from 'standby' to 'active'.

Impact:
This issue could impact traffic forwarding in VXLAN tunnels.

Workaround:
Although there is no complete workaround, you can mitigate the situation by making sure that the network is properly configured so that every device uses a unique MAC address. For example, in a network with an HA setup, try not to use masquerading MAC addresses.


514419-3 : TMM core when viewing connection table

Component: Local Traffic Manager

Symptoms:
In very rare conditions tmm may core on viewing the connection table.

Conditions:
This occurs only when a configuration meets all of the following conditions: - A NAT. - An AFM reject rule for ICMP. The user views the connection table on the system.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Do not view the connection table when this configuration combination exists.


514220-3 : New iOS-based VPN client may fail to create IPv6 VPN tunnels

Component: Access Policy Manager

Symptoms:
Newer iOS-based VPN client does not provide MAC address during IPCP negotiation. This prevents the IPv6 VPN tunnel from getting established.

Conditions:
It affects only iOS-based IPv6 VPN connection requests.

Impact:
This impacts only IPv6 VPN tunnel requests from iOS-based devices.

Workaround:
None.


514108-4 : TSO packet initialization failure due to out-of-memory condition.

Component: Local Traffic Manager

Symptoms:
TCP Segmentation Offload (TSO) packet initialization failure due to out-of-memory condition with the message: packet is locked by a driver.

Conditions:
This is related to tmm running out of memory while configured with TSO, on BIG-IP or VIPRION platforms which implement the HSB (High Speed Bridge) device in hardware.

This problem may occur on all currently-supported BIG-IP or VIPRION platforms EXCEPT the following:
BIG-IP 2000-/4000-series appliances.
BIG-IP 1600, 3600 appliances.

Impact:
TMM posts the assert message: packet is locked by a driver, then crashes.

Workaround:
Disable TSO (for more information, see SOL15609: Overview of TCP Segmentation Offload, available here: https://support.f5.com/kb/en-us/solutions/public/15000/600/sol15609.html):

To enable or disable TSO functionality, you can use the following command syntax:

tmsh modify sys db tm.tcpsegmentationoffload value <enable | disable>

Note: After modifying the tm.tcpsegmentationoffload database variable, you must restart the TMM daemon by running the bigstart restart tmm command. Restarting TMM temporarily interrupts traffic processing. F5 recommends running this command only during a maintenance window.


514061-2 : False positive scenario causes SMTP transactions to hang and eventually reset.

Component: Application Security Manager

Symptoms:
Upon specific SMTP traffic, connection hangs and eventually resets.

Conditions:
SMTP profile with 'protocol security' turned on is attached to the virtual server, and the response is processed in bulk.

Impact:
Connection hangs and eventually resets.

Workaround:
None.


513969-5 : UAC prompt is shown for machine cert check for non-limited users, even if machine cert check service is running

Component: Access Policy Manager

Symptoms:
UAC prompt is shown for machine cert check for non-limited users, even if Machine Cert Check service is running on client Windows machine.

Conditions:
Current user is non-limited.
Machine Cert Check service is running.
User tries to pass Access Policy.

Impact:
Non-limited user has to press 'ok' in UAC window.


513953-5 : RADIUS Auth/Acct might fail if server response size is more than 2K

Component: Access Policy Manager

Symptoms:
RADIUS authentication or accounting fails when a response from the backend server is bigger than 2048 bytes

Conditions:
Response from backend server is bigger than 2048 bytes

Impact:
RADIUS Auth/Acct agent failed.


513787-1 : CSRF doesn't apply web application callback registered as XMLHttpRequest.onload in IE8-10

Component: Application Security Manager

Symptoms:
Since Javascript is executed on client side. When it comes to page render, javascript errors might break your page.

Conditions:
Using Internet Explorer 8-10 with CSRF ASM enabled.

Impact:
Since Javascript is executed on client side. When it comes to page render, javascript errors might break your page.

Workaround:
N/A


513706-4 : Incorrect metric restoration on Network Access on disconnect (Windows)

Component: Access Policy Manager

Symptoms:
The metric after Network Access disconnect differs from metric before Network Access for default route.

Conditions:
Using Network Access on Windows systems.

Impact:
A multi-home environment might experience routing issues after disconnecting Network Access, for example, by default traffic might go through Wi-Fi instead of wired networks.

Workaround:
Disable and enable the network adapter.


513530-2 : Connections might be reset when using SSL::disable and enable command

Component: Local Traffic Manager

Symptoms:
Enable/disable of SSL filter in quick succession might cause connection reset.

Conditions:
SSL filter is disabled then quickly re-enabled.

Impact:
Connection is unexpectedly reset/lost.

Workaround:
Do not re-enable SSL filter immediately after disabling it.


513403-2 : TMM asserts when certain ICMP packets (e.g multicast echo) are classified by AFM and match rules at Global and Route Domain context with logging enabled for these rules and also log-translations is enabled in AFM Logging configuration.

Component: Advanced Firewall Manager

Symptoms:
TMM asserts when certain ICMP packets are classified by AFM and match rules at the Global and Route Domain context with logging and log-translations enabled.

Conditions:
This might occur in the following configurations: -- AFM Rule Logging is enabled and Log Translations is enabled in Log Profile, -- Server side AVR Statistics collection is enabled under Security :: Reporting. -- Certain ICMP packets (such as multicast ICMP echo) are classified and match AFM rules at Global and Route Domain contexts.

Impact:
TMM crashes (assert). Traffic disruption due to TMM process crashing.

Workaround:
Disabling log-translations in AFM Logging Profile configuration can prevent the TMM crash for these types of ICMP packets.


513319-1 : Incorrect of failing sideband connections from within iRule may leak memory

Component: Local Traffic Manager

Symptoms:
When using sideband connections within iRules, the internal TMM memory structures might leak if the sideband destination is not reachable (routing, etc.).

Conditions:
Unreachable sideband destination that lead to failures of the sideband connection creation, e.g. destination is not reachable via routing.

Impact:
Gradual memory usage in TMM, which can lead to aggressive memory sweeper and eventual failover/outage. This might manifest in gradual increment of TMM memory usage in graphs, particularly, the following: -- High number of connfails in tmctl sb_stats. -- High number of allocated memory in tmctl sb_cache.

Workaround:
Correct possible reachability issues to the sideband destination.


513243-2 : Improper processing of crypto error condition might cause memory issues.

Component: Local Traffic Manager

Symptoms:
Improper processing of a crypto error condition might cause memory issues.

Conditions:
Error when processing certain crypto commands.

Impact:
The error might cause TMM to crash.

Workaround:
None.


513213 : FastL4 connection may get RSTs in case of hardware syncookie enabled.

Component: Local Traffic Manager

Symptoms:
Occasionally, ACK is sent to server without SYN, connection get RST.

Conditions:
1) FastL4 virtual server.
2) Hardware syncookie enabled.
3) Might more commonly occur with forwarding virtual servers.
4) Often happens when egress router has ARP timeout.

Impact:
Some connections will be dropped.

Workaround:
Configure a static ARP to all neighbors (routers) to avoid most issues.


513165 : SAML Service Provider generated SLO requests do not contain 'SessionIndex' attribute

Component: Access Policy Manager

Symptoms:
When the BIG-IP system is used as SAML Service Provider, and SP-initiated Single Logout (SLO) is executed, the SLO request message does not contain the 'SessionIndex' attribute'. As a result, the external IdP might not be able to terminate the user's session.

Conditions:
BIG-IP is configured as SP. SLO is initiated by SP.

Impact:
External IdP may not be able to terminate user's session.


513098-5 : localdb_mysql_restore.sh failed with exit code

Component: Access Policy Manager

Symptoms:
In certain scenarios, deleting a dynamic user entry from memory does not clear the entry from the underlying table.

Conditions:
This might occur when a dynamic user record is marked for deletion but has not yet been removed when the dynamic user representing that record is re-authenticated.

Impact:
Over time, the table grows in size due to stale records.


512954-4 : ospf6d might leak memory distribute-list is used

Component: TMOS

Symptoms:
Memory might be leaked when a distribute-list is used to filter routes between OSPFv3 and the Routing Information Base (RIB). The leak may lead to a crash unrelated to memory exhaustion.

Conditions:
OSPFv3 in use with a distribute-list, and LSAs in the database whose prefixes will be filtered by the distribute-list.

Impact:
ospf6d crashes interrupt all dynamic routing using OSPFv3.

Workaround:
Position the BIG-IP system in the network so there are no LSAs that need to be filtered using a distribute-list, such as in a stub area.


512885 : https monitor fails to work with MD5 with RSA as signature hash algorithm

Component: Local Traffic Manager

Symptoms:
https monitor fails to work with server that has MD5 with RSA as signature hash algorithm

Conditions:
https monitor, server using MD5 with RSA.

Impact:
https monitor fails

Workaround:
configure the back end server to use another cipher


512490-1 : Increased latency during connection setup when using FastL4 profile and connection mirroring.

Component: Local Traffic Manager

Symptoms:
Connection setup when using FastL4 profile and connection mirroring takes longer than previous versions.

Conditions:
FastL4 profile with connection mirroring.

Impact:
Slight delay during connection setup.

Workaround:
Disable tm.fastl4_ack_mirror. Optionally, enable tm.fastl4_mirroring_taciturn for signal to noise ratio improvements. This helps resolve connection setup latency.


512485-1 : Forwarding of flooded VXLAN-encapsulated unicast frames may introduce additional forwarding

Component: TMOS

Symptoms:
In VXLAN overlays, unicast frames are flooded (via multicast or unicast replication) when the destination MAC address is known and the remote endpoint is unknown. Upon receiving a flooded unicast frame, the BIG-IP system might forward the frame again to yet another endpoint. Eventually an additional L2 hop might be introduced between the sender and the receiver. This applies to both the multicast and the multipoint (unicast replication) configurations of VXLAN.

Conditions:
This affects deployments with three or more VXLAN endpoints.

Impact:
The introduction of an additional hop adds unnecessary latency.


512383 : Hardware flow stats are not consistently cleared during fastl4 flow teardown.

Component: Local Traffic Manager

Symptoms:
The PVA stat curr_pva_assist_conn is not being updated properly for certain Fast L4 flows.

Conditions:
1) Fast L4 virtual server.
2) PVA-acceleration enabled.

This occurs when the connection flow is not created because UDP traffic arrives at an undefined port on the virtual server. The curr_pva_assist_conn value is incremented though there are no active PVA flows.

This can also occur when LTM gets ICMP unreachable messages from the serverside.

Impact:
Stats counts for Fast L4 virtual server, curr_pva_assist_conn value and 'Current SYN Cache', show invalid counts. If the hardware SYN cookie protection is on, the SYN cookie protection may be activated when it is not supposed to.

Workaround:
None.


512345-3 : Dynamic user record removed from memcache but remains in MySQL

Component: Access Policy Manager

Symptoms:
When the system fetches a dynamic user record from MySQL and places the record into memcache, the record might remain there in an unmodified state for ten days.

Conditions:
This occurs when a dynamic user record is removed from memcache but remains in MySQL, due to an intermittent race condition between apmd/memcache and localdbmgr.

Impact:
Dynamic user, if locked out, remains in memcache for ten days. During this interval, the dynamic user record is unusable.

Workaround:
The Admin can remove the user by deleting the associated memcache record.


512245-4 : Machine certificate agent on OS X 10.8 and OS X 10.9 uses local host name instead of hostname

Component: Access Policy Manager

Symptoms:
Machine certificate agent checker on client might extract wrong certificate based on LocalHostName if it is not same as hostname. Machine certificate agent checker might fail.

Conditions:
BIG-IP APM with machine certificate agent.

Impact:
Machine certificate check might fail


512130 : Remote role group authentication fails with a space in LDAP attribute group name

Component: TMOS

Symptoms:
Remote role group authentication fails if there is a space in attribute name of remote-role role-info.

Conditions:
This occurs when the auth remote-role role-info attribute name contains a space character.

Impact:
LDAP authentication fails.

Workaround:
Remove space characters from LDAP attribute group name.

Another option is to use '\20' in place of spaces in the remote-role's role-info member-of attribute, for example:

memberOf=CN=Some Big Group,CN=Users,DC=DOMAIN,DC=COM

becomes:

memberOf=CN=Some\20Big\20Group,CN=Users,DC=DOMAIN,DC=COM


512054-2 : CGNAT SIP ALG - RTP connection not created after INVITE

Component: Service Provider

Symptoms:
The client has no audio when it makes a call.

Conditions:
This occurs when a client initiates a call with a CSeqID value greater than 64 KB.

Impact:
The BIG-IP system fails to create a media channel for audio/video traffic.

Workaround:
None.


511961-5 : BIG-IP Edge Client does not display logon page for FirePass

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client cannot display FirePass logon page: "Connecting..." status; instead, Edge Client displays blank pages. As a result, clients cannot use the latest BIG-IP Edge Client for Mac with FirePass.

Conditions:
Firepass and APM-supplied build of BIG-IP Edge Client for Mac.

Impact:
User cannot log in to Firepass if using BIG-IP Edge Client for Mac.

Workaround:
Update to latest client


511924-4 : LTM Policy rule names are more strictly validated

Component: Local Traffic Manager

Symptoms:
In version 12.0, a more strict validation is being applied to LTM Policy rule names. Rule names must consist of a specific set of allowed characters.
Allowed characters are:
a-z A-Z 0-9 _ . / : % -

Conditions:
Pre-12.0 LTM Policies with names that have characters outside of the allowed set.

Impact:
During upgrade from a pre-12.0 versions to 12.0 or beyond, pre-existing LTM Policy names which contained disallowed characters will have each disallowed character automatically changed to an underscore (_).

Workaround:
Migration will occur automatically.


511854-1 : Rewriting URLs at client side does not rewrite multi-line URLs

Component: Access Policy Manager

Symptoms:
Exception posted when rewriting multi-line URLs on the client side.

Conditions:
Using multi-line URLs in client-side JavaScript code.

Impact:
Web-application logic might not work as expected. The system might post a message similar to the following: Unable to get property '2' of undefined or null reference.

Workaround:
None.


511782-5 : The HTTP_DISABLED event does not trigger in some cases

Component: Local Traffic Manager

Symptoms:
HTTP_DISABLED is not triggered by the HTTP::disable iRule command, requests using the CONNECT method, and Web-sockets traffic.

Conditions:
If the HTTP filter is switched into pass-through mode by the HTTP::disable command, CONNECT requests, or via Web-sockets traffic.

Impact:
The HTTP_DISABLED event does not trigger.

Workaround:
This issue has the following workaround: -- For HTTP::disable, add the logging code within HTTP_DISABLED after that iRule command. -- For CONNECT, use an iRule to match the method in HTTP_REQUEST, and check that 200 Connected is returned as the status in HTTP_RESPONSE. If so, invoke the logging code within HTTP_DISABLED. -- For Web-sockets, use an iRule to match the 101 Switching Protocols status code in HTTP_RESPONSE. If this happens invoke the logging code that is also within HTTP_DISABLED.


511648-1 : On standby TMM can core when active system sends leasepool HA commands to standby device

Component: Access Policy Manager

Symptoms:
On standby system TMM can core after it comes up when the active system sends leasepool HA commands to the standby device.

Conditions:
This occurs on standby systems when the active system sends it leasepool HA commands.

Impact:
Traffic disrupted while tmm restarts.


511559-1 : Virtual Address advertised while unavailable

Component: TMOS

Symptoms:
An unavailable virtual address is advertised after a load sys config.

Conditions:
The configuration contains a virtual-address with 'enabled' set to 'yes', 'route-advertisement' set to 'enabled', and the 'server-scope' set to 'any'. The BIG-IP system already has the same virtual-address configured with 'server-scope' as 'any'.

Impact:
Routes appear available on the route table when they are not, which might result in traffic being routed to unavailable servers.

Workaround:
Modify the virtual-address' 'server-scope' from the current value to another value and then back to the original value.


511534-3 : A large number of regular expressions in match rules on path-segments may cause an AAM policy to take too long to load,

Component: WebAccelerator

Symptoms:
When loading an AAM policy, the tmm compiles the rules to an internal structure that is efficient for execution. Some conditions however may cause this process to take too long and the tmm gets halted before the system has finished compiling the policy.

Conditions:
The compilation time increases dramatically when regular expressions are used on more than one or 2 operands.

Since you can have conditions on many different path-segments (e.g. the 1st, 2nd, 3rd, etc), using regular expression on path-segments are a likely way to trigger this condition.

Impact:
The compilation time increases dramatically when regular expressions are used on more than one or two operands.

Since conditions might exist on many different path-segments (e.g., the 1st, 2nd, 3rd, etc.), using regular expression on path-segments is a likely way to trigger this condition.

Workaround:
None.


511517-5 : Request Logging profile cannot be configured with HTTP transparent profile

Component: Local Traffic Manager

Symptoms:
Cannot configure both a Request Logging profile and an HTTP transparent profile on the same virtual server.

Conditions:
HTTP transparent profile is attached to a virtual server.

Impact:
Request Logging profile cannot be configured on the same virtual server.


511326-4 : SIP SUBSCRIBE message not forwarded by BIG-IP when configured as SIP ALG with translation.

Component: Service Provider

Symptoms:
The BIG-IP system does not forward messages when configured as SIP ALG with translation.

Conditions:
The BIG-IP system is configured as SIP ALG with translation, and the subscriber sends a SUBSCRIBE message to receive a notification.

Impact:
The Subscriber does not receive any notification regarding the subscribed events.

Workaround:
None.


511324-8 : HTTP::disable does not work after the first request/response.

Component: Local Traffic Manager

Symptoms:
The HTTP::disable command does not work correctly after the first request is complete. If called during the second request (or response), then the connection is reset with an error message.

Conditions:
HTTP::disable is called in a request after the first. The pass-through data reaches the server-side before the server-side HTTP filter expects it.

Impact:
The connection is reset.

Workaround:
None.


511130-1 : TMM core due to invalid memory access while handling CMP acknowledgement

Component: Local Traffic Manager

Symptoms:
Rarely, TMM might core due to invalid memory access while handling a CMP acknowledgement.

Conditions:
Memory is not validated before handling a CMP acknowledgement.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


511057-1 : Config sync fails after changing monitor in iApp

Component: Local Traffic Manager

Symptoms:
Unable to modify a pool monitor and delete it in the same transaction.

Conditions:
A pool must have the monitor associated with it before the tmsh transaction, and must be the same as the monitor being deleted in the transaction.

Impact:
Unable to submit multiple changes in a single transaction.

Workaround:
Modify the pool monitor and delete it in separate transactions.


511006-1 : Virtual address is advertised to ZebOS (as visible via imi shell) while unavailable.

Component: TMOS

Symptoms:
OSPFv2 does not advertise Virtual Addresses upon monitor state changes.

Conditions:
Dynamic routing must be configured. Virtual address is not associated with a virtual server.

Impact:
Route availability inappropriately advertised. The virtual address shows is advertised in ZebOS as available when it is not.

Workaround:
None.


510728-6 : Create and Delete buttons should be disabled for Security :: Protocol Security : Security Profiles : DNS when accessed as Firewall Manager.

Component: Advanced Firewall Manager

Symptoms:
Create and Delete buttons should be disabled for Security :: Protocol Security : Security Profiles : DNS when accessed as Firewall Manager.

Conditions:
User with role of Firewall Manager and accessing
Security :: Protocol Security : Security Profiles : DNS

Impact:
Firewall Manager has extra abilities not considered in scope for the role. Therefore a validation error will be thrown similar to the following: "01070822:3: Access Denied: user (username) does not have create access to object (dns_security)"


510720-4 : iRule table command resumption can clear the header buffer before the HTTP command completes

Component: Local Traffic Manager

Symptoms:
iRule table command resumption can clear the header buffer before the HTTP command completes.

Conditions:
An HTTP request was attempted with an iRule table command that resumed after parking.

Impact:
Results in a SIGABRT. The header names might intermittently output incorrectly, and report empty names and/or parts of the request line.

Workaround:
This issue has no workaround at this time.


510709-2 : Websso start URI match fails if there are more than 2 start URI's in SSO configuration.

Component: Access Policy Manager

Symptoms:
If more than 2 start URIs are configured, start URI parsing does not work correctly. This results in no start URI match and websso failure.

Conditions:
SSO error happens only if there are more than 2 start URIs configured in the SSO configuration.

Impact:
SSO V1(websso) fails for configured start URI due to start URI mismatch.

Workaround:
No workaround


510588 : Cross blade trunk with balanced trunk.cluster.distribution has issues with re-enabling the only local trunk working member

Component: Local Traffic Manager

Symptoms:
When using the non-default trunk.cluster.distribution mode, with a cross blade trunk and the only remaining trunk member for the slot disabled, results in trunk errors when re-enabling this (non favor local) trunk member interface.

Conditions:
trunk.cluster.distribution mode has been configured for multi-blade trunking in a VIPRION. See https://support.f5.com/kb/en-us/solutions/public/1000/600/sol1689

Impact:
Re-enabled local trunk member interface of a balanced cross blade trunk (i.e. using non favor local members) may not function correctly.

Workaround:
A restart of the bcm56xxd daemon may be required to re-add all the trunk members of a balanced cross blade trunk.


510580-2 : Interfaces might be re-enabled unexpectedly when loading a partition

Component: TMOS

Symptoms:
Loading of a set of partitions not including Common might re-enable interfaces that were previously disabled.

Conditions:
Loading of a set of partitions not including Common.

Impact:
Interfaces might be unexpectedly reenabled. (It is expected that 'load sys config partitions { anotherpartition }' will only affect objects in the /anotherpartition folder.)

Workaround:
None.


510559-2 : Add logging to indicate that compression engine is stalled.

Component: TMOS

Symptoms:
Hardware compression slowly and progressively fails to handle compression operations. The system posts the following errors in ltm.log: crit tmm3[14130]: 01010025:2: Device error: n3-compress0 Nitrox 3. If the compression engine stalls, there is no logging-trail to indicate there is a problem.

Conditions:
This occurs when the system encounters errors during hardware compression handling and the compression engine stalls.

Impact:
Compression completely stalls, or CPU can be driven up by software-based compression. No indication of what the issue is.

Workaround:
Disable compression, or select 'software only' compression.


510395 : Disabling some events while in the event, then running some commands can cause tmm to core.

Component: Local Traffic Manager

Symptoms:
If an event is disabled inside the event itself, and then a Tcl command that executes asynchronously is executed, TMM can core.

Conditions:
An event is disabled from inside the event, and then a parking command is issued.
Example:
when HTTP_REQUEST {
   if { $a == $b } {
       event disable HTTP_REQUEST
   }
   after 100
   log local0. "foo"
}

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable events as the last command before exiting the event. For example:

when HTTP_REQUEST {
   if { $a == $b } {
       event disable HTTP_REQUEST
       return
    }

}


510381-6 : bcm56xxd might core when restarting due to bundling config change.

Component: TMOS

Symptoms:
A race condition exists where bcm56xxd might core while restarting due to a bundling configuration change if it is still processing other config messages from MCP. This affects all platforms that support interface bundling.

Conditions:
Interface bundling change requiring a restart while still processing configuration messages.

Impact:
Unnecessary core file produced since the daemon is restarting anyway.

Workaround:
None.


510337-1 : Page-not-found result for APM uses the incorrect stylesheet, resulting in incorrect page formatting (404 response).

Component: Access Policy Manager

Symptoms:
The page-not-found result for APM uses the incorrect stylesheet, resulting in incorrect page formatting (404 response).

Conditions:
This can happen when user enters an invalid URL suffix after the BIG-IP system management address.

Impact:
Inconsistent page appearance for the 404 response page.

Workaround:
Modify the file main.css to apm.css.


510264-4 : TMM core associated with smtps profile.

Component: Local Traffic Manager

Symptoms:
tmm can core when the smtps profile is enabled.

Conditions:
This is an intermittent core seen when the smtps profile is enabled.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
n/a


510119-1 : HSB performance can be suboptimal when transmitting TSO packets.

Component: TMOS

Symptoms:
For heavily fragmented TSO packets, it is possible to populate a high percentage of the HSB's transmit ring.

Conditions:
This can happen when transmitting large fragmented TSO packets.

Impact:
Suboptimal behavior might be seen when transmitting large fragmented TSO packets. There is a rare chance it can lead to a full or stuck transmit ring.

Workaround:
Disable TSO.


509782 : TSO packets can be dropped with low MTU

Component: TMOS

Symptoms:
If an interface is configured with a low MTU, it is possible for the system to drop TSO packets. This can be observed looking at the tx_drop_tso_bigpkt stat in the tmm/hsb_internal_fsc table.

Conditions:
The interface is configured with a low MTU, usually 750 or lower. If TMM then attempts to use TSO for a packet, there is a chance this packet will be dropped.

Impact:
Large TSO packets are dropped.

Workaround:
Increase the MTU or disable TSO.

If TSO is not disabled, three related fixes are needed to fully address the issue:

-- ID 466260, covered in SOL15953: TMM may produce a core file with the 'Assertion we always have room in tx ring! failed' error message.
-- ID 502238, covered in SOL16736: The BIG-IP system may lose connectivity and fail to process all traffic through TMM if the HSB is overloaded.
-- ID 509782, covered in SOL16780: The BIG-IP system may drop TSO packets. The Solutions are available here:

-- https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15953.html
-- https://support.f5.com/kb/en-us/solutions/public/16000/700/sol16736.html
-- https://support.f5.com/kb/en-us/solutions/public/16000/700/sol16780.html


509758-6 : EdgeClient shows incorrect warning message about session expiration

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client shows an incorrect warning message once a network access connection is established.

Conditions:
Access Policy has disabled Maximum Session timeout (set to 0) and
Network Access webtop is used.

Impact:
Versions that have session expiration timeout display all zeroes instead of the timeout value. This is a cosmetic issue that does not indicate incorrect system functionality.

Workaround:
None.


509677-3 : Edge-client crashes after switching to network with Captive Portal auth

Component: Access Policy Manager

Symptoms:
When switching to a network with Captive Portal authentication, the Edge-client becomes unresponsive.

Conditions:
- Captive Portal uses https logon page
- Network switching done by unplugging network cable from NIC or disconnecting from wireless network (not disabling network
interface).

Impact:
Edge-client crashes

Workaround:
N/A


509600-3 : Global rule association to policy is lost after loading config.

Component: TMOS

Symptoms:
The association of a global rule to a policy appears to be lost after loading a config by directly loading, saving, upgrading, and config syncing. As a result of this issue, you may encounter the following symptom:

After re-enabling a global policy and waiting for an unspecified period of time, you observe that the policy is disabled again.

Conditions:
This occurs when you associate a global rule with a policy, and then initiate an operation that causes config load.

Impact:
Policies are removed from enforcement in the global context.

Workaround:
To work around this issue, you can add back the rules manually, or, if you have not configured a route domain, you can apply route domain rules to Route Domain 0, which is effectively the same as the global rule context when no other route domains are configured.

Impact of workaround: If you have other route domains configured, Route Domain 0 is no longer usable as a global context.


509504-2 : Excessive time to save/list a firewall rule-list configuration

Component: TMOS

Symptoms:
A configuration containing a large number of firewall rule-list::rules might take an excessively long time to save. Similarly, excessive times are seen for listing the firewall configuration.

Conditions:
Large number of AFM rules.

Impact:
A long time to save or list the configuration. While this issue was noticed for a firewall rule-list::rules configuration, the same issue might occur for deeply nested configurations.


509503-1 : tmsh load sys config merge file 'filename' takes signficant time for firewall rulelist configuration

Component: TMOS

Symptoms:
For certain configurations with deeply nested structures in it ex: some of the firewall rule rule-list configuration, requires excessive time for the tmsh load config file merge operation.

Conditions:
Configurations containing deeply nested structures.

Impact:
The time for the merge is significantly more than the time needed for load operation.

Workaround:
If you are affected of long load times during merging a configuration file into existing one, you can instead append the config file to the respective bigip_base.conf or bigip.conf file manually.


509310 : Bad outer IPv4 UDP checksum observed on egressing VxLAN traffic on VIPRION chassis and 5000 series appliances

Component: Local Traffic Manager

Symptoms:
The egress VxLAN traffic on VIPRION chassis and 5000 series appliances has bad UDP checksum in its outer UDP header. The BIG-IP hardware does not support UDP checksum offload for VxLAN traffic if the outer UDP header is IPv4. The BIG-IP hardware uses UDP destination port 4789 to identify VxLAN traffic.

Conditions:
The outer UDP header of egress VxLAN traffic on VIPRION chassis and 5000 series appliances is IPv4 and has destination port equal to 4789.

Impact:
The egress VxLAN traffic is dropped due to bad UDP checksum.

Workaround:
Set db variable iptunnel.vxlan.udpport to 0. So the BIG-IP system hardware does not classify UDP destination port equal to 4789 as VxLAN traffic.


509276-5 : VXLAN tunnels with floating local addresses generate incorrect gratuitous ARPs on standby device

Component: TMOS

Symptoms:
VXLAN tunnels with floating local addresses generate incorrect gratuitous ARPs on the standby device.

Conditions:
A VXLAN tunnel with a floating local address on the standby device.

Impact:
Incorrect gratuitous ARPs are generated on the standby device.


508797 : Clarification regarding differences in GARPs on different versions.

Component: Local Traffic Manager

Symptoms:
The Gratuitous ARP (GARP) behavior when a virtual is disabled varies quite a lot of between the different versions.

This request is for more information about:

1. Explanation of the differences in behavior between 11.2.1 or 11.3.0 and 11.5.0 or 11.0.0, and 10.2.4

2. Is the GARP behavior supposed to be the same for different 'active' scenarios for the VS, such as VS disable/enable, fail-over, unreachable/reachable pool etc.?

3. Are GARPs supposed to be sent for the different kinds of addresses like floating/non-floating IP addresses, VIP whose state changes, other VIPs, etc.?

4. Is there a 'correct' or 'expected' behavior for GARPs under these scenarios and for the different IP addresses?

The intent is to provide an authoritative summary of the differences.

The current behavior summary is as follows:

-- 11.5.0: Same behavior as 11.0.0.
-- 11.3.0: Same behavior as 11.2.1.
-- 11.2.1: Disabling a VIP sends GARPs for non-floating and floating IP addresses, and for other VIPs, but NOT for the VIP being disabled. -- Enabling a VIP sends a GARP only for the VIP being enabled.
-- 11.0.0: Disabling a VIP sends GARPs for non-floating and floating IP addresses, for other VIPs, and for the VIP being disabled. -- Enabling a VIP sends GARPs for non-floating and floating IP addresses, for other VIPs, and for the VIP being enabled.
-- 10.2.4: Disabling or enabling a VIP produces no GARPs at all, neither for the VIP being toggled, nor for others.

Conditions:
Following is a summary of the minimally-correct behavior for GARPs:

-- On startup or after failover, send out GARPs for all /32 IP addresses. (The system does not send out GARPs for a listener on a subnet, for example.)

-- When a virtual server is disabled, there should not be any GARPs. Although there is no issue with a GARP in this instance, they are not necessary.

-- When a VIP is added, a GARP is required only if the IP address is not already being used.

-- When a VIP is removed, there should be no GARPs.

-- When a pool is unreachable or reachable, there should be no GARPs.

-- When a virtual server is disabled/enabled, there should be no GARPs in most cases. The only case in which there should be a GARP is when a system is brought online with a disabled virtual server that is then enabled, but the system has never sent a GARP for that IP address.

-- On failover, the new active system should GARP for all virtual addresses. When using mac masquerading, this would not be necessary, except that the system must inform the switch of the new location, and that is done via GARP. In this case there is a need for only one packet for anything; there is no need for GARPs for every IP address: In fact, there is no need for GARPs at all; if there is a packet sent, that should be sufficient for the switch.

-- GARPs should only be sent for fully-qualified ID addresses. State changes do not require GARPs. Floating IP addresses are only GARPd in order to inform the switch of the new location to send the packets. The system uses GARP for this, but what the BIG-IP system sends does not have to be the GARP.

Impact:
Extra GARPs are sent on some versions.


508719-3 : APM logon page missing title

Component: Access Policy Manager

Symptoms:
The title might be missing from a logon page.

Conditions:
Logon page uses field filled with dynamically assigned session variable.

Impact:
No title displays on the logon page.

Workaround:
Modify page logon.inc using customization panel.

*Add function:
function getSoftTokenPrompt()
{
    if ( softTokenFieldId != "" && edgeClientSoftTokenSupport()) {
        var div = document.getElementById("formHeaderSoftToken");
        if (div) {
            return div.innerHTML;
        }
    }
    return null;
}



*Replace code:
function OnLoad()
{
    var header = document.getElementById("credentials_table_header");
    var softTokenHeaderStr = getSoftTokenPrompt();
    if ( softTokenHeaderStr ) {
        header.innerHTML = softTokenHeaderStr;
    }

By:
function OnLoad()
{
    var header = document.getElementById("credentials_table_header");
    var softTokenHeaderStr = "<? echo $formHeaderSoftToken; ?>"
    if ( softTokenFieldId != "" && softTokenHeaderStr != "" && edgeClientSoftTokenSupport()) {
        header.innerHTML = softTokenHeaderStr;
    } else {
        header.innerHTML = "<? echo $formHeader; ?>";
    }

* Replace code
<td colspan=2 id="credentials_table_header" ></td>
By
<td colspan=2 id="credentials_table_header" ><? echo $formHeader; ?></td>

* Add code before </body> tag:
<div id="formHeaderSoftToken" style="overflow: hidden; visibility: hidden; height: 0; width: 0;"><? echo $formHeaderSoftToken; ?></div>


508630-7 : The APM client does not clean up DNS search suffixes correctly in some cases

Component: Access Policy Manager

Symptoms:
The APM client does not clean up DNS search suffixes correctly when the DNs suffixes configured on a client contain names configured in an APM Network Access resource.

Conditions:
The problem occurs when a suffix name that is configured in a Network Access resource matches the suffix configured locally on the user's machine.

Impact:
As a result, DNS suffixes are not restored correctly.


508519-3 : Performance of Policy List screen

Component: Application Security Manager

Symptoms:
There is a performance issue with the Policy List/Import Policy/PCI report configuration utility screens.

Conditions:
20+ active security policies in the system

Impact:
With 160 active security policies it took about 10 second to load Policy List/Import Policy/PCI report configuration utility screens.

Workaround:
There is no workaround at this time.


508067 : Packet drop on 5200 platforms due to delayed MPI communication

Component: Local Traffic Manager

Symptoms:
When incoming traffic is not well distributed and being directed to a single TMM, packets are lost instead of being processed by other TMMs.

Conditions:
Incoming network traffic on 5200 platforms is not well distributed and being directed to a single TMM, while the other TMMs do not have incoming external traffic.

Impact:
Network traffic might be dropped or delayed.

Workaround:
Insert the following line into /config/tmm_init.tcl:
  realtime busypoll yes


507905-2 : Saving Policy History during UCS load causes DB deadlock/timeout

Component: Application Security Manager

Symptoms:
Loading a UCS from an older version for upgrade can cause DB timeouts. /var/log/ltm has this error signature: DBD::mysql::db do failed: Lock wait timeout exceeded; try restarting transaction at /usr/lib/perl5/site_perl/F5/DbUtils.pm

Conditions:
This is a rare issue that occurs when two devices with different versions installed on them are in a CMI device group. It seems to be triggered if a sync is triggered from the device running the older version. This occurs while a device group is in the middle of an upgrade, the newer version being pre 11.6.0 HF5 or 11.5.2 HF1

Impact:
UCS load fails and multiple error messages are logged.

Workaround:
Do not have BIG-IP devices with different versions in the same DSC device group


507853-3 : MCP may crash while performing a very large chunked query and CPU is highly loaded

Component: TMOS

Symptoms:
MCP crashes while performing a chunked query (such as 'tmsh show sys connection) that returns a large result if a connection to a TMM is severed (due to a zero-window timeout).

Conditions:
CPU is highly loaded.

Impact:
Failover (in a device cluster) or temporary outage (in a standalone system). A core file is generated that has a stack trace that includes a message similar to the following: error reading variable: Cannot access memory at address 0x1.

Workaround:
None.


507782-2 : TMM crashes for Citrix connection when Address field in the ICA file has non-patched/invalid data

Component: Access Policy Manager

Symptoms:
TMM crashes on an attempt to open Citrix connection

Conditions:
Unpatched/malformed ICA file received by the client

Impact:
Traffic disrupted while tmm restarts.


507681-3 : Window.postMessage() does not send objects in IE11

Component: Access Policy Manager

Symptoms:
Websites are broken if they use postMessage to send objects in Internet Explorer 11. There could or could not be error in JavaScript console based on web application.

Conditions:
Web-Application that uses Window.postMessage() with Portal Access working in Internet Explorer 11.

Impact:
Web-Application can't use Window.postMessage() to send non-string data with Portal Access in Internet Explorer 11.

Workaround:
No


507611-2 : On BIG-IP 2000- and 4000-series platforms BGP sessions with TCP MD5 enabled might fail to establish connection to neighbors.

Component: Local Traffic Manager

Symptoms:
BGP sessions with TCP MD5 enabled might fail to establish connection to neighbors.

Conditions:
BGP, TCP-MD5 on BIG-IP 2000- and 4000-series platforms.

Impact:
BGP session is not established.

Workaround:
Disable TCP-MD5 for neighbor.


507493 : Cannot reset counter for rules of Management Port and Global

Component: Advanced Firewall Manager

Symptoms:
Cannot reset counter for rules of Management Port and Global

Conditions:
Firewall rules for Global context and for Management port

Impact:
Users unable to reset counters for these rules.


507487 : ZebOS Route not withdrawn when VAddr/VIP down and no default pool

Component: TMOS

Symptoms:
The BIG-IP system continues announcing RHI routes when Virtual Servers and Virtual Addresses are down.

Conditions:
The issue occurs in the following case: -- Have a VIP with pool selection via iRule. -- Configure RHI on the VAddr corresponding to the VIP. -- Down the pools (for example, toggling between HTTP monitor (up) and UDP monitor (down)). -- VIP, VAddr, and pools are red. -- Run the imish command.

Impact:
The kernel route still is announced, which might cause other network devices to be confused on the network status, so the impact varies.

Workaround:
Configure virtual server with default pool instead of iRule.


507461 : Net cos config may not persist on HA unit following staggered restart of both HA pairs.

Component: TMOS

Symptoms:
The net cos global-settings may be cleared on a HA unit, as a result of a HA pair configuration sync.

Conditions:
With fully synced pair of HA chassis, restart active chassis blade and then restart standby chassis blade.

Impact:
Portion of cos config information on active chassis blade is missing, resulting in incongruent cos behavior between active and standby.

Workaround:
None.


507331-3 : Using saved configuration with 11.5.2 on AWS may cause SSLv3 to be enabled.

Component: TMOS

Symptoms:
If a saved configuration from an earlier version is used when launching an instance of BIG-IP v11.5.2 on AWS, then SSLv3 may be enabled on the management interface.

Conditions:
Using configuration saved with version 11.5.2 (and earlier) on AWS.

Impact:
There are known security vulnerabilities with SSLv3 and the BIG-IP software disables it by default with v11.5.2 on AWS. An enabled SSLv3 on the management interface might make the instance vulnerable to an attack, so after upgrading, configurations in which SSLv3 is enabled should be disabled before deploying.

Workaround:
Disable SSLv3 as documented here: https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip, and in and in SOL15702: https://support.f5.com/kb/en-us/solutions/public/15000/700/sol15702.html.


507318-1 : JS error when sending message from DWA new message form using Chrome

Component: Access Policy Manager

Symptoms:
When using Chrome to send a new message on DWA, a JavaScript 'toString' error occurs.

Conditions:
If user clicks on the Send button on the new message form, then JavaScript errors appear: -- cache-fm.js:5 Uncaught TypeError: Cannot read property 'toString' of undefined
?. -- OpenDocument&Form=l_ScriptFrame&l=en&CR&MX&TS=20140915T180028,72Z&charset=UTF-8&charset=UTF-8&KIC&…:37 Uncaught TypeError: Cannot read property 'EgI' of undefined.

Impact:
The message is sent, but the tab is not closed.

Workaround:
None.


507289-2 : User interface performance of Web Application Security Editor users

Component: Application Security Manager

Symptoms:
Slow GUI performance for Web Application Security Editor users

Conditions:
At least 100 active security policies in the system

Impact:
Most ASM pages takes more than 5 seconds to load for Web Application Security Editor users

Workaround:
There is no workaround at this time.


507116-2 : Web-application issues and/or unexpected exceptions.

Component: Access Policy Manager

Symptoms:
Web-application issues and/or unexpected exceptions.

Conditions:
Undisclosed conditions related to web-applications.

Impact:
Unexpected web-application functionality.

Workaround:
None.


507109-2 : inherit-certkeychain attribute of child Client SSL profile can unexpectedly change during upgrade

Component: Local Traffic Manager

Symptoms:
The inherit-certkeychain attribute of a child Client SSL profile can unexpectedly change after upgrade.

Conditions:
This issue occurs when all of the following conditions are met:

-- You create a Client SSL profile that does not inherit the certificate, key, and chain certificate settings from the parent profile.
-- You upgrade to BIG-IP 11.5.1 (HF6 or later), 11.5.2, 11.5.3, or 11.6.0.

Impact:
An incorrect cert key chain is used in the profile.

Workaround:
Manually fix the Client SSL profile.


506702-3 : TSO can cause rare TMM crash.

Component: Local Traffic Manager

Symptoms:
TSO can cause rare TMM crash.

Conditions:
When TSO is used.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


506349-1 : BIG-IP Edge Client for Mac identified as browser by APM in some cases

Component: Access Policy Manager

Symptoms:
APM sometimes determines that BIG-IP Edge Client for Mac is a browser. This can happen if user connects again using the link on the logout page that says "Click here to open new session"

Conditions:
APM, MAC Edge client

Impact:
Impact depends upon access policy but user might not be able to connect.

Workaround:
Click the Disconnect/Connect buttons on BIG-IP Edge Client instead of clicking the links on the logout page.


506315-3 : WAM/AAM is honoring OWS age header when not honoring OWS maxage.

Component: WebAccelerator

Symptoms:
WAM/AAM policy is configured to ignore OWS maxage header values, but the policy does not ignore the OWS Age header.

Conditions:
BIG-IP system with AAM provisioned, content matching a policy node not honoring OWS headers maxage and or s-maxage, and a large 'Age' value.

Impact:
This results in WAM/AAM improperly reducing the lifetime of OWS responses by the amount of the Age header, and more frequent WAM/AAM revalidation of the affected content (possibly on every request if the Age header is larger than the policy-specified cache lifetime).

Workaround:
You can use any one of the following as a workaround:
-- Honor OWS lifetime headers (s-maxage and max-age).
-- Use an iRule to delete OWS Age header.
-- Increase cache AAM/WAM cache lifetime for that content to compensate.


506290-1 : MPI redirected traffic should be sent to HSB ring1

Component: Local Traffic Manager

Symptoms:
The MPI redirected traffic is the traffic between two TMMs. It is currently sent to HSB ring0. HSB ring0 has small packet buffers and is used to handle the traffic of highest priority. Large amount of MPI redirect traffic can cause packet drops on HSB ring0.

Conditions:
Large amount of MPI redirect traffic.

Impact:
Potential packet drops on HSB ring0.

Workaround:
None.


506199-5 : VCMP guests on VDAG platforms can experience excessive tmm redirects after multiple guest provisioning cycles

Component: TMOS

Symptoms:
When multiple VCMP guests are configured on a VDAG platform, It is possible through cycles of provisioning and deprovisioning the guests to cause switch rules that play a role in disaggregation to be programmed in an order that causes packets to reach the wrong TMM in a guest, thus causing lower dataplane performance.

Conditions:
On a configuration with at least two VCMP guests that share at least one blade on a VDAG-based platform, change the vCMP state to provisioned, then to configured, then to provisioned, and so on.

Impact:
The potential for decreased dataplane performance. In addition to potentially lower performance, the guest's tmm flow redirect statistics increment quickly in conjunction with traffic. To determine these stats, run a command similar to the following: config # tmctl -d blade tmm/flow_redir_stats. This presents results similar to the following:
pg pu redirect_pg redirect_pu packets
-- -- ----------- ----------- -------
 0 0 0 1 636991

Also, VDAG statistics on the host might show an imbalance in destination port hits for those assigned to a single guest. To determine these stats, run a command similar to the following: config # tmctl -d blade switch/vdag_dest_hits -w 200. This presents results similar to the following:
slot dst_mod dst_port dst_trunk hits red_hits
---- ------- -------- --------- ------ --------
   1 1 0 0 0 0
   1 7 0 0 0 0
   1 13 0 0 0 0
   1 19 0 0 0 0
   1 0 0 0 0 0
   1 1 5 0 509100 0
   1 1 6 0 0 0

Workaround:
During a window in which a brief traffic interruption is acceptable, restart bcm56xxd on each effected blade in the host. On the host, run a command similar to the following: clsh bigstart restart bcm56xxd


506041-6 : Folders belonging to a device group can show up on devices not in the group

Component: TMOS

Symptoms:
All folders and partitions always get synced regardless of whether they are in the device group. If a user wants to utilize the same folder/partition scheme across multiple devices, this can lead to conflicts. In particular it can clobber the default route domain on a partition or rewrite the device group of a folder.

Conditions:
This only occurs during a full sync.

This can occur if two different device groups use the same folder or partition names. For example, if there are two separate failover-sync groups in the same trust and they both sync a different set of objects in /MyHAFolder.

This can also occur if a device has a local folder or partition with the same name as one in a device group.

Impact:
If a conflicted partition uses different default route domains, they will be overridden and may result in a sync error.

Conflicted folders will inherit the configuration of the source of the config sync. This can override the device group, traffic group, and iApp reference of the folder.

Workaround:
Use unique partition and folder names across all devices in the trust group.


505964-1 : Invalid http cookie handling can lead to TMM core

Component: Local Traffic Manager

Symptoms:
If an http cookie is invalid, then subsequent modifications to http cookie entries can result in a TMM core.

Conditions:
This issue can occur with an HTTP virtual server that performs cookie processing (either via an iRule, profile configuration, or as a result of persistence) and also performs header manipulation.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


505755-5 : Some scripts on dynamically loaded html page could be not executed.

Component: Access Policy Manager

Symptoms:
Some scripts on dynamically loaded HTML page might not execute.

Conditions:
Dynamically loaded HTML page

Impact:
Web application accessed via Portal Access does not work as expected.

Workaround:
None.


505222-1 : DTLS drops egress packets when traffic is large

Component: Local Traffic Manager

Symptoms:
DTLS drops egress packets when traffic is large

Conditions:
DTLS has egress queue with maximum elements 127(default).
When traffic is large enough, the queue reaches the maximum limit and some packets are dropped.

Impact:
DTLS drops egress packets.

Workaround:
We can change the maximum elements from 127 to some bigger value by DB variable.


505101 : tmm may panic due to accessing uninitialized memory

Component: Access Policy Manager

Symptoms:
tmm panics with the message "memory owned by current process"

Conditions:
SAML plugin encounters an internal error and attempts to free an uninitialized memory region.

Impact:
tmm restarts

Workaround:
none


505071-4 : Delete and create of the same object can cause secondary blades' mcpd processes to restart.

Component: TMOS

Symptoms:
A single transaction containing both a delete and a create of the same object can, for certain types of objects, cause the secondary blades' mcpd processes to restart because of validation failure. The validation error appears similar to the following: 01020036:3: The requested object type (object name) was not found.

Conditions:
This has been seen to occur when an APM policy agent logon page is modified, and the error reports that its customization group cannot be found.

In BIG-IP v11.6.0 HF6 and BIG-IP v11.5.4 and BIG-IP v11.5.4 HF1, this can also occur when an iApp creates a virtual server.

Impact:
mcpd restarts on every secondary blade, causing most other system services to restart as well. This might result in a temporary loss of traffic on all secondary blades. After mcpd restarts, the new configuration is accepted and the system returns to normal operation.

Workaround:
None.


505056-1 : BIG-IP system might send an egress packet with a priority different from that of ingress packet on the same flow.

Component: Local Traffic Manager

Symptoms:
When the hardware COS queue feature is enabled, in some cases the BIG-IP system sends an egress packet with a priority different from that of ingress packet on the same flow.

Conditions:
Hardware COS queue feature is enabled.

Impact:
Egress packets are sent with an incorrect packet priority and delivered on the incorrect switch COS queues, resulting in lower performance.

Workaround:
None.


504973-3 : Configuring a route domain with 32 bit subnet mask, 128 bit mask saved instead

Component: Application Security Manager

Symptoms:
When creating a policy using a route domain and a full 32 bit subnet mask, the ASM saves it as a 128 bit mask.

Conditions:
Provisioned ASM

Impact:
Wrong 128 bit subnet mask is saved instead of the configured 32 bit mask.


504827 : Use of DHCP relay virtual server might result in tmm crash 'top filter'.

Component: Local Traffic Manager

Symptoms:
tmm crash with panic string 'top filter' appearing in tmm log.

Conditions:
Configure DHCP relay virtual server that conflicts with other virtual server address/port.

Impact:
A rarely encountered tmm crash, which might result in network outage. The system posts a message similar to the following: notice panic: ../modules/hudfilter/hudnode.c:310: Assertion 'top filter' failed.

Workaround:
Avoid configuring virtual servers that share address:port with DHCP relay virtual server.

In releases prior to version 11.6.0, use regular IP forwarding virtual servers if the virtual server is not for Relay but just for 'forwarding'. When the virtual server destination is not 255.255.255.255, it is typically for forwarding, not for Relay.


504633-6 : DTLS should not update 'expected next sequence number' when the record is bad.

Component: Local Traffic Manager

Symptoms:
DTLS updates the 'expected next sequence number' even if the record is bad. This might cause the unexpected sequence number of good records dropping.

Conditions:
DTLS receives a bad record with a very large sequence number.

Impact:
DTLS might drop the good records that have smaller sequence number packets than the bad records.

Workaround:
None.


504606-1 : Session check interval now has minimum value

Component: Access Policy Manager

Symptoms:
Session check interval can be changed or turned off completely for debug purposes.

Conditions:
Using the session check interval.

Impact:
Session check interval may be set to excessively short value.

Workaround:
None.


504572 : PVA accelerated 3WHS packets are sent in wrong hardware COS queue

Component: TMOS

Symptoms:
Under full ePVA acceleration, 3WHS (3-way handshake) packets from VIP to node will always egress on hardware COS queue 3, regardless of COS queue mapping configured on the system.

Conditions:
The packets needs to be fully accelerated by ePVA.

Impact:
Potential performance downgrade.

Workaround:
None.


504508-3 : IPsec tunnel connection from BIG-IP to some Cisco ASA does not stay up when DPD (Dead Peer Detection) is enabled

Component: TMOS

Symptoms:
When establishing IPsec tunnel from the BIG-IP system to some Cisco devices enabled with an older Dead Peer Detection (DPD) implementation, IPsec tunnel does not stay up because of a mismatched Cookie field in the DPD message.

Conditions:
An IPsec tunnel connection from a BIG-IP system to certain Cisco ASA configurations does not stay up when DPD is enabled

Impact:
IPsec tunnel goes down, traffic stops.

Workaround:
Disable Dead Peer Detection for the Ike Peer configuration to the Cisco devices exhibiting this issue.


504496-1 : AAA Local User Database may sync across failover groups

Component: TMOS

Symptoms:
APM units that are not in the same BIG-IP Sync-Failover group are sharing local user entries. The system may possibly also experience higher management CPU load as a result of frequently syncing the local user database.

Conditions:
There is at least one sync-failover group in the Device Management :: Device Groups list, and there are devices listed in Device Management :: Devices list that are not members of that sync-failover group (either standalone or members of another device group), and those devices are provisioned with APM.

Impact:
Unwanted sharing of local user database between sync-failover groups and/or standalone devices. The system may also experience higher management CPU load as a result of frequently syncing the local user database. Under severe conditions where the database is synced multiple times per minute continually for hours or days, the rapid syncing of the database may result in unexpected failover.


504396-1 : When a virtual's ARP or ICMP is disabled, the wrong mac address is used

Component: Local Traffic Manager

Symptoms:
When we use tmsh to modify icmp_enabled or arp_enabled property of a virtual address object from true to false, tmm does not reset internal state properly. This results in a tmm using the VLAN's true mac as the source mac instead of the traffic group's mac masquerade address.

Conditions:
Using mac masquerading in a HA traffic group.

Impact:
Packets may be dropped by switches or routing tables improperly updated.

Workaround:
None.


504384 : ICMP attack thresholds

Component: Advanced Firewall Manager

Symptoms:
ICMP flood protection triggers at an earlier than expected threshold if all of the ICMP attack traffic contains the same ID. This is because all traffic is sent to the same tmm when it contains the same ID but the threshold takes into account the number of tmms.

Conditions:
When ICMP traffic is sent with the same ICMP id, and the DoS threshold was configured assuming the ICMP traffic would be spread across all tmms.

Impact:
The forwarded ICMP traffic has higher priority that regular traffic causing normal traffic to potentially get dropped sooner as compared to forwarded traffic.

Workaround:
None


504306-8 : https monitors might fail to re-use SSL sessions.

Component: Local Traffic Manager

Symptoms:
SSL handshakes for https monitors might fail to correctly re-use SSL session IDs.

Conditions:
A configuration that utilizes https monitors to servers that implement an SSL session cache. More servers utilizing the same https monitor make the problem more likely to occur.

For the monitor flapping or false negative symptom in 11.5.0 or higher, a monitor must be configured for a combination of TLS 1.0 and TLS 1.2 servers.

Impact:
The bigd process might consume more CPU than necessary because it might always be performing complete SSL handshakes with monitored servers.

BIG-IP version 11.5.0 or higher in environments with both TLS 1.0 and TLS 1.2 servers that perform SSL session caching may experience monitor flapping or servers that are marked down unexpectedly.

Workaround:
None.


503741-12 : DTLS session should not be closed when it receives a bad record.

Component: Local Traffic Manager

Symptoms:
According to RFC6347: 4.1.2.7. Handling Invalid Records:
'Unlike TLS, DTLS is resilient in the face of invalid records (e.g., invalid formatting, length, MAC, etc.). In general, invalid records SHOULD be silently discarded, thus preserving the association; however, an error MAY be logged for diagnostic purposes. Implementations which choose to generate an alert instead, MUST generate fatal level alerts to avoid attacks where the attacker repeatedly probes the implementation to see how it responds to various types of error. Note that if DTLS is run over UDP, then any implementation which does this will be extremely susceptible to denial-of-service (DoS) attacks because UDP forgery is so easy. Thus, this practice is NOT RECOMMENDED for such transports.'

In the BIG-IP implementation, DTLS chooses to disconnect the session when it receives invalid record.

Conditions:
DTLS receives a bad record packet.

Impact:
DTLS disconnects the session.

Workaround:
None.


503652 : Some SIP UDP connections are lost immediately after enabling a blade on the Active HA unit.

Component: Local Traffic Manager

Symptoms:
When a blade is enabled on a cluster while it is actively processing SIP UDP traffic, some packets might be lost.

Conditions:
This occurs in an Active HA cluster containing VIPRION B2100 blades with the udp.hash value set to 'ipport' and client-side round robin TMM disaggregation enabled.

Impact:
Some SIP UDP traffic packets might be lost.

Workaround:
Do not enable a blade in a cluster while the blade is processing SIP UDP traffic.


503620-5 : ECDHE_ECDSA and DHE_DSS ciphers do not work with OpenSSL 1.0.1k and later

Component: Local Traffic Manager

Symptoms:
BIG-IP SSL when using ciphers ECDHE_ECDSA and DHE_DSS does not work consistently with OpenSSL clients using OpenSSL versions 1.0.1k or later.

Conditions:
When the ciphers used are ECDHE_ECDSA or DHE_DSS, and the OpenSSL clients have versions later than OpenSSL 1.0.1k.

Impact:
SSL handshake failed. The OpenSSL clients might encounter a decryption error while reading the server key exchange.

Workaround:
Use OpenSSL versions earlier than OpenSSL 1.0.1k.


503604-1 : Tmm core when switching from interface tunnel to policy based tunnel

Component: TMOS

Symptoms:
When the configuration is changed from interface tunnel to policy based tunnel, tmm crashes.
Most likely this is a timing issue where the pnh is not updated while the policy was updated. So the policy_type (policy_interface vs policy_ipsec) mismatched.

Conditions:
Traffic passing in the background and change the configuration from interface tunnel to policy based tunnel.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
No workaround


503541 : Use 64 bit instead of 10 bit for Rate Tracker library hashing.

Component: Advanced Firewall Manager

Symptoms:
Rate Tracker 10 bit hashing may cause inaccurate rate-limits by the Sweep & Flood DoS vectors.

Conditions:
When Sweep and Flood vector is enabled in AFM module.

Impact:
Impact to Sweep and Flood detection rate accuracy.

Workaround:
None.


503343-3 : TMM crashes when cloned packet incorrectly marked for TSO

Component: Local Traffic Manager

Symptoms:
TMM cores

Conditions:
1. Clone pool configured

2. Clone MTU > Client or Server MTU

3. tm.tcpsegmentationoffload db var in "disable" state

4. TSO enabled in client or server side interface

5. TSO disabled in clone interface

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Remove the configured clone pool


503319-1 : After network access is established browser sometimes receives truncated proxy.pac file

Component: Access Policy Manager

Symptoms:
On MAC OSX platform, After network access is established, poxy.pac received by the browser is truncated.

Conditions:
This occurs if proxy.pac file is larger than 65535 bytes (~65 KB).

Impact:
Large proxy.pac file might not be downloaded or might be truncated.

Workaround:
Reduce proxy.pac file size so that merge file is less than ~65 KB.


503257-9 : Persistence, connection limits and HTTP::respond or HTTP::redirect may result in RST

Component: Local Traffic Manager

Symptoms:
Client connections to a virtual server with persistence, connection limits, and an iRule that issues an HTTP response may receive a RST with a cause of "pmbr enqueue failed" even though connection queuing is not enabled.

Conditions:
This can happen if the connection makes an HTTP request and an iRule directly responds to the first request on the connection. A future request on that TCP connection would be reset if it is persisted to a pool member that is at its connection limit. The iRule would use HTTP::respond (without "connection close") or HTTP::redirect.

Impact:
Clients may receive a RST and fail to connect to an available pool member under some traffic patterns.

Workaround:
If using HTTP::respond or HTTP::redirect in an iRule, change to HTTP::respond with the "Connection close" option in order to force the connection to terminate and the client to start a new connection after the redirect is sent.


503214-5 : Under heavy load, hardware crypto queues may become unavailable.

Component: Local Traffic Manager

Symptoms:
When the BIG-IP system is under heavy load, it may erroneously determine that the hardware crypto queues are unavailable and trigger an HA failover event.

Conditions:
BIG-IP system under heavy load and using hardware crypto.

Impact:
HA failover. You might see messages similar to the following:
 -- crit tmm2[22560]: 01010025:2: Device error: crypto codec cn-crypto-2 queue is stuck.
 -- warning sod[6892]: 01140029:4: HA crypto_failsafe_t cn-crypto-2 fails action is failover.
 -- notice sod[6892]: 010c0052:5: Standby for traffic group /Common/traffic-group-1.

Workaround:
None.


503118-4 : clientside and serverside command crashes TMM

Component: Local Traffic Manager

Symptoms:
When parking command is used inside clientside or serverside, tmm crashes.

Conditions:
Parking command, e.g., the table command, is used inside clientside or serverside command.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Move the parking command outside clientside or serverside command.


503085 : Make the RateTracker threshold a constant

Component: Advanced Firewall Manager

Symptoms:
Dynamic detection threshold may impact Sweep and Flood detection rate accuracy under high traffic conditions.

Conditions:
When Sweep and Flood is enabled in AFM module.

Impact:
Some Sweep and Flood functionality might not provide sufficient detection rate accuracy.


502852-1 : Deleting an in-use custom policy template

Component: Application Security Manager

Symptoms:
If a user tries to delete a custom policy template while there are still security policies in the system that were created from that template, the delete will fail. This also leaves the custom template in an unusable state that can neither be used to create further Policies nor can it ever be deleted.

Conditions:
A security policy exists on the system that was created from a custom template. The user then tries to delete the template before removing the policy from the system.

Impact:
The custom template becomes unusable for creating new policies, and cannot be deleted even after there are no longer any policies created from it left on the system.

Workaround:
Contact support for a script that will disassociate all user defined policy templates from existing policies.
This will allow any user defined template to be successfully deleted.


502747-7 : Incoming SYN generates unexpected ACK when connection cannot be recycled

Component: Local Traffic Manager

Symptoms:
Incoming SYN causes the BIG-IP system to generate ACK instead of SYN-ACK.

Conditions:
This can occur when the following conditions are met:
 - IP addresses and ports of SYN match an existing connection;
 - Sequence number of the SYN is greater than 2^31+ from previously sent FIN;
 - Existing connection is in TIME_WAIT state;
 - Virtual server has time_wait_recycle enabled.

Impact:
Client will generate RST and connection must be re-tried.

Workaround:
Set time-wait-timeout to 1 millisecond per SOL12673.


502683-4 : Traffic intermittently dropped in syncookie mode, especially when hardware syncookie is on

Component: Local Traffic Manager

Symptoms:
In certain corner cases, BIG-IP software rejects valid SYN-Cookie responses due to incorrect hardware algorithm masking on the software side.

Conditions:
This issue appears only on hardware-SYN-Cookie-capable platforms when running the hardware SYN-Cookie algorithm.

Impact:
Intermittent connection failures.

Workaround:
Run software SYN-Cookie algorithm. Use the DB variable.
This makes sure software is running correct generation and validation algorithm.


502443 : After enabling a blade/HA member, pool members are marked down because monitoring starts too soon.

Component: Local Traffic Manager

Symptoms:
The external monitoring daemon (bigd) sends monitoring traffic before tmm is ready to receive those responses. The response traffic is routed to a tmm on another blade/HA member. This tmm responds to the server with an ICMP "Unreachable" message. Meanwhile, the originating tmm on the new blade/HA member marks the pool member "down" because it never received the server's response.

Conditions:
Start with at least 1 blade enabled in a chassis or one HA member configured, and pass traffic constantly through a virtual server with a monitor-enabled pool attached. Then, enable a new blade in the cluster or a new HA member.

Impact:
Some packets are lost for several seconds. It can be longer depending on the total number of pool members.

Workaround:
Before adding a new blade to a chassis or a member to the HA configuration that is actively processing traffic, temporarily remove the monitor(s) from the pool. Once the new blade/HA member is up, manually add the monitor(s) back to the pool.


502441-3 : Network Access connection might reset for large proxy.pac files.

Component: Access Policy Manager

Symptoms:
Network Access connection might reset when large proxy.pac files are configured in the access policy.

Conditions:
MAC Edge client, browsers, Network Access, large proxy.pac file.

Impact:
Network Access connection might reset.

Workaround:
Reduce the proxy.pac file size to be less than 10 KB.


502414 : Make the RateTracker tier3 initialization number less variant.

Component: Advanced Firewall Manager

Symptoms:
Sweep and Flood vectors may exceed configured rate limit values by 10%-30$.

Conditions:
When Sweep and Flood vector is enabled in AFM module.

Impact:
Sweep and Flood attack detection at higher than configured levels.

Workaround:
None.


502238-5 : Connectivity and traffic interruption issues caused by a stuck HSB transmit ring

Component: TMOS

Symptoms:
BIG-IP can experience sudden and permanent traffic interruption, impacting all traffic through TMM.

Conditions:
With TCP Segmentation Offload (TSO) enabled, it is possible to fill up the High-Speed Bridge (HSB) transmit ring, resulting in a stuck transmit ring.

The exact conditions under which this occurs is unknown, but it requires sudden transmission of a number of large packets that require TSO in order to result in a full transmit ring.

Impact:
The HSB's transmit ring becomes stuck. This requires a TMM restart in order to clear.

Workaround:
Disable TSO. This can be done using the following steps:
1. tmsh modify sys db tm.tcpsegmentationoffload value disable
2. bigstart restart tmm.

If TSO is not disabled, three related fixes are needed to fully address the issue:

-- ID 466260, covered in SOL15953: TMM may produce a core file with the 'Assertion we always have room in tx ring! failed' error message.
-- ID 502238, covered in SOL16736: The BIG-IP system may lose connectivity and fail to process all traffic through TMM if the HSB is overloaded.
-- ID 509782, covered in SOL16780: The BIG-IP system may drop TSO packets. The Solutions are available here:

-- https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15953.html
-- https://support.f5.com/kb/en-us/solutions/public/16000/700/sol16736.html
-- https://support.f5.com/kb/en-us/solutions/public/16000/700/sol16780.html


502174-2 : DTLS fragments do not work for ClientHello message.

Component: Local Traffic Manager

Symptoms:
DTLS fragments do not work for ClientHello message.

Conditions:
DTLS ClientHello splits into multiple fragments.

Impact:
Both first handshake and renegotiation are affected.


502149-1 : Archiving EC cert/key fails with error 'EC keys are incompatible for Webserver/EM/iQuery.'

Component: Local Traffic Manager

Symptoms:
When archiving cert/key via GUI, the following error message is displayed : 'EC keys are incompatible for Webserver/EM/iQuery.'

Conditions:
When archiving cert/key via GUI.

Impact:
Intermittently, an error is received when trying to archive key or certificates via GUI.

Workaround:
None.


502016-1 : MAC client components do not log version numbers in log file.

Component: Access Policy Manager

Symptoms:
Some client components do not log version numbers in the log file.

Conditions:
Mac client components.

Impact:
Lack of version numbers in the log file.

Workaround:
None.


501984 : TMM may experience an outage when an iRule fails in LB_SELECTED.

Component: Local Traffic Manager

Symptoms:
When an iRule fails in LB_SELECTED, it is possible for TMM to crash. The TMM failure is an intermittent, timing-related issue..

Conditions:
Using iRules with a rule for when LB_SELECTED is operating on a node/pool member.

Impact:
TMM outage resulting in brief loss of service or HA failover.

Workaround:
None.


501690-2 : TMM crash in RESOLV::lookup for multi-RR TXT record

Component: Local Traffic Manager

Symptoms:
TMM crashes with a specific ASSERT-based backtrace.

Conditions:
Requires an LTM listener with an iRule that has a RESOLV::lookup command querying for a TXT record and receiving multiple RRs.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


501517-3 : Very large configuration can cause transaction timeouts on secondary blades

Component: TMOS

Symptoms:
Messages with 'end_transaction message timeout on connection 0x5ea9a9c8 (user mcpd-primary)' in them in the ltm log after a secondary blade is inserted or restarted.

Conditions:
A multi-bladed system with a very large configuration that takes more than a minute to transfer to secondary blades.

Impact:
mcpd's transaction does not complete and the configuration is not loaded properly.

Workaround:
None.


501516 : If a very large number of monitors is configured, bigd can run out of file descriptors when it is restarted.

Component: Local Traffic Manager

Symptoms:
When using a very large number of monitors, bigd may run out of file descriptors when it is restarted.

Conditions:
A system with a large number of monitors configured.

Impact:
bigd cores and gets into a restart loop; monitors no longer work properly. The ltm log might contain error messages similar to the following: socket error: Too many open files.

Workaround:
Reduce the number of monitors on the system.


501498-3 : APM CTU doesn't pick up logs for Machine Certificate Service

Component: Access Policy Manager

Symptoms:
CTU report does not contain logs from Machine Certificate Service.

Conditions:
When the CTU report is run, it does not contain data in the logs.

Impact:
Logs are not available to technical staff

Workaround:
You can pick up logs manually from C:\Windows\Temp\logterminal.txt.


501480 : AFM DoS Single Endpoint Sweep and Flood Vectors crash TMM under heavy traffic.

Component: Advanced Firewall Manager

Symptoms:
With AFM DoS Single Endpoint Sweep and Flood Vectors configured, TMM might crash while processing a huge amount of the configured attack traffic.

Conditions:
AFM DoS Single Endpoint Sweep and Flood attack vector is enabled in the AFM module.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Do not configure the AFM DoS Single Endpoint Sweep and Flood Vector.


501371 : mcpd sometimes exits while doing a file sync operation

Component: TMOS

Symptoms:
mcpd exits randomly. If mcpd debug logging is enabled, the system might post an operation similar to the following: Received request message from connection 0x5fe47008 (user %cmi-mcpd-peer-/Common/LNJDCZ-VPN1.example):
query_all {
   sync_file {
      sync_file_file_to_sync "/var/apm/localdb/mysql_bkup.sql"
      sync_file_target_dg "/Common/HA_Rhodes_APM"
      sync_file_postprocess_action "/usr/libexec/localdb_mysql_restore.sh"
      sync_file_originator "/Common/LNJDCZ-VPN1.example"
   }
}

Conditions:
mcpd is performing a file sync.

Impact:
Randomly, mcpd exits, triggering a failover.

Workaround:
None.


501343-6 : In FIPS HA setup, peer may use the FIPS public-handle instead of the FIPS private-handle

Component: TMOS

Symptoms:
In FIPS HA setup when the FIPS private handle of x.key on Device A is a FIPS public handle of x.key on Device B, Device B (the HA peer) gets the configuration from Device A and operates as if the handle is correct because the modulus matches, but it actually is the public-handle and not the private-handle.

Conditions:
FIPS HA setup and FIPS private handle of x.key on Device A is a FIPS public handle of x.key on Device B.

Impact:
With this configuration, when the device fails over, it can lead to traffic failure. This occurs because TMM tries to use the public-handle when it should be using the private-handle.


500925 : Introduce a new sys db variable to control number of merges per second of Rate Tracker library.

Component: Advanced Firewall Manager

Symptoms:
The accuracy of the rate limit for the Sweep and Flood vectors is affected by the number of merges per second in Rate Tracker library.

Conditions:
When sweep and flood vector is enabled in AFM module.

Impact:
No way to control number of merges per second of Rate Tracker, which could help in Rate Tracker libray accuracy.

Workaround:
None.


500786-1 : Heavy memory usage while using fastL4/BIGTCP virtual with HTTP profile

Component: Local Traffic Manager

Symptoms:
When a FastL4/BIGTCP virtual with HTTP profile is used, certain kinds of traffic may cause huge memory growth and result in out-of-memory situation.

Conditions:
If the FastL4 virtual with HTTP profile handles HTTP cloaking traffic, that starts up as HTTP and then switches over to non-HTTP data, memory growth could grow unbounded due to lack of flow control. This may lead to out of memory conditions eventually.

Impact:
Out of memory conditions affecting the availability/stability of the BIG-IP system.

Workaround:
1.) Avoid using FastL4 with HTTP profile, unnecessarily.
2.) If it could not be avoided, use FastL4 + HTTP-Transparent profile combination instead AND set http-transparent profile attribute enforcement.pipeline to "pass-through". This would allow HTTP filter to run in "passthrough" mode. Hence avoid the excessive memory consumption.


500424-1 : dnatutil exits when reverse mapping one of the snippet results in "No tmms on the blade" error

Component: Carrier-Grade NAT

Symptoms:
DNATutil exits with the error "dnatutil: No tmms on the blade."

Conditions:
A DNAT state log entry that is interpreted as invalid

Impact:
DNATUtil will not be able to parse the whole log file for reverse mappings

Workaround:
remove the DNAT state chunk that produces the error.


500365-2 : TMM Core as SIP hudnode leaks

Component: Service Provider

Symptoms:
There is a memory leak when using SIP in TCP/ClientSSL configurations.

Conditions:
The leak occurs when the clientside flow is torn down in response to the SSL handshake not completing.

Impact:
Because the SSL handshake is not complete, the SIP handler cannot complete the operation as expected, which results in an error and a memory leak of the SIP handler. The tmm memory increases, which eventually requires restarting tmm as a workaround.

Workaround:
Although there is no workaround to prevents the issue, you can recover from the memory-leak condition by restarting tmm.


500303 : Virtual Address status may not be reliably communicated with route daemon

Component: Local Traffic Manager

Symptoms:
Occasionally, when the Virtual Server status changes, the Virtual Address status may not me communicated to the routing services (that is, the tmrouted service).

This can result in incorrect routes.

Conditions:
Exact conditions unknown, but it can occur when the Virtual Server status changes.

Impact:
Virtual Addresses may have advertised routes when they are down, or vice versa.

Workaround:
None.


500234-1 : TMM may core during failover due to invalid memory access in IPsec components

Component: TMOS

Symptoms:
TMM cores when transitioning from standby to active.

Conditions:
This might occur when the following conditions are met: -- An IPsec tunnel is enabled. -- The BIG-IP system is a member of an HA pair. -- The BIG-IP system transitions from standby to active.

Impact:
Traffic disrupted while tmm restarts.


500003-5 : Incoming NTP packets from configured NTP server to non-local IP breaks outgoing NTP

Component: Local Traffic Manager

Symptoms:
When incoming NTP packets from the configured NTP server arrive for a non-local IP on a BIG-IP system that is either a Virtual Edition (VE) guest, an appliance, or a vCMP guest on an appliance host, an iptables rule is triggered that results in further outgoing packets to the NTP server to have their destination IP addresses changed to 127.3.0.0, which is not routable and thus causes NTP time syncs to stop.

Conditions:
An NTP server is configured on a BIG-IP system that is either a VE, an appliance, or a vCMP guest on an appliance host, and packets arrive from the configured NTP server destined for an IP address belonging to another machine on the network. This can happen for several reasons:

1) The customer has a device on the same management network doing very low-to-zero volume of traffic over its management port. NTP syncs time less often than the L2 FDB expiration time.

2) The customer is using a L2 topology that uses redundant switches with NIC teaming / bonding, and one of the hosts cuts over to the other switch. This also causes transmits of packets that have no valid L2 FDB entry.

3) An STP topology change occurs in a given network, causing switches to drop L2 FDB entries for relevant hosts and flood unknown unicast destination traffic to all ports of a given VLAN.

4) Any unicast misdirection of NTP traffic to the management port not covered above.

Impact:
NTP time syncing stops on affected BIG-IP systems.

Workaround:
To remove the iptables rule that is causing the problem:

# iptables -t nat -D bpnet-in -p udp --dport 123 -j DNAT --to-destination 127.3.0.0.

Comment out the following line in the function setup_virtual_backplane() in the file /etc/init.d/cluster to prevent the rule from coming back upon reboot:

iptables -t nat -A bpnet-in -p udp --dport 123 -j DNAT --to-destination $int_mgmtip.


499946-1 : Nitrox might report bad records on highly fragmented SSL records

Component: Local Traffic Manager

Symptoms:
When using an AES-GCM cipher on highly fragmented SSL records, platforms with Cavium Nitrox cards might report Bad records.

Conditions:
The negotiated cipher is one of the AES-GCM ciphers, and the MTU is such that the SSL records are highly fragmented.

Impact:
The BIG-IP system disconnects Client SSL connections prematurely. The SSL profile shows a number of Bad records.

Workaround:
None.


499719 : Order Zones statistics would cause database error

Component: Global Traffic Manager (DNS)

Symptoms:
'General database error retrieving information' error in GUI.

Conditions:
This occurs when using the GUI to view Statistics for DNS zones.

Impact:
Not able to view Statistics from GUI for DNS zones.

Workaround:
Use tmsh to view Statistics for DNS zones.


499701 : SIP Filter drops UDP flow when ingressq len limit is reached.

Component: Service Provider

Symptoms:
UDP stats shows increase in the number of flows and valid SIP messages are dropped.

Conditions:
This occurs when an iRule processing delay occurs (session db operations) combined with increase in the SIP incoming flow.

Impact:
SIP UDP flows are dropped.

Workaround:
None.


499620-3 : BIG-IP Edge Client for MAC shows wrong SSL protocol version; does not display the protocol version that was negotiated.

Component: Access Policy Manager

Symptoms:
The BIG-IP Edge Client for Mac shows the wrong SSL protocol version in Details; it does not display the protocol version that was negotiated.

Conditions:
BIG-IP Edge Client for Mac.

Impact:
The BIG-IP Edge Client for Mac displays the incorrect SSL protocol version now in Details.

Workaround:
None.


499615-5 : RAM cache serves zero length documents.

Component: Local Traffic Manager

Symptoms:
RAM cache serves zero length documents.

Conditions:
Forcing caching in an iRule.

Impact:
RAM Cache will cache a HEAD response, if an iRule is configured to force it to do so. This causes RAM cache to serve zero length documents.

Workaround:
If the HTTP operation is a HEAD request, do not cache the response.


499538 : Fragmented ESP packets were getting dropped in BIgIP with MTU = 576

Component: TMOS

Symptoms:
The issue was that the db variable tm.minipfragsize was set to 576 by default on the image 11.5.1-hf6. What this means is that BigIP will not process packets with payload length less than 576 bytes. When MTU is set to 576, the payload length will be 576 - ip header length (20 bytes typically). So the 576 bytes fragmented packets were getting dropped. The workaround for this issue is to set db variable value to 552 so that it passes the ip min size check.

Conditions:
MTU set to 576 on the interface of an intermediate node before BigIP. The value of this db variable tm.minipfragsize set to anything greater than 552. Let ESP packets reach BigIP as fragmented with size 576 bytes. Then we will see the packet drops in BigIP

Impact:
Data traffic is not passing BigIP if ESP is fragmented.

Workaround:
Set the db variable tm.minipfragsize to 552 when the MTU is set to 576 on any node previous to BigIP.


499430-4 : Standby unit might bridge network ingress packets when bridge_in_standby is disabled

Component: Local Traffic Manager

Symptoms:
On a standby unit with a vlangroup configured with multiple VLAN members and bridge_in_standby attribute set to false, the unit might still bridge network ingress packets across the vlangroup, if those packet happen to match the host monitor traffic flows.

Conditions:
This occurs when the following conditions are met: Configure a vlangroup with multiple VLAN members in HA configuration and set vlangroup's bridge_in_standby attribute to false. Configure monitors to use non-default monitor rules (ICMP, etc.).

Impact:
This results in a traffic bridging loop among active and standby unis. Excessive traffic load might take down monitors on the BIG-IP system.

Workaround:
None.


499427-5 : Windows File Check does not work if the filename starts with an ampersand

Component: Access Policy Manager

Symptoms:
Windows File Check does not work if the filename starts with an ampersand.

Conditions:
Run Windows file check and add a file name that starts with an ampersand.

Impact:
Depends upon access policy, but in the worst case a user might be allowed to log in.


499150-1 : OneConnect does not reuse existing connections in VIP targeting VIP configuration

Component: Local Traffic Manager

Symptoms:
Significant increase in Active Connections and Connections per Second for virtual servers that receive connections from another virtual server with the Policy action 'virtual' or iRule command 'virtual' and the client virtual server has a OneConnect profile. The connections per second will match the rate of HTTP requests sent to the server virtual server.

A packet capture would reveal that OneConnect is not reusing previously opened connections, and previously opened connections remain idle until timeout.

Conditions:
This occurs when either of the following conditions are met:

-- Virtual-to-virtual configuration with OneConnect profile.
-- iRule contains the following command: node <ip> <port>.

Impact:
An increase in CPU and memory resources occurs due to the increase in connections established and connections that remain in memory.

Workaround:
If not required, remove the OneConnect profile from the client virtual server.


498992-3 : Troubleshooting enhancement: improve logging details for AWS failover failure.

Component: TMOS

Symptoms:
Logging information on BIG-IP VE for Failover on AWS was inadequate and did not provide the reason for failures in Failover.

Conditions:
Traffic-group failover sometimes failed without providing specific reason for the failure.

Impact:
The lack of logging messages that could pin-point the mis-configuration or connectivity issues on AWS makes it difficult to determine what is causing the Failover to fail.

Workaround:
None


498469-2 : Mac Edge Client fails intermittently with machine certificate inspection

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client for Mac fails intermittently with machine certificate inspection when "Match CN with FQDN" setting is configured.

Conditions:
The problem occurs with BIG-IP Edge Client for Mac and machine certificate agent when in the access policy "Match CN with FQDN" is set.

Impact:
Edge ClienT fails to pass machine certificate inspection.


498227-3 : Incorrect AFM firewall rule counter update after pktclass-daemon restarts.

Component: Advanced Firewall Manager

Symptoms:
Incorrect firewall rule counters are updated upon classifying traffic when rules are re-ordered AND pktclass-daemon is also restarted.

Conditions:
pktclass-daemon restarts and there are active firewall rules present (at any context).

Impact:
While there is no incorrect behavior in matching/classifying traffic, updating incorrect rule counter may lead to impression that traffic is being classified incorrectly.

Workaround:
None


498189-2 : ASM Request log does not show log messages.

Component: Application Security Manager

Symptoms:
The request log does not show log messages related to ASM.

Conditions:
This occurs when first assigning the application logging profile, and then assigning the DOS logging profile on the same virtual server.

Impact:
There will not be log messages related to ASM.

Workaround:
Remove the ASM logging profile, apply and re-add the application logging profile.


497769-3 : Policy Export: BIG-IP does not export redirect URL for "Login Response Page"

Component: Application Security Manager

Symptoms:
ASM does not export redirect URLs in "Login Response Page" for XML policies.

Conditions:
Redirect URL in "Login Response Page" is used in ASM security policy.

Impact:
We fixed an issue with XML policy export where the redirect response page was missing from the security policy.

Workaround:
Use binary policy export for exporting redirection response pages for login url.


497742-4 : Some TCP re-transmits on translucent vlangroup skip bit-flip on source MAC address

Component: Local Traffic Manager

Symptoms:
Some packets re-transmitted as part of a full-proxy, non-SNAT'd TCP virtual server on a translucent-mode vlangroup do not correctly have the translucent-mode bit-flip applied.

Conditions:
This occurs with a translucent vlangroup and full virtual server with no SNAT.

Impact:
Egressing traffic with the source-MAC of another host can potentially lead to traffic loops.

Workaround:
Enable SNAT on the virtual server.


497732-3 : Enabling specific logging may trigger other unrelated events to be logged.

Component: Advanced Firewall Manager

Symptoms:
When logging is enabled for TCP events some internal traffic like UDP could be logged.

Conditions:
When logging is enabled in AFM for TCP events.

Impact:
Some unwanted log messages with show up

Workaround:
There is no work around.


497667-3 : Configuring of ICMPv4/ICMPv6 ip-protocol in mgmt port ACL Rules generated error

Component: Advanced Firewall Manager

Symptoms:
PCCD gives error exhausted; causes inability to activate new mgmt port rules.

Conditions:
The mgmt port is configured as an IPV4 interface and an ICMPv6 protocol rule is applied with the action set to reject or vice-versa.

Impact:
error: resources exhausted; causes inability to activate new mgmt port rules


497584 : The RA bit on DNS response may not be set

Component: Local Traffic Manager

Symptoms:
Under some circumstances, the recursion available (RA) bit may be unset in responses from DNS cache.

Conditions:
If the system caches a message from the authoritative server without the rd bit, and subsequent queries with rd set find that message, the first message will not be used because the rd bit is not set. In this case, the operation falls back to the rrset cache and composes a message, but leaves the RA bit unset. This is appropriate for the transparent cache, but not the non-transparent cache.

Impact:
The impact of this issue is that recursion available is not signaled to clients so they may not treat the DNS cache as an available resolver.

Workaround:
To work around this issue, write an iRule to set the RA bit when the cache is a resolver. Must also check origin for CACHE.


497436-1 : Mac Edge Client behaves erratically while establishing network access connection

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client for Mac does not establish a network access connection, or if it can establish a connection, then it drops the connection. A user might see a cycle of connect/re-connect again.

Conditions:
OS X Yosemite, network access, BIG-IP Edge Client for Mac.

Impact:
User cannot establish network access connection.

Workaround:
None.


497342-3 : TMM crash while executing FLOW_INIT event (with multiple commands that abort the connection) in an iRule attached to an AFM firewall rule.

Component: Advanced Firewall Manager

Symptoms:
Critical system failure due to TMM process restarting.

Conditions:
Following conditions will trigger the TMM crash:

i) AFM rule match triggers an iRule execution.
ii) iRule has one (or more) FLOW_INIT event with 2 (or more) commands that result in aborting the connection (e.g. 'drop' followed by 'reject')

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


497325-4 : New users cannot log in to Windows-based systems after installing BIG-IP EDGE client in certain deployment

Component: Access Policy Manager

Symptoms:
New users cannot log in to Windows-based systems after installing BIG-IP Edge client in certain deployments.

Conditions:
This is a rare, environment-based issue.

Impact:
New users cannot log in to Windows-based systems

Workaround:
Remove \F5 Networks\VPN\client.f5c file.


497304-2 : Unable to delete reconfigured HTTP iApp when auto-sync is enabled

Component: TMOS

Symptoms:
When deleting an HTTP iApp, the system posts errors similar to this in the LTM log, along with similar sync errors in the GUI:

-- err mcpd[6629]: 01070265:3: The HTTP Profile (/Common/http-test-farm1.app/http-test-farm1_http) cannot be deleted because it is in use by a sflow http data source (16).
-- err mcpd[6629]: 01071488:3: Remote transaction for device group /Common/HA_Group to commit id 895 6070871290648001573 /Common/cr-ltm-bb2.ns.uwaterloo.ca 0 failed with error 01070265:3: The HTTP Profile (/Common/http-test-farm1.app/http-test-farm1_http) cannot be deleted because it is in use by a sflow http data source (16).

Conditions:
Auto-sync must be enabled. HTTP iApp must have been reconfigured prior to deleting the iApp.

Impact:
Sync failure. Cannot delete the iApp manually after the error occurs.

Workaround:
Do not use auto-sync. If the sync failure has already occurred, refer to SOL13030: Forcing the mcpd process to reload the BIG-IP configuration (https://support.f5.com/kb/en-us/solutions/public/13000/000/sol13030.html) for information on how to restore configuration sync.


497299-2 : Thales install fails if the BIG-IP system is also configured as the RFS

Component: Local Traffic Manager

Symptoms:
Thales install fails.

Conditions:
This occurs when the BIG-IP system is also configured as the RFS.

Impact:
Cannot use Thales HSM with the BIG-IP system.

Workaround:
In the following procedure, when running nethsm-thales-rfs-install.sh, the script returns the IP address used by the RFS server. Use that IP address when running the 'rfs-setup' command. When prompted with: Did you successfully run the above 'rfs-setup' command on the RFS server? (Yes/No), perform the following steps: 1. Open a new SSH connection to the BIG-IP system. 2. Run the following command: /opt/nfast/bin/rfs-setup --force -g --write-noauth x.x.x.x. 3. Return to nethsm-thales-install.sh SSH screen and answer 'Yes'. The script should now exit with a success message.


497263 : Global whitelist count exhausted prematurely

Component: Advanced Firewall Manager

Symptoms:
You receive an error message with this signature: error 0107181d:3: Cannot create white list entry, maximum limit 8 entries reached.

Conditions:
This can occur when configuring entries on both BIG-IP's in a sync group and syncing them. The whitelist count may be less than 8 but the error is still generated.

Impact:
You may receive an error message while creating a whitelist telling them they've exceeded the global whitelist count limit.

Workaround:
None


497118-1 : Tmm may restart when SAML SLO is triggered

Component: Access Policy Manager

Symptoms:
Tmm restarts when SLO is executed.

Conditions:
BIG-IP is used as SAML SP or IdP, single logout is configured on appropriate objects.

Impact:
tmm may restart

Workaround:
Disable SAML SLO


496998-1 : Update offenders more aggressively. Increase batch size for Dwbld processing.

Component: Performance

Symptoms:
Offenders are not blacklisted fast enough.

Conditions:
DoS configured with auto-blacklisting

Impact:
When DoS doesn't track offenders aggressively, it doesn't report them. Once reported, Dwbld processes the offenders in smaller batches. This impacts how soon an offender is blacklisted.

Workaround:
None


496817-6 : Big-IP Edge client for Windows fails to connect to Firepass server if tunnel is established through a proxy

Component: Access Policy Manager

Symptoms:
In a reconnect scenario, Big-IP Edge Client cannot connect to a FirePass server if the tunnel was established through a proxy server.

Conditions:
Proxy is used to create VPN tunnel.
The server is FirePass.

Impact:
The client fails to restore the VPN connection to the FirePass server.

Workaround:
Restart client.


496775 : [GTM] [big3d] Unable to receive mark LTM virtual server up if there is another VS with same ltm_name for bigip monitor

Component: Global Traffic Manager

Symptoms:
[GTM] [big3d] Unable to mark LTM virtual server up if there is another virtual server with same ltm_name for bigip monitor.

Conditions:
LTM (running BIG-IP software older than v11.2.X) with a virtual server: /Common/http_vip with destination /Common/192.168.10.34:80.

GTM (running BIG-IP software newer than v11.5.0) with this LTM as a BIG-IP Server. Two virtual servers on LTM: One with the original LTM virtual server address, and the other with the translated address: 1. name ltm_http_vip :: destination 192.168.10.34:80 :: monitor /Common/bigip. 2. name ltm_http_trans_vip :: destination 10.10.10.34:80 :: translation-address 192.168.10.34:80 :: monitor /Common/bigip.

Impact:
Both virtual servers are marked up for a brief interval. After a few minutes, one of them is marked down.

Workaround:
You can use either of the following workarounds: -- Use a monitor other than bigip. -- Replace /shared/bin/big3d on the LTM system with a copy of a version v11.2.1 big3d.


496758-1 : Monitor Parameters saved to config in a certain order may not construct parameters correctly

Component: Local Traffic Manager

Symptoms:
When configuring both a monitor and a child monitor, if the two monitors are saved in reverse order, the default monitor parameters will not be created.

For example:

ltm monitor tcp /Common/child {
    defaults-from /Common/parent
    destination *.990
    interval 5
    ip-dscp 0
    time-until-up 0
    timeout 16
}
ltm monitor tcp /Common/parent {
    defaults-from /Common/tcp
    destination *:*
    interval 5
    ip-dscp 0
    time-until-up 0
    timeout 16
}

Some of the default parameters for the above configuration will not be created upon loading config.

Conditions:
This occurs when there are at least two monitors, and the child custom monitor appears before the parent monitor. Must have a parent that derives from a root monitor, and a child that derives from the parent monitor.

Impact:
Possible undefined behavior in bigd, and failing iControl calls. On performing a 'tmsh load sys config verify' the system posts an error message similar to the following: 01070740:3: Performance monitor /Common/http-a may not have the manual resume feature. Unexpected Error: Validating configuration process failed.

Workaround:
A possible workaround involves switching the order of the monitors in the config file. This can either be accomplished manually, or by naming things in alphabetical order, such that the parent precedes the child:

ltm monitor tcp /Common/aaa_parent {
    defaults-from /Common/tcp
    destination *:*
    interval 5
    ip-dscp 0
    time-until-up 0
    timeout 16
}
ltm monitor tcp /Common/bbb_child {
    defaults-from /Common/aaa_parent
    destination *.990
    interval 5
    ip-dscp 0
    time-until-up 0
    timeout 16
}


496679-2 : Configuration loads may fail because the 'default-device' on a traffic-group object does not contain a valid value.

Component: TMOS

Symptoms:
After renaming a CM device object, or performing an upgrade from a version prior to 11.4.0, configuration loads may fail because the 'default-device' on a traffic-group object does not contain a valid value.

Conditions:
This issue occurs when one of the following conditions is met:

-- You load the BIG-IP configuration.
-- You upgrade the BIG-IP system software.
-- You perform a configuration synchronization (ConfigSync) operation for the device group.

The 'default-device' attribute has been deprecated beginning in 11.4.0 in favor of new functionality. Prior to 11.4.0, default-device was used to specify the device-group member that failback tries to make active.

From 11.4.0 and later, when auto-failback is enabled, the system uses the first member of the 'Failover Order' ('ha-order' in tmsh).

In 11.4.0 and later, this field is not used, but will fail validation if it contains a value that does not reference the name of an existing device-group member, or the value 'none'.

Impact:
Although the configuration can be saved, it fails when being loaded (for example, in response to a ConfigSync operation, during software upgrade, or when running the command: 'tmsh load sys config').

Workaround:
Modify any traffic-group default-device attributes that refer to the now-deprecated, default-device name.

Note: The system does not use this value, regardless of how you set it.

To work around this issue, you can modify the traffic-group default-device attribute to refer to default-device none. To do so, perform the following procedure:

1. Log in to the Traffic Management Shell (tmsh) by typing the following command:
tmsh

2. To list the configured default device for a traffic group, use the following command syntax:
list /cm traffic-group <traffic group name>

For example, to list the configured default device for traffic-group-1, type the following command:

list /cm traffic-group traffic-group-1

3. Use none as the default device for your traffic group using the following command syntax:
modify cm traffic-group <traffic group name> default-device <default device name>.

For example, to modify your default device to none for traffic-group-1, type the following command:

modify cm traffic-group traffic-group-1 default-device none

4. Save the configuration changes by typing the following command:
save /sys config


496588-3 : HTTP header that is larger than 64K can be analyzed incorrectly, leading to TMM crash

Component: Local Traffic Manager

Symptoms:
TMM may restart

Impact:
Traffic disrupted while tmm restarts.

Workaround:
There is no workaround.


496498-2 : Firewall rule compilation will fail in certain scenario when there are multiple scheduled AFM rules and one of the non scheduled AFM rule is modified.

Component: Advanced Firewall Manager

Symptoms:
Firewall rule compilation will fail and following message will appear in /var/log/ltm:

Serialization failed: No Blobs available.

pktclass-daemon will transit in the failed state and any further firewall rule modifications will be rejected till the corrective action is taken.

Conditions:
For this issue to manifest, following conditions may suffice:

i) Presence of multiple scheduled firewall rules (expiring at different intervals).
ii) Presence of non scheduled firewall rules.
iii) Modify any non scheduled firewall rules in between the time interval of expiry to any 2 scheduled rules.

Impact:
Firewall rule compilation will fail and pktclass-daemon will go into failed state causing any further firewall rule update to be ignored till user-initiated corrective action is taken.


496278-3 : Disabling/enabling Rule within Rule List causes disabling/enabling of other Rule with the same name

Component: Advanced Firewall Manager

Symptoms:
Disabling/enabling Rule within Rule List causes disabling/enabling of a different but same-named Rule in a single Policy on the Active Rule Page in the GUI.

Conditions:
Only happens it the Rule names are the same with a single policy.

Impact:
Potentially, the incorrect Rule is disabled.

Workaround:
Make sure Rules have different names.


496011-5 : Resets when session awareness enabled

Component: Application Security Manager

Symptoms:
A connection reset may occur when a transaction takes a long time (more than 10 seconds together from the request start till the response end).

Conditions:
The session tracking feature is turned on and long transaction occurs.

Impact:
A connection reset.

Workaround:
Turn off session tracking.


495928-2 : APM RDP connection gets dropped on AFM firewall policy change

Component: Advanced Firewall Manager

Symptoms:
An active RDP connection over APM VPN tunnel gets dropped when administrator makes a change to the AFM firewall policy.

Conditions:
APM tunnel and its application connections are subject to AFM firewall policy.

Impact:
RDP session disconnects and automatically reconnects.

Workaround:
Add an Allow rule to the firewall policy for destination TCP port 3389.


495913-1 : TMM core with CCA-I policy received with uninstall

Component: Policy Enforcement Manager

Symptoms:
If a CCA-I is received with Charging-Rule-Remove AVP for the session then TMM will core.

Conditions:
CCA-I message received with charging-rule-remove AVP

Impact:
Traffic disrupted while tmm restarts.


495901-1 : Tunnel Server crash if probed on loopback listener.

Component: Access Policy Manager

Symptoms:
VPN client might disconnect and reconnect.

Conditions:
Unexpected request is sent on tunnel server loopback listener.

Impact:
Tunnel server crashes resulting in VPN disconnection and reconnection.

Workaround:
None.


495875-4 : Connection limit on nodes causes TMM infinite loop and heartbeat failure with heavy traffic

Component: Local Traffic Manager

Symptoms:
TMM might experience an infinite loop when selecting an available node for load balancing under heavy traffic conditions.

Conditions:
This occurs when the connection limit is specified for nodes, and there is heavy traffic.

Impact:
This causes a 10-second TMM heartbeat failure and a SIGABRT in TMM. The device goes offline and traffic processing is disrupted.

Workaround:
None.


495862 : Virtual status becomes yellow and gets connection limit alert when all pool members forced down

Component: TMOS

Symptoms:
Invalid display of virtual status.

Conditions:
When all pool members forced down and the pool member's connection limit has been reached.

Impact:
Virtual monitor status becomes yellow and receives the following connection limit alert: The pool member's connection limit has been reached.

Workaround:
None.


495702-5 : Mac Edge Client cannot be downloaded sometimes from management UI

Component: Access Policy Manager

Symptoms:
Sometimes BIG-IP Edge Client for Mac cannot be downloaded from the management GUI.

Conditions:
Mac Edge Client, BIG-IP management UI.

Impact:
Mac Edge Client cannot be downloaded.

Workaround:
None.


495698-2 : iRule can be deleted even though it exists in a rule-list

Component: Advanced Firewall Manager

Symptoms:
The rule-list will reference a non existent iRule.

Conditions:
Have a rule-list that contains an iRule, and then delete that iRule.

Impact:
iRule will no longer have an effect, even though it still appears to be contained in the rule-list.

Workaround:
Do not delete an iRule if it is referenced by a rule-list.


495574-1 : DB monitor functionality might cause memory issues

Component: Local Traffic Manager

Symptoms:
TMM restarts continuously.

Conditions:
DB monitors configured

Impact:
System stops responding. System posts message: notice panic: FATAL: mmap of: /dev/mprov/tmm/tmm.4 length 1480589312 offset 4441767936 failed 12 (Cannot allocate memory).

Workaround:
Either kill the DB monitor java process or issue a bigstart restart.


495443-2 : ECDH negotiation failures logged as critical errors.

Component: Local Traffic Manager

Symptoms:
When a failure occurs in an SSL negotiation involving Elliptic Curve Diffie-Hellman (ECDH) key agreement, a critical error may be logged. However, an SSL negotiation failure is not a critical issue.

Conditions:
An SSL negotiation failure involving ECDH key agreement.

Impact:
Spurious critical error logs.

Workaround:
Treat SSL ECDH negotiation failures as non-critical errors.


495390-3 : An error occurs on Active Rules page after attempting to reorder Rules in a Policy

Component: Advanced Firewall Manager

Symptoms:
An error occurs on Active Rules page after attempting to reorder Rules in a Policy: "An error has occurred while trying to process your request."

Conditions:
Attempting to reorder rules if they span more than one page

Impact:
You cannot reorder the rules, and an error message is displayed, "An error has occurred while trying to process your request."


495335-5 : BWC related tmm core

Component: TMOS

Symptoms:
tmm coredumps while BWC is processing packets.

Conditions:
BWC is being enabled on a virtual server that does not have any BWC iRules enabled. Reasons for this are being investigated.

Impact:
Traffic disrupted while tmm restarts.


495319-1 : Connecting to FP with APM edge client is causing corporate network to be inaccessible

Component: Access Policy Manager

Symptoms:
Connecting to FirePass with a BIG-IP Edge Client for Mac that was downloaded from APM might not provide complete network access.

Conditions:
APM Edge Client, Firepass server, network access connection.

Impact:
Incomplete network access.

Workaround:
None.


495265-2 : SAML IdP and SP configured in same access profile not supported

Component: Access Policy Manager

Symptoms:
SLO might not work properly under certain conditions.
When a user attempts to start SLO, the connection gets reset. The system logs messages such as the following: RST sent from x.x.x.x:433 to x.x.x.x:xxxx, [0xxxxxx:xxx] Internal error ((APM::SSO) Error in reading sp info from session db failed)

Conditions:
All conditions must be met:

1. Both BIG-IP as SP and BIG-IP as IdP are configured on the same access profile.
2. SLO is configured for both BIG-IP as IdP and BIG-IP as SP.
3. SLO is executed in multiple TCP sessions between the user's browser and the BIG-IP system.

Impact:
SLO is not properly executed; users's session might not be terminated.

Workaround:
None.


495253-2 : TMM may core in low memory situations during SSL egress handling

Component: Local Traffic Manager

Symptoms:
TMM may core in low memory situations during SSL egress handling.

Conditions:
This occurs when the following conditions are met: -- Low memory. -- SSL connections

Impact:
Traffic disrupted while tmm restarts.


495128-4 : Safari 8 continues using proxy for network access resource in some cases when it shouldn't

Component: Access Policy Manager

Symptoms:
If a client machine uses proxy and Network Access does not specify any proxy, then Safari should not use proxy for some Network Access resource after the Network Access tunnel is created. However, Safari does so.

This problem occurs with Safari 8. Other versions of Safari and other browsers work as expected in our testing.
Apple has been notified: rdar://problem/18651124

Conditions:
The problem occurs when all of these conditions exist:
1. OS = Mac OS X Yosemite.

2. Configuration = Client machine has local proxy configured and Network Access on BIG-IP system access policy does not specify any proxy.

3. Action = Accessing Network Access resource after tunnel is created.

Impact:
As a result, some Network Access resource might be unavailable.

Workaround:
There is no workaround at this time.


494743-3 : Port exhaustion errors on VIPRION 4800 when using CGNAT

Component: Carrier-Grade NAT

Symptoms:
You may see the following on a VIPRION 4800 platform configured to use LSN deterministic NAT:

crit tmm3[12240]: 01010201:2: Inet port exhaustion on ...

Conditions:
VIPRION 4800 platform with multiple blades with LSN deterministic NAT

Impact:
DNAT port exhaustion alert,

Workaround:
Change LSN Pool members for LSN deterministic NAT pools, which will trigger a deterministic NAT data rebuild.


494367 : HSB lockup after HiGig MAC reset

Component: TMOS

Symptoms:
HSB lockups can occur after a HiGig MAC reset on BIG-IP 5000-series and 7000-series platforms.

Conditions:
This occurs after a HiGig MAC reset on BIG-IP 5000-series and 7000-series platforms.

Impact:
An HSB lockup results in a NIC failsafe and reboot of the unit. The system posts messages similar to the following in the LTM log: -- bcm56xxd[8161]: 012c0015:6: Link: 4.1 is DOWN. -- bcm56xxd[8161]: 012c0012:6: Reset HSBe2 (bus 1) HGM0 MAC completed on higig2 link 4.1 down event. -- bcm56xxd[8161]: 012c0015:6: Link: 4.1 is UP. ... -- tmm2[13842]: 01230111:2: Interface 0.3: HSB DMA lockup on transmitter failure.

Workaround:
None.


494322-1 : The HTTP_REQUEST iRule event may cause the TMM to crash if the explicit proxy is used

Component: Local Traffic Manager

Symptoms:
If the flow inside a HTTP_REQUEST event raised by the explicit proxy is expired, the TMM may crash.

Conditions:
The explicit proxy is configured for HTTP, and the HTTP_REQUEST iRule event is used.

Impact:
If state-changing commands are used within the HTTP_REQUEST event raised by the explicit proxy, they may not work correctly, and TMM might crash.

Workaround:
Avoid the HTTP_REQUEST event if possible.


494284-1 : Mac Edge Client, with primary language of German shows unneeded text shown under disconnected status.

Component: Access Policy Manager

Symptoms:
With BIG-IP Edge Client for Mac, when primary language is set to German on the Mac, the text shown under the disconnected status contains extra, unneeded text wording.

Conditions:
Edge Client for Mac, when primary language is set to German on the Mac.

Impact:
Shows the following message: 'Um eine Verbindung herzustellen, wählen Sie aus dem Menü oben einen Server aus, und klicken Sie dann auf die Schaltfläche 'Auto-Verbindung' oder 'Verbinden' sichern und Werner der Seite standen aufs Auge drücken als Schadenersatz einer Woche kein Telefonat erneute.'

Workaround:
None.


494280-1 : TMM crashes when PPTP finds a redirected flow when checking for an existing tunnel

Component: Carrier-Grade NAT

Symptoms:
TMM crashes when PPTP finds a redirected flow when checking for an existing tunnel.

Conditions:
PPTP-ALG and CGNAT on a chassis system when a blade has been added with a stale PPTP tunnel.

Impact:
Traffic disrupted while tmm restarts.


494176-4 : Network access to FP does not work on Yosemite using APM Mac Edge Client.

Component: Access Policy Manager

Symptoms:
If APM BIG-IP Edge Client for Mac on OS X Yosemite attempts to connect to FirePass, network access cannot be established.

Conditions:
APM Edge Client for Mac on OS X Yosemite connecting to FirePass.

Impact:
Network access cannot be established with FirePass.

Workaround:
None.


494122-4 : Deterministic NAT state information from HSL is not usable on VIPRION B4300 blades

Component: Carrier-Grade NAT

Symptoms:
Deterministic NAT HSL state information is not useable by dnatutil, resulting in "Unparseable line" error.

Conditions:
Deterministic NAT and HSL logging for LSN pool on a VIPRION B4300 blade.

Impact:
Cannot use the HSL logged state information for dnatutil.

Workaround:
Use LTM logged deterministic NAT state information.


494098-3 : PAC file download mechanism race condition

Component: Access Policy Manager

Symptoms:
PAC file download mechanism might encounter a race condition if /etc/hosts is patched with the static entry of the host that contains PAC file.

Conditions:
The /etc/hosts is patched with the static entry of the host that contains PAC file.

Impact:
Proxy PAC file fails to download.

Workaround:
Add delay in proxy PAC file download to avoid race condition.


494088-2 : APD or APMD should not assert when it can do more by logging error message before exiting.

Component: Access Policy Manager

Symptoms:
APD or APMD asserts and exits without logging error messages to aid in debugging the error.

Conditions:
In some rare situation apmd (for example, access 'profile not found', failure in 'loading policy object'), APD, APMD assert. This results in dumping core.

Impact:
Restarting of APD, APMD and core file.

Workaround:
None.


494084-1 : Certain rapidly-terminating UDP virtuals may core on standby

Component: Local Traffic Manager

Symptoms:
Based on an internal race condition, it is possible for certain flows to cause cores on standby BIG-IPs when using connection mirroring on layer 7 VIPs. This does not apply to use of mirroring on Performance or Performance (HTTP) virtuals.

Conditions:
Standard UDP virtual using connection mirroring.

Impact:
Restart of the standby tmm. No connections are affected, though if packets are set to require acknowledgements from the standby there may be a brief delay in processing for some or all connections.


494008-1 : tmm crash while initializing the URL filter context for SWG.

Component: Access Policy Manager

Symptoms:
tmm crash while initializing the URL filter context for SWG.

Conditions:
It is not known what triggers this crash. It may be connected to BIG-IP being unable to update the SWG database.

Impact:
Traffic disrupted while tmm restarts.


493825-3 : Upgrade failure from version 11.4.0 due to incorrect configuration being saved

Component: Application Visibility and Reporting

Symptoms:
Upgrade failure, after saving a custom filter based on a client IP address in the Requests logs, loading the configuration, or upgrading from it, might fail.

Conditions:
After saving a custom filter based on a client IP address in the Requests logs.

Impact:
Configuration is not loaded.

Workaround:
Edit /config/bigip.conf, search for the following line, and delete it: values { \? }.


493807-6 : TMM might crash when using PPTP with profile logging enabled

Component: Carrier-Grade NAT

Symptoms:
TMM might crash when using PPTP with profile logging enabled.

Conditions:
This occurs when the following conditions are met: -- PPTP-ALG with log profile enabled. -- CGNAT configured.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable logging from the PPTP profile.


493558 : TMM core due to SACK hole value mismatch

Component: Local Traffic Manager

Symptoms:
TMM cores with 'sack scoreboard population counts valid' assert. The TMM core occurs due to lost-packet retransmitted packet value mismatch.

Conditions:
This occurs when processing retransmitted packets configured for selective acknowledgement (SACK), when multipath TCP (MPTCP) and selective negative acknowledgement (SNACK) are enabled with a SNACK-supporting client.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
There are two possible workarounds: -- Disable MPTCP. -- Disable the SNACK option in the TCP profile.


493487-1 : Function::call() and Function::apply() wrapping does not work as expected

Component: Access Policy Manager

Symptoms:
Function::call() and Function::apply() wrapping does not work as expected.

Conditions:
This occurs when using an indirect method call.

Impact:
Possible Adobe Flash web application malfunction, but the symptoms can vary.


493360-3 : Fixed possible issue causing Edge Client to crash during reconnect

Component: Access Policy Manager

Symptoms:
Edge Client may rarely crash during reconnect.

Conditions:
Session reconnection using Edge Client. When APM session closes on BIG-IP (by a timeout, or by other options, for example, 'Restrict to Single Client IP') the Edge Client starts new session. Occasionally when reestablishing connection to the BIG-IP system, the Edge Client crashes.

Impact:
Rarely encountered crash.

Workaround:
None.


493275-2 : Restoring UCS file breaks auto-sync requiring forced sync.

Component: TMOS

Symptoms:
Automatic sync will temporarily not work after loading a UCS.

Conditions:
Load of a UCS on an affected hotfix.

Impact:
Until a manual sync is done, auto-sync will not occur.

Workaround:
Perform a forced manual sync and then the system will return to operation.


493234 : Device version in AFM log message could be empty

Component: Advanced Firewall Manager

Symptoms:
Device version in AFM log message could be empty

Conditions:
When a log message is generated for AFM events

Impact:
Log message will not have device version


493164-1 : flash.net.NetConnection::connect() has an erroneous security check

Component: Access Policy Manager

Symptoms:
Accessing some content in a different domain does not work as expected because of an erroneous security check.

Conditions:
This occurs when getting a URI property immediately after calling the connect() method.

Impact:
Possible Flash web application malfunction, but symptoms vary.


493140-4 : Incorrect persistence entries are created when invoking cookie hash persistence within an iRule using offset and length parameters.

Component: Local Traffic Manager

Symptoms:
When using a cookie hash persistence profile and an iRule to provide finer granularity using offset and length parameters to calculate the hash, the system creates incorrect persistence entries.

Conditions:
Cookie hash persistence profile and iRule on top of that specifies offset and length of the cookie to be used for hashing is needed.

Impact:
Incorrect persistence entries are created.


493117-4 : Changing the netmask on an advertised virtual address causes it to stop being advertised until tmrouted is restarted

Component: Local Traffic Manager

Symptoms:
After changing the netmask of an advertised virtual address, the address is no longer advertised.

Conditions:
Must have an advertised virtual address, and change its netmask.

Impact:
tmrouted must be restarted whenever the netmask of an advertised virtual address is changed.

Workaround:
Restart tmrouted whenever the netmask of an advertised virtual address is changed.


493023-2 : Export of huge policies might ends up with 'too many pipes opened' error

Component: Access Policy Manager

Symptoms:
Export of huge policies might ends up with 'too many pipes opened' error. Policy must be >321 elements

Conditions:
Huge policy (300+ elements i.e. ~100 items)

Impact:
It's not possible to export access policy

Workaround:
N/A


492701-1 : Resolved LSOs are overwritten by source device in new Policy Sync with new LSO

Component: Access Policy Manager

Symptoms:
Previously resolved Location-Specific Object (LSO) on target devices are overwritten by values on source device in a new Policy Sync operation with new LSO to resolve.

Conditions:
Perform a Policy Sync on a profile with LSO, make changes to the LSO on resolution.
Perform another Policy Sync on the same profile with new LSO that requires resolution

Impact:
Previously customized values for LSO on target device are lost.

Workaround:
Config the value back on target device after the new sync.


492352-1 : Mismatch ckcName between GUI and TMSH can cause upgrade failure

Component: Local Traffic Manager

Symptoms:
Make the ckcName of clientssl_certkeychain same as TMSH.
Case 1: clientssl_certkeychain includes key/cert
TMSH uses <key-name> as ckcName
GUI uses <key-name>.key as ckcName
Case 2: clientssl_certkeychain includes key/cert/chain
TMSH uses <key-name>_<chain-name> as ckcName
GUI uses <key-name>.key as ckcName
The fix is making GUI same as TMSH.

Conditions:
Use GUI to create one SSL profile, then upgrade it.

Impact:
The upgrade failure since the mismatch ckcName between GUI and TMSH.


492238-4 : When logging out of Office 365 TMM may restart

Component: Access Policy Manager

Symptoms:
TMM may restart when a user initiates single logout (SLO) from Microsoft Office 365 configured as a SAML Service Provider (SP).

Conditions:
The problem occurs under these conditions: 1. The BIG-IP system is configured as a SAML Identity Provider (IdP) with Office 365 configured as a SAML Service Provider (SP).
2. Single logout (SLO) is configured on the BIG-IP system.
3. As a part of a SLO request, the SP sends unsupported query parameters.

Impact:
Under certain conditions TMM may restart.

Workaround:
To work around the problem, disable SLO on the BIG-IP system.


492153-6 : Edge clients shuts down the DTLS channel if the state of IP address on the adapter that was used to build the tunnel, changes to deprecated.

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client shuts down the DTLS channel if the state of IP address on the adapter that was used to build the tunnel changes to deprecated.

Conditions:
BIG-IP Edge Client monitors the state of IP address for the DTLS tunnel, so the system can react quickly to any network connectivity issues. The monitor correctly disconnects the tunnel if the adapter loses the IP address. However, there is an issue that causes the tunnel to shut down when the state of IP address is changed to deprecated.

Impact:
Tunnel processing halts.


491894 : Sync status may temporarily go red during full sync

Component: TMOS

Symptoms:
A sync group may go red and log an sync error while a full sync is still in process.

Conditions:
Unknown

Impact:
The state of the sync group goes red momentarily and a log is produced (Device group '/Common/device-group-failover-67faa25ad625' sync inconsistent,
Sync failed on one or more devices in this devicegroup, Sync status may not be consistent), however the sync eventually succeeds.

Workaround:
None.


491771-6 : Parking command called from inside catch statement

Component: Local Traffic Manager

Symptoms:
If inside a proc or control statement (if, for, while) and a parking command (like table, session, open, send, RESOLVE::lookup) which is called from catch statement followed by a command which results in TCL error (caught), TMM will core with SIGFPE panic and this message:

    panic: TclExecuteByteCode execution failure: end stack top < start stack top

Example (THIS CODE MAY CAUSE TMM TO CRASH if this procedure is called):
    proc id491771 {
        # WILL CAUSE TMM TO CRASH
        catch { [table lookup "key"] }
    }

The correct usage of "catch" is without the brackets:
    proc id491771 {
        catch { table lookup "key" }
    }

Conditions:
1) A parking command like "table"
2) The very next operation generates an error
3) Both commands are inside a "catch" block
4) And this catch block exists within a proc or control statement (e.g., if, for, while)

Impact:
TMM cores with a SIGFPE and this panic string:

    panic: TclExecuteByteCode execution failure: end stack top < start stack top

Workaround:
Any command which completes without parking after the parking command but before the error will prevent the issue. For instance

set A "a"

Another solution is to move "catch" statement outside of proc or control statement into body of script.

Alternately remove the square brackets that indicate that the result of the command should be evaluated in this specific case. The use of brackets in this way is likely a mistake in coding of the iRule.


491556-3 : tmsh show sys connection output is corrected

Component: TMOS

Symptoms:
tmsh show sys connection output is corrupted for certain user roles.

Conditions:
This occurs for users with user roles that do not have access to all partitions.

Impact:
The output from tmsh show sys connection is corrupted. After issuing this command, the output of subsequent tmsh commands might not be correct or complete.

Workaround:
Quit out of tmsh. Restart the shell. Do not use the show sys connection command for users that do not have access to all partitions. Use the GUI instead to get this information.


491518-1 : SSL persistence can prematurely terminate TCP connection

Component: Local Traffic Manager

Symptoms:
SSL [session id] persistence might prematurely close (FIN) a TCP connection before forwarding all data.

Conditions:
SSL persistence must be in use. A slow client side (WAN) exacerbates the issue.

Impact:
Premature close of TCP connection and potential data loss.

Workaround:
Disable SSL persistence.


491478-2 : EAM is a CMP plugin and spins up one thread per TMM.

Component: Access Policy Manager

Symptoms:
When OAM is enabled on a virtual, an 'eam' v1 plugin profile is added to the virtual. Due to ht-split performance changes (specifically addition of "plugin_threads" field in BZ439449the eam plugin profile claims to be a CMP-enabled plugin but forces the thread count to 1. This causes the number of MPI devices to be 0, thus no channel is spun up - all connections through the virtual result in "No plugin configuration found" error in /var/log/ltm and the connection is reset.

 SYMPTOM:

Virtuals with OAM enabled do not pass traffic - "No plugin configuration found" errors in /var/log/ltm

Conditions:
HTTP virtual with OAM enabled

Impact:
Traffic outage on OAM-enabled virtuals

Workaround:
hand-edit of /defaults/config_base.conf

        plugin_threads {
            class-name profile_eam
            container none
            instance-name eam
            value "1" <-- change this to "tmms"
        }


491454-2 : SSL negotiation may fail when SPDY profile is enabled

Component: Local Traffic Manager

Symptoms:
SSL handshake fails when SPDY profile is attached.

Conditions:
This occurs when the following conditions are met: -- Client (i.e., Chrome for Android) attempts to use SPDY protocol using Next Protocol Negotiation (NPN) during SSL handshake. -- BIG-IP system has a Cavium Nitrox card.

Impact:
SSL handshake or other connection failure.

Workaround:
Remove SPDY profile.


491233-4 : Rare deadlock in CustomDialer component

Component: Access Policy Manager

Symptoms:
Windows 7 systems hang at a black screen after a reboot. This requires a hard boot to resolve.

Conditions:
CustomDialer component.

Impact:
Cannot log in. Requires hard boot to resolve.


491030-4 : Nitrox crypto accelerator can sometimes hang when encrypting SSL records

Component: Local Traffic Manager

Symptoms:
Sometimes when encrypting certain SSL records, the Cavium Nitrox crypto accelerator can hang with the LTM log message "request queue stuck".

Conditions:
Certain SSL records on a system with a Cavium Nitrox card.

Impact:
Nitrox crypto accelerator can hang.

Workaround:
This issue has no workaround at this time.


490893-1 : Determinstic NAT State information incomplete for HSL log format

Component: Carrier-Grade NAT

Symptoms:
Deterministic NAT state information incomplete for HSL log format, could possibly result in incorrect reverse and forward map for dnatutil when using with HSL logged state information.

Conditions:
Found to affect VIPRION B2250 blades with HTSPLIT enabled, when using dnatutil with HSL logged deterministic NAT state for reverse map.

Impact:
Reverse and forward map could be incorrect when use with HSL logged deterministic NAT state information.

Workaround:
Use LTM logged deterministic NAT state information for reverse or forward map.


490844-1 : Some controls on a web page might stop working.

Component: Access Policy Manager

Symptoms:
Some controls on a web page might stop working.

Conditions:
Some events with that execute in web applications.

Impact:
Unexpected web application malfunctions.

Workaround:
Create an iRule specific to each case.


490817-4 : SSL filter might report codec alerts repeatedly

Component: Local Traffic Manager

Symptoms:
TMM cores due to Out of Memory (OOM), and xdata is the majority of the memory consumption.

Conditions:
The SSL enters a failure mode where it appears to transmit alert messages repeatedly until TMM is OOM, which causes the transmissions to stop due to lack of memory. TMM then cores due to lack of memory.

Impact:
The system might crash. (Massive xfrag usage, degraded performance, eventual TMM OOM.)


490811-3 : Proxy configuration might not to be restored correctly in some rare cases

Component: Access Policy Manager

Symptoms:
Local proxy configuration on Mac OS X might not to be restored correctly in some rare cases.

Conditions:
BIG-IP Edge Client for Mac is connected, tunnel drops for some reason, race condition happens during proxy configuration restoration which causes it to not be restored properly.

Impact:
Proxy configuration might not to be restored correctly in some rare case.

Workaround:
None


490740-5 : TMM may assert if HTTP is disabled by another filter while it is parked

Component: Local Traffic Manager

Symptoms:
If HTTP is parked in an iRule, if it is disabled by another filter on the client-side it will assert with the message:
TCL passthrough switch state only valid server-side.

Conditions:
A HTTP iRule on the client side parks. Another filter tells HTTP to disable itself.

Impact:
The impact of this issue is that the TMM will crash.

Workaround:
Avoid using HTTP::disable in iRules that can run simultaneously with with iRules triggered by the HTTP filter.

Instead, disable


490713-4 : FTP port might occasionally be reused faster than expected

Component: Local Traffic Manager

Symptoms:
FTP port is randomly selected and occasionally might be reused quickly.

Conditions:
FTP active mode. Source Port is set to change.

Impact:
FTP port might occasionally be reused faster than expected.


490681-3 : Memcache entry for dynamic user leaks

Component: Access Policy Manager

Symptoms:
A race condition causes a memcache entry to remain in memcache forever.

Conditions:
Due to a race condition between identifying dynamic users in MySQL and removing them from memcache (based on timestamp), some memcache entries remain. Although the entry is removed from MySQL, it remains in memcache.

Impact:
The user state information for the user remains unchanged. If the user is locked out in memcache, the user state remains locked out.

Workaround:
The only way to recover is to remove the user using telnet to access memcache (which is not a typical operation and is difficult to perform).


490675-2 : User name with leading or trailing spaces creates problems.

Component: Access Policy Manager

Symptoms:
User creates dynamic user with leading and trailing spaces. In the case user name will look like " user1 ". When the user entry gets created in MySQL it treats the user name " user1 " same as "user1", by eliminating the spaces at the beginning and the end. The memcache entry does not do the same.

Conditions:
Create a dynamic user with a regular name. Then retry the same username with leading and trailing spaces. There will be multiple entries for the same user (one regular and another with spaces). When the dynamic user gets deleted, the regular user name is deleted from memcache and from MySQL; the other user entry remains in memcache.

Impact:
Unnecessary memcache entries.

Workaround:
This issue has no workaround at this time.


490537-7 : Persistence Records display in GUI might cause system crash with large number of records

Component: TMOS

Symptoms:
Using the GUI to view Persistence Records statistics in GUI when there are a large number of records might crash the system. (Persistence Records are available for LTM and GTM by navigating to Statistics :: Module Statistics, clicking on Local Traffic, DNS Delivery, or DNS GSLB and then selecting 'Persistence Records' for Statistics Type.)

Conditions:
This occurs when viewing statistics in the GUI for a large number of Persistence Records (approximately 100,000 but the number might depend on system configuration and capacity)

Impact:
The system runs out of memory and fails over.

Workaround:
Use TMSH to see Persistence Records and associated statistics.
For LTM and GTM Delivery: tmsh show ltm persistence persist-records.
For GTM GSLB: tmsh show gtm persist destination | level | target-name | key | max-results | target-type.


490480-2 : UCS load may fail if the UCS contains FIPS keys with names containing dot

Component: Local Traffic Manager

Symptoms:
UCS load may fail if the UCS file contains FIPS keys with names containing dot ( . ).

Conditions:
This occurs when the configuration includes at least one FIPS key with name containing a dot ( . ).

Impact:
UCS loading fails.


490284-2 : ASM user interface extremely slow to respond (e.g. >2 minutes to render policy list)

Component: Application Security Manager

Symptoms:
ASM screens take a long time to load, MySQL spikes in usage.

Conditions:
Occurs after several thousand policy configuration changes have been made to the system.

Impact:
Slow ASM user interface pages.

Workaround:
There is no workaround at this time.


490225-2 : Duplicate DNSSEC keys can cause failed upgrade.

Component: Local Traffic Manager

Symptoms:
When DNSSEC keys are stored in HSM and the system is upgraded, config load can fail because of duplicate keys in HSM.

Conditions:
DNSSEC keys in HSM. Upgrade or UCS load of configuration that contains the same keys.

Impact:
Failed upgrade or config load.

Workaround:
None.


490121 : Incorrect reporting of PVA current and maximum connection with SERVER_CONNECTED event

Component: Local Traffic Manager

Symptoms:
PVA current and maximum stats are incorrectly reported when using a FastL4 profile with a SERVER_CONNECTED iRule event. For each connection that is established, the current connection count is incremented twice and decremented only once when the connection is terminated. This leads to a lingering connection, which skews the stats.

Conditions:
A fastL4 virtual with a SERVER_CONNECTED iRule event.

Impact:
The current and maximum PVA stats are incorrectly reported.

Workaround:
This issue has no workaround at this time.


489750-1 : Deletion of FIPS keys by-handle may delete key in FIPS-card even if key exists in BIG-IP config

Component: TMOS

Symptoms:
11.4.0 onwards, deletion of FIPS keys by-handle is expected to throw error if the BIG-IP config contains that key object. However, if the key name is different from the FIPS-label of the key, such deletion by-handle will delete key from FIPS card without checking BIG-IP config. It will not delete that key from BIG-IP config.

Conditions:
Delete FIPS key by-handle using tmsh when the key name is different from the FIPS-label of the key.

Impact:
FIPS key deletion by-handle may not throw expected error when the FIPS handle corresponds to a key in the BIG-IP config and will delete the key from FIPS card without deleting the key in the BIG-IP config.

Workaround:
First, FIPS key deletion by-handle should be used only for FIPS key handles that don't have corresponding key objects in the BIG-IP config.

If the FIPS key deletion was desired and by-handle deletion is already performed which did not delete the key from BIG-IP config, then follow the below workaround:

After executing:
'tmsh delete sys crypto fips by-handle <handle-number>'

check if the corresponding key still exists in BIG-IP config by executing:
'tmsh list sys crypto key'

If the concerned key did not get deleted, execute:
'tmsh delete sys crypto key <keyname>'


489705-4 : Running out of memory while parsing large XML SOAP requests

Component: Application Security Manager

Symptoms:
Running out of memory while parsing large XML SOAP requests.

Conditions:
System parses as XML a large multipart file upload.

Impact:
Unnecessary memory allocations which could cause the Enforcer to run out of memory. The system posts an error similar to the following: 'ASM out of memory error: event code X239 Exceeded maximum memory assigned for XML/JSON processing'.


489682-2 : Configuration upgrade failure due to change in an ASM predefined report name

Component: Application Visibility and Reporting

Symptoms:
A configuration load failure occurs after creating an ASM predefined report in a previous version and upgrading.

Conditions:
Define scheduled report on top of "Top alerted URLs" on 11.3.0 and upgrade the version.

Impact:
Version upgrade fails (the BIG-IP becomes unusable).

Workaround:
Change the "/Common/Top Alerted URLs" reference in the bigip.conf file of the UCS to "/Common/Top Alarmed URLs", and then load the modified UCS.


489451-1 : TMM might panic due to OpenSSL failure during handshake generation

Component: Local Traffic Manager

Symptoms:
TMM might panic due to OpenSSL failure during handshake generation.

Conditions:
Low memory. Software-based SSL handshake generation.

Impact:
TMM outage.


489382-4 : Machine Cert allows mismatched SubjectCN and FQDN for browsers in case of valid cert

Component: Access Policy Manager

Symptoms:
Browser clients allow Machine Cert Auth agent to pass even if the match SubjectCN and FQDN criteria is not satisfied.
It only happens if the selected certificate is recognized by the BIG-IP system but does not fit the Machine Cert Auth selection criteria.

Conditions:
The problem occurs with a Mac and the browser client, with the Machine Cert Auth agent in the access policy, and a valid certificate.

Impact:
Browser allows network access to be established even though it should not

Workaround:
To work around the problem, add more search criteria in the Machine Cert Auth agent.


489328-6 : When BIG-IP virtual accessed with multiple tabs with long initial URLs before session creation can cause TMM crash.

Component: Access Policy Manager

Symptoms:
If a BIG-IP virtual server is accessed from multiple tabs with long initial URLs before session creation, this might cause TMM to crash.

Conditions:
Rare condition: a user opens the browser and different tabs in the browser pointing to BIG-IP APM virtual server and they cause the access policy to run from both tabs. If the length of the encoded URL falls into 4K boundary then TMM might crash.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


489259-1 : [AFM] packets from good ip's are being dropped by DoS Sweep & Flood logic

Component: Performance

Symptoms:
Rate tracker library is not accurate.

Conditions:
When traffic is at very low rate.

Impact:
Traffic from good IP addresses could end up being dropped.

Workaround:
None


489217-5 : "cipher" memory can leak

Component: Local Traffic Manager

Symptoms:
When performing SSL handshakes, memory usage can increase. Examining "cipher" memory in the "memory_usage_stat" may show large amounts of "cipher"memory allocated.

Conditions:
BIG-IP performing SSL handshakes.

Impact:
Memory usage increases until no more memory is available.


489113-1 : PVA status, statistics not shown correctly in UI

Component: TMOS

Symptoms:
When affected versions of BIG-IP are running on VIPRION B2250 blades, the PVA status and statistics are not displayed correctly (missing entirely) from the user interface.

Conditions:
VIPRION B2250 blades running affected versions of BIG-IP.

Impact:
PVA appears to be disabled/unavailable.
PVA statistics are not available.
PVA functionality is actually enabled and operating in the data plane.

Workaround:
Example of incorrect display:
# guishell -c 'select name,has_pva,pva_version from platform'
--------------------------------
| NAME | HAS_PVA | PVA_VERSION |
--------------------------------
| A112 | false | | <<< incorrect
--------------------------------

# tmsh show ltm virtual
------------------------------------------------------------------
Ltm::Virtual Server: vs1
------------------------------------------------------------------
Status
  Availability : unknown
  State : enabled
  Reason : The children pool member(s) either don't have service checking enabled, or service check results are not available yet
  CMP : enabled
  CMP Mode : all-cpus
  Destination : 30.30.30.1:80
              <<< missing 'PVA Acceleration' item


488986-3 : Access policy cannot enter Windows Protected Workspace on Internet Explorer versions 10 and 11, and edge client.

Component: Access Policy Manager

Symptoms:
An access policy cannot enter Windows Protected Workspace on Internet Explorer versions 10 and 11, and Windows Edge client.

Conditions:
Internet Explorer versions 10 and 11.

Impact:
Access policy cannot enter Windows Protected Workspace.

Workaround:
Use a browser other than Internet Explorer versions 10 and 11.


488892-1 : JavaRDP client disconnects

Component: Access Policy Manager

Symptoms:
JavaRDP client disconnects user's session when user interacts before the handshake is complete.

Conditions:
The might occur when the network connection is slow but the user is fast enough to click the mouse within the client area or press a key on the keyboard. In this case the RDP client attempts to send this input event to the server.

Impact:
Because the RDP handshake is not completed at this point, the server aborts the connection.

Workaround:
Do not interact within the client area before the window fills with an image from the server. When that occurs, the connection is clearly established and all handshakes are completed.


488876-1 : SSL persistence uses noticeably more memory

Component: Local Traffic Manager

Symptoms:
In releases prior to 11.4.0, SSL persistence used very little memory. Beginning in version 11.4.0 and continuing, the amount of memory has increased.

Conditions:
This occurs when SSL persistence is enabled.

Impact:
This results in less memory being available for other flows, and might eventually result in TMM being out of memory.

Workaround:
None.


488736-3 : Fixed problem with iNotes 9 Instant Messaging

Component: Access Policy Manager

Symptoms:
iNotes 9 IM (Sametime) is not working. There are errors in JS Console.

Conditions:
User is connected to iNotes 9 through Portal Access.

Impact:
Sametime in iNotes 9 is not accessible.

Workaround:
No


488374-1 : Mismatched IPsec policy configuration causes racoon to core after failed IPsec tunnel negotiation

Component: TMOS

Symptoms:
Mismatched IPsec policy configuration causes racoon to core intermittently after failed IPsec tunnel negotiation.

Conditions:
During IPsec Tunnel negotiation, IKE Phase 1 negotiation succeeds and ISAKMP security association is created, but phase 2 (Quick mode) for IPsec security associations fails due to mismatched IPsec policy configuration. This intermittent error occurs because of a memory issue that causes heap corruption.

Impact:
Intermittently, the racoon daemon cores and crashes when there are earlier failed phase 2 negotiations.

Workaround:
Make sure IPsec policies such as encryption/authentication algorithms for the data going through IPsec tunnel on the remote device match the IPsec policy configured on the BIG-IP system for the same IPsec Tunnel.


488262-3 : moving VLAN from route-domain being deleted in the same transaction can cause errors

Component: TMOS

Symptoms:
Error can occur when removing VLAN(s) from route-domain, and deleting the said route-domain in the same transaction can cause errors.

Conditions:
In a transaction, removing the VLAN membership from route-domain, and deleting the same route-domain.

Impact:
Transactional deletion of route-domain and route-domain VLAN membership changes in the same transaction.

Workaround:
Perform route-domain VLAN changes, and route-domain deletion in different transaction.


488193-1 : iRule nexthop is not considered after failover with IP forwarding virtual server.

Component: Local Traffic Manager

Symptoms:
The iRule nexthop selection is not considered after failover with IP forwarding virtual server.

Conditions:
This occurs when using the FastL4 profile in a high availability configuration.

Impact:
Client connections disconnect after failover.

Workaround:
To work around this issue, have the nexthop as a member in a pool and use the iRule pool command.


487757-1 : Hybrid higig/front panel port packet discard (Ingress back-pressure v.s. Egress queue discard) counts can be expected during bursty or severe MMU traffic congestion on B4300/B2200/10000/12000-family platforms.

Component: Local Traffic Manager

Symptoms:
Different discard configurations as set on B4300/B2200/10000/12000-family platform interfaces, may result in different packet discard type counts, when the switch encounters bursty or severe MMU congestion.

Conditions:
Dissimilar congestion discard counts observed for switch ports supporting normal v.s. extended unicast queues.

Impact:
When switch ports encounters congestion, ports supporting extended unicast queue ports may show ingress back-pressure discard counts, as opposed to egress queue discard counts for ports supporting regular unicast queue ports.

Workaround:
None.


487660 : LSN translation failures when persistence is enabled, cmp-hash is set to src-ip on ingress VLAN and to dst-ip on egress VLAN and using a small port range

Component: Carrier-Grade NAT

Symptoms:
LSN Translation failures in persistence mode when cmp-hash is set to src-ip on ingress VLAN and to dst-ip on egress VLAN.

Conditions:
Persistence is enabled on the LSN pool, and cmp-hash is set to src-ip on ingress VLAN and to dst-ip on egress VLAN, when the lsn-pool port range is relatively small (under 1000), or a blade is added or removed. Translation mode is NAPT or PBA.

Impact:
Translation failures. The system posts an error similar to the following: debug tmm9[25268]: 01670012:7: [0.9] Translation failed client 200.200.200.101,10096.

Workaround:
Adequately provision the LSN pool.


487567-2 : Addition of a DoS Profile Along with a Required Profile May Fail

Component: TMOS

Symptoms:
Certain DoS Profiles require a preliminary profile to be attached as well. For example DNS enabled DoS profile may require DNS profile to be attached first. However in cases where both profiles are being attached at the same time, an error may be thrown telling the user that the required profile is not attached.

Conditions:
A DoS profile needs to be attached at the same time with its required profile. For example, Application DoS Profile requires HTTP profile to be attached as well.

Impact:
If you have such DoS profiles in use and attach such profiles in single transaction you may be affected (GUI operations or iControl REST api).

Workaround:
None


487554 : System might reuse TCP source ports too quickly on the server side.

Component: Local Traffic Manager

Symptoms:
System might reuse TCP source ports too quickly on server side when dag hash is ip-only and sourceport mode is set to change.

Conditions:
This occurs when the dag-cmp hash is ip-only, and the virtual server or PEM-forwarding endpoints sourceport mode is set to change. The BIG-IP system might reuse some TCP source ports on the server side.

Impact:
Conflicting flows result in connections being reset.

Workaround:
This issue has no workaround at this time.


487420-2 : BD crash upon stress on session tracking

Component: Application Security Manager

Symptoms:
An ASM bd process crash occurs in a specific scenario that involves system stress and session tracking, or the crash can be reached rarely from slow responses/servers with session tracking.

Conditions:
ASM under heavy load, session tracking is running.

Impact:
A bd process crash, failover, and/or traffic resets.

Workaround:
None.


487399-1 : VDI plugin crashes when View client disconnects prematurely

Component: Access Policy Manager

Symptoms:
VDI plugin crashes when View client disconnects prematurely

Conditions:
View client disconnects prematurely

Impact:
VDI plugin crash


487211 : WOM IP fragmentation in v11.5.0 HF4

Component: Local Traffic Manager

Symptoms:
IP fragmentation occurring within a flow between two iSession peers.

Conditions:
WOM PoC with v11.5.0 HF4

Impact:
The impact of this issue is cosmetic.

Workaround:
None.


487170-2 : Enahnced support for proxy servers that resolve to multiple IP addresses

Component: Access Policy Manager

Symptoms:
VPN might fail to connect in environments where DNS returns multiple IP address for the proxy server host name. This includes both Edge client and web client.

Conditions:
Proxy server name is resolved to multiple IP address, or the
proxy server IP address changes on a subsequent call to the DNS resolver.

Impact:
VPN connection might fail.

Workaround:
Configure DNS to persist an IP addresses for the proxy host name.


486724-1 : After upgrading from v10 to v11 in a FIPS HA setup, config-sync fails

Component: Local Traffic Manager

Symptoms:
After upgrading from TMOS v10 to TMOS v11 in a FIPS HA setup, config-sync will fail.

Conditions:
In a FIPS HA setup, upgrade from v10 to v11. After upgrade, trigger config-sync.

Impact:
HA devices will be in sync failed state

Workaround:
This issue has no workaround at this time.


486597-4 : Fixed Network Access renegotiation procedure

Component: Access Policy Manager

Symptoms:
Network Access reconnects on every SSL renegotiation attempt on Windows 7 for TLS1.2 and TLS1.1 if client cert is requested.

Conditions:
This occurs when the following conditions are met: Windows 7. -- TLS 1.1/TLS1.2. -- Client cert set to 'required' at Virtual Server's Client Cert profile.

Impact:
Reconnect on every SSL renegotiation attempt.

Workaround:
None.


486512-6 : audit_forwarder sending invalid NAS IP Address attributes

Component: TMOS

Symptoms:
Forwarded auditing messages contain the incorrect nas-ip-address attribute. It should be the local IP of the box. Instead nas-ip-address is another, random IP address.

Conditions:
This seems to work fine when the BIG-IP is a virtual machine.The issue reproduces only on the actual hardware.

Impact:
Cannot pass certification because config auditing is not working as expected (invalid NAS IP Address).

Workaround:
None.


486450 : iApp re-deployment causes mcpd on secondaries to restart

Component: Local Traffic Manager

Symptoms:
iApp redeployment causes mcpd on secondaries to restart.

Conditions:
This occurs when redeploying iApps with the locally cached files in place.

Impact:
mcpd restarts on secondaries.


486268-2 : APM logon page missing title

Component: Access Policy Manager

Symptoms:
On the BIG-IP APM logon page, a title may not appear.

Conditions:
RSA error message contains newline symbols. (For example RSA 8.1 uses such message)

Impact:
May cause usability issues.


485948-4 : Machine Info Agent should have a fallback branch

Component: Access Policy Manager

Symptoms:
Machine Info agent is not supported for legacy logon clients (for example, mobile clients and Linux CLI); it is only supported for web logon clients (browsers and BIG-IP Edge Clients). However, the Machine Info agent does not throw any error if a legacy logon client connects to APM with the Machine Info agent in it.

Conditions:
This occurs with a Machine Info agent in the access policy and legacy logon clients.

Impact:
The impact of this issue is that the Machine Info agent does not create any machine information-related session variables for legacy logon clients, neither does it indicate that it is not supported.

Workaround:
To work around the problem, use the Client Type agent to distinguish between legacy logon or web logon clients. And then only add the Machine Info agent in web logon clients branch.


485833-6 : The mcpd process may leak memory when using tmsh to modify user attributes

Component: TMOS

Symptoms:
The Master Control Program Daemon (mcpd) may leak memory when you use the Traffic Management Shell (tmsh) to modify user attributes.

Note: The mcpd process is the messenger process that allows userland processes to communicate with the Traffic Management Microkernel (TMM), and the other way around.

As a result of this issue, you may encounter one or more of the following symptoms:

-- You are unable to configure the BIG-IP system.
-- You are unable to obtain statistics, or statistics may not be accurate.
-- In the /var/log/ltm file, you may observe an error message similar to the following example:
02001018:system library:fopen:Too many open files

Conditions:
This issue occurs when the following condition is met:

-- You are using the tmsh modify auth <user> command options to modify local user accounts. Some of the options include the following:
description User description.
partition-access The administrative partition which user has access.
password Set or modify the user password.
role Specifies the user role for the user account.
shell Specifies the shell to which the user has access.

Impact:
-- You cannot obtain or update the system status.
-- You cannot configure the BIG-IP system.
-- Userland processes may not be functional.

Workaround:
There is no workaround for this issue. To restore mcpd functionality, you can restart mcpd from the command line. To do so, perform the following procedure:

Impact of procedure: Restarting the mcpd process interrupts all traffic processing on the BIG-IP system. You should perform this procedure during a maintenance window.

Log in to the Traffic Management Shell (tmsh) by typing the following command:
tmsh

To restart the mcpd process, type the following command:
restart sys service mcpd


485787-2 : Firewall ACL counters for staged policy attached to a Virtual/SelfIP are not incremented when a policy with a similar rule to drop/reject packets is enforced by the Global or Route Domain context

Component: Advanced Firewall Manager

Symptoms:
Staged ACL Rule attached to VS or Self IP will never be hit if similar Rule with drop/reject action attached to an upper context as Enforced.

Conditions:
Policy should be staged at the Virtual or SelfIP context and enforced at the Global or Route Domain level. The action should be drop/reject.

Impact:
Staged policy counters are not incremented correctly.
Example:
We have 2 FW Policies (Policy1 and Policy2) with the same Rules:
security firewall policy Policy1 {
    rules {
        Rule1 {
            action reject
            destination {
                addresses {
                    10.10.10.11 { }
                }
            }
        }
    }
}

Policy1 attached to Global context as enforced:
security firewall global-rules {
    enforced-policy Policy1
}

Policy2 attached to VS as staged:
ltm virtual VS4_TCP {
    destination 10.10.10.11:any
    fw-staged-policy Policy2
    ip-protocol tcp
    ......
}

If we send traffic to hit this rule:
Policy1:Rule1 will be hit but Policy2:Rule1 will not be hit.

tmctl -w120 fw_rule_stat
context_type context_name rule_name micro_rules counter last_hit_time
------------ ------------ --------- ----------- ------- -------------
global Rule1 1 10 1413898646


tmctl -w120 fw_staged_rule_stat
context_type context_name rule_name micro_rules counter last_hit_time
------------ --------------- --------- ----------- ------- -------------
virtual /Common/VS4_TCP Rule1 1 0 0


485764-1 : WhiteHat vulnerability assessment tool is configured but integration does not work correctly

Component: Application Security Manager

Symptoms:
When the WhiteHat vulnerability assessment tool is configured on an already existing policy the proper response headers are not added to traffic that are needed for full integration.

Conditions:
The WhiteHat vulnerability assessment tool is configured on an already existing policy.

Impact:
Proper response headers are not added to traffic to integrate fully.

Workaround:
This issue has no workaround at this time.


485472-1 : iRule virtual command allows for protocol mismatch, resulting in crash

Component: Local Traffic Manager

Symptoms:
iRule 'virtual' command allows for protocol mismatch.

Conditions:
A virtual server with an iRule which leverages the 'virtual' command targeting a virtual server that differs in protocol. For example, a UDP virtual server targeting a TCP virtual server.

Impact:
tmm might crash with assert: 'Must be syncookie'. Traffic is interrupted.

Workaround:
This is the result of a misconfiguration. Modify iRules to ensure L4 protocols match between virtual servers.


485352-3 : TMM dumps core file when loading configuration or starting up

Component: TMOS

Symptoms:
TMM dumps core file when configuration file is being loaded or when TMM is starting up.

Conditions:
This error happens when there is no APM license installed.

Impact:
Traffic disrupted while tmm restarts.


485232-3 : Disabling and re-enabling an active blade in a HA group may result in the blade becoming standby

Component: TMOS

Symptoms:
Disabling and re-enabling an active blade in a HA group might result in the blade becoming standby.

Conditions:
This occurs when using HA group scoring with HA scoring weighted equally among peers. The peer must have its blades enabled.

Impact:
After re-enabling a blade, it does not go active even though its mate blade is active. The standby blade does not take traffic.

Workaround:
Fail the system over to the peer by disabling its blades, then enable them and fail back (if desired).


485189 : TMM might crash if unable to find persistence cookie

Component: Local Traffic Manager

Symptoms:
TMM might crash and generate a core if unable to find persistence cookie.

Conditions:
Although specific conditions for this issue are unknown, it is possibly due to having a virtual with cookie persistence enabled and iRules that disable persistence.

Impact:
Traffic disrupted while tmm restarts.


485182-1 : wom_verify_config does not recognize iSession profile in /Common sub-partition

Component: Wan Optimization Manager

Symptoms:
The wom_verify_config does not recognize iSession profile in /Common sub-partition.

Conditions:
iApps creates some objects (virtual, profiles) under /Common/DMZPrimary.vysbank.com.app/. These objects are invisible to wom_verify_config.

Impact:
wom_verify_config cannot verify the system configuration.


485176-2 : RADIUS::avp replace command cores TMM when only two arguments are passed to it

Component: Policy Enforcement Manager

Symptoms:
The RADIUS::avp replace iRule command will core when only two arguments are passed to it.

Conditions:
Must be running an iRule that executes a RADIUS::avp replace command with only two arguments.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


484861-3 : A standby-standby state can be created when auto failback acts in a CRC disagreement scenario

Component: TMOS

Symptoms:
A standby-standby state can occur after a failback if there is a CRC disagreement between peers.

Conditions:
HA pair using auto failback. There must be a CRC disagreement between peers. The failback preferred system must have a lower traffic group score than its peers. NOTE: CRC disagreements may lead to other issues and the customer is strongly advised to sync the devices to remove the disagreement.

Impact:
It's a site down situation as all the objects in the traffic group will become unreachable.

Workaround:
Sync devices to remove the CRC disagreement.


484733-2 : aws-failover-tgactive.sh doesn't skip network forwarding virtuals

Component: TMOS

Symptoms:
When there are forwarding virtual servers with SNATs defined in the configuration, the reassignment of IP addresses for virtual servers does not happen correctly in Amazon Web Services (AWS).

Conditions:
Forwarding virtual servers with SNATs defined.

Impact:
HA failover is impacted.


484706-3 : Incremental sync of iApp changes may fail

Component: TMOS

Symptoms:
Incremental sync of the deletion of an iApp instance may fail, with the error message indicating that certain objects owned by the application are still in use. Alternatively, child objects that should have been deleted when reconfiguring an iApp instance may remain on peer devices after incremental sync has completed.

Conditions:
Incremental sync of the deletion of an iApp instance. Incremental sync of deleting a child object, if the iApp implementation script creates the parent object without child objects, and then separately adds the replacement child objects.

Impact:
An attempt to delete an iApp may cause a sync failure. An attempt to reconfigure an iApp without a previously existing child object (pool member, etc.) may cause the object to continue to exist on peer devices.

Workaround:
Full load sync (either the 'Overwrite Configuration' option on the Device Management Overview page, or temporarily setting the device group to full load only), and then performing the sync operation completes successfully.


484582-1 : APM Portal Access is inaccessible.

Component: Access Policy Manager

Symptoms:
APM Portal Access is inaccessible.

Conditions:
One of sessions reaches 64 KB of Portal Access application cookie storage.

Impact:
Rewrite plugin crashes; APM Portal Access becomes inaccessible. Shortly after this plugin crashes with *** glibc detected *** memory-corruption-message. The rewrite daemon log contains following lines:
- notice rewrite - cookie.cpp:543 : updateCookieSessionStore : expiring cookie ...

Workaround:
None.


484454-1 : Users not able to log on after failover

Component: Access Policy Manager

Symptoms:
Users fail the access policy check after failover happens. The command 'configdump -allkeys' does not display any entry for the access profile.

Conditions:
The issue will show up after the following events:
1. The TMM on the active node restarts or crashes, the node become standby.
2. TMM and APD restart. APD re-creates config snapshots in the SessionDB.
3. The snapshots just created get deleted.
4. Failover happens again and the node becomes active.
5. Users fail to log on

Impact:
Users cannot log on

Workaround:
Run 'bigstart restart apd' to re-create config snapshots.


484305-4 : Clientside or serverside command with parking command crashes TMM

Component: Local Traffic Manager

Symptoms:
Any parking iRule command used inside clientside or serverside crashes TMM.

Conditions:
Parking command used inside clientside or serverside.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
See if you really need to run the parking command inside clientside/serverside, if not, move the command outside.


484278-1 : BIG-IP crash when processing packet and running iRule at the same time

Component: Policy Enforcement Manager

Symptoms:
The BIG-IP system sometimes crashes if it is processing packets and iRules at the same time.

Conditions:
Conditions leading to this issue include having iRule scripts and processing iRule tasks, and processing incoming traffic along with the iRule tasks.

Impact:
The impact of this issue is that the BIG-IP system goes to crash intermittently.

Workaround:
This issue has no workaround at this time.


484079-6 : Change to signature list of manual Signature Sets does not take effect.

Component: Application Security Manager

Symptoms:
When the signature list of a manual Attack Signature Set is modified, the change does not affect enforcement or remote logging.

Conditions:
The signature list of a manual Attack Signature Set is modified (with no other change to the Signature Set).

Impact:
The change does not take effect in signature enforcement or remote logging.

Workaround:
Any spurious change to the signature set (such as unchecking/checking 'Assign to Policy by Default'), or unassigning and reassigning the signature set to the affected policy.


483792-7 : when iSession control channel is disabled, don't assign app tunnel, MSRDP, opt tunnel resources

Component: Access Policy Manager

Symptoms:
Customers running into iSession related issues.

Conditions:
This happens when APM has been running.

Impact:
Some of the Network Access resources may not run properly when iSession control channel is disabled.

Workaround:
None


483683-2 : MCP continues running after "Unexpected exception caught in MCPProcessor::rm_DBLowHighWide" error

Component: TMOS

Symptoms:
"Unexpected exception caught in MCPProcessor::rm_DBLowHighWide" error on secondary blades when starting up. When this happens, MCP is left in a bad state and several issues (not obviously related to this error) can occur.

Conditions:
Only occurs on a chassis system, and only on secondary blades.

Impact:
This error is the precursor to bad behavior on the system. The exact issues seen are hard to quantify, as they vary depending on what state MCP's database is in when the exception is thrown.


483601-2 : APM sends a logout Bookmarked Access whitelist URL when session is expired.

Component: Access Policy Manager

Symptoms:
Customer will see a logout page for bookmarked APM whitelist URL after session is expired.

Conditions:
This condition will occur if the user has bookmarked a APM whitelist entry and tries to access this bookmarked URL after some time (Access session is expired).

Impact:
User sees a logout page instead of a logon to revalidate themselves.

Workaround:
This issue has no workaround at this time.


483539 : With fastL4, incorrect MSS value might be used if SYN has options without MSS specified

Component: Local Traffic Manager

Symptoms:
Due to the incorrect MSS value, TMM might core because based on the MSS value the outgoing packet attempts to use TSO, which is not correct. This can result in a crash.

Conditions:
A virtual using fastL4 where a SYN packet with options is received, but the SYN packet does not contain an MSS option.

Impact:
If this issue occurs, then TMM will core resulting in a failover/reboot of the system.

Workaround:
None.


483228 : The icrd_child process generates core when terminating

Component: TMOS

Symptoms:
A race condition in the terminate handler of the icrd_child process causes it to crash and generate a core.

Conditions:
This is an intermittent issue that is caused by a race condition.

Impact:
This does not impact functionality, but the system posts messages to icrd log similar to the following: notice icrd: 5823,14414, RestServer, INFO, Connection idle too long fd:11.

Workaround:
None.


483219-1 : Guest secondary blade config load failure after vdisk reinstall

Component: TMOS

Symptoms:
A VCMP guest blade (slot2) is unexpectedly offline.

Conditions:
The guest blade has a config load failure.
The host blade in slot2 was recently re-installed via USB.

Impact:
The VCMP guest is unable to properly form a cluster.
The qkviews do not contain much data from slot2 because mcpd was offline.

Workaround:
Save the configuration to UCS. Attempt to default the configuration. Fix any error messages(*). Then load the previously saved UCS and the guest is okay.


483157-1 : Server-side flow uses 0 as TCP source port

Component: Local Traffic Manager

Symptoms:
The BIG-IP system might use 0 (zero) as the TCP source port for server-side flows.

Conditions:
This occurs when the server-side VLAN's cmp_hash is either src-ip or dst-ip (the default value is 'default') and the server-side source_port mode is set to change.

Impact:
Many network stacks use 0 as reserved port and do not treat the value as valid for TCP source ports. This might cause TCP ports to be reused too quickly.


482915-2 : Learning suggestion for the maximum headers check violation appears only for blocked requests

Component: Application Security Manager

Symptoms:
There are no learning suggestions for the Maximum headers sub-violation if the HTTP protocol compliance violation is in Alarm only (not in Blocking).

Conditions:
If the HTTP compliance is in Alarm only (not in Blocking) and the Maximum number of headers sub-violation is enabled, and there is a violation for the maximum number of headers (which is not blocking) and no other violation in the request is blocking.

Impact:
There will not be a learning suggestion for this violation and no automated learning will happen for the number of headers.

Workaround:
This issue has no workaround at this time.


482699-1 : VPE displaying "Uncaught TypeError"

Component: Access Policy Manager

Symptoms:
VPE displaying "Uncaught TypeError"

Conditions:
While editing on Chrome ver >=37

Impact:
Really hard to Edit VPE on chrome

Workaround:
Use different browser


482434-2 : Possible performance degradation in AWS cloud

Component: TMOS

Symptoms:
Throughput and new connections per/sec might be up to 4 times slower in AWS for SR-IOV enabled instances.

Conditions:
This might occur when a BIG-IP virtual server is configured with a Standard profile.

Impact:
Performance is 3-to-4 times slower than the license limit. Slow throuhgput and new connections per/second

Workaround:
If throughput performance is 3x-4x times slower than license limit for virtual servers with 'Standard' profile, consider disabling interruptible sleep. To do so, use the following commands to: 1. set the appropriate DB variable to 0 (zero), and 2. restart tmm: 1. setdb Scheduler.UnicAsleepRxLimit.LTM 0. 2. bigstart restart tmm.


482260-2 : Location of Captive portal configuration registry entry in 64 bit windows is incorrect

Component: Access Policy Manager

Symptoms:
Captive portal detection configuration in BIG-IP Edge Client does not work as intended on 64-bit Windows-based platforms.

Changing HKEY_CURRENT_USER\Software\F5 Networks\RemoteAccess\DisableCaptivePortalDetection has no impact on captive portal detection in Edge Client on 64-bit Windows.

Impact:
Windows 64-bit clients are not redirected to the custom captive portal page as the expected but instead are sent to the default URL.

Workaround:
Configuring this setting in HKEY_CURRENT_USER\Software\Wow6432Node\F5 Networks\RemoteAccess works.


481880-1 : SASPD monitor cores

Component: Local Traffic Manager

Symptoms:
SASP monitor process core dumping during a state change.

Conditions:
This occurs when the SASP monitor is configured in push mode.

Impact:
Pool member is marked down, which leads to monitor outage.


481844-2 : tmm can crash and/or use the wrong CRL in certain conditions

Component: Local Traffic Manager

Symptoms:
tmm can crash and/or use the wrong certificate revocation list (CRL) in certain conditions.

Conditions:
Several client-ssl profiles are configured with different CRLs. Then, either the CRLs are configured or the client-ssl profiles are deleted.

Impact:
tmm might crash and/or use the wrong CRL. Traffic disrupted while tmm restarts.


481696-3 : Failover error message 'sod out of shmem' in /var/log/ltm

Component: TMOS

Symptoms:
You might see a failover error message 'sod out of shmem' in /var/log/ltm.

Conditions:
The conditions under which this occurs vary based on the configured shared memory usage.

Impact:
Failover might not function fully. System posts the message 'err sod[6300]: 01140003:3: Out of shmem, increment amount' in /etc/ha_table/ha_table.conf.

Workaround:
Manually modify /etc/ha_table/ha_table.conf as follows: Change this line: 'ha segment path: /sod table pages: 2' to this: 'ha segment path: /sod table pages: 4'. Save the file and reboot the system.


481647 : OSPF daemon asserts and generates core

Component: TMOS

Symptoms:
The OSPF daemon might assert if receiving a Link Status (LS) Update header with a length greater than 255 bytes.

Conditions:
This occurs when the LSA header length is greater than 255 bytes in length.

Impact:
OSPF daemon asserts and generates a core, which might cause a service outage.

Workaround:
None.


481476-4 : MySQL performance

Component: Application Security Manager

Symptoms:
MySQL usage would spike to 100% for extended periods of time.

Conditions:
Occurs after several thousand policy configuration changes have been made to the system.

Impact:
Slow ASM GUI pages.

Workaround:
There is no workaround at this time.


481216-2 : Fallback may be attempted incorrectly in an abort after an Early Server Response

Component: Local Traffic Manager

Symptoms:
After an Early Server Response, the BIG-IP system might attempt to generate a fallback response if an error occurs. However, the response has already partially egressed, so this does not work correctly.

Conditions:
Fallback configured or enabled by an iRule. An early server response triggers an error that leads to an Abort being raised. The Abort triggers a fallback response inappropriately.

Impact:
The server-side might read HTTP data structures after they have already been freed. A fallback can be generated on the server-side, leading to a use-after-free if the client side has already aborted.


481089 : Request group incorrectly deleted prior to being processed

Component: TMOS

Symptoms:
After performing a full sync, sometimes the BIG-IP systems remain out of sync.

Conditions:
A full sync must be performed. There must be more than one active connection to mcpd, and one of them must get disconnected before the sync completes.

Impact:
The BIG-IP systems remain out of sync even after a sync operation.

Workaround:
There are 2 possible workaround: 1) Reset device trust and then re-associate peer devices. 2) Set sync-leader using the following tmsh command. (You might need to run the command more than once until the cid.id of the lagging device is equal or greater than the peer unit.) 'tmsh modify cm device-group fail_over_group_name devices modify { name_of_standby_device { set-sync-leader } }'.

Note: You can run the following command from the active device to view any cid.id mismatch, and if further set-sync-leader commands are necessary: 'tmsh run cm watch-devicegroup-device'.


481082-1 : Software auto update schedule settings can be reset during a full sync

Component: TMOS

Symptoms:
After performing a full sync, the auto update settings of the target machine are reset to defaults.

Conditions:
Perform a full sync to a system that has non-default auto update settings.

Impact:
Auto update settings can get out of sync, and be incorrect.

Workaround:
After a full sync, ensure that the auto update settings on both systems are set as desired.


480982-2 : pkcs11d with a high thread count can result in high CPU utilization

Component: Local Traffic Manager

Symptoms:
When pkcs11d is set to use a very high thread count, CPU utilization can increase dramatically.

Conditions:
The thread count for pkcs11d is set higher than the default.

Impact:
Less CPU available for other processes.

Workaround:
Do not set the db variable for pkcs11d thread count (/sys crypto fips external-hsm num-threads) higher than the default.


480903-2 : AFM DoS ICMP sweep mitigation performance impact

Component: Advanced Firewall Manager

Symptoms:
In AFM DoS, the performance of ICMP Sweep Vector Mitigation brings down the performance of the BIG-IP system.

Conditions:
ICMP Traffic levels at 4 million pps from ~100 Src IP addresses, with the AFM DoS Sweep vector enabled to mitigate ICMP traffic.

Impact:
Slower performance of the BIG-IP system. A lot of CPU is used to mitigate the AFM DoS Sweep vector.

Workaround:
Do not enable the AFM DoS Sweep vector for ICMP Traffic when the attack rate is over 4 Million pps.


480761-3 : Fixed issue causing TunnelServer to crash during reconnect

Component: Access Policy Manager

Symptoms:
TunnelServer may crash in rare conditions during reconnect.

Conditions:
Crash may happens when PC wakes up after hibernate

Impact:
User sees confusing message about crashed TunnelServer.

Workaround:
This issue has no workaround at this time.


480686-5 : Packet loop in VLAN Group

Component: Local Traffic Manager

Symptoms:
On an active VIPRION or vCMP guest with a VLAN Group configuration, the CPU usage unexpectedly rises, and traffic flowing through the device may experience high latency and packet drops. A packet capture shows packets looping internally between VLAN members of the VLAN Group.

Conditions:
This occurs when using a VLAN Group (in Translucent or Transparent mode) on VIPRION hardware (including vCMP guest of a VIPRION), and an IP address conflict exists between the BIG-IP and another device on the VLAN Group. Note: The device causing the IP conflict may be unrelated to packets that are found looping in a packet capture.

Impact:
This results in high CPU usage and potentially unresponsive GUI. Traffic flowing through the VLAN Group may experience high latency and packet drops. The Self IP on the affected VLAN becomes almost impossible to reach.

Workaround:
Disable vlangroup.flow.allocate db variable to prevent flow creation for vlangroup forwarded packets.


480370-4 : Connections to virtual servers with port-preserve property will cause connections to leak in TMM

Component: Local Traffic Manager

Symptoms:
Connections leak, exhausting the memory over time and causing TMM to re-start.

Conditions:
Virtual server with port-preserve setting. Tunneled APM connections in a CMP environment (many TMM processes).

Impact:
TMM process re-starts causing traffic disruption. Low performance is also seen due to the high number of leaked connections.

Workaround:
None.


480311-2 : ADAPT should be able to work with OneConnect

Component: Service Provider

Symptoms:
The request-adapt and response-adapt profiles are unable to work with the OneConnect profile, and so those combinations are not allowed in the same virtual server.

Conditions:
Attempt to combine request-adapt or response-adapt profile with OneConnect profile on the same virtual server.

Impact:
When adaptation is being used, the connection cannot be kept open and reused for multiple HTTP transactions.


480272-4 : During OAM SDK initialization, ObConfig initialization returns wrong accessgate ID

Component: Access Policy Manager

Symptoms:
OAM ObConfig Initialization returns wrong accessgate ID, and that resulted in EAM setting wrong domain for the ObSSOCookie.

Conditions:
After network connection failure with backend OAM server, ObConfig initilization returned past Accessgate ID.

Impact:
The impact of this issue is that ObConfig initialization returns the wrong accessgate ID.

Workaround:
This issue has no workaround at this time.


480242-1 : APD, APMD, MCPD communication error failure now reported with error code

Component: Access Policy Manager

Symptoms:
When an unexpected error is received during communication between apd, apmd, and mcpd, it throws an exception.

Conditions:
Rarely reproducible, failed communication between apd, apmd, and mcpd.

Impact:
The system cores without an error code indicating the reason. This hampers finding the actual cause for the error.

Workaround:
None.


479872-1 : Corresponding protocol profiles must exist on both clientside/serverside

Component: Local Traffic Manager

Symptoms:
Virtual servers configured without protocol profiles on both the clientside and serverside do not pass traffic.

Conditions:
This occurs on virtual servers configured without protocol profiles on both the clientside and serverside.

Impact:
Attempts to connect to the virtual server might result in RSTs ('no local listener'), or the virtual address might not respond to ARP if there are no other functional virtual servers on the same virtual address. Virtual servers affected by this issue do not pass traffic.

Workaround:
If a protocol profile with a context (clientside or serverside) is specified when defining a virtual server, ensure that a protocol profile is specified for the peer context.


479773-1 : SR C1800930 - GUI crashs - and SQL errors

Component: Device Management

Symptoms:
The WebUI is unusable as it can take 30 seconds to a minute to load different pages. Other times the user will get the "service restarting" message. They have tried multiple browsers and changed the maximum connections to the config utility from 20 to 50 and back to 20 when that didn't help.

Conditions:
The customer says that he can get it to occur by having 3 users log into the config utility and then click around randomly until it crashes.

Impact:
GUI inaccessible

Workaround:
Work around is available by removing the following from the httpd.conf:
--------------
# If DCOEP is defined then enable the related configuration.
<IfDefine DCOEP>
...
</IfDefine>
--------------
This can be done by modifying the template /defaults/config/templates/httpd.tmpl.


479460-1 : SessionDb may be trapped in wrong HA state during initialization

Component: TMOS

Symptoms:
An error case may happen on BIG-IP if the following conditions are met:

1. There are two BIG-IPs configured as inter-cluster HA.
2. These two BIG-IPs are multi-blade chasis system.
3. Master record with independent subkeys is added to SessionDB.

The observed symptom this that you can explicitly deleted such a master record, but auto expiration mechanisms (timeout & lifetime) will not work on it, and this record will live forever until it is explicitly deleted.

Conditions:
Inter-chassis mirroring
Chassis w/ multiple blades

Impact:
an inconsistent state between systems can cause persistence entries to never timeout.

This will impact CGNAT records stored in SessionDB such as persistence records and PBA blocks.


479374-2 : Setting appropriate TX driver settings for 40 GB interfaces.

Component: TMOS

Symptoms:
In rare cases, the VIPRION C4800 chassis might experience an inability to establish some connections due to losing packets in one direction while in transit between blades.

Conditions:
VIPRION C4800 chassis.

Impact:
When the problem is due to this issue, one or more 5.x or 6.x interfaces show status as 'up' but the corresponding media as 'none'. Inability to establish some connections. The problem is consistent, depending on source and destination IP and port.


479334-6 : monpd/ltm log errors after Hotfix is applied

Component: Application Visibility and Reporting

Symptoms:
When you apply a hotfix on an already configured and working volume, many errors are logged in the monpd/ltm logs.

Conditions:
Applying a hotfix to a configured and working volume.

Impact:
None, cosmetic benign errors only.

Workaround:
Run the following commands:
1. mysql -p`perl -MPassCrypt -nle 'print PassCrypt::decrypt_password($_)' /var/db/mysqlpw` AVR < /var/avr/avr_srv_code.sql
2. bigstart restart monpd


479171-1 : TMM might crash when DSACK is enabled

Component: Local Traffic Manager

Symptoms:
TMM might crash when DSACK is enabled

Conditions:
This occurs rarely on a virtual server configured with a TCP profile that has DSACK (Duplicate Selective Acknowledgement) enabled.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Do not use TCP profile with the DSACK feature enabled.


479142-4 : Deleting a virtual server does not delete the resource record (RR) in ZoneRunner Daemon (ZRD)

Component: Global Traffic Manager

Symptoms:
The resource record (RR) in ZoneRunner Daemon (ZRD) is not deleted when the associated Virtual Server is deleted from the Global Traffic Manager (GTM) server object.

Conditions:
Conditions that lead to this issue include a GTM server object with a Virtual Server; a pool with the above virtual server; a wideip using the above pool as resources; and deleting the virtual server from the GTM server object.

Impact:
BIND will contain and return RRs that were intended to be deleted.
The RR is orphaned and could only be deleted manually from ZRD.

Workaround:
To workaround this issue you can delete the GTM server associated with the virtual server to be deleted, but this would delete other associated virtual servers too. Alternatively, you can manually delete the RR in ZRD.


478751-4 : OAM10g form based AuthN is not working for a single/multiple domain.

Component: Access Policy Manager

Symptoms:
OAM10g form based AuthN is not working for a single/multiple domain.

Conditions:
Conditions leading to this issue include double encoding of parameters and race condition on parsing form body.

Impact:
Form based OAM authentication might not work.

Workaround:
This issue has no workaround at this time.


478674-2 : ASM internal parameters for high availability timeout was not handled correctly

Component: Application Security Manager

Symptoms:
The internal parameters bd_hb_interval and bd_hb_interval_low_platforms are not handled correctly and a different value is registered against the high availability (HA) system. This causes the system to have faster than expected failovers. Also, when bypass asm is turned on and a bigstart restart asm was applied, a failover happens.

Conditions:
Two possible conditions:
1. An internal parameter is configured for the timeout to the HA system. When ASM does not send a lifesign to the HA system for 10 seconds (instead of the configured time)
2. bypass asm is internal parameter is applied and a bigstart restart asm happens.

Impact:
A failover happens.

Workaround:
This issue has no workaround at this time.


478617-11 : Don't include maximum TCP options length in calculating MSS on ICMP PMTU.

Component: Local Traffic Manager

Symptoms:
TCP segment size is 40 bytes less.

Conditions:
ICMP implementation using Path MTU (PMTU)

Impact:
The impact of this issue is less data per TCP segment.

Workaround:
Disable Path MTU Discovery by doing the following,

"tmsh modify sys db tm.enforcepathmtu value disable"


478592-2 : When using the SSL forward proxy feature, clients might be presented with expired certificates.

Component: Local Traffic Manager

Symptoms:
When SSL forward proxy feature is enabled, the certificates cached might not expire at the right time resulting in expired certificates being presented to the clients.

Conditions:
When using the SSL forward proxy feature.

Impact:
Incorrect certificates are presented to the clients.

Workaround:
Manually delete the cached certs in: show ltm clientssl-proxy cached-certs.


478439-11 : Unnecessary re-transmission of packets on higher ICMP PMTU.

Component: Local Traffic Manager

Symptoms:
LTM re-transmits TCP segments even when ICMP Path maximum transmission unit (PMTU) is higher than existing MTU.

Conditions:
ICMP PMTU is higher than existing MTU.

Impact:
Burst traffic generated.

Workaround:
Disable Path MTU Discovery by entering the command: tmsh modify sys db tm.enforcepathmtu value disable.


478399-1 : PEM subscriber sessions are created without PEM licensed, if "radiusLB-subscriber-awre" profile is configured.

Component: Policy Enforcement Manager

Symptoms:
If LTM virtual server has the RADIUS profile 'radiusLB-subscriber-awre' configured, the PEM subscriber session will be created, even if the BIG-IP system is not licensed for PEM, which can cause 100% TMM usage due to the overhead of processing RADIUS messages.

Conditions:
The RADIUS profile 'radiusLB-subscriber-awre' is configured on the LTM virtual server for non-PEM configurations.

Impact:
100% TMM usage due to PEM subscriber session being created, even when the BIG-IP system is not licensed for the PEM module.

Workaround:
The workaround is to avoid the misconfiguration by not associating the RADIUS profile 'radiusLB-subscriber-awre' to LTM virtual servers for non-PEM configurations, such as when there is no PEM license for the BIG-IP system.


478333-2 : Edge-Client client shows an error about corrupted config file, when User's profile and temp folders located on different partitions

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client for Windows client shows an error about corrupted config file, when User's profile and temp folders are located on different partitions

Conditions:
Edge Client for Windows.
User's profile and temp folders are located on different partitions.

Impact:
Configuration will not be saved.


478257-11 : Unnecessary re-transmission of packets on ICMP notifications even when MTU is not changed

Component: Local Traffic Manager

Symptoms:
Re-transmission of fragment needed packets.

Conditions:
Multiple ICMP Destination Unreachable with Fragmentation needed code messages.

Impact:
Burst traffic generated.

Workaround:
Disable Path MTU Discovery by doing the following,

"tmsh modify sys db tm.enforcepathmtu value disable"


478195-1 : Installation of FIPS .exp key files sets incorrect public exponent.

Component: Local Traffic Manager

Symptoms:
Newer FIPS platforms use NGFIPS devices, which seem to be returning the public exponent in little-endian format, when the FIPS exported keys (.exp key files) are imported into FIPS cards. Since F5's code was expecting this in big-endian format, this leads to incorrect public exponent value being written in the key file.

Conditions:
Using FIPS platforms (except the older 8900/6900 FIPS platforms):
1. Put two FIPS platforms in the same FIPS security domain without configuring them in a device group.
2. Create or install a key into FIPS card on box1.
3. Copy the key's FIPS exported key (from /config/ssl/ssl.cavfips/) to box2.
4. Install this FIPS .exp key file on box2 using:
'tmsh install sys crypto key <keyname> from-local-file <.exp file path> security-type fips'

Impact:
If the corresponding certificate was copied from box1 to box2 and then installed on box2, configuring this key/cert on a SSL profile will lead to the error 'key and certificate do not match'.

If the corresponding certificate is newly created on box2 after the key install, then SSL traffic using this key/cert will fail.


477859-2 : ZebOS config load may fail if password begins with numeric character

Component: TMOS

Symptoms:
ZebOS config load might fail if a password begins with a number.

Conditions:
In config file, set a password that begins with a number.
e.g., neighbor 1.2.3.4 password 0abcdefghijkl

Impact:
ZebOS config load fails.

Workaround:
Use a password beginning with an alpha character.


477789-1 : SSL Certificate can accommodate & (ampersand) in the Common Name, Organization Name, Division and SAN.

Component: TMOS

Symptoms:
When an & (ampersand) character is entered for Common Name, Organization Name, Division or SAN in an SSL Certificate, the ampersand is escaped and replaced with an &amp; string.

Conditions:
Create or renew an existing certificate with an ampersand in the Common Name, Organization Name, Division, or SAN.

Impact:
The system escapes the ampersand with an &amp; string. Names such as AT&T that generate certificates that escape the ampersand character do not work as expected.


477742-1 : DTLS message sequence number is off by one

Component: Local Traffic Manager

Symptoms:
The DTLS message sequence number is incorrect.

Conditions:
SSL over UDP (DTLS) is configured.

Impact:
Incompatibility with some SSL clients using OpenSSL versions beginning with version 1.0.1h. The clients work as expected with versions of OpenSSL previous to 1.0.1h. Note: The issue is visible during renegotiation with DTLS only.

Workaround:
Use a version of OpenSSL previous to 1.0.1h.


477432-3 : Roll forward from 11.3.0 with iApp configured fails to load correctly and causes bd to core

Component: Application Security Manager

Symptoms:
ts_debug.log:
-----------
asm|INFO|Aug 14 19:10:41.710|12226|,,MCP Validation error - 010715bd:3: The parent folder is owned by application service (/Common/SharePoint.app/SharePoint), the object ownership cannot be changed to ().
-----------

Conditions:
This occurs after committing the Database changes, but the system then rolls back the UCS files under /ts/var/account. This can occur on a config roll forward from 11.3.0 and earlier to a later version.

Impact:
this causes an inconsistency for the files BD will expect when starting, and lead to BD coring. The BIG-IP system may temporarily fail to process traffic as it recovers from BD restarting.

Workaround:
Disable ASM for iApps before upgrade, and then re-enable.


477394-5 : LTM might reset and cause out-of-ports

Component: Local Traffic Manager

Symptoms:
Passive FTP using FTP range iRule might intermittently cause out-of-ports reset.

Conditions:
This occurs when using passive FTP with an range of FTP ports in an iRule.

Impact:
LTM resets.


477375 : SASP Monitor may core

Component: Local Traffic Manager

Symptoms:
Rarely, the SASP monitor cores.

Conditions:
This occurs when the SASP monitor is configured in push mode.

Impact:
When the monitor cores, a pool member gets marked down, which might lead to an outage. This occurs rarely.


477232-3 : CGNAT translations have a higher chance of port reuse when address persistence is enabled

Component: Carrier-Grade NAT

Symptoms:
When using a LSN pool with persistence mode address, in addition to reusing the same translation address for subsequent connections, the translation port also persists and is reused.

Conditions:
LSN pool with persistence mode address.

Impact:
Poor utilization of available translation ports and very high levels of port reuse. In the case of TCP connections this port reuse can cause servers to reject connections because a previous connection is in the TIME_WAIT state.

Workaround:
None.


477218-3 : Simultaneous stats query and pool configuration change results in process exit on secondary.

Component: TMOS

Symptoms:
Simultaneous stats query and pool configuration change results in process exit on secondary.

Conditions:
Running parallel operations in tmsh/GUI or multiple tmsh operations on pool objects. For example, running 'tmsh show' command while simultaneously updating the monitor on the pool in the GUI.

Impact:
The primary restarts, and the slot goes down, resulting in potential traffic impact. The ltm logs display error messages similar to the following: -- err mcpd[29041]: 01070734:3: Configuration error: Configuration from primary failed validation: 01020036:3: The requested pool (/Common/CYBS-P-UBC-43) was not found. -- notice mcpd[8487]: 0107092a:5: Secondary slot 1 disconnected.

Workaround:
Use the absolute name of the pool in the tmsh command: /partition_name/pool_name.


476886-2 : When ICAP cuts off request payload, OneConnect does not drop the connection

Component: Service Provider

Symptoms:
After sending an ICAP preview, BigIP waits for a response from the ICAP server. If BigIP receives the complete ICAP response before it has completed sending the ICAP request (for example, when the response contains an encapsulated 302 redirect), it stops sending the request payload and closes the TCP connection. However when a OneConnect profile (CONNPOOL filter) is on the IVS, the TCP connection to the ICAP server is not terminated.

Conditions:
This occurs when using ICAP and OneConnect profiles on an IVS, when the BIG-IP ICAP client has resumed sending the request body on receiving a 200-OK response after the preview. ICAP server response completes before it has received the entire request body (for example, encapsulated redirect).

Impact:
The ICAP server cannot detect the end of the ICAP request so might get confused.

Workaround:
Do not use OneConnect. As an alternative, if the ICAP server completes its response, it could ignore any further input from the client until it detects another RESPMOD or REQMOD indicating the beginning of a new transaction. ICAP servers are not required to do this, but it would allow connection reuse in the case where the server completes its response before the request is complete.


476736-1 : APM IPv6 Network Access connection may fail in some cases

Component: Access Policy Manager

Symptoms:
When the client provided link local address contains zeros for first 4+ bytes, the IPv6 Network Access connection will fail due to listener bind failure.

Conditions:
When the first 4+ bytes of IPv6 Link Local address are zeros this bug will show up.

Impact:
IPv6 Network Access Tunnels may not succeed.

Workaround:
There is no workaround for this.


476708-3 : ZebOS using BGP ECMP may not correctly update the ECMP paths when one of the paths goes down and comes back up

Component: TMOS

Symptoms:
ZebOS using BGP equal-cost multi-path routing (ECMP) might not correctly update the ECMP paths when one of the paths goes down and comes back up.

Conditions:
This occurs when a downstream ECMP link is disabled such that one of the two equal-cost paths becomes unavailable, and is then enable.

Impact:
ECMP does not function as desired because both available paths are not utilized. This can only be recovered by clearing the BGP connection on the affected ECMP path.

Workaround:
None.


476683 : Suspended DNS_RESPONSE events are not resumed

Component: Local Traffic Manager

Symptoms:
iRules that cause the DNS_RESPONSE event to suspend will not be resumed.

Conditions:
DNS_RESPONSE event with command that causes it to be suspended.

Impact:
DNS_RESPONSE event does not complete execution.

Workaround:
Do not use iRule commands in DNS_RESPONSE event that result in suspension.


476616-2 : Set active fails after accept learning suggestion for illegal metachar Policy with encoding iso-8859-1

Component: Application Security Manager

Symptoms:
The following is reported in the GUI: Could not apply configuration; Set active failed

Conditions:
When a customer's policy is configured for an application language like iso-8859-1 or iso-8859-15, and learning suggestions that stem
from multi byte UTF-8 parameter values (Illegal Meta Character in Value) are accepted, policy changes cannot be applied.

Impact:
Set active fails

Workaround:
Go to Parameters list and for each parameter with override 'Allow' for the metachar 'ÿ' remove the override completely: choose the
override, click on '>>' and click on update, see attached picture.


476599 : TMM may panic when resuming DNS_REQUEST iRule event

Component: Local Traffic Manager

Symptoms:
TMM panic when executing DNS_REQUEST event.

Conditions:
The TMM panics when the following events have occurred: - DNS_RESPONSE event has been suspended. - DNS_REQUEST event is executed.

Impact:
TMM restart.

Workaround:
None.


476476-5 : Occasional inability to cache optimized PDFs and images

Component: WebAccelerator

Symptoms:
Restarting the datastor service can result in some optimized PDFs or optimized images becoming un-cacheable

Conditions:
If WAM has a handle to cached content in datastor which no longer exists because datastor restarted or evicted it, and if this content is an image or PDF which WAM optimized, and if two requests for such content arrive on the same TCP connection, the second can get incorrectly cached such that it can not be served or replaced until tmm is restarted.

Impact:
Certain URLs become uncacheable, thus reducing effectiveness of WAM.

Workaround:
Disable client keep-alive in the HTTP profile (change Maximum Requests in the HTTP profile from 0 to 1)
or disable PDF linearization and image optimization.

A partial workaround is to use wa_clear_cache instead of restarting datastor to clear the cache. Content which datastor evicts might still suffer (but this is unlikely).


476281-2 : tmm crash on uninitialized variable

Component: Local Traffic Manager

Symptoms:
tmm occasionally crashes when server_key and client_key variables are not initialized before being used.

Conditions:
This occurs when using an FTP virtual server.

Impact:
Traffic disrupted while tmm restarts.


476144-2 : TMM generates a core file when dynamically loading a shared library.

Component: Performance

Symptoms:
When attempting to dynamically link a shared library, TMM cores.

Conditions:
Dynamically loading more than a certain number of shared libraries will result in a tmm core.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


476038-4 : Mac Edge Client crashes on OS X 10.7 if a user adds new server using its IP address rather than DNS name

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client for Mac crashes on OS X 10.7 if a user adds a new server using its IP address rather than its DNS name.

Conditions:
Create an APM virtual server IP address using the Edge Client for Mac

Impact:
Edge Client crashes

Workaround:
Use DNS name rather than IP address when adding a new server.


476032-3 : BIG-IP Edge Client may hang for sometime when disconnecting from Firepass server

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client hangs in "Disconnecting" state for some time if the backend server is FirePass.

Conditions:
FirePass server as backend

Impact:
User has to wait


475829-2 : AWS - VE is locked out after live install on 2nd slot.

Component: TMOS

Symptoms:
SSH access might be blocked on VE (launched in AWS) after live install on 2nd slot is performed and VE is booted to 2nd slot.

Conditions:
VE running in AWS
Live install performed on 2nd slot and VE is booted to it.

Impact:
SSH access to the box might be lost.
It's effectively locked out since there is no console access to this VM.


475819-2 : BD crash when trying to report attack signatures

Component: Application Security Manager

Symptoms:
The Enforcer rarely crashes when logging attack signatures.

Conditions:
A rare issue that happens suddenly when reporting attack signatures to the logs.

Impact:
Traffic resets, failover.

Workaround:
This issue has no workaround at this time.


475791-2 : Ramcache profile may dispatch internal messages out-of-order leading to assert

Component: Local Traffic Manager

Symptoms:
Ramcache profile might dispatch internal messages out-of-order, leading to assert.

Conditions:
Assert may occur when the following conditions are met:
 - Virtual server uses ramcache profile.
 - Virtual server has mirroring enabled.
 - Device is in standby mode.
 - Active unit is unable to fulfill incoming HTTP request (ramcache entry is invalid / no pool members).
 - Standby unit is able to fulfill mirrored request (ramcache entry is valid).

Impact:
Due to this rarely occurring race condition, a tmm_panic occurs ('valid pcb') when a connection is being closed and the ramcache feature is able fulfill an incoming request. Standby unit becomes temporarily unavailable.

Workaround:
Do not use ramcache profile and connection mirroring feature together.


475735-1 : Failed to load config after removing peer from sync-only group

Component: Access Policy Manager

Symptoms:
Load sys config fails.

Conditions:
Loading config after removing peer from sync-only device group.

Impact:
Failed to load config.

Workaround:
Remove peer device from the sync-only device group on which policy sync has been performed previously.


475677-1 : Connections may hang until timeout if a LTM policy action failed

Component: Local Traffic Manager

Symptoms:
When an LTM policy action that takes place during an HTTP request or response fails (which is very rare), the affected connection hangs until a timeout occurs.

Conditions:
This issue occurs when you attach an LTM policy to a virtual with a rule that has an action that fails. Now send a request that matches that rule. The command 'tmsh show ltm policy' will show the action failed, but the connection 'hangs' until timeout.

Impact:
When an LTM policy action fails, affected connections hang until they time out.

Workaround:
This issue has no workaround at this time.


475505-5 : Windows Phone 8.1 built-in browser is not properly detected by BIG-IP system.

Component: Access Policy Manager

Symptoms:
Windows Phone 8.1 built-in browser is not properly detected by the BIG-IP system.

Conditions:
Windows Phone 8.1 built-in browser.

Impact:
Built-in browser is not properly detected.


475460-3 : tmm can crash if a client-ssl profile is in use without a CRL

Component: Local Traffic Manager

Symptoms:
TMM can crash if a client-ssl profile is in use without a certificate revocation list (CRL) configured.

Conditions:
A client-ssl profile is in use without a configured CRL, and the customer has an Engineering Hotfix installed that includes the fix for ID384451.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


475363-4 : Empty or invalid configuration, or during exception in NTLM, handling might not work as expected.

Component: Access Policy Manager

Symptoms:
When the system encounters an empty or invalid configuration, or during exception in NTLM, handling might not work as expected.

Conditions:
Empty DC list configured in the NTLM configuration.

Impact:
NTLM authentication won't work correctly.

Workaround:
Fix the configuration - make sure that DC list is not empty.


475322-1 : cur_conns number different in tmstat and snmp output.

Component: Local Traffic Manager

Symptoms:
The current connections (cur_conns) number different in tmstat and snmp output.

Conditions:
This problem occurs when MPTCP is used.

Impact:
Incorrect cur_conns counting when using MPTCP.

Workaround:
None.


475125-1 : Use of HTTP::retry may cause TMM crash

Component: Local Traffic Manager

Symptoms:
Use of HTTP::retry may cause TMM to crash in certain scenarios.

Conditions:
Use of HTTP::retry may cause TMM to crash in certain scenarios.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


475049-5 : Missing validation of disallowing empty DC configuration list

Component: Access Policy Manager

Symptoms:
NTLM authentication feature requires at least one Domain Controller to be specified in the NTLM Auth Configuration Domain Controller FQDN list. This is as designed to prevent unwanted load on the server because NTLM authentication is performed on a per connection basis. There is no DC autodiscovery mechanism implemented for NTLM authentication, by design. To effect the feature, we need the administrator to specify particular servers. Having this list empty caused an unexpected behavior, in which authentication is not performed and yet is considered a success.

The configuration of the Domain Controller for an NTLM authentication configuration is different from the configuration of the Domain Controller for an NTLM machine account. For the NTLM machine account, the BIG-IP system can automatically discover one of the available DCs using DNS method or the administrator can specify a DC.

We are asking administrators to specify at least one Domain Controller for NTLM Auth configurations in the Domain Controller FQDN list.

Conditions:
Domain Controller configuration is allowed to be empty which is both incorrect and unsupported.

Impact:
misbehave with incorrect and unsupported configuration, and causes no authentication is being performed.


474974-1 : Fix ssl_profile nref counter problem.

Component: Local Traffic Manager

Symptoms:
ssl_profile memory leak.

Conditions:
This occurs after several iterations of the following steps:
(1) Create ssl_profiles
(2) Use ssl_profiles to complete a number of handshake operations.
(3) Delete ssl_profiles.

Impact:
ssl_profile memory leak.

Workaround:
None.


474779-7 : EAM process fails to register channel threads (MPI channel) with TMM, and subsequent system call fails.

Component: Access Policy Manager

Symptoms:
On EAM process initialization, the plugin is unable to register a thread (MPI channel) with TMM on rare occasions. A subsequent system call to end the process fails.

Conditions:
Unknown.

Impact:
EAM plugin is up but the access gates are not initialized correctly.

Workaround:
Establish connection to OAM server.
bigstart stop eam
Clear config.cache from each accessgates by deleting /config/aaa/oam/<partition_name>/<aaa_oam_obj_name>/<accessgate_name>/config.cache using commandline.
bigstart restart eam


474771 : bigtop global statistics not including pva statistics for BIG-IP row

Component: Local Traffic Manager

Symptoms:
BIG-IP system row under-reports the statistics values.

Conditions:
BIG-IP system with PVA mode full is used.

Impact:
bigtop statistics report the wrong values for the BIG-IP system throughput columns.


474698-1 : BIG-IP as IdP can send incorrect 'Issuer' element for some SLO requests under certain conditions.

Component: Access Policy Manager

Symptoms:
When client initiates Single Logout (SLO) on the BIG-IP system as IdP which is associated with multiple SP connectors, IdP will send SLO request message to each SP to which user has connected within this session.

If user has connected to multiple SP (bound to different IdP) within the same session, the SLO messages f is sent with 'Issuer'element referencing the name of the last IdP service user has accessed.

Conditions:
This issue occurs when:
1.BIG-IP is configured as IdP.
2.BIG-IP has more then one IdP configuration object.
3.IdP objects are assigned as resources to the same Access Policy.
4.Each IdP configuration is bound to at least one SP-connector.
5.Client initiated SLO on IdP.

Impact:
Impact is based on recipient of the message. Recipient (SP) may reject the SLO request, or process it successfully based on implementation.

Workaround:
Disable SLO on BIG-IP.


474584-4 : igbvf driver leaks xfrags when partial jumbo frame received

Component: Local Traffic Manager

Symptoms:
On platforms utilizing the igbvf driver, xfrags can be leaked if a partial jumbo frame is received.

Conditions:
On platforms utilizing the igbvf driver, xfrags can be leaked if a partial jumbo frame is received.

Impact:
TMM memory usage increases over time and eventually TMM crashes due to lack of memory.

Workaround:
None.


474231-3 : RAM cache evictions spikes with change of access policy which may lead to slow webtop rendering

Component: Access Policy Manager

Symptoms:
When there is a high load on the system and a user changes an access policy, it can lead to slow rendering of the webtop or the access page.

Conditions:
This issue occurs when there is a high load with change of access policy around that time.

Impact:
The impact of this issue is slow webtop/access page rendering.

Workaround:
This issue has no workaround at this time.


474226 : LB_FAILED may not be triggered if persistence member is down

Component: Local Traffic Manager

Symptoms:
LB_FAILED may not be triggered if persistence member is down.

Conditions:
This occurs when the following conditions exist: - Incoming connection has cookie matching persistence entry. - Persisted pool member has been marked down. - No other pool members are available.

Impact:
Cannot utilize LB::reselect command.

Workaround:
None.


474069-2 : ICAP can assert "valid node" on resumption after long-running iRule

Component: Service Provider

Symptoms:
If the IVS connection is closed while ICAP is processing an iRule that completes asynchronously, and if on resumption of procesing the ICAP response an abort occurs, the closing is still processed after the abort, resulting in an assertion "valid node" and a TMM crash.

Conditions:
Long-running iRule on an ICAP event.
IVS connection is closed during iRule processing.
ICAP server response causes abort (such as protocol error).

Impact:
TMM crash

Workaround:
If possible, avoid commands that could complete asynchronously (like session table) in ICAP iRule events.


474058-4 : When the BIG-IP system is configured as Service Provider, APD may restart under certain conditions

Component: Access Policy Manager

Symptoms:
When the BIG-IP system is configured as Service Provider, APD may restart under certain conditions.

Conditions:
This issue occurs when the BIG-IP system is configured as a SAML Service Provider and BIG-IP receives a signed assertion that contains empty "Reference URI" in Signature element.

Impact:
The impact of this issue is that APD restarts.

Workaround:
This issue has no workaround at this time.


474002-2 : Server SSL profile unable to complete SSL handshake when server selects DHE-based key exchange, and is configured with 2048-bit or larger DH keys

Component: Local Traffic Manager

Symptoms:
If a BIG-IP virtual server is configured with a Server SSL profile, and a pool member or server selects a DHE-based ciphersuite (e.g. DHE-RSA-AES128-SHA), the BIG-IP system might not successfully complete an SSL handshake with the server.

Conditions:
This occurs when the following conditions exist: - HTTPS Pool member or server. - Virtual server with Server SSL profile. - Server is configured with 2048-bit or larger Diffie-Hellman keys.

Impact:
Traffic to affected pool members fails, although the pool members are marked up by HTTPS monitors.

Workaround:
Either disable the use of ephemeral Diffie-Hellman (DHE) key exchange on the backend servers, select a smaller set of DH parameters on the backend servers, or disable DHE ciphersuites in affected virtual servers' Server SSL profiles.


473759 : Unrecognized DNS records can cause mcpd to core during a DNS cache query

Component: Local Traffic Manager

Symptoms:
mcpd cores during a DNS cache record query if a DNS record with an unknown type is in the cache. mcpd attempts to translate the record's type into a text string, but ends up with a NULL pointer instead.

Conditions:
A DNS record with a type unknown by mcpd must exist in the DNS cache during the query.

Impact:
mcpd cores, causing either a failover (if there is a standby unit) or an outage while mcpd restarts (if there is no standby unit).


473577-3 : Changes not synced or received by GTMd for GTM Wide IP Alias Items

Component: Global Traffic Manager

Symptoms:
Gtmd does not receive and process updates about new GTM Wide IP Alias and topology items.

Conditions:
After creating a GTM Wide IP Alias/topology item, any subsequent changes to Wide IP Alias/topology only will not be received by the gtmd daemon, and thus will not be synchronized to other GTM devices in the sync group.

Impact:
Gtmd does not receive updated information about changes to Wide IP Alias/topology configuration items.

Workaround:
Make changes other than Wide IP alias or topology changes after making Wide IP Alias/topology changes, i.e., update Description of a Wide IP, or update any property of a server object.


473488-4 : In AD Query agent, resolving of nested groups may cause apd to spin

Component: Access Policy Manager

Symptoms:
Access policy daemon (apd) consumes approximately 100% CPU and puts a heavy load on the network sometimes when resolving nested groups in AD Query. The AD Group Cache updates in a loop.

Conditions:
This issue occurs when the user belongs to a parent domain, and is a member of a group that belongs to a sub-domain.

For example, user belongs to parent.com,
group belongs to child.parent.com;
the user is a member of the group. The
"fetch nested groups" option is enabled for AD Query.

Impact:
The impact of this issue is that the user will be unable to resolve nested groups and unable to finish AD Query.

Workaround:
There is no workaround at this time.


473485-2 : Fixed a few issues in HTTP Auth module

Component: Performance

Symptoms:
1. possible buffer overflow when session var CookieClientData is >8K
2. inappropriate use of mc_get_session_var in agent that may cause apd crash
3. per-request memory leak of cookies struct

Conditions:
1. session variable CookieClientData is > 8K
2. apd may crash unexpectedly when HTTP Auth agent cannot get session variable
3. When HTTP Auth agent is configured for an Access Policy apd might leak memory per-request

Impact:
apd might crash
apd might leak memory per-request


473344-4 : Kerberos Request-Based Auth (RBA) failure when session is initially created on a different VIP.

Component: Access Policy Manager

Symptoms:
Kerberos Request-Based Auth (RBA) failure when session is initially created on a different VIP.

Conditions:
APM access policy is configured with Kerberos authentication and the attempted authentication session was was initially created on a different VIP.

Impact:
Error occurs with no error message. The system should post an error message similar to the following: (Failure VIP Name): Kerberos Request-Based Auth failed because session was initially created on a different VIP (Original VIP Name). Please either disable RBA on the originating access profile, or remove the domain cookie.

Workaround:
Either disable RBA on the originating access profile, or remove the domain cookie.


473255-1 : Javascript sibmit() method could be rewritten incorrectly inside of 'with' statement.

Component: Access Policy Manager

Symptoms:
Portal Access could incorrectly rewrite Javascript submit() method if it's called in scope of 'with' statement and without object.

Impact:
Form cannot be submitted from script on page.

Workaround:
Create an iRule which adds explicit object reference to submit() call.


473200 : Renaming a virtual server causes unexpected configuration load failure

Component: TMOS

Symptoms:
Manually renaming a virtual server causes unexpected configuration load failure.

Conditions:
This occurs when all the following conditions are met:

-- The BIG-IP system configuration containing a virtual server that was renamed by editing bigip.conf manually
-- The virtual server has an empty pool, or has a pool with pool members and a monitor.

Impact:
Cannot reload configuration. The system posts the following error:
01020056:3: Error computing object status for virtual_server broken (old_virtual_server_name). Unexpected Error: Loading configuration process failed.

Workaround:
Note: Traffic may be temporarily disrupted while the updated configuration loads.

Perform any one of the following:
-- Remove the pool assignment from the virtual before renaming.
-- Ensure the pool contains members before renaming. If the pool has a monitor, temporarily remove the monitor and add it back after renaming.

To load the updated configuration, after renaming, issue 'bigstart restart'.


473139-4 : IMAP monitor works for LTM fails for BIG-IP DNS

Component: Global Traffic Manager

Symptoms:
BIG-IP DNS marks down a virtual server configured with an IMAP monitor even though IMAP is working

Conditions:
Configure IMAP monitor for BIG-IP DNS virtual server. Note: IMAP monitor works for LTM. Failure occurs only on GTM.

Impact:
Login is not attempted by BIG-IP DNS monitor, so the system is unable to determine IMAP server status.

Workaround:
None.


473129-4 : httpd_apm access_log remains empty after log rotation

Component: Access Policy Manager

Symptoms:
The /var/log/httpd/access_log file remains empty after log rotation.

Conditions:
At least one log rotation which happens at 4:00am every day of the box time

Impact:
access_log are missing

Workaround:
"bigstart restart httpd_apm" must be part of the cronjob every day [around 4:30am] after log rotation.


473088-5 : Virtual server with RequestAdapt/ResponseAdapt profiles along with a OneConnect profile

Component: TMOS

Symptoms:
The BIG-IP system does not allow you to configure a virtual server with RequestAdapt/ResponseAdapt profiles along with a OneConnect profile. If you attach a ClientSSL profile, however, the configuration is allowed, which is incorrect behavior.

Conditions:
Create a virtual server, add tcp, request-adapt, and one-connect profiles along with ClientSSL.

Impact:
This unsupported configuration might have many unknown side effects in TMM.

Workaround:
Do not configure a virtual server with one-connect and requestadapt or responseadapt profiles.


472944 : SMTPS race condition after STARTTLS may cause incorrect SMTP responses

Component: Local Traffic Manager

Symptoms:
After STARTTLS handshake, SMTP communication fails due to one of the following reasons:
  - BIG-IP system responses to SMTP client are not synchronized (that is, the responses do not match the requested commands).
  - SMTPS profile activation mode is 'require' and the BIG-IP system responds with '530 Must issue a STARTTLS command first.

Conditions:
This occurs when the following conditions are met: -- A virtual server configured with an SMTPS profile. -- After the STARTTLS handshake on the client side and the BIG-IP system has sent an RSET command to SMTP server, the BIG-IP system receives a command (such as HELO or EHLO) from an SMTP client before the BIG-IP system receives the RSET response from SMTP server.

Impact:
SMTP communication using the SMTPS profile might not succeed. intermittently or consistently.


472831-3 : FIPS-enabled DNSSEC can cause TMM core

Component: Local Traffic Manager

Symptoms:
Creating Cavium-FIPS-enabled DNSSEC zone and keys causes TMM core.

Conditions:
FIPS DNSSEC zone and key creation on a FIPS-platform.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


472571-3 : Memory leak with multiple client SSL profiles.

Component: Local Traffic Manager

Symptoms:
If multiple client SSL profiles are attached to a virtual server, memory will leak each time any profile is changed.

Conditions:
Multiple client SSL profiles are attached to a virtual server.

Impact:
Memory will leak a small amount of memory.

Workaround:
None.


472565 : Gx session "Created" and "Terminated" counters are increased on subscriber discovery when Gx is disabled

Component: Policy Enforcement Manager

Symptoms:
Gx sessions are created and terminated on subscriber discovery if Gx is disabled. This results in a corresponding increase in the Gx session "Created" and "Terminated" counters.

Conditions:
Occurs on subscriber discovery when Gx is disabled.

Impact:
Results in an incorrect increase in Gx session "Created" and "Terminated" counters.


472446-8 : Customization group template file might cause mcpd to restart

Component: Access Policy Manager

Symptoms:
A config sync or tmsh transaction might fail and make mcpd restart if the config sync or tmsh transaction includes a misconfigured object and simultaneously includes a customization group template file.

If strict updates are enabled on iApp and Adv Customization is performed that MCPd could crash tpp.

Conditions:
The config sync or tmsh transaction includes a misconfigured object and includes a customization group template file.

Impact:
The config sync or tmsh transaction fails, and mcpd exits. Note: Avoid configurations that put customization group template file objects through a config sync or tmsh transaction, when that transaction might contain an object configured with an invalid value. This results in a configuration error.
Here is one example of the types of messages that may be displayed when this occurs:

-- info mcpd[12395]: 01071528:6: Device group '/Common/f5omb' sync inconsistent, Incremental config sync may not be complete on one or more devices in this devicegroup, Sync status may not be consistent until incremental config sync is complete.
-- err mcpd[12395]: 01070734:3: Configuration error: Cannot apply template as cache path for (customization template file logon.inc customization group /Common/ap_deptSharePt_act_logon_page_ag) cannot be empty.
-- err mcpd[12395]: 01070596:3: An unexpected failure has occurred, - apm/validation/APMCustomizationFileObject.cpp, line 1825, exiting...
-- info sod[5467]: 010c0009:6: Lost connection to mcpd - reestablishing.
-- err zxfrd[12033]: 0153e0f7:3: Lost connection to mcpd.

Workaround:
None.


472365-2 : The vCMP worker-lite system occasionally stops due to timeouts

Component: TMOS

Symptoms:
The VCMP host side of the worker-lite system has a shorter timeout that the VCMP guest side. This can cause a worker-lite VCMP host to silently stop processing worker-lite requests for a VCMP guest.

Conditions:
This issue affects worker-lite based VCMP hosts running any version of VCMP guests that are processing SSL and compression traffic.

Impact:
SSL and compression traffic does not pass through VCMP guests running on an affected VCMP host. The system posts error messages in /var/log/ltm, similar to the following: Device error: crypto codec 'device-name' queue is stuck.

Workaround:
To resume processing of SSL and compression traffic in a VCMP guest, restart the guest tmm by issuing a 'bigstart restart tmm' from within the guest. Restarting a VCMP guest by setting its state from 'deployed' to 'provisioned' and then back to 'deployed' also resumes processing of SSL and compression traffic.


472256-5 : tmsh and tmctl report unusually high counter values

Component: Access Policy Manager

Symptoms:
When running the command 'tmctl profile_access_stat', the values displayed for sessions_eval_cur, sessions_active_cur, and/or sessions_estab_cur mignt be unusually high.

Conditions:
The issue might appear if the following events happen, in sequence:
1. Some sessions have been established.
2. On a chassis system, a blade restarts. On an appliance system, tmm restarts on the active system, which triggers failover.
3. Some of the existing sessions log out after the chassis or appliance is back online.

Impact:
The profile access stat might report inaccurate readings. The system returns results similar to the following: -- sessions_active_cur 18446744073709551615. -- sessions_eval_cur 18446744073709551615.

Workaround:
None.


472202-1 : Potential false positive report of DMA RX lockup failure

Component: TMOS

Symptoms:
Due to mixed traffic in the same ring, heartbeat message might not be received in time and therefore system report DMA RX lockup after a period of time.

Conditions:
Mixed traffic stressing into DMA ring 0 and have impacts to heartbeat healthy messages.

Impact:
TMM restart and report HSB DMA RX lockup

Workaround:
None.


472157-2 : Large file uploads abort for SPDY/3 and SPDY/3.1

Component: Local Traffic Manager

Symptoms:
When uploading large file using SPDY/3 or SPDY/3.1, the browser aborts the connection.

Conditions:
The browser uploads a file larger than 16 KB while using a SPDY/3 or SPDY/3.1 connection.

Impact:
The browser will stall the upload, because it doesn't receive a correct WINDOW_UPDATE from the BIGIP. The browser will appear to be stuck.

This affects all browsers that support the mentioned protocols.


472148-6 : Highly fragmented SSL records can result in bad record errors on Nitrox based systems

Component: Local Traffic Manager

Symptoms:
If a highly fragmented SSL record is decrypted by a system with a Cavium Nitrox card, the system will incorrectly respond with a bad SSL record error.

Conditions:
Highly fragmented SSL records and a system with a Cavium Nitrox card.

Impact:
Lost SSL connections.

Workaround:
This issue has no workaround at this time.


472125 : IP Intelligence report data is not roll-forwarded between installations as it should

Component: Advanced Firewall Manager

Symptoms:
Upgrade process does not apply on AVR-DWBL tables, and thus will show no data after the upgrade.

Conditions:
Upgrading from 11.5.0 / 11.5.1 / 11.5.4

Impact:
AVR statistics for DWBL will lose their data.


472092-2 : ICAP loses payload at start of request in response to long execution time of iRule

Component: Service Provider

Symptoms:
A long-running iRule in ICAP_REQUEST can cause the loss of payload while the iRule is running, resulting in the beginning of the payload being omitted in the request to the ICAP server. (Note that headers are unaffected.)

Conditions:
This issue occurs when the following conditions are met: -- request-adapt or response-adapt is used. -- IVS with ICAP. -- iRule on ICAP_REQUEST event that takes a long time to execute.

Impact:
ICAP request to ICAP server can lose the beginning of the payload.

Workaround:
When possible, keep iRule duration short by minimizing processing in ICAP_REQUEST and avoiding unnecessary processing, or move the processing elsewhere.


472062-1 : Unmangled requests when form.submit with arguments is called in the page

Component: Access Policy Manager

Symptoms:
Expressions like form.submit(something) are not being rewritten by Portal Access.
This may cause direct URL or unmangled paths in request. Such request will fail and application could stop working.

Impact:
Web Application could send unmangled requests and stop working.

Workaround:
iRule workaround is possible, but it will be unique for each web application.


471901-1 : Log publishers with failed HSL destinations continue to accept and deliver logs.

Component: TMOS

Symptoms:
Log publishers with failed HSL destinations continue to accept and deliver logs to other destinations.

Conditions:
Log publishers normally only accept logs if all associated destinations report being up. On systems with this bug, as long as an HSL destination can be configured and initialized (i.e. as long as there is a route to the destination), it is believed to be "up" even if actual connections cannot be established.

Impact:
Customers may falsely believe either that publishers are /supposed/ to ignore failures, or that failed destinations are actually working.

Workaround:
Upgrade. There is no work-around for this problem without picking up new code.


471874-3 : VDI plugin crashes when trying to respond to client after client has disconnected

Component: Access Policy Manager

Symptoms:
VDI plugin crashes when trying to respond to client after client has disconnected.

Conditions:
Client has disconnected, VDI plugin tries to send response to the client.

Impact:
VDI plugin crash.


471821-3 : Compression.strategy "SIZE" is not working

Component: Local Traffic Manager

Symptoms:
The Compression strategy Size is not working as expected. Instead of performing compression in the software, the system use the hardware compression provider to compress HTTP server responses.

Conditions:
1. Compression.strategy "SIZE"
2. Create a http vs with http compress profile

Impact:
Compression data is done in hardware rather than software.

Workaround:
Set compression.providerbusy to 0


471644-2 : BIG-IP system total throughput stats two times higher than expected stats

Component: Local Traffic Manager

Symptoms:
BIG-IP total throughput stats are two times higher than expected throughput stats. 'Total bits/sec' is the sum of interface bits in and interface bits out, which might result in unexpected stats.

Conditions:
This occurs on 11.4.1, 11.5.0, and 11.5.1.

Impact:
Stats do not match what is expected.

Workaround:
None.


471625-2 : After deleting external data-group, importing a new or editing existing external data-group does not propagate to TMM

Component: Local Traffic Manager

Symptoms:
After deleting external data-group, importing a new or existing external data-group does not propagate to TMM.

Although the import/modify individually seem to work as expected with no errors displayed in the web interface, the ltm log shows 'update queued', but does not show 'update finished' for the imported/modified datagroup.

tmctl ext_class_stat command shows that the deleted data-groups are still in the TMM and existing data-groups stay the same and do not reflect the modification that are made to them via GUI.

Conditions:
The issue occurs when working in an administrative partition other than Common.

Impact:
iRules associated with the data-groups do not behave as expected if data-group is deleted and afterwards when data-group modifications are made.

Workaround:
There are two options for workarounds: 1. Use short names for the data-group files. It is the long names that are problematic. This is the recommended workaround. 2. Reboot. This causes the mcpd to re-load the data-groups and corrects the situation.


471421-3 : Ram cache evictions spikes with change of access policy leading to slow webtop rendering

Component: Access Policy Manager

Symptoms:
When there is a high load on the system and a user changes an access policy, it can lead to slow rendering of the webtop or the access page.

Conditions:
High load with change of access policy around that time.

Impact:
Slow webtop/access page rendering.


471292-1 : Deterministic NAT: incorrect mapping on platforms with PDE trunk size greater than 1

Component: Carrier-Grade NAT

Symptoms:
The deterministic NAT (DNAT) utility (dnatutil) might report incorrect reverse mappings for platforms with PDE trunk size greater than 1, due to PDE trunk size value incorrectly logged in the DNAT state information.

Conditions:
Using LSN pool with DNAT mode, and using dnatutil for reverse mapping.

Impact:
Reverse map could provide incorrect results.

Workaround:
Use the --flags attribute to manually provide the daglib flag attribute, which can include the PDE trunk size value.


471288-3 : TMM might crash with session-related commands in iRules.

Component: Local Traffic Manager

Symptoms:
TMM might crash with session-related commands in iRules.

Conditions:
This occurs when the following conditions are met:
1) session/table command.
2) client_closed/server_closed iRule.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Avoid using client_closed and sever_closed iRules at same time, in a virtual server using session/table command in iRule.


471117-1 : iframe with JavaScript in 'src' attribute not handled correctly in IE11

Component: Access Policy Manager

Symptoms:
If an HTML page contains an iframe with JavaScript code in the src attribute, some web applications might not work correctly through portal access in Internet Explorer 11.

Conditions:
Conditions leading to this issue include Internet Explorer 11 and iframe with JavaScript in the src attribute: <iframe src="javascript: some code...">

Impact:
Some Web applications may work incorrectly.

Workaround:
This issue has no workaround at this time.


471042-4 : Datastor High Velocity Traffic Pattern Changes

Component: TMOS

Symptoms:
During periods of high velocity in the traffic pattern, datastor will seem to stop caching new objects.

Conditions:
A traffic pattern that requires that a given percentage of the working set be displaced in order to move the cache content towards the new working set.

Impact:
For web sites that have a fairly static working set, this will reduce the efficacy of their caching by a percentage relative to the write reserve.

Workaround:
None.


470788-5 : Creating static ARP entry with unreachable IP address causes BIG-IP to be unreachable after reboot

Component: TMOS

Symptoms:
Saved configuration may not load if static ARP entries are configured that do not match a self IP subnet.

Conditions:
Saved config with static ARP whose IP falls outside of any self IP subnet.

Impact:
The impact of this issue is that the config fails to load.

Workaround:
To work around this issue remove the static ARP entry from saved config by manually editing config file.


470214-3 : Missing APM (or other module) sessions

Component: TMOS

Symptoms:
In some high availability (HA) configurations, the system experiences data loss in the SessionDB.

Conditions:
This occurs when the following conditions are met: -- Active HA mirroring configured. -- Failover occurs. -- Failover on secondary causes fail-back to original system.

Impact:
Missing APM (or other module) sessions.


470205-3 : /config/.../policy_sync_d Directory Is 100% Full

Component: Access Policy Manager

Symptoms:
After a policy sync operation, the Policy Sync history file objects remain within the /config/.../policy_sync_d directory.

Conditions:
This issue is further exacerbated when customization an/or sandbox (hosted content) files are associated with the profiles being synced.

Impact:
Over time the saved number and size of the Policy Sync history files can grow to fill all available space.

Workaround:
The psync-history objects and related data files can be manually deleted by running the following commands from within tmsh context:
`cd /Common/PolicySyncHistory`
`delete apm policy psync-history all`
`save sys config partitions all`

Please note that the above steps will remove all psync-history and related file objects from your local device. Which means, you will no longer have entries within the history tab of your Policy Sync page of the Admin GUI.


470191 : Virtual with FastL4 with loose initiation and close enabled might result in TMM core

Component: Local Traffic Manager

Symptoms:
Virtual with FastL4, loose initiation and loose close enabled might result in TMM core.

Conditions:
The problem can occur when the following conditions are met:
 - Virtual server with FastL4 profile.
 - FastL4 profile has loose initiation and loose close enabled.
 - TCP FIN is received that is not associated with an existing connection.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Do not enable loose initiation and loose close on FastL4 profile


470175-1 : DNAT utility (dnatutil) does not support rfc5424 structured log format

Component: Carrier-Grade NAT

Symptoms:
DNAT utility (dnatutil) unable to handle syslog with structured data.

Conditions:
Deterministic NAT LSN pool with "Syslog" log publisher, where the syslog log entry contains structured data.

Impact:
dnatutil reverse map using rfc5424 syslog with structured data content.

Workaround:
Use default log format of "BSD format", or configure syslog daemon to only output raw syslog content.


469986 : Drive mapping paths lose backslash when entered using the GUI

Component: Access Policy Manager

Symptoms:
In Network Access -> Drive Mappings, if you enter a path such as \\host\path using the GUI, it will be saved as \hostpath instead.

Conditions:
This bug only exists in the 11.5.0-HF

Impact:
Changes the path name.

Workaround:
The path can be entered correctly via tmsh.


469824-6 : Mac Edge client on Mac mini receives settings for iOS Edge Client

Component: Access Policy Manager

Symptoms:
BIG-IP Edge Client for Mac on Mac mini receives settings for iOS Edge Client. Edge Client behavior might be different than expected if Mac Edge Client settings are different from iOS Edge Client settings.

Conditions:
Mac mini, iOS Edge and Mac Edge Client setting in connectivity profile on BIG-IP.

Impact:
Different than expected behavior of Edge Client for Mac.


469702 : Steering should be allowed with performace Layer 4 and classification disabled.

Component: Policy Enforcement Manager

Symptoms:
When fastL4 is enabled and classification is disabled, we should be able to still forward the traffice.

Conditions:
FastL4 profile and classification is disabled. configure Forwarding action.

Impact:
Forwarding is not done.


469519-2 : tmm assert "l4hdr set"

Component: Policy Enforcement Manager

Symptoms:
The TMM may assert when processing packet fragments that do not contain an L4 header while using a FastL4 profile.

Conditions:
FastL4 profile enabled
IP fragment reassembly not enabled in the profile

Impact:
The TMM crashes and restarts.

Workaround:
Enable "Reassemble IP Fragments" in the FastL4 profile.


469361-1 : Unexpected tmm restart, no core - beta tmm version

Component: Local Traffic Manager

Symptoms:
The TMM unexpectedly restarted without generating a core.

Conditions:
When the connection between the MCPD and TMM is lost the TMM will restart.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Do not configure MPTCP.


469296-1 : MCPD config validation error resulting in error: requested integer (0) is invalid

Component: TMOS

Symptoms:
MCPD config validation error might occur, resulting in an error such as:

01070911:3: The requested integer (0) is invalid for egress_high in profile_mblb

This is not an indication of a configuration issue with an MBLB profile.

This issue can occur when loading the configuration, or performing a ConfigSync, or during the initial configuration load of mcpd on a secondary blade in a VIPRION chassis.

Conditions:
This occurs under unknown and rare conditions. The BIG-IP configuration does not need to reference MBLB profiles for this issue to occur.

Impact:
Config sync fails, or MCPD restarts, and the system logs the message 'requested integer (0) is invalid'.

Workaround:
This issue can be mitigated by forcing the mcpd process to reload the configuration as detailed in https://support.f5.com/kb/en-us/solutions/public/13000/000/sol13030.html.


469139-3 : Fix for ID 429124 working but GUI statistics showing PVA connections not PVA'd

Component: Local Traffic Manager

Symptoms:
Virtual server stats detail page displays 0 values for current PVA assist, PVA max and PVA total assist. The stats for these values are being pulled from the pva struct but the counter are actually updated on the VS stat table.

Conditions:
supported pva platform

Impact:
Virtual server stats detail for PVA acceleration display zero values.


469115-1 : Management client-ssl profile does not support multiple key/cert pair.

Component: Local Traffic Manager

Symptoms:
Management SSL client-ssl profile does not support multiple key/cert pair.

Conditions:
Management client-ssl profile.

Impact:
It supports only one key/cert pair which is stored in profile key/cert/chain/passphrase. cert-key-chain in client-ssl profile is not a valid selection. Selecting cert/key pair from cert-key-chain could cause problem.


469071-1 : TMM segfault in mpctp_switch_conns

Component: Local Traffic Manager

Symptoms:
TMM segfault in mpctp_switch_conns

Conditions:
This can occur is mptcp is configured and there is an invalid tcp session.

Impact:
tmm restarts

Workaround:
Do not configure mptcp in the tcp profile.


469033-2 : Large big3d memory footprint.

Component: Global Traffic Manager

Symptoms:
The big3d process might take up a large amount of memory.

Conditions:
Using GTM in various configurations.

Impact:
Large big3d memory footprint. This is a configuration- and usage-dependent issue.

Workaround:
None.


468908-2 : Session timeout settings doesn't work properly

Component: Access Policy Manager

Symptoms:
Disabling "Session timeout" option in Resource item properties has no effect on appearing of popup dialog about user log out.

Conditions:
1. Set inactivity timeout to 105 sec.
2. Create resource item with enabled session timeout.
3. Go to this resource. Popup dialog will appear via 5 sec.
4. Disable session timeout for this item.
5. Go to this resource. Popup dialog also will appear via 5 sec.

Impact:
Session timeout can't be disabled in Resource item.

Workaround:
There is no workaround at this time.


468874-4 : Monpd errors appear when AVR loads data to MySQL

Component: Application Visibility and Reporting

Symptoms:
An error of the form "Too many partitions (4) defined for DB table..." will appear in both /var/log/ltm and /var/log/avr/monpd.log

Conditions:
This issue occurs when traffic is running and AVR is being used by any of the following provisioned modules: AVR, ASM, PEM, AFM, or SWG.

Impact:
No actual impact on data accuracy or performance - only errors in /var/log/ltm and /var/log/avr/monpd.log

Workaround:
This issue has no workaround at this time.


468837-3 : SNAT translation traffic group inheritance does not sync across devices

Component: TMOS

Symptoms:
When a snat-translation object is created, and its inherited-traffic-group property is set, this property does not sync to other devices.

Conditions:
This is relevant for any setup with multiple devices in a CMI failover device group.

Impact:
The inherited-traffic-group property must be manually maintained on all devices.

Workaround:
Enable the 'full sync' option instead of using incremental sync.


468542 : Virtual servers with a SPDY profile ignore SNAT none setting

Component: Local Traffic Manager

Symptoms:
Virtual servers with a SPDY profile ignore SNAT 'None' setting.

Conditions:
This occurs on virtual servers that have an associated SPDY profile when the Source Address Translation setting is 'None'.

Impact:
Virtual servers with a SPDY profile determine the server-side source address using SNAT Automap, which might result in the incorrect server-side source address.

Workaround:
This issue has no workaround at this time.


468519-3 : BIG-IP DNS configuration load failure from invalid bigip_gtm.conf file.

Component: Global Traffic Manager

Symptoms:
Config reload fails when renewing the license or performing a new install based on the current config.

This appears to be the result of a invalid bigip_gtm.conf which is used to load the config rather than the mcpdb.bin.

Conditions:
If any virtual servers are configured with a dependency list that includes other virtual servers from the same BIG-IP system, BIG-IP DNS creates an invalid bigip_gtm.conf file.

Impact:
BIG-IP DNS config will fail to load when triggered to load from config file

Workaround:
None.


468517-3 : Multi-blade systems can experience active/standby flapping after both units rebooted

Component: TMOS

Symptoms:
After rebooting multi-bladed BIG-IP systems configured for failover, one or more of the systems has some of its blades flap from active to standby.

Conditions:
Rebooting systems fairly close in time from one another (about a minute apart). Traffic group must reference an HA group.

Impact:
Invalid redundant status.

Workaround:
Modify the traffic group to no longer reference an HA group:
tmsh modify cm traffic-group traffic-group-1 ha-group none.


468514-2 : Receiving several ConfigSync requests in a short period of time may cause the mcpd process to restart and produce a core file

Component: TMOS

Symptoms:
Receiving several configuration synchronization (ConfigSync) requests, in a short period of time, may cause the mcpd process to exhaust memory resources, restart, and produce a core file.

Note: The Automatic Sync feature can exacerbate this issue. The Automatic Sync feature is disabled by default.

As a result of this issue, you may encounter one or more of the following symptoms:

Performing a ConfigSync operation causes the BIG-IP system to experience a brief service interruption while the mcpd process restarts.
If configured as part of a high availability (HA) group, the BIG-IP system fails over.
The BIG-IP system generates an mcpd core file.

Conditions:
Receiving several configuration synchronization (ConfigSync) requests with a short interval.

Impact:
The BIG-IP system may experience a brief service interruption while the mcpd process restarts.

Workaround:
None.


468472-4 : Unexpected ordering of internal events can lead to TMM core.

Component: Local Traffic Manager

Symptoms:
TMM may core and failover with the following tcp4 assert: ../modules/hudfilter/tcp4/tcp4.c:937: %svalid pcb%s.

Conditions:
If the TCP profile receives a spurious event it can cause TMM to crash.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.


468395-1 : IPv4 Allocation failure ... is out of addresses

Component: Access Policy Manager

Symptoms:
Existing Network Access clients have problems reconnecting.

Conditions:
This occurs when all of the lease pool IP addresses are allocated to Network Access clients.

Impact:
Existing clients cannot reconnect. The system posts messages to the APM logs: IPv4 Allocation failure ... is out of addresses.

Workaround:
Assign more IP addresses in the lease pool.


468388-2 : Connection flows leak when service provider DAG is configured and/or under-provisioned LSN pools are configured

Component: Carrier-Grade NAT

Symptoms:
Connection flows leak when service provider DAG is configured and/or under provisioned LSN pools are configured on BIG-IP systems.

Conditions:
Service provider DAG and/or under-provisioned LSN pools configured.

Impact:
Connection flow leak causing TMM core after some time.


468387-1 : Enforcer core related to specific error condition in the session db

Component: Application Security Manager

Symptoms:
A bd restart, and failover if redundant pair, may occur.
The core file will show tm_untimeout () as the coring frame.

Conditions:
Load on the system, heavy usage of the sessiondb infrastructure.

Impact:
Traffic will reset while the bd restart or while the failover is happening.

Workaround:
Disable session tracking from the ASM policy.


468375-1 : TMM crash when MPTCP JOIN arrives in the middle of a flow

Component: Local Traffic Manager

Symptoms:
TMM crash when MPTCP JOIN arrives in the middle of a flow.

Conditions:
No workaround

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


468235-1 : The worldwide City database (City2) does not contain all of the appropriate Proxy strings.

Component: TMOS

Symptoms:
Digital Element's proxy information is not available in the City2 database.

Conditions:
This occurs when using the City2 database available from an F5 partner.

Impact:
In the case of a customer obtaining and installing the city database, Digital Element's proxy information is not included.

Workaround:
None.


468175-3 : IPsec interop with Cisco systems intermittent outages

Component: TMOS

Symptoms:
Occasionally, traffic going through an IPsec tunnel from BIG-IP systems to Cisco systems stops after a certain period of time and recovers after an hour.

Conditions:
This issue occurs when there is more than one pair of IPsec SAs negotiated and triggers redundant SA removal on the Cisco router.

Impact:
IPsec tunnel stops passing traffic until the trouble IPsec SA expires and the new set of IPsec SAs are negotiated.

Workaround:
Delete the trouble IPsec SAs


467945-2 : Error messages in AVR monpd log

Component: Application Visibility and Reporting

Symptoms:
Following errors (similar) appear in the monpd log:
 monpd|INFO|Jun 18 13:40:08.947|12463| [stat_bridge_thread::load_file, ] Some rows of load_stat_asm_http_ip_1403124000.1 not loaded (18194 rows affected)

Conditions:
In rare cases that include stress traffic and other rare conditions.

Impact:
There can be very small percentage of lost statistics (approximately 0.002%)

Workaround:
No workaround.


467706-2 : Deterministic NAT: incorrect mapping for VIPRION C4800/C4800N

Component: Carrier-Grade NAT

Symptoms:
Forward and reverse map incorrect for deterministic NAT in VIPRION C4800/C4800N do not work as expected.

Conditions:
LSN Pool with deterministic NAT on VIPRION C4800/C4800N.

Impact:
Reverse and forward map do not work as expected.


467196-2 : Log files limited to 24 hours

Component: TMOS

Symptoms:
In this release, the max log size setting is 1024. This causes large systems (multiple blades, high-availability) to truncate log files, and often prevent log files from storing messages for more than 24 hours.

Conditions:
Multiple blades in a high-availability configuration.

Impact:
Cannot have log files spanning more than 24 hours. This makes it very difficult to use the log when diagnosing problems, because the system overwrites the files before the customer can report the issue.

Workaround:
Change the max-file-size for logrotate from '1024' (the default) to '0' to prevent logrotate from truncating log files. This workaround is also documented in SOL16015: The BIG-IP system may truncate log files, available here: https://support.f5.com/kb/en-us/solutions/public/16000/000/sol16015.html.

This can be done from tmsh by running a command such as:
    tmsh modify /sys log-rotate max-file-size 0


467022-2 : 11050 platform will not go active citing error 01071335:3: Invalid logical_disk (0) for application volume (mysqldb_.2).

Component: TMOS

Symptoms:
When booting an affected release, the system will not go active and mcpd will not come up. In /var/log/ltm, an error similar to the following will be seen.

err mcpd[1234]: 01071335:3: Invalid logical_disk (0) for application volume (mysqldb_.2).

This causes the system to have an inconsistent view of the disks and subsequent steps in the boot process fail to complete.

Conditions:
This only happens on the 11050 platform running an affected release. It occurs on boot into TMOS.

Impact:
The system will not go active.

Workaround:
If there is a duplicate platform name in /etc/hal/platform-capabilities.xml, the xml file is loaded improperly which causes problems. Specifically, the software raid capability of the 11050 is not detected properly.

The fix is to manually edit the /etc/hal/platform-capabilities.xml file and resolve this conflict, and then reboot.
Changing the 11050 Nebs platform name to "BIG-IP 11050N" will workaround the issue.

/etc/hal/platform-capabilities.xml:

--BEFORE---

        <platform name="BIG-IP 11050" pid="E102" > <!-- Turbo Apollo -->
            <raid type="software" />
        </platform>
        <platform name="BIG-IP 11050" pid="E103" > <!-- Turbo Apollo NEBS --> <------ Duplicate entry
            <raid type="software" />
            <nebs value="true" />

---AFTER---

        <platform name="BIG-IP 11050" pid="E102" > <!-- Turbo Apollo -->
            <raid type="software" />
        </platform>
        <platform name="BIG-IP 11050N" pid="E103" > <!-- Turbo Apollo NEBS --> <------ fixed entry
            <raid type="software" />
            <nebs value="true" />
        </platform>

All you need to do is add an "N", changing the platform name for Turbo Apollo NEBS to "BIG-IP 11050N", which resolves the conflict.

After making the change, save the file, reboot the box, and it should come up normally.


466761-3 : Heartbeat, UDP packet with only double CRLF, on existing SIP flow results in connection loss.

Component: Service Provider

Symptoms:
Heartbeat, UDP packet with only double CRLF, on existing SIP flow might result in connection loss.

Conditions:
SIP heartbeat message, a UDP packet with double CRLF, sent by the client to the server.

Impact:
Connection might be terminated.

Workaround:
None.


466756-1 : Automating input to gtm_add script rather than running it interactively can result in script failure

Component: Global Traffic Manager

Symptoms:
The gtm_add script can fail if you automate input to the script, even if the input is valid.

Conditions:
Automating input to gtm_add script.

For example:

echo y | tmsh run gtm gtm_add 1.1.1.1

Impact:
The gtm_add script will fail and GTM sync will not be established with the target bigip.

Workaround:
Run the script interactively from the command line.


466281-2 : Internal virtual does not inherit traffic-group from parent virtual server

Component: Service Provider

Symptoms:
A value stored in the session DB from an iRule on the parent virtual server cannot be accessed from the internal virtual server, and vice-versa.

Conditions:
This occurs when the following conditions are met: -- Virtual server with request-adapt or response-adapt profile. -- Internal virtual server referenced by adapt profile. -- iRules share data between the virtual server and the internal virtual server via session table.

Impact:
The session table cannot be used to pass data between virtual server and the internal virtual server.

Workaround:
If failover is not required, set the traffic group of the virtual address of the parent virtual server to 'traffic-group-local-only' which is the default existing on the internal virtual server. Here is an example command: tmsh modify ltm virtual-address 10.10.1.12 traffic-group traffic-group-local-only.


466266-5 : In rare cases, an upgrade (or a restart) can result in an Active/Active state

Component: TMOS

Symptoms:
After upgrading or restarting, the system starts up in an active state even if the peer system is already active.

Conditions:
An upgrade or system restart for an active/standby pair. The issue occurs intermittently and is timing-dependent. There is code executed during sod's initialization that attempts to detect when communication between mcpd and sod has gone bad; this code does this by checking for "end transaction" messages. If 30 or more messages from mcpd are received without an "end transaction" message, sod will reset its connection with mcpd. While the connection is being reset, it is possible for sod to miss messages from mcpd. Depending on which messages it misses, sod may end up in a bad state and exhibit the symptoms of this bug. If this occurs after an upgrade, it does not matter which version one is upgrading from.

Impact:
The impact of this issue is that both systems take traffic.

Workaround:
Restarting the 'sod' daemon on the system after an upgrade or reboot clears the condition. This causes the system to go offline and will disrupt traffic.

Standard BIG-IP appliance:
bigstart restart sod

VIPRION system:
clsh bigstart restart sod


465927-2 : Response is halted or reset when the request has an ignore profile

Component: Application Security Manager

Symptoms:
Response is halted for some seconds or doesn't arrive at all (fin or rst)

Conditions:
The request has a "do nothing" profile.
Request is a POST.
This happens more frequently if the response size is large.

Impact:
Response to that request is halted for some seconds or doesn't arrive at all (fin or rst)

Workaround:
Change the content profile of that URL. Note that this workaround may cause false positive attack signatures and/or other false positive.


465863 : Error: Object doesn't support property or method 'trim'

Component: Access Policy Manager

Symptoms:
When using BIG-IP Edge Client to connect to Network Access, the system posts an 'Object doesn't support property or method 'trim'' error; however, the system still connects.

Conditions:
When adding a third option in the 'logon page agent' use Select as Type, and Then connect to the virtual server using the Edge Client.

Impact:
This is an error message only. There is no loss in functionality. The system posts a message similar to the following: An error has occurred in the script on this page. Line: 356 Char: 13 Error: Object doesn't support property or method 'trim' Code: 0 URL: https://VPN_URL/my.policy Do you want to continue running scripts on this page? There are Yes and No buttons in the popup window. No matter which button you click, the Network Access connection can be established.

Workaround:
To work around the problem, add the following lines to the logon.inc customization file.

if(typeof String.prototype.trim !== 'function') {
  String.prototype.trim = function() {
    return this.replace(/^\s+|\s+$/g, '');
  };
}

... snipped ...
?><!DOCTYPE HTML PUBLIC "-//IETF//DTD HTML//EN">
<html>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=utf-8">
<meta http-equiv="pragma" content="no-cache">
<meta http-equiv="cache-control" content="no-cache">
<title>%{session.server.network.name}</title>
<link rel="stylesheet" type="text/css" HREF="/public/include/css/apm.css">
<script language="JavaScript" src="/public/include/js/session_check.js" ></script>
<script language="javascript">
<!--

<? include_customized_page("logout", "session_expired.js"); ?>

if(typeof String.prototype.trim !== 'function') {
  String.prototype.trim = function() {
    return this.replace(/^\s+|\s+$/g, '');
  };
}

var globalRestartOnSubmit = false;

... snipped ...


465607-1 : TMM cores with TMM log error 'Assertion "flow in use" failed.' when isuing FastHTTP.

Component: Local Traffic Manager

Symptoms:
TMM cores with the TMM log showing the error 'Assertion "flow in use" failed.' This is an infrequent race condition.

Conditions:
This is an infrequent race condition. The actual set of events that leads to this core is unknown. However, this requires FastHTTP to be configured, and it is known that this happens when the FastHTTP connection is closing.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Do not use FastHTTP.


465590-5 : Mirrored persistence information is not retained while flows are active

Component: Local Traffic Manager

Symptoms:
Mirrored persistence information is not retained. This is most visible on long-running flows, where the mirrored entry is removed while the flow is still active.

Conditions:
Mirrored flows with persistence profiles assigned to the VIP, or when persistence profiles are marked to mirror persistence entries.

Impact:
If a failover occurs, a new load balancing pick is made for new flows.


465181-2 : Unhandled connection error in iprepd causes memory leak in iprepd or merged

Component: Application Security Manager

Symptoms:
If the BIG-IP system fails to connect to the IP reputation database server (either using a proxy or not), it causes a memory leak in one of the internal daemons (iprepd and/or merged).

Conditions:
IP-reputation is enabled and it fails to connect to the database server (usually to the proxy of the database server or there is a bad/non-existent connection outside).

Impact:
This issue causes a slow memory leak in the iprepd or merged daemon.

Workaround:
Fix the proxy to the ipreputation or the connection to the IP reputation or turn off IP reputation.


465142-1 : iControl LocalLB::ProfileClientSSL::create and create_v2 methods result in crash when not in /Common

Component: TMOS

Symptoms:
The iControlPortal process crashes if the LocalLB::ProfileClientSSL::create or create_v2 methods are called outside of the /Common partition.

Conditions:
This occurs when using iControl to create Client SSL profiles in partitions other than /Common.

Impact:
The iControl portal crashes with a 500 Internal Server Error. The Client SSL profile is not created.

Workaround:
Create Client SSL profile in the /Common partition.


465133-1 : SIP-ALG: When Proxy authentication is enabled, SIP-ALG will not set up media flows

Component: Carrier-Grade NAT

Symptoms:
SIP sessions fail to setup media flows.

Conditions:
This occurs under the following conditions: -- SIP-ALG is configured on a virtual server. -- SIP client and server exchange more than one INVITE, and the second INVITE has a new cseq number. This can happen when the Proxy is requiring authentication from the client.

Impact:
SIP media sessions are not established.


464972-1 : Wrong parsing of Country Code (Geo) from address region list if Country name contains parentheses.

Component: Advanced Firewall Manager

Symptoms:
Wrong parsing of Country Code (Geo) from address region list if Country name contains parentheses.

Conditions:
If Country name contains parentheses, then an error is thrown and it cannot be added to the address list

Impact:
Address List creation Page

Workaround:
Use tmsh to add the country Name with parentheses


464870-4 : Datastor cores and restarts.

Component: TMOS

Symptoms:
Datastor cores and restarts. This occurs potentially because of generational issues, object replacement from archive, and the possibility that an object was deleted in the interim.

Conditions:
Traffic patterns that shift from low to moderate velocity with strong tiling to decoherent, high velocity traffic can cause this to occur when request queuing is turned on.

Impact:
Temporary cache outage. The cache must then be completely reseeded. A datastor core file is written, and datastor is restarted.


464499-1 : client-ssl profile loses cert-key-object When the cert-key-chain object exists in partition other than /Common

Component: Local Traffic Manager

Symptoms:
A client-ssl profile loses its cert-key-object.

Conditions:
When the cert-key-chain object is configured in a client-ssl profile in a partition other than /Common partition.

Impact:
SSL connection using that profile uses wrong cert/key (but the connection does not fail).

Workaround:
Reload all partitions: 'tmsh load sys config partitions all.


464442-2 : User cannot update SNAT pools that contains resolved hostname as a member

Component: TMOS

Symptoms:
Attempting to update an existing SNAT pool that contains a resolved hostname will result in an error when "Display Host Names When Possible" is enabled.

Conditions:
Need to create a SNAT pool containing a resolved hostname and set "Display Host Names When Possible" enabled from System references.

Impact:
User cannot update SNAT pools that contains resolved hostname as a member

Workaround:
Disable "Display Host Names When Possible" from System >> Preferences


464413-1 : Descriptor shortage might cause packet loss and/or tmm crash

Component: TMOS

Symptoms:
tmm might drop packets and eventually result in tmm crash.

Conditions:
This intermittent issue might occur when TSO is enabled (enabled by default) because of TSO handling combined with certain stressful transmit conditions, as a result of which the system attempts actions on memory or content that has already been freed.

Impact:
Rare reboot with message: tmm process might crash with assertion 'we always have room in tx ring!'.

Workaround:
None. If TSO is not disabled, three related fixes are needed to fully address the issue:

-- ID 466260, covered in SOL15953: TMM may produce a core file with the 'Assertion we always have room in tx ring! failed' error message.
-- ID 502238, covered in SOL16736: The BIG-IP system may lose connectivity and fail to process all traffic through TMM if the HSB is overloaded.
-- ID 509782, covered in SOL16780: The BIG-IP system may drop TSO packets. The Solutions are available here:

-- https://support.f5.com/kb/en-us/solutions/public/15000/900/sol15953.html
-- https://support.f5.com/kb/en-us/solutions/public/16000/700/sol16736.html
-- https://support.f5.com/kb/en-us/solutions/public/16000/700/sol16780.html


464366-2 : Devices are out of Sync when new analytics profile is created and assigned to a virtual server

Component: Application Visibility and Reporting

Symptoms:
When new analytics profile is created and assigned to vip, devices are out of sync with "profile doesn't exist" error.

You will see the following error in LTM log: err mcpd: "Cannot set sampling for non-default AVR profile"

Conditions:
1. CMI system
2. Create new analytics profile.
3. Assigned the profile to vip.

Impact:
The devices can be out of Sync.

Workaround:
This issue has no workaround at this time.


464225-1 : 'tmsh list ltm message-routing' and 'tmsh show ltm message-routing' fail for non-admin users

Component: TMOS

Symptoms:
Running the commands 'tmsh list ltm message-routing' and 'tmsh show ltm message-routing' fail for non-admin users, even though non-admin users have tmsh access to all partitions.

Conditions:
A non-admin user is logged in via tmsh.

Impact:
The non-admin user cannot run the command 'list ltm message-routing' or 'show ltm message-routing' via tmsh. The system posts an error message similar to the following: Unexpected Error: Can't display all items, can't get object count from mcpd.

Workaround:
None.


464148 : Deterministic NAT: incorrect mapping on htsplit platforms

Component: Carrier-Grade NAT

Symptoms:
The deterministic NAT (DNAT) utility (dnatutil) might report incorrect reverse mappings for platforms with Intel Hyper-Threading Technology (HT) Technology split plane (htsplit) CPUs, which includes VIPRION and BIG-IP series 4000, 7000, 8000, and 10000 platforms.

Conditions:
Using LSN pool with DNAT mode, and using dnatutil for reverse mapping.

Impact:
Reverse mapping does not occur.

Workaround:
Use the --flags attribute to manually provide the daglib flag attribute.


464132 : Serverside SSL cannot be disabled if Rewrite profile is attached

Component: TMOS

Symptoms:
Cannot disable serverside SSL via iRule command or CPM policy.

Conditions:
This occurs on a virtual server that meets the following conditions:
 - Rewrite profile
 - Serverssl profile
 - iRule using the 'SSL::Disable serverside' command in an HTTP_REQUEST event or a CPM policy with a 'server-ssl disable' action and an http-uri condition.

Impact:
Cannot disable serverside SSL.

Workaround:
Utilize iRule with 'SSL::Disable serverside command in the SERVER_CONNECTED event.


464116-3 : HTTP responses are not cached when response-adapt is applied

Component: Service Provider

Symptoms:
When a response-adapt profile is applied on a virtual with ramcache, HTTP responses are not cached.

Conditions:
Both ramcache and response-adapt on a virtual.

Impact:
HTTP responses are not cached.


463715-2 : syscalld logs erroneous and benign timeout messages

Component: TMOS

Symptoms:
The syscalld timeout mechanism might cause premature logging of OPERATION_TIMEOUT messages.

Conditions:
No specific configuration is required.

Impact:
The system posts the message: syscalld[21190]: 0127000a:3: OPERATION_TIMEOUT 'command' may be hung or taking a long time.

This may cause some operations, such as establishing CMI trust, to fail and need to be launched again.


463652-1 : Inconsistent Certificate/Key/Chain listing for child Client SSL profile when parent profile is modified.

Component: TMOS

Symptoms:
Modifying a child Client SSL profile to have a different Certificate/Key/Chain listing loses setting when the parent Client SSL profile is changed.

Conditions:
When parent profile is modified.

Impact:
Inconsistent Certificate/Key/Chain listing for child Client SSL profile.


463651-3 : PPP tunnels remain open after session gets closed

Component: Access Policy Manager

Symptoms:
Point-to-Point Protocol (PPP) tunnels remain open after session gets closed. APM logs of PPP tunnel closed appears much later than Session closed log.

Conditions:
This can occur with Gzip compression configuration and may sometimes happen randomly.

Impact:
Holds resources on server side.

Workaround:
This issue has no workaround at this time.


463470-1 : Active Translation Mappings count is too high

Component: Carrier-Grade NAT

Symptoms:
In addition to mappings used by successful connections, the Active Translation Mappings count incorrectly counts some pending translation mappings that ultimately are unused. These translation mappings are not active and should not be counted. Additionally, the Active Translation Mappings count is not decremented for these pending translation mappings when the mapping is recovered and made available for new connections.

Conditions:
The high counts are associated with connection failures and can occur with heavy traffic or when there is a limited number of available translation endpoints.

Impact:
Because of the miscounting, the Active Translation Mappings count tends to grow over time and become much larger than the connection count. The high count does not represent a memory leak or translation endpoints that are not available.


463468-6 : failed tmsh command generate double logs

Component: TMOS

Symptoms:
A single failed tmsh command generates two identical audit logs, and audit_forwarder sends two logs to audit server (TACACS+ in this example).

Conditions:
tmsh audit is on and tmsh command is failed from mcpd validation. This does not occur with successful commands.

Impact:
Here is an example of the failure:
tmsh create ltm pool pool20
01020066:3: The requested pool (/Common/pool20) already exists in partition Common


Tue May 20 16:27:17 2014 10.10.10.201 root unknown unknown update service=system protocol=ip task_id=130start_time=1400627369 event=cmd_acct reason=May 20 16:09:29 aftest notice tmsh[20175]: 01420002:5: AUDIT - pid=20175 user=root folder=/Common module=(tmos)# status=[01020066:3: The requested pool (/Common/pool20) already exists in partition Common.] cmd_data=create ltm pool pool20
Tue May 20 16:27:17 2014 10.10.10.201 root unknown unknown update service=system protocol=ip task_id=132start_time=1400627369 event=cmd_acct reason=May 20 16:09:29 aftest notice tmsh[20175]: 01420002:5: AUDIT - pid=20175 user=root folder=/Common module=(tmos)# status=[01020066:3: The requested pool (/Common/pool20) already exists in partition Common.] cmd_data=create ltm pool pool20

Workaround:
None.


463380-2 : URIs with space characters may not work properly in ODATA query

Component: Device Management

Symptoms:
ODATA query strings such as: $filter=partition eq 'Common' may not work correctly unless the spaces are encoded with +.

Conditions:
ODATA query strings with spaces.

Impact:
The query will fail with a 400 error.

Workaround:
Encode the query string space characters with + as replacement.


463230-7 : Aced service does not recover if child process dies.

Component: Access Policy Manager

Symptoms:
If a child process is killed, cored, or dies, the parent process does not restart it and the service stops serving SecurID authentication.

Conditions:
In some exceptional cases, the child process exits.

Impact:
SecurID authentication failed, but service recovered by runsv.


462827-5 : Headers starting with X-F5 may cause problems if not X-F5-REST-Coordination-Id

Component: Device Management

Symptoms:
Some URIs passed to the BIG-IP system with X-F5 that are not X-F5-REST-Coordination-Id may improperly parse the HTTP request headers. These include iControl-REST URIs
/mgmt/tm/analytics/...
/mgmt/tm/vcmp/...
/mgmt/tm/actions/...
/mgmt/tm/gtm/...
/mgmt/tm/ltm/...
/mgmt/tm/net/...
/mgmt/tm/pem/...
/mgmt/tm/util/...
/mgmt/tm/sys/...
/mgmt/tm/cli/...
/mgmt/tm/secuirty/...
/mgmt/tm/ilx/...
/mgmt/tm/apm/...
/mgmt/tm/transaction/...
/mgmt/tm/auth/...
/mgmt/tm/wom/...
/mgmt/tm/cm/...
/mgmt/tm/wam/...

Conditions:
Headers prefixed with X-F5 that are not X-F5-REST-Coordination-Id.

Impact:
Headers are not parsed properly.

Workaround:
None


462714-5 : Source address persistence record times out even while traffic is flowing on FastL4 profile virtual server

Component: Local Traffic Manager

Symptoms:
A source address persistence record created on a virtual server with a FastL4 profile times out and is aged out even while traffic is flowing through that flow. The traffic that results in this issue is UDP with checksum of 0.

Conditions:
The profile has to be FastL4. Traffic that is either UDP with checksum of 0, or SCTP, or ESP, are definitely affected.

Impact:
Source address persistence is not usable as the entry ages out when it should not.

Workaround:
None.


462351-1 : Error when resetting stats

Component: TMOS

Symptoms:
Selecting policy and clicking Reset on Statistics :: Module Statistics : Local Traffic :: Policies page produces message 'An error has occurred while trying to process your request.'

Conditions:
This occurs when resetting stats using the GUI.

Impact:
Cannot reset stats for policies using the GUI.

Workaround:
Use tmsh to reset stats.


462187-1 : 'tmsh list net tunnels' and GUI tunnel access fail for non-admin users

Component: TMOS

Symptoms:
'tmsh list net tunnels' and GUI tunnel access fail for non-admin users. Non-admin users have access to all partitions via tmsh.

Conditions:
This occurs for non-admin users on the tunnel list page when selecting a predefined tunnel or one that has been configured.

Impact:
The command or operation fails. The system displays the following error: Unexpected Error: Can't display all items, can't get object count from mcpd.


462025 : SQL monitors do not handle route domains properly

Component: Local Traffic Manager

Symptoms:
SQL monitors cannot be started consistently when route domains are involved. SQL monitors include MySQL, MSSQL, Oracle SQL, and PostgresSQL.

Conditions:
Configure a SQL monitor on a node inside a route domain.

Impact:
SQL monitors do not work as expected. They might hang or only intermittently return results.

Workaround:
None.


461818-1 : Occasional extreme large value reported for tmm-info five-min-avg-usage-ratio

Component: Local Traffic Manager

Symptoms:
The command tmsh -m show sys tmm-info field-fmt occasionally shows an invalid value such as:
five-min-avg-usage-ratio 184467440737093465

Conditions:
This occurs under normal operation.

Impact:
Faulty displayed value with zero functional impact.


461715-1 : AVR: Collecting geolocation IDs

Component: Application Visibility and Reporting

Symptoms:
Long computation in geo location handling caused Keep-Alive timer to stop the bd process.

Conditions:
This bug occurred during stress run when bd is running.

Impact:
The bug cause the bd process to crash.

Workaround:
There is no workaround.


461587-4 : TCP connection can become stuck if client closes early

Component: Local Traffic Manager

Symptoms:
Connection remains half-open and appears in connflow table after receiving FIN/ACK from serverside. the BIG-IP system never sends FIN/ACK to serverside to indicate connection has been closed.

Conditions:
Clientside connection is closed before serverside completes 3-way handshake. Serverside never completes 3-way handshake and LB::reselect command is issue via iRule.

Impact:
Connection remains half-open and stuck in connflow table


461189-3 : Generated assertion contains HEX-encoded attributes

Component: Access Policy Manager

Symptoms:
When a BIG-IP system serving as SAML identity provider (IdP), generates an assertion, the message might contain HEX-encoded values.

Conditions:
This occurs when user authenticates against LDAP/AD/RADIUS, and retrieved from AAA server attributes contain non-ASCII values. These non-ASCII values are then used by BIG-IP as Identity Provider in generated Assertion.

Impact:
SAML SSO might fail if Service Provider is not be able to process HEX-encoded attributes.

Workaround:
There is no workaround for IdentityProvider. On Service Provider side, assertion attribute values that begin with '0x' could be treated as HEX encoded. Such values can be HEX decoded after SP processed assertion.


460945-4 : Memory leak when changing a policy that is in use by a virtual server

Component: Local Traffic Manager

Symptoms:
There is a memory leak when changing a policy that is in use by a virtual server.

Conditions:
When an LTM policy is being applied to a virtual server, the policy is compiled for efficient execution.

Impact:
Upon every recompilation a small amount of memory is leaked in mcpd. If a policy is recompiled many times this can lead to memory exhaustion within mcpd which in turn causes a mcpd crash and BIG-IP system restart.


460833-10 : MCPD sync errors and restart after multiple modifications to file object in chassis

Component: TMOS

Symptoms:
Upon modifying file objects on a VIPRION chassis and synchronizing those changes to another VIPRION chassis in a device sync group, the following symptoms may occur:

1. Errors are logged to /var/log/ltm similar to the following:

err mcpd[<#>]: 0107134b:3: (rsync: link_stat "/config/filestore/.snapshots_d/<_additional_path_to/_affected_file_object_>" (in csync) failed: No such file or directory (2) ) errno(0) errstr().
err mcpd[<#>]: 0107134b:3: (rsync error: some files could not be transferred (code 23) at main.c(1298) [receiver=2.6.8] syncer /usr/bin/rsync failed! (5888) () Couldn't rsync files for mcpd. ) errno(0) errstr().
err mcpd[<#>]: 0107134b:3: (rsync process failed.) errno(255) errstr().
err mcpd[<#>]: 01070712:3: Caught configuration exception (0), Failed to sync files..

2. MCPD may restart on a secondary blade in a VIPRION chassis that is receiving the configuration sync from the chassis where the file object changes were made.

Conditions:
This symptom may occur under the following conditions:

1. Two or more VIPRION chassis are configured in a device sync group.
2. File objects (such as SSL certificates) are added/modified/deleted on one chassis in the group.
3. These changes are synchronized to other members of the device sync group.
4. While the previous changes are still being synchronized to all blades in all chassis in the device sync group, an overlapping set of file objects are added/modified/deleted on a chassis in the group (typically the same chassis as in step 2).
5. While the previous sync operation is still in progress, these subsequent changes are synchronized to other members of the device sync group.

Impact:
Temporary loss of functionality, including interruption in traffic, on one or more secondary blades in one or more VIPRION chassis that are receiving the configuration sync.

Workaround:
After performing one set of file-object modifications and synchronizing those changes to the HA group members, wait for one or more minutes to allow all changes to be synchronized to all blades in all member chassis before making and synchronizing additional file-object changes.


460730-5 : On systems with multiple blades, large queries can cause TMM to restart

Component: TMOS

Symptoms:
When executing a chunked query (such as "show sys connection") that returns a lot of data, the primary MCP can get overwhelmed by the amount of data it is receiving from both its blade's TMMs and the secondary MCPs. It gives the data from its own TMMs priority, which eventually causes the secondary MCPs to run out of memory. At this point the MCP memory safeguards kick in and the secondary MCPs stop receiving data from their TMMs. The TMMs wait 20 seconds under these conditions, and if they have been unable to send data to MCP during that time, they exit and restart.

Conditions:
System must have multiple blades and execute a chunked query (for connection data or persistence records, for example) that returns a lot of data.

Impact:
TMM restarts and the system is unusable during that time.

Workaround:
This issue has no workaround at this time.


460178-2 : oamd may generate core during shutdown

Component: TMOS

Symptoms:
Because of a timing issue, oamd might occasionally generate a core file due to accessing a bad value in the session list.

Conditions:
Stop dynamic routing via tmsh or system shutdown.

Impact:
Core file generated during shutdown.

Workaround:
This issue has no workaround at this time.


460020-2 : Rewrite profile might cause tmm core when trying to rewrite set cookie in HTTP response header

Component: TMOS

Symptoms:
If there are multiple set cookie rewrites to an HTTP response header, then there is a chance that tmm might core due to referencing incorrect locations into the buffer.

TMM may crash and leave an error message in one of the TMM log files (/var/log/tmm*) similar to:
notice 2: lib/c/xbuf.c:930: xbuf_subtract: Assertion `valid xfrag subtraction' failed.

Conditions:
The original issue occurred with ASM, but is not specific to ASM. It can occur whenever the rewrite profile is used and the the path/domain within the set cookie filed of an HTTP response header is rewritten.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


459994-2 : tmm may crash if default gateway pool contains members that it cannot route to

Component: Local Traffic Manager

Symptoms:
tmm may crash in an invalid routing setup

Conditions:
create gw pool member that is unreachable and not local on any subnet

Impact:
Traffic disrupted while tmm restarts.

Workaround:
do not create invalid routing setup


459851-7 : Connection aborted when using GET request If-Match header in Policy Node with No-Proxy(request)/Always_Proxy(response) setting.

Component: WebAccelerator

Symptoms:
The connection is aborted when using If-Match header with a Always Proxy response policy node but No Proxy request policy node.

Conditions:
Virtual server with Web Accelerator.
GET request with
  Header: If-Match with strong tag.
WA Policy:
  Node matching the request: No-Proxy
  Node matching the response: Always Proxy

Impact:
The connection is reset when it should return 412.

Workaround:
None.


459266-1 : SSL profile memory increases when SSL connection goes to disabled

Component: Local Traffic Manager

Symptoms:
When SSL connections go to disabled, sp->cf_disabled sets to TRUE.
the connection will be stale and never be closed. So its related SSL profile will increase reference count and never be freed.

Conditions:
This issue occurs when a SSL connection goes to disabled.

Impact:
The impact of this issue is that SSL profile memory increases.

Workaround:
This issue has no workaround at this time.


459100-3 : TMM may crash when offloading one-way UDP FastL4 flow

Component: Local Traffic Manager

Symptoms:
When handling UDP traffic on a FastL4 VIP, sometimes the TMM tries to offload both client and server flow when there is only one way traffic (either client-side or server-side). That would result TMM crashed on invalid pointer access.

Conditions:
HSBe2 platform, FastL4 VIP for UDP traffic, and one-way traffic during run time.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


459096-4 : GUI: Modifying Self IP Port lockdown from Allow All to Allow Default results in error

Component: TMOS

Symptoms:
Modifying Self IP Port lockdown from Allow All to Allow Default results in error.

Conditions:
This occurs when Self IP Port lockdown is set to 'Allow All'.

Impact:
Cannot modify the Self IP port lockdown from Allow All to Allow Default. Following error message is displayed in /var/log/ltm: 01020066:3: The requested self port (/Common/10.10.10.10 256 0) already exists in partition Common.


458928-3 : APMD cores in Kerberos authentication, when the agent tries to derefence a null authparam session variable.

Component: Access Policy Manager

Symptoms:
APMD cores in Kerberos authentication, when the agent tries to derefence a null authparam session variable.

Conditions:
This occurs when using client based Kerberos authentication without an authparam.

Impact:
APMD process cores and restarts.

Workaround:
None.


458823-3 : TMM Crash can lead to crash of other processes

Component: Application Visibility and Reporting

Symptoms:
When TMM is crashing abnormally, the restart procedure can lead to following crashes of other processes in the system.

Conditions:
Relates to cases in which TMM crashes abnormally as a result of other issues.

Impact:
The crash of the other processes has no impact on the system, as the fact that TMM already crashed is the main impact.
There is evidence of the other processes crash, since there are core dump files, so it is raising concerns about why several processes crashed and leads to customer escalations.


458770-1 : [Mac][Edge] Edge client doesn't handle ending redirects to the same box if second access policy assumes interaction

Component: Access Policy Manager

Symptoms:
Mac Edge Client doesn't work properly with ending redirects if the redirect is to the same box (another VS) and second access policy
contains agents that assume interaction (Logon page, Message box, Mac Process check).

Conditions:
Redirect not working when subsequent agent assumes interaction.

Impact:
Redirect not working.

Workaround:
N/A


458348-1 : RESOLV:: iRule commands and sFlow don't function correctly when using non-default CMP hashing.

Component: Local Traffic Manager

Symptoms:
Packets originating from the RESOLV:: iRule commands and sFlow are not routed correctly when using non-default CMP hashing on external and internal VLANs.

Conditions:
External and internal VLANs have, respectively, src-ip and dst-ip cmp hashing configured.

Impact:
Packets are dropped.


458295-3 : Memory leaks while connecting to the IP reputation database server using a proxy.

Component: Application Security Manager

Symptoms:
Memory leaks sometimes occur while connecting to the IP reputation database server using a proxy.

Conditions:
Enable IP reputation and connect using a proxy.

Impact:
Performance may degrade over time and the system may become unresponsive due to memory exhaustion.

Workaround:
None.


458286 : Adding called_station_id and calling_station_id attributes to PEM::session create/info iRule commands

Component: Policy Enforcement Manager

Symptoms:
The called_station_id and calling_station_id subscriber session attributes cannot be accessed via iRules.

Impact:
The called station id needs to be stored upon radius accouting receival into custom attr namespace, in order to make it retrivalble via PEM::Session info attr <framedip> calling_station_id


457934-2 : SSL Persistence Profile Causing High CPU Usage

Component: Local Traffic Manager

Symptoms:
Some connections through a virtual server using SSL persistence hang and cause a high CPU condition in tmm.

Conditions:
This occurs only when SSL persistence is configured as the default persistence profile, and there is a fallback profile of either source_addr or dest_addr.

Impact:
Large increase in CPU usage on the box and a percentage of SSL connections through the virtual server are delayed and eventually reset

Workaround:
None.


457293-4 : Clustered Multiprocessing (CMP) peer connection is not removed in certain race conditions.

Component: Local Traffic Manager

Symptoms:
The CMP peer connection could be left there without being swept out when the connection at origin is aborted too soon in the connection flow.

Conditions:
CMP with two tmm instances. Connection gets aborted.

Impact:
Connections are leaked up to reaching a point when the memory is consumed.

Workaround:
N/A


457034-1 : Multipath TCP (MPTCP): TMM crash in stockpile management

Component: Local Traffic Manager

Symptoms:
The tmm may core when using MPTCP.

Conditions:
This issue occurs under conditions of MPTCP heavy usage.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


456927 : iOS Edge Client is not able to establish per-app VPN connections with APM when it has VPE with On-Demand certificate authentication or iRule event agent without assigned webtop resource.

Component: Access Policy Manager

Symptoms:
iOS Edge Client is not able to establish per-app VPN connections with APM when it has VPE with On-Demand certificate authentication agent or iRule event agent without assigned webtop resource.

Conditions:
VPE with On-Demand certificate authentication or iRule event agent without assigned webtop resource.

Impact:
Cannot use iOS Edge Client to establish per-app VPN connections.

Workaround:
Add resource assignment agent with webtop resource.


456853-1 : DTLS cannot handle client certificate when client does not send CertVerify message.

Component: Local Traffic Manager

Symptoms:
For DTLS, CCS record will be held until all other handshake messages besides Finish are handled. When pcm is set to request, client may not send CertVfy message. BIG-IP system waits for CertVfy until the timeout.

Conditions:
For DTLS, CCS record will be held until all other handshake messages besides Finish are handled. When pcm is set to request, client may or may not send CertVfy message,

Impact:
BIG-IP waits for CertVfy until timeout.

Workaround:
None.


456763-1 : L4 forwarding and TSO can cause rare TMM outages

Component: Local Traffic Manager

Symptoms:
In certain rare circumstances using L4 forwarding and TSO, the MSS sizes on client and server sides in combination with internal processing can cause an internal mismatch resulting in a TMM crash.

Conditions:
This applies only when using L4 forwarding virtuals with TSO; additional exact external conditions are still under investigation.

Impact:
This issue causes a failover or TMM outage.

Workaround:
This issue has no workaround at this time.


456608-2 : Direct links for frame content, with 'Frame.src = url'

Component: Access Policy Manager

Symptoms:
Direct links in web-application with Portal Access.

Conditions:
Direct links for frame content, when using 'Frame.src = url'.

Impact:
Web-Application misfunction.


456573-2 : Sensor read faults with DC power supply

Component: TMOS

Symptoms:
While running BIG-IP v11.5.0 or later on a BIG-IP 2000-/4000-/5000-/7000-/10000-series appliances using DC power supplies, error messages containing the following strings may appear in /var/log/ltm:

err chmand[####]: 012a0003:3: Sensor read fault for Power supply #1 fan-1
err chmand[[####]: 012a0003:3: Sensor read fault for Power supply #1 meas. inlet temp
err chmand[####]: 012a0003:3: Sensor read fault for Power supply #2 fan-1
err chmand[####]: 012a0003:3: Sensor read fault for Power supply #2 meas. inlet temp

Conditions:
- BIG-IP 2000-/4000-/5000-/7000-/10000-series appliances
- DC power supplies (FND850 for 10000-series, FND300 for 2000-/4000-/5000-/7000-series)
- Running BIG-IP v11.5.0 or later.

Impact:
These errors result from a mismatch in the list of power supply sensors queried by BIG-IP, and the sensors actually present in a DC power supply.
These errors do not indicate a problem with the power supply in question.

Workaround:
These errors, when occurring under the conditions described, can be safely ignored.


456461-2 : Creating a vlan-group after sflow receiver causes TMM sigsegv's (loop).

Component: TMOS

Symptoms:
TMM is in a restart loop.

Conditions:
Creating vlan-group after configuring sflow receiver.

Impact:
Causes TMM to go into a restart loop.

Workaround:
Configure sflow receivers after vlan-groups using these commands: -- tmsh create net vlan testvlan { interfaces add { 1.1 { tagged } } tag 1147 }. -- tmsh create net vlan-group vlan_group_001 { members add { testvlan } }. -- tmsh create sys sflow receiver sflow_001 { address 10.0.63.1 state enabled }. -- tmsh create net self 10.0.63.100/24 vlan vlan_group_001.


456378 : On a virtual server with the ipother profile assigned, iRule firing on CLIENT_ACCEPTED with discard or reject action may cause TMM to core

Component: Local Traffic Manager

Symptoms:
When using ipother profile, if there is an iRule that fires on CLIENT_ACCEPTED that contains a discard or reject action, TMM is going to failover.

Conditions:
Virtual server with ipother profile and an iRule firing on CLIENT_ACCEPTED with discard or reject action.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Use CLIENT_DATA as the firing event for the iRule. Will have the same expected result when discarding the connection.


456239-1 : icrd and icrd_child processes crash when being shutdown

Component: TMOS

Symptoms:
At shutdown, sometimes the icrd and icrd_child processes can crash. icrd_child processes can seem to get stuck while waiting for a timeout to occur.

Conditions:
When restarting icrd or making iControl REST calls.

Impact:
Slow access to iControl REST endpoints, due to icrd_child processes being slow to shutdown and start up.

Workaround:
None


455980-3 : Home directory is purged when the admin changes user password.

Component: TMOS

Symptoms:
When an admin changes a user's password, the contents of the home directory are purged, that is, the system deletes some or all of the files in that user's home directory.

Conditions:
This happens whenever a user's password is modified. Can also be triggered by an upgrade from 10.x.

Impact:
Some or all of the files in that user's home directory are deleted.

Workaround:
This issue has no workaround for the basic case at this time. However, when this is caused by a 10.x-to-11.x upgrade, the original files can be recovered by booting back into the 10.x boot location and copying them off the system (or by extracting them from a UCS, or by mounting the root lvm volume from the previous boot location).


455840-2 : EM analytic does not build SSL connection with discovered BIG-IP system

Component: Local Traffic Manager

Symptoms:
EM analytic does not build SSL connection with discovered BIG-IP system.

Conditions:
When using management SSL client profile.

Impact:
EM analytic cannot connect to discovered BIG-IP system.


455651-3 : Improper regex/glob validation in web-acceleration and http-compression profiles

Component: TMOS

Symptoms:
The use of regex or glob patterns in certain MCP configuration objects leads to inconsistent parsing across MCP and TMM. For glob patterns, for example, the TMM produces an error indicating that the regex is invalid, while entries such as *.js are correctly treated as globs.

Conditions:
MCP configuration objects supporting regex and glob inclusion/exclusion patterns lead to inconsistent parsing across MCP/TMM.

Impact:
Cacheable objects are improperly cached or are not cached, or objects are deflated or are not deflated in opposition to the customer's intent.

Workaround:
None.


455493-1 : Cancel button remains enabled

Component: Access Policy Manager

Symptoms:
During normal Policy Sync operations, the Cancel button is enabled while the Access Profile is exchanged with other devices within the device group, and then should disable.

This known issue occurs when the Cancel button stays enabled even after the Access Profile has successfully been exchanged with all other devices.

Conditions:
No particular condition leads to this issue.

Impact:
While the Cancel button remains enabled, further changes and subsequent policy sync operations cannot be made for that Access Profile. The Access profile will not even be allowed to be deleted.

Workaround:
This issue has no workaround at this time.


454954-6 : Messages dropped by iRULE DIAMETER::drop will be retransmitted

Component: Local Traffic Manager

Symptoms:
DIAMETER_INGRESS event is received after DIAMETER::drop has been called

Conditions:
Virtual server with diameter profile with retransmission enabled and iRule containing DIAMETER_INGRESS event that uses DIAMETER::drop.

Impact:
Unexpected invocation of DIAMETER_INGRESS event and retransmission of dropped packet.

Workaround:
Disabled retransmission in Diameter profile.


454949-1 : AFM Optimizations to improve run-time and memory usage.

Component: Performance

Symptoms:
AFM Optimizations to improve run-time and memory usage.

Conditions:
Running AFM.

Impact:
Potential run-time and memory-usage issues.

Workaround:
None


454583-3 : SPDY may cause the TMM to crash if it aborts while there are stalled streams.

Component: Local Traffic Manager

Symptoms:
If SPDY has a stalled stream and it is being aborted, it may cause the TMM to crash due to referencing cleared state.

100 Continue messages appeared in response bodies. 100 Continue responses sent in the same packet as the response could stall the stream.

Conditions:
SPDY aborts due to a miss-ordered event. SPDY then sees egress, and marks the stream as stalled. SPDY aborts the connection to the client, and marks the stream as unknown. Finally, the stream aborts again and dereferences the NULL pointer to the client when it tries to unstall itself.

A 100 Continue message in a response, either by itself, or in the same packet as the response body.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


454306-3 : HTML style attribute with HTML entities need to be fixed

Component: Access Policy Manager

Symptoms:
When HTML style attributes with HTML entities are rewritten, it results in direct or incorrect links to resources.

Conditions:
This occurs when using HTML style attributes with HTML entities.

Impact:
It results in broken styles in web application.

Workaround:
There is no general workaround, but custom iRules can be used.


454209-2 : TMM crash on UDP DNS virtual without datagram-load-balancing enabled

Component: Local Traffic Manager

Symptoms:
TMM crash on UDP DNS virtual without datagram-load-balancing enabled.

Conditions:
DNS virtual server without datagram lb mode.

Impact:
TMM crash with a backtrace including dns_dev_pool coring at line 360. Failover and potential traffic interruption.

Workaround:
Enable datagram-lb-mode in the UDP profile used by the DNS virtual server, or turn off DNS queuing via the db variable dns.queuing.


454018-4 : Nexthop to tmm0 ref-count leakage could cause TMM core

Component: Local Traffic Manager

Symptoms:
Each use of the interface tmm0 for inter-TMM communication is supposed to increment its count of nexthop references. When the use of the interface is expired, the reference count is supposed to decrement, but in this case, the reference count is not decremented.

Conditions:
This occurs when TMM runs over an extended period of time, and internal communication between TMMs over tmm0 is heavy during the period.

Impact:
Reference count leaks, which causes the count to monotonically increase, which eventually might cause TMM to crash and restart.

Workaround:
This issue has no workaround.


453720-2 : clientssl profile validation fails to detect config with no cert/key name and no cert/key

Component: Local Traffic Manager

Symptoms:
The system does not prevent creation of a clientssl profile with no cert-key-chain name and no cert/key (or a cert/key of 'default'), and does not post an error alerting the user to the condition. The system creates the profile without error. This can cause issues when upgrading.

Conditions:
This occurs when attempting to create a clientssl profile without a cert-key-chain name or cert/key, or a cert/key of 'default'. Note: The system should prevent this, but does not do so in versions 11.5.1, 11.5.2, or 11.5.3.

Impact:
The system incorrectly allows a blank cert-key-chain name and an empty cert/key in clientssl profiles. When upgrading such a profile to versions 11.5.4, 11.6.0, 12.0.0, or later, the configuration fails to load with a message similar to the following:
-- 01070315:3: profile /Common/my_client_ssl requires a key Unexpected Error: Loading configuration process failed.
-- 01071ac9:3: Unable to load the certificate file () - error:2006D080:BIO routines:BIO_new_file:no such file.

Workaround:
Use the following steps to work around this issue:
-- To correct the configuration, run the following command: sed -ie '/"" { }/d' /config/bigip.conf.
-- To load the modified configuration, run the following command: tmsh load sys config.
Note: To determine whether profiles are affected, run the following command: grep '"" { }' /config/bigip.conf -A2 -B1. On affected profiles, the system returns the following output: cert-key-chain { "" { }.


453705-1 : iRule command "SIP::header insert Via <index>" does not respect specified index

Component: Service Provider

Symptoms:
When using SIP::header insert to insert a Via header command, the system always inserts the header at index 0, ignoring the specified index.

Conditions:
Use iRule command 'SIP::header insert Via'.

Impact:
Cannot maintain proper order of customized Via headers.

Workaround:
Extract the SIP Via Header in the iRule. Parse the SIP Via Header, and reconstruct the SIP Via header. Insert the reconstructed SIP Via Header back into the SIP message.


453328-1 : Dnatutil logs must be grouped by TMM number issuing the logs

Component: Carrier-Grade NAT

Symptoms:
The dnat utility can report inconsistent results if logs from different TMMs are intermingled in the processed logs.

Conditions:
Logs with intermingled information from multiple TMMs.

Impact:
Inconsistent dnat utility results.

Workaround:
Preprocess ltm log to remove any non TMM 0 logs before running the dnat utility against the log.


453239-2 : lsndb application can only be run on primary blade in chassis.

Component: Carrier-Grade NAT

Symptoms:
Running the lsndb utility on a secondary blade with many connections might cause a hang in the display.

Conditions:
Running the lsndb utility on a secondary blade.

Impact:
The lsndb utility is not supported on secondary blades. It is only supported on a primary blade.

Workaround:
Run the lsndb application on primary blade in the chassis.


453171-2 : High CPU usage leading to tmm/apd cores/restart

Component: Local Traffic Manager

Symptoms:
High CPU usage leading to tmm/apd cores under certain conditions.

Conditions:
This might occur with a large number of cookies when using Application Policy Manager (APM).

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Reduce cookie data sent.


452689-2 : Tunnels built over IPsec tunnel interface does not work

Component: TMOS

Symptoms:
If the IPsec tunnel interface is used to construct another tunnel, such as IPIP, GRE tunnels, the innermost tunnel traffic cannot be passed through the IPsec tunnel interface.

Conditions:
The self-IP of the IPsec tunnel interface is used as the local-address of other tunnel types.

Impact:
Traffic does not pass as expected.


452656-1 : NVGRE tunnel traffic might stall if the sys db variable tm.tcplargereceiveoffload is set to 'enable'

Component: TMOS

Symptoms:
NVGRE tunnel traffic might stall if the sys db variable tm.tcplargereceiveoffload is set to 'enable'.

Conditions:
The sys db variable tm.tcplargereceiveoffload is set to 'enable'.

Impact:
NVGRE tunnel traffic might stall.

Workaround:
Set the sys db variable tm.tcplargereceiveoffload to 'disable'. The default value of this variable is 'disable', so it is very unlikely that you will encounter this error condition in normal operating conditions.


452643-6 : Pool member's lb_value is not updated when transistioning from disabled to enabled

Component: Local Traffic Manager

Symptoms:
Some members may not receive traffic when the pool's load balancing method is set to one of the following:
 - Least Connections
 - Fastest
 - Least Sessions

Conditions:
Member's lb_value is non-zero when transitioned to disabled.

Impact:
Member does not receive traffic

Workaround:
Enable pool member and change load balancing method from original to Ratio and back.


452527-4 : Machine Certificate Checker Agent always works in "Match Subject CN to FQDN" mode

Component: Access Policy Manager

Symptoms:
Limited/normal user cannot pass Machine Cert Auth through 'Successful' branch if Agent is configured to match certificate by any condition except Match FQDN.

Conditions:
Machine Cert Auth agent configured to match certificate by any condition except Match FQDN.
Current user has no rights to access private key directly (that means elevation or service is required).

Impact:
User cannot pass Machine Cert Authorization.


452516-4 : Excessive memory consumption after extended use

Component: Local Traffic Manager

Symptoms:
Certain conditions can lead to excessive memory consumption.

Excessive buffering results in performance drop, connections being dropped, and Out-of-memory core errors.

Conditions:
This can occur after a long period of time, such as a month or more.

Impact:
This might result in performance drop, connections being halted, and out-of-memory cores.

Performance and stability can be impacted as well as full traffic-outages.

Workaround:
The command 'bigstart restart tmm' on the standby unit will clear up the condition.


452464-3 : iClient does not handle multiple messages in one payload.

Component: Access Policy Manager

Symptoms:
iClient does not handle multiple messages in one payload leading to possible memory leak symptoms.

Conditions:
If by chance multiple messages arrive as one from the BIG-IP Edge Client.

Impact:
Possible memory leak symptoms.

Workaround:
This issue has no workaround at this time.


452454-3 : A RST will not be forwarded for a IP forwarding Virtual server with a fastL4 profile with loose initialization configured as well as an idle timeout that is less than the server idle timeout value.

Component: Local Traffic Manager

Symptoms:
A RST will not be forwarded for a IP forwarding Virtual server with a fastL4 profile with loose initialization configured as well as an idle timeout that is less than the server idle timeout value.

Conditions:
The conditions that lead to this issue are: a fastL4 profile with loose initialization enabled, reset on timeout disabled, idle timeout less than server idle timeout, and no SNAT.

Impact:
The RST packet will not be forwarded.

Workaround:
Configure the server idle timeout to be less than the fastL4 profile's idle timeout.


452416-2 : tmctl leasepool_stat and snmp apmLeasepoolStatTable return incorrect values

Component: Access Policy Manager

Symptoms:
On a multi-blade chassis, tmctl leasepool_stat for some slots may not be in sync. In addition, query of snmp apmLeasepoolStatTable returns values that do not match the tmctl leasepool_stat output for the current primary slot.

Conditions:
The issue occurs after a blade or tmm of a blade restarts.

Impact:
Incorrect stats only. No impact to fuctionality.


452315-3 : Connection rate limit is not working when pool is not configured for the virtual server.

Component: Local Traffic Manager

Symptoms:
Connection rate limit is not working when pool is not configured for the virtual server.

Conditions:
Number of connections greater than configured rate limit.

Impact:
Number of connections flowing to the servers might be greater than configured rate limit.

Workaround:
This issue has no workaround.


452293-2 : Tunneled Health Monitor traffic fails on Standby device

Component: TMOS

Symptoms:
Monitor traffic fails on the Standby devices when using a floating local endpoint address for the tunnels.

Conditions:
Tunnels are configured with a floating local endpoint address.

Impact:
Failover takes longer because the status of the pool server on the Standby device needs to be rediscovered upon failover.

Workaround:
This issue has no workaround at this time.


452163-2 : Cross-domain functionality is broken in AD Query

Component: Access Policy Manager

Symptoms:
Cross-domain functionality is broken in AD Query agent due to DNS resolving library upgrade.

Conditions:
AD Query is configured with cross-domain option enabled.

Impact:
Users from trusted domains cannot pass access policy because AD Query agent failure.


452010-1 : RADIUS Authentication fails when username or password contain non-ASCII characters

Component: Access Policy Manager

Symptoms:
RADIUS Authentication fails when the logon name contains non-ASCII characters.

The problem is caused due to failure in conversion from UTF-8 to Windows-1252.

Conditions:
RADIUS authentication is configured and username/password contain non-ASCII characters.

Impact:
Users are not able to log in.

Workaround:
There is no workaround for this issue.


451867 : Adobe Flash (SWF) parser should patch the flash object even if compressed body is followed by some data

Component: Access Policy Manager

Symptoms:
Rewritten Adobe SWF can have garbled content or produce segfaults or both.

Conditions:
Any.

Impact:
Web application malfunction.

Workaround:
None. Bypassing SWF in particular cases.


451806-1 : Preserve Source Port Strict has moved from Client Settings (Advanced) to General Settings

Component: Access Policy Manager

Symptoms:
The Network Access GUI and default value for the Preserve Source Port Strict setting has changed. Preserve Source Port Strict has moved from Client Settings (Advanced) to General Settings (Basic). By default, the check box is cleared and the setting is disabled.

Conditions:
Preserve Source Port Strict has moved from Client Settings (Advanced) to General Settings.

Impact:
Admin UI component placement is changed.

Workaround:
The Network Access GUI and default value for the Preserve Source Port Strict setting has changed. Preserve Source Port Strict has moved from Client Settings (Advanced) to General Settings (Basic). By default, the check box is cleared and the setting is disabled.


451705-2 : Illegal metachar override can be added to policy which prevents Apply Policy

Component: Application Security Manager

Symptoms:
Illegal metacharacter override can be added to the security policy. This subsequently prevents the security policy from being applied.

This can be see in /var/log/asm.1_transformed:

----------------------------------------------------------------------
Feb 25 11:35:25 bigip2 info perl[10112]: 01310053:6: ASMConfig change: Parameter P3 [update]: Overridden Value Meta-characters were set to 0x3f - allowed.
Feb 25 11:35:31 bigip2 info perl[10112]: 01310053:6: ASMConfig change: Parameter P9 [update]: Overridden Value Meta-characters were set to 0x3a - allowed, 0x7fffffff - allowed.
----------------------------------------------------------------------

Conditions:
Customer upgraded from 11.3 to 11.5, and when they imported their exported policy, it produced an error and failed to roll forward.

Impact:
This subsequently prevents the policy from being applied. It could not apply configuration; set active failed.

Workaround:
N/A


451534 : TMM SIGSEGV event with SSL forward proxy in PassThrough Mode

Component: Local Traffic Manager

Symptoms:
TMM SIGSEGV event with SSL forward proxy in PassThrough Mode.

Conditions:
This occurs with SSL forward proxy in PassThrough Mode.

Impact:
Traffic disrupted while tmm restarts.


451469-2 : APM User Identity daemon doesn't generate core

Component: Access Policy Manager

Symptoms:
OMAPD is a daemon that stores all the IP->User mappings. It doesn't seem to generate cores. It will be hard to debug issues when it crashes.

Conditions:
Always

Impact:
Cores will not be generated.


451384-1 : "Differentiate between HTTP and HTTPS URLs" can't be disabled when Security Policy contains https URLs

Component: Application Security Manager

Symptoms:
"Differentiate between HTTP and HTTPS URLs" can't be disabled when Security Policy contains https URLs

Conditions:
Security Policy contains https URLs

Impact:
"Differentiate between HTTP and HTTPS URLs" can't be disabled.

Workaround:
Manually change the https URLs to http


451319-3 : HTTP CONNECT request with 4xx response with body results in RST

Component: Local Traffic Manager

Symptoms:
HTTP CONNECT request with 4xx response with body results in RST

Conditions:
This occurs when using Content-Length header when the server responds with 4xx response with body for CONNECT request.

Impact:
Connection reset when server responds. The system posts errors similar to the following: -- err tmm3[19210]: 011f0007:3: http_process_state_prepend - Invalid action EV_INGRESS_DATA during ST_HTTP_PREPEND_HEADERS (Server side: vip=/Common/http-vip profile=http pool=/Common/nc-pool server_ip=10.20.142.1) -- err tmm3[19210]: 01230140:3: RST sent from 10.10.147.80:80 to 10.10.132.1:56111, [0x18f7e62:9888] {peer} HTTP Unexpected server data past end of response. -- err tmm3[19210]: 01230140:3: RST sent from 10.20.147.1:56111 to 10.20.142.1:8080, [0x18f7e62:9888] HTTP Unexpected server data past end of response

Workaround:
Create a iRule to disable HTTP filter when CONNECT method is detected:

when HTTP_REQUEST {
  if { [HTTP::method] eq "CONNECT" } {
    HTTP::disable
  }
}


451257-2 : ASM BD process may crash on missing cookie protection config data when traffic is being passed.

Component: Application Security Manager

Symptoms:
ASM BD process may crash on missing cookie protection config data when traffic is being passed.

Error messages in /ts/log/bd.log
BD_MISC|NOTICE|Mar 04 14:42:27.913|29378|temp_func.c:0688|-- EMPTY TABLE: CONFIG_TYPE_DB_SECURITY_SERVER ack num 123
DATA_PROTECT|ERR |Mar 04 14:42:27.913|29378|src/data_protect_conf.c:0390|context_init: Error opening file '/ts/var/account/data_protection/data_protection_1d71cdd6c19765a8298828aacdc01d82': No such file or directory
DATA_PROTECT|ERR |Mar 04 14:42:27.913|29378|src/data_protect_api.c:0020|data_protect_context_init: failed to initialize security context.

Conditions:
This is a rare condition where DATA_PROTECT_cookie config is missing from the config and traffic is being passed on a multi-bladed system.

Impact:
The initial sync state for ASM in a device group does not resolve successfully. ASM starts breaking connections for which customer removed all of the ASM config and re-imported it. Upon the first request, trying to apply the crypto BD crashes.

Workaround:
Try one of the following workarounds:
-- Issue the following command: bigstart restart asm.
-- Complete the following procedure:
1. On the device group environment with the correct ASM config, turn off ASM sync for the device group.
2. Enable 'Full Sync'.
3. Turn on ASM sync for the device group.
4. Push the configuration.


451233-3 : Radius authentication fails if the NAS IP address is configured with route domain

Component: Access Policy Manager

Symptoms:
If an AAA RADIUS server is configured on a partition other than /Common with a default route domain, authentication will fail.

Conditions:
Radius authentication fails when radius configuration has NS IP Address with route domain (i.e. x.x.x.x/%RD) format.

Impact:
Radius authentication fails.

Workaround:
This issue has no workaround at this time.


451083-2 : Citrix Wyse clients when working with StoreFront in integration mode

Component: Access Policy Manager

Symptoms:
APM does not support Citrix Wyse clients when working with StoreFront in integration mode.

Conditions:
Using APM with Citrix Wyse clients when working with StoreFront in integration mode.

Impact:
Citrix Wyse clients are unable to connect to APM.

Workaround:
Use the following iRule: priority 1

when HTTP_REQUEST {
  set string [HTTP::header value Cookie]
  if {$string contains "NSC_AAAC=xyz"}{
    regsub {NSC_AAAC=xyz;?} $string {} tmp
    regsub {NSC_DLGE=xyz;?} $tmp {} result
    HTTP::header replace Cookie $result
  }
}


451059-3 : SSL server does not check and validate Change Cipher Spec payload.

Component: Local Traffic Manager

Symptoms:
SSL server does not check and validate Change Cipher Spec payload.

Conditions:
This issue occurs when a clientssl profile is used.

Impact:
There is no impact to this issue.

Workaround:
This issue has no workaround.


451035-4 : On a 11050-FIPS BIG-IP, TMM may reset when loading a large number of FIPS keys

Component: Local Traffic Manager

Symptoms:
If 11050-FIPS system is configured with hundreds of FIPS keys, TMM clock advanced messages will be seen and TMM may reset.

Conditions:
A 11050-FIPS system with over 200 FIPS keys configured with FIPS card loaded with firmware version 1.2 .

Impact:
TMM restarts.

Workaround:
Upgrade Cavium FIPS firmware to FW 2.1 using:
tmsh run util fips-util fwupdate


450814-7 : Early HTTP response might cause rare 'server drained' assertion

Component: Local Traffic Manager

Symptoms:
Early HTTP response from the server might cause 'server drained' assertion and traffic disruption.

Conditions:
This occurs when the server sends an early response, which might occur if the server responded before the system completed processing the entire incoming HTTP request data from the client.

A filter other than HTTP is also required on the chain.

Impact:
The system posts a 'server drained' assertion and traffic is disrupted.

Workaround:
None, however, this issue occurs very rarely.


450699 : Configure member IP addresses on VIPRION before downgrading

Component: TMOS

Symptoms:
After booting into a new install location, the primary blade is missing the previously configured default route.

Conditions:
-- Installation is from a downgrade, for example installing 11.5.3 from 11.5.4-hf1.
 
-- VIPRION cluster without member mgmt IP addresses configured.

-- No default route on primary blade.

Impact:
Managing the VIPRION after upgrade requires alternative access methods.

Workaround:
1. Configure cluster member IP addresses before installation. (one per blade).
2. If already booted into the new location, you can access the VIPRION and create a new default route. In this condition, Access can be obtained over the management port from another host on the same LAN as the VIPRION, or over the serial console.


450136-1 : Occasionally customers see chunk boundaries as part of HTTP response

Component: Access Policy Manager

Symptoms:
Occasionally, users see chunk boundaries as part of HTTP response if the virtual server is configured with rewrite profile variant and some other profiles.

Conditions:
Virtual server with rewrite profile variant and some other profiles like OneConnect and NTLM could cause HTTP response to be double-chunked.

Impact:
End users may see random characters displayed on their web pages, or the page may fail to render because it contains invalid HTML markup.

Workaround:
To workaround this problem, use an iRule to rechunk the HTTP response always.


450091-1 : Log state information when the TMM is ready for traffic can appear incorrect.

Component: Carrier-Grade NAT

Symptoms:
Logging that precedes a TMM that is fully booted can be confusing.

Conditions:
Logs are used by the dnat utility to reverse translation addresses for subscriber traceability.

Impact:
Premature logging can make it look like there was a window of time during which mappings are invalid.

Workaround:
This issue has no workaround.


450087-7 : Unacknowledged segments may fail to be retransmitted

Component: Local Traffic Manager

Symptoms:
Unacknowledged TCP segments are not retransmitted.

Conditions:
Remote endpoint closes TCP window early and drops incoming TCP segment(s) from BigIP.

Affects Standard TCP virtuals.

Impact:
This issue causes connection timeouts.

Workaround:
This issue has no workaround.


449989-1 : Unable to save UCS when using iControl REST

Component: TMOS

Symptoms:
Upon issuing the request to save UCS, the UCS process fails.

Conditions:
This occurs when using iControl REST to save UCS.

Impact:
UCS cannot be saved using iControl REST.

Workaround:
Issue UCS save command using the GUI or TMSH.


449896-1 : CGNAT DNAT connection failures with ECMP or route pools

Component: Carrier-Grade NAT

Symptoms:
Connections may fail when using CGNAT Deterministic NAT (DNAT) with ECMP or route pools.

Conditions:
This issue occurs with: -- LSN pool with Deterministic mode. -- Route pools or ECMP such that the same destination may have two different routes. -- Two connections from the same client to the same destination

Impact:
Second connection fails.

Workaround:
None.


449891-5 : Fallback source persistence entry is not used when primary SSL persistence fails

Component: Local Traffic Manager

Symptoms:
The existing source persistence record is not used as fallback for a second SSL request from the same source. The second request may be load balanced to a different pool member than the first one. Sometimes multiple source persistence records may be created pointing to different pool members.

Conditions:
SSL persistence configured as primary persistence method on a SSL VIP.
Source persistence configured as fallback persistence method.
The same client sends a second SSL request, but sends a different session ID so that SSL persistence look up fails.

Impact:
Requests are load balanced to different pool members instead of the same one. In other words, source fallback persistence does not work.

Workaround:
There is no workaround for this issue.


449793-3 : Edge client doesn't use new Oesis SDK libraries unless it is restarted

Component: Access Policy Manager

Symptoms:
Edge client doesn't use new Oesis libraries unless it is restarted. When edge client starts, it updates Oesis libraries on the system if new version is found on BIG-IP, but it doesn't use those libraries unless it is restarted

Conditions:
BIG-IP Edge client and new EPSEC image on BIG-IP APM.

Impact:
Edge client uses old libraries of Oesis SDK. It might not leverage certain fixes made in new oesis SDK unless it is restarted

Workaround:
Restart edge client after it updates the oesis libraries


449770 : Using "CRYPTO::keygen -alg rsa" outside of RULE_INIT can cause TMM to time out

Component: Local Traffic Manager

Symptoms:
RSA key generation is a time consuming process. Placing a key generation request in an event that is fired frequently can cause TMM to stop responding.

Conditions:
Use CRYPTO::keygen in an event such as CLIENT_DATA or HTTP_REQUEST

Impact:
TMM is killed by SOD.

Workaround:
Move key generation to RULE_INIT.


449622-1 : Issue while importing policy with customer violation conflict.

Component: Application Security Manager

Symptoms:
error reported :
r_rpc_handler.pl[29110]: 01310027:2: ASM subsystem error (asm_config_server.pl,F5::ImportExportPolicy::Base::fatal_error): User-defined violation could not be added:

Conditions:
When importing a policy with a custom violation name, violation conflict imported policy is incomplete.

Impact:
Import policy failed.

Workaround:
Possible workaround is to update mysql field to match import value and also consider modifying xml file for import to match mysql as alternative.


449526-1 : LB::prime iRule with SIP filter can result in a core

Component: Local Traffic Manager

Symptoms:
Rarely LB::prime iRule with SIP filter can result in a tmm core due the flow control mechanism added in the SIP hudfilter and the fact that LB::prime, adds necessary count of prime messages in Q and calls mblb_connect synchronously which has the potential to traverse the entire serverside chain.

Conditions:
LB::prime iRule with SIP filter is used.

Impact:
Rarely results in a core with LB::prime iRule. Traffic disrupted while tmm restarts.


449453 : Loading the default configuration may cause the mcpd process to restart and produce a core file.

Component: TMOS

Symptoms:
Loading the default configuration may cause the mcpd process to restart and produce a core file.

Conditions:
This issue occurs when the following condition is met:

After you successfully load a UCS file that was created on a different system, you attempt to restore the system to factory defaults by loading the default configuration.
When you load the default configuration, if the mcpd process is unable to decrypt the master-key, or attributes exist that were encrypted with a key other than the current master-key, the mcpd process restarts and produces a core file. These situations may occur if an RMA has occurred and you install a UCS from one device to another device of the same type, if the device unit key becomes corrupted, or if the master key file (/config/bigip/kstore/master) becomes corrupted.

Impact:
The BIG-IP system may temporarily fail to process traffic and fail over if configured as part of a high-availability system.

Workaround:
None.


449225-3 : Fixed APM client crash caused by regression introduced with ID430962

Component: Access Policy Manager

Symptoms:
Fix for ID430962 introduced regression which may cause VPN client to crash on establishing VPN connection.

Conditions:
All clients which contains fix for 430962.

Impact:
EdgeClient can crash while trying to establish network access.


448787-5 : Monitors in non-default route domains may flap when large number of connections are originiated from that route-domain

Component: Local Traffic Manager

Symptoms:
Limiting TCP/IP connections on non-default route domains can cause potential non-default route domain monitor issues.

Conditions:
This occurs because the rules that provide connection tracking are not picked up in the non-default route-domain upon creation.

Impact:
When the issue occurs, the kern.log reports the following message: 'nf_conntrack: table full, dropping packet', and pool monitors flap intermittently.

Workaround:
Disable connection tracking in non-default route domains.


448533-5 : Poor source port selection in CGNAT deterministic mode

Component: Carrier-Grade NAT

Symptoms:
When a LSN Pool is configured in deterministic mode, each subscriber gets a predetermined set of translation endpoints that are used for source address translation. When a translation request is processed for a new connection the first endpoints in the set are used very heavily and other endpoints are used rarely.

Conditions:
LSN pool in deterministic mode, Virtual Server using the fastL4 profile.

Impact:
Poor utilization of available translation ports and very high levels of port reuse. In the case of TCP connections this port reuse can cause servers to reject connections because a previous connection is in the TIME_WAIT state.


448493-2 : SIP response from the server to the client get dropped

Component: Service Provider

Symptoms:
SIP responses are not forwarded to the client. Instead, the system drops those SIP responses.

Conditions:
This occurs when using SIP OneConnect with an iRule that uses the node/snat command in SIP_RESPONSE event in the iRule to direct the SIP response from the server.

Impact:
Some SIP flows do not complete, which affects the SIP clients.

Workaround:
Remove the node/snat command from SIP_RESPONSE event processing in the iRule.


448476-3 : 10G SFP interfaces cannot be part of the same trunk.

Component: Local Traffic Manager

Symptoms:
When loading ucs or scf after upgrade, if the config has a two interface 10g xfp trunk, the config fails to load with this error:
01070619:3: Interface 1/1.2 media type is incompatible with other trunk members

Conditions:
Using a two interface 10g xfp trunk, and then loading ucs or scf after an upgrade.

Impact:
This can prevent upgrading

Workaround:
Not Available, other than not using trunks with 10G XFP


447874-3 : TCP zero window suspends data transfer

Component: Local Traffic Manager

Symptoms:
HTTP pipeline request might cause TCP window stay at 0 and not recover.

Conditions:
This intermittent issue occurs when HTTP pipeline requests are sent, and those requests use the GET method.

Impact:
When this occurs, the resulting TCP zero window suspends data transfer. It is possible that the TCP window will be reduced to 0 (zero) and never recover.

Workaround:
None.


447565-1 : Renewing machine-account password does not update the serviceId for associated ntlm-auth.

Component: Access Policy Manager

Symptoms:
Renewing machine-account password does not update the serviceId for associated ntlm-auth.

Because of this issue, you might see the following symptoms:
-- End users report that they cannot access email.
-- NTLM logons stop working for all users.
-- Log file shows errors similar to the following:
err nlad[12384]: 01620000:3: <0x566d4b90> nlclnt[71601c70a] init: Error [0xc000006d,NT_STATUS_LOGON_FAILURE] connecting to DC.

Conditions:
This occurs when the system has an NTLM machine account configured, but it is not known exactly what triggers the error. It can be triggered if the machine account credentials change, but the symptom might not show up for days since the connection can be reused.

Impact:
End users will be unable to connect.

Workaround:
Correct the problem by running the following command:
bigstart restart eca.


447272-1 : Chassis with MCPD audit logging enabled will sync updates to device group state

Component: TMOS

Symptoms:
If mcpd audit logging is enabled on a chassis, updates to device group state will be recorded on every configuration change, even if CMI is not configured or no synchronizable object was modified.

Conditions:
This only applies on chassis systems with at least one secondary blade, and the log messages only appear if mcpd audit logging is enabled.

Impact:
Updates to device group state will be recorded on every configuration change.

Workaround:
This issue has no workaround at this time.


447080-6 : VLAN tagged/untagged configuration change requires tmm restart

Component: Local Traffic Manager

Symptoms:
On BIG-IP 2000-/4000-series appliances, modifying an interface's VLAN configuration from tagged to untagged, or untagged to tagged, can result in unavailability of traffic on that interface.

Conditions:
This occurs on BIG-IP 2000-series or 4000-series appliance, connected to an upstream network that expects a tagged (or alternately, untagged) VLAN.

Impact:
Traffic does not pass after this change, until TMM is restarted.

Workaround:
Restarting the tmm with 'bigstart restart tmm' corrects this condition, as does deleting and recreating the VLAN with desired tagging attributes.


447043-7 : Cannot have 2 distinct 'contains' conditions on the same LTM policy operand

Component: Local Traffic Manager

Symptoms:
Cannot express conditions such as 'user-agent contains 'Android' AND 'Mobile'. LTM policies have operands that can be matched against a set of values, causing a match when the operand matches one of these values. There is no way to use current functionality to match all of the values. One specific situation in which this is needed is to configure 'contains'.

Conditions:
Specify an ltm rule with 2 conditions with the same operand and match type, for example:

           conditions {
                0 {
                    http-header
                    name User-Agent
                    contains
                    values { Android }
                }
                1 {
                    http-header
                    name User-Agent
                    contains
                    values { Mobile }
                }

Impact:
The policy does not work. The system posts an error message similar to the following: Failed to compile the combined policies.


446881-3 : OPSWAT library now needs scpt.dat file on MAC OS X

Component: Access Policy Manager

Symptoms:
Browsers on MAC OS X edge client crash when user connects to BIG-IP edge gateway.

Conditions:
Access policy configured with antivirus, firewall, antispyware, or hd encryption that uses OPSWAT library version 3.6.8642.2.

Impact:
Browsers crash on MAC OS X edge clients.


446573 : Username shown as "(anonymous)"

Component: Access Policy Manager

Symptoms:
Event logs for blocked request show username as "(anonymous)".

Conditions:
High stress load on SWG with explicit proxy setting.

Impact:
Username cannot be determined from event logs.


446526-3 : TCP virtual server/UDP virtual server without datagram-LB mode enabled running DNS cache and suspending iRules might cause TMM crash.

Component: Local Traffic Manager

Symptoms:
When a TCP virtual server, or a UDP virtual server without datagram-LB mode enabled, runs an iRule which suspends itself, and the traffic that virtual server is handling is destined for the DNS cache, subsequent responses attempting to execute an iRule crash TMM because the first response is suspended. Those subsequent responses should be queued before attempting to execute the iRule.

Conditions:
Configuration contains TCP virtual server, or a UDP virtual server without datagram-LB mode enabled running DNS cache and suspending iRules.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Enable datagram-LB mode on the UDP profile. There is no workaround in the case of TCP.


446493-1 : foreign key index error on local traffic-only group

Component: TMOS

Symptoms:
When running the load verify command (tmsh load sys config verify) on a scf file, an error is thrown: 01070712:3: Values (/Common/traffic-group-local-only) specified for self IP (/Common/10.7.7.3_24): foreign key index (traffic_group_fk) do not point at an item that exists in the database.
Unexpected Error: Validating configuration process failed.

However, the config will still successfully load when the verify parameter is not specified.

Conditions:
Running tmsh load sys config file verify on a scf file with a local traffic group in it. traffic-group-local-only groups are not loaded during config verify which triggers the error.

Impact:
Config verify fails.

Workaround:
If there are otherwise no other errors in the configuration, it should be able to load successfully using tmsh load sys config file filename.


446248 : Memory leak seen with WAM when ICC enabled without inlining

Component: WebAccelerator

Symptoms:
WAM leaks "unknown headers" when ICC enabled without inlining. This may lead to crash due to memory starvation.

Conditions:
ICC is enabled for policy-node. Content inlining is disabled for the node.

Impact:
Crash due to lack of memory.

Workaround:
Disable ICC or enable inlining with ICC for the node.


446187-3 : If manually started, bigip service(s) may consume 100% and become not functional

Component: Access Policy Manager

Symptoms:
If a certain BIG-IP service is started and working and another instance of the same service is started manually, the original one spins in a loop, consumes around 100% CPU and, becomes nonfunctional.
These services are affected:
apd, websso, eam, acctd, aced, rba.

Conditions:
A service is started manually either using a binary located at search path, for example /usr/bin/
or using a script located at /etc/bigstart/scripts/

Impact:
Service becomes unavailable.

Workaround:
Never start any daemon manually.
The proper way to start, stop, and restart daemons on the BIG-IP system is to use the bigstart utility:
bigstart start daemonname
bigstart stop daemonname
bigstart restart daemonname


445968 : Update traffic priority option appears for non-authorized users in GUI.

Component: TMOS

Symptoms:
Update traffic priority option appears for non-authorized users in GUI but is not.

Conditions:
Logged in As a user with role other than admin or resource-admin, navigate to Network :: Class of Service : Traffic Priority in the GUI and attempt to modify a traffic priority.

Impact:
It appears that the user can modify the option; that is, buttons will be active and not greyed out, but actually attempting to complete the modification results in a 'no access' error.

Workaround:
Log in as admin or resource-admin to modify the update traffic priority option.


445633 : Config sync of SecurID config file fails on secondary blades

Component: TMOS

Symptoms:
If APM is provisioned, after uploading a new SecurID config file via the GUI, mcpd restarts and fails to sync on device group peers.

Conditions:
This happens on a device group peer with APM provisioned, only after using the GUI to update the SecurID configuration. This can also happen on chassis secondary blades.

Impact:
The peer receiving the sync restarts mcpd, which in turn restarts several other daemons. The peer never receives the config file properly.

Workaround:
Use tmsh: tmsh modify apm aaa securid <name> config-files modify { sdconf.rec { local-path /path/to/sdconf.rec } }.


445335 : Unlicensed LTM can be configured with Policy that requires license

Component: Local Traffic Manager

Symptoms:
Certain features of the LTM require specific licensing; one of these features is PEM. LTM Policy supports PEM conditions and actions, and exposes these options even when PEM is not currently licensed. Therefore it is possible to create a policy that cannot be applied to a virtual server.

Conditions:
BIG-IP is not licensed for PEM, and user applies an LTM Policy to a virtual server which specifies 'ssl-persistence classification'.

Impact:
User sees error message, policy is not applied to virtual server.

Workaround:
Either enable PEM licensing or change the LTM Policy to not use 'ssl-persistence classification'.


445330 : Incorrect values are displayed for iSession profile optimized bits

Component: Wan Optimization Manager

Symptoms:
Optimized bits reported for iSession profiles are incorrect

Conditions:
SDDv2 deduplication optimizes WAN traffic containing runs of the same repeated byte value.

Impact:
Optimized bits reported for iSession profiles are incorrect.

Workaround:
None.


444710-5 : Out-of-order TCP packets may be dropped

Component: Local Traffic Manager

Symptoms:
Out-of-order TCP packet will be dropped if it occurs during 3-way handshake.

Conditions:
Client initiates TCP connection to BigIP with ACK segment arriving after (i.e. out-of-order) a second packet.

Resultant sequence:

1. Client - BigIP : SYN
2. BigIP - Client : SYN-ACK
3. Client - BigIP : PSH, ACK (w/Segment #2) =-- Out-of-order ; Must be retransmitted.
4. Client - BigIP : ACK (w/Segment #1)

Impact:
Packet must be retransmitted by client.

Workaround:
None


444178-4 : HTTP header replace always inserts header

Component: Local Traffic Manager

Symptoms:
Setting up a Policy to replace HTTP header results in both the existing and new header values appearing instead of the expected behavior of replacing an existing header with a new one.

The following example which attempts to replace the Server: header with a generic "AnonymousServer" demonstrates this. In this example, one would observe the response containing two Server: headers.


ltm policy /Common/replace_server {
    controls { response-adaptation }
    requires { http }
    rules {
        replace_a_header {
            actions {
                0 {
                    http-header
                    response
                    replace
                    name Server
                    value AnonymousServer
                }
            }
            conditions {
                0 {
                    http-header
                    response
                    name Server
                    starts-with
                    values { Apache }
                }
            }
            ordinal 1
        }
    }
    strategy /Common/first-match
}

Conditions:
This replacement header specified in the Policy is inserted under all conditions.

Impact:
This can result in duplicate values for the specified HTTP headers.

Workaround:
Can employ a custom iRule to achieve equivalent result. Below is an example of an iRule to replace the User-Agent header:

when HTTP_REQUEST {
     set useragent [HTTP::header value User-Agent]
          if {$useragent contains "Mozilla"} {
            HTTP::header replace User-Agent "MMMMMMMMM"
    }
}


443262 : When ICC is enabled, content gets inlined even though it exists in client's local storage

Component: WebAccelerator

Symptoms:
When ICC is applied to an html node and a client requests that html using the cookie header, if AAM serves the html from the cache, the operation inlines the content instead of referencing the content already present in the client's local storage. When the Lifetime interval for the html expires, AAM revalidates with the OWS (S10232) and replaces the links with references to the content in the client's local storage.

Conditions:
ICC is enabled for node matching html.

Impact:
Content is inlined in the html even though it already exists in the clients local storage. When a client makes a request using the cookie header and AAM responds from the cache (S11101), AAM does not replace the links with references to the content in local storage.

Workaround:
Set Lifetime on the html pages to 0 to force each request to revalidate with OWS.


442993-2 : An unexpected gateway may be selected for the management interface

Component: TMOS

Symptoms:
Unexpected gateway via management interface (in /etc/sysconfig/network) is created whenever a specific management-route is configured using tmsh. This unexpected configuration is applied onto the kernel after a reboot.

Conditions:
This occurs when a specific non-default management-route is configured, and the default management-route is not configured.

Impact:
An incorrect gateway is configured after a reboot.

Workaround:
You can avoid the issue by configuring a default management-route if you are using non-default management-routes. As a workaround for the issue, delete the unexpectedly created management default route following every reboot. To do so, use a command similar to the following: 'ip route del default dev eth0' or 'ip route del default dev mgmt'. You can include the appropriate command in the file /config/startup to have the command run automatically after each boot operation.


442980-5 : GTM pool statistics incorrect if max-address-returned not set to 1 and r

Component: Global Traffic Manager

Symptoms:
With max_addresses_returned greater than 1, multiple addresses are returned, but only the pool member associated with the first address gets stats increased.

Conditions:
Set max_addresses_returned greater than 1

Impact:
Pool stats do not show the update when pool members are selected as alternate addresses.

Workaround:
None.


442613 : After applying a data group for FIX profile tag map, modifying datagroup may cause tag mapping function to be inconsistent

Component: Local Traffic Manager

Symptoms:
After user modifies tag map data group content, the tag replacement function may still use the old tag mapping data.

Conditions:
After user assigns a data group to FIX profile's sender tag map attributes, user modifies the content of the data group.

Impact:
The replaced tag may still be the data defined in the old data group, this causes the FIX message receiver to not recognize the tag and reject the message.

Workaround:
After user modifies data group, user must then remove the data group map from the FIX profile, update the profile, re-add the it and update the profile again.


442535-2 : Time zone changes do not apply to log timestamps without tmm restart

Component: Advanced Firewall Manager

Symptoms:
When the timezone of the BIG-IP system changes, logging timestamps are not updated to the new timezone.

Conditions:
This occurs when the timezone of the BIG-IP system changes.

Impact:
/var/log/ltm logs will have the correct time from the other processes that log, but tmm logs will have the incorrect time. The time remains incorrect until tmm or the system is restarted. There are potential issues with processes that depend on correct localtime in tmm.

Workaround:
In tmsh, run one or both of the following commands: 'restart tmm'. -- bigstart restart tmm.


442455-1 : Hardware Security Module (HSM) CSR and certificate fields constraints: 15 characters and no spaces.

Component: Local Traffic Manager

Symptoms:
While using the tmsh command or fipskey.nethsm utility to create HSM keys/csr/cert, Locality, Province, Organization names cannot be longer than 15 characters.

While using the tmsh command to create HSM keys/csr/cert, Locality, Province, Organization names, common name cannot process multiple words. The system accepts only the content up to the first space character.

Conditions:
HSM keys/csr/cert, Locality, Province, Organization names, common name are longer than 15 characters or consists of strings separated by space characters.

Impact:
The system truncates field content to 15 characters or to the string up to the first space character.

Workaround:
Use strings shorter than or equal to 15 characters. Use strings without spaces. To use strings containing spaces, quote the entire string and delimit spaces with a backslash character (\). For example, for the string F5 Networks Inc, use this: "F5\ Networks\ Inc". Note that the delimiting slash still counts as a character.


442391-7 : Unsolicited neighbor advertisement cannot pass through VLAN group

Component: Local Traffic Manager

Symptoms:
The BIG-IP system does not forward unsolicited neighbor advertisement messages to all VLANs, even if messages are not destined for the BIG-IP system. This behavior may adversely affect mechanisms, such as duplicate address detection within IPv6. Neighbor advertisement messages are required from IPv6 nodes in response to neighbor solicitation messages. However, a node may elect to send unsolicited advertisement messages to propagate new information quickly. For more information, see RFC 2461 section 7.2.6: Sending Unsolicited Neighbor Advertisements, available here: http://tools.ietf.org/rfcmarkup?doc=2461#section-7.2.6.

Conditions:
This issue occurs when the following condition is met:
VLAN groups are configured for VLANs that are also configured for IPv6.

Impact:
Duplicate address detection does not work, so it is possible to have duplicate IPv6 address on two VLANs in a VLAN group without detection. This might adversely affect duplicate address detection, and can slow down detection of some changes when unsolicited message are not delivered to IPv6 clients.

Workaround:
Use DHCPv6 or stateless auto-configuration to avoid duplicate addresses.


442226-3 : Link Controller fails to auto-create a self-server

Component: Global Traffic Manager

Symptoms:
Link Controller will create a data center, but fails to create a GTM server for itself. Any LTM virtual servers configured will not show up as members in the Wide IP configuration.

Conditions:
Always

Impact:
Users must manually create and maintain the GTM server

Workaround:
Use tmsh to create a GTM server:

Standalone:
create gtm server <self host name> datacenter Default_DC addresses add { 10.20.0.1 { device-name <self host name> } } virtual-server-discovery enabled product single-bigip

Redundant:
create gtm server <self host name> datacenter Default_DC addresses add { 10.20.0.1 { device-name <self host name> } 10.20.0.2 { device-name <peer host name>} } virtual-server-discovery enabled product redundant-bigip


442191-4 : HTTP Class profiles globs are upgraded to a contains condition when it should be equals

Component: TMOS

Symptoms:
HTTP Class profiles globs are upgraded to a policy with a contains condition when it should be equals. The upgrade process will succeed, but the policy will not use the correct syntax.

Conditions:
A UCS or config with HTTP Class profiles containing globs for matching must be applied to 11.4.0 or 11.4.1 to encounter this state. The UCS must be from 11.3.x or earlier.

Impact:
After the upgrade to 11.4.x, The policy will match more than the HTTP Class profile did. Network traffic will be impacted.

Workaround:
Manually modify policies with the incorrect condition after upgrading to 11.4.x.


442153-1 : "Enforce" and "Accept" buttons do not work in Redirection Domains section

Component: Application Security Manager

Symptoms:
When you click the "Enforce" button for Redirection Domains, the wildcard entry is not deleted and the action will fail with the following error:
Illegal entity type (redirection_domain).
Could not accept entity

The button then changes to "Accept", which exhibits the same problem.

Conditions:
This occurs in the GUI when clicking the Enforce or Accept buttons for Redirection Domains.

Impact:
Enforce or Accept do not work


442038-2 : Symantec AV 12.1.x fails to be detected on Mac OS X 10.9

Component: Access Policy Manager

Symptoms:
Antivirus endpoint security check in BIG-IP APM access policy fails to detect Symantec antivirus 12.1.x (12.1.4013 version) on mac os x 10.9

Conditions:
Mac OS X 10.9, BIG-IP APM with Antivirus endpoint security check in its access policy

Impact:
Symantec AV 12.1.x fails to be detected.

Workaround:
none


442020-4 : Neighbor discovery might not work correctly with VLAN group

Component: Local Traffic Manager

Symptoms:
Certain clients (such as Windows clients) can lose router information even if previously advertised via router advertisement. This occurs because neighbor discovery messages are handled by proxy even in transparent mode for VLAN groups.

Conditions:
Conditions under which this manifests are inconsistent, but it appears to affect Windows clients in various scenarios. For example, when host on one VLAN sends a neighbor advertisement with the router bit set, the proxy code does not preserve it in the proxied response.

Impact:
Some clients might lose router information and cannot send traffic.

Workaround:
avoid stateless auto-configuration or do not auto-configure cross vlan boundaries.


441985-1 : In client-ssl profile outside ckc key/cert/chain/passphrase and RSA pair inside ckc

Component: Local Traffic Manager

Symptoms:
In the client-ssl profile, sometimes the key/cert/chain/passphrase (outside ckc) does not match the RSA pair inside ckc.

Conditions:
This occurs when using the client-ssl profile.

Impact:
Configuration error, which can result in traffic issues.


441913-4 : Empty Webtop when large number of resources assigned to access policy.

Component: Access Policy Manager

Symptoms:
When a large number of resources (more than 25) is assigned to an access policy with full a webtop, the system displays an empty webtop when accessed the second time.

Conditions:
Large number of resources assigned to access policy.

Impact:
Failed to display large number of resources on webtop when accessed second time.

Workaround:
To work around the problem, you can only use fewer resources.


441601-5 : Response is truncated in the log

Component: Application Security Manager

Symptoms:
Response is truncated in the ASM events log when the client closes the connection before the response arrives.

Conditions:
Client sends a FIN before the server finishes responding.

Impact:
The response logging doesn't show all the response.


441597 : Statistics of IP intelligence network category are always 0.

Component: Advanced Firewall Manager

Symptoms:
When displaying stats you will see a 0 count for network category of IP intelligence statistics. That category is not in use in the system.

Conditions:
Always.

Impact:
No impact.

Workaround:
None


441500-5 : Fails over upon receiving updates from the IP reputation database.

Component: Application Security Manager

Symptoms:
A customer has experienced a couple of fail over incidents from bd SIGABRTs, leaving no cores. The system at the time of the core seemed to be performing fine and the logs are pretty quiet.

Conditions:
Receiving updates from the IP reputation database.

Impact:
A customer has experienced a couple of fail over incidents from bd SIGABRTs, leaving no cores. The system at the time of the core seemed to be performing fine and the logs are pretty quiet.

Workaround:
N/A


441214-2 : monpd core dumps in case of MySQL crash

Component: Application Visibility and Reporting

Symptoms:
When MySQL crashes, the monpd process creates a core dump.

Conditions:
This issue occurs when MySQL crashes or does not start correctly.

Impact:
Reports not available for the duration of MySQL going down.

Workaround:
This issue has no workaround at this time.


441146 : Delays with flooding on forwarding ports following STP blocked state changes.

Component: Local Traffic Manager

Symptoms:
Flooding on forwarding ports for some HSB equipped platforms are being delayed. The delays are due to the absence of an event-driven flushing of HSB L2 entries, when interfaces changes to a STP blocked state.

Conditions:
This occurs with the BIG-IP 3900, 6900, 8900, 8950 platforms. This is seen with multiple parallel interfaces on the same VLAN between the BIG-IP system and a remote switch, with STP enabled.

Impact:
Delays are observed with the BIG-IP system again reverting to use the STP selected forwarding port, after the original forwarding port was disabled and re-enabled.

Workaround:
None.


441075-7 : Newly added or updated signatures are erroneously added to Manual user-defined signature sets.

Component: Application Security Manager

Symptoms:
Further investigation shows the signature was added to another blocking signature set simultaneously unexpectedly.

Conditions:
Customer reported that they encountered unexpected violation when they assigned an user defined signature to a unblocking signature set.

Impact:
Further investigation shows the signature was added to another blocking signature set simultaneously unexpectedly.

Workaround:
N/A


441058-3 : TMM can crash when a large number of SSL objects are created

Component: Local Traffic Manager

Symptoms:
Administrative operations which trigger a full reload of SSL cert, key, or CRL files can cause TMM to abort. TMM will miss its heartbeat, at which time it will be killed by sod daemon via SIGABRT.

Conditions:
Configuration contains a large number of SSL certs, keys and/or CRLs.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Remove any unused SSL objects from configuration.


440526 : When collecting support information, log messages might appear in /var/log/ltm

Component: TMOS

Symptoms:
When collecting support information, mcpd presents error message about providers for static and dynamic routes.

Conditions:
When collecting support information in a qkview file.

Impact:
Log messages might appear in /var/log/ltm. Messages appear similar to the following: err mcpd[7930]: 0107167d:3: Data publisher not found or not implemented when processing request route_static_entry. These messages are benign, and all routes should be present in output file.

Workaround:
None.


440505-6 : Default port should be removed from Location header value in http redirect

Component: Access Policy Manager

Symptoms:
Browser recognizes page loaded with URL without default port and page loaded after receiving Location header that contains rewritten URL with default port included in it as different pages and loads page twice.

Conditions:
Resource is loaded through Portal Access; page is loaded after receiving Location header with default port included in rewritten part; navigation occurs to this page without default port in domain part (for example, to anchor in this page).

Impact:
Resource is loaded twice and this can possibly change behavior of backend.

Workaround:
This issue has no workaround at this time.


440488-3 : Inadvertent Dissociation of Sandbox and APM Access Profile

Component: Access Policy Manager

Symptoms:
The association between "Hosted Content" sandbox and access profile can be inadvertently broken when a resource assignment agent is modified.

Conditions:
1. Association between "Hosted Content" sandbox and access profile is set up to allow free access to sandbox files at public security level. Free access means access to file without creating any resources in the access policy.
2. There are some resource in the access policy, but none of these resources reference a sandbox file.

When these two conditions are present in an access policy, any change to a resource assignment agent would break the association between sandbox and profile access.

Impact:
Inadvertent lost of access to public sandbox files.

Workaround:
Create a dummy resource that references a dummy sandbox file to avoid inadvertent dissociation between sandbox and access profile.

Use Webtop and Dummy Webtoplink to Maintain Association Between Sandbox and Profile Access:
 
- Use GUI to upload a dummy text file (*.txt like Blank.txt, because the content of the file can be blank) to sandbox Hosted Content. It's security level can be anything better than "public".
- Create a full Webtop resource.
- Create a Webtoplink with link-type "Hosted Content", and select the dummy text file in the sandbox.
- Use VPE to add the Webtop and webtoplink resources to an Access Policy. As long as the dummy Webtoplink is not modified or removed from the Access Policy, the association between sandbox and profile access is maintained, regardless of changes in other resources.


If the Access Policy already uses a Portal Access resource, a dummy Portal Access resource with link-type "Hosted Content" can be added to the Resource Assignment Agent. This dummy resource is not displayed on the Webtop if the option "Publish on Webtop" is not selected. As said above, as long long the dummy Portal Access resource is not modified or removed from the Access Policy, the association between sandbox and profile access is maintained, regardless of changes in other resources.


440431-5 : Response Logging generates a blank $HTTP_STATUS response when used with certain iRule commands.

Component: Local Traffic Manager

Symptoms:
Response Logging generates a blank $HTTP_STATUS response when used with certain iRule commands.

Conditions:
This issue occurs when the following condition is met:

A virtual server with Response Logging configured has an iRule assigned that uses either the HTTP::respond or HTTP::redirect command.
The Request Logging profile gives you the ability to specify the data and format for HTTP requests and responses that you want to include within the log file. Parameters, such as $HTTP_STATUS, are used to specify information that is included within the log file. The HTTP::respond and HTTP::redirect iRule commands allow you to customize the response sent to the client and are intended to run immediately when triggered. Therefore, no further processing of response data should occur. As a result, the system logs blank status information when using the $HTTP_STATUS parameter within the Request Logging profile for Response Logging.

Impact:
The system logs invalid information. As a result of this issue, you may encounter the following symptom: -- BIG-IP iHealth lists Heuristic H465653 on the Diagnostics :: Identified :: Medium screen. If $HTTP_STATUS is used within the Response Logging template, the output will be blank.

Workaround:
To work around this issue, you can use the iRule to generate the required logs, rather than the Request Logging profile. If an iRule is calling HTTP::respond or HTTP::redirect, you can log directly from that iRule using the log iRule command, and record parts of the old response, or the new one, depending on what is required.


440346-2 : Monitors removed from a pool after sync operation

Component: TMOS

Symptoms:
Monitors might be removed from a pool after sync operation.

Conditions:
If devices are in a failover device group, and this group contains a pool with multiple health monitors enabled, then using the 'Overwrite Configuration' option.

Impact:
Monitors might be removed from a pool on the devices that received a sync.


440263-1 : HTTP profile gets set to http-transparent by ASM deployment wizard

Component: Application Security Manager

Symptoms:
If the default HTTP profile "http" was modified, when creating a new virtual server in the ASM deployment wizard, the associated HTTP profile is "http-transparent".

Conditions:
This will occur if you have modified the default http profile and then create a new virtual server using the ASM deployment wizard.

Impact:
HTTP profile gets set to the wrong profile. This makes the PEM deployment unusable, updating the security policy will return an error "01070734:3: Configuration error: In Virtual Server (/Common/test) HTTP is configured as a Transparent Proxy, and thus is incompatible with any other filter other than PEM."

Workaround:
After using the wizard, you can set the http profile for the virtual server back to http


439773-1 : The TMM process may restart and produce a core file when a connection flow is in an invalid TCP state

Component: Local Traffic Manager

Symptoms:
TMM will core with panic string "Request for segment from middle of queue."

Conditions:
The conditions are infrequent and not all of them are known fully. TCP is in an invalid state for that particular flow, and this flow cannot continue anymore.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
This issue has no workaround at this time.


439461-3 : Citrix Receiver for Linux is unable to receive full applications list.

Component: Access Policy Manager

Symptoms:
Citrix Receiver for Linux shows only a part of applications list when connecting to APM.

Conditions:
APM is configured for Citrix Replacement and Citrix Receiver for Linux is used.

Impact:
Citrix Receiver for Linux shows only a part of applications list.


439343-5 : Client certificate SSL authentication unable to bind to LDAP server

Component: TMOS

Symptoms:
When LDAP Client Certificate SSL Authentication is configured to bind to the LDAP server with a password, the bind fails due to an incorrect password.

Conditions:
LDAP client certificate SSL authentication enabled
LDAP server requires password to bind

Impact:
Client certificates cannot be authenticated


438877-1 : If the SASP monitor receives an unexpected message from the GWM server containing an expected message id then the monitor stops processing any further messages.

Component: Local Traffic Manager

Symptoms:
The send weight messages message id field does not serve any purpose as per the SASP rfc 4678. Consider a scenario where the SASP monitor sents a registration request message containing message id x. It expects a registration reply with message id x. However, if it receives a send seight message with message id x then it throws the monitor out of sync. It stops processing any further messages.

Conditions:
The SASP monitor sends a request message with a message id in it to the GWM server. It expects a reply from the GWM server to the request message containing the same message id. But instead it receives a send weights reply containing the expected message id.

Impact:
The SASP monitor stops processing of any messages after it receives the unexpected send weights message.

Workaround:
None.


438792-7 : Node flapping may, in rare cases, lead to inconsistent persistence behavior

Component: Local Traffic Manager

Symptoms:
If persistence is used, and a node is marked down and then up in quick succession (less than about 7 seconds), then persistence may act inconsistently (meaning, not all connections expected to persist to a server will do so). Further requests in certain circumstances may hang (the client will be left waiting for a response).

Conditions:
Persistence, rapid node flapping, new connection (via a TMM with an existing connection) after node has been re-marked as up.

Impact:
Inconsistent persistence behaviors. If persistence records are examined, you might find multiple, conflicting entries. This is an intermittent issue.

Workaround:
Add an iRule command to the PERSIST_DOWN event that deletes the persistence entry for this connection. One example might be:

when PERSIST_DOWN {
    persist delete source_addr [IP::client_addr]
}

For more information, see SOL14918: Node flapping may cause inconsistent persistence records, available here: http://support.f5.com/kb/en-us/solutions/public/14000/900/sol14918.html.


438674-3 : When log filters include tamd, tamd process may leak descriptors

Component: TMOS

Symptoms:
The log filter functionality in TMOS allows users to publish logs from a specific set of processes to various log destinations.

Conditions:
Configure log filter that includes tamd.

Impact:
Client authentication might fail. When a log filter includes tamd, the tamd process might start to leak descriptors.

Workaround:
Do not define log filters that include tamd (tamd is included in 'all').


438604-4 : AVR JavaScript injection takes place regardless of content-type value

Component: Application Visibility and Reporting

Symptoms:
AVR will inject JavaScript although it should not.

Conditions:
"Page Load Time" in analytic profile is turned on.
Send HTTP request with content-type is text/html without the <head> tag.

Impact:
AVR can invalidate a response, by injecting JavaScript in a page that is not actually an HTML page.

Workaround:
Turn off "Page Load Time" in analytic profile


437773-6 : Some LACP trunk members are missing after rebooting primary blade

Component: TMOS

Symptoms:
Some of the Link Aggregation Control Protocol (LACP) trunk members are missing after rebooting the primary blade.

Conditions:
This occurs on VIPRION chassis with more than one blade, configured for LACP after rebooting the primary blade.

Impact:
Some LACP trunk members are missing.

Workaround:
If you have not saved the configuration in the bad state (that is, saved the configuration while the LACP trunk members are missing), you might be able to recover by running the command: tmsh load sys config.


437744-5 : SAML SP service metadata exported from APM may fail to import.

Component: Access Policy Manager

Symptoms:
SAML SP service metadata exported from APM contains elements in incorrect order which might cause it to fail to be imported by other implementations.

Conditions:
When SAML metadata is exported from BIG-IP when it is acting as SAML Service Provider, the order of
'SingleLogoutService' and 'AssertionConsumerService' are not right.

Impact:
Import of SAML metadata with SAML IdP from BIG-IP as SP might fail.

Workaround:
Edit exported metadata: change the order of elements in the SPSSODescriptor so that SingleLogoutService element goes first in the sequence.


437743-4 : Import of Access Profile config that contains ssl-cert is failing

Component: Access Policy Manager

Symptoms:
An access profile configuration that uses an SSL Certificate fails to import. This happens because of a change in the method to import SSL certificates.

Conditions:
Access Profile configuration contains (SSL) Certificate File object, that is configurations that include OCSP responder, Certificate Authority Profile or ServerSSL Profile.

Impact:
Serious. It's not possible to import configs that contain above mentioned objects to another box, which might prevent users from distributing profiles manually or properly importing a backup/

Workaround:
You can either exclude above-\ mentioned objects prior to export and then recreate them after the import or (not recommended) edit the config manually and import the SSL certificate prior to import.


437703-4 : LTM policies do not accept special characters in HTTP header names

Component: Local Traffic Manager

Symptoms:
LTM policies do not accept special characters in HTTP header names.

Conditions:
This occurs when trying to use a '$' character in a header name.

Impact:
The system posts a validation error. For example, for the value $WSRA, the system posts the following message: 01071748:3: Policy '/Common/ft1_pool_select', rule 'notvar2'; invalid name, value '$WSRA'.

Workaround:
None.


437627-6 : TMM may crash if fastl4 vs has fragmeneted pkt

Component: Local Traffic Manager

Symptoms:
TMM may crash if a fast L4 profile has a fragmented packet

Conditions:
fastl4 configure
incoming fragmented packets

Impact:
Traffic disrupted while tmm restarts.

Workaround:
In fast L4 profile, enable option "Reassemble IP Fragments"


437025-7 : big3d might exit during loading of large configs or when a connection to mcpd is dropped.

Component: Global Traffic Manager

Symptoms:
If big3d loses its connection to MCPD and cannot reconnect immediately, big3d retries too often and re-uses timer IDs incorrectly.
This might result in a core dump with either SIGABRT or SIGSEV.

One way this can happen is that while processing very large configs, the mcpd process does not respond to queries from the big3d process.

Conditions:
A large configuration file (for example, larger than 10 MB) or a very busy MCPD/control plane.

Impact:
big3d core errors.

Workaround:
This issue has no workaround at this time.


436616-3 : Now CTU correctly enables logs for 64bit services on Windows.

Component: Access Policy Manager

Symptoms:
64bit services uses normal logging level even if CTU has 'Enable logging' flag set


436201-4 : JavaScript can misbehave in case of the 'X-UA-Compatible' META tag when a client uses IE11

Component: Access Policy Manager

Symptoms:
JavaScript can misbehave when encountering the 'X-UA-Compatible' META tag from clients using Microsoft Internet Explorer 11.

Conditions:
Internet Explorer 11 and meta http-equiv='X-UA-Compatible' content='IE=10'.

Impact:
Web application malfunction.

Workaround:
Use an iRule.


435953-1 : In the GUI, the search fails to return results for the Wide IP list

Component: TMOS

Symptoms:
Using the GUI to search fails to return results from the Wide IP list.

Conditions:
This occurs when the Wide IP and the Alias share same domain name. (e.g., siterequest.com).

Impact:
Cannot search by Wide IP alias using the GUI.

Workaround:
in the GUI, use * to get all the Wide IPs, or use a prefix such as 'wip' or 'wip1'. Another work around is to use TMSH.


435555-2 : Cannot load UCS from different BIG-IP system using Secure Vault

Component: TMOS

Symptoms:
If a BIG-IP system uses in Secure Vault to encrypt secure fields, you cannot load that UCS to another BIG-IP system.

Conditions:
This occurs when a UCS originates on a BIG-IP system whose secure fields are encrypted using Secure Vault. The reason is that the Master Key to the Secure Vault has been encrypted with the Unit key of the originating BIG-IP system. The Unit key is unique to each system.

Impact:
UCS load fails.


435335-4 : SSL proxy session ID cache does not respect limit set by tmm.proxyssl.cachesize

Component: Local Traffic Manager

Symptoms:
After setting tmm.proxyssl.cachesize to a non-default value and restarting TMM, the new maximum size is not respected, either causing too many or too few entries to be retained. This can lead to memory exhaustion over time.

Conditions:
Proxy SSL feature enabled with non-default tmm.proxyssl.cachesize value set.

Impact:
The setting has no effect, so if it is being used to avoid low-memory conditions, the low-memory conditions persist.


435106-2 : Message: notice panic: ../modules/hudfilter/hudnode.c:741: Assertion 'valid proxy failed.

Component: Local Traffic Manager

Symptoms:
TMM cores and posts message: notice panic: ../modules/hudfilter/hudnode.c:741: Assertion 'valid proxy failed.

Conditions:
This might occur after changing the configuration in the following ways: removing persist records, enabling configsync auto-save.

Impact:
The systems posts the message: notice panic: ../modules/hudfilter/hudnode.c:741: Assertion 'valid proxy' failed. This is an intermittent issue.

Workaround:
None.


434730-5 : Auto-sync may fail with many synchronizations in rapid succession

Component: TMOS

Symptoms:
If an device group is configured to perform auto-sync with incremental synchronization enabled, and a number of rapid configuration changes cause a rapid sequence of auto-sync operations, synchronizations may fail, and mcpd may log a message like the following to the LTM log:

0107168e:5: Unable to do incremental sync, reverting to full load for device group

Conditions:
- This affects any device group configured with auto-sync enabled with and full-load-on-sync disabled.
- A number of rapid configuration changes resulting in a rapid sequence of auto-sync operations.

Impact:
Manual mcpd restart may be required.

Workaround:
Disable auto-sync.


434573-5 : Tmsh 'show sys hardware' displays Platform ID instead of platform name

Component: TMOS

Symptoms:
While running a version of BIG-IP older than the most recent release on a new hardware platform (recently purchased or recently acquired through RMA exchange), the 'tmsh show sys hardware' command may display the Platform ID code in place of the official F5 platform name.

For example, the 'tmsh show sys hardware' command may display a Platform ID like the following:

Platform
  Name D113

instead of the official platform marketing name, such as:

Platform
  Name BIG-IP 10000F

Conditions:
This may occur if the version of BIG-IP software installed is not the most recent release, and the hardware platform is a newer variant (due to added hardware features or other manufacturing change) than was originally supported by the older BIG-IP software release.

Impact:
Custom automation scripts which depend on correctly matching F5 platform marketing names may fail to match the platform ID.

Workaround:
Update platform-identification scripts to include the relevant platform IDs among the recognized match values.


434517-13 : HTTP::retry doesn't work in an early server response

Component: Local Traffic Manager

Symptoms:
If a HTTP_RESPONSE event fires due to the server sending an early response (i.e. a response before the entire request has been sent), then HTTP::retry does not work correctly.

Conditions:
Client begins sending a request. The server responds before that request is completely sent. A HTTP::retry is called in the HTTP_RESPONSE event.

Impact:
Typically, early server responses are error conditions.

Workaround:
HTTP::respond or HTTP::redirect may be used at the cost of an extra client-side request.


434400-4 : tmm might core with rate-limiting on virtual server

Component: Local Traffic Manager

Symptoms:
tmm might core when rate-limiting is configured on a virtual server.

Conditions:
This occurs on a virtual server with rate-limiting enabled and unexpected filter operations that send LB selection after connection is in progress. This might also occur with an iRule that behaves similarly, for example, issuing an LB command after a TCP::release.

Impact:
Traffic disrupted while tmm restarts.


434356-1 : Data-group update doesn't propagate to SSL forward proxy configuration

Component: Local Traffic Manager

Symptoms:
When an internal/external data-group configuration is modified, it doesn't reflect in a client SSL profile.

Conditions:
Modifying a data group configuration.

Impact:
You have to manually restart tmm or re-apply the data-group to the SSL profile each time the data-group is modified.

Workaround:
Restart tmm or re-apply the data-group to the SSL profile each time the data-group is modified.


434258-1 : SSL Forward Proxy versions prior to 11.6.0 do not fully support passthrough.

Component: Local Traffic Manager

Symptoms:
SSL Forward Proxy versions prior to 11.6.0 do not fully support passthrough. When upper layer profiles such as HTTP is configured, packet passthrough will not work.

Conditions:
HTTP profile and/or other modules above SSL are configured and SSL bypass is enabled.

Impact:
The TMM crashed.


433972-11 : New Event dialog widget is shifted to the left and Description field does not have action widget

Component: Access Policy Manager

Symptoms:
When you access Microsoft SharePoint 2013 through APM and use a rewrite profile, the rewritten New Event dialog box is shifted to the left and action widgets are not displayed above the Description field.

Conditions:
The problem occurs in Internet Explorer 11 with meta http-equiv='X-UA-Compatible' content='IE=10'.

Impact:
SharePoint 2013 malfunctions.

Workaround:
You could potentially use an iRule to mitigate the problem.


433847-3 : APD crashes with a segmentation fault.

Component: Access Policy Manager

Symptoms:
Uninitialized CRLDP or OCSP field might cause a crash because of possible memory corruption.

Conditions:
This occurs when there is an uninitialized field in the Crldp or OCSP module.

Impact:
APD crashes with a segmentation fault. Uninitialized field might cause a crash trying to free the client connection.


433752-7 : Web applications might rewrite their event handlers

Component: Access Policy Manager

Symptoms:
Web applications might rewrite their event handlers.

Conditions:
If a web application edits event handlers dynamically.

Impact:
Event handlers might become corrupted.

Workaround:
None.


433323-4 : Ramcache handling of Cache-Control: no-cache directive in Response

Component: Local Traffic Manager

Symptoms:
Previously, when a Cache-Control header from the OWS contained a no-cache directive, RAM Cache mistakenly interpreted that the same as a no-store directive.

Conditions:
Configure a virtual server with HTTP caching.

Impact:
Failure to cache a cachable document.

Workaround:
This issue has no workaround at this time.


433055-1 : BFD GTSM IMI shell commands don't work

Component: TMOS

Symptoms:
BFD GTSM IMI shell commands 'bfd gtsm enable' and 'bfd gtsm disable' commands are disabled and have no effect.

Conditions:
This problem shows up when BFD is configured, and attempt to configure GTSM feature of BFD.

Impact:
GTSM feature is not usable.

Workaround:
None.


432900-1 : APM configurations can fail to load on newly-installed systems

Component: Access Policy Manager

Symptoms:
APM upgrades fail if the /shared/apm directory is not present before you load the configuration. APM writes a configuration loading error to the /var/log/ltm file with content similar to this:

Oct 25 08:42:11 localhost notice mcpd[6311]: 0107165d:5: copy_file: EPSEC::In copy_file - src (/config/filestore/files_d/Common_d/epsec_package_d/:Common:EPSEC:Images:epsec-1.0.0-160.0.iso_14866_1) dst (/shared/apm/images/epsec-1.0.0-160.0.iso)
Oct 25 08:42:11 localhost notice mcpd[6311]: 0107165d:5: copy_file: Failed in file copy errno=(No such file or directory)
....
01071558:3: EPSEC - File Copy to /shared location failed Unexpected Error: Loading configuration process failed.

Conditions:
If the system is fresh from manufacturing or has had a recent formatting installation, it is vulnerable to this upgrade defect. The failure is only observed if the configuration being applied contains elements of APM.

Impact:
After booting into an upgraded system, the configuration will fail to load. A load failure can also be observed when manually loading a UCS file.

Workaround:
Create the directory /shared/apm and try to load the configuration again.


432469-9 : State of Microsoft Windows Firewall is not detected

Component: Access Policy Manager

Symptoms:
APM Client Firewall Check on does not detect state of Windows 8.1 firewall.

Conditions:
End point checking is configured in access policy and requires presence of Windows Firewall

Impact:
Session establishment will fail.

Workaround:
This issue has no workaround at this time.


432102-4 : HTML reserved characters not supported as part of SAML RelayState

Component: Access Policy Manager

Symptoms:
If the RelayState parameter includes HTML and XHTML special characters, then BIG-IP as IdP or BIG-IP as SP does not process them correctly, and does not send complete RelayState value to the Peer.

Conditions:
Using special characters

Impact:
SAML integration may not work properly with other products when configured RelayState parameter includes special characters.

Workaround:
To use reserved characters in HTML (",',&,<,>) as part of SAML RelaySate, convert them to their HTML entities (&#34;, &#39;, &#38;, &#60;, &#62;).


431980-3 : SWG Reports: Overview and Reports do not show correct data.

Component: Access Policy Manager

Symptoms:
When traffic is very sparse, the report may be incorrect and omit information due to skipped aggregation process of collected data.
The original fix caused heavy spikes to the CPU every 5 minutes.

Conditions:
Very sparse traffic with significant gaps.

Impact:
AVR reports may be incorrect.

Workaround:
This issue has no workaround at this time.


431634-5 : tmsh: modify gtm server 'xxx' virtual-servers replace-all-with 'yyy' fails

Component: TMOS

Symptoms:
If you have a gtm server object for which you wish to modify its virtual servers, the following tmsh command fails:

modify gtm server <gtm-server-name> virtual-servers replace-all-with <vs-name>

with this error:

"The requested Virtual Server (/Common/<gtm-server-name> ) was not found."

Conditions:
You have a gtm server object whose virtual servers you are attempting to modify via the replace-all-with method.

Impact:
You cannot set the virtual server(s) on a gtm server object via the replace-all-with method in tmsh.

Workaround:
You still can still add and delete virtual servers to the gtm server object via tmsh, you just cannot use the replace-all-with method to accomplish this.


431240-4 : RTSP ALG when used with CGNAT, the media connections do not have the data session translation address:port logged as LSN translations

Component: Carrier-Grade NAT

Symptoms:
RTSP established media flows will not have their public translation address and ports logged in the same way LSN translations do.

Conditions:
This occurs when an RTSP ALG profile is configured with an lsn-pool and there are RTSP RTP flows.

Impact:
Media flows will not be able to be used to identify subscribers.


431239-2 : RTSP established media connections do not honor LSN pool translation port ranges or configuration

Component: Carrier-Grade NAT

Symptoms:
RTSP established media connections will choose ports that are not consistent with the CGNAT configuration.

Conditions:
RTSP ALG profile with a VS using any LSN pool

Impact:
It may use ports outside the LSN pool range Deterministic NAT configurations - will get incorrect results or no results when reverse mapping an RTP media flow

Workaround:
There is no workaround.


431149-4 : APM config snapshot disappears and users see "Access Policy configuration has changed on gateway"

Component: Access Policy Manager

Symptoms:
In scenarios where there are multiple slots on a chassis in an HA pair (in both vCMP and chassis only mode), the error "Access Policy configuration has changed on gateway" might be displayed when a user connects to a virtual server.

Conditions:
It can occur in conditions when :
 - right after when the whole chassis is rebooted
 - secondary/slave slot's tmm cores.
 - disabling a slot on chassis

Impact:
Customer would see following message when they connect to virtual server "Access Policy configuration has changed on gateway"

Workaround:
To work around the problem, type the command "bigstart restart apd" on the primary slot.


430323-1 : VXLAN daemon may restart when 8000 VXLAN tunnels are configured

Component: TMOS

Symptoms:
VXLAN daemon may restart when 8000 VXLAN tunnels are configured.

Conditions:
8000 VXLAN tunnels are configured.

Impact:
VXLAN daemon restart.


429368-4 : SIP RTP/RTCP connections do not honor LSN pool translation port ranges

Component: Carrier-Grade NAT

Symptoms:
Session Initiation Protocol (SIP) RTP/RTCP connections do not honor Large Scale NAT (LSN) pool translation port ranges.

Conditions:
This affects all SIP RTP/RTCP connections in all LSN modes(NAPT and DNAT). The BIG-IP system chooses any valid ephemeral port instead of the range specified in the LSN pool.

Impact:
Its is not possible to trace which subscriber initiated a RTP/RTCP connection using LSN logs.

Workaround:
There is no workaround for this issue.


429365-3 : FTP data connections do not honor LSN pool translation port ranges

Component: Carrier-Grade NAT

Symptoms:
FTP data connections do not honor LSN pool translation port ranges.

Conditions:
This affects all FTP data connections in all LSN modes(NAPT and DNAT). The BIG-IP system chooses any valid ephemeral port instead of the range specified in the LSN pool

Impact:
It is not possible to trace which subscriber initiated a data connection using LSN logs.

Workaround:
None.


429011-9 : No support for external link down time on network failover

Component: Local Traffic Manager

Symptoms:
For switch based platforms, the bcm56xxd daemon monitors the active/standby state using the failover.bigipunitmask DB variable and if this indicates a transition from Active to Standby, it downs external links and starts a timer for re-enabling the links after a customer-specified delay as per the failover.standby.linkdowntime DB variable.

Conditions:
This occurs on BIG-IP 2000 series and 4000 series platforms.

Impact:
No support for external link down time on network failover.

Workaround:
None.


428467-1 : max-concurrent-udp/max-concurrent-tcp maximum values

Component: Local Traffic Manager

Symptoms:
If the max-concurrent-udp/max-concurrent-tcp dns cache parameters are set too high for the platform, the memory needed to fulfill the request may cause tmm to panic.

Conditions:
This occurs because tmm creates max-concurrent-tcp communication points, each of which has a 64 KB buffer. For example, 8 tmms at 64 KB each results in approximately 500 KB for a single communication point. When multiplied by 2 billion, there will be problems with memory allocation.

Impact:
When this occurs, tmm can core.


428387-3 : SAML SSO could fail if SAML configuration contains special XML characters (&,<,>,",')

Component: Access Policy Manager

Symptoms:
SAML AuthRequest and Assertion generation could fail if the configuration (IdpEntityID, ACS, SAML Attributes, and so on) contain special XML characters, such as [&,<,>,",'].

Conditions:
- Assertion signing is enabled on BIG-IP as IdP.
- SAML Configuration (IdpEntityID, ACS, not-encrypted SAML Attributes, ACS URL, SP Entity ID, SLO URL) contains special characters, e.g. [&,<,>,",']

Impact:
SAML AuthRequest and Assertion generation could fail.

Workaround:
You can replace special XML character with XML-escape codes in the configuration:
" &quot; ' &apos; < &lt; > &gt; & &amp;

For example, replace "http://f5.com/acs_url?user=5&password=pass"

with "http://f5.com/acs_url?user=5&amp;password=pass"


428071 : REST framework must be installed on each blade of a VIPRION

Component: Device Management

Symptoms:
When you install the required BIG-IQ components on BIG-IP devices running on a VIPRION with more than one blade, the components load only on the primary blade.

Conditions:
VIPRION chassis with 2 or more blades.

Impact:
VIPRIONs require manual workaround to be managed by a BIG-IQ.

Workaround:
To install the required components on the remaining blades, for each blade, run the update_bigip.sh script then disable the blade through TMUI. After you run the script on all blades, re-enable them through TMUI.


427924-4 : ipport hash type is not programmed in new blade

Component: TMOS

Symptoms:
When inserting a new blade in a VIPRION C2400 chassis, with UDP or TCP hash set to 'ipport', the new blade uses the 'port' hash instead. Rebooting the blade or restarting bcm56xxd and tmm causes the correct DAG (Disaggregator) hash to be used.

Conditions:
UDP or TCP hash algorithm changed from default (e.g. changed from 'port' to 'ipport'). -- UDP or TCP virtual servers configured. -- New blade inserted into chassis. New blade includes external interface to which traffic will arrive.

Impact:
Prevents adequate distribution of traffic within a chassis, which may disrupt traffic flows or reduce the traffic throughput of the BIG-IP system.

Workaround:
Reboot the new blade after it has been configured. Issue the 'bigstart restart' command (to restart the bcm56xxd and tmm modules and program the DAG with the correct hash type).


427357-2 : Virtual address icmp-echo and arp properties get reset to disabled for network prefixes on config load

Component: TMOS

Symptoms:
On a configuration load, the icmp-echo property is always set disabled for a virtual address with network prefix.

Conditions:
This occurs on virtual addresses that have a network prefix.

Impact:
ICMP and ARP behavior stops for the virtual address.

Workaround:
Manually reconfigure the icmp-echo property for virtual addresses with network prefixes.


426939-6 : APM Polices does not work in VIPRION 4800 chassis if there is no slot1

Component: Performance

Symptoms:
Access policies does not get executed according to the configuration in a VIPRION 4800 chassis. User will not be able to use those policies.

Conditions:
This issue happens only on VIPRION 4800 and only if there is no active slot1 as primary or standby

Impact:
User will not be able to use the access polices that are configured in BIG-IP

Workaround:
Always use slot1 in the VIPRION 4800


426328-4 : Updating iRule procs while in use can cause a core

Component: Local Traffic Manager

Symptoms:
When updating an iRule that is in process or parked and has existing connections and uses a proc, a core can occur due to incorrect internal reference counting.

Conditions:
High traffic iRule that both parks and uses a proc.

Impact:
The BIG-IP system might temporarily fail to process traffic, and fail over if configured as part of a high availability (HA) pair.

Workaround:
Disable listener before updating iRule. For more information, see SOL14654: Updating an iRule that uses sideband connections may cause TMM to core, available here: http://support.f5.com/kb/en-us/solutions/public/14000/600/sol14654.


426209-5 : exporting to a CSV file may fail and the Admin UI is inaccessible

Component: Access Policy Manager

Symptoms:
If there are a large number of APM report records, exporting them to a CSV file might fail and the Admin GUI can then become inaccessible.

Conditions:
When the amount of report data is large.

Impact:
The Admin UI is inaccessible.

Workaround:
Avoid exporting large amounts of report data.


422460-6 : TMM may restart on startup/config-load if it has too many objects to publish back during config load

Component: TMOS

Symptoms:
TMM restarts without any core file on startup or when mcpd is loading the configuration if the size of configuration is considered big (for example over 1000 passive monitors).

Conditions:
This issue occurs when all of the following conditions are met:
-- The mcpd process loads a large configuration with thousands of objects.
-- The platform is running 12 or more TMM instances (BIG-IP 11000, 11050 platform, or VIPRION B4300 blade).

Impact:
Traffic processed by the affected TMM instance is interrupted while TMM restarts. TMM might enter a restart loop and restart multiple times, without producing a core file. You might see errors similar to the following in log/tmm or log/daemon:
-- LTM01 crit tmm11[28599]: 01010020:2: MCP Connection aborted, exiting. -- LTM01 emerg logger: Re-starting tmm. This might cause serious traffic disruption.

Workaround:
This workaround is a mitigation and may not work in all cases; the zero-window timeout may need to be adjusted to a higher value for some configurations.

To work around this issue, increase the timeout used for the MCP connection.

1. Open the tmm_base.tcl file for modification.
2. Locate the tcp _mcptcp stanza.
3. Add the following line:
   zero_window_timeout 300000

This lengthens the timeout, which avoids the restart. For more information, see SOL14498: The mcpd connection to TMM may time out on either startup or configuration load and cause TMM to restart, available here: http://support.f5.com/kb/en-us/solutions/public/14000/400/sol14498.html.


422107-6 : Responses from DNS transparent cache will no longer contain RRSIG for queries without DO bit set

Component: Local Traffic Manager

Symptoms:
DNS transparent cache may have RRSIG in the responses for queries without DO bit set.

Conditions:
DNS transparent cache receives a DNS query without DO bit set.
If the query is answered by a DNSSEC zone of a pool member. The response returned to the client will contain RRSIG.

Impact:
Responses contain unnecessary RR sets. Not RFC compliant.

Workaround:
None.


422094-7 : Data connections created through FTP Active-mode transactions through the CGNAT do not have the data session translation address:port logged as LSN translations

Component: Carrier-Grade NAT

Symptoms:
Some connections through the CGNAT may not have corresponding LSN logs associating those translation address-port end-points with an FTP subscriber. This only occurs on an LSN with NAPT mode with an FTP-ALG profile, and it only occurs for a subscriber using FTP Active mode.

Conditions:
LSN with NAPT mode
FTP-ALG profile
Subscriber using FTP Active mode

Impact:
There are CGNAT sessions missing from the LSN logs.

Workaround:
Associate the subscriber with the FTP control channel. Provide both the control channel and data channel end-points so the subscriber can be correctly located.


421791-5 : Out of Memory Error

Component: WebAccelerator

Symptoms:
TMM crashes due to a segmentation violation early in a WAM interface.

Most likely, before the crash occurs the logs should show messages indicating that the sweeper was activated one or more times.

Conditions:
Only happens when free memory is very low to non-existent.

Impact:
TMM crashes.

Workaround:
Reduce load on box if possible.


421612-5 : CGNAT traffic through SIP-ALG will not have outbound connections and addresses logged

Component: Service Provider

Symptoms:
Subscriber traffic through the Carrier Grade NAT and SIP-ALG will not have all the addresses and ports used by the subscriber logged.

Conditions:
CGNAT and SIP-ALG configured and subscriber sending SIP traffic.

Impact:
Some subscriber traffic will not have translation addresses logged as expected.


421611-1 : SIP messages through the SIP-ALG may be hairpinned when the destination address is not inside the NAT

Component: Service Provider

Symptoms:
SIP messages are sent directly to the peer and not to the SIP-Proxy when both peers are inside the NAT.

Conditions:
-- CGNAT and SIP-ALG are configured.
-- Peer1 and Peer2 are in the NAT'd network (subscribers).
-- SIP-Proxy is located outside the NAT network (internet).

Impact:
Some SIP messages may not be seen by the SIP-Proxy and cause missed messages and accounting gaps.

Workaround:
None


421446-4 : Fixed bug in APM which doesn't allow InstallerService to update.

Component: Access Policy Manager

Symptoms:
Installer service isn't updated if user access newer APM.

Conditions:
User accesses APM with special version: 11.4.0, 11.4.1, 11.5.0

Impact:
User has old InstallerService

Workaround:
N/a


421016-1 : AFM + APM configurations and traffic drop

Component: Advanced Firewall Manager

Symptoms:
Currently, when the Network Firewall is configured in Firewall mode (default deny), Access Policy Manager (APM) traffic might be dropped. The Network Firewall does work with APM when configured in ADC mode (default allow for self IPs and virtual servers).

Conditions:
Logon for BIG-IP APM resources may not function when the BIG-IP APM is configured in conjunction with the BIG-IP AFM module.

Impact:
When this occurs, users are unable to access BIG-IP APM configured services.

Workaround:
There is no workaround.


420440-3 : Multi-line TXT records truncated by ZoneRunner file import

Component: Global Traffic Manager

Symptoms:
Checking your TXT record in the web interface causes the system to give an error. Querying for the data against a listener for the record reveals that the TXT rdata is incorrect.

Conditions:
GTM enabled and a zone file with a TXT record that has multi-line rdata has been imported via the GUI into ZoneRunner.

Impact:
Your DNS TXT records will be incorrect.

Workaround:
Enter your multi-line TXT records via the web interface as single line, quote separated lines.


420341-7 : Connection Rate Limit Mode when limit is exceeded by one client also throttles others

Component: Local Traffic Manager

Symptoms:
Connection Rate Limit Mode is set to Per Virtual Server and Source Address, you might encounter unexpected results. Once a particular client is above the limit, other clients (other source IP addresses) are also throttled by the system.

Conditions:
This occurs in the following manner: There is a configured connection rate limit per virtual server per client; one client exceeds the configured rate limit; and the virtual server also throttles other, unrelated clients.

Impact:
The virtual server throttles clients that are not exceeding the connection rate limit.

Workaround:
None.


420204-1 : FIPS key deletion by-handle does not post an error if corresponding key object exists but the keyname is more than 32 characters long

Component: TMOS

Symptoms:
Starting 11.4.0, 'tmsh delete sys crypto fips by-handle handle#' command is expected to throw an error if the key object corresponding to this FIPS key handle exists in BIG-IP config. However, this does not work if the key name is longer than 32 characters because the operation relies on key name being the same as the FIPS key label, which is not the case for keynames of greater than 32 chars.

Conditions:
BIG-IP contains a FIPS key object with a name that is longer than 32 characters. User attempts 'tmsh delete sys crypto fips by-handle handle#' for this FIPS key handle. The expected error does not occur, and the operation deletes the FIPS key from the FIPS card, which makes the BIG-IP key object invalid.

Impact:
The corresponding BIG-IP key object is now invalid with no corresponding FIPS key in FIPS card. Traffic using this key object will fail.

Workaround:
Use keynames shorter than 32 characters for FIPS keys.


420107-4 : TMM could crash when modifying HTML profile configuration

Component: TMOS

Symptoms:
Modification of configuration for a virtual with HTML profile attached may cause a tmm crash if there are open connections with html content.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable virtual server (or make sure that it does not have open connections in any other way) before modifying configuration.


419664-3 : SNMP sysIfxStat stats availability on 2000/4000 platforms

Component: TMOS

Symptoms:
SNMP sysIfxStat stats are not available on 2000/4000 platforms.

Conditions:
Performing mibwalk of SNMP-sysIfxStat on 2000/4000 platforms.

Impact:
SNMP-sysIfxStat stats cannot be queried using SNMP.


419217-2 : LTM policy fails to decompress compressed http requests

Component: Local Traffic Manager

Symptoms:
Administrator configures LTM policy to decompress http request (so, for example, that ASM can check it). However compressed requests are not decompressed.

Conditions:
Issue occurs always when there is a decompress action on an LTM policy.

Impact:
Requests and/or responses are not decompressed as desired.

Workaround:
An iRule can be added to the virtual server to override policy setting. (DECOMPRESS::enable, DECOMPRESS::disable).


418734-2 : vCMP guest unit_key empty

Component: TMOS

Symptoms:
A vCMP guest fails to load, and mcpd crashes on start-up. Running 'tmsh list vcmp guest' on the host reveals that sym-unit-key is empty or does not exist.

Conditions:
There are a number of ways that this can be encountered. The most common is an RMA replacement of a VCMP-capable blade, or when moving a ucs from one device to another device of the same type, if the device unit key becomes corrupted, or if the master key file (/config/bigip/kstore/master) becomes corrupted.

Impact:
Configuration of vCMP guest fails to load, mcpd crashes.

Workaround:
Remove the encrypted attributes from the config and reenter them in plaintext.


417068-2 : Key install or deletion failure on FIPS key names longer than 32 chars on some platforms

Component: Local Traffic Manager

Symptoms:
Key operations might not succeed as expected when the key names are longer than 32 characters.

Conditions:
This occurs with keynames longer than 32 characters on the 6900 (D104), 8900 (D106), 8950 (D107), 11999 (E101), 11050 (E102), 10000/10050/10200/10250 (D113) platforms.

Impact:
FIPS key install and key deletion might fail. Deletion of the FIPS key with a keyname longer than 32 characters deletes the key from the BIG-IP configuration but does not delete the key from the FIPS card. Similarly, importing a key with keyname longer than 32 characters into the FIPS card fails.

Workaround:
Use keynames of a maximum of 32-characters for FIPS keys.


416292-2 : MCPD can core as a result of another component shutting down prematurely

Component: TMOS

Symptoms:
During a small window of opportunity, mcpd can core if it is told to restart. This often occurs when another component has failed.

Conditions:
This issue generally occurs when another component has a problem which then initiates an mcpd restart.

Impact:
An mcpd core file is generated during shutdown, and it may initially appear as if mcpd coring was the cause of the restart.


415299-2 : Recurring check failures not logged

Component: Access Policy Manager

Symptoms:
Recurring check failures are not being logged to the client's policyserver.log file

Conditions:
Access policy configured, with recurring checks enabled on a client-side agent.

Impact:
If the recurring check fails, it is not logged in the client's log file, which makes it more difficult to diagnose issues.


412160-2 : vCMP provisioning may cause continual tmm crash.

Component: TMOS

Symptoms:
vCMP provisioning may cause continual tmm crash. In rare cases, tmm cores when VCMP is provisioned/deprovisioned.

The tmm log file presents messages similar to the following: panic: ../dev/cn1120/n3_compress.c:555: Assertion 'enough n3_comp_dev structs' failed.

Conditions:
1) LTM is provisioned.
2) Provision vCMP.
3) View the tmm log file/system process table/etc.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
1) Save the system configuration.
2) Reboot
3) After reboot, ensure that the device stays active and has only twoNitrox 3 Compression Devices listed in /var/log/tmm:
-- notice n3-compress0 PASS 0.1: Nitrox 3 Compression Device
-- notice n3-compress1 PASS 0.1: Nitrox 3 Compression Device


412138-2 : If there's resource that has acl order 0 and it's been used by profile, that has been exported, you'd not be able to import it back

Component: Access Policy Manager

Symptoms:
You're trying to import profile and it fails

Conditions:
If .conf file contains resource with acl-order 0 (default)

Impact:
Medium. Import is failing if object has acl-order 0

Workaround:
1. Don't use ACL 0 in exported config
2. It's possible to open .conf.tar.gz and edit it adding
"acl-order 0" where it's missed


410398-4 : sys db tmrouted.rhifailoverdelay does not seem to work

Component: TMOS

Symptoms:
The problem is that the sys db tmrouted.rhifailoverdelay value <value> does not seem to take any effect, and the route is being withdrawn, sometimes before the newly active device is able to advertise the virtual address, leaving a blackhole route.

Conditions:
This occurs during a failover.

Impact:
Temporary black hole for a route.


409323-1 : OnDemand cert auth redirect omits port information

Component: Access Policy Manager

Symptoms:
On-Demand Cert Auth redirect does not honor a port other than 443 in virtual server.

Conditions:
On-Demand Cert Auth is used in an access policy that's assigned to a virtual server with non-standard port.

Impact:
The redirect URL is missing the port information, hence subsequent client connections aren't successful.

Workaround:
N/A


405752-6 : Monitors sourced from specific source ports can fail

Component: TMOS

Symptoms:
Monitors using TCP transport; when sourced from ports 1097 (on some platforms), 1098, 1099 and 3306, will fail. Upon receipt of SYN-ACK from the monitored device, TMOS will filter the packet and respond with ICMP port unreachable.

Conditions:
Use one or more monitors which rely upon TCP as a transport. Port 1097 will be affected on the BIG-IP 800, 1600, 3600, 3900, 6900, 8900 (and derivative), 1100, and 11050 platforms.

Impact:
May result in false monitor failures.

Workaround:
1. Set bigd.reusesocket database variable to enable and follow F5 Network's best practices for monitors, specifying a timeout of three times the interval plus 1 second.
2. Modify iptables by removing the affecting iptable rule:
    
-- /sbin/iptables -D INPUT -p tcp --dport 3306 -j REJECT --reject-with icmp-port-unreachable.
-- /sbin/iptables -D INPUT -p tcp -m tcp --dport 3306 --tcp-flags ACK,SYN SYN -j REJECT --reject-with tcp-reset.
-- /sbin/iptables -A INPUT -p tcp -m tcp --dport 3306 --tcp-flags ACK,SYN SYN -j REJECT --reject-with tcp-reset.


405348-5 : ActiveSync POST fails when body is larger than 64k.

Component: Access Policy Manager

Symptoms:
Sending of large mail (body greater than 64 KB) fails with an ERR_NOT_SUPPORTED message in /var/log/apm when using ActiveSync.

Conditions:
This occurs when the following conditions are met:
ActiveSync configured on the BIG-IP system.
Email is sent with a large attachment, when the device sending the email currently has no active session.

Impact:
Large POST bodies as in those found in emails with large attachments will not successfully send. The message fails to send with an error message that asks to use the mail server directly.

Workaround:
Modify the db variable 'tmm.access.maxrequestbodysize' to a value greater than the default, 64 KB.


404141-2 : Standby system offers option to Apply Access Policy even though it has been synced

Component: Access Policy Manager

Symptoms:
After syncing an access policy from the active system to the standby, the standby system will still prompt you to apply the access policy, even though it is in sync with the primary

Conditions:
Device group configured and an access policy is synced from the active device to the standby device(s).

Impact:
The message is erroneous on the standby, as the policy was already synced.

Workaround:
The standby device will no longer prompt to sync the access policy if it has already been synced from the active device.


402115-2 : System does not report tmm memory with consideration of threading

Component: TMOS

Symptoms:
Using the command 'tmsh show sys memory' may display zero usage for some entries.

Conditions:
This applies when using a platform that provides memory management per-process; this is all current hardware platforms, but does not apply to VCMP or VE.

Impact:
The division of memory usage may not be clear.

Workaround:
None. However, the information shows the most important value, which is the memory utilization of each process.


401852-3 : csyncd will intentionally dump core when the kernel event queue is full

Component: Local Traffic Manager

Symptoms:
csyncd is a daemon that synchronizes parts of the filesystem between blades of a chassis, and also runs in a limited mode on appliances to detect and respond to changes on the filesystem. The Linux kernel has a fixed-size buffer in which it will write a log of the filesystem events in which csyncd is interested. If the kernel indicates that this buffer is full, then csyncd will generate a log message of this format:

csyncd[6885]: 013b0004:3: Fatal error: event queue overflow

After this it will leave a core dump.

Conditions:
This can happen with no special configuration.

Impact:
The daemon will dump core as it restarts. No action is required.


394278-2 : SIP-ALG does not use translation ports consistent with a subscriber's Deterministic mappings when LSN "Deterministic Mode" is configured

Component: Carrier-Grade NAT

Symptoms:
RTP and RTSP connections established by the SIP-ALG proxy when used with LSN's Deterministic mode will not select translation ports that are reverse mappable to that subscriber by dnatutil.

Conditions:
SIP-ALG configured with a Virtual Server using an LSN pool configured with Deterministic mode.

Impact:
RTP and RTSP media connections are not reverse mappable to the correct subscriber.

Workaround:
Use an LSN pool configured with NAPT and logging to achieve subscriber traceability.


394236-1 : MCP unexpectedly exits, "failure has occurred, There is no active database transaction, status: 0 -

Component: TMOS

Symptoms:
MCP exits unexpectedly and customer sees a trace in the ltm log file similar to:

Feb 9 12:54:41 localhost err mcpd[9995]: 01070596:3: An unexpected failure has occurred, There is no active database transaction, status: 0 - EdbDbConnection.cpp, line 133, exiting...

Conditions:
Unexpected MCP exit.

Impact:
MCP is already exiting, so there is no impact.


389328-6 : RSA SecurID node secret is not synced to the standby node

Component: Access Policy Manager

Symptoms:
When RSA SecurID node secret files are created on the active node, the files are not synced to the standby node. As a result, user will not be able to log on after switchover.

Conditions:
RSA node secret files are created on the active node after the first successful authentication.

Impact:
Service will be inaccessible after switchover.

Workaround:
1. Copy node secret files /config/aaa/ace/Common/<rsa_securid_aaa_server>/sdstatus.12 and /config/aaa/ace/Common/<rsa_securid_aaa_server>/securid from the active node to the same directory on the standby node.

2. Wait for at least 30 seconds

3. Execute the command "tmsh save sys config" to commit the changes to disk.


384451-3 : Duplicated cert/keys/chain might cause SIGABRTs and low-memory conditions

Component: Local Traffic Manager

Symptoms:
SSL per-virtual stats might cause SSL profile cert/keys/chain to be instantiated per-virtual server.

Conditions:
This occurs when using cert/keys/chain in SSL profile virtual servers.

Impact:
In this case, cert/keys/chain are duplicated and those duplicates might cause excessive memory use and disk activity which might lead to SIGABRTs and low-memory conditions.

Workaround:
None.


382157-6 : Stats presented by the MIB sysVlanStatTable does not match sflow vlan stats

Component: TMOS

Symptoms:
Stats presented by the MIB sysVlanStatTable does not match sflow vlan stats.

Conditions:
Running the following command returns data inconsistent with sflow statistics: snmpwalk -v2c -c public localhost F5-BIGIP-SYSTEM-MIB::sysVlanStatTable.

Impact:
Incorrect interpretation of vlan stats. As a result of fixing this issue, F5-BIGIP-SYSTEM-MIB::sysVlanStatTable is obsoleted, IF-MIB::ifXTable should be used instead.

Workaround:
None.


378967-3 : Users are not synchronized if created in a partition

Component: TMOS

Symptoms:
Users in partitions attached to sync-only device groups do not sync to other devices in that device group.

Conditions:
There are users whose active partitions are attached to a sync-only device group.

Impact:
This affects sync-only device groups only, not the failover device group.

Workaround:
None.


375887-2 : Cluster member disable or reboot can leak a few cross blade trunk packets

Component: Local Traffic Manager

Symptoms:
Using the cluster member 'disable' command with a trunk that spans blades might cause a brief period where received broadcast and multicast packets egress out the enabled trunk members of the cluster.

Conditions:
This occurs on a trunk that spans blades.

Impact:
To an external device running spanning tree protocol or variant, this can look like a loop.

Workaround:
None.


374339-7 : HTTP::respond/redirect might crash TMM under low-memory conditions

Component: Local Traffic Manager

Symptoms:
HTTP::respond/redirect might crash TMM under low-memory conditions.

Conditions:
Under low-memory conditions, if a new HTTP connection triggers an HTTP::respond/redirect event.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Reduce memory usage


369352-6 : No verification prompt when executing 'load sys config default' for resource administrator role

Component: TMOS

Symptoms:
When logged in as a resource administrator "load sys config default", which restores the configuration to factory defaults, doesn't prompt for verification as it should. If you execute the command from a normal administrator role you do get a prompt.

Conditions:
Login as a resource administrator
run "load sys config default"
restore begins without a verification prompt.

Impact:
System restore initiated without prompt when run as a resource administrator.

Workaround:
None.


364994-10 : TMM may restart or disabled connections may be reused when a OneConnect profile is configured and OneConnect reuse is disabled be an iRule.

Component: Local Traffic Manager

Symptoms:
Version 11.3.0 and earlier, TMM may restart.
Version 11.4.0 and later, disabled connections may be reused.

Conditions:
A virtual server with an associated OneConnect profile.
A server side connection is disabled on the client side by the iRule ONECONNECT::reuse disable command.

Impact:
Version 11.3.0 and earlier, tmm can crash.
Version 11.4.0 and later, disabled connections may be reused.

Workaround:
Version 11.3.0 and earlier:

If HTTP::disable is being called in a client-side event, OneConnect must be disabled in a server-side event. This can be done by including 'ONECONNECT::reuse disable' in the client-side event (so a new connection is created), setting a variable, and then invoking ONECONNECT::reuse disable in SERVER_CONNECTED

Example:

  set oc_reuse_ss_disable 1
  ONECONNECT::reuse disable
  CACHE::disable
  COMPRESS::disable
  HTTP::disable

Add this (or merge with an existing SERVER_CONNECTED event in the iRule):

when SERVER_CONNECTED {
  if { [info exists oc_reuse_ss_disable] } {
    ONECONNECT::reuse disable
    ONECONNECT::detach disable
  }
}

11.4.0 and later:

Replace "ONECONNECT::reuse disable" with "set oc_reuse_ss_disable 1" in the iRule client-side event.

Add this (or merge with an existing SERVER_CONNECTED event in the iRule):

when SERVER_CONNECTED {
  if { [info exists oc_reuse_ss_disable] } {
    ONECONNECT::reuse disable
  }
}


352925-3 : Updating a suspended iRule and TMM process restart

Component: Local Traffic Manager

Symptoms:
Updating a suspended iRule assigned via a profile causes the TMM process to restart when trying to return to the suspended iRule.

Conditions:
This occurs when the iRule is suspended and the TMM process is trying to restart.

Impact:
TMM restarts.

Workaround:
Assign the iRule to the virtual server instead of assigning it to the profile.


348000-5 : HTTP response status 408 request timeout results in error being logged.

Component: Local Traffic Manager

Symptoms:
HTTP response status 408 request timeout results in error being logged.

Conditions:
HTTP profile is attached to a virtual server. 408 response status is received from server and is not preceded by request from the client.

Impact:
The 408 response status received is consumed and the connection is reset. The response never makes it to the client. The following error is reported in the log: http_process_state_prepend - Invalid action EV_INGRESS_DATA during ST_HTTP_PREPEND_HEADERS.

Workaround:
None.


337934-3 : remoterole: attributes ending in 'role' or 'deny' will be parsed incorrectly

Component: TMOS

Symptoms:
The remoterole configurations in which one of the attributes ends in 'role' will have that attribute truncated. Also this could happen with an attribute that ends in 'deny' and has a deny directive.

Conditions:
remoterole attributes ending in 'role'. May also happen with attributes ending in 'deny'.

Impact:
Parsing truncates attributes.

Workaround:
Do not use remoterole configurations in which one of the attributes ends in 'role' or one that ends in 'deny" that has a deny directive.


336255-6 : OneConnect Connection Limits with Narrow Source Address Masks

Component: Local Traffic Manager

Symptoms:
If a OneConnect profile with a narrow source address mask (e.g. 255.255.255.255) is applied to a virtual with a SNAT pool, existing, idle, server connection can NOT be reused (because of the SNATted source address and narrow source address mask). New connections, therefore, will be created.

Effectively, the pool member connection limits will be interpreted as applying to active connections, with in-flight (HTTP) requests or responses.

Conditions:
This can happen when OneConnect is used with SNAT pools and narrow OneConnect source address masks.

Impact:
More TCP connections to pool members than expected will occur.

Workaround:
Relax the OneConnect source address mask width.


226473-5 : Apply Policy failures due to Null characters in entity names

Component: Application Security Manager

Symptoms:
In older versions Policy Builder could create parameters with the Null character (0x0) in the name. This caused Apply Policy failures in case there were two entities that differed only by the Null character.

Conditions:
Multiple entities exist that differ in name only by the Null character.

Impact:
Apply Policy will fail.

Workaround:
Delete the entities that have a Null character from the policy.




This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade


*********************** NOTICE ***********************

For additional support resources and technical documentation, see:
******************************************************
Generated: Fri Sep 23 08:11:31 2016 PDT
Copyright F5 Networks (2016) - All Rights Reserved