Applies To:Show Versions
- 17.0.0, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.1, 15.1.0, 15.0.1, 15.0.0, 14.1.5, 14.1.4, 14.1.3, 14.1.2, 14.1.0, 14.0.1, 14.0.0, 13.1.5, 13.1.4, 13.1.3, 13.1.1, 13.1.0
Updated Date: 01/17/2023
BIG-IP Edge Client establishes secure communications to applications and networks. It provides users with full access to IP-based applications, resources, and intranet files as if they were physically working on the office network. This release note contains information about the changes made for the current version only. Refer to the prior release note versions for additional information.
The following table contains APM client 7.2.4 versions for different operating systems:
- User documentation for this release
- Contacting F5
- Legal notices
User documentation for this release
For a comprehensive list of documentation that is relevant to this release, refer to the following pages:
Features and enhancements
- Support for the Command Line Clients running on Linux AArch64 with UOS and Ubuntu Operating Systems
With this release, Edge Client supports Linux Command Line Clients (f5fpc) on AArch64 with UOS and Ubuntu Operating Systems. However, support for Edge Client installation package creation for AArch64 BIG-IP would be available in the upcoming BIG-IP version 17.1.0 or higher releases, meanwhile, you can follow the below steps to produce a Linux installer package and distribute to users using any internal file distribution portals or email.
Perform the following steps to install the linux_f5cli.aarch64.deb package from the BIG-IP:
- Upload and install the APM 7240 GA build on the BIG-IP server.
- Secure Shell (SSH) to BIG-IP server through root credentials.
- Copy the file from the /var/apm/mount/apmclients-7240.2023.104.610-6163.0.iso/sam/www/webtop/public/download/linux_f5cli.aarch64.deb location to a server where users can download it.
- Use the command sudo dpkg -i linux_f5cli.aarch64.deb and install the package on the ubuntu machine.
- For the installation instructions, refer to the K47922841 article.
The following issues have been fixed in this release.
|1060661||Fixed the issue where proxy or PAC settings configured in Network Access are not applied after VPN connection on Windows client when Internet Explorer (IE) 11 is disabled.|
|1066993||When the VPN connection was established, Edge Client displayed the connection duration instead of the session expiration time. This issue is fixed, and now the Edge Client displays the expected session expiration time for the user to determine how long the session remains active.|
|1070705||Previously, the Edge client failed to display the maximum session timeout message when the VPN session expired. This issue is fixed, and now the Edge Client displays the "Your session is about to reach maximum session timeout. You will be logged out in about one minute." notification when the VPN connection reaches the maximum session timeout value.|
|1075817||Fixed the issue where the Edge Client did not follow the best practices for Windows support.|
|1075849||Improved Edge Client to follow the best practices while establishing a VPN connection.|
|Fixed the issue where Windows Installer did not follow the best practices.|
|Fixed the issue where Edge Client fails to render the external logon pages in some cases.|
|1113377||A regression issue is seen after upgrading to a build with a 1059025 bug fix. Now, this issue is fixed by properly cleaning up the intermediary files after the upgrade.|
|1114897||After the Edge Client upgraded to the 7.2.2 version, the VPN failed to establish the connection when the machine tunnel service was running. This issue is fixed and now the Edge Client is able to establish the connection after an upgrade while machine tunnel service is enabled.|
|1116933||Fixed the issue where EdgeClient failed to establish the connection at Initialising state for more than 10 minutes for the first time after an upgrade on Windows10 20H2. Pause the Machine tunnel while trying to upgrade the VPN driver.|
|1124177||Fixed the issue where Network Access drive mapping SSO feature is broken even when APM and Network Drive System credentials are the same.|
|1124497||After the Edge Client upgraded to version 7.2.2, the VPN failed to establish the connection when the system woke up from sleep mode. During the sleep mode, the VPN Dialler device became invalid and was unable to establish the VPN connection but it makes several attempts to connect before starting a new connection. This issue is fixed, and now the Edge Client cleans the VPN Dialler device while the system goes into sleep mode and could able to establish the connection when the system wakes up from the sleep mode.|
|1133249||Fixed the issue where Edge Client used crash when cookie count exceeds 32 for SAML Authentication. Now changed the limit to 180 as per recommended best practices.|
|1155497||Fixed the issue and now the size limit for Network Access (NA) split tunneling configuration of Exclude Address space has increased to 20KB. It can now hold up to 640 IPs.|
|1156441||Fixed the issue where Stonewall Service blocked external traffic as Edge Client was taking 5 to 10 minutes to establish the VPN connection after the system restored from hibernation. Now, Edge Client establishes the VPN connection immediately and Stonewall service allows external traffic as per configuration.|
|1184869||On the Edge Client, when the user entered the credentials on the Ping window and pressed the Enter key to log in, it resulted in a page expired error. This issue is fixed, and now the Enter key allows to log in without page expiration error.|
|1210045||Fixed the issue where Edge Client on macOS randomly disconnects from VPN.|
|1212109-2||Fixed the issue where the Linux CLI client would not get connected to VPN if server certificate validation is needed.|
The following are known issues in this release.
How to Contact F5 Support or the Anti-Fraud SOC
- By phone in the U.S. (accessible 24x7): 888-88askf5 (888-882-7535).
- International contact numbers: http://www.f5.com/training-support/customer-support/contact/.
- The Support Coordinator can contact the SOC as needed.
You can contact the Anti-Fraud SOC as follows:
- By phone in the U.S. (accessible 24x7): 866-329-4253 (Option #3 for Anti-Fraud)
- International contact numbers: https://f5.com/products/platforms/silverline/f5-silverline-ddos-protection
You can find additional support resources and technical documentation through a variety of sources.
Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology.
|AskF5 Knowledge Base||
The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source.
|BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer||
BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration.
Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more.
|Communications Preference Center||
Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products.