Applies To:
Show Versions
BIG-IP APM
- 16.1.0
BIG-IP Link Controller
- 16.1.0
BIG-IP Analytics
- 16.1.0
BIG-IP LTM
- 16.1.0
BIG-IP PEM
- 16.1.0
BIG-IP AFM
- 16.1.0
BIG-IP DNS
- 16.1.0
BIG-IP FPS
- 16.1.0
BIG-IP ASM
- 16.1.0
Updated Date: 12/04/2022
Summary:
These release notes document the BIG-IP version 16.1.0 releases. You can apply the software upgrade to systems running software version 14.0.0 or later (except as detailed in the upgrading sections).
BIG-IP Virtual Edition (VE) is a version of the BIG-IP system that runs as a virtual machine. Supported modules include Local Traffic Manager, BIG-IP DNS, Application Security Manager, Access Policy Manager, Policy Enforcement Manager, Application Firewall Manager, and Analytics. BIG-IP VE includes all features of device-based BIG-IP modules running on standard BIG-IP TMOS, except as noted in release notes and product documentation.
Contents:
- Platform support
- Module combination and memory considerations
- User documentation for this release
- Configuration utility browser support
- Compatibility of BIG-IQ products with BIG-IP releases
- Release fixes, behavior changes, and known issues
- New in 16.1.0 :: General
- New in 16.1.0 :: LTM/TMOS
- New in 16.1.0 :: DNS
- New in 16.1.0 :: VE
- New in 16.1.0 :: Cloud
- New in 16.1.0 :: ASM
- New in 16.1.0 :: AFM
- New in 16.1.0 :: APM
- New in 16.1.0 :: AVR
- New in 16.1.0 :: FPS
- New in 16.1.0 :: PEM
- New in 16.1.0 :: Hardware
- Installation overview
- Installation checklist
- Installing the software
- Post-installation tasks
- Installation tips and important notes
- Upgrading earlier configurations
- Issues when upgrading from earlier ASM versions
- About changing the resource provisioning level of the Application Security Manager
- To prevent traffic from bypassing the Application Security Manager
- About working with device groups
- AVR :: Merged metrics to HTTP statistics tables
- AVR :: New and updated dimensions
- AVR :: New and updated metrics
- AVR :: Updated HTTP statistic tables
- Contacting F5
- Legal notices
Platform support
- K9412: The BIG-IP release matrix: A software-hardware support matrix organized by BIG-IP release version.
- K9476: The F5 hardware/software compatibility matrix: A platform-sorted matrix of BIG-IP hardware/software support.
- K4309: F5 platform lifecycle support policy: A definition of platform lifecycle stages from initial release through retirement.
- BIG-IP VE Supported Hypervisors: A list of VE hypervisors and their supported software versions.
Module combination and memory considerations
BIG-IP platform considerations
These platforms support various licensable combinations of product modules.
Most of the support guidelines relate to memory. The following list applies for all memory levels:
- vCMP supported platforms
- VIPRION B2150, B2250
- VIPRION B4300 blade in the C4480 (J102) and C4800 (S100)
- VIPRION B4450 blade in the C4480 (J102) and C4800 (S100)
- BIG-IP 5200v, 5250v, 7200v, 7250v, 10200v, 10250v, 10350v, 12250v
- BIG-IP i5800, i7800, i10800, i11800, i15800
- PEM and CGNAT supported platforms
- VIPRION B2150, B2250, B4300, B4340N, B4450N
- BIG-IP 5x00v(s), 7x00v(s), 10x00v(s)
- PEM for BIG-IP iSeries: i5800, i7800, i10800, i11800, i15800
- CGNAT for BIG-IP iSeries: i2x00, i4x00, i5x00, i7x00, i10x00, i11x00, i15x00
- BIG-IP Virtual Edition (VE) (Not including Amazon Web Service Virtual Edition) (3 GB, 10 GB production and combination lab models)
- PEM is not supported on vCMP guests.
- PEM is not supported on 8 GB platforms.
- BIG-IP i850 platform support
- The BIG-IP i850 platform supports Local Traffic Manager (LTM) only, and no other modules.
Memory: 12 GB or more
All licensable module-combinations may be run on platforms with 12 GB or more of memory, and on VE and vCMP guests provisioned with 12 GB or more of memory. Note that this does not mean that all modules may be simultaneously provisioned on all platforms with 12 GB or more of memory. The BIG-IP license for the platform determines which combination of modules are available for provisioning.
Memory: 8 GB
The following guidelines apply to the BIG-IP 2000s and 2200s platforms and to VE guests configured with 8 GB of memory. (A vCMP guest provisioned with 8 GB of memory has less than 8 GB of memory actually available and thus does not fit in this category.)
- No more than three modules should be provisioned together.
- On the 2000s and 2200s, Application Acceleration Manager (AAM) and Application Visibility and Reporting (AVR) can be provisioned with only one other module.
- To use Access Policy Manager (APM) and Secure Web Gateway (SWG) modules together on platforms with exactly 8 GB of memory, Local Traffic Manager (LTM) provisioning must be set to None.
Memory: Less than 8 GB and more than 4 GB
The following guidelines apply to platforms, and to VE and vCMP guests provisioned with less than 8 GB and more than 4 GB of memory. (A vCMP guest provisioned with 8 GB of memory has less than 8 GB of memory actually available and thus fits in this category.) Beginning in v14.x, 8 GB of memory is the very bare minimum to get three modules provisioned, suitable for a lab environment or very light production traffic, especially with a memory-intensive module such as AVR.
- No more than three modules (not including AAM or AVR) should be provisioned together.
- Application Acceleration Manager (AAM) cannot be provisioned with any other module; AAM can only be provisioned standalone.
- Analytics (AVR) counts towards the two module-combination limit (for platforms with less than 6.25 GB of memory).
Memory: 4 GB or less (VE and vCMP only)
The following guidelines apply to VE and vCMP guests provisioned with 4 GB or less of memory.
- No more than two modules may be configured together.
- AAM should not be provisioned, except as Dedicated.
- ASM should not be provisioned, except as Dedicated
VIPRION and vCMP caching and deduplication requirements
Application Acceleration Manager (AAM) supports the following functionality when configuring vCMP and VIPRION platforms.
- AAM does not support disk-based caching functionality on vCMP platforms. AAM requires memory-based caching when configuring it to run on vCMP platforms.
- AAM supports disk-based caching functionality on VIPRION chassis or blades.
- AAM does not support deduplication functionality on vCMP platforms, or VIPRION chassis or blades.
vCMP memory provisioning calculations
The amount of memory provisioned to a vCMP guest is calculated using the following formula: (platform_memory- 3 GB) x (cpus_assigned_to_guest / total_cpus).
As an example, for the B2100 with two guests, provisioned memory calculates as: (16-3) x (2/4) ~= 6.5 GB.
- BIG-IP LTM standalone only
- BIG-IP GTM standalone only
- BIG-IP LTM and GTM combination only
User documentation for this release
For a list of Virtual Edition (VE) hypervisor support, see the Virtual Edition and Supported Hypervisors Matrix.
Configuration utility browser support
The BIG-IP Configuration Utility supports these browsers and versions:
- Microsoft Internet Explorer 11.x, or later (Edge recommended)
- Mozilla Firefox 87.0, or later
- Google Chrome 90.0.4430, or later
- Microsoft Edge 89.0.774.68, or later
Compatibility of BIG-IQ products with BIG-IP releases
K34133507: BIG-IQ Centralized Management compatibility matrix provides a summary of version compatibility between the BIG-IQ Centralized Management and BIG-IP releases.
Release fixes, behavior changes, and known issues
New in 16.1.0 :: General
Software Support Lifecycle change to 4 years on Long-Term Supported versions (x.1 releases)
F5 is changing the standard support phase of the BIG-IP software lifecycle for Long-Term Stability (LTS) releases from five (5) years to four (4) years effective with the release of BIG-IP v16.1.0. This means that EoSD and EoTS dates will now be reached 4 years after individual versions are released, with this change remaining in effect for all subsequent BIG-IP LTS releases. As F5 shifts to deliver more software-based solutions this change is intended to maintain alignment with the industry, while also helping facilitate migration of customers BIG-IP's to newer versions.
You can find more information about the updated software lifecycle here:
New in 16.1.0 :: LTM/TMOS
Message Router Rate Limiting
The Message Router (MR) rate limiting helps service providers to mitigate the congestion. The rate limiting is an enhancement to the Message Routing Framework (MRF) allowing actions to be taken on a message-by-message basis to mitigate congestion.
Actions are taken on the Ingress and Egress based on the protocol agnostic profile attached to virtual and transport configurations. The rate limiting profile will set the Ingress and Egress thresholds of messages per second and/or bytes per second that can pass through the attached virtual or transport configuration on a connection-by-connection basis.
The message routing filter accompanying the profile will monitor connections for when 50%, 75%, 90%, or 100% of the threshold is reached and performs one of four user configurable actions. The actions are none, drop, return, and delay that can be performed on 25%, 50%, or 100% of messages.
Transaction Data Record (TDR)
The Transaction Data Record (TDR) is used to record the Diameter, SIP, or HTTP protocol message field values configured or provisioned by the customer. This feature uses the BIG-IP High Speed Logging (HSL) framework to log the TDR.
This release also includes Diameter Dictionary enhancement for Diameter protocol. This enhancement allows customers to provision the diameter avp-names in BIG-IP diameter specific configurations, for example, Diameter Session profile and TDR-Diameter.
IPOther TTL options
This release includes a new feature to support TTL options on IPOther profile. This feature provides more flexible deployment options. This is available on both the modes IPv4 and IPv6.
Proxy: Sets the outgoing IP Header TTL value to 255 for IPv4 and 64 for IPv6.
Preserve: Sets the outgoing IP Header TTL value to be the same as the incoming IP Header TTL value.
Decrement: Sets the outgoing IP Header TTL value to be one less than the incoming TTL value.
Set: Sets the outgoing IP Header TTL value to a specific value, as specified by ip-ttl-v[4|6].
Self IP address for L2 virtual wire VLAN groups
Currently self IP address can be associated with VLANs, VLAN groups, or tunnels, but not supported for virtual wire VLANs or VLAN groups.
This feature will allow configuration of self IP for virtual wire VLAN groups. This is allowed for untagged or VLAN specific tag interfaces.
This feature will allow customers to communicate with BIG-IP over virtual wire interfaces and support both IPv4 and IPv6 addresses.
DAG using TEID hashing for GTP tunnels in Hardware
A new DAG is added to take GTP-U tunnel IDs (TEID) into account for calculating the hash value and distributing the packets on different TMMs. Due to this, various packets from the same UDP flow will be mapped onto different TMMs and will have TEID to TMM affinity.
Dynamic end points for IPsec tunnel
The dynamic end points for IP Security (IPsec) tunnel feature enables BIG-IP to establish an IPsec tunnel with trusted unknown dynamic IP addresses or devices, without configuring remote IP addresses statically in BIG-IP configuration. The BIG-IP can establish IPsec IKEv2 tunnels with unknown or dynamic endpoints with or without NAT environment.
New in 16.1.0 :: DNS
DNS over HTTPS
The DNS over HTTPS (DoH) feature enables BIG-IP to receive and respond to DNS queries over HTTP using HTTPS URIs. The BIG-IP supports both Server and Proxy modes.
Host TTL for DNS resolver
Currently, unbound uses default host-ttl (900) and it cannot be customized. A new attribute, nameserver-ttl is added to net.dns-resolver and ltm.dns.cache.resolver and can be configured through TMSH. The default value for nameserver-ttl is 900 seconds.
SNI support when using HTTPs monitor in GTM
With this release, the GTM HTTPS monitors allow specification of the SNI value to use when monitoring a resource.
Support to stop monitoring disabled GSLB Pool members
The GSLB will not monitor disabled pool members when the pool member configuration includes a monitor and the Monitor Disabled Objects option is set to No.
New in 16.1.0 :: ASM
Policy Layout User Experience Improvements
- CSRF
- Data Guard
- Sessions and Login
- Geolocation
- Virtual Server
- Basic HTTP Message Settings
- File Types
- IP Intelligence
- Database Security Integration
- Anti-Virus Protection
GraphQL Support
Advanced WAF license is required. GraphQL is a new API technology which is gaining traction in the market and, like any other API, there are attack vectors to exploit it. The new header-based content profile and policy template intercept and protect GraphQL queries, mutations and subscriptions without having to specify a GraphQL schema. Advanced WAF provides support for GraphQL traffic by supporting the ingestion of GraphQL queries over HTTP traffic, parsing the query values and applying attack signatures accordingly. Advanced WAF is able to parse a request and understand what is the actual GraphQL query data. Without correct parsing, the full request would be examined, leading to false positives.
You can configure a GraphQL Profile and new Content Profile violations were added:
- GraphQL data does not comply for format settings
- GraphQL introspection query
- Malformed GraphQL data
You can select a dedicated GraphQL security policy template and configure a GraphQL endpoint using GUI, REST, and declarative interfaces. The security policy can be exported and imported in declarative format.
As with other violations, traffic learning is supported on GraphQL violations.
You can configure the GraphQL blocking response page to display when a GraphQL violation is raised.
Minimal Security Template
- VIOL_ASM_COOKIE_MODIFIED
- VIOL_ATTACK_SIGNATURE
- VIOL_THREAT_CAMPAIGN
- VIOL_BLACKLISTED_IP
- VIOL_COOKIE_MALFORMED
- VIOL_ENCODING
- VIOL_EVASION
- VIOL_FILETYPE
- VIOL_GEOLOCATION
- VIOL_GRAPHQL_MALFORMED
- VIOL_HTTP_PROTOCOL
- VIOL_JSON_MALFORMED
- VIOL_WEBSOCKET_BAD_REQUEST
- VIOL_WEBSOCKET_FRAMING_PROTOCOL
- VIOL_WEBSOCKET_TEXT_NULL_VALUE
- VIOL_XML_MALFORMED
Declarative API
- Support External Reference Basic Authentication
- Use external references for Base Template
- Export Policy to Declarative JSON Format
The size of a declarative policy is set by the system variable max_json_policy_size. The default allowed size of a declarative policy is 1000 KB (1 MB) including all the externally referenced files in it. The maximum allowed value is 100 MB. The policy size is checked during an upload of a JSON policy file. If, at any stage, the size of the policy uploaded is greater than the value for system variable max_json_policy_size we will throw an error and the error is also visible in the log /var/log/ts/asm_config_server.pl. If the JSON policy file or other references within have any JSON errors, it displays the error Failed to parse JSON + the exact error.
Support External Reference Basic Authentication
- User name and Password in the URI
- Passing token in the query string
- Specifying credentials as separate fields in the declarative policy
- Keep the root password safe and change it periodically.
- Keep the permissions of those credentials to the source control to read-only so that if they are stolen at least the files are not modified or deleted.
Example: Username and password in the URI
You can specify username and password as part of URI. If the password contains special characters which are not supported in URI, we need to pass them as url encoded values as:
'@' => %40
'%' => %25
If the password is pass@123 then user has to pass it as pass%40123.
Example: Passing token in the query string
In this method you can specify the token obtained to access a repository as query parameter as token=tokenobtained. In this sample JSON policy we specified a token to access a file on repo.
Example: Specifying credentials as separate fields in the declarative policy
In this method, you have to specify credentials as separate fields and supply a password as a base64 encoded value instead of a plain password. In this example, you specify the username and password as separate fields in the declarative policy.
You can specify external references using $ref. This is applicable for all three ways of authentication.
Use External References for Base Template
- link which contains the URL to the file. There will be two scheme options for these URLs:
- file for location on the file system mounted on the device.
- http/https for location on remote system over HTTP(S).
- name which states the name of a factory template that exist on the machine
A policy template to be referenced and shared between multiple policies. For example, the template can reside on a remote server as can be seen in the following example. The template itself can be a user-defined JSON policy or any other XML/Binary templates.
The template link in the policy above can be changed to the following templates (XML/Binary):
The import will fail if the referenced template is referencing another template, as in the following example:
Export Policy to Declarative JSON Format
In the UI, when exporting the security policy as a declarative (JSON) policy file, you can further choose to export as a Template-Base policy or a Full policy. If you choose Template-Based, you can select the new base template from the drop-down menu. The template-based exported JSON file contains only the delta between the original and selected new base template. A full export file contains the full configuration of the policy. If a policy has Learning Suggestions which have not been accepted, you can choose to export them with the policy.
Note: If you select Include Learning Suggestions for either export option, the learning suggestions will be considered as Accepted when the policy is imported, even if they are not accepted in the original policy before Export.
The tmsh options when exporting a declarative policy:
- Full Export to JSON - F5 Template - (without different base template): tmsh save asm policy policy_name min-json-file policy_file_name
- Compact Export to JSON - F5 Template: tmsh save asm policy policy_name min-json-file policy_file_name
- Compact Export to JSON - user selected template: tmsh save asm policy policy_name min-json-file policy_file_name policy-template POLICY_TEMPLATE_FUNDAMENTAL
- Export to JSON - include suggestions: tmsh save asm policy policy_name json-file policy_file_name include-suggestions or tmsh save asm policy policy_name min-json-file policy_file_name include-suggestions
The REST options when exporting a declarative policy:
Compact Export to JSON - F5 Template
- Minimum without template: restcurl -u admin:admin /mgmt/tm/asm/tasks/export-policy -X POST -d '{"format": "json", "filename":"asm_policy.json", "policyReference": {"link": "https://localhost/mgmt/tm/asm/policies/t2TxxpOjj4AjQWOcEVyBaA"}, "minimal": true}'
- Minimum with selected template: restcurl -u admin:admin /mgmt/tm/asm/tasks/export-policy -X POST -d '{"format": "json", "filename":"asm_policy.json", "policyReference": {"link": "https://localhost/mgmt/tm/asm/policies/t2TxxpOjj4AjQWOcEVyBaA"}, "minimal": true, "policyTemplateReference": {"link": "https://localhost/mgmt/tm/asm/policy-templates/_pS_k4kzqmIqI3Zua6y4-w"}}'
Compact Export to JSON - export suggestions
restcurl -u admin:admin /mgmt/tm/asm/tasks/export-policy -X POST -d '{"format": "json", "filename":"asm_policy.json", "policyReference": {"link": "https://localhost/mgmt/tm/asm/policies/t2TxxpOjj4AjQWOcEVyBaA"}, "minimal": true, "exportSuggestions": true}'
API Protection: Multi- Type Serialization Support
To support Open API 3.0, the following API support has been added.
Array
- style defines how multiple values are delimited.
- explode (true/false) specifies whether arrays and objects should generate separate parameters for each array item or object property.
Path parameters
style | explode | Serialized array id = [3, 4, 5] |
---|---|---|
matrix | false | /users/;id=3,4,5 |
matrix | true | /users/;id=3;id=4;id=5 |
Parameter Serialization
- style defines how multiple values are delimited.
- explode (true/false) specifies whether arrays and objects should generate separate parameters for each array item or object property.
Path parameters
style | explode | Serialized object id = {"role": "admin", "firstName": "Alex"} |
---|---|---|
label | false | /users/.role,admin,firstName,Alex |
label | true | /users/.role=admin.firstName=Alex |
matrix | false | /users/;id=role,admin,firstName,Alex |
matrix | true | /users/;role=admin;firstName=Alex |
Note: style=simple, explode=false is the default method, meaning that it will be assumed if no serialization is specified.
F5 Leaked Credential Check
F5 Leaked Credential Check is an add-on threat intelligence subscription for F5 Advanced WAF. It prevents credential-based attacks and abuse by delivering an automated detection and mitigation of leaked/breached/fraudulent credentials. Customers can also take several actions if a suspicious login is used, including alerts, blocking, redirection, and responding.
HTTP Multipart Batched Request Parsing Support
BIG-IP ASM/Advanced WAF can parse HTTP multipart batched requests to apply the signatures to the right part of batched requests.
Mitigating Server-Side Request Forgery
In Server-Side Request Forgery (SSRF) attack, the attacker takes advantage of parameters that contain dynamic IP addresses or domain names which the server application invokes. Rather than letting the server access the legitimate destination, the attacker crafts a request that populates the parameter with an address of a server or file in the server that it is not allowed to access.
To mitigate SSRF attack, the parameter which carries the IP addresses or host names must be configured as a parameter of datatype URI.
The F5 Application Security Manager (ASM) allows the user to configure the disallowed domain names and IP addresses such that if any of such URI parameter contains configured entries, then the ASM will block the traffic and raise a violation.
New in 16.1.0 :: AFM
Automap support in FWNAT
This release includes new functionality enhancements with Firewall Network Address Translation (FWNAT). Users can select Automap as one of the options for source translation, which will pick the available self IP as the translated source IP.
Download and process IPv6 address database from Brightcloud
The IPREP daemon periodically pulls data from WebRoot or BrightCloud (a third-party IP reputation service) using the libIsisSdk.so SDK and posts this data as a binary file in /var/IpRep directory.
The daemon ensures that the file is updated atomically by creating a temporary file and renaming the temporary file to override the main file. The IPREP daemon then notifies the clients (TMM) about the status of the binary file through MCP. The TMM reads the binary file using libIpRep.so IPREP library.
Currently, the BIG-IP daemon (IPREPD) responsible for this download can connect to Brightcloud only over the IPV4 management network. From this release, the BIG-IP daemon supports IPv6 addresses in the Brightcloud database to perform IP reputation.
New in 16.1.0 :: APM
The 16.1 release of Access Policy Manager (APM) enhances the application and network access security and includes several bug fixes to improve performance.
Access Guided Configuration Updates
Access Guided Configuration for BIG-IP Access Policy Manager provides simple, workflow-driven configuration templates for common use case scenarios. Using the templates, you can configure policies to implement complex scenarios such as Zero Trust-Identity Aware Proxy, API Protection, Microsoft Integration, and Federation Single Sign On more easily.
API protection and automation
Access Guided Configuration 8.0 includes enhancements for BIG-IP release 16.1. It introduces Guided Configuration API v1.0, giving you the ability to use REST APIs to deploy and manage template-driven configurations on the BIG-IP system easily. You can create, update, or delete configurations and their associated objects for API Protection and Azure AD Application templates.
In the API Protection Proxy template, you have the flexibility to update your configuration by reimporting the OpenAPI Swagger file (2.0 or 3.0 file) multiple times as required.
Azure AD Application enhancements
The Azure AD Application now creates a per-request policy on configuration deployment, enabling authentication and access checks on an ongoing basis. The template now has support for Oracle EBS and JD Edwards applications. You can also select Azure Conditional Access policies applied to Cloud apps to apply them to your application.
Microsoft Identity Platform v2.0 and Azure B2C endpoints support
Access Guided Configurations now support Microsoft Identity Platform 2.0 and Azure B2C endpoints.
Refer to the Release Notes for Guided Configuration 8.0 for additional enhancements details.
AES-GCM encryption protocol support
BIG-IP APM as SAML Service Provider can now successfully decrypt an assertion that is encrypted using the AES GCM protocol family: AES 128 GCM, AES 192 GCM, and AES 256 GCM.
Azure B2C Endpoints Support
Microsoft has depreciated the login.microsoftonline.com redirect URL in Azure AD B2C. As new tenants will not accept requests from login.microsoftonline, the Azure B2C template in
now supports the new b2clogin.com redirect URL.Duo MFA support using iRule
Duo has recently added support for Universal Prompt that uses Open ID Connect (OIDC) protocol to provide two-factor authentication. For integration with APM, Duo requires a custom payload to be sent in the JWT. The APM iRules create this payload to address this challenge and saves them in session variables for authorization and token request. This integration procedure is supported on BIG-IP versions 13.1, 14.1x, 15.1x, and 16.x. Refer to the APM Configuration to Support Duo MFA using iRule guide for details on the configuration steps required on APM to enable Duo MFA.
Dynamic OAuth client agent based on session variable
BIG-IP APM enhances scalability and ease of OAuth deployments by supporting the creation of dynamic agents based on session variables. The OAuth client now enables you to use session variables to select the OAuth server dynamically to which the client directs requests. Using the dynamic server feature, you can provision a single authorization server to multiple clients in a user group or multiple authorization servers to various clients using the same session variable.
Dynamic split tunneling using address space
BIG-IP APM now provides the ability to create dynamic address space that contains IPv4, IPv6, and DNS names for Zoom and Office 365 applications by using their auto-discovery URL. You can also create custom address space objects by manually adding a static list of addresses for SaaS applications such as WebEx. This feature allows associating the address space to exclude traffic in the network access tunnels automatically. The traffic passes directly to the public internet instead of being routed over the tunnel.
EcmaScript 6/7 supported in Portal Access
BIG-IP APM Portal Access now supports ES6/ES7.
Extracting group membership from Kerberos tickets
BIG-IP APM Visual Policy Editor (VPE) now has the capability in Kerberos Auth agent to pull user group membership SIDs from Kerberos authentication tickets. VPE also has a new AD Group SID Resolver agent that allows building Active Directory group cache and resolving group SIDs to group names. This feature would negate the need to query multiple active directory domains for an exhaustive user group membership list.
Microsoft identity platform v2.0 support
BIG-IP APM now supports Microsoft Identity Platform 2.0 endpoints. You can use the Microsoft Identity Platform 2.0 custom template in
to configure and discover Azure 2.0 endpoints as an Identity Provider.If you are configuring an Azure provider configuration, F5 recommends using Microsoft Identity Platform 2.0 to configure your provider configuration. Refer to the Microsoft documentation to know the main differences between the endpoints and the existing limitations for the Microsoft identity platform.
Okta MFA using Factors API for Standard customization
BIG-IP APM now integrates with the Okta Factors API to enroll and verify factors for multifactor authentication (MFA) for both modern and standard customization. With this support, you can add the Okta MFA agent to an existing policy with standard customization. You can manage authorization and access to applications and resources using Okta Verify (TOTP/Push) and YubiKey OTP factors. End-users have the option to enroll additional supported factors after successful authentication. For details on configuration and factor enrollment, refer to BIG-IP APM: Implementing Zero Trust with Per-Request Policies.
Swagger 3.0 Support
API Protection now supports importing OpenAPI 3.0 specifications. You have the flexibility to create your API Protection profile by uploading an OpenAPI specification 2.0 or an OpenAPI specification 3.0 file.
VMWare Horizon View 7.13 and 8.0 Support
BIG-IP APM is tested and is compatible with VMWare Horizon View 7.13 and 8.0. Other BIG-IP versions tested for VMware support are 11.6.5, 12.1.6, 13.1.3, 14.1.4, 15.1.2, and 16.0.1.
Important: We only test the latest maintenance releases of BIG-IP and update their corresponding compatibility matrices. To find the latest maintenance release of BIG-IP, refer to the https://support.f5.com/csp/article/K5903 article. You should then refer to the compatibility matrix of that version for an updated list of supported software.
New in 16.1.0 :: PEM
Video Traffic Management - ECN detection
When congestion is experienced in the network, the ECN bits are set to value three (0b11) in the IP header. With this feature enabled and if flow has ECN bits set to three, then BIG-IP applies the actions associated with the PEM policy.
Installation overview
This document covers very basic steps for installing the software. You can find complete, step-by-step installation and upgrade instructions in BIG-IP Systems: Upgrading Software, and we strongly recommend that you reference this information to ensure successful completion of the installation process.
Installation checklist
Before you begin:
- Use BIG-IP iHealth to verify your configuration file. For more information, see K12878: Generating diagnostic data using the qkview utility.
- Update/reactivate your system or vCMP host license, if needed, to ensure that you have a valid service check date. For more information, see K7727: License activation may be required before a software upgrade for the BIG-IP or Enterprise Manager system.
- Ensure that your system is running version 13.x or later.
- Download the .iso file from F5 Downloads to /shared/images on the source for the operation. (If you need to create this directory, use the exact name /shared/images.)
- Configure a management port.
- Set the console and system baud rate to 19200, if it is not already.
- Log on as an administrator using the management port of the system you want to upgrade.
- Check all DNSSEC Key generation's 'expiration' and 'rollover' date:time fields before performing a GTM sync group upgrade. If any of the DNSSEC Key generations are set to rollover or expire during the planned upgrade window, modify the date:time of the 'expiration' and/or 'rollover' fields to extend past the anticipated upgrade window, to a date:time when all units in the sync group will again have GTM config sync enabled.
- Boot into an installation location other than the target for the installation.
- Save the user configuration set (UCS) in the /var/local/ucs directory on the source installation location, and copy the UCS file to a safe place on another device.
- Log on to the standby unit, and only upgrade the active unit after the standby upgrade is satisfactory.
- Turn off mirroring.
- If you are running Policy Enforcement Manager, set provisioning to Nominal.
- If you are running Advanced Firewall Manager, set provisioning to Nominal.
Installing the software
Installation method | Command |
---|---|
Install to existing volume, migrate source configuration to destination | tmsh install sys software image [image name] volume [volume name] |
Install from the browser-based Configuration utility | Use the Software Management screens in a web browser. |
Sample installation command
The following command installs version 13.0.0 to volume 3 of the main hard drive.
tmsh install sys software image BIGIP-13.0.0.0.0.1645.iso volume HD1.3
Post-installation tasks
This document covers very basic steps for installing the software. You can find complete, step-by-step installation and upgrade instructions in BIG-IP Systems: Upgrading Software, and we strongly recommend that you reference this information to ensure successful completion of the installation process.
- Ensure the system rebooted to the new installation location.
- Use BIG-IP iHealth to verify your configuration file. For more information, see K12878: Generating diagnostic data using the qkview utility.
- Log on to the browser-based Configuration utility.
- Run the Setup utility.
- Provision the modules.
Installation tips and important notes
- The upgrade process installs the software on the inactive installation location that you specify. This process usually takes between three minutes and seven minutes. During the upgrade process, you see messages posted on the screen. For example, you might see a prompt asking whether to upgrade the End User Diagnostics (EUD), depending on the version you have installed. To upgrade the EUD, type yes, otherwise, type no.
- You can check the status of an active installation operation by running the command watch tmsh show sys software, which runs the show sys software command every two seconds. Pressing Ctrl + C stops the watch feature.
- If installation fails, you can view the log file. The system stores the installation log file as /var/log/liveinstall.log.
Notes
The upgrade process does not update Tcl scripts (such as iRules) in the configuration. This might cause issues when iRule syntax changes between releases. After upgrading, you might need to modify iRules to reflect any changes in iRule syntax.
Upgrading earlier configurations
When you upgrade from an earlier versions of the software, you might need to know about or take care of these configuration-specific issues.
ID Number | Description |
---|---|
660833 | merged repeatedly cores due to unused istats-trigger object The merged process continuously cores. merged restarts. If any of the elements of the istats-trigger configuration are not defined, this issue occurs. For example, all the elements defined in the key of the istats-trigger definition must be defined before the trigger is created. Workaround: None. |
666884 | Message: Not enough free disk space to install! cpcfg cannot copy a configuration on a chassis platform Only on a chassis platform running 12.1.x or 13.0.x. You cannot use cpcfg on a chassis platform. "cpcfg fails with errors similar to the following: info: Getting configuration from HD1.3 info: Copying configuration to HD1.1 info: Applying configuration to HD1.1 error: status 256 returned by command: F5_INSTALL_MODE=install F5_INSTALL_SESSION_TYPE=hotfix chroot /mnt/tm_install/23102.e3MAZU /usr/local/bin/im -force /var/local/ucs/config.ucs info: >++++ result: info: Extracting manifest: /var/local/ucs/config.ucs info: /shared: Not enough free space info: 6144 bytes required info: 0 bytes available info: /var/local/ucs/config.ucs: Not enough free disk space to install! info: Operation aborted. Workaround: Save a UCS from the source volume, reboot to the destination volume, then load that UCS file. Fix: cpcfg could incorrectly calculate the amount of free space available, refusing to do the copy unless the /shared filesystem had sufficient space to do the copy. This has been resolved and this free space calculation is done correctly. |
667148 | Config load or upgrade can fail when loading GTM objects from a non-/Common partition GTM config referencing non-/Common partition objects from /Common. GTM configuration fails to load, which may keep a system from becoming active GTM configuration fails to load. Workaround: No workaround. Fix: Fixed issue preventing GTM configurations from loading when non-Common partitioned items present. |
673664 | TMM crashes when sys db Crypto.HwAcceleration is disabled. This occurs when sys db Crypto.HwAcceleration is disabled. TMM crash. Traffic disrupted while tmm restarts. TMM crashes when sys db Crypto.HwAcceleration is disabled. Workaround: "Enable crypto hardware acceleration using the following command: tmsh modify sys db crypto.hwacceleration value enable" |
673832 | Performance impact for certain platforms after upgrading to 13.1.0. "The following platforms, with Fast HTTP/OneConnect/Full Proxy configured. -- i2800 -- i4800 -- i5800 -- i7800 -- i10800 -- i11800 -- B2250 -- B4450 The performance impacts occur on the following platforms under the associated conditions: -- i2800 2%-3% Full Proxy traffic. -- i4800 2%-3% Full Proxy traffic. -- i5800 3%-8% Fast HTTP/Full Proxy traffic. -- i7800 3%-7% Fast HTTP/Full Proxy traffic. -- i10800 3%-7% Fast HTTP/Full Proxy traffic. -- i11800 2%-3% Fast HTTP traffic. -- B2250 3%-6% OneConnect/Full Proxy traffic. -- B4450 4%-10% Fast HTTP/OneConnect/Full Proxy traffic.Performance impact for certain platforms after upgrading to 13.1.0. Workaround: None. Fix: Performance impact for certain platforms has been eliminated. |
681377 | The BIG-IP system sends out SYN/ACK with MSS 0 in VLAN syncookie protection mode on some platforms Hardware syncookie is enabled on a VLAN that is under SYN flood attack and the syncookie protection is triggered. This occurs on the following platforms: BIG-IP series 5000, 7000, and 10000 platforms, and VIPRION B2100, B2150, B2250, and B43x0 blades. Most TCP clients can handle these SYN/ACK packets gracefully, but some clients (such as Ixia traffic-test appliances) may not be able to handle them properly, thus impacting traffic. A firmware issue exists on certain platforms that will result in SYN/ACK packets with an MSS filed with a value of 0, even though TMOS sets it to a different value. Workaround: Turn off hardware VLAN syncookie protection if regular TCP traffic is impacted. Fix: In 13.1.0, the per-VLAN-based syncookie protection will be disabled in the data plane BIG-IP series 5000, 7000, and 10000 platforms, and VIPRION B2100, B2150, B2250, and B43x0 blades. |
684068 | FIX with PVA offload and late binding without flow release may not execute iRules on subsequent messages. -- Configure a virtual server with a FastL4 profile and a FIX profile. -- Configure the FastL4 profile to have late binding and explicit flow migration. -- Place iRules on the virtual server that trigger on FIX_MESSAGE or FIX_HEADER. -- Restart the BIG-IP, connect to the virtual server and begin sending FIX messages." The iRules may not trigger on the second and further messages sent to the FIX virtual server on the first connection after the restart. With a virtual server configured with a FastL4 profile and a FIX profile where the FastL4 profile is configured with late binding and explicit flow migration, the first connection after a setup or restart may not correctly execute FIX iRules if the flow is not handed off to ePVA after the first FIX message. Workaround: None. |
686190 | LRO performance impact with BWC and FastL4 virtual server -- BWC is configured. -- Virtual server has a FastL4 profile assigned. -- LRO is enabled (enabled by default in 13.1.0). Very large performance impact to the BWC policy (up to 75%). For example, if the BWC policy rate limit is set to 100Mb, the actual rate limit could be 25Mb. Using Bandwidth controller (BWC) might result in a very large drop in performance of up to 75%. In this release, Large receive offload (LRO) is enabled by default. Workaround: "Disabling LRO recaptures most of the performance degradation related to using FastL4. To disable LRO (this is a system-wide setting), run the following command: tmsh modify sys db tm.largereceiveoffload value disable Important note: Although you can disable LRO to recapture much of the 13.0.0-level performance, you will likely still experience some impact: 2-5% for small files, 17-22% degradation for the '10 requests per connection' benchmark. The only guaranteed way to avoid performance degradation is to remain on version 13.0.0." |
686307 | Monitor Escaping is not changed when upgrading from 11.6.x to 12.x and later -- Upgrading and rolling forward monitor configuration data. -- LTM policy data present. Monitors may not work after upgrade. "When upgrading, monitor attributes such as receive string and send string might contain escape sequences that must be processed after the upgrade. However, due to a problem introduced by the LTM policy upgrade script, this processing is not performed, resulting in monitors not functioning correctly after the upgrade. Note: Without LTM policies in the configuration, monitors upgrade without problem." Workaround: No workaround at this time. Fix: This release addresses the underlying problem so the issue no longer occurs. |
696525 | B2250 blades experience degraded performance. This occurs when the FastL4 profile is configured to offload to hardware and the service provider DAG is configured and in use on B2250 blades. Performance will be degraded due to more connections being handled in software. B2250 blades have degraded performance by up to 17%. This is caused by connections not being offloaded to hardware as often as expected. Workaround: None. Fix: The performance issue for the B2250 blades has been fixed. |
698182 | Upgrading from 13.1.1 to newer release might cause config to not be copied over Upgrade or loading a UCS from 13.1.1 to newer release. Config cannot be loaded or fails. Upgrading from 13.1.1 to newer release might cause config to not be copied over. This is due to the UUID being available on the older release but not on the newer one. Workaround: Copy config and remove UUID-specific schema before loading the config. Fix: When upgrading to a version in which UUID is not supported, the system now automatically copies the config and removes UUID-specific schema before loading it. |
699249 | The config may not load after upgrade if syslog-ng syntax is not valid "In v13.0.0, the syslog-ng version changed from 2.1.4 to 3.8.1. Syslog-ng include options may contain syntax which is correct in 2.1.4 syslog but is not correct in 3.8.1. TMOS does not parse the 'include' option, or translate it from older versions to newer, or any other modification. It blindly copies it into the configuration file." The config will not load after upgrade if the syntax is not valid in a new syslog-ng version. The config is not loaded after upgrade Workaround: "Manually modify the 'include' option in BIG-IP_base.conf file after upgrade. The config cannot be loaded so tmsh will not work." |
699624 | Config with custom 'SIP' or 'Firepass' monitor fails to load after upgrade Custom 'SIP' or 'FirePass' monitor is configured, and the config is upgraded from a version earlier than v13.1.0 to version v13.1.0. "After upgrade, the configuration fails to load with an error such as: 01070726:3: monitor /Common/sip-monitor in partition /Common cannot reference SSL profile monitor parameter /Common/sip-monitor 1 SSL_PROFILE_NAME= in partition name-of-other-partition. Alternatively, the configuration loads after upgrade, but the config file is corrupted, and will fail to load (such as after a system restart, or upon explicit 'tmsh load sys config'), with an error such as: Syntax Error:(/config/bigip.conf at line: 63) ""user-defined"" unknown property" "A configuration that contains custom 'SIP' or 'FirePass' monitors that is upgraded from a version earlier than v13.1.0 may either fail to load, or may result in a configuration that loads the first time after the upgrade, but cannot be re-loaded from the text config files. If the BIG-IP system has partitions other than 'Common', the initial configuration load may fail with an error such as: 01070726:3: monitor /Common/sip-monitor in partition Common cannot reference SSL profile monitor parameter /Common/sip-monitor 1 SSL_PROFILE_NAME= in partition name-of-other-partition If the BIG-IP system only has a 'Common' partition, the initial configuration load will succeed, but subsequent attempts to load the configuration (e.g., 'tmsh load sys config') may fail with this error: Syntax Error:(/config/bigip.conf at line: 63) ""user-defined"" unknown property Which corresponds to a SIP or FirePass monitor in the configuration such as: ltm monitor sip /Common/test_sip_monitor { cipherlist DEFAULT:+SHA:+3DES:+kEDH compatibility enabled debug no defaults-from /Common/sip destination *:* filter 488 interval 5 mode tcp time-until-up 0 timeout 16 user-defined SSL_PROFILE_NAME /Common/test_sip_monitor_ssl_profile }" Workaround: Remove custom 'SIP' and 'FirePass' monitors from the configuration, and re-create them manually after upgrade is complete. Fix: In this release, a configuration that contains a custom 'SIP' or 'FirePass ' monitor from a version earlier than v13.1.0 now loads correctly and continues to load as expected. |
701898 | Certain virtual address route-advertisement settings break upgrades from 13.0.0 hotfix rollups - Upgrading from a version of 13.0.0 other than the base (i.e. HF1 or later). - Upgrading to 13.1.0 or later. - At least one virtual address with its route-advertisement value set to 'selective', 'any', or 'all'. Configuration will not load. If the unit being upgraded is a stand-alone unit, this will result in a traffic outage. "Upgrading from a version of 13.0.0 other than the base build may result in failure depending on the values of the virtual address route-advertisement setting. If set to 'selective', 'any', or 'all', the configuration will fail to load after the upgrade with an error similar to the following example in the /var/log/ltm file: load_config_files: ""/usr/bin/tmsh -n -g load sys config partitions all "" - failed. -- Loading schema version: 13.0.0 Syntax Error:(/config/bigip.conf at line: 1790) invalid property value ""route-advertisement"":""selective"""If you become aware of this issue prior to upgrading:
Note that if your chosen destination (i.e. HD1.3) already exists and contains the very software you want to install (e.g., 13.1.1.2), then you must first delete the destination before you can re-use it. This is because, by design, the BIG-IP system will not perform an installation if the desired software is already present in the destination boot location. Attempting such an installation would just result in the BIG-IP system immediately rebooting to activate that boot location, without performing any installation and thus defeating the point of this workaround. If you become aware of this issue after the upgrade has already failed:
Fix: Upgrades from 13.0.0 hotfix rollups involving certain virtual address route-advertisement settings no longer fail. |
702792 | Upgrade creates Server SSL profiles with invalid cipher strings "Custom HTTPS monitors configured prior to an upgrade result in these profiles being created during the upgrade. The default HTTPS cipherlist is 'DEFAULT:+SHA:+3DES:+kEDH', which is a valid OpenSSL cipher list, but is not a valid Client SSL / Server SSL cipher list." Upgrade creates configurations that are challenging to manage as a result of MCPD validation. "Upgrade of BIG-IP creates Server SSL profiles for custom HTTPS monitors that may have an invalid Ciphers attribute. This does not prevent the configuration from loading, but attempting to modify the existing SSL profile or create a new one with matching configuration fails with the following message : 01070312:3: Invalid keyword 'kedh' in ciphers list for profile /Common/name-of-server-ssl-profile" Workaround: "Reconfigure the cipher list to be valid according to both the OpenSSL cipher list and the Client SSL / Server SSL cipher list expectations.For instance, use ""DEFAULT:+SHA:+3DES:+EDH"" instead of ""DEFAULT:+SHA:+3DES:+kEDH""." Fix: Upgrade no longer creates Server SSL profiles with invalid cipher strings. |
703045 | If using TMSH commands with deprecated attributes in iApp, the upgrade will fail. TMSH commands with deprecated attributes will fail if used in iApp. This is so whether the iApp is activated during the upgrade process or simply run under iApp service at the user display. TMSH commands will not execute like create command will result in no objects (e.g., monitor, virtual server, etc.) being created. TMSH commands with deprecated attributes will fail if used in iApp. Workaround: Try to avoid deprecated attributes of the object in the iApp. Fix: "All TMSH commands should handle deprecated attributes of objects consistently across TMSH command line, CLI Script and iApp and like so:
|
704540 | Monitor configuration with invalid 'key' and 'cert' not detected upon upgrade post v13.1.x "-- A pre-v13.1.0 configuration containing monitors with invalid 'key' or 'cert' attributes (i.e., 'https', 'SIP', 'Firepass' monitors). -- In some cases the 'key' and 'cert' may be valid and match, with the 'key' in the encrypted form. -- Upgrading that configuration to v13.1.0 or later." After upgrade, the configuration does not load. "A monitor configuration with invalid SSL-attributes for 'key' or 'cert' is not detected as invalid, and upon upgrade to on-or-after v13.1.0 may result in an invalid configuration; or may result in a config that loads with the pool 'up', but the monitor 'key' and 'cert' attributes must be added manually. The invalid configuration includes: 'key' and 'cert' attributes do not match, or are not supported. This affects the following monitors, which contain SSL attributes: 'https', 'SIP', 'Firepass'. In some cases this issue may present with valid and matching 'key' and 'cert', with the 'key' in the encrypted form." Workaround: "You can use the following workarounds:
|
705730 | Config fails to load due to invalid SSL cipher after upgrade from v13.1.0 "-- Config uses 'https' monitors. -- Upgrade occurs from v13.1.0 to a later version." The configuration fails to load, an error message is issued, and the device remains offline until a manual config load is performed. "Config with apparently invalid SSL cipher entry fails to load after upgrade from v13.1.0, and requires a manual config load after upgrade: 'tmsh load sys config' This occurs because starting in v13.1.0, 'https' monitors rely upon SSL-attributes configured through a 'serverssl' profile, which does not support the 'kEDH' cipher; but the 'kEDH' cipher was a default cipher for previous releases (where 'https' relied upon 'OpenSSL')." Workaround: "You can use either of the following workarounds: -- After upgrade from v13.1.0, perform manual config load by running the following command: tmsh load sys config(This works because upon a manual config load command ('tmsh load sys config'), the system replaces the existing 'https' ciphers with defaults appropriate for a 'serverssl' profile in the new version of the software. Even though the system posts an error referencing the invalid 'kEDH' cipher, the device will become 'Active' seconds later, and new default ciphers will be established for 'https' monitors.) -- Remove 'https' monitors prior to upgrade, and add again after upgrade." Fix: Config loads without error after upgrade from v13.1.0. |
721261 | v12.x Policy rule names containing slashes are not migrated properly
|
721571 | State Mirroring between BIG-IP 12.1.3.* and 13.* or 14.* systems may cause TMM core on standby system during upgrade
1. You can disable mirroring using either the GUI or the command line. 1a. In the GUI: -- Set the Primary and Secondary Local Mirror Address configurations to 'None' under Device Management :: Devices :: [Self] device :: Mirroring Configuration. 1b. From the command-line: -- Run the following command: tmsh modify cm device <name-of-self-device> mirror-ip any6 mirror-secondary-ip any6 && tmsh save sys configImportant: This action results in connection state loss on failover. 2. Once all devices are running the same software version, re-enable state mirroring by re-adding the device mirror IP addresses removed previously. Note: F5 recommends that BIG-IP systems in HA configurations run with the same software version on all devices." |
743970 | Ensure 8 GB RAM vCMP guests have no more than three modules provisioned before upgrading
|
Issues when upgrading from earlier ASM versions
If you upgrade from an earlier version of ASM, note the following issues.
Upgrade warnings and notes
The Application Security Manager supports .ucs files from versions 10.1.0 and later of the Application Security Manager. Additionally, you may import policies exported from versions 10.1.0 and later of the Application Security Manager.
Warning: With the introduction of the Local Traffic Policies feature in BIG-IP version 11.4.0, HTTP Class iRule events and commands are no longer available. If you plan to upgrade to 11.4.0 or later, and your configuration contains an iRule that uses an HTTP class iRule event or command, please read K14381: HTTP Class iRule events and commands are no longer available in BIG-IP 11.4.0 and later.
Warning: Local Traffic Policies do not support regular expressions for matching. While the upgrade process is able to migrate simple glob expressions, manual administrator intervention is required in order to ensure that the policies are properly configured. If you plan to upgrade to 11.4.0 or later, and your configuration contains regular expressions or glob expressions, please read K14409: The HTTP Class profile is no longer available in BIG-IP 11.4.0 and later.
Important: The system creates its internal cookie in versions 10.2.4 and later (including all versions of 11.x) differently than in versions prior to 10.2.4. As a result, while upgrading your system from a version prior to 10.2.4 to version 10.2.4 or later, the system will produce the Modified ASM Cookie violation for existing browser sessions. If the security policy has the Modified ASM Cookie violation enabled and set to block traffic when this violation occurs, after upgrading to version 10.2.4 or later, the system will block traffic to the web application. However, since the TS cookie is a session cookie, the system will block traffic only until the browser session ends (the end-user restarts the browser). To prevent the security policy from blocking traffic until the end-user’s browser is restarted, before upgrading to version 10.2.4 or later, we recommend you disable the security policy from blocking the Modified ASM Cookie violation, upgrade, and wait long enough to allow all users to restart their browsers (two weeks are expected to be enough). After enabling the violation, we recommend you monitor the logs. If the Modified ASM Cookie violation appears, consider disabling the violation again for a longer period of time, or communicate to the users to restart their browsers.
Exporting Logs
- Printing the HTML page to PDF from the browser window.
- Scripting the HTML to PDF conversion using CLI found here: https://wkhtmltopdf.org/
Layer 7
In version 11.4.0, local traffic policies replace HTTP Classes. When you create an ASM security policy, the system automatically creates a default Layer 7 local traffic policy. Note the following changes that occur to your system after upgrading from a version prior to 11.4.0:
- A Layer 7 local traffic policy is created and the HTTP class is removed. If the HTTP Class name is different than the name of the security policy, upon upgrade, the system changes the name of the security policy to the name of the HTTP Class.
- Security policies are now in folders (partitioned) like pools and virtual servers. Upon upgrade, the system places security policies in the folder to which the HTTP Class belonged. The system places security policies that were inactive in the /Common folder.
- iRules that use HTTP Class do not work here. Users must manually change the HTTP Class part of the iRule to Policy after the upgrade.
ASM cookie security
As a result of changes made to the signing of ASM cookies, performing a clean upgrade may result in cookie violations and blocked traffic. To prevent these, F5 recommends that you perform the following actions before upgrading:
- Disable the modified domain cookie violation, and re-enable it only after at least 24 hours have passed.
- If you do not have a wildcard cookie, before the upgrade add an ASM allowed cookie to the security policy, with the name TS*.
- Have all clients restart their browsers.
After upgrading, users must synchronize their Cookie Protection settings in the following cases:
- Systems that share traffic but are NOT in the same device group
- Systems from different versions that share traffic, even if they are in the same device group
Cookie signature validation
After upgrading, the system performs the following:
- Turns on staging for all Allowed cookies
- Applies signature checks on existing Allowed cookies
- Adds a * wildcard Allowed cookie even if the user did not have on previously Upgrading to version 11.3.0 or later
Web scraping
There was a check box for enabling web scraping that was removed in version 11.3.0.
- When you upgrade from versions 11.0.0 through 11.2.x, if the check box is enabled, the new Bot Detection setting has the option Alarm and Block enabled. If the check box is not enabled, the value is Off.
- When you upgrade from versions prior to 11.0.0 (where there was no enable flag), the Bot Detection setting is based on the blocking check boxes for web scraping:
- If the global Block check box is enabled, the value is Alarm and Block.
- If the global Block check box is disabled, and the global Alarm check box is enabled, the value is Alarm.
- If both Alarm and Block check boxes are disabled, the value is Off.
Brute Force
In versions prior to 11.3.0, if the Dynamic Brute Force Protection Operation Mode was Blocking, and the security policy’s Enforcement Mode was Transparent, the system blocked brute force attacks. In order to keep functionality after upgrading, the system continues to block brute force attacks if you upgrade to versions 11.3.0 or later, under these circumstances. However, in versions 11.3.0 and later, the functionality changed so that if the security policy’s Enforcement Mode is Transparent, so the system does not block brute force attacks even if the Dynamic Brute Force Protection Operation Mode setting is Alarm and Block (previously Blocking).
In version 13.1 the session-based and dynamic brute force protections are discontinued and replaced with source-based brute force protection. When upgrading:
- Source-based mitigation will be set to Alarm and CAPTCHA for Username, Device IP and Source ID.
- Dynamic mitigation will be set to Alarm and CAPTCHA.
- Client Side Integrity Bypass Mitigation will be set to Alarm and CAPTCHA.
- CAPTCHA Bypass Mitigation will be set to Alarm and CAPTCHA.
- Detection and prevention duration will be derived from previous values.
- Enforcement of both the source-based and distributed brute force protections depends on the Blocking settings of the Brute Force: Maximum login attempts are exceeded violation.
- The Learning flag for Brute Force: Maximum login attempts are exceeded violation is discontinued.
- The Unlimited value for Prevention Duration is discontinued.
DoS profiles
In versions 11.3.0 and later, DoS profiles are assigned to virtual servers. Previously, they were assigned to security policies.
- Upon upgrading DoS Profiles from versions prior to 11.3.0, all active security policies have their DoS settings migrated and assigned to the virtual server associated with the HTTP Class. If a virtual server had more than one HTTP Class assigned to it, it inherits the settings of the last in the list.
- If you have a disabled DoS profile in a version prior to 11.3.0, and upgrade, after the upgrade the system automatically assigns the DoS profile to a virtual server. As a result, even though the system does not perform DoS protection, it still collects statistics, which impacts the system’s performance. To work around this issue, if you have a disabled DoS profile assigned to a virtual server, to improve system performance you should remove its association from the virtual server. (ID 405211)
- We do not support exporting and importing DoS profiles.
Logging Profiles
In versions 11.3.0 and later, logging profiles are assigned to virtual servers. Previously, they were assigned to security policies. Upon upgrading logging profiles from versions prior to 11.3.0, all active security policies have their logging profile settings migrated and assigned to the virtual server associated with the HTTP Class. If a virtual server had more than one HTTP Class assigned to it, it inherits the settings of the last in the list.
XFF configuration (ID 405312)
In versions prior to 11.3.0, DoS profiles used the Trust XFF setting that was a security policy setting. The Trust XFF setting was renamed Accept XFF, and moved from a security policy property to a property of the HTTP profile. If you upgrade a DoS profile and a security policy with the Trust XFF setting enabled, after the upgrade, the new XFF configuration setting is disabled. If you want the DoS profile to continue trusting XFF, navigate to screen, and enable the Accept XFF setting.
IP address whitelist
In version 11.2 we unified various whitelists for Policy Builder trusted IP addresses, and anomaly whitelists (DoS Attack Prevention, Brute Force Attack Prevention, and Web Scraping Detection) into a single list. When you upgrade, these separate lists are unified to a single whitelist (called the IP Address Exceptions List).
Security policy status after UCS installation
After you install a .ucs (user configuration set) file that was exported from version 10.1.0 or later, the system does not automatically apply changes that you made, but did not apply, to the security policies. The system enforces the web application according to the settings of the last set active security policy. However, the system preserves any changes to the current edited security policy, and marks the security policy as modified [M] if the changes have not been applied.
Running Application Security Manager on a vCMP system
If you are running Application Security Manager on a vCMP system: For best performance, F5 recommends configuring remote logging to store ASM logs remotely on Syslog servers rather than locally.
About changing the resource provisioning level of the Application Security Manager
After upgrading or installing a new version, before you can use the Application Security Manager, you must set the Application Security Manager resource provisioning level to Nominal. You can do this from the command line, or using the Configuration utility.
Setting the Application Security Manager resource provisioning level to Nominal from the command line
- Open the command-line interface utility.
- Type the command: tmsh modify sys provision asm level nominal
- Type the command: tmsh save sys config.
Setting the Application Security Manager resource provisioning level to Nominal using the Configuration utility
To prevent traffic from bypassing the Application Security Manager
For important information needed to prevent traffic from bypassing the Application Security Manager, please see the AskF5 Knowledge Center articles K8018: Overview of the BIG-IP HTTP class traffic flow and K12268: Successive HTTP requests that do not match HTTP class may bypass the BIG-IP ASM.
About working with device groups
When Application Security Manager (ASM) is provisioned, the datasync-global-dg device-group is automatically created (even if there are no device-groups on the unit) in any of the following scenarios:
- First provisioning of ASM on a device that has version 11.6.0, or later, installed.
- Adding a device (with version 11.6.0 or later) to a trust-domain that has another device which already has the datasync-global-dg device-group.
- Upgrading to version 11.6.0, or later, when ASM is already provisioned.
- Upgrading to version 11.6.0, or later, when the device is joined in a trust-domain that has another device which already has the datasync-global-dg device-group.
This device group is used to synchronize client-side scripts and cryptographic keys across all of the devices in the trust-domain.
Note the following:
- The synchronization is performed across the entire trust-domain, regardless of the configured device groups.
- The datasync-global-dg device group must not be removed; it is essential for consistency of client-side scripts and keys across the devices.
- This device group is created upon provisioning, even if the BIG-IP system is working as a standalone.
- All of the devices in the trust-domain are automatically added to this device group.
- This device group is manually synchronized. Therefore, when working with device groups (multiple devices in a trust-domain), customers must choose which device will hold the master scripts and keys. The rest of the devices receive these scripts and keys from the chosen device.
- This device group is also created on units that do not have ASM provisioned, but are in a trust-domain with other units which do have ASM provisioned.
AVR :: Merged metrics to HTTP statistics tables
Metrics used in select HTTP tables in versions 12.X and lower, were merged into additional HTTP tables in this version, resulting in default values immediately following the upgrade.
Metric Title | Applying Metric(s) in GUI | Tables with Added Metric | Initial Value After Upgrade | Version Before Upgrade |
---|---|---|---|---|
sessions | Average Sessions | URLs, Pool Members, Response Codes, Client IP Addresses, User Agents, HTTP Method | 0 | 12.X or lower |
max_tps | Max TPS | User Agents, HTTP Method | 0 | 12.X or lower |
client_latency_hits | Avg Page Load time, Sampled Transactions | User Agents, HTTP Method | 0 | 12.X or lower |
max_client_latency | Max Page Load Time | User Agents, HTTP Method | 0 | 12.X or lower |
client_latency | Avg Page Load time | User Agents, HTTP Method | 0 | 12.X or lower |
max_server_latency | Max Server Latency | User Agents, HTTP Method | 0 | 12.X or lower |
min_server_latency | Min Server Latency | User Agents, HTTP Method | MAX_INT | 12.X or lower |
server_latency | Avg Server Latency | User Agents, HTTP Method | 0 | 12.X or lower |
max_request_throughput | Max Request Throughput | User Agents, HTTP Method | 0 | 12.X or lower |
total_request_size | Avg Request Throughput | User Agents, HTTP Method | 0 | 12.X or lower |
max_response_throughput | Max Response Throughput | User Agents, HTTP Method | 0 | 12.X or lower |
total_response_size | Avg Transaction Response size | User Agents, HTTP Method | 0 | 12.X or lower |
AVR :: New and updated dimensions
Dimensions were added since previous versions, resulting in default values immediately following the upgrade.
The following table lists the new dimension titles and the initial values displayed in the GUI following an upgrade from a previous version. Once new data is collected, the displayed values for each dimension will appear as expected.
Dimension Title | Dimension Module | Location in GUI | Initial Value After Upgrade | Version Before Upgrade |
---|---|---|---|---|
Behavioral Signatures | HTTP | Aggregated | 12.X or lower | |
Bot Defense Reasons | HTTP | Aggregated | 12.X or lower | |
Browser Names | HTTP | Aggregated | 12.X or lower | |
OS Names | HTTP | Aggregated | 12.X or lower | |
Vectors | Common | Aggregated | 12.X or lower | |
Triggers | Common | Aggregated | 12.X or lower | |
Mitigations | Common | Aggregated | 12.X or lower | |
Activity Types | Common | Regular Activity | 12.X or lower | |
Destination Countries | Network | Aggregated | 13.X or lower | |
Destination IP Address | Network | Aggregated | 13.X or lower | |
Client Types | HTTP | Aggregated | 13.X or lower | |
Human Behavior Indications | HTTP | Aggregated | 13.X or lower | |
Application Versions | HTTP | Aggregated | 13.X or lower | |
Application Display Names | HTTP | Aggregated | 13.X or lower | |
Jail Break | HTTP | Aggregated | 13.X or lower | |
Emulation Modes | HTTP | Aggregated | 13.X or lower |
AVR :: New and updated metrics
Metrics were added since previous versions, resulting in default values immediately following the upgrade.
The following table lists the new metrics and the initial value displayed in the GUI following an upgrade from a previous version. Once new data is collected, the displayed value will appear as expected in the metric field.
Metric Title | Applying Metric(s) in GUI | Initial Value After Upgrade | Version Before Upgrade |
---|---|---|---|
min_server_latency | Min Server Latency | MAX_INT | 12.X or lower |
server_hitcount | Avg Server Latency, Avg Application Response Time, Avg Server Network Latency | 0 | 12.X or lower |
application_response_time | Avg Application Response Time | 0 | 12.X or lower |
max_application_response_time | Max Application Response Time | 0 | 12.X or lower |
min_application_response_time | Min Application Response Time | MAX_INT | 12.X or lower |
client_ttfb_hitcount | Avg Client TTFB | 0 | 12.X or lower |
max_client_ttfb | Max Client TTFB | 0 | 12.X or lower |
min_client_ttfb | Min Client TTFB | MAX_INT | 12.X or lower |
clientside_network_latency | Avg Client Network Latency | 0 | 12.X or lower |
max_clientside_network_latency | Max Client Network Latency | 0 | 12.X or lower |
min_clientside_network_latency | Min Client Network Latency | MAX_INT | 12.X or lower |
serverside_network_latency | Avg Server Network Latency | 0 | 12.X or lower |
max_serverside_network_latency | Max Server Network Latency | 0 | 12.X or lower |
min_serverside_network_latency | Min Server Network Latency | MAX_INT | 12.X or lower |
request_duration_hitcount | Avg Request Duration | 0 | 12.X or lower |
max_request_duration | Max Request Duration | 0 | 12.X or lower |
min_request_duration | Min Request Duration | MAX_INT | 12.X or lower |
response_duration_hitcount | Avg Response Duration | 0 | 12.X or lower |
max_response_duration | Max Response Duration | 0 | 12.X or lower |
min_response_duration | Min Response Duration | MAX_INT | 12.X or lower |
AVR :: Updated HTTP statistic tables
The HTTP statistics tables were updated in this version. When upgrading from version 12.X or lower, non-cumulative metrics of the affected dimensions may display slightly different values after the upgrade.
The following table lists the affected HTTP dimensions and the initial values displayed in the GUI following an upgrade from a previous version. Once new data is collected, the displayed value will appear as expected for the dimension.
Contacting F5
North America | 1-888-882-7535 or (206) 272-6500 |
Outside North America, Universal Toll-Free | +800 11 ASK 4 F5 or (800 11275 435) |
Additional phone numbers | Regional Offices |
Web | http://www.f5.com |
support@f5.com |
How to Contact F5 Support or the Anti-Fraud SOC
- By phone in the U.S. (accessible 24x7): 888-88askf5 (888-882-7535).
- International contact numbers: http://www.f5.com/training-support/customer-support/contact/.
- The Support Coordinator can contact the SOC as needed.
You can manage service requests and other web-based support online at F5 My Support (registration required). To register email CSP@F5.com with your F5 hardware serial numbers and contact information.
You can contact the Anti-Fraud SOC as follows:
- By phone in the U.S. (accessible 24x7): 866-329-4253 (Option #3 for Anti-Fraud)
- International contact numbers: https://f5.com/products/platforms/silverline/f5-silverline-ddos-protection
Additional resources
You can find additional support resources and technical documentation through a variety of sources.
F5 Support | Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology. |
AskF5 Knowledge Base | The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source. |
BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer | BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration. |
F5 DevCentral | Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more. |
Communications Preference Center | Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products. |