Applies To:Show Versions
- 17.1.0, 17.0.0, 16.1.4, 16.1.3, 16.1.2, 16.1.1, 16.1.0, 16.0.1, 16.0.0, 15.1.10, 15.1.9, 15.1.8, 15.1.7, 15.1.6, 15.1.5, 15.1.4, 15.1.3, 15.1.2, 15.1.1, 15.1.0, 15.0.1, 15.0.0, 14.1.5, 14.1.4, 14.1.3, 14.1.2, 14.1.0, 14.0.1, 14.0.0, 13.1.5, 13.1.4, 13.1.3, 13.1.1, 13.1.0, 13.0.0, 12.1.6, 12.1.5, 12.1.3
Version 1.0.6 of F5 Access for Chrome OS is now available. The download is available from the app store for your device, at https://chrome.google.com/webstore/detail/f5-access/hhogfmlhffdddckpokfodepfiimfffjf. (Note that this link is for a third-party site, and thus is subject to change at any time.)
- Features and enhancements in 1.0.6
- Release 1.0.6 requirements
- F5 Access Session Variables
- Fixes in 1.0.6
- Limitations in 1.0.6
- Known issues in 1.0.6
- Supported features in 1.0.6
- Contacting F5
- Legal notices
Features and enhancements in 1.0.6
- Support for Chrome OS 80
F5 Access for Chrome is now supported on Chrome OS 80.
Release 1.0.6 requirements
- This version is supported on Chrome OS version 46.0 and later. Version 53.0 or later is required to support reconnecting when switching Wi-Fi access points or resuming a device from sleep.
- This version is supported on BIG-IP 12.0 and later.
- In BIG-IP 12.0, the connectivity profile contains specific settings for Chrome OS.
- In BIG-IP 12.0, use the access policy item Client Type and the Edge Client branch to detect F5 Access for Chrome OS.
F5 Access Session Variables
F5 Access for Chrome OS supports the following session variables and values.
|Session variable||Description||Example value|
|session.client.app_version||Chrome App version||1.0.6|
|session.client.cpu||CPU type||ARM, ARM64, x86 or x64|
|session.client.model||Client device model||Chromebook, Chromebox, Chromebit, or Chromebase|
|session.client.platform||Operating system name||ChromeOS|
|session.client.platform_version||Operating system version||45.0.2454.4|
|session.client.type||Type of session||For this client, this value is always Standalone|
|session.client.activex||Active X check||For this client, this value is always 0|
|session.client.jailbreak||Jailbreak check||For this client, this value is always 0|
|session.client.version||Client protocol version||For this client, this value is always 2.0|
|session.client.plugin||Plugin check||For this client, this value is always 0|
|session.client.vpn_scope||VPN connection scope||For this client, the value is always device|
|session.client.vpn_scope||VPN tunnel type||For this client, the value is always L3|
|session.client.vpn_start_type||How the VPN connection starts||For this client, the value is always manual|
|session.client.unique_id||Indicates the unique ID of the device||8ccaf965e51e3077|
Fixes in 1.0.6
Fixes in F5 Access
|887905||Fixed an issue where F5 Access launched with a blank page on Chrome OS v80. Now, F5 Access pages are rendered successfully.|
Limitations in 1.0.6
Limitations in F5 Access
|555822||Due to Chrome OS limitations, when multiple users sign in on the same Chrome OS device, Chrome OS always uses the network configuration of the primary user (the user who logged in first). A VPN app added or configured as any other user will not work.|
|562673||VPN performance is limited on low-end Chromebook devices. This is documented in the Chrome OS issue: https://bugs.chromium.org/p/chromium/issues/detail?id=534872. (Note that this link is for a third-party site, and thus is subject to change at any time.)|
Google Account Sync and F5 Access
By default, Google accounts sync apps across all devices. F5 Access for Chrome OS is not supported on the Chrome browser on platforms other than Chrome OS. An error message will be displayed if the user attempts to launch F5 Access on a platform other than Chrome OS. For more information, see Sync information across Chromebooks. (Note that this link is for a third-party site, and thus is subject to change at any time.)
Known issues in 1.0.6
Known Issues in F5 Access
|557689||The certificate information button in the certificate selection screen is not working properly. This is documented in the Chrome OS defect https://code.google.com/p/chromium/issues/detail?id=312893.|
|897517||When the BIG-IP APM virtual server is deployed with a self-signed SSL certificate, and the user tries to establish a connection to the untrusted server, then in a web mode, Chrome displays a Your connection is not private warning message popup. The link on this Chrome warning popup does not redirect to the access policy.
The Chrome OS remembers preference and displays the warning message once for each new server until the user clears the browser cache.
As a workaround,
Supported features in 1.0.6
The following F5 Access features are available in F5 Access for Chrome OS 1.0.6:
|Optional Client Certificate|
|SAML (APM acting as SP with SP initiated access)|
|IPv4 lease pool|
|Use split tunneling for traffic|
|Force all traffic through the tunnel|
|Include Subnet||List of subnets to be routed through the virtual VPN adapter.|
|Exclude Subnet||List of subnets to exclude from routing through the virtual VPN adapter.|
|DNSSuffix||DNS suffix for intranet.|
|DNS||DNS server for VPN connection.|
|Client Proxy Settings||Settings apply to the proxy behind the Access Policy Manager.|
|Client Proxy Autoconfig Script||The URL for a proxy auto-configuration script, if one is used with this connection.|
|Client Proxy Address||The IP address of the client proxy server that network access clients use to connect to the Internet.|
|Client Proxy Port||Port number on the proxy server that you want the network access clients to use to connect to the Internet.|
|Client Proxy Exclusion List||Specifies the Web addresses that do not need to be accessed through your proxy server. You can use wild cards to match domain and host names or addresses. For example,www.*.com, 128.*, 240.8, 8., mygroup.*, *.* , and so forth.|
How to Contact F5 Support or the Anti-Fraud SOC
- By phone in the U.S. (accessible 24x7): 888-88askf5 (888-882-7535).
- International contact numbers: http://www.f5.com/training-support/customer-support/contact/.
- The Support Coordinator can contact the SOC as needed.
You can contact the Anti-Fraud SOC as follows:
- By phone in the U.S. (accessible 24x7): 866-329-4253 (Option #3 for Anti-Fraud)
- International contact numbers: https://f5.com/products/platforms/silverline/f5-silverline-ddos-protection
You can find additional support resources and technical documentation through a variety of sources.
Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology.
|AskF5 Knowledge Base||
The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source.
|BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer||
BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration.
Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more.
|Communications Preference Center||
Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products.