Applies To:Show Versions
- 16.0.1, 16.0.0, 15.1.3, 15.1.2, 15.1.1, 15.1.0, 15.0.1, 15.0.0, 14.1.4, 14.1.3, 14.1.2, 14.1.0, 14.0.1, 14.0.0, 13.1.4, 13.1.3, 13.1.1, 13.1.0
BIG-IP Edge Client establishes secure communications to applications and networks. It provides users with full access to IP-based applications, resources, and intranet files as if they were physically working on the office network.
The Edge Client version 126.96.36.199 is now available on downloads.f5.com.
- User documentation for this release
- Contacting F5
- Legal notices
User documentation for this release
For a comprehensive list of documentation that is relevant to this release, refer to the following pages:
The following issues have been fixed in this release:
|807269-1||Previously, the DNS Relay Proxy service did not recover to its former functional state in case of errors and/or service restart. The system generated several DNS queries, and the DNS split scope did not work. This issue has been fixed, and now when the service is restarted, the VPN tunnel reconnects, and the DNS exception rules re-populate.|
|937637-8||Fixed the issue where Edge Client did not follow best practices when used to establish a VPN through a browser.|
|942421-1||Previously, in some cases, the DNS Relay Proxy service worker thread encounters errors and terminates by leaving the service in a waiting state. This issue has been fixed.|
|949933-9||Fixed the issue on Windows, where the Client Troubleshooting Utility (CTU) tool bundled with APM clients did not follow the best practices.|
|958429-1||The DNS resolution of an excluded hostname may resolve to multiple IP addresses. Previously, if the Edge Client used a different IP address than the one resolved by stonewall service at startup, the service blocked all the traffic, and Edge Client could not connect. This issue has been fixed, and now the Stonewall service updates the DNS exclusions' IP addresses dynamically by periodically resolving hostname exclusions.|
|961977-1||Fixed the issue that caused macOS clients to be unable to establish a VPN connection (https://support.f5.com/csp/article/K26349235). After upgrading to epsec-1.0.0-936.0.iso on the APM, Edge Client for macOS failed to pass the Access Policy and could not connect to the VPN.|
|963797-1||Fixed the issue where users could access external sites for a short interval of 30-40 seconds after logging into Windows in locked mode.|
|967345-1||Previously, Edge Client's Always Connected mode for macOS could temporarily fail to restrict internet access on system startup. The issue is fixed, and now the Always Connected mode restricts internet access when the VPN is disconnected.|
|973241-1||Fixed the issue where Edge Client for Windows failed to start after rebooting. This happened because the Edge Client got stuck waiting for the Stonewall service and communicating about the disconnected VPN option.|
|973417-1||Previously, on Windows, the Stonewall service did not recognize the local network on startup. This happened because the Network Location Awareness (NLA) is not activated on the first run, and the Firewall blocked the internet traffic. This issue is fixed, and now NLA detects the local network successfully.|
The following are known issues in this release.
After upgrading to Edge Client 188.8.131.52, 184.108.40.206, or 220.127.116.11, initially for the first connection, the browser-based VPN components might fail to launch. This issue occurs when all of the following conditions are met:
For more information, refer to the https://support.f5.com/csp/article/K25173042 link.
Re-launch the network access resource.
Redeploy the Microsoft Windows clients package with the Web Browser Add-ons for BIG-IP Edge Client option selected when downloading the package.
Run f5vpn_setup installer on the client machine to get new components.
How to Contact F5 Support or the Anti-Fraud SOC
- By phone in the U.S. (accessible 24x7): 888-88askf5 (888-882-7535).
- International contact numbers: http://www.f5.com/training-support/customer-support/contact/.
- The Support Coordinator can contact the SOC as needed.
You can contact the Anti-Fraud SOC as follows:
- By phone in the U.S. (accessible 24x7): 866-329-4253 (Option #3 for Anti-Fraud)
- International contact numbers: https://f5.com/products/platforms/silverline/f5-silverline-ddos-protection
You can find additional support resources and technical documentation through a variety of sources.
Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology.
|AskF5 Knowledge Base||
The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source.
|BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer||
BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration.
Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more.
|Communications Preference Center||
Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products.