Applies To:

Show Versions Show Versions

Release Note: F5 SSL Orchestrator Release Notes version 14.1.0-5.0
Release Note

Original Publication Date: 12/11/2018


This release note documents the version 14.1.0-5.0 release of F5 Guided Configuration for SSL Orchestrator.


- Platform support
- Guided Configuration browser support
- Guided Configuration version
- User documentation for this release
- Features in SSL Orchestrator
- Fixes
- Known issues
- Behavior changes
- Install and upgrade SSL Orchestrator
- Contacting F5
- Legal notices

Platform support

SSL Orchestrator standalone base license is supported on the following platforms:

Platform name Platform ID
i2800 C120
i5800 C121
i10800 C122
i11800 Discovery Extreme C123
i15800 Endeavour D116
High Performance F5 SSL Orchestrator Virtual Edition (VE) options:
  • 8 CPU
  • 16 CPU
Note: SSL Orchestrator 14.1.0-5.0 does not work with prior SSL Orchestrator release versions. Refer to the Installing and Ugrading SSL Orchestrator section for complete installation and upgrade information.
Note: SSL Orchestrator standalone base license is not supported on Viprion chassis.
Note: The supported platform information applies to the most recent release version.

If SSL Orchestrator is the standalone base license installed on your system, you can add the following modules:

  • URLF Filtering (subscription)
  • IPI (subscription)
  • Network HSM
  • Access Policy Manager (APM)
  • Secure Web Gateway (SWG)
Note: For more information about purchasing other module licenses, contact your F5 Sales representative.

F5 BIG-IP Local Traffic Manager (LTM) base license with SSL Orchestrator as an add-on is supported on any available iSeries and Bourne platforms (not including Viprion and VE):

Platform name
2000, i2000
4000, i4000
5000, i5000
7000, i7000
10000, i10000
11000, i11000
Note: SSL Orchestrator 14.1.0-5.0 does not work with prior SSL Orchestrator release versions. Refer to the Installing and Ugrading SSL Orchestrator section for complete installation and upgrade information.
Note: The supported platform information applies to the most recent release version.

Guided Configuration browser support

The Guided Configuration acts as the template for SSL Orchestrator. This release supports the following browsers and versions for use with Guided Configuration for SSL Orchestrator:

  • Microsoft Internet Explorer 11.x - Only 32-bit browsers are supported.
  • Mozilla Firefox 55.x
  • Google Chrome 61.x

Guided Configuration version

This is SSL Orchestrator's Guided Configuration version 5.0.

User documentation for this release

For a comprehensive list of documentation that is relevant to this release, refer to the SSL Orchestrator Documentation page.

Features in SSL Orchestrator

F5 Guided Configuration for SSL Orchestrator version 14.0.0-5.0 contains significant architectural changes. F5 recommends you review the entire SSL Orchestrator release notes and setup guide prior to upgrading and configuring a deployment.

Note: The SSL Orchestrator upgrade workflow has changed. Reviewing the release note section on Installing and Ugrading SSL Orchestrator provides you with the details necessary for fulling any prerequisites and required steps that streamline the process.

Guided Configuration for SSL Orchestrator

Guided configuration is meant to guide you through setting up a particular use case on the SSL Orchestrator system. Each template requests minimal input and provides contextual help to assist users during setup. The current version displays on the landing page. When a later upgrade becomes available, you can use the available link next to the version number to download it from, then upload and install Guided Configuration for SSL Orchestrator. Prior to installing and upgrading to the latest version of SSL Orchestrator, ensure that you read the release notes and setup guide for any prerequisites, task details, or troubleshooting and recovery steps during installation or upgrade.

SSL Orchestrator Topologies

SSL Orchestrator configuration topologies define the type of traffic (transparent or explicit) and the direction of traffic flow (inbound or outbound) you wish to inspect. These deployment settings, which can be modified as needed without undeploying a configuration, are complimented by SSL management settings that assist you in defining inbound decryption and outbound decryption, setting your service types (such as HTTP, ICAP, Layer 2/Layer 3 inline, and receive-only/TAP services) and creating your service policies by defining per-request and per-session policy settings that can be managed through a virtual policy editor. You can also select an existing application topology, available for SSL Orchestrator addon licensed devices. This option is not available for standalone SSL Orchestrator devices.

  • Outbound transparent proxy
  • Outbound explicit proxy
  • Inbound reverse proxy
  • Outbound layer 2
  • Inbound layer 2
  • Existing application

Licensing and Provisioning for SSL Orchestrator Access Integration

Updated SSL Orchestrator Setup Utility with resource provisioning capabilities for licensed and unlicensed modules.

Access Per-Request Policies Visual Policy Editor (VPE)

The SSL Orchestrator VPE provides a dedicated screen on which to configure a per-request policy using visual elements. Policies you create during the configuration of your deployment are available within the VPE. Each element, or box, represents a corresponding macro whose information (and output) influences the next element and its macro, until the traffic is either allowed or blocked.

Multi-Layered Security

In order to solve specific security challenges, security administrators are accustomed to manually chaining together multiple point products, creating a bare-bones “security chain” consisting of multiple services. A typical chain may include components like Data Leak Prevention (DLP) scanners, Web Application Firewalls (WAF), Intrusion Prevention and Detection Systems (IPS and IDS), Malware Analysis tools, Secure Web Gateways (SWG), and more. In this model, all user sessions are provided the same level of security, as this “daisy chain” of services is hard-wired.

Virtual Clustered Multiprocessing (vCMP)

SSL Orchestrator supports Virtual Clustered Multiprocessing (vCMP) to provision and manage multiple hosted instances of the BIG-IP software on a single hardware platform.

Classification Engine

Classification Engine provides a rich set of methods based on context to dynamically determine how best to optimize the flow through the security stack. Context can minimally come from the following:

  • Source IP/subnet
  • Destination IP/subnet
  • IP intelligence category - Subscription
  • IP geolocation
  • Host and domain name
  • URL filtering category - Subscription
  • Destination port
  • Protocol

Other classifiers with greater flexibility are also available in the SSL Orchestrator VPE and with iRules to optimize and evaluate additional information.

Deployment Modes

SSL Orchestrator provides multiple deployment modes to address a variety of user needs. It can be deployed in any of the following modes:
  • Single device mode
  • High availability (HA) cluster mode

In addition, the system can detect and transparently handle an explicit proxy between SSL Orchestrator and the internet.

SSL Orchestrator Analytics

SSL Orchestrator analytics provide a customizable view into your SSL Orchestrator statistics, and enable you to flexibly choose the information you want to view based on specified ranges of time that you can select and adjust.

Statistics generated:

  • Hit Count
  • Client Bytes Out Per Second
  • Duration
  • Server Bytes In
  • Server Bytes In Per Second
  • Hit Count Per Second
  • Server Bytes Out Per Second
  • Client Bytes In
  • Client Bytes In Per Second
  • Client Bytes Out
  • Server Bytes Out

Statistics are generated for the following dimensions:

  • Client Cipher Names
  • Client Cipher Versions
  • Server Cipher Names
  • Server Cipher Versions
  • Virtual Servers
  • Site IP Addresses
  • Traffic Types
  • Decryption Status
  • Policy Actions
  • Service Paths
  • URL Categories
  • Applications
  • Application Families
  • IP Reputation
  • Destination Countries

L7 Application Protocol Settings

SSL Orchestrator supports L7 application protocol settings allowing you to select a protocol to listen for specific traffic (IMAP, SMTPS, POP3, FTP, HTTP) to be processed.


ID number Description
740438 Provide ability to deploy multiple explicit proxies via SSLO. In 5.0, SSLO provides topology based workflows. If there is a need to deploy multiple explicit proxies, a user would create multiple topologies and the SNAT settings would be correctly picked for them. This also applies for any other outbound topologies.
740970 Access Guided Configuration (AGC) menu was not appearing when SSL Orchestrator (SSLO) module was provisioned. Fix: AGC menu dependency on SSL Orchestrator provisioning was removed and the menu is now available.

Known issues

ID number Description
738086 When a base configuration is reloaded, the box is reset and VLANs are removed. To create network objects, at least one VLAN is required. However, this also occurs when there is no VLAN present. Workaround: Manually create a VLAN if no VLAN is present.
739549 When choosing to deploy L2 outbound and L2 inbound deployment modes, user is allowed to configure a default gateway under System Settings. Workaround: Both Gateway and SNAT settings are globally configured but they will be ignored for L2 deployments.
745428 Deployment failed due to undefined error/interceptionrRule not correctly appearing on the list page. Workaround: Run "bigstart restart responded restjavad". If this does not address the issue, run "clear-rest-storage" and in TMSH run "delete sys application service recursive *" to thoroughly clear the storage so that the module restarts and issue is resolved.
746643 When a L3 or HTTP service is added while creating a new network, VLAN, and route domain for 'To Service', the pool member is not created with a custom route domain specified. Since the 'To Service' address and pool member created is in a different route domain, the service pool is always down and traffic does not go to the service but follows the service down action. Workaround: Add a pool member with the same route domain as the 'To Service' self IP address. Using TMSH, execute the following commands:
  • tmsh modify sys application service <app>.app/<app> strict-updates disabled
  • tmsh create ltm node <name> address <service_node>%<route-domain-id>
  • tmsh modify ltm pool <app>.app/<app> members delete { <service_node>:<port> }
  • tmsh modify ltm pool <app>.app/<app> members add { <service_node>:<port> }

Behavior changes

ID Number Description

SSL Orchestrator version 5.0, when configured to allow un-trusted certificates, no longer caches those untrusted certificates by default, which can reduce performance for servers with untrusted certificates by approximately 12-19% as compared to BIG-IP version 14.0.0.

The drop in performance is by design to improve security by not caching untrusted certificates. This impacts only connections that come from servers with untrusted certificates, and impacts performance only if SSL Orchestrator allows those connections. It is suggested that you do not allow untrusted certificates at all, which provides significantly better security and solves this issue by not allowing the connections. If you must allow untrusted certificates, you can recapture the performance by using TMSH to disable the following sys db variable: tmm.ssl.servercert_softval. This forces SSL Orchestrator to cache certificates forged from untrusted sources.

Install and upgrade SSL Orchestrator

The complete installation and upgrade instructions for F5 Guided Configuration for SSL Orchestrator version 14.1.0-5.0 can be found in the SSL Orchestrator: Setup version 14.1.0-5.0 guide.

To install the F5 Guided Configuration for SSL Orchestrator 14.1.0-5.0 and you do not have an existing SSL Orchestrator add-on license, or a previous version of SSL Orchestrator installed, download the image from For complete step-by-step installation instructions, see the BIG-IP Systems: Upgrading Software guide. The Guided Configuration for SSL Orchestrator 5.0 image is packaged with the F5 BIG-IP 14.1.0 image.

To upgrade to the newest version of SSL Orchestrator from a previous version, or you have an existing add-on license, follow the recommended upgrade steps found in the SSL Orchestrator recommended upgrade procedure section in the SSL Orchestrator: Setup guide. This procedure walks you through the uninstallation and deletion of existing SSL Orchestrator applications and RPM before installing the new ISO image.

If you do not follow the recommended upgrade procedure to undeploy your previous SSL Orchestrator deployments, as well as uninstall your previous version of the application, further manual steps are required to reset your environment and undeploy the previous version. See the Upgrade from previous SSL Orchestrator versions using the recovery procedure task steps in the SSL Orchestrator: Setup guide based on the previous version of SSL Orchestrator you are upgrading from and your access to the BIG-IP Applications LX menu.

These upgrade steps are required since previously deployed SSL Orchestrator configurations cannot be rolled forward or imported into the new version of SSL Orchestrator. Following one of the recommended upgrade procedures will assist you in preparing your system for a clean installation.

Note: If you are implementing a high availability environment for SSL Orchestrator, review the Setting up SSL Orchestrator in a High Availability Environment section in the SSL Orchestrator: Setup guide for more detailed information.

Contacting F5

North America 1-888-882-7535 or (206) 272-6500
Outside North America, Universal Toll-Free +800 11 ASK 4 F5 or (800 11275 435)
Additional phone numbers Regional Offices

How to Contact F5 Support or the Anti-Fraud SOC

You can contact a Network Support Center as follows:

You can manage service requests and other web-based support online at F5 My Support (registration required). To register email with your F5 hardware serial numbers and contact information.

You can contact the Anti-Fraud SOC as follows:

Additional resources

You can find additional support resources and technical documentation through a variety of sources.

F5 Support :: Self-solve Options

Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology.

AskF5 Knowledge Base

The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source.

BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer

BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration.

F5 DevCentral

Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more.

Communications Preference Center

Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products.

Legal notices

Was this resource helpful in solving your issue?

NOTE: Please do not provide personal information.

Additional Comments (optional)