BIG-IP 21.0.0.1 Fixes and Known Issues
Version: 21.0.0.1
Build: 13.0
Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.
| The blue background highlights fixes |
Known Issues in BIG-IP v21.0.x
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 2140621-4 | CVE-2025-8677 | K000157317, BT2140621 | CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling | 21.0.0.1 |
| 551462-12 | CVE-2014-9730 | K17447 | CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability | 21.0.0.1 |
| 1988993-4 | CVE-2024-42516 | K000153074 | CVE-2024-42516 Apache HTTP Server vulnerability | 21.0.0.1 |
| 1983349-4 | CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 | K000152931 | CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities | 21.0.0.1 |
| 1505309-3 | CVE-2021-23337 | K12492858 | CVE-2021-23337 nodejs-lodash: command injection via template | 21.0.0.1 |
| 1498949-1 | CVE-2023-2283 | K000138682 | CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature | 21.0.0.1 |
| 912797-15 | CVE-2020-11868 | K44305703, BT912797 | NTP Vulnerability: CVE-2020-11868 | 21.0.0.1, 17.5.1.3, 17.1.3 |
| 714238-12 | CVE-2018-1301 | K78131906 | CVE-2018-1301: Apache Vulnerability | 21.0.0.1 |
| 1893905-3 | CVE-2023-40217 | K000139685 | Python vulnerability CVE-2023-40217 | 21.0.0.1 |
| 1086325-8 | CVE-2016-4658 | K49419538 | CVE-2016-4658 libxml2 vulnerability | 21.0.0.1 |
| 1893473-3 | CVE-2021-40438 | K01552024 | Apache vulnerability CVE-2021-40438 | 21.0.0.1 |
| 1893309-5 | CVE-2021-23337 | K12492858 | CVE-2021-23337 on HostOS: Command Injection via template function.\n' 'Link:https://sn | 21.0.0.1 |
Functional Change Fixes
None
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1925485 | 0-Unspecified | CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata | 21.0.0.1 | |
| 1925369 | 0-Unspecified | CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service | 21.0.0.1 | |
| 1925045 | 0-Unspecified | Linux Kernel Btrfs Information Leak Vulnerability (CVE-2024-35849) | 21.0.0.1 | |
| 1925029 | 0-Unspecified | CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak | 21.0.0.1 | |
| 1923997 | 0-Unspecified | CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling | 21.0.0.1 | |
| 1893369-3 | 0-Unspecified | CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c | 21.0.0.1 | |
| 658943-9 | 1-Blocking | BT658943 | Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants | 21.0.0.1, 14.1.4.1 |
| 2179729-1 | 1-Blocking | BT2179729 | MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity. | 21.0.0.1 |
| 2144513-1 | 1-Blocking | BT2144513 | Cannot install any BIG-IP version with ISO signature verification enabled★ | 21.0.0.1 |
| 2130485-4 | 1-Blocking | BT2130485 | Warning: the current license is not valid - Fault code: 51133 | 21.0.0.1 |
| 935633-4 | 2-Critical | BT935633 | VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade★ | 21.0.0.1 |
| 901989-11 | 2-Critical | BT901989 | Corruption detected in /var/log/btmp | 21.0.0.1 |
| 2197173-1 | 2-Critical | Insufficient sanitization in SNMP configuration | 21.0.0.1 | |
| 2187365 | 2-Critical | BT2187365 | In V21.0 BIG-IP VE remains INOPERATIVE after cold boot due to MCPD failure. | 21.0.0.1 |
| 2162849-2 | 2-Critical | BT2162849 | Removing the active controller does not trigger an immediate tenant failover | 21.0.0.1 |
| 2153489-1 | 2-Critical | BT2153489 | MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21) | 21.0.0.1 |
| 2125953-5 | 2-Critical | Insufficient access control to REST endpoint and TMSH for some CLI versions. | 21.0.0.1 | |
| 2187529-3 | 3-Major | CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound | 21.0.0.1 | |
| 2184897-2 | 3-Major | BT2184897 | Tenant disk size modification is ineffective for var/log folder | 21.0.0.1 |
| 2161077-2 | 3-Major | BT2161077 | Bot profile properties page does not load when there are large number of SSL certs (> 1000) | 21.0.0.1 |
| 2152601 | 3-Major | Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events | 21.0.0.1 | |
| 2150525-1 | 3-Major | Improvements in iControl SOAP | 21.0.0.1 | |
| 2144497-2 | 3-Major | BT2144497 | Mellanox driver timeouts and packet drops on Azure instances with high NIC count | 21.0.0.1 |
| 2144445-1 | 3-Major | Insufficient sanitization in TMSH | 21.0.0.1 | |
| 2137977-3 | 3-Major | BT2137977 | Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy★ | 21.0.0.1 |
| 2078297-4 | 3-Major | Unexpected PVA traffic spike | 21.0.0.1 | |
| 2047429-4 | 3-Major | BT2047429 | PostgreSQL should dump a corefile when not exiting | 21.0.0.1 |
| 1974701-3 | 3-Major | BT1974701 | PVA stats may be double incremented when pva mode is dedicated | 21.0.0.1 |
| 1966633-3 | 3-Major | BT1966633 | Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS★ | 21.0.0.1 |
| 1450481-6 | 3-Major | TMSH hardening | 21.0.0.1 | |
| 1148185-8 | 3-Major | K05403841 | getdb insufficient sanitisation | 21.0.0.1 |
| 1137269-8 | 3-Major | BT1137269 | MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes | 21.0.0.1 |
| 857973-5 | 4-Minor | BT857973 | GUI sets FQDN Pool Member "Auto Populate" value Enabled by default | 21.0.0.1 |
| 761853-1 | 4-Minor | Send HOST header in OCSP responder request | 21.0.0.1 | |
| 423304-6 | 4-Minor | Sync issues with certain objects' parameters. | 21.0.0.1 | |
| 2186153-6 | 4-Minor | CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile | 21.0.0.1 | |
| 2141305-2 | 4-Minor | BT2141305 | SSH Proxy Profile Properties page does not render | 21.0.0.1 |
| 2099441-2 | 4-Minor | BT2099441 | Garbled character in warning message when HA peer is added | 21.0.0.1 |
| 2035641-5 | 4-Minor | APMd resource exhaustion | 21.0.0.1 | |
| 1624701-5 | 4-Minor | Security improvement in BIGIP GUI | 21.0.0.1 | |
| 1052477 | 4-Minor | CVE-2020-10751 kernel: SELinux netlink permission check bypass | 21.0.0.1 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1923817 | 0-Unspecified | CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1) | 21.0.0.1 | |
| 1923793-10 | 0-Unspecified | CVE-2019-5739: DoS with keep-alive HTTP connection | 21.0.0.1 | |
| 2162705-2 | 1-Blocking | BT2162705 | Tmm restarting on multi-NUMA AWS instances with ENA interfaces★ | 21.0.0.1 |
| 745334-15 | 2-Critical | CVE-2016-7099 NodeJS Vulnerability | 21.0.0.1 | |
| 2152785-1 | 2-Critical | TMM may crash under certain conditions. | 21.0.0.1 | |
| 2144521-1 | 2-Critical | BT2144521 | WAF plugin gets incorrect response body when SSE profile is configured on virtual server | 21.0.0.1 |
| 2017137-5 | 2-Critical | BT2017137 | Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd | 21.0.0.1, 17.5.1.2, 17.1.3 |
| 901569-8 | 3-Major | BT901569 | Loopback traffic might get dropped when VLAN filter is enabled for a virtual server. | 21.0.0.1 |
| 2149253-2 | 3-Major | BT2149253 | QUIC connection stalls with early data | 21.0.0.1 |
| 2149233-3 | 3-Major | TMM crashes when using SSL | 21.0.0.1 | |
| 2141233-2 | 3-Major | BT2141233 | Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate★ | 21.0.0.1 |
| 1987309-4 | 3-Major | BT1987309 | Bigd may get stuck in legacy mode | 21.0.0.1 |
| 1889845-3 | 3-Major | Improvements in Radius Monitor | 21.0.0.1 | |
| 1849029-5 | 3-Major | BT1849029 | Debug TMM crashes in FIPS/CC mode | 21.0.0.1, 17.1.3, 16.1.6.1 |
| 1824985-4 | 3-Major | BT1824985 | In rare cases the Nitrox hardware compression queue may stop servicing requests. | 21.0.0.1 |
| 1818137-3 | 3-Major | BT1818137 | Tmm IPv4 fragmentation handling distribution | 21.0.0.1 |
| 1788105-3 | 3-Major | BT1788105 | TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★ | 21.0.0.1, 17.1.3 |
| 1352213-1 | 3-Major | BT1352213 | Handshake fails with FFDHE key share extension | 21.0.0.1, 17.1.3 |
| 1271341-6 | 3-Major | Unable to use DTLS without TMM crashing | 21.0.0.1 | |
| 1429861-9 | 4-Minor | CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6) | 21.0.0.1 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 931149-5 | 2-Critical | BT931149 | Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings | 21.0.0.1 |
| 887681-5 | 2-Critical | BT887681 | Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c | 21.0.0.1 |
| 2153893-4 | 3-Major | BT2153893 | With DNS64 configured, resolution aborts early on the first error response without trying other name servers. | 21.0.0.1 |
| 2144353-4 | 3-Major | BT2144353 | BIND upgrade to stable version 9.18.41 | 21.0.0.1 |
| 2141245-3 | 3-Major | Undisclosed traffic to TMM can lead to resource exhaustion | 21.0.0.1 | |
| 2106789-1 | 3-Major | BIGIP LTM Monitors Hardening | 21.0.0.1 | |
| 1966405-1 | 3-Major | BT1966405 | Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1★ | 21.0.0.1 |
| 1943269-1 | 3-Major | GTM Server can be deleted while referenced by GTM Pools | 21.0.0.1 | |
| 1933357-3 | 3-Major | BT1933357 | DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior. | 21.0.0.1 |
| 1473189-1 | 3-Major | Offending IP is not logged when rate limiting is triggered | 21.0.0.1 | |
| 1379649-6 | 3-Major | BT1379649 | GTM iRule not verifying WideIP type while getting pool from TCL command | 21.0.0.1 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2152689-3 | 3-Major | BT2152689 | ASM GUI "Failed to load requests" pop-up | 21.0.0.1 |
| 2143305-5 | 3-Major | Tmm crash | 21.0.0.1 | |
| 2162589-1 | 4-Minor | BD crash with a specific configuration | 21.0.0.1 | |
| 2139901-6 | 4-Minor | BT2139901 | Server-ssl profile "do-not-remove-without-replacement" is recreated | 21.0.0.1 |
| 1505257-3 | 4-Minor | BT1505257 | False positive with "illegal base64 value" for Authorization header | 21.0.0.1 |
| 1036221-4 | 4-Minor | BT1036221 | "Illegal parameter value length" is reported with parsing product length. | 21.0.0.1 |
Application Visibility and Reporting Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2183705-1 | 3-Major | Improper access control on SMTP | 21.0.0.1 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2152269-8 | 2-Critical | BT2152269 | Low reputation URIs are found in the URL DB binary | 21.0.0.1, 21.0.0 |
| 2138077-3 | 2-Critical | BT2138077 | SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x | 21.0.0.1 |
| 1991297-3 | 2-Critical | BT1991297 | [APD][SAML-SSO]high memory due to SAML SSO leak | 21.0.0.1 |
| 2143165-3 | 3-Major | Oauth tokens are not shown in UI | 21.0.0.1 | |
| 2034753-3 | 3-Major | BT2034753 | Domain name validation does not align with the error message on GUI | 21.0.0.1 |
| 1818949-3 | 3-Major | BT1818949 | [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired. | 21.0.0.1 |
| 1772317-4 | 3-Major | BT1772317 | [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing" | 21.0.0.1 |
| 1752873-3 | 3-Major | BT1752873 | [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed★ | 21.0.0.1 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2162937 | 2-Critical | BT2162937 | TMM crash when AFM is enabled | 21.0.0.1 |
| 2162905-2 | 2-Critical | BT2162905 | AFM GUI does not display Port List members in Properties panel | 21.0.0.1 |
| 2143101-3 | 3-Major | BT2143101 | SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported | 21.0.0.1 |
| 2077525-4 | 3-Major | BT2077525 | Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash | 21.0.0.1 |
Policy Enforcement Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2086097-4 | 3-Major | PEM iRules causing traffic disruption | 21.0.0.1 | |
| 1934073-5 | 3-Major | BT1934073 | PEM policy rule incorrectly matching when using a flow condition | 21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1 |
Anomaly Detection Services Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2186897-3 | 3-Major | BT2186897 | TMM core SIGSEVG upon replacing L7 DOS policy | 21.0.0.1 |
| 1959361-2 | 3-Major | BT1959361 | When running a tenant with more than 72 VCPUs / cores, adminstall crashes | 21.0.0.1 |
Device Management Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1001429-10 | 4-Minor | HTTP header Sanitization | 21.0.0.1 |
iApp Technology Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1505813-7 | 4-Minor | CVE-2018-16487 lodash: Prototype pollution in utilities | 21.0.0.1 | |
| 1505297-5 | 4-Minor | CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function | 21.0.0.1 |
F5OS Messaging Agent Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1359817-4 | 3-Major | BT1359817 | The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly | 21.0.0.1, 21.0.0 |
| 2008409-4 | 4-Minor | BT2008409 | MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN | 21.0.0.1 |
Cumulative fix details for BIG-IP v21.0.0.1 that are included in this release
935633-4 : VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade★
Links to More Info: BT935633
Component: TMOS
Symptoms:
Sometimes, when vCMP guests or F5OS tenants are started after the host has been upgraded, the guests or tenants may enter an unhealthy state due to clusterd constantly restarting.
Conditions:
-- vCMP guest or F5OS tenant has Mirroring IP configured.
-- vCMP guest or F5OS tenant is powered on after vCMP host upgrade.
-- vCMP guest or F5OS tenant is powered on and receives a new license file from the host during startup.
Impact:
-- This issue might prevent the guest or tenant from servicing traffic if the system fails to load the config and clusterd keeps restarting.
-- During startup of the guest or tenant, the following message is logged to /var/log/ltm:
err mcpd[6519]: 0107146f:3: Self-device state mirroring address cannot reference the non-existent Self IP ([IP address]); Create it in the /Common folder first.
-- /var/log/ltm shows clusterd constantly restarting.
-- One or more slots are in INOPERATIVE state, while the host shows slots as RUN/Healthy.
Workaround:
-- To avoid the issue before it occurs:
1. Prior to shutting down vCMP guests or F5OS tenants before host upgrade, ensure guests or tenants have free space in the /var partition.
2. Ensure any license updates (e.g., reactivation) are applied before shutting down the vCMP guest or F5OS tenant.
3. Issue 'tmsh save sys config' on the vCMP guest or F5OS tenant.
4. Issue 'ls /var/db/mcp*' and confirm the presence of mcpdb.bin and mcpdb.info in the /var/db directory.
5. Proceed with vCMP guest or F5OS tenant shutdown and host upgrade as per standard F5 recommended process.
-- To mitigate after the issue has been experienced on a vCMP guest or F5OS tenant:
1. Set the vCMP guest or F5OS tenant to the Configured state and wait for it to complete transition to Configured.
2. Set vCMP guest or F5OS tenant to Deployed state.
3. Review startup logs and confirm 'Self-device state mirroring address cannot reference the non-existent Self IP' message is no longer present.
4. Review /var/log/ltm and confirm clusterd is no longer restarting.
5. If issue persists, delete and recreate the vCMP guest or F5OS tenant.
Fixed Versions:
21.0.0.1
931149-5 : Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings
Links to More Info: BT931149
Component: Global Traffic Manager (DNS)
Symptoms:
RESOLV::lookup returns an empty string.
Conditions:
The name being looked up falls into one of these categories:
-- Forward DNS lookups in these zones:
- localhost
- onion
- test
- invalid
-- Reverse DNS lookups for:
- 127.0.0.0/8
- ::1
- 10.0.0.0/8
- 172.16.0.0/12
- 192.168.0.0/16
- 0.0.0.0/8
- 169.254.0.0/16
- 192.0.2.0/24
- 198.51.100.0/24
- 203.0.113.0/24
- 255.255.255.255/32
- 100.64.0.0/10
- fd00::/8
- fe80::/10
- 2001:db8::/32
- ::/64
Impact:
RESOLV::lookup fails.
Workaround:
Use a DNS Resolver ('net dns') and RESOLVER::name_lookup / DNSMSG:: instead of RESOLV::lookup:
1. Configure a local 'net dns' resolver, replacing '192.88.99.1' with the IP address of your DNS resolver:
tmsh create net dns-resolver resolver-for-irules answer-default-zones no forward-zones add { . { nameservers add { 192.0.2.1:53 } } }
2. Use an iRule procedure similar to this to perform PTR lookups for IPv4 addresses:
proc resolv_ptr_v4 { addr_v4 } {
# Convert $addr_v4 into its constituent bytes
set ret [scan $addr_v4 {%d.%d.%d.%d} a b c d]
if { $ret != 4 } {
return
}
# Perform a PTR lookup on the IP address $addr_v4, and return the first answer
set ret [RESOLVER::name_lookup "/Common/resolver-for-irules" "$d.$c.$b.$a.in-addr.arpa" PTR]
set ret [lindex [DNSMSG::section $ret answer] 0]
if { $ret eq "" } {
# log local0.warn "DNS PTR lookup for $addr_v4 failed."
return
}
# Last element in '1.1.1.10.in-addr.arpa. 600 IN PTR otters.example.com'
return [lindex $ret end]
}
-- In an iRule, instead of:
RESOLV::lookup @192.0.2.1 $ipv4_addr
Use:
call resolv_ptr_v4 $ipv4_addr
Fixed Versions:
21.0.0.1
901989-11 : Corruption detected in /var/log/btmp
Links to More Info: BT901989
Component: TMOS
Symptoms:
The boot_marker is written to /var/log/btmp, but /var/log/btmp is a binary file.
A message similar to:
warning <process>[10901]: pam_lastlog(<process>:session): corruption detected in /var/log/btmp
... may be logged to /var/log/secure.
Conditions:
This issue is triggered following a reboot of the BIG-IP system. Subsequently, you may observe the log message appearing in relation to various administrative activities, such as logging in through the console or restarting the tomcat service.
Impact:
Since this file is unknowingly corrupt after each boot, any potential investigation needing this data may be compromised.
Workaround:
Option 1; After bootup you can truncate the file.
$ truncate --size 0 /var/log/btmp
This will remove any instances of failed logins from the file.
--or--
Option 2; this will stop boot_markers from logging to /var/log/btmp:
CAVEATS:
- If the system has FIPS enabled, do not use this workaround! Modifying this file will cause FIPS validation to fail the next time it runs, and the system will halt on next boot.
- This workaround will not persist on software upgrades.
- Familiarity with vi is required to perform this.
Backup:
cp /etc/sysconfig/sysinit/01bootlogmarker.sysinit /var/tmp/01bootlogmarker.sysinit.bak
Open in vi:
vi /etc/sysconfig/sysinit/01bootlogmarker.sysinit
Change the following line to include "btmp":
old: excludeFiles=( "lastlog" "wtmp" "tmm*tech.out" "*.json" )
new: excludeFiles=( "lastlog" "wtmp" "btmp" "tmm*tech.out" "*.json" )
Force save and quit with (required since file is RO):
:wq!
Truncate the "/var/log/btmp" file:
truncate --size 0 /var/log/btmp
Reboot
Fixed Versions:
21.0.0.1
901569-8 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.
Links to More Info: BT901569
Component: Local Traffic Manager
Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.
Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).
Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.
Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.
Fixed Versions:
21.0.0.1
887681-5 : Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c
Links to More Info: BT887681
Component: Global Traffic Manager (DNS)
Symptoms:
TMM Cored with SIGSEGV.
Conditions:
N/A.
Impact:
Traffic disrupted while tmm restarts.
Fixed Versions:
21.0.0.1
857973-5 : GUI sets FQDN Pool Member "Auto Populate" value Enabled by default
Links to More Info: BT857973
Component: TMOS
Symptoms:
In the GUI, the "autopopulate" value is Enabled by default when creating an FQDN template Pool Member, but Disabled by default when creating an FQDN template Node.
Conditions:
This is observed when using FQDN names to configure Pool Members and/or Nodes in the GUI.
Impact:
Differing default "autopopulate" values displayed in the GUI are confusing.
The "autopopulate" value for an FQDN Pool Member cannot be set to "enabled" if the "autopopulate" value of the corresponding FQDN Node is set to the default value of "disabled".
Attempting to do so via tmsh will generate an error similar to:
01070734:3: Configuration error: Cannot enable pool member to autopopulate: node (<fqdn node name>) has autopopulate set to disabled
Workaround:
Be careful to select the appropriate option for the "Auto Populate" parameter when configuring FQDN Pool Members using the GUI.
Fixed Versions:
21.0.0.1
761853-1 : Send HOST header in OCSP responder request
Component: TMOS
Symptoms:
As per the Digicert documentation, the OCSP/CRL connections require either HTTP1.1 or HTTP1.0 with host header. (Digicert).
LTM uses HTTP1.1 without the host header in OCSP responder request
Conditions:
OCSP and CRL Authentication uses HTTP1.0 for OCSP responder requests
Impact:
OCSP in the current BIG-IP relies on OpenSSL for its operations and current version of OpenSSL that is available in BIG-IP is 1.0.2za
OpenSSL 1.0.2 is only capable of generating HTTP/1.0 requests for OCSP and CRL fetches; it does not support HTTP/1.1.
This limitation prevents clients from communicating with OCSP/CRL endpoints that require HTTP/1.1, resulting in failures for revocation checks in environments where modern protocols are mandated.
Workaround:
Add either of these iRules to the Virtual Server
Modify HTTP 1.0 to HTTP1.1
when HTTP_REQUEST {
HTTP::version "1.1"
}
Add Host header
when HTTP_REQUEST {
HTTP::host "[HTTP::host]”
}
Fix:
Support for HTTP1.1 is added. The OCSP requests for auth should now use HTTP1.1 version
Fixed Versions:
21.0.0.1
745334-15 : CVE-2016-7099 NodeJS Vulnerability
Component: Local Traffic Manager
Symptoms:
tls.checkServerIdentity does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
Conditions:
The server runs Node.js 0.12.16 or earlier that has tls.checkServerIdentity function that does not handle wildcards in name fields of X.509 certificates.
Impact:
This allows man-in-the-middle attackers to spoof servers via a crafted certificate.
Fix:
Upgrade to Node.js 0.12.16 or later, where tls.checkServerIdentity function can handle wildcards in name fields of X.509 certificates.
Fixed Versions:
21.0.0.1
714238-12 : CVE-2018-1301: Apache Vulnerability
Links to More Info: K78131906
658943-9 : Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants
Links to More Info: BT658943
Component: TMOS
Symptoms:
During the platform migration from a physical BIG-IP system to a BIG-IP vCMP guest/F5OS Tenant, the load fails with one of the following messages:
01070687:3: Link Aggregation Control Protocol (LACP) is not supported on this platform. Unexpected Error: Loading configuration process failed.
01070338:3: Cannot create trunk [name of trunk], maximum limit reached Unexpected Error: Loading configuration process failed.
Conditions:
-- The source device is a physical BIG-IP device with one or more trunks with or without LACP in its configuration.
-- The destination device is a vCMP guest/F5OS Tenant.
Impact:
The platform migration fails and the configuration does not load.
Workaround:
You can use one of the following workarounds:
-- Remove all trunks from the source configuration prior to generation of the UCS.
-- Before loading the UCS archive onto the target BIG-IP, edit the archive and remove the trunk configuration from ./config/bigip_base.conf, and then repack the UCS.
-- After the UCS load fails, edit the configuration manually on the destination to remove trunk references, and then reload the configuration.
-- K50152613
Fixed Versions:
21.0.0.1, 14.1.4.1
551462-12 : CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability
Links to More Info: K17447
423304-6 : Sync issues with certain objects' parameters.
Component: TMOS
Symptoms:
Synchronized configuration objects may contain invalid parameters after you delete an object and create a different object type with the same name.
Conditions:
This issue occurs when all of the following conditions are met: --
The BIG-IP systems are configured as part of a Device Group. -- You delete a configuration object of one type and then create a different type of object that uses the same name. -- The new object's configuration is synchronized to the other systems of the Device Group.
Impact:
An invalid configuration on the box that is synced to, and no obvious warning signs.
Workaround:
Use either of the following methods: -- Synchronize the configuration after you delete the original object and before you create the new object. -- Use a different name for the new configuration object.
Fixed Versions:
21.0.0.1
2197173-1 : Insufficient sanitization in SNMP configuration
Component: TMOS
Symptoms:
SNMP configuration is not sanitizing input properly.
Conditions:
NA
Impact:
It can lead to unexpected behaviour.
Workaround:
Restrict SNMP access to localhost.
Fix:
SNMP configuration is now properly sanitizing the inputs.
Fixed Versions:
21.0.0.1
2187529-3 : CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound
Component: TMOS
Symptoms:
A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.
Conditions:
A client application using a vulnerable libpq version connects to a malicious or compromised PostgreSQL server that sends crafted responses triggering integer wraparound during memory allocation.
Impact:
It can cause out-of-bounds memory writes, leading to a client application crash or segmentation fault (denial of service).
Workaround:
Upgrade to a patched libpq/PostgreSQL client version and avoid connecting to untrusted or compromised PostgreSQL servers.
Fix:
Upgrade to a patched libpq/PostgreSQL client version and avoid connections to untrusted or compromised PostgreSQL servers.
Fixed Versions:
21.0.0.1
2187365 : In V21.0 BIG-IP VE remains INOPERATIVE after cold boot due to MCPD failure.
Links to More Info: BT2187365
Component: TMOS
Symptoms:
- BIG-IP VE system fails to reach an operational state after cold boot.
- MCPD starts but throws an error and never becomes ready.
- ecmd process drives CPU utilization above 100%.
Conditions:
- cold boot (power-off followed by power-on).
- BIG-IP VE systems running v21.0.0.
Impact:
The BIG-IP VE system fails to become active after a cold boot.
Configuration management and control-plane services are unavailable due to MCPD not becoming ready.
High CPU utilization by ecmd can impact overall system stability and resource availability.
Workaround:
Manual Recovery:
Delete the /var/db/mcpdb.bin file.
Reboot the system.
MCPD will regenerate a clean state and the system will return to operation.
Fixed Versions:
21.0.0.1
2186897-3 : TMM core SIGSEVG upon replacing L7 DOS policy
Links to More Info: BT2186897
Component: Anomaly Detection Services
Symptoms:
On rare cases of expired connection, tmm can crash.
Conditions:
BADOS L7 configured
Replacing DOS policy under traffic
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
TMM does not crash upon replacing L7 DOS policy.
Fixed Versions:
21.0.0.1
2186153-6 : CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile
Component: TMOS
Symptoms:
A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.
Conditions:
The application uses the Python tarfile module to process an attacker-supplied malicious tar archive containing negative offsets.
Impact:
It can cause an infinite loop leading to application hang or denial of service.
Workaround:
Update to a patched Python version and avoid processing untrusted tar archives, or validate archives before extraction
Fix:
Upgrade to a Python version that includes the tarfile module fix for this issue.
Fixed Versions:
21.0.0.1
2184897-2 : Tenant disk size modification is ineffective for var/log folder
Links to More Info: BT2184897
Component: TMOS
Symptoms:
Due to insufficient free disk space on the VM, the /var/log resize operation could not be applied on reboot.
Conditions:
When available disk space on the VM is insufficient for the requested directory resizing.
Impact:
You will not know if resizing will succeed/fail ahead of time.
Workaround:
Manually calculate and allocate disk space within the range of available disk space.
Fix:
Improved validation has been added for directory resize operations. If the available disk space is less than the requested size, the command now fails immediately with a clear error message, allowing users to identify resize issues at the time of requesting.
Fixed Versions:
21.0.0.1
2183705-1 : Improper access control on SMTP
Component: Application Visibility and Reporting
Symptoms:
Security best practices are not being followed for SMTP in BIGIP.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
Security best practices are being followed.
Fixed Versions:
21.0.0.1
2179729-1 : MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity.
Links to More Info: BT2179729
Component: TMOS
Symptoms:
The eXtremeDB configuration database grows continuously over time in long‑duration testing, even when objects are deleted.
Conditions:
-- Long duration run with create, modify, delete configuration objects.
-- High Availability (HA) enabled
Impact:
MCPD memory becomes very large on lab HA devices.
Workaround:
None
Fixed Versions:
21.0.0.1
2162937 : TMM crash when AFM is enabled
Links to More Info: BT2162937
Component: Advanced Firewall Manager
Symptoms:
The BIG-IP system experiences repeated TMM crashes when handling DNS DoS traffic.
Conditions:
This issue occurs on BIG-IP AFM version 21.0.0 with DNS DoS
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Handled malformed packets.
Fixed Versions:
21.0.0.1
2162905-2 : AFM GUI does not display Port List members in Properties panel
Links to More Info: BT2162905
Component: Advanced Firewall Manager
Symptoms:
AFM GUI fails to display port-list members in the Properties pane
Conditions:
Occurs when viewing any Port List object in the AFM Policy Editor GUI
Impact:
Administrators cannot visually verify port-list contents in the GUI
Workaround:
Tmsh list security firewall port-list <port_list_name>
Fixed Versions:
21.0.0.1
2162849-2 : Removing the active controller does not trigger an immediate tenant failover
Links to More Info: BT2162849
Component: TMOS
Symptoms:
On a setup where BIG-IP tenant is active for a traffic group and is running on a VELOS chassis, and HA score configured with a weightage for F5OS_INTERNAL_TRUNK , pullinf out the active controller does not trigger an immediate failover
Conditions:
1)Tenant is active for a traffic group and is running on a controller that is active for the partition on which the tenant is running
2) Active system controller is removed or powered off using AOM
Impact:
Tenant failover is delayed upto 4min when an active controller of the active tenant is pulled out .
Workaround:
None
Fixed Versions:
21.0.0.1
2162705-2 : Tmm restarting on multi-NUMA AWS instances with ENA interfaces★
Links to More Info: BT2162705
Component: Local Traffic Manager
Symptoms:
Tmm is in the restart loop because dpdk driver is failing to attach with the error message in tmm log:
notice dpdk: [0000:00:06.0]: Multiple NUMA nodes usage is unsupported.
Conditions:
- BIG-IP VE large instance deployed on AWS cloud.
- NUMA node count more than 1 (check "lscpu | grep NUMA").
Impact:
Unable to use dpdk driver on some large AWS instances.
Workaround:
Switch to sock driver: https://my.f5.com/manage/s/article/K10142141
Fix:
DPDK correctly initializes the memory on multi-NUMA AWS instances.
Fixed Versions:
21.0.0.1
2162589-1 : BD crash with a specific configuration
Component: Application Security Manager
Symptoms:
BD daemon crash and restart
Conditions:
Navigation parameter is configured
Impact:
traffic disturbance, failover.
Workaround:
Remove navigation parameter from the configuration.
Fix:
BD working properly.
Fixed Versions:
21.0.0.1
2161077-2 : Bot profile properties page does not load when there are large number of SSL certs (> 1000)
Links to More Info: BT2161077
Component: TMOS
Symptoms:
When a large number of SSL certs are present, the Bot Defense profile properties page (Security > Bot Defense > Bot Profile Properties) does not load correctly
Conditions:
- ASM is provisioned
- SSL cert count > 1000
Impact:
Bot Defense profile properties page does not load
Workaround:
Use tmsh to manage the Bot profiles.
Fix:
Increase restjavad memory to 1.3GB after applying the fix and restart restjavad
> tmsh modify sys db provision.restjavad.extramb value 1280
> bigstart restart restjavad
Fixed Versions:
21.0.0.1
2153893-4 : With DNS64 configured, resolution aborts early on the first error response without trying other name servers.
Links to More Info: BT2153893
Component: Global Traffic Manager (DNS)
Symptoms:
When multiple name servers for a zone are known, as soon as one name server responds with an error rcode, resolution is aborted and other name server are not tried.
Conditions:
-- DNS64 is configured.
-- More than one name server is configured for a zone.
-- One name server responds with an error rcode.
Impact:
DNS resolution will intermittently fail. DNS resolution will succeed only if the cache randomly selects a working name server to contact first.
Workaround:
Disable DNS64.
Fixed Versions:
21.0.0.1
2153489-1 : MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21)
Links to More Info: BT2153489
Component: TMOS
Symptoms:
-- System crashes with a segmentation fault during folder deletion operations.
-- Core dump observed in FolderMgr::validate_deleted_folder_queue.
Conditions:
Concurrent Operations
Thread 1 is performing a folder deletion and iterating over folder_delete_queue in FolderMgr::validate_deleted_folder_queue.
Thread 2 is processing a virtual server query and calls AuthZ::current_context (setter), which invokes FolderMgr::reset_deleted_folder_queue().
Impact:
Traffic and management disrupted while mcpd restarts.
Workaround:
None
Fixed Versions:
21.0.0.1
2152785-1 : TMM may crash under certain conditions.
Component: Local Traffic Manager
Symptoms:
TMM crashes when HTTP/2 traffic
Conditions:
When HTTP/2 profile is configured on TMM.
Impact:
Traffic is disrupted
Workaround:
Add http router to the virtual, converting to HTTP/2 Full Proxy mode from HTTP/2 Gateway mode.
Fix:
TMM handling HTTP/2 traffic properly
Fixed Versions:
21.0.0.1
2152689-3 : ASM GUI "Failed to load requests" pop-up
Links to More Info: BT2152689
Component: Application Security Manager
Symptoms:
A "Failed to load requests" pop-up appears on the page.
REST framework responds with:
{"code":400,"message":"A valid filename must be supplied"}
This is visible in the log of the web browser's interaction with the BIG-IP UI (.har file).
Conditions:
A user with username that contains a slash i.e. "my\name"
clicking
on Security -> Event Logs -> Application -> Requests
or Security -> Event Logs -> Bot Defense -> Bot Requests
Impact:
Can't view request details
Workaround:
Do not use '/' in the username
Fixed Versions:
21.0.0.1
2152601 : Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events
Component: TMOS
Symptoms:
Continuous restart of MCPD accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events.
Conditions:
This occurs after 10 restarts of MCPD service.
Impact:
BIGIP services are impacted as MCPD is down.
Workaround:
Reboot device.
Fix:
This issue is fixed by cleaning up the resource during every MCPD restart.
Fixed Versions:
21.0.0.1
2152269-8 : Low reputation URIs are found in the URL DB binary
Links to More Info: BT2152269
Component: Access Policy Manager
Symptoms:
Publishing BIG-IQ image to Azure cloud is blocked due to malware scan detecting these low reputed URLs.
Conditions:
When uploading the image on Azure Cloud and these low reputed URLs are detected in malware scanners.
Impact:
No impact on the functionality
Workaround:
None.
Fix:
Low reputation URIs such as che168, cssplay, newliveplayer, tinypic.info referring test code are removed from the product.
Fixed Versions:
21.0.0.1, 21.0.0
2150525-1 : Improvements in iControl SOAP
Component: TMOS
Symptoms:
Security best practices were not being followed in iControl SOAP.
Conditions:
NA
Impact:
Can lead to unexpected behaviour.
Workaround:
NA
Fix:
iControl SOAP now has security best practices.
Fixed Versions:
21.0.0.1
2149253-2 : QUIC connection stalls with early data
Links to More Info: BT2149253
Component: Local Traffic Manager
Symptoms:
When QUIC client connect with early data, connection stalled.
Conditions:
Configure virtual server with quic + client-ssl with Data 0-RTT enabled (w/ anti-replay).
QUIC client connects with existing session and early data.
Impact:
Failed QUIC/HTTP3 connections.
Workaround:
Disable client-ssl Data 0-RTT.
Fix:
Release SSL egress data.
Fixed Versions:
21.0.0.1
2149233-3 : TMM crashes when using SSL
Component: Local Traffic Manager
Symptoms:
Under certain SSL condition, TMM crashes.
Conditions:
When SSL is configured
Impact:
Traffic is disrupted.
Fix:
TMM working properly now.
Fixed Versions:
21.0.0.1
2144521-1 : WAF plugin gets incorrect response body when SSE profile is configured on virtual server
Links to More Info: BT2144521
Component: Local Traffic Manager
Symptoms:
When the SSE plugin is enabled, the WAF plugin receives a partial response body.
Conditions:
SSE Profile (Server Sent Events) and WAF plugin enabled on a Virtual Server.
Impact:
WAF plugin sees only part of the ingress stream.
Workaround:
Disable SSE profile on virtual server when WAF plugin is configured.
Fix:
The HUDFILTER order on server side was adjusted to ensure both WAF plugin and SSE HUDFILTER receive the complete response body.
Fixed Versions:
21.0.0.1
2144513-1 : Cannot install any BIG-IP version with ISO signature verification enabled★
Links to More Info: BT2144513
Component: TMOS
Symptoms:
On affected versions of BIG-IP, if the BIG-IP software ISO file signature checking feature is enabled, attempting to install any BIG-IP version will fail.
Attempting to install the BIG-IP image using either tmsh or the GUI will result in the following error messages (as shown by the "tmsh show /sys software status" command, or hovering a mouse over the "Failed" Install Status message in the GUI):
failed (Signature verification failed - no sig file found)
Conditions:
This occurs on affected versions if the BIG-IP software ISO file signature checking feature is enabled, as described in the following article:
K15225: Enabling signature verification for BIG-IP and BIG-IQ ISO image files
https://my.f5.com/manage/s/article/K15225
Impact:
It is not possible to install any BIG-IP version with the BIG-IP software ISO file signature checking feature enabled.
Workaround:
To successfully install the desired BIG-IP version in such cases:
1. Disable ISO Signature Verification
2. Install the desired BIG-IP version
3. Re-enable ISO Signature Verification
Fix:
BIG-IP versions released on or after October 2025 can be successfully installed with the BIG-IP software ISO file signature checking feature enabled.
Fixed Versions:
21.0.0.1
2144497-2 : Mellanox driver timeouts and packet drops on Azure instances with high NIC count
Links to More Info: BT2144497
Component: TMOS
Symptoms:
On Azure instances with high interface count (6 or more) Mellanox linux kernel driver mlx5_core may fail to initialize the interface or attach it very slow. Another symptom of this problem: packets drops because of timeouts in Mellanox device queue processing.
mlx_core will report multiple errors in the kernel logs (run "dmesg | grep mlx5_core" to display it).
Conditions:
- BIG-IP VE instance deployed in Azure with 6 or more interfaces
- Accelerated networking is enabled
Impact:
- Azure instance starting time may be significant
- SSH access may be unavailable
- Packets drops on dataplane Mellanox interfaces
Workaround:
None
Fix:
Device interrupts are assigned on correct vCPUs in Azure/HyperV environments to prevent Mellanox device timeouts.
Fixed Versions:
21.0.0.1
2144445-1 : Insufficient sanitization in TMSH
Component: TMOS
Symptoms:
TMSH is not sanitizing input properly
Conditions:
NA
Impact:
Can cause unexpected behaviour in TMSH
Fix:
TMSH is now properly sanitizing the input.
Fixed Versions:
21.0.0.1
2144353-4 : BIND upgrade to stable version 9.18.41
Links to More Info: BT2144353
Component: Global Traffic Manager (DNS)
Symptoms:
BIND upgrade to stable version 9.18.41.
Conditions:
Using local BIND.
Impact:
BIND upgrade to stable version 9.18.41.
Workaround:
None.
Fix:
BIND upgrade to stable version 9.18.41.
Fixed Versions:
21.0.0.1
2143305-5 : Tmm crash
Component: Application Security Manager
Symptoms:
TMM may crash when a policy dynamically disables and re-enables L7 DoS through multiple rules.
Conditions:
-- A policy containing multiple rules that disable and then re-enable L7 DoS is attached to a virtual server.
-- An L7 DoS profile is attached to the same virtual server.
-- The policy rule that re-enables L7 DoS does not specify the from-profile attribute.
-- Traffic passes through tmm.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Modify the policy rules that enable L7 DoS to explicitly include the from-profile attribute referencing the attached DoS profile.
Fix:
Handle policy rules that enable L7 DoS without the from-profile attribute in cases where L7 DoS was previously disabled.
Fixed Versions:
21.0.0.1
2143165-3 : Oauth tokens are not shown in UI
Component: Access Policy Manager
Symptoms:
Oauth tokens are not shown in UI
Conditions:
Access >> Overview >> OAuth Reports >> Tokens
Impact:
Oauth tokens are not visible
Workaround:
Use tmsh to see the Oauth Tokens:
"tmsh list / apm oauth token-details db-instance oauthdb"
Fixed Versions:
21.0.0.1
2143101-3 : SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported
Links to More Info: BT2143101
Component: Advanced Firewall Manager
Symptoms:
The statistics counters retrieved via SNMP and tmctl do not reflect any increments for the corresponding blacklist category, despite packets being dropped and logged as expected.
Conditions:
Blacklist categories populated dynamically via feed lists or automatic updates.
Impact:
Inaccurate stats due to missing statistics.
Workaround:
None.
Fix:
When an IP address is dynamically blacklisted by IP Intelligence (IPI), packets from that source are dropped and logged as expected. The statistics counters for the relevant blacklist category viewed via SNMP or tmctl are also incremented.
Fixed Versions:
21.0.0.1
2141305-2 : SSH Proxy Profile Properties page does not render
Links to More Info: BT2141305
Component: TMOS
Symptoms:
The 'Properties' button of a ssh proxy security profile does not correctly render the profile's page
Conditions:
- AFM provisioned
- Security ›› Protocol Security : Security Profiles : SSH Proxy : SSH
- Right-click on 'Properties' and open in new tab.
Impact:
You are unable to view the SSH Proxy security profile properties.
Workaround:
None
Fix:
SSH Proxy Profile Properties Page Rendering issue is fixed
Fixed Versions:
21.0.0.1
2141245-3 : Undisclosed traffic to TMM can lead to resource exhaustion
Component: Global Traffic Manager (DNS)
Symptoms:
Certain traffic sent to TMM is leading to resource exhaustion.
Conditions:
Undisclosed conditions
Impact:
TMM Resource exhaustion
Fix:
DNS LDNS API correction.
Fixed Versions:
21.0.0.1
2141233-2 : Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate★
Links to More Info: BT2141233
Component: Local Traffic Manager
Symptoms:
SSL handshakes timeout instead of finishing.
Conditions:
1. Clientssl profile configured with Client Authentication enabled with "Request" option
2. BIG-IP is in FIPS-CC mode
3. Client does not provide a certificate
or
1. Clientssl profile configured with Client Authentication enabled with "Ignore" option
2. BIG-IP is in FIPS-CC mode
3. Access Policy applied to the Virtual Server contains an OnDemand Cert Auth agent.
4. Client does not provide a certificate
Impact:
SSL handshakes do not finish but instead timeout.
Workaround:
Workaround 1:
Disable Client authentication.
Workaround 2:
Configure CRL on the Client SSL profile
Workaround 3:
Enable Client Certificate Constrained Delegation (c3d) feature on the SSL profiles(requires Server-SSL profile and this feature forges client cert to server upon cert request from app-server).
Fixed Versions:
21.0.0.1
2140621-4 : CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling
Links to More Info: K000157317, BT2140621
2139901-6 : Server-ssl profile "do-not-remove-without-replacement" is recreated
Links to More Info: BT2139901
Component: Application Security Manager
Symptoms:
A required profile for a deprecated service is recreated on restart, but not saved to bigip.conf
Conditions:
The "do-not-remove-without-replacement" profile is deleted and the bewaf daemon is restarted
Impact:
The profile is recreated, but not saved to bigip.conf without another user action.
Workaround:
"tmsh save sys config" can be run to save the active config to bigip.conf
Fixed Versions:
21.0.0.1
2138077-3 : SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x
Links to More Info: BT2138077
Component: Access Policy Manager
Symptoms:
SAML authentication fails with errors such as “Invalid signature” or “Signature verification failed”
Conditions:
SAML SP is configured with:
is-authn-request-signed = true
sso-binding = http-redirect
want-detached-signature = true
A RelayState parameter is included in the SAML AuthnRequest.
Occurs on BIG-IP APM versions 17.1.x and above.
Impact:
End users are unable to log in using SSO due to authentication errors
Workaround:
Remove the RelayState parameter from the SAML AuthnRequest configuration, if possible.
This restores successful signature validation.
Example: remove relay-state from the SP AAA SAML object configuration.
Alternatively, use HTTP-POST binding instead of HTTP-Redirect.
There is no configuration-based workaround if RelayState is required and Redirect binding must be used.
Fixed Versions:
21.0.0.1
2137977-3 : Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy★
Links to More Info: BT2137977
Component: TMOS
Symptoms:
The hyperlink for the policy on virtual server's resource page navigates to the incorrect location.
Conditions:
Virtual server with an ltm policy attached.
Impact:
The hyperlink navigates to the full policy list, so the specific policy would still need to be found in the full list to navigate to it.
Workaround:
None
Fixed Versions:
21.0.0.1
2130485-4 : Warning: the current license is not valid - Fault code: 51133
Links to More Info: BT2130485
Component: TMOS
Symptoms:
License activation may fail on specific platforms.
root@(localhost)(cfg-sync Standalone)(NO LICENSE)(/Common)(tmos)# install sys license registration-key D1234-12345-12345-12345-1234567
Warning: the current license is not valid
License server has returned an exception.
Fault code: 51133
Fault text: Error 51133, F5 registration key is not compatible with the detected platform - This platform, "", cannot be activated with this registration key "I123456-1234567".
Conditions:
- DEV or Evaluation license
- KVM on HP AMD server
- IBM Bare Metal
Impact:
Unable to license BIG-IP.
Workaround:
None
Fix:
License activation is successful.
Fixed Versions:
21.0.0.1
2125953-5 : Insufficient access control to REST endpoint and TMSH for some CLI versions.
Component: TMOS
Symptoms:
Security best practices are not followed for some CLI versions.
Conditions:
Not specified.
Impact:
Unexpected behaviour
Fix:
Security best practices are being followed.
Fixed Versions:
21.0.0.1
2106789-1 : BIGIP LTM Monitors Hardening
Component: Global Traffic Manager (DNS)
Symptoms:
BIG-IP LTM External Monitors are not following the best security practices
Conditions:
When external montiors is configured
Impact:
Unexpected behaviour
Fix:
Best security practices are now applied
Fixed Versions:
21.0.0.1
2099441-2 : Garbled character in warning message when HA peer is added
Links to More Info: BT2099441
Component: TMOS
Symptoms:
Garbled character in warning message
Conditions:
When adding HA peer
Impact:
Unexpected behavior
Workaround:
None
Fixed Versions:
21.0.0.1
2086097-4 : PEM iRules causing traffic disruption
Component: Policy Enforcement Manager
Symptoms:
In some scenario, there is improper termination of connection and it is leading to TMM core
Conditions:
PEM iRules configured.
Impact:
TMM core. Service disruption.
Fix:
Connection is properly terminating and TMM is not coring.
Fixed Versions:
21.0.0.1
2078297-4 : Unexpected PVA traffic spike
Component: TMOS
Symptoms:
In rare circumstances, traffic may spike on the graphs inside the tenant without corresponding graphs on the external interfaces.
Conditions:
VELOS tenant
epva traffic
Impact:
Loss of connectivity,
extremely high PVA traffic spike
tcpdump on the appliance ceases to function
Workaround:
Disabling PVA acceleration on affected virtual servers
Fix:
PVA traffic not spiking.
Fixed Versions:
21.0.0.1
2077525-4 : Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash
Links to More Info: BT2077525
Component: Advanced Firewall Manager
Symptoms:
Both of the following messages are frequently (several times per second) logged to /var/log/tmm*:
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat
Heavy log file writing can result in a possible tmm SIGABRT due to a heartbeat failure.
Conditions:
ip-intelligence is configured, and both the IPv4 and IPv6 intelligence databases are missing. IP intelligence is a optional subscription feature that can be configured in various BIG-IP modules, such as AFM, ASM, and APM, and irules.
Impact:
A frequent log message might slow TMM.
This might result in TMM missing a heartbeat, which will trigger a tmm SIGABRT and resulting core. Traffic disrupted while tmm restarts.
Workaround:
Unconfigure ip-intelligence and remove any configuration that refers to IP reputation, or ensure that the ip-intelligence databases are available.
Fixed Versions:
21.0.0.1
2047429-4 : PostgreSQL should dump a corefile when not exiting
Links to More Info: BT2047429
Component: TMOS
Symptoms:
When PostgreSQL does not exit gracefully, it does not create a core file.
Conditions:
PostgreSQL crashes.
Impact:
Diagnostic data missing.
Workaround:
None
Fixed Versions:
21.0.0.1
2035641-5 : APMd resource exhaustion
Component: TMOS
Symptoms:
Under certain conditions, APMd is exhausting resources leading to core.
Conditions:
Access sessions create, and sessions are processed
Impact:
APMd core may cause temporary traffic disruption.
Fix:
APMd not coring.
Fixed Versions:
21.0.0.1
2034753-3 : Domain name validation does not align with the error message on GUI
Links to More Info: BT2034753
Component: Access Policy Manager
Symptoms:
Domain names which include hyphens are not accepted, an error message is shown on GUI.
Conditions:
Domain names with hyphens or forward slashes will cause this issue.
Impact:
BIG-IP administrator will not be able to update DNS Exclude/Include Fields in Network Access settings if they include hyphens/dashes.
Workaround:
None
Fix:
Update the mcp validation regex to allow hyphens and forward slashes.
Fixed Versions:
21.0.0.1
2017137-5 : Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd
Links to More Info: BT2017137
Component: Local Traffic Manager
Symptoms:
Unexpected behaviour or even a crash of pkcs11d
Conditions:
Configure the label/password values more than or equal to 32 characters.
Impact:
Configuring the label or password exceeding the allowed length, it could lead to memory corruption, unexpected behavior, or even a crash of the pkcs11d daemon.
Workaround:
Configure the values with 31 or fewer characters.
Fix:
The daemon now gracefully rejects inputs that exceed the length limit, logs an appropriate error, and exits the operation safely.
Fixed Versions:
21.0.0.1, 17.5.1.2, 17.1.3
2008409-4 : MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN
Links to More Info: BT2008409
Component: F5OS Messaging Agent
Symptoms:
Network traffic fails on a VLAN that is shared by multiple tenants.
Conditions:
-- F5OS tenants sharing a VLAN
-- MAC masquerade enabled on both tenants
-- No floating self-ips configured
Impact:
MAC masquerade may not work properly causing traffic failures such as packets not arriving on the tenant. Or excessive DLFs on the network.
Workaround:
Add floating self-ips to all traffic VLANs that are using MAC masquerade.
Fixed Versions:
21.0.0.1
1991297-3 : [APD][SAML-SSO]high memory due to SAML SSO leak
Links to More Info: BT1991297
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic
Conditions:
SAML SSO configured with saml artifact sign.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0.1
1988993-4 : CVE-2024-42516 Apache HTTP Server vulnerability
Links to More Info: K000153074
1987309-4 : Bigd may get stuck in legacy mode
Links to More Info: BT1987309
Component: Local Traffic Manager
Symptoms:
Https monitors may spuriously mark a pool member as down and it will fail to mark the pool member back up.
The monitor remains in legacy mode, and probes are sent using TLS 1.0.
Conditions:
-- Server supports version TLSv1.2 and above.
-- bigd is configured to monitor the server with SSL.
-- The monitor flips into legacy mode.
Impact:
Bigd is stuck in legacy mode.
Workaround:
Bigd can be brought out of legacy mode by detaching and re-attaching monitor to the pool.
Fixed Versions:
21.0.0.1
1983349-4 : CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities
Links to More Info: K000152931
1974701-3 : PVA stats may be double incremented when pva mode is dedicated
Links to More Info: BT1974701
Component: TMOS
Symptoms:
Offloaded connections may be double counted for dedicated PVA flows.
Conditions:
PVA mode is set to dedicated in fastl4 profile.
Impact:
Incorrect stats.
Workaround:
None
Fix:
Offloaded dedicated PVA flows are counted once.
Fixed Versions:
21.0.0.1
1966633-3 : Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS★
Links to More Info: BT1966633
Component: TMOS
Symptoms:
Management connectivity is lost after licensing BIG-IP 17.5.0 on AWS. The parameter provision.managementeth was changed to non-eth0 interface during deployment with cloud-init. When the issue occurs, the mgmt bridge loses the associated interface ethX.
Conditions:
1. Deploy an instance on AWS.
2. Change provision.managementeth to non-eth0 device and reboot.
3. After boot up, any operation that restart tmm (i.e. licensing BIG-IP) will cause the issue.
Impact:
Management connectivity is lost to BIG-IP instance.
Workaround:
Reboot the device twice after licensing the device. One reboot will not resolve the issue.
Fixed Versions:
21.0.0.1
1966405-1 : Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1★
Links to More Info: BT1966405
Component: Global Traffic Manager (DNS)
Symptoms:
All DNS PTR queries are forwarded to the configured forward zone. If any change is made to the local zones, such as adding a new local zone; the system begins responding to PTR queries with NXDOMAIN.
Conditions:
Occurs on BIG-IP DNS version 17.1.2 and above
Triggered when changes are made to local zones
Impact:
Queries respond with NXDOMAIN.
Workaround:
Restart tmm:
bigstart restart tmm
Fixed Versions:
21.0.0.1
1959361-2 : When running a tenant with more than 72 VCPUs / cores, adminstall crashes
Links to More Info: BT1959361
Component: Anomaly Detection Services
Symptoms:
When running a tenant with more than 72 VCPUs / cores, adminstall crashes.
Conditions:
When ASM provisioned and running a Tenant with more than 72 VCPUs / cores per blade.
Impact:
DOSL7 (BADOS) is not functioning. Core created.
Workaround:
None
Fix:
Now adminstall donot crash, when ASM provisioned and Tenant with more than 72 VCPUs / cores per blade.
Fixed Versions:
21.0.0.1
1943269-1 : GTM Server can be deleted while referenced by GTM Pools
Component: Global Traffic Manager (DNS)
Symptoms:
A GTM server object can be deleted even when it was referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.
Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.
Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.
Workaround:
None.
Fix:
A validation check has been added to prevent deletion of a GTM server that is referenced by GTM pools, and a warning is now displayed to the user.
Fixed Versions:
21.0.0.1
1934073-5 : PEM policy rule incorrectly matching when using a flow condition
Links to More Info: BT1934073
Component: Policy Enforcement Manager
Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.
Conditions:
PEM policy rule is using flow conditions to match IP address and port
Impact:
An incorrect policy rule might be matched
Workaround:
None
Fix:
The PEM policy rule now correctly matches the source and destination IP addresses and ports when the flow condition is used.
Fixed Versions:
21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1
1933357-3 : DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior.
Links to More Info: BT1933357
Component: Global Traffic Manager (DNS)
Symptoms:
DNS64 stats (tmstat table profile_dns_stat) in the TMM behave as follows:
dns64reqs - A queries to the server after the AAAA queries fail. Does not include the AAAA queries.
dns64fails - Failed AAAA queries to the server. Does not include the subsequent A queries.
DNS64 stats (tmstat table dns_cache_resolver_stat) in the cache behave as follows:
mesh.dns64reqs - Includes both A and AAAA queries to the server. Includes both successful and failed AAAA queries.
mesh.dns64nodata - Includes both A and AAAA query nodata responses (rcode=0 and no records).
mesh.dns64error - Includes both A and AAAA query error rcode responses.
mesh.dns64timeout - Includes both A and AAAA query timed-out responses.
Conditions:
-- A DNS resolver cache is enabled on a DNS profile.
-- The DNS profile has DNS64 configured.
Impact:
The current cache resolver stats makes it difficult to diagnose backend DNS64 performance.
Workaround:
None
Fix:
Mesh.dns64reqs behaves like the TMM's dns64reqs (counts only DNS64 A queries to the server.) Additionally, a new stat mesh.dns64fails sums all failures (mesh.dns64nodata, mesh.dns64error, mesh.dns64timeout) and, like the TMM, only counts DNS64 AAAA failures to the server.
Fixed Versions:
21.0.0.1
1925485 : CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
Component: TMOS
Symptoms:
A flaw was discovered in the XFS source in the Linux kernel. This flaw allows an attacker with the ability to mount an XFS filesystem, to trigger a denial of service while attempting to sync a file located on an XFS v5 image with crafted metadata.
Conditions:
An attacker can mount a crafted XFS v5 filesystem image on a vulnerable Linux kernel and trigger the issue during file sync operations.
Impact:
It can cause a kernel crash or hang, resulting in a denial of service.
Workaround:
Upgrade to a Linux kernel version that includes the XFS fix and avoid mounting untrusted or crafted XFS filesystem images.
Fix:
Upgrade to a Linux kernel version that includes the XFS crafted-metadata sync fix.
Fixed Versions:
21.0.0.1
1925369 : CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service
Component: TMOS
Symptoms:
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel can cause a NULL pointer dereference in xfs_ilock_attr_map_shared function. An attacker could trick a legitimate user or a privileged attacker could exploit this by mounting a crafted xfs filesystem image to cause a kernel panic and thus a denial of service.
Conditions:
A vulnerable Linux kernel mounts a crafted or malicious XFS filesystem image, triggering a NULL pointer dereference during inode verification.
Impact:
It can trigger a kernel panic, resulting in a denial of service.
Workaround:
Upgrade to a Linux kernel version that includes the XFS fix and avoid mounting untrusted or crafted XFS filesystem images.
Fix:
Upgrade to a Linux kernel version that includes the XFS NULL pointer dereference fix.
Fixed Versions:
21.0.0.1
1925045 : Linux Kernel Btrfs Information Leak Vulnerability (CVE-2024-35849)
Component: TMOS
Symptoms:
An information leak in the Btrfs btrfs_ioctl_logical_to_ino() ioctl allowed uninitialized kernel memory to be copied to user space, potentially exposing sensitive data.
Conditions:
A system running a vulnerable Linux kernel with Btrfs enabled, where a local user invokes the btrfs_ioctl_logical_to_ino() ioctl.
Impact:
It can leak uninitialized kernel memory to user space, potentially exposing sensitive information.
Workaround:
Upgrade to a Linux kernel version that includes the Btrfs fix (uses kvzalloc() to zero memory) or apply the relevant kernel patch.
Fix:
Upgrade to a Linux kernel version that includes the Btrfs btrfs_ioctl_logical_to_ino() memory initialization fix.
Fixed Versions:
21.0.0.1
1925029 : CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak
Component: TMOS
Symptoms:
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information lea
Conditions:
A system running a vulnerable Linux kernel with Btrfs enabled, where an attacker triggers the btrfs_search_slot() code path via crafted filesystem operations or images.
Impact:
It can cause a kernel crash (denial of service) and may lead to a kernel information leak.
Workaround:
Upgrade to a Linux kernel version that includes the Btrfs use-after-free fix and avoid using or mounting untrusted Btrfs filesystems.
Fix:
Upgrade to a Linux kernel version that includes the Btrfs btrfs_search_slot() use-after-free fix.
Fixed Versions:
21.0.0.1
1923997 : CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling
Component: TMOS
Symptoms:
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Conditions:
Open vSwitch is running a vulnerable version and processes an IP packet with protocol value 0, causing an incorrect datapath flow to be installed with wildcarded nw_proto.
Impact:
It can cause incorrect handling or misrouting of other IP packets, potentially leading to traffic disruption or denial of service.
Workaround:
Upgrade to a patched Open vSwitch version and avoid processing or allowing malformed IP packets with protocol value 0.
Fix:
Upgrade to a patched Open vSwitch version that correctly handles IP packets with protocol value 0.
Fixed Versions:
21.0.0.1
1923817 : CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1)
Component: Local Traffic Manager
Symptoms:
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.
Conditions:
The application runs a vulnerable Node.js version and processes attacker-controlled inputs that result in many hash collisions (e.g., crafted object keys), allowing hash flooding.
Impact:
It can cause high CPU usage and event loop blocking, leading to a remote denial of service.
Workaround:
Upgrade to a fixed Node.js version, or rebuild Node.js without V8 snapshots and limit or validate untrusted input sizes.
Fix:
Upgrade to a Node.js version where the HashTable seed is properly randomized at startup.
Fixed Versions:
21.0.0.1
1923793-10 : CVE-2019-5739: DoS with keep-alive HTTP connection
Component: Local Traffic Manager
Symptoms:
Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.
Conditions:
The server runs Node.js 6.16.0 or earlier and accepts keep-alive HTTP/HTTPS connections, allowing attackers to keep many idle connections open.
Impact:
It can exhaust server connections and resources, leading to a denial of service.
Workaround:
Upgrade to Node.js 6.17.0 or later and configure a low server.keepAliveTimeout to limit idle connections.
Fix:
Upgrade to Node.js 6.17.0 or later, where server.keepAliveTimeout is available and defaults to 5 seconds.
Fixed Versions:
21.0.0.1
1893905-3 : Python vulnerability CVE-2023-40217
Links to More Info: K000139685
1893473-3 : Apache vulnerability CVE-2021-40438
Links to More Info: K01552024
1893369-3 : CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c
Component: TMOS
Symptoms:
A flaw use-after-free in the Linux kernel CIPSO network packet labeling protocol functionality was found in the way user open local network connection with the usage of the security labeling that is IP option number 134. A local user could use this flaw to crash the system or possibly escalate their privileges on the system.
Conditions:
A vulnerable Linux kernel with CIPSO/IP option 134 enabled, where a local user opens a network connection using CIPSO security labeling.
Impact:
It can cause a kernel crash (denial of service) and may allow local privilege escalation.
Workaround:
Upgrade to a Linux kernel version that includes the CIPSO use-after-free fix or disable CIPSO/IP option 134 if not required.
Fix:
patch has been applied
Fixed Versions:
21.0.0.1
1893309-5 : CVE-2021-23337 on HostOS: Command Injection via template function.\n' 'Link:https://sn
Links to More Info: K12492858
1889845-3 : Improvements in Radius Monitor
Component: Local Traffic Manager
Symptoms:
Certain headers were missing from radius monitor packet.
Conditions:
When radius monitors is configured
Impact:
Can lead to unexpected behaviour
Fix:
Missing headers are now included in the packets.
Fixed Versions:
21.0.0.1
1849029-5 : Debug TMM crashes in FIPS/CC mode
Links to More Info: BT1849029
Component: Local Traffic Manager
Symptoms:
A TMM in debug mode crash occurs in FIPS/CC mode when using ClientSSL or ServerSSL profile.
Conditions:
-- Debug tmm is running
-- FIPS/CC mode enabled
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Switch to non debug tmm.
Fix:
Fix memory issue.
Fixed Versions:
21.0.0.1, 17.1.3, 16.1.6.1
1824985-4 : In rare cases the Nitrox hardware compression queue may stop servicing requests.
Links to More Info: BT1824985
Component: Local Traffic Manager
Symptoms:
In rare cases, the Nitrox hardware may stop servicing requests.
When this issue occurs the tmctl compress table shows a high number of cur_enqueued entries and the number of requests handled in software (zlib) will be growing.
Conditions:
-- Nitrox compression hardware.
-- HTTP compression in use.
Impact:
Some connections may fail, and higher than expected CPU usage will be observed since requests will be handled in software.
Workaround:
Remove traffic from the device, or disable compression until the queues are completely drained.
Fixed Versions:
21.0.0.1
1818949-3 : [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.
Links to More Info: BT1818949
Component: Access Policy Manager
Symptoms:
As per RFC states that, the provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client then should send a 400 Bad Request status code and a error json response
{"error": "invalid_grant", ...}
currently BIG-IP sending as {"error": "access_denied", ...}
with 400 status code.
Conditions:
OAuth configured.
using the refresh token to get the access token, when refresh token is expired. (ex: using postman)
Impact:
Returns Invalid error
Workaround:
None
Fix:
Corrected the logging as per Rfc.
Fixed Versions:
21.0.0.1
1818137-3 : Tmm IPv4 fragmentation handling distribution
Links to More Info: BT1818137
Component: Local Traffic Manager
Symptoms:
BIG-IP VE handles fragmented IPv4 traffic on the first tmm thread/tmm0. With this change the ability to spread the fragmented IPv4 traffic is introduced.
Conditions:
Handling of fragmented IPv4 traffic.
Impact:
Handling of fragmented IPv4 traffics distribution.
Workaround:
None
Fix:
With this fix the Handling of fragmented IPv4 traffic can be distributed.
Fixed Versions:
21.0.0.1
1788105-3 : TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★
Links to More Info: BT1788105
Component: Local Traffic Manager
Symptoms:
A TLS1.3 connection between the BIG-IP system and the server hangs.
Other reported symptoms:
-- SSL decryption fails
-- SSL handshake failure
-- SSL Orchestrator explicit proxy stops responding
This can be encountered after an upgrade to an affected version.
Conditions:
A virtual server that uses
1. TLS1.3 in the serverSSL profile
2. An APM policy that uses events that trigger after the SSL handshake on the server has completed
In an SSL Orchestrator setting, inline HTTP and ICAP services make use of APM policies that use L7 protocol lookup. Server Certificate and L7 protocol lookup conditions also make use of events that trigger the APM policy after the SSL handshake has completed.
Impact:
The connection hangs and the client is unable to connect to the server.
Workaround:
Apply either of these workarounds
1. Disable TLS1.3 on the serverSSL profile
2. Avoid using events that trigger the policy after the SSL handshake on the server has completed (for example avoid Event Wait and L7 protocol Lookup)
Fix:
The TLS1.3 connection between the BIG-IP and server no longer hangs if the APM policy is invoked after the SSL handshake.
Fixed Versions:
21.0.0.1, 17.1.3
1772317-4 : [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"
Links to More Info: BT1772317
Component: Access Policy Manager
Symptoms:
SAML authentication fails and following log is seen on BIG-IP as sp: "SAML Agent: /Common/web_auth_act_saml_auth_subsession_ag SAML assertion is invalid, error: NameID is missing, but idp-connector's identity location is set to subject"
Conditions:
-- SAML auth is configured as SP on BIG-IP as part of per-request policy
-- assertion has an encrypted subject "<saml2:Subject><saml2:EncryptedID><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"...."
Impact:
Authentication fails
Workaround:
Disable "encrypt-subject " in idp config
Fixed Versions:
21.0.0.1
1752873-3 : [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed★
Links to More Info: BT1752873
Component: Access Policy Manager
Symptoms:
After upgrading, the order of SAML attribute values parsed from assertion are stored in reverse order.
Conditions:
-- BIG-IP as SAML SP,
-- Upgrade to 17.1.0
Impact:
The SAML assertion values are parsed in reverse order, which can cause iRules or policies to fail if they expect the values to arrive in a certain order.
Workaround:
None
Fixed Versions:
21.0.0.1
1624701-5 : Security improvement in BIGIP GUI
Component: TMOS
Symptoms:
BIGIP GUI was not following best security practices.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
Security best practices are now being followed.
Fixed Versions:
21.0.0.1
1505813-7 : CVE-2018-16487 lodash: Prototype pollution in utilities
Component: iApp Technology
Symptoms:
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
Conditions:
NA
Impact:
An attacker can use Function inside of vulnerable versions of lodash to execute malicious code using the Traffic Management User Interface (TMUI) or iControl REST API .it can impact confidentiality,integrity and availability of application.
Workaround:
NA
Fix:
Updated lodash version to 4.17.21
Fixed Versions:
21.0.0.1
1505309-3 : CVE-2021-23337 nodejs-lodash: command injection via template
Links to More Info: K12492858
1505297-5 : CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function
Component: iApp Technology
Symptoms:
A flaw was found in nodejs-lodash in versions 4.17.15 and earlier. A prototype pollution attack is possible which can lead to arbitrary code execution. The primary threat from this vulnerability is to data integrity and system availability.
Conditions:
The vulnerability can be exploited when a vulnerable lodash version (≤ 4.17.15) processes attacker-controlled input using prototype-modifying functions (e.g., merge, defaultsDeep) with malicious keys like __proto__ or constructor.
Impact:
It can allow prototype pollution, leading to data integrity issues, application crashes (DoS), or potentially arbitrary code execution.
Workaround:
Upgrade lodash to a fixed version (≥ 4.17.16), avoid using prototype-modifying functions on untrusted input, and validate or sanitize user-controlled data.
Fix:
Update nodejs-lodash to version 4.17.16 or later
Fixed Versions:
21.0.0.1
1505257-3 : False positive with "illegal base64 value" for Authorization header
Links to More Info: BT1505257
Component: Application Security Manager
Symptoms:
False positive "illegal base64 value" is detected
Conditions:
The given base64 encoded value is legal base64 but the decoded auth-param is unparsable. Such request triggers "HTTP Protocol Compliance" violation when configured to do so and it is indeed triggering, but such request should not trigger "illegal base64 value".
Impact:
A false positive is detected.
Workaround:
None
Fixed Versions:
21.0.0.1
1498949-1 : CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature
Links to More Info: K000138682
1473189-1 : Offending IP is not logged when rate limiting is triggered
Component: Global Traffic Manager (DNS)
Symptoms:
The log only contains the rate limit message without the offending IP address.
Conditions:
The number of requests exceeds the server's configured maximum rate limit.
Impact:
You are unable to determine which IP address exceeded the threshold.
Workaround:
None
Fix:
The system now logs the offending IP address when the rate limit is triggered.
Fixed Versions:
21.0.0.1
1450481-6 : TMSH hardening
Component: TMOS
Symptoms:
TMSH is not following security best practices.
Conditions:
NA
Impact:
Unexpected behaviour
Workaround:
NA
Fix:
TMSH is now following security best practices.
Fixed Versions:
21.0.0.1
1429861-9 : CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6)
Component: Local Traffic Manager
Symptoms:
It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server's headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.
Conditions:
The server runs a vulnerable Node.js HTTP implementation and accepts persistent connections where an attacker can send two specially crafted HTTP requests on the same connection to bypass headersTimeout.
Impact:
An attacker can bypass Slowloris protections and cause a denial of service by exhausting server connections.
Workaround:
Upgrade to a Node.js version that includes the corrected Slowloris fix and enforce strict request timeouts and connection limits.
Fix:
Upgrade to a Node.js version with the updated Slowloris fix and enforce strict request timeout and connection limits.
Fixed Versions:
21.0.0.1
1379649-6 : GTM iRule not verifying WideIP type while getting pool from TCL command
Links to More Info: BT1379649
Component: Global Traffic Manager (DNS)
Symptoms:
When the pool name is same for different pool types, the GTM iRule cannot segregate the pool types thus giving a wrong DNS response.
Conditions:
-- Both A/AAAA same name WideIP and pools.
-- GTM iRule with pool command pointing to common pool name in different WideIP types.
Impact:
Traffic impact as a non-existent pool member address in DNS response.
Workaround:
None
Fixed Versions:
21.0.0.1
1359817-4 : The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly
Links to More Info: BT1359817
Component: F5OS Messaging Agent
Symptoms:
TMM is not configuring L2 listener entry for a new MASQUEREDE MAC created from a base MAC and VLAN ID when the DB variable tm.macmasqaddr_per_vlan is true.
Conditions:
- F5OS Tenant
- MAC MASQUEREDE is configured
- DB variable tm.macmasqaddr_per_vlan is true
Impact:
Connectivity issues may occur, pinging a self-IP will fail.
Workaround:
None
Fixed Versions:
21.0.0.1, 21.0.0
1352213-1 : Handshake fails with FFDHE key share extension
Links to More Info: BT1352213
Component: Local Traffic Manager
Symptoms:
SSL handshake fails to complete and various errors show in the LTM logs
01010025:2: Device error: crypto codec Couldn't create an OpenSSL EC group object OpenSSL error:00000000:lib(0):func(0):reason(0)
01010282:3: Crypto codec error: sw_crypto-1 Couldn't initialize the elliptic curve parameters.
01010025:2: Device error: crypto codec No codec available to initialize request context.
Conditions:
An SSL profile uses TLS1.3, and a TLS Client Hello attempts to use FFDHE as part of the key share extension.
Impact:
SSL handshake fails and results in connection failure.
Workaround:
Set the SSL profile to disallow using FFDHE groups.
Fixed Versions:
21.0.0.1, 17.1.3
1271341-6 : Unable to use DTLS without TMM crashing
Component: Local Traffic Manager
Symptoms:
The TMM crashes when DTLS is used.
Conditions:
- Using DTLS.
Impact:
TMM core is observed, traffic is disrupted while TMM restarts.
Workaround:
Disable 'allow-dynamic-record-sizing' in the client-ssl profile.
Following is an example:
ltm profile client-ssl /Common/otters-ssl {
allow-dynamic-record-sizing disabled
Fixed Versions:
21.0.0.1
1148185-8 : getdb insufficient sanitisation
Links to More Info: K05403841
Component: TMOS
Symptoms:
https://support.f5.com/csp/article/K05403841
Conditions:
https://support.f5.com/csp/article/K05403841
Impact:
https://support.f5.com/csp/article/K05403841
Fix:
https://support.f5.com/csp/article/K05403841
Fixed Versions:
21.0.0.1
1137269-8 : MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes
Links to More Info: BT1137269
Component: TMOS
Symptoms:
MCPD does not reply to the request if the publisher's connection closes or fails. In this case, when bcm56xxd
is restarted, the perceivable signs of failure are:
- The snmpwalk failing with a timeout and
- The "MCPD query response exceeding" log messages.
Conditions:
1) Configure SNMP on the BIG-IP to run snmpwalk locally on the BIG-IP.
2) From the first session on the BIG-IP, run a snmpwalk in the while loop.
while true;do date; snmpwalk -v2c -c public 127.0.0.1 sysDot1dbaseStat;sleep 2;done
Sample output:
Sat Aug 21 00:57:23 PDT 2021
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatResetStats.0 = INTEGER: 0
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatMacAddr.0 = STRING: 0:23:e9:e3:8b:41
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatNumPorts.0 = INTEGER: 12
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatType.0 = INTEGER: transparentonly(2)
3) From a second session on the BIG-IP restart bcm56xxd
bigstart restart bcm56xxd
4) The snmpwalk will continually report the following:
Timeout: No Response from 127.0.0.1
And snmpd will continually log "MCPD query response exceeding" every 30 seconds in /var/log/ltm.
Impact:
SNMP stopped responding to queries after upgrade.
Workaround:
Restart SNMP.
Fixed Versions:
21.0.0.1
1086325-8 : CVE-2016-4658 libxml2 vulnerability
Links to More Info: K49419538
1052477 : CVE-2020-10751 kernel: SELinux netlink permission check bypass
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
Conditions:
NA
Impact:
A local attacker could bypass SELinux restrictions, potentially leading to unauthorized access, privilege escalation, or, in some scenarios, a system crash (denial of service).
Workaround:
NA
Fix:
Applied patch to fix the CVE
Fixed Versions:
21.0.0.1
1036221-4 : "Illegal parameter value length" is reported with parsing product length.
Links to More Info: BT1036221
Component: Application Security Manager
Symptoms:
"Illegal parameter value length" violation is reported with wrong parameter length.
Conditions:
A JSON parameter is encoded.
Impact:
The decoded value length of the parameter in the JSON payload will be reported instead of its original length.
Workaround:
None
Fix:
The original parameters value length is reported with "Illegal parameter value length" violation.
Fixed Versions:
21.0.0.1
1001429-10 : HTTP header Sanitization
Component: Device Management
Symptoms:
Some HTTP headers were improperly sanitised.
Conditions:
NA
Impact:
It could lead to unexpected behaviour
Fix:
Headers are now properly sanitised.
Fixed Versions:
21.0.0.1
Known Issues in BIG-IP v21.0.x
TMOS Issues
| ID Number | Severity | Links to More Info | Description |
| 2141205-1 | 1-Blocking | BT2141205 | Tpm-status returns: "System Integrity: Invalid" for some Engineering Hotfixes |
| 967769-5 | 2-Critical | BT967769 | During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks |
| 780437-11 | 2-Critical | BT780437 | Upon rebooting a VIPRION chassis provisioned as a vCMP host, some vCMP guests can return online with no configuration. |
| 777389-10 | 2-Critical | BT777389 | In rare occurrences related to PostgreSQL monitor, the mcpd process restarts |
| 721591-6 | 2-Critical | K000141369, BT721591 | Java crashes with core during with high load on REST API |
| 2189993 | 2-Critical | BT2189993 | Upgrade from 17.5.1.3 to 21.0.0 and the config failed to load with error:01071197:3: Metacharacter '*' must be at end of the session variable name★ |
| 2185485-1 | 2-Critical | BT2185485 | The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs★ |
| 2154089-2 | 2-Critical | "Test" button for monitor object is missing. | |
| 2154057-5 | 2-Critical | BT2154057 | MCPD validations not throwing error when snmpv3 password contains more than 77 characters★ |
| 2139893-3 | 2-Critical | BT2139893 | vCMP guest may become unresponsive for several minutes due to kernel soft lockup |
| 2053309-5 | 2-Critical | BT2053309 | Changes to README - mention of duojs.org URL |
| 1983145-2 | 2-Critical | BT1983145 | Memory Corruption due to xnet-DPDK★ |
| 1959549-2 | 2-Critical | BT1959549 | Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0★ |
| 1812349-4 | 2-Critical | BT1812349 | IPsec phase 2 (IKEv1 Quick Mode) will not start after upgrade★ |
| 1571817-5 | 2-Critical | BT1571817 | FQDN ephemeral pool member user-down state is not synced to the peer device |
| 1395349-3 | 2-Critical | BT1395349 | The httpd service shows inactive/dead after "bigstart restart httpd" |
| 1327649-5 | 2-Critical | BT1327649 | Invalid certificate order within cert-chain associated to JWK configuration |
| 1093717-7 | 2-Critical | BT1093717 | BGP4 SNMP traps are not working. |
| 1077789-8 | 2-Critical | BT1077789 | System might become unresponsive after upgrading.★ |
| 1027961-5 | 2-Critical | BT1027961 | Changes to an admin user's account properties may result in MCPD crash and failover |
| 1006449-6 | 2-Critical | BT1006449 | High CPU utilization and slow SNMP response after upgrade★ |
| 977953-8 | 3-Major | BT977953 | Show running config interface CLI could not fetch the interface info and crashes the imi |
| 941961-9 | 3-Major | BT941961 | Upgrading system using WAM TCP profiles may prevent the configuration from loading |
| 923745-8 | 3-Major | BT923745 | Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition |
| 921069-7 | 3-Major | BT921069 | Neurond cores while adding or deleting rules |
| 883149-10 | 3-Major | BT883149 | The fix for ID 439539 can cause mcpd to core. |
| 870349-6 | 3-Major | BT870349 | Continuous restart of ntlmconnpool after the license reinstallation★ |
| 851837-7 | 3-Major | BT851837 | Mcpd fails to start for single NIC VE devices configured in a trust domain |
| 809089-8 | 3-Major | BT809089 | TMM crash after sessiondb ref_cnt overflow |
| 791365-8 | 3-Major | BT791365 | Bad encryption password error on UCS save |
| 783077-5 | 3-Major | BT783077 | IPv6 host defined via static route unreachable after BIG-IP reboot |
| 775845-10 | 3-Major | BT775845 | Httpd fails to start after restarting the service using the iControl REST API |
| 759258-10 | 3-Major | BT759258 | Instances shows incorrect pools if the same members are used in other pools |
| 739904-7 | 3-Major | BT739904 | /var/log/ecm log is not rotated |
| 637827-5 | 3-Major | BT637827 | VADC: after re-deploying a single-nic VM with multiple nics, a load can fail due to stp member 1.0 |
| 566995-7 | 3-Major | BT566995 | bgpd might crash in rare circumstances. |
| 554506-6 | 3-Major | K47835034, BT554506 | PMTU discovery from the management interface does not work |
| 469724-7 | 3-Major | BT469724 | When evaluation/demonstration features expire, features enabled by both evaluation and perpetual licenses also expire |
| 2217677 | 3-Major | BIG-IP v21.0: Tunnel object exists in MCPD but missing Linux tunnel tap device, causing ioctl failure and config deployment failure | |
| 2201877-3 | 3-Major | BT2201877 | SCTP multihoming fails with ICMP unreachable for alternate paths. |
| 2197289-1 | 3-Major | BT2197289 | Enabling SSH access via the GUI blocks MCPD for 90 seconds |
| 2186009-2 | 3-Major | BT2186009 | Increased TX IQ size for netvsc |
| 2183241-2 | 3-Major | BT2183241 | Trunk egress traffic is not balanced on some platforms. |
| 2182061-3 | 3-Major | BT2182061 | Management routes not installed on reboots when interface route is recursively required. |
| 2162997-3 | 3-Major | BT2162997 | AS3 becomes unresponsive after upgrade from 17.1.2.1 to 17.1.2.2 Build 0.311.1★ |
| 2153421-3 | 3-Major | BT2153421 | iControl REST /mgmt/toc endpoint and object browser pages are not functioning on BIG-IP v17.x |
| 2152301-2 | 3-Major | BT2152301 | After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.★ |
| 2152257-3 | 3-Major | BT2152257 | [BGP] remove-private-AS does not work with extended ASN numbers |
| 2150489-5 | 3-Major | BT2150489 | Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed. |
| 2143109-3 | 3-Major | BT2143109 | BIG-IP VE with more CPU cores than licensed enters TMM restart loop (TMM PU (<num_cores>) >= number of PUs (<num_licensed_cores>)) after mcpd restart |
| 2140213-3 | 3-Major | BT2140213 | Xnet-netvsc driver crash |
| 2131833-5 | 3-Major | BT2131833 | F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable |
| 2053489-4 | 3-Major | BT2053489 | Config Sync events may not be recorded in audit log |
| 2038429-2 | 3-Major | BT2038429 | Issue with ike_ctx causes memory corruption |
| 2038425-2 | 3-Major | BT2038425 | Issue with ike_ctx causes memory corruption |
| 2038421-2 | 3-Major | BT2038421 | Issue with ike_ctx causes memory corruption |
| 2038417-2 | 3-Major | BT2038417 | Issue with ike_ctx causes memory corruption |
| 2014597-4 | 3-Major | BT2014597 | Async session db ops are missing flow control |
| 1975297-1 | 3-Major | BT1975297 | TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs |
| 1937545-3 | 3-Major | BT1937545 | Disabling ipsec.if.checkpolicy lead to premature connection termination for a tunneled traffic |
| 1933105-4 | 3-Major | BT1933105 | TMM does not fragment the output before encapsulating the payload |
| 1927521-2 | 3-Major | BT1927521 | DPDK has dependency on SSSE3 |
| 1854353-4 | 3-Major | BT1854353 | Users with Resource admin role are not able to save the UCS. |
| 1644497-5 | 3-Major | BT1644497 | TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed |
| 1602629-5 | 3-Major | BT1602629 | Tmm_mcpmsg_print can trigger SOD |
| 1600617-5 | 3-Major | BT1600617 | Few virtio driver configurations may result in excessive memory usage |
| 1586745-3 | 3-Major | BT1586745 | LACP trunk status became DOWN due to bcm56xxd failure |
| 1455805-3 | 3-Major | BT1455805 | MCPD unstable/inoperative after copying SNMP configuration from another BIG-IP |
| 1347861-5 | 3-Major | BT1347861 | Monitor status update logs unclear for FQDN template pool member |
| 1322413-6 | 3-Major | BT1322413 | After config sync, FQDN node status changes to Unknown/Unchecked on peer device |
| 1312225-5 | 3-Major | BT1312225 | System Integrity Status: Invalid with some Engineering Hotfixes |
| 1283721-5 | 3-Major | BT1283721 | Vmtoolsd memory leak |
| 1281929-5 | 3-Major | BT1281929 | The BIG-IP system's time zone database does not reflect recent changes implemented by Mexico in regard to DST |
| 1271941-5 | 3-Major | BT1271941 | Tomcat CPU utilization increased after upgrading to 15.1.6 and higher versions.★ |
| 1256757-4 | 3-Major | BT1256757 | Suspect keymgmtd memory leak while using dynamic CRL. |
| 1168245-4 | 3-Major | BT1168245 | Browser is intermittently unable to contact the BIG-IP device |
| 1126505-4 | 3-Major | BT1126505 | HSB and switch pause frames impact data traffic |
| 1106489-6 | 3-Major | BT1106489 | GRO/LRO is disabled in environments using the TMM raw socket "sock" driver. |
| 1090313-7 | 3-Major | BT1090313 | Virtual server may remain in hardware SYN cookie mode longer than expected |
| 1062901-7 | 3-Major | BT1062901 | The 'trap-source' and 'network' SNMP properties are ineffective, and SNMP traps may be sent from an unintended interface. |
| 1052057-3 | 3-Major | BT1052057 | FCS errors on switch/HSB interface impacts networking traffic |
| 1036217-5 | 3-Major | BT1036217 | Secondary blade restarts as a result of csyncd failing to sync files for a device group |
| 1022997-7 | 3-Major | BT1022997 | TCP segments with an incorrect checksum are transmitted when the sock driver is used in AWS deployments (e.g., 1NIC) |
| 1016273-3 | 3-Major | BT1016273 | Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled★ |
| 1013793-3 | 3-Major | BT1013793 | Pool members may flap on BIG-IP VE with provision.1nic set to forced_enable |
| 1009337-8 | 3-Major | BT1009337 | LACP trunk down due to bcm56xxd send failure |
| 929173-9 | 4-Minor | BT929173 | Watchdog reset due to CPU stall detected by rcu_sched |
| 928665-7 | 4-Minor | BT928665 | Kernel nf_conntrack table might get full with large configurations. |
| 824953-1 | 4-Minor | BT824953 | The sFlow sample collection for VLAN does not work with VLAN groups |
| 745125-5 | 4-Minor | BT745125 | Network Map page Virtual Servers with associated Address/Port List have a blank address. |
| 694765-10 | 4-Minor | BT694765 | Changing the system's admin user causes vCMP host guest health info to be unavailable |
| 2151505-1 | 4-Minor | BT2151505 | Cmp_dest_velos is automatically installed on system startup. |
| 2150869-1 | 4-Minor | BT2150869 | Incorrect information for count of failed login for a user |
| 2131597-3 | 4-Minor | BT2131597 | BGP graceful restart might not accept a new connection immediatelly post neighbor failover. |
| 2064209-4 | 4-Minor | BT2064209 | FQDN node created from pool member via tmsh does not inherit "autopopulate" value |
| 1967293-4 | 4-Minor | BT1967293 | Re-configuring BFD multihop for a BGP peer does not work reliably. |
| 1813625-3 | 4-Minor | BT1813625 | "tmsh show net ipsec-stat" command is not showing statistics - all values are zero. |
| 1635013-5 | 4-Minor | BT1635013 | The "show sys service" command works only for users with Administrator role |
| 1462337-6 | 4-Minor | BT1462337 | Intermittent false PSU status (not present) through SNMP |
| 1331037-6 | 4-Minor | BT1331037 | The message MCP message handling failed logs in TMM with FQDN nodes/pool members |
| 1301317-5 | 4-Minor | BT1301317 | Update Check request using a proxy will fail if the proxy inserts a custom header |
| 1089625-4 | 4-Minor | BT1089625 | Java core dump with SIGABRT while high cpu load in BIG-IP |
| 1361021-5 | 5-Cosmetic | BT1361021 | The management interface media on a BIG-IP Tenant on F5OS systems does not match the chassis |
Local Traffic Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2198781-2 | 1-Blocking | BIG-IP high availability (HA) systems may experience an unexpected active-active state after an upgrade | |
| 886045-9 | 2-Critical | BT886045 | Multi-NIC instances fail to come up when trying to use memory-mapped virtio device |
| 824437-11 | 2-Critical | BT824437 | Chaining a standard virtual server and an ipother virtual server together can crash TMM. |
| 797573-6 | 2-Critical | BT797573 | TMM assert crash with resulting in core generation in multi-blade chassis |
| 758491-8 | 2-Critical | BT758491 | When using NetHSM integration, after upgrade to 14.1.0 or later (or creating keys using fipskey.nethsm), BIG-IP cannot use the keys |
| 632553-9 | 2-Critical | K14947100, BT632553 | DHCP: OFFER packets from server are intermittently dropped |
| 2208821-3 | 2-Critical | BT2208821 | VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade★ |
| 2131085-2 | 2-Critical | BT2131085 | Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state |
| 1825357-3 | 2-Critical | BT1825357 | Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk |
| 1481889-5 | 2-Critical | BT1481889 | High CPU utilization or crash when CACHE_REQUEST iRule parks. |
| 1091021-8 | 2-Critical | BT1091021 | The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive. |
| 978953-6 | 3-Major | BT978953 | The value of the sys db variable vlan.backplane.mtu intermittently out-of-sync with the value of the MTU of the kernel interface tmm_bp during the initial boot up |
| 976853-3 | 3-Major | BT976853 | SNAT pool traffic-group setting may override non-floating self IP's traffic-group |
| 967353-10 | 3-Major | BT967353 | HTTP proxy should trim spaces between a header field-name and colon in its downstream responses. |
| 928445-11 | 3-Major | BT928445 | HTTPS monitor is down when server_ssl profile cipher string is configured to TLSv1_2 |
| 912293-9 | 3-Major | BT912293 | Persistence might not work properly on virtual servers that utilize address lists★ |
| 905477-9 | 3-Major | BT905477 | The sdmd daemon cores during config sync when multiple devices configured for iRules LX |
| 898389-9 | 3-Major | BT898389 | Traffic is not classified when adding port-list to virtual server from GUI |
| 881937-7 | 3-Major | BT881937 | TMM and the kernel choose different VLANs as source IPs when using IPv6. |
| 867985-9 | 3-Major | BT867985 | LTM policy with a 'shutdown' action incorrectly allows iRule execution |
| 857769-6 | 3-Major | BT857769 | FastL4+HTTP or FastL4+Hash-Persistence virtual servers do not work correctly in DSR mode. |
| 812693-8 | 3-Major | BT812693 | Connection in FIN_WAIT_2 state may fail to be removed |
| 779137-10 | 3-Major | BT779137 | Using a source address list for a virtual server does not preserve the destination address prefix |
| 751451-7 | 3-Major | BT751451 | When upgrading to v14.0.0 or later, the 'no-tlsv1.3' option is missing from HTTPS monitors automatically created server SSL profiles |
| 739475-10 | 3-Major | BT739475 | Site-Local IPv6 Unicast Addresses support. |
| 687044-9 | 3-Major | BT687044 | Tcp-half-open monitors might mark a node up or down in error |
| 673060-3 | 3-Major | BT673060 | SSL handshake failure with Session Ticket enabled on the backend server |
| 637613-10 | 3-Major | K24133500, BT637613 | Cluster blade status immediately returns to enabled/green after it is disabled. |
| 2217093-3 | 3-Major | BT2217093 | L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used |
| 2211133-3 | 3-Major | BT2211133 | ICMP error length does not follow RFC 812 guidance |
| 2209157-3 | 3-Major | BT2209157 | FastL4 late binding does not proxy MSS when establishing server-side connection. |
| 2201813-1 | 3-Major | BT2201813 | BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection |
| 2199469-3 | 3-Major | BT2199469 | Serverssl-use-sni not working in HTTP2 to HTTP gateway setups. |
| 2197321-1 | 3-Major | BT2197321 | BIG-IP does not select FFDHE key share provided by the client on session resumption. |
| 2197305-1 | 3-Major | BT2197305 | BIG-IP generates invalid SSL key share |
| 2183917-3 | 3-Major | BT2183917 | BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled |
| 2183353-4 | 3-Major | BT2183353 | TMM Intel E810 VF driver updates the link state with 1 second delay |
| 2182045-3 | 3-Major | BT2182045 | The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers |
| 2181929-3 | 3-Major | BT2181929 | Cipher suite order changes in cipher group after upgrading from v17.1.1.1 to v17.1.3★ |
| 2151885-3 | 3-Major | BT2151885 | When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash. |
| 2144309-3 | 3-Major | BT2144309 | TMM might experience a crash when using a fix for Bug783077 |
| 2141297-3 | 3-Major | BT2141297 | In TLSv1.3, BIG-IP enforces the use of FFDHE key share if it is preferred over other DH groups★ |
| 2139637-3 | 3-Major | BT2139637 | TMM crash because of invalid context |
| 2135621-1 | 3-Major | BT2135621 | Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces |
| 2132209-3 | 3-Major | BT2132209 | TMM crash while sending ACKs in invalid context |
| 2033781-4 | 3-Major | BT2033781 | Memory allocation failed: can't allocate memory to extend db size |
| 1989033-4 | 3-Major | BT1989033 | IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT |
| 1977037-2 | 3-Major | K000153024, BT1977037 | TMM Virtual Edition on Azure goes into crash loop due to missing kernel driver★ |
| 1935713-3 | 3-Major | BT1935713 | TMM crash when handling traffic over vlangroup with autolasthop disabled |
| 1778793-4 | 3-Major | BT1778793 | Database health monitors may use the wrong connection when attempting to connect to database |
| 1708309-4 | 3-Major | BT1708309 | Dynconfd crash with invalid ephemeral pool member |
| 1589629-5 | 3-Major | BT1589629 | An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address |
| 1474877-5 | 3-Major | BT1474877 | Unable to download large files through VIP due RST Compression error. |
| 1463089-2 | 3-Major | BT1463089 | TMM crash because of corrupted MQTT queue |
| 1440409-8 | 3-Major | BT1440409 | TMM might crash or leak memory with certain logging configurations |
| 1407949-6 | 3-Major | BT1407949 | iRules using regexp or regsub command with large expression can lead to SIGABRT. |
| 1325649-4 | 3-Major | BT1325649 | POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member |
| 1231889-6 | 3-Major | BT1231889 | Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances |
| 1196505-3 | 3-Major | BT1196505 | BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use. |
| 1137521-3 | 3-Major | BT1137521 | TLSv1.3 connections dropped when SSL Persistence is enabled |
| 1128033-6 | 3-Major | BT1128033 | Neuron client constantly logs errors when TCAM database is full |
| 1087569-8 | 3-Major | BT1087569 | Changing max header table size according HTTP2 profile value may cause stream/connection to terminate |
| 1086473-8 | 3-Major | BT1086473 | BIG-IP resumes a TLS session on the client-side but then proceeds to do a full handshake |
| 1075045-7 | 3-Major | BT1075045 | Proxy initialization failed, Defaulting to DENY, after applying additional profile to a virtual server |
| 1060541-6 | 3-Major | BT1060541 | Increase in bigd CPU utilization from 13.x when SSL/TLS session resumption is not utilized by HTTPS pool members due to Open SSL upgrade |
| 1043985-7 | 3-Major | BT1043985 | After editing an iRule, the execution order might change. |
| 1026781-7 | 3-Major | BT1026781 | Standard HTTP monitor send strings have double CRLF appended |
| 1019641-7 | 3-Major | BT1019641 | SCTP INIT_ACK not forwarded |
| 1002969-8 | 3-Major | BT1002969 | Csyncd can consume excessive CPU time★ |
| 932553-10 | 4-Minor | BT932553 | An HTTP request is not served when a remote logging server is down |
| 804089-5 | 4-Minor | BT804089 | iRules LX Streaming Extension dies with Uncaught, unspecified error event |
| 2151601-1 | 4-Minor | BT2151601 | No tmsh command to remove the stateless directive from a virtual server |
| 2144029-1 | 4-Minor | BT2144029 | DB monitor does not use the correct timezone present in the system |
| 2077357-3 | 4-Minor | BT2077357 | Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC. |
| 1341093-6 | 4-Minor | BT1341093 | MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile |
| 1004953-8 | 4-Minor | BT1004953 | HTTP does not fall back to HTTP/1.1★ |
Performance Issues
| ID Number | Severity | Links to More Info | Description |
| 1574521-3 | 5-Cosmetic | BT1574521 | Intermittent high packet latency on R4000 and R2000 tenants |
Global Traffic Manager (DNS) Issues
| ID Number | Severity | Links to More Info | Description |
| 1962713-3 | 2-Critical | BT1962713 | Limit on BIND maximum records per type★ |
| 1083405-8 | 2-Critical | BT1083405 | "Error connecting to named socket" from zrd |
| 1031945-7 | 2-Critical | BT1031945 | DNS cache configured and TMM is unresponsive in 'not ready' state indefinitely after TMM restart or reboot★ |
| 936777-10 | 3-Major | BT936777 | Old local config is synced to other devices in the sync group. |
| 821589-7 | 3-Major | BT821589 | DNSSEC does not insert NSEC3 records for NXDOMAIN responses |
| 751540-8 | 3-Major | BT751540 | GTM Sync group not syncing properly with multiple self IP addresses configured on one VLAN but not all configured for GTM server |
| 705869-8 | 3-Major | BT705869 | TMM crashes as a result of repeated loads of the GeoIP database |
| 222220-12 | 3-Major | K11931 | Distributed application statistics are not passed correctly. |
| 2200389-1 | 3-Major | BT2200389 | CDS and CDNSKEY not included in DNSX zone transfer data |
| 2200217-1 | 3-Major | BT2200217 | DNSSEC validation failures due to missing DS records in zone transfers |
| 2172069-1 | 3-Major | BT2172069 | GTM topology regions updates do not take effect within tmm |
| 2172041-2 | 3-Major | BT2172041 | Zone transfer fails for dnsx when the zone file contains TLSA records |
| 2150493-1 | 3-Major | BT2150493 | BIG-IP DNS (GTM) may associate LTM virtual server names with the wrong GTM virtual-servers |
| 464708-7 | 4-Minor | BT464708 | DNS logging does not support Splunk format log |
| 264701-9 | 4-Minor | K10066, BT264701 | The zrd exits on error from bind about .jnl file error |
| 2186625-1 | 4-Minor | BT2186625 | Zone transfer from dns express with dnssec enabled includes extra RRSIG |
| 1642301-5 | 4-Minor | BT1642301 | Loading single large Pulse GeoIP RPM can cause TMM core |
| 1014761-7 | 4-Minor | BT1014761 | [DNS][GUI] Not able to enable/disable pool member from pool member property page |
Application Security Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 1787645-4 | 2-Critical | BT1787645 | BD process fail to startup on specific XML configuration |
| 1755113-5 | 2-Critical | BT1755113 | BD crash with specific JSON schema |
| 919917-9 | 3-Major | BT919917 | File permission errors during bot-signature installation |
| 902445-6 | 3-Major | BT902445 | ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation |
| 2208709-1 | 3-Major | BT2208709 | Failure to match specific WAF signatures |
| 2200405-3 | 3-Major | BT2200405 | Live Update proxy.host value requires brackets around IPv6 Addresses |
| 2187385-3 | 3-Major | BT2187385 | Brute force set to CAPTCHA also raises a violation and blocks traffic |
| 2185537-3 | 3-Major | BT2185537 | Application Security Administrator role cannot edit the General Settings of parent policies from the GUI |
| 2162189-3 | 3-Major | BT2162189 | "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually★ |
| 2152445-3 | 3-Major | BT2152445 | "Live Update" API is unresponsive after upgrade and recover only after tomcat restart★ |
| 2038277-3 | 3-Major | BT2038277 | Double memory release in the enforcer |
| 2016465-2 | 3-Major | BT2016465 | Policy auto merge does not work for Base64 Decoding |
| 1938101-5 | 3-Major | BT1938101 | Performance issue on specific parameters extractions |
| 1933373-4 | 3-Major | BT1933373 | Newly added Threat Campaigns are missing REST ID |
| 1922661-4 | 3-Major | BT1922661 | JSON profile settings not displayed in REST API after attaching schema files |
| 1848541-1 | 3-Major | BT1848541 | Invalid regular expression causing bd restart loop |
| 1827821-3 | 3-Major | BT1827821 | isBase64 params and headers not blocking Attack Signatures |
| 1825057-3 | 3-Major | BT1825057 | 'vs_name' field truncated at 64 characters with ASM's remote logging |
| 1814413-2 | 3-Major | BT1814413 | Dynamic parameters are not extracted and cookies are not generated |
| 1772353-3 | 3-Major | BT1772353 | Defaults for Associated Violations are re-added to a policy |
| 1632385-5 | 3-Major | BT1632385 | Non-ASCII UTF-8 characters are mangled in JSON policy export |
| 1623669-3 | 3-Major | BT1623669 | False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF) |
| 1583381-4 | 3-Major | BT1583381 | "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default |
| 1429813-6 | 3-Major | BT1429813 | ASM introduce huge delay from time to time |
| 1280813-5 | 3-Major | BT1280813 | 'Illegal URL' violation may trigger after upgrade |
| 1021201-3 | 3-Major | BT1021201 | JSON parser is not fully UTF-8 compliant |
| 638863-4 | 4-Minor | BT638863 | Attack Signature Detected Keyword is not masked in the logs |
| 2199485-3 | 4-Minor | BT2199485 | Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value |
| 2162873-3 | 4-Minor | Pipe and backslash characters are not escaped in ArcSight CEF remote logging | |
| 2149333-1 | 4-Minor | BT2149333 | BD_XML logs memory usage at TS_DEBUG level |
| 2078277-2 | 4-Minor | BT2078277 | BD crash with an inappropriate configuration for request_max_chunks_number |
| 2046941-6 | 4-Minor | BT2046941 | Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor |
| 1782057-4 | 4-Minor | BT1782057 | BD crash related to dns lookup |
| 1572045-3 | 4-Minor | BT1572045 | Login page config parameters are still case-sensitive with a case insensitive policy |
| 1036289-4 | 4-Minor | BT1036289 | Signature ID not displayed in Attack Signature details |
Application Visibility and Reporting Issues
| ID Number | Severity | Links to More Info | Description |
| 1848577-3 | 2-Critical | BT1848577 | VCMP guest stats are not visible on vCMP host GUI nor CLI |
| 1294141-8 | 3-Major | BT1294141 | ASM Resources Reporting graph displays over 1000% CPU usage |
| 868801-6 | 4-Minor | BT868801 | BIG-IP still sends STARTTLS if the 'No encryption' SNMP option is enabled |
| 1298225-4 | 4-Minor | BT1298225 | Avrd generates core when dcd becomes unavailable due to some reason |
Access Policy Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2186185-1 | 2-Critical | BT2186185 | Apmd occasionally fails to process a request if SecurID agent is present |
| 2162861-3 | 2-Critical | BT2162861 | 'Connectors' creation screen does not appear |
| 995877-3 | 3-Major | BT995877 | Edge Client 'Save Password'' checkbox not visible when 'Allow Password Caching' method is 'memory' |
| 527119-12 | 3-Major | BT527119 | An iframe document body might be null after iframe creation in rewritten document. |
| 2198721 | 3-Major | BT2198721 | Apmd memory leak |
| 2198589-3 | 3-Major | BT2198589 | BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client |
| 2183233-3 | 3-Major | BT2183233 | TMM crash due to extra trailing CR/LF in iSession reconnects |
| 2152545-2 | 3-Major | BT2152545 | [APM][SAML] High TMM memory sso_saml leak |
| 2137909-2 | 3-Major | BT2137909 | Portal Access: unwanted decoding html entities in attribute values of HTML tags★ |
| 2047137-3 | 3-Major | BT2047137 | TMM core may occur while using APM VDI with Blast UDP |
| 1621977-1 | 3-Major | BT1621977 | Rewrite memoryleak with "REWRITE::disable" irule |
| 1586405-4 | 3-Major | BT1586405 | "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page |
| 1290937-4 | 3-Major | 'contentWindow' of a dynamically genereated iframe becomes null | |
| 1074285-5 | 3-Major | BT1074285 | Apmd crashes while handling JWT tokens. |
| 1071021-5 | 3-Major | BT1071021 | Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM |
| 1022361-3 | 3-Major | BT1022361 | Edge Client shows HTML encoding for non-English endpoint inspection message |
| 937665-4 | 4-Minor | BT937665 | Relaystate in SLO request results in two Relaystates in SLO Response |
| 893161-3 | 4-Minor | BT893161 | Internal request to volatile.html used for cookie transport in Portal Access is sometime rewritten |
| 869541-6 | 4-Minor | BT869541 | Series of unexpected <aborted> requests to same URL |
| 869121-6 | 4-Minor | BT869121 | Logon Page configured after OAuth client in access policy VPE, get error message Access policy evaluation is already in progress for your current session |
| 745645-5 | 4-Minor | BT745645 | Portal Access does not rewrite the script element with textNode children |
| 349706-7 | 4-Minor | NetworkAccess assigns 1.1.1.1 address to remote ppp endpoint APM VPN |
Service Provider Issues
| ID Number | Severity | Links to More Info | Description |
| 2187429-3 | 2-Critical | BT2187429 | TMM might crash when using MRF framework. |
| 1268373-9 | 2-Critical | BT1268373 | MRF flow tear down can fill up the hudq causing leaks |
| 2153897-1 | 4-Minor | BT2153897 | BIG-IP closes the transport connection immediately after sending a DPA to a peer |
Advanced Firewall Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2196597-1 | 1-Blocking | BT2196597 | TMM generates core when large firewall policy is attached to multiple virtual servers due to SOD watchdog timeout |
| 680804-6 | 2-Critical | BT680804 | TMM restart due to delayed keep alives |
| 2150669-3 | 2-Critical | BT2150669 | TCP Packet loss after upgrade with AFM provisisoned★ |
| 2144397-3 | 2-Critical | BT2144397 | Problems compiling firewall policies when they contain rules using huge address lists |
| 1671149-5 | 2-Critical | BT1671149 | Timestamp cookies may cause issue for PVA-accelerated connections |
| 2218157-3 | 3-Major | IP Intelligence database load log displayed periodically | |
| 1991717-1 | 3-Major | Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN's★ | |
| 1282029-2 | 3-Major | BT1282029 | Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0★ |
| 760355-8 | 4-Minor | BT760355 | Firewall rule to block ICMP/DHCP from 'required' to 'default'★ |
| 1366269-6 | 4-Minor | BT1366269 | NAT connections might not work properly when subscriber-id is confiured. |
Policy Enforcement Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2200009-1 | 3-Major | BT2200009 | PEM HA failover may cause traffic drops for new connections |
| 2198757-3 | 3-Major | BT2198757 | PEM: use-after-free of mw_msg in session_del_msg_entries hash |
| 2195709-1 | 4-Minor | BT2195709 | TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system. |
Carrier-Grade NAT Issues
| ID Number | Severity | Links to More Info | Description |
| 1128429-9 | 4-Minor | BT1128429 | Rebooting one or more blades at different times may cause traffic imbalance results High CPU |
Traffic Classification Engine Issues
| ID Number | Severity | Links to More Info | Description |
| 2141109-2 | 1-Blocking | BT2141109 | The URL categorisation daemon's DNS cache is never refreshed |
Device Management Issues
| ID Number | Severity | Links to More Info | Description |
| 942521-10 | 3-Major | BT942521 | Certificate Managers are unable to move certificates to BIG-IP via REST |
| 717174-8 | 3-Major | BT717174 | WebUI shows error: Error getting auth token from login provider★ |
| 2187185-1 | 3-Major | BT2187185 | BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests |
Protocol Inspection Issues
| ID Number | Severity | Links to More Info | Description |
| 2144053-1 | 3-Major | IPS hitless upgrade results in TMM clock advance★ | |
| 1069977-4 | 3-Major | BT1069977 | Repeated TMM SIGABRT during ips_flow_process_data |
In-tmm monitors Issues
| ID Number | Severity | Links to More Info | Description |
| 1019261-7 | 3-Major | BT1019261 | In-TMM HTTPS monitor with SSL Profile set to None does not use serverssl profile. |
SSL Orchestrator Issues
| ID Number | Severity | Links to More Info | Description |
| 2181633-1 | 3-Major | BT2181633 | Large BIG-IP SSL Orchestrator deployments can cause tmm crash |
| 2138273-3 | 3-Major | BT2138273 | Named service fails to start after an upgrade due to unsupported attributes in the named.conf file★ |
| 1589269-4 | 3-Major | BT1589269 | The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★ |
F5OS Messaging Agent Issues
| ID Number | Severity | Links to More Info | Description |
| 1690005-3 | 3-Major | BT1690005 | Masquerade Mac is not removed when F5OS is rebooted |
Known Issue details for BIG-IP v21.0.x
995877-3 : Edge Client 'Save Password'' checkbox not visible when 'Allow Password Caching' method is 'memory'
Links to More Info: BT995877
Component: Access Policy Manager
Symptoms:
The 'Save Password' checkbox is not displayed.
Conditions:
-- 'Allow Password Caching' is selected in the connectivity profile.
-- The 'Allow Password Caching' method is 'memory'.
-- From the Edge Client, access the virtual server.
Impact:
The 'Save Password' option does not exist on the logon page.
Workaround:
Use the 'disk' option in 'Allow Password Caching' instead of 'memory'.
978953-6 : The value of the sys db variable vlan.backplane.mtu intermittently out-of-sync with the value of the MTU of the kernel interface tmm_bp during the initial boot up
Links to More Info: BT978953
Component: Local Traffic Manager
Symptoms:
During the initial boot of the device the MTU of the tmm_bp kernel interface is out-of-sync with the value of sys db vlan.backplane.mtu as well as out-of-sync with the MTU displayed by the following command:
tmsh show /net vlan all-properties -hidden.
tmsh list net vlan tmm_bp all-properties -hidden.
Additionally, running the following command:
modify sys db vlan.backplane.mtu value <some value> (within the range accepted), and saving the configuration change does not last through a reboot.
Conditions:
This issue occurs on the first boot intermittently.
Impact:
When the values are seen at non-sync, after the modification of the backplane vlan mtu and saving the config, changing the mtu config value does not last through a reboot.
Workaround:
Rebooting the device resolves the issue
977953-8 : Show running config interface CLI could not fetch the interface info and crashes the imi
Links to More Info: BT977953
Component: TMOS
Symptoms:
The confd command 'show running-config' does not display interface information if nsm and bgpd are the only processes running.
If you run 'show running-config interface', imi crashes.
Conditions:
1. nsm and bgpd are the daemons running.
2. Run the "show running-config" command
Impact:
Imish cannot retrieve interface information from the show running-config command.
Workaround:
* Enable OSPF. For example,
# tmsh modify /net route-domain 0 routing-protocol add { BGP OSPFv3 }
# ps -ef | egrep -i ospf
root 11954 4654 0 11:25 ? S 0:00 ospf6d%0
976853-3 : SNAT pool traffic-group setting may override non-floating self IP's traffic-group
Links to More Info: BT976853
Component: Local Traffic Manager
Symptoms:
A non-floating self IP fails to respond to ARP on the standby system.
Conditions:
An LTM SNAT translation address has been created which matches a non-floating self IP on the system, and the SNAT is configured in a floating traffic group.
Impact:
A standby device does not respond to ARP requests for floating IP addresses. If a SNAT is configured on the same IP as a non-floating self-ip on the standby, ARP responses will be disabled for that self-ip.
Even after deleting the snat, or configuring it for another IP, ARP response for that self-ip will remain disabled.
The effect of this will be that other IP devices will be unable to communicate with the self-ip after the ARP entry times out.
For example:
-- BIG-IP does not respond to ARP requests for the non-floating self-ip
-- ConfigSync no longer working (if the affected self IP is the ConfigSync address)
-- Health check traffic fails
Note that simply deleting the SNAT translation will not restore service to the self-ip.
Workaround:
Delete the SNAT address, and then move the self-ip back to the non-floating traffic group, and disable and re-enable the arp setting by creating a virtual-address with the same IP in the non-floating traffic-group, and then deleting it.
tmsh create ltm virtual-address <self-ip> arp enabled traffic-group traffic-group-local-only
tmsh modify ltm virtual-address <self-ip> arp disabled
tmsh delete ltm virtual-address <self-ip>
Alternatively, after deleting the SNAT translation, reboot the device (or at least restart tmm). When using this approach on multi-blade chassis devices, all blades need to be restarted.
967769-5 : During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks
Links to More Info: BT967769
Component: TMOS
Symptoms:
Tmm crashes and restarts. The following panic message is found in /var/log/tmm:
notice panic: ../dev/hsb/if_hsb.c:6129: Assertion "HSB lockup, see ltm and tmm log files" failed.
Conditions:
-- Some error or glitch is detected on the high-speed bus (HSB).
-- Software commands a reset of the HSB and interface hardware.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
967353-10 : HTTP proxy should trim spaces between a header field-name and colon in its downstream responses.
Links to More Info: BT967353
Component: Local Traffic Manager
Symptoms:
Client receives no response along with a connection reset by the BIG-IP system.
Conditions:
-- HTTP profile is enabled on the BIG-IP system.
-- Server sends HTTP response with one or more header field names separated with the trailing colon by a space.
Impact:
HTTP responses that should be delivered to the client by the proxy are not being sent out.
Workaround:
None
942521-10 : Certificate Managers are unable to move certificates to BIG-IP via REST
Links to More Info: BT942521
Component: Device Management
Symptoms:
You cannot upload a cert/key via the REST API if you are using a certificate manager account
Conditions:
-- Using the REST API to upload a certificate and/or key
-- User is logged in as a Certificate Manager
Impact:
Unable to upload certificates as Certificate Manager
Workaround:
Use admin account instead of using Certificate Manager account to upload certs and keys
941961-9 : Upgrading system using WAM TCP profiles may prevent the configuration from loading
Links to More Info: BT941961
Component: TMOS
Symptoms:
If a BIG-IP is on version 13.1.0 through 15.1.x and has profiles in use that use wam-tcp-wan-optimized and/or wam-tcp-lan-optimized as parent profiles, then when the configuration is upgraded to 16.0.0, the configuration fails to load, with an error similar to:
err mcpd[10087]: 01020036:3: The requested parent profile (/Common/wam-tcp-wan-optimized) was not found.
On devices that are provisioned with not just the LTM module this may lead to an out of memory condition as the config load failure prevents memory provisioning completing leaving too little 4KB page (host) memory and too much huge page memory.
If suffering memory pressure then management access to device will be sluggish or not possible.
Conditions:
-- Upgrading from version 13.1.0 through 15.1.x.
-- Using profiles derived from wam-tcp-wan-optimized and/or wam-tcp-lan-optimized.
Impact:
Configuration does not load.
Workaround:
Remove these profiles and adjust the configuration elements that use them accordingly. If it is difficult to work on the device it may be necessary to rollback to earlier version and make changes there. Usually it would be better then to delete newer software volume and reinstall it at which point the modified config will be copied across and installed on newer volume.
Here are two examples:
-- Copy the definition of 'wam-tcp-wan-optimized' from /defaults/wam_base.conf into /config/bigip.conf, and then reload the configuration.
-- Change the references to wam-tcp-wan-optimized to something else in your config file (e.g., tcp-wan-optimized), and then reload the configuration.
937665-4 : Relaystate in SLO request results in two Relaystates in SLO Response
Links to More Info: BT937665
Component: Access Policy Manager
Symptoms:
When BIG-IP APM acts as the SAML IdP and receives a redirect binding single logout (SLO) request that contains a relaystate, the BIG-IP APM generates an SLO response that contains two relaystates.
Conditions:
-- BIG-IP APM configured as IdP
-- Redirect binding SLO request contains a relaystate
Impact:
SLO processing on SP may not work.
Workaround:
None.
936777-10 : Old local config is synced to other devices in the sync group.
Links to More Info: BT936777
Component: Global Traffic Manager (DNS)
Symptoms:
Newly added DNS/GTM device may sync old local config to other devices in the sync group.
Conditions:
Newly added DNS/GTM device has a more recent change than other devices in the sync group.
Impact:
Config on other DNS/GTM devices in the sync group are lost.
Workaround:
You can use either of the following workarounds:
-- Make a small DNS/GTM configuration change before adding new devices to the sync group.
-- Make a small DNS/GTM configuration change on the newly added device to re-sync the correct config to other DNS/GTM devices.
932553-10 : An HTTP request is not served when a remote logging server is down
Links to More Info: BT932553
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.
Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.
Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.
Workaround:
None.
929173-9 : Watchdog reset due to CPU stall detected by rcu_sched
Links to More Info: BT929173
Component: TMOS
Symptoms:
Rcu_sched detected CPU stall, which can cause vCMP host reboot. The device reboots without core and records "Host Watchdog timeout."
Typically there will logs in kern.log similar to:
err kernel: : [526684.876928] INFO: rcu_sched detected stalls on CPUs/tasks: ...
Conditions:
Host undergoing a watchdog reset in a vCMP environment.
Impact:
CPU RCU stalls and host watchdog reboots
928665-7 : Kernel nf_conntrack table might get full with large configurations.
Links to More Info: BT928665
Component: TMOS
Symptoms:
Linux host connections are unreliable, and you see warning messages in /var/log/kern.log:
warning kernel: : [182365.380925] nf_conntrack: table full, dropping packet.
Conditions:
This can occur during normal operation for configurations with a large number of monitors, for example, 15,000 or more active entries.
Impact:
Monitors are unstable/not working at all.
Workaround:
1. Modify /etc/modprobe.d/f5-platform-el7-conntrack-default.conf
increasing the hashsize value:
options nf_conntrack hashsize=262144
2. Save the file.
3. Reboot the system.
928445-11 : HTTPS monitor is down when server_ssl profile cipher string is configured to TLSv1_2
Links to More Info: BT928445
Component: Local Traffic Manager
Symptoms:
HTTPS monitor is down when the Server SSL profile associated with the monitor utilises a cipher string containing a keyword such as '!TLSv1_1' or '!TLSv1_2' to disable TLS protocol version.
A configured cipher string, such as TLSv1_2 or TLSv1_1 is rejected by OpenSSL.
Conditions:
-- Pool member is attached to the HTTPS monitor.
-- HTTPS monitor is configured with a Server SSL profile.
-- Server SSL profile is configured with cipher string containing a keyword such as '!TLSv1_2' and/or '!TLSv1_1' to disable TLS protocol version.
Impact:
Pool status is down.
Workaround:
-- Enable 'in-tmm' monitoring.
-- Use the 'Options List' setting available in the Server SSL profile to disable TLS protocol version instead of cipher string.
-- Use the same cipher string with cipher group / cipher rule that is attached to the SSL profile.
923745-8 : Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition
Links to More Info: BT923745
Component: TMOS
Symptoms:
A device reboot occurs upon sending a Ctrl-Alt-Del signal to the console of a BIG-IP Virtual Edition (VE) virtual machine.
Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console.
This signal may be sent in different ways according to the interface used to connect to the console of the BIG-IP virtual machine.
Impact:
Accidental reboots of the BIG-IP VE instance are possible. You should not reboot a BIG-IP VE instance using Ctrl-Alt-Del.
Workaround:
To disallow the effect of this key chord, run the following command from the advanced shell (bash):
systemctl mask ctrl-alt-del.target
921069-7 : Neurond cores while adding or deleting rules
Links to More Info: BT921069
Component: TMOS
Symptoms:
Neurond cores if it receives error while adding or deleting rules in neuron hardware.
Conditions:
Adding or deleting rules in neuron hardware
Impact:
Neurond cores
Workaround:
None
919917-9 : File permission errors during bot-signature installation
Links to More Info: BT919917
Component: Application Security Manager
Symptoms:
When you install Bot-Sig IM file through LU, /var/log/ltm shows file permission errors.
Cannot open lock file (/var/run/config_lock), permission denied.
Cannot open command history file (/root/.tmsh-history-root), Permission denied : framework/CmdHistoryFile.cpp, line 92.
Conditions:
Installing bot-signature.
Impact:
If the BIG-IP device is rebooted, or the mcpd process is restarted, following an automatic bot-signature installation, without the config first being saved, the bot-signature installation will be reverted.
Workaround:
Save the BIG-IP configuration manually after the automatic bot-signature update has completed.
912293-9 : Persistence might not work properly on virtual servers that utilize address lists★
Links to More Info: BT912293
Component: Local Traffic Manager
Symptoms:
-- Connections to the virtual server might hang.
-- Increased tmm CPU utilization. This can occur after upgrading.
Conditions:
-- A virtual server is configured with a traffic-matching-criteria that utilizes a source-address-list and/or destination-address-list.
-- The virtual server utilizes certain persistence one of the following persistence types:
+ Source Address (but not hash-algorithm carp)
+ Destination Address (but not hash-algorithm carp)
+ Universal
+ Cookie (only cookie hash)
+ Host
+ SSL session
+ SIP
+ Hash (but not hash-algorithm carp)
Impact:
-- High tmm CPU utilization.
-- Stalled connections.
Workaround:
Enable match-across-virtuals in the persistence profile.
Note: Enabling match-across-virtuals might affect the behaviour of other virtual servers in the configuration that utilise persistence.
905477-9 : The sdmd daemon cores during config sync when multiple devices configured for iRules LX
Links to More Info: BT905477
Component: Local Traffic Manager
Symptoms:
The iRules LX workspaces belong on only one device in a Device Service Cluster (DSC) (config sync device-group). If you have the same iRules LX workspace configured on multiple devices and then perform a config sync operation, the sdmd daemon cores.
Conditions:
-- Multiple devices configured with the same iRules LX workspace in a DSC.
-- Change one of the devices such that the configuration requires a config sync.
-- Perform the config sync.
Impact:
The sdmd daemon cores. Although having multiple devices configured with the same iRules LX workspace is an incorrect configuration, sdmd should not core.
Workaround:
When the iRules LX workspace is correctly configured, i.e., on only one device in a DSC, there is no need to config sync, so this issues does not occur.
902445-6 : ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation
Links to More Info: BT902445
Component: Application Security Manager
Symptoms:
ASM event logging stops working.
Conditions:
This can occur during normal ASM operation. It occurs after ASM executes 'No space in shmem' error disconnection mitigation, and this error is logged.
Impact:
ASM Policy Event Logging stop working; new event is not saved.
Workaround:
Restart asmlogd and pabnagd:
pkill asmlogd
pkill pabnagd
898389-9 : Traffic is not classified when adding port-list to virtual server from GUI
Links to More Info: BT898389
Component: Local Traffic Manager
Symptoms:
Traffic is not matching to the virtual server.
Conditions:
Using the GUI to configure traffic-matching-criteria by adding port-list to the virtual server.
Impact:
Traffic loss.
Workaround:
Creating traffic-matching-criteria from the command line
root@(localhost)(cfg-sync Standalone)(Active)(/Common)(tmos)# create ltm traffic-matching-criteria tmc_name_here destination-address-inline <IP ADDR>%10 route-domain <Route domain name>
893161-3 : Internal request to volatile.html used for cookie transport in Portal Access is sometime rewritten
Links to More Info: BT893161
Component: Access Policy Manager
Symptoms:
Request to volatile.html gets rewritten which reaches the backend server causing error responses from backend server.
Conditions:
Re-definition of XMLHttpREquest.prototype.open in the web application.
Impact:
Error response from the back end server since volatile.html is internal to Portal Access
Workaround:
Custom iRule, there is no generic irule but it can be implemented depending on the web application requirement.
Sample iRule:
XXXXX is web application path
#
# workaround for rewritten request for /volatile.html
# (remove link to opener if opener is full webtop)
#
when REWRITE_REQUEST_DONE {
if {
[HTTP::path] ends_with "XXXXX"
} {
# log "URI=([HTTP::path])"
# Found the file to modify
REWRITE::post_process 1
set do_fix 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists do_fix]} {
unset do_fix
set str {if(typeof(F5_flush)!=='function')}
set strt [string first $str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace 0 $strlen {
if (window.opener && window.opener.name === 'F5_Opener') window.opener=null;
}
}
}
886045-9 : Multi-NIC instances fail to come up when trying to use memory-mapped virtio device
Links to More Info: BT886045
Component: Local Traffic Manager
Symptoms:
Multi-NIC instances fail to come up while using memory-mapped virtio device.
Running the command 'lspci -s <pci-id> -vv' results in the 'region' field reporting 'Memory at xxxxx'.
Conditions:
TMM crashes as soon as the BIG-IP system tries to come up.
Impact:
The BIG-IP system fails to attach to the underlying virtio devices.
Workaround:
Switch to the sock driver by overriding tmm_init.tcl.
For instructions on how to enable the sock driver, see the workaround in K74921042: BIG-IP VE may fail to process traffic after upgrading the VMware ESXi 6.7 host to Update 2 (or later), available at https://support.f5.com/csp/article/K74921042.
883149-10 : The fix for ID 439539 can cause mcpd to core.
Links to More Info: BT883149
Component: TMOS
Symptoms:
Mcpd cores during config sync.
Conditions:
This occurs on rare occasions when the device transitions from standby to active, and the connection between the BIG-IP peers stalls out.
Impact:
Mcpd cores. Traffic disrupted while mcpd restarts.
Workaround:
None
881937-7 : TMM and the kernel choose different VLANs as source IPs when using IPv6.
Links to More Info: BT881937
Component: Local Traffic Manager
Symptoms:
IPv6 traffic generated from the host, either from a host daemon, monitors, or from the command line, can use a MAC and IPv6 source address from different VLANs.
Conditions:
-- Multiple VLANs configured with IPv6 addresses.
-- Multiple routes to the same destination, either the same or more specific, default routes, etc., that cover the traffic destination.
-- Changes are made to routes that cause the traffic to the destination to shift from one VLAN and gateway to another. This can be typically observed with dynamic routing updates.
- The db key snat.hosttraffic is set to disable.
Impact:
Traffic to the destination may fail because the incorrect source IPv6/MAC address is used, which might cause monitor traffic to fail.
Workaround:
Tmsh list sys db snat.hosttraffic
tmsh modify sys db snat.hosttraffic value enable
tmsh save sys config
870349-6 : Continuous restart of ntlmconnpool after the license reinstallation★
Links to More Info: BT870349
Component: TMOS
Symptoms:
The ntlmconnpool process continuously restarts after reinstalling the license. The system reports a message in the BIG-IP console:
Re-starting ntlmconnpool.
The BIG-IP may show as 'Disconnected', and 'TMM outbound listener not yet created' messages may be present in /var/log/ltm.
Conditions:
This occurs when you upgrade your license such that the new license changes the number of available TMMs.
Impact:
The system requires a reboot and reports a ‘Re-starting ntlmconnpool’ message continuously in the BIG-IP console.
Workaround:
To resolve the issue, it is necessary to reboot. Once the system restarts, it operates as expected.
869541-6 : Series of unexpected <aborted> requests to same URL
Links to More Info: BT869541
Component: Access Policy Manager
Symptoms:
Series of unexpected <aborted> requests to same URL
Conditions:
Web-app using special code pattern in JavaScript.
For example:
loc = window.location;
obj = {}
for (i in loc) {
obj[i] = loc[i];
}
Impact:
Page load is aborted
Workaround:
Following iRule can be used with customized SPECIFIC PAGE_URL value:
when REWRITE_REQUEST_DONE {
if {
[HTTP::path] ends_with "SPECIFIC_PAGE_URL"
} {
# log "URI=([HTTP::path])"
# Found the file we wanted to modify
REWRITE::post_process 1
set do_fix 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists do_fix]} {
unset do_fix
set strt [string first {<script>try} [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt 0 {
<script>
(function () {
var dl = F5_Deflate_location;
F5_Deflate_location = function (o) {
if (o.F5_Location) Object.preventExtensions(o.F5_Location)
return dl(o);
}
})()
</script>
}
}
}
}
869121-6 : Logon Page configured after OAuth client in access policy VPE, get error message Access policy evaluation is already in progress for your current session
Links to More Info: BT869121
Component: Access Policy Manager
Symptoms:
When 'Logon Page' agent is configured after 'OAuth client' in access policy VPE, you see an error message that says 'Access policy evaluation is already in progress for your current session'
Conditions:
In access VPE, Logon page after OAuth client agent in standard customization type.
Impact:
Cannot process further to reach resources.
Workaround:
Try to configure the access policy in Modern customization if it's not already configured that way.
When message box configured after OAuth client and observing the same above Access policy evaluation error message
Workaround:
Use a 'Logon Page' agent instead of the 'Message Box' agent and configure it such as:
all fields Type will be set to 'none'
message for the users will be mentioned in the 'Form Header text' field
Logon Button value will be changed from 'Logon' to 'Continue'
This should simulate exactly the look and feel of a message box but will prevent the issue from happening.
868801-6 : BIG-IP still sends STARTTLS if the 'No encryption' SNMP option is enabled
Links to More Info: BT868801
Component: Application Visibility and Reporting
Symptoms:
The SMTP 'No Encryption' configuration option is not honored by the BIG-IP device.
Conditions:
The 'No Encryption' option is selected under the SMTP configuration object.
Impact:
BIG-IP disregards its SMTP configuration and attempts to initiate TLS.
Workaround:
None
867985-9 : LTM policy with a 'shutdown' action incorrectly allows iRule execution
Links to More Info: BT867985
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide manipulation tools over a connection with an LTM policy and/or iRule. LTM policy takes precedence over iRules and has an option to shutdown a connection based on satisfied conditions. When a connection is closing, an iRule should not be executed under the same conditions.
Conditions:
-- The BIG-IP system has a virtual server with an LTM policy and an iRule.
-- The LTM policy has action 'shutdown connection' under certain conditions.
-- The iRule has an event which is triggered under the same conditions.
Impact:
The iRule is executed before the connection is being reset.
Workaround:
None.
857769-6 : FastL4+HTTP or FastL4+Hash-Persistence virtual servers do not work correctly in DSR mode.
Links to More Info: BT857769
Component: Local Traffic Manager
Symptoms:
Given a long-lived TCP connection that can carry multiple client requests (for example, but not limited to, HTTP requests), the BIG-IP system fails to forward requests after the forty-eighth one.
The client will try re-transmitting the answered request, but the BIG-IP system will persist in dropping it.
Conditions:
This issue occurs when all of the following conditions are met:
1) The virtual server uses the FastL4 profile.
2) The virtual server also uses the HTTP or Hash-Persistence profiles.
3) The virtual server operates in DSR (Direct Server Return) mode (also known as N-Path).
Impact:
The BIG-IP system fails to forward traffic.
Workaround:
Do not use the HTTP or Hash-Persistence profiles with a FastL4 virtual server operating in DSR mode.
Note: It is fine to use an iRule that calls hash persistence commands (for example, "persist carp [...]") as long as the Hash-Persistence profile is not associated to the virtual server. This technique will allow you to persist on a hash based on L4 information that you can extract at CLIENT_ACCEPTED time. For example, the following iRule correctly persists a specific client socket to a pool member in a FastL4 DSR configuration:
when CLIENT_ACCEPTED {
persist carp [IP::client_addr]:[TCP::client_port]
}
851837-7 : Mcpd fails to start for single NIC VE devices configured in a trust domain
Links to More Info: BT851837
Component: TMOS
Symptoms:
Single NIC BIG-IP Virtual Edition (VE) devices configured in a trust domain (e.g., in high availability (HA)) cannot reload a running configuration when restarted and/or when mcpd fails to load the config, and reports a validation error:
err mcpd[25194]: 0107146f:3: Self-device config sync address cannot reference the non-existent Self IP ([IP ADDR]); Create it in the /Common folder first.
Conditions:
Single NIC VE devices configured in a trust domain (e.g., HA)
Impact:
The mcpd process fails to start, and the configuration does not load.
Workaround:
Manually copy and paste the self IP configuration snippet into the /config/bigip_base.conf file:
1. Connect to the CLI.
2. Edit bigip_base.conf, and add the following:
net self self_1nic {
address 10.0.0.1/24
allow-service {
default
}
traffic-group traffic-group-local-only
vlan internal
}
Note: replace 10.0.0.1 with the IP indicated in the error message
3. Save the changes and exit.
4. Load the configuration using the command:
tmsh load sys config
5. If APM or ASM is provisioned/configured, then also restart services with this command:
bigstart restart
824953-1 : The sFlow sample collection for VLAN does not work with VLAN groups
Links to More Info: BT824953
Component: TMOS
Symptoms:
The sFlow FLOW packets containing traffic samples for a VLAN are not generated and not sent to the receiver, although CNTR telemetry packets are sent.
Conditions:
-- The VLAN is a member of a VLAN group.
-- The VLAN has sFlow packet sampling configured and enabled.
Impact:
No traffic samples are available from the VLANs that are part of VLAN groups.
Workaround:
Although there is no workaround for VLANs that are part of VLAN groups, the sFlow traffic samples work with VLANs that are not part of VLAN groups.
824437-11 : Chaining a standard virtual server and an ipother virtual server together can crash TMM.
Links to More Info: BT824437
Component: Local Traffic Manager
Symptoms:
TMM crashes with a SIGFPE and restarts. The TMM logs contain the following panic message:
Assertion "xbuf_delete_until successful" failed.
Conditions:
This issue occurs when the following conditions are met:
-- The system has been configured with a standard virtual server and an Any IP (ipother) virtual server chained together. This can be done explicitly using an iRule that features the 'virtual' command to connect the two virtual servers, or implicitly with certain APM configurations.
-- The pool member on the server-side asks this specific virtual server configuration on the BIG-IP system to retransmit data.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Ensure the target virtual server in the chain configuration does not use the ipother profile.
821589-7 : DNSSEC does not insert NSEC3 records for NXDOMAIN responses
Links to More Info: BT821589
Component: Global Traffic Manager (DNS)
Symptoms:
DNSSEC does not insert NSEC3 records for NXDOMAIN responses.
Conditions:
-- "process-xfr yes" is set for the dns profile associated with the listener;
And
-- There is no "Zone Transfer Clients" nameserver configured for that zone.
And
-- There is no wideip configured.
Impact:
DNSSEC does not respond NSEC3 for non-existent domain.
Workaround:
1. Change this setting for dns profile from "process-xfr yes" to "process-xfr no";
Or
2. Add a nameserver for "Zone Transfer Clients" of that zone.
Or
3. Add a wideip.
812693-8 : Connection in FIN_WAIT_2 state may fail to be removed
Links to More Info: BT812693
Component: Local Traffic Manager
Symptoms:
If a connection that has a fully closed client-side, but a server-side still in FIN_WAIT_2, receives a SYN matching the same connflow, the idle time is reset. This can result in the fin-wait-2-timeout never being reached. The SYN will be responded to with a RST - 'TCP Closed'
Conditions:
- Client side connection has been fully closed. This may occur if a client SSL profile is in use and an 'Encrypted Alert' has been received.
- Server side has sent a FIN which has been ACK'd, but no FIN has been received from the server.
- SYN received matching the existing connflow before the FIN-WAIT-2-timeout has been reached (300 default).
Impact:
Connection may fail to be removed in a timely manner. New connection attempts are RST with 'TCP Closed'
Workaround:
You can use either of the following:
-- Ensure servers are sending FIN's so as not to leave the connection in a FIN_WAIT_2 state.
-- Mitigate the issue by lowering the FIN-WAIT-2-timeout to a smaller value, e.g., FIN-WAIT-2-timeout 10.
809089-8 : TMM crash after sessiondb ref_cnt overflow
Links to More Info: BT809089
Component: TMOS
Symptoms:
Log message that indicates this issue may happen:
session_reply_multi: ERROR: unable to send session reply: ERR_BOUNDS
[...] valid s_entry->ref_cnt
Conditions:
-- Specific MRF configuration where a single router is configured and shared by ~500 virtual servers
-- also the traffic is routed by iRules similar to the following iRule: MR::message route peer "peer-[IP::local_addr]-[TCP::local_port]" that sends traffic to the same destination IP, 500 destination ports that could lead to a huge number of session entries owned by a single tmm.
-- High rate of session lookups with a lot of entries returned.
Note: This issue does not affect HTTP/2 MRF configurations.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
- Create unique MRF routers and assign a different MRF router to each virtual server
- Use different destination IP address
Note: while this issue seems to be a generic sessionDB issue, above provided workaround is when it is only evident that MRF config seems to be causing the issue.
804089-5 : iRules LX Streaming Extension dies with Uncaught, unspecified error event
Links to More Info: BT804089
Component: Local Traffic Manager
Symptoms:
You are using a virtual with an ilx profile generated from an iRules LX Streaming extension and observed the following error or similar.
Sep 05 09:16:52 pid[5850] Error: Uncaught, unspecified "error" event. (ETIMEDOUT)
Sep 05 09:16:52 pid[5850] at ILXFlow.emit (events.js:163:17)
Sep 05 09:16:52 pid[5850] at ILXFlowWrap.ilxFlowErrorCb [as onIlxError] (/var/sdm/plugin_store/plugins/<pluginName>/extensions/<workspaceName>/node_modules/f5-nodejs/lib/ilx_flow.js:108:10)
Conditions:
Virtual server with an ilx profile generated from an iRules LX Streaming extension. The problem is aggravated if a web-acceleration profile is configured.
Impact:
Traffic may be disrupted until the sdmd daemon has respawned another node.js process.
797573-6 : TMM assert crash with resulting in core generation in multi-blade chassis
Links to More Info: BT797573
Component: Local Traffic Manager
Symptoms:
TMM crashes while changing settings.
Conditions:
Seen on multi-blade chassis with either one of the options:
-- Running system with DoS and other traffic.
-- Create a new vCMP guest and deploy it.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
791365-8 : Bad encryption password error on UCS save
Links to More Info: BT791365
Component: TMOS
Symptoms:
When a user with the admin role attempts to save a UCS with a passphrase, the following error is encountered:
[resource-admin@inetgtm1dev:Active:Standalone] ucs # tmsh save sys ucs /var/local/ucs/test-ucs passphrase password
Saving active configuration...
Error: Bad encryption password. <=========
Operation aborted.
/var/tmp/configsync.spec: Error creating package
WARNING:There are error(s) during saving.
Not everything was saved.
Be very careful when using this saved file!
Error creating package
Error during config save.
Unexpected Error: UCS saving process failed.
Conditions:
1) Log into the BIG-IP system as a user with admin role that has Advanced Shell access.
2) Attempt to create a UCS with a passphrase.
Impact:
Unable to save UCS with a passphrase.
Workaround:
This affects users logged in with the Admin role; you will be able to create a UCS with a passphrase while logged in firstly as root user and then use 'resource-admin' user to save a ucs with passphrase.
783077-5 : IPv6 host defined via static route unreachable after BIG-IP reboot
Links to More Info: BT783077
Component: TMOS
Symptoms:
Static route unreachable after BIG-IP system reboot.
Conditions:
-- Add a static route.
-- Issue a ping (works fine).
-- Reboot the BIG-IP system.
-- Issue a ping (cannot pint the route).
Impact:
Static route exists in both kernel and LTM routing table but unable to ping the route after rebooting the BIG-IP system.
Workaround:
Workaround-1:
Delete the IPv6 route entry and recreate the route by issuing the following commands in sequence:
tmsh delete net route IPv6
tmsh create net route IPv6 network 2a05:d01c:959:8408::b/128 gw fe80::250:56ff:fe86:2065 interface internal
Workaround-2:
net route /Common/IPv6 {
gw fe80::456:54ff:fea1:ee02 <-- Change this address to unicast address from 2a05:d01c:959:8409::/64 network
interface /Common/Internal
mtu 1500
network 2a05:d01c:959:8408::b/128
}
780437-11 : Upon rebooting a VIPRION chassis provisioned as a vCMP host, some vCMP guests can return online with no configuration.
Links to More Info: BT780437
Component: TMOS
Symptoms:
It is possible for a vCMP host to scan the /shared/vmdisks directory for virtual disk files while the directory is unmounted.
As such, virtual disk files that existed before the reboot will not be detected, and the vCMP host will proceed to create them again.
The virtual disks get created again, delaying the guests from booting. Once the guests finally boot, they have no configuration.
Additionally, the new virtual disk files are created on the wrong disk device, as /shared/vmdisks is still unmounted.
Symptoms for this issue include:
-- Running the 'mount' command on affected host blades and noticing that /shared/vmdisks is not mounted.
-- Running the 'tmsh show vcmp guest' command on affected host blades (early on after the reboot) and noticing some guests have status 'installing-vdisk'.
-- Running the 'lsof' command on affected and unaffected host blades shows different device numbers for the filesystem hosting the virtual disks, as shown in the following example (note 253,16 and 253,1):
qemu-kvm 19386 qemu 15u REG 253,16 161061273600 8622659 /shared/vmdisks/s1g2.img
qemu-kvm 38655 qemu 15u REG 253,1 161061273600 2678798 /shared/vmdisks/s2g1.img
-- The /var/log/ltm file includes entries similar to the following example, indicating new virtual disks are being created for one of more vCMP guests:
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Adding.
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:0]
notice vcmpd[x]: 01510006:5: Guest (s2g1): Creating VDisk (/shared/vmdisks/s2g1.img)
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:1]
info vcmpd[x]: 01510007:6: Guest (s2g1): VS_ACQUIRING_VDISK->VS_WAITING_INSTALL
info vcmpd[x]: 01510007:6: Guest (s2g1): VS_WAITING_INSTALL->VS_INSTALLING_VDISK
notice vcmpd[x]: 01510006:5: Guest (s2g1): Installing image (/shared/images/BIGIP-12.1.2.0.0.249.iso) to VDisk (/shared/vmdisks/s2g1.img).
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:2]
Conditions:
-- VIPRION chassis provisioned in vCMP mode with more than one blade in it.
-- Large configuration with many guests.
-- The VIPRION chassis is rebooted.
-- A different issue, of type 'Configuration from primary failed validation' occurs during startup on one or more Secondary blades. By design, MCPD restarts once on affected Secondary blades, which is the trigger for this issue. An example of such a trigger issue is ID 563905: Upon rebooting a multi-blade VIPRION or vCMP guest, MCPD can restart once on Secondary blades.
Impact:
-- Loss of entire configuration on previously working vCMP guests.
-- The /shared/vmdisks directory, in its unmounted state, may not have sufficient disk space to accommodate all the virtual disks for the vCMP guests designated to run on that blade. As such, some guests may fail to start.
-- If you continue using the affected guests by re-deploying configuration to them, further configuration loss may occur after a new chassis reboot during which this issue does not happen. This occurs because the guests would then be using the original virtual disk files; however, their configuration may have changed since then, and so some recently created objects may be missing.
Workaround:
There is no workaround to prevent this issue. However, you can minimize the risk of hitting this issue by ensuring you are running a software version (on the host system) where all known 'Configuration from primary failed validation' issues have been resolved.
If you believe you are currently affected by this issue, please contact F5 Networks Technical Support for assistance in recovering the original virtual disk files.
779137-10 : Using a source address list for a virtual server does not preserve the destination address prefix
Links to More Info: BT779137
Component: Local Traffic Manager
Symptoms:
Configuring a network virtual server with a source address list causes the system to treat the virtual server as a host.
Conditions:
-- Configure a source address list on the virtual server.
-- Configure a network address for the destination of the virtual server (not an address list).
Impact:
Traffic does not flow to the virtual server as expected.
Workaround:
See K58807232
777389-10 : In rare occurrences related to PostgreSQL monitor, the mcpd process restarts
Links to More Info: BT777389
Component: TMOS
Symptoms:
Possible indications include the following:
-- Errors such as the following may appear in ltm/log:
- notice postgres[10872]: [466-1] WARNING: pgstat wait timeout.
- notice sod[27693]: 01140041:5: Killing /usr/bin/mcpd pid 7144.
- BD_CONF|ERR| ...failed to connect to mcpd after 5 retries, giving up...
- BD_CONF|ERR| ...can't read message from mcp conn, status:16908291.
- BD_MISC|CRIT| ...Received SIGABRT - terminating.
-- Errors such as the following may appear in the dwbld/log:
- Couldn't send BLOB notification - MCP err 16908291.
- Got a terminate/abort signal - terminating ...
- Terminating mcp_bridge thread.
-- Processes may restart unexpectedly, including mcpd, bd, and postgresql.
Conditions:
-- The 'mcpd' process attempts to read monitoring data from the PostgreSQL server, but no data is available.
-- A contributing factor might be that the AFM module is licensed but not configured.
Impact:
Failing to receive a monitoring response from the SQL server, MCPD goes into an infinite loop and skips the heartbeat report, resulting in its restart. While MCPD is restarting, the system is offline and does not process traffic. After restart, system operation returns to normal.
Workaround:
The chance of occurrence can be minimized by making sure that control-plane processes have sufficient memory to run efficiently.
775845-10 : Httpd fails to start after restarting the service using the iControl REST API
Links to More Info: BT775845
Component: TMOS
Symptoms:
After restarting httpd using the iControl REST API, httpd fails to start, even with a subsequent restart of httpd at the command line.
Similar to the following example:
config # restcurl -u admin:admin /tm/sys/service -X POST -d '{"name":"httpd", "command":"restart"}'
{
"kind": "tm:sys:service:restartstate",
"name": "httpd",
"command": "restart",
"commandResult": "Stopping httpd: [ OK ]\r\nStarting httpd: [FAILED]\r\n(98)Address already in use: AH00072: make_sock: could not bind to address n.n.n.n:n\nno listening sockets available, shutting down\nAH00015: Unable to open logs\n"
}
config # tmsh restart sys service httpd
Stopping httpd: [ OK ]
Starting httpd: [FAILED]
Conditions:
Restarting httpd service using iControl REST API.
Impact:
Httpd fails to start.
Workaround:
To recover from the failed httpd state, you can kill all instances of the httpd daemon and start httpd:
killall -9 httpd
tmsh start sys service httpd
760355-8 : Firewall rule to block ICMP/DHCP from 'required' to 'default'★
Links to More Info: BT760355
Component: Advanced Firewall Manager
Symptoms:
If a firewall is configured on the management port with an ICMP rule, after upgrading to v14.1.x or later, the ICMP rule does not work.
Conditions:
- Firewall is configured on the management port.
- Firewall is configured with an ICMP rule to block.
- Firewall is configured with an ICMP rule to allow.
Impact:
ICMP packets cannot be blocked with a firewall rule to drop on the management port. ICMP packets are allowed from the management port and will not increase the counter even if explicitly allowed by a rule.
Workaround:
Run the following commands after upgrading to v14.1.x or later from earlier versions.
# /sbin/iptables -N id760355
# /sbin/iptables -I INPUT 1 -j id760355
# /sbin/iptables -A id760355 -i mgmt -p icmp --icmp-type 8 -s 172.28.4.32 -j DROP
759258-10 : Instances shows incorrect pools if the same members are used in other pools
Links to More Info: BT759258
Component: TMOS
Symptoms:
Monitor 'Instances' tab shows incorrect pools if the same members are used in other pools.
Conditions:
Steps to Reproduce:
1. Create custom monitor or use system default.
2. Assign that monitor to a test pool.
3. Navigate to Local Traffic :: Monitors, click the test monitor, then select the Instances tab.
Impact:
The test pool is displayed, as well any other pools that use the same member or members (but with other monitors assigned).
Workaround:
None.
758491-8 : When using NetHSM integration, after upgrade to 14.1.0 or later (or creating keys using fipskey.nethsm), BIG-IP cannot use the keys
Links to More Info: BT758491
Component: Local Traffic Manager
Symptoms:
For Thales:
The ltm/log shows SSL handshake failures with similar lines (this is for Diffie-Hellman Key Exchange):
-- warning bigip1 tmm1[28813] 01260013 SSL Handshake failed for TCP 192.0.2.1:5106 -> 192.0.2.200:5607
-- warning bigip1 tmm1[28813] 01260009 Connection error: ssl_hs_vfy_sign_srvkeyxchg:13583: sign_srvkeyxchg (80)
-- debug bigip1 tmm1[28813] 01260036 FIPS acceleration device error: fips_poll_completed_reqs: req: 4 status: 0x1 : Cancel
-- err bigip1 pkcs11d[26259] 01680002 Key table lookup failed. error.
After enabling pkcs11d debug, the pkcs11d.debug log shows:
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute class CKO_PRIVATE_KEY attribute CKA_CLASS
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute type CKA_CLASS matches
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute class CKO_PRIVATE_KEY attribute CKA_ID
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute type CKA_ID does not match <===
For Safenet:
-- warning tmm1[17495]: 01260009:4: Connection error: ssl_hs_vfy_sign_srvkeyxchg:13544: sign_srvkeyxchg (80)
-- warning tmm1[17495]: 01260013:4: SSL Handshake failed for TCP 10.1.1.11:6009 -> 10.1.1.201:443
-- err pkcs11d[5856]: 01680002:3: Key table lookup failed. error.
Conditions:
1. Keys were created on earlier versions of BIG-IP software, no matter if using tmsh (Safenet) or using fipskey.nethsm (Thales, Safenet) and the device was upgraded to 14.1.0 or later.
2. Keys were created on BIG-IP v14.1.0 or later directly, using fipskey.nethsm (Thales). For Safenet, fipskey.nethsm was deprecated in 14.0.0.
Impact:
SSL handshake failures.
Workaround:
There are two workarounds:
-- Re-create the keys using tmsh command.
IMPORTANT: This workaround is suitable for deployments that are new and not in production.
-- Re-import the keys from nethsm using:
tmsh install sys crypto key <key_label> from-nethsm
You can find the key_label here:
-- The rightmost string in the output of the Thales command:
nfkminfo -l
-- The string after label= in the 'cmu list' command for Safenet.
751540-8 : GTM Sync group not syncing properly with multiple self IP addresses configured on one VLAN but not all configured for GTM server
Links to More Info: BT751540
Component: Global Traffic Manager (DNS)
Symptoms:
GTM changes in some devices are not synced to other GTM-configured devices in the same syncgroup.
Conditions:
-- There are multiple self IP addresses configured on one VLAN.
-- Some, but not all, self IP addresses are configured for GTM server.
Impact:
GTM Sync group not syncing properly.
Workaround:
Configure all self IP addresses in the syncgroup for GTM server.
751451-7 : When upgrading to v14.0.0 or later, the 'no-tlsv1.3' option is missing from HTTPS monitors automatically created server SSL profiles
Links to More Info: BT751451
Component: Local Traffic Manager
Symptoms:
If there are HTTPS monitor objects that were created using BIG-IP software v12.x, when the BIG-IP is upgraded directly to v14.0.0 or later, the operation automatically creates server SSL profiles for the HTTPS monitors as needed. Those server SSL profile objects do not have 'no-tlsv1.3' included in their 'options' configuration.
Conditions:
-- Having HTTPS monitors configured in v12.x before upgrading.
-- Directly upgrading from v12.x to v14.0.0 or later
Impact:
TLSv1.3 gets enabled on the server SSL profiles.
Workaround:
-- To avoid this issue, upgrade from v12.x to v13.x, and then upgrade to v14.0.0 or later
-- To mitigate this issue, modify the affected profile to disable TLSv1.3.
745645-5 : Portal Access does not rewrite the script element with textNode children
Links to More Info: BT745645
Component: Access Policy Manager
Symptoms:
Web-application defining script element with textNode children are not rewritten by Portal Access. This can cause the web application to fail to load.
Conditions:
Web-application defining script element with textNode children which requires client-side dynamic script rewriting
Impact:
- Web application may fail to load.
- Non-rewritten HTTP request
Workaround:
Custom iRule to rewrite the content of textNode. There is no generic iRule but it can be implemented depending on the web application requirement.
745125-5 : Network Map page Virtual Servers with associated Address/Port List have a blank address.
Links to More Info: BT745125
Component: TMOS
Symptoms:
On the Local Traffic > Network Map page, some virtual servers have a blank address.
Conditions:
An address list or port list is associated with the virtual server
Impact:
The Network Map will display a blank address field.
739904-7 : /var/log/ecm log is not rotated
Links to More Info: BT739904
Component: TMOS
Symptoms:
/var/log/ecm log is not rotated.
Conditions:
Log file /var/log/ecm exists in the /var/log directory.
Impact:
Log rotate does not work. May fill disk with logs over time.
Workaround:
Use tmsh sys log-rotate command to modify the logrotate settings to add /var/log.ecm.
The syntax is:
tmsh modify sys log-rotate common-include '"
/var/log/ecm {
compress
missingok
notifempty
}"'
739475-10 : Site-Local IPv6 Unicast Addresses support.
Links to More Info: BT739475
Component: Local Traffic Manager
Symptoms:
No reply to Neighbor Advertisement packets.
Conditions:
Using FE80::/10 addresses in network.
Impact:
Cannot use FE80::/10 addressees in network.
Workaround:
None
721591-6 : Java crashes with core during with high load on REST API
Links to More Info: K000141369, BT721591
Component: TMOS
Symptoms:
Java crashes with core.
Conditions:
This is a random crash and there are no known conditions for reproducing it.
Impact:
This crash occurs randomly during normal operation and has following impact:
-- Stats are not available.
Workaround:
-- Restart the Java service with "bigstart restart restjavad" or "tmsh restart sys service restjavad".
-- Restart the BIG-IP system.
717174-8 : WebUI shows error: Error getting auth token from login provider★
Links to More Info: BT717174
Component: Device Management
Symptoms:
Occasionally, the BIG-IP Admin Utility TMUI fails to function correctly and produces the following error:
Error getting auth token from login provider.
This occurs when the BIG-IP REST Daemon restjavad fails to start up properly.
Conditions:
This error most often occurs on the first or second boot after upgrade, and more often on Virtual Edition BIG-IP platforms running on oversubscribed or slow hypervisors.
Impact:
TMUI and any other BIG-IP system components that rely on REST Workers such as: OpenID Connect key rotation discovery, portions of the TMOS Web Configuration Utility, and Guided Configuration (AGC and WGC) fail to function properly.
Workaround:
Restarting the BIG-IP REST daemons restjavad and restnoded will usually correct the problem. To do so, connect to the SSH console and issue the following two commands:
bigstart restart restjavad
bigstart restart restnoded
705869-8 : TMM crashes as a result of repeated loads of the GeoIP database
Links to More Info: BT705869
Component: Global Traffic Manager (DNS)
Symptoms:
TMM crash due to the repeated loading of the GeoIP database.
Conditions:
Repeatedly loading the GeoIP database in rapid succession.
Impact:
Traffic is disrupted while TMM restarts.
Workaround:
Avoid repeated loading of the GeoIP Database.
694765-10 : Changing the system's admin user causes vCMP host guest health info to be unavailable
Links to More Info: BT694765
Component: TMOS
Symptoms:
On the host, 'tmsh show vcmp health' does not display guest info.
The iControl REST log at /var/log/icrd contains entries similar to the following:
notice icrd_child[32206]: 01420003:5: Cannot load user credentials for user "admin" Current session has been terminated.
Conditions:
The default admin user "admin" has been changed.
Note: You changed the default admin user by following the steps in the Article K15632: Disabling the admin and root accounts using the BIG-IP Configuration utility or the Traffic Management Shell: https://my.f5.com/manage/s/article/K15632.
Impact:
Many REST APIs do not function, and functionality such as vCMP guest health that depend on REST fails.
Workaround:
Rename the default system admin back to 'admin':
tmsh modify /sys db systemauth.primaryadminuser value admin
Note: If you are using the default 'admin' account, make sure you change the password as well.
687044-9 : Tcp-half-open monitors might mark a node up or down in error
Links to More Info: BT687044
Component: Local Traffic Manager
Symptoms:
The tcp-half-open monitor might mark a node or pool member up when it is actually down, or down when it is actually up, when multiple transparent monitors within multiple 'bigd' processes probe the same IP-address/port.
Conditions:
All of the following are true:
-- There are multiple bigd processes running on the BIG-IP system.
-- There are multiple tcp-half-open monitors configured to monitor the same IP address.
-- One or more of the monitored objects are up and one or more of the monitored objects are down.
Impact:
The BIG-IP system might occasionally have an incorrect node or pool-member status, where future probes may fix an incorrect status.
Workaround:
You can use any of the following workarounds:
-- Configure bigd to run in single process mode by running the following command:
tmsh modify sys db bigd.numprocs value 1
-- Use a tcp monitor in place of the tcp-half-open monitor.
-- Configure each transparent monitor for different polling cycles to reduce the probability that an 'up' response from the IP address/port is mistakenly viewed as a response to another monitor that is currently 'down' (or vice-versa).
680804-6 : TMM restart due to delayed keep alives
Links to More Info: BT680804
Component: Advanced Firewall Manager
Symptoms:
TMM killed with SIGABRT by the SOD process that monitors all process's health. TMM misses the keep alive, hence the restart.
The stack trace shows that tmm was killed when it was waiting on a memory map (sys_mmap_obj) call.
Conditions:
The memory map call is known to take a long time to complete when the disk IO sub-system is very slow.
High IO can also be a result of memory starvation accompanied by intensive paging
Impact:
Traffic disrupted while TMM restarts.
Workaround:
This problem is not likely to persist after a TMM service restart. So no user intervention is required.
If this problem happens repeatedly, it would be required to take a look at IO Resources in use at time of the database load or reload, and see if a way to lower IO can be found.
673060-3 : SSL handshake failure with Session Ticket enabled on the backend server
Links to More Info: BT673060
Component: Local Traffic Manager
Symptoms:
SSL handshake failure occurs as a certificate is not issued (no certificate).
Conditions:
- Server SSL profile is enabled with the Session Ticket feature
- Backend server also supports Session Ticket
Impact:
- Service is disrupted because of a handshake failure.
- SSL handshake fails with no certificate issue.
Workaround:
Disable the Session Ticket feature on the Server SSL Profile or the backend server.
638863-4 : Attack Signature Detected Keyword is not masked in the logs
Links to More Info: BT638863
Component: Application Security Manager
Symptoms:
Attack Signature Detected Keyword is not masked in the logs
Conditions:
When the signature is matching a full request, and there is a sensitive keyword around the signature location, in some cases the signature appears in the logs and is not masked.
Impact:
Sensitive data may appear in the logs
Workaround:
None
637827-5 : VADC: after re-deploying a single-nic VM with multiple nics, a load can fail due to stp member 1.0
Links to More Info: BT637827
Component: TMOS
Symptoms:
The configuration fails to load with the following message:
01070523:3: No Vlan association for STP Interface Member 1.0
Unexpected Error: Loading configuration process failed.
Conditions:
In single-nic mode, the interface 1.0 exists and can be saved as a VLAN member. Upon re-deploying the virtual-machine from single nic mode to multi-nic, the 1.0 interface becomes pending and should no longer impact any configuration. However, a condition exists after a VLAN delete, where the associated (automatically created) stp member is not removed from the running config and can cause a load error.
Impact:
Load fails and requires manual intervention. Otherwise, the STP member is benign because vADC does not support STP.
Workaround:
Remove the STP interface member 1.0 and reload.
637613-10 : Cluster blade status immediately returns to enabled/green after it is disabled.
Links to More Info: K24133500, BT637613
Component: Local Traffic Manager
Symptoms:
In some scenarios, disabling a blade will result in the blade immediately returning to online.
Conditions:
This can occur intermittently under these conditions:
- 2 chassis in an HA pair configured with min-up-members (for example, 2 chassis, 2 blades each, and min-up-members=2)
- You disable a primary blade on the active unit, causing the cluster to failover due to insufficient min-up-members.
Impact:
Disabling the primary blade fails and it remains the primary blade with a status of online.
Workaround:
This is an intermittent issue, and re-trying may work. If it does not, you can configure min-up-members to a lower value or disable it completely while you are disabling the primary blade. The issue is triggered when the act of disabling the primary blade would cause the number of members to drop below min-up-members.
632553-9 : DHCP: OFFER packets from server are intermittently dropped
Links to More Info: K14947100, BT632553
Component: Local Traffic Manager
Symptoms:
With a DHCP relay virtual server, OFFER packets from DHCP server are intermittently not forwarded to the client and dropped on BIG-IP system.
Conditions:
It is not known exactly what triggers this condition, but it occurs intermittently when the DHCP relay virtual server is in use.
Impact:
Client machines joining the network do not receive DHCP OFFER messages.
Workaround:
Manually delete the serverside to force it to be recreated by the next DHCP request.
For example, if the flow to the DHCP server 10.0.66.222 is broken, issue the following tmsh command:
tmsh delete sys connection ss-server-addr 10.0.66.222 cs-server-port 67
566995-7 : bgpd might crash in rare circumstances.
Links to More Info: BT566995
Component: TMOS
Symptoms:
Under unspecified conditions and in rare cases, bgpd might crash. Although bgpd restarts right away, routing table might be impacted.
Conditions:
The conditions under which this occurs are not known.
Impact:
This might impact routing table and reachability.
Workaround:
None known.
554506-6 : PMTU discovery from the management interface does not work
Links to More Info: K47835034, BT554506
Component: TMOS
Symptoms:
Network connectivity issues to the BIG-IP management interface.
The management interface 'auto lasthop' feature (not to be confused with the auto lasthop setting on a virtual server) allows the BIG-IP to route responses to packets received on the management interface back to the MAC address of the layer-3 device that sent them, removing the need for static management-routes to be configured on the BIG-IP for communication beyond the management subnet.
The operation of the lasthop module interferes with the management interface's ability to dynamically learn Path MTU (PTMU) through ICMP unreachable messages.
Conditions:
The MTU on one section of the network path between a client device and BIG-IP management interface is lower than the BIG-IP management interface's configured MTU (for example, part of the path passes through a tunnel), and an intermediary router is sending 'ICMP unreachable, fragmentation required' packets back to the BIG-IP to instruct it to send smaller datagrams.
Impact:
Unable to complete a TLS handshake to the management interface IP, or other similar operations that require large frames.
Workaround:
BIG-IP management interface auto lasthop functionality can be disabled to allow the interface to function normally.
For more information see K52592992: Overview of the Auto Last Hop feature on the management interface, available at
https://support.f5.com/csp/article/K52592992.
527119-12 : An iframe document body might be null after iframe creation in rewritten document.
Links to More Info: BT527119
Component: Access Policy Manager
Symptoms:
Cannot use certain page elements (such as the Portal Access menu) in Google Chrome, and it appears that JavaScript has not properly initialized, and results in JavaScript errors on the following kinds of code:
iframe.contentDocument.write(html)
iframe.contentDocument.close()
<any operation with iframe.contentDocument.body>
Conditions:
-- The body of a dynamically created iframe document might be initialized asynchronously after APM rewriting.
-- Using the Chrome browser.
Impact:
Some JavaScript applications might not work correctly when accessed through Portal Access. For example, one of applications known to contain such code and fail after APM rewriting is TinyMCE editor.
Workaround:
Revert rewriting of the document.write call with a post-processing iRule.
The workaround iRule will be unique for each affected application.
469724-7 : When evaluation/demonstration features expire, features enabled by both evaluation and perpetual licenses also expire
Links to More Info: BT469724
Component: TMOS
Symptoms:
Evaluation features cause perpetual features to expire when the evaluation license expires.
Conditions:
-- Perpetual license with an evaluation/demonstration add-on feature.
-- The add-on license expires or is expired.
Impact:
When an evaluation/demonstration add-on license expires, features included in both the evaluation add-on as well as the regular, perpetual license stop working.
This behavior is covered in F5 article K4679: BIG-IP evaluation and demonstration licenses do expire :: https://support.f5.com/csp/article/K4679.
Workaround:
To work around this issue, activate the license from the command line:
When reactivating an existing license, and deactivating an expired evaluation license key, specify the base registration key and add-on (if any), and use the -i option for the expired evaluation license key in the get_dossier command.
For example, if the expired evaluation license key is ABCDEFG-ZZZZZZZ, use the following command:
get_dossier -b ABCDE-ABCDE-ABCDE-ABCDE-ABCDEFG -a ABCDEFG-ABCDEFG -i ABCDEFG-ZZZZZZZ
You can find these steps detailed in K2595: Activating and installing a license file from the command line :: https://support.f5.com/csp/article/K2595. This part in particular is required to work around this issue
464708-7 : DNS logging does not support Splunk format log
Links to More Info: BT464708
Component: Global Traffic Manager (DNS)
Symptoms:
DNS logging does not support Splunk format logging. It fails to log the events, instead logging err messages:
hostname="XXXXXXXXXXXXX.XX",errdefs_msgno="01230140:3:
Conditions:
DNS logging configured for Splunk format.
Impact:
DNS logging does not log Splunk format to HSL.
Workaround:
Use an iRule to send Splunk-formatted messages to the Splunk server.
For example:
ltm rule dns_logging_to_splunk {
when DNS_REQUEST {
set ldns [IP::client_addr]
set vs_name [virtual name]
set q_name [DNS::question name]
set q_type [DNS::question type]
set hsl [HSL::open -proto UDP -pool splunk-servers]
HSL::send $hsl "<190>,f5-dns-event=DNS_REQUEST,ldns=$ldns,virtual=$vs_name,query_name=$q_name,query_type=$q_type"
}
when DNS_RESPONSE {
set ldns [IP::client_addr]
set vs_name [virtual name]
set q_name [DNS::question name]
set q_type [DNS::question type]
set answer [DNS::answer]
set hsl [HSL::open -proto UDP -pool splunk-servers]
HSL::send $hsl "<190>,f5-dns-event=DNS_RESPONSE,ldns=$ldns,virtual=$vs_name,query_name=$q_name,query_type=$q_type,answer=\"$answer\""
}
}
349706-7 : NetworkAccess assigns 1.1.1.1 address to remote ppp endpoint APM VPN
Component: Access Policy Manager
Symptoms:
Network access sends 1.1.1.1 as X-VPN-serer-IP and Edge client reserves this IP for PPP communication with APM server.
Conditions:
-- VPN is configured on BIG-IP.
-- Edge Client/webtop is used to connect to VPN.
Impact:
If VPN is connected:
1. The user may not access the 1.1.1.1 address from the client machine.
2. if 1.1.1.1 is used as a dns server ip in Network Access configuration, DNS resolution may fail on the client machine.
Workaround:
NA
264701-9 : The zrd exits on error from bind about .jnl file error
Links to More Info: K10066, BT264701
Component: Global Traffic Manager (DNS)
Symptoms:
The zrd process exits and cannot be restarted.
Conditions:
This issue occurs when the journal is out-of-sync with the zone.
Impact:
The zrd process cannot be restarted.
Workaround:
Ensure that no one else is making configuration changes, it is recommended to make changes making changes during a maintenance window.
On a working system, perform the following steps:
1. Run command # rndc freeze $z
(Do this for all nonworking zones. Do not perform the thaw until you finish copying all reuqired files to the nonworking system.)
2. Run command # tar zcvf /tmp/named.zone.files namedb/db.[nonworking zones].
3. Run command # rndc thaw $z
On each non-working system, perform the following steps:
1. Run command # bigstart stop zrd; bigstart stop named.
2. Copy the non-working /tmp/named.zone.files from a working GTM system.
3. Run command # bigstart start named; bigstart start zrd.
Note: Before continuing, review /var/log/daemon.log for named errors, and review /var/log/gtm for zrd errors0.
Repeat these steps until all previously non-working systems are working.
On a working GTM system, run the following command:
# touch /var/named/config/named.conf.
222220-12 : Distributed application statistics are not passed correctly.
Links to More Info: K11931
Component: Global Traffic Manager (DNS)
Symptoms:
Distributed application statistics include only requests passed to its first wide IP.
For BIG-IP versions 12.0.0 and later, distributed application statistics are always zero.
Conditions:
Viewing distributed application statistics on configurations with multiple wide-IP members.
Impact:
The system does not pass statistics for requests to all wide-IP members in the distributed application.
Note: For BIG-IP versions 12.0.0 and later, the system does not pass statistics for requests to any wide-IP-members in the distributed application.
Workaround:
None
2218157-3 : IP Intelligence database load log displayed periodically
Component: Advanced Firewall Manager
Symptoms:
IP Intelligence database load log is displayed periodically in TMM log files.
Conditions:
- Configuration refers to IP intelligence feature.
- No active subscription for IP intelligence.
- IP intelligence database load fails periodically.
Impact:
TMM log files contain messages similar to:
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat
Workaround:
None.
2217677 : BIG-IP v21.0: Tunnel object exists in MCPD but missing Linux tunnel tap device, causing ioctl failure and config deployment failure
Component: TMOS
Symptoms:
- IPsec tunnel configuration deployment fails in BIG-IP v21.0.
- Tunnel object is present in MCPD, but the corresponding Linux tunnel tap device is missing.
- HA configuration synchronization fails or remains out of sync.
- Configuration reapplication fails with the error:
01070712:3: Cannot get device index for tunnel-31 in rd31 - ioctl failed: No such device
Conditions:
- BIG-IP version 21.0.x.
- IPsec tunnel configured within a non-default route domain (e.g., RD 31).
- Associated objects (self IPs, route domains, IPsec policies, traffic selectors, tunnels) are present in MCPD.
- HA environment with configuration synchronization enabled between peers.
- Repeated configurations add/delete operations or automation-driven deployments.
Impact:
Application and IPsec tunnel configuration deployment fails.
HA synchronization cannot complete successfully, leaving devices out of sync.
Workaround:
None.
2217093-3 : L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used
Links to More Info: BT2217093
Component: Local Traffic Manager
Symptoms:
On platforms without the switch (i2000/i4000) configured with multiple interfaces under a single VLAN, traffic to masquarade MAC address will be flooded to all available interfaces and will not follow FDB entries.
Conditions:
- Switchless platform (like i2000/i4000).
- Multiple interfaces configured under a single VLAN. For example:
net vlan vlan2 {
interfaces {
2.0 {
tagged
}
trunk1 {
tagged
}
}
}
- traffic to masquarade MAC is misdirected to Standby unit.
Impact:
Unnecessary flooding occurs.
Workaround:
None.
2211133-3 : ICMP error length does not follow RFC 812 guidance
Links to More Info: BT2211133
Component: Local Traffic Manager
Symptoms:
Only 8 bytes of original payload is included in ICMP error message sent from BIG-IP. RFC 1812 section 4.3.2.3 indicates systems should include as much as possible, up to 576 bytes total.
Conditions:
ICMP error message sent from BIG-IP.
Impact:
With only 8 bytes included in the ICMP error message, provides limited context for debugging. The TCP and UDP headers are truncated mid-header.
Workaround:
None.
2209157-3 : FastL4 late binding does not proxy MSS when establishing server-side connection.
Links to More Info: BT2209157
Component: Local Traffic Manager
Symptoms:
FastL4 late binding does not proxy MSS when establishing server-side connection.
Conditions:
FastL4 profile with late-binding option enabled.
Impact:
Sub-optimal connection performance.
Workaround:
MSS-overwrite option can be used to manually adjust server-side MSS.
2208821-3 : VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade★
Links to More Info: BT2208821
Component: Local Traffic Manager
Symptoms:
After upgrading BIG-IP software on a VIPRION system, the device may fail to load the configuration and enter an INOPERATIVE state. The system remains stuck during the configuration load phase, preventing normal operation.
Conditions:
1. VIPRION platform with clustered configuration.
2. Performing a BIG-IP software upgrade.
3. System attempts to load post-upgrade configuration during boot or blade role transition
Impact:
The VIPRION cluster becomes INOPERATIVE and is unable to load the configuration. Traffic is impacted as the system cannot process or pass traffic until the issue is resolved.
Workaround:
Restarting the system with a different blade set as primary, or reverting to the previously working software version, allows the configuration to load successfully. In some cases, re-attempting the upgrade after correcting the blade role transition also resolves the issue.
2208709-1 : Failure to match specific WAF signatures
Links to More Info: BT2208709
Component: Application Security Manager
Symptoms:
A signature is not matched as expected.
Conditions:
Specific configuration and traffic.
Impact:
A false negative on a specific scenario.
Workaround:
None.
2201877-3 : SCTP multihoming fails with ICMP unreachable for alternate paths.
Links to More Info: BT2201877
Component: TMOS
Symptoms:
SCTP multihoming fails with ICMP protocol unreachable for alternate paths.
Conditions:
- SCTP profile with multihoming and alternate addresses configured.
- Alternate address is a self-ip configured on a system.
Impact:
Unable to establish alternate path connection.
Workaround:
None
2201813-1 : BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection
Links to More Info: BT2201813
Component: Local Traffic Manager
Symptoms:
BIG-IP negotiates a number of concurrent streams over HTTP/2 connection per RFC requirement. It immediately enforces this limitation once the protocol is agreed and first SETTINGS frame is issued.
Conditions:
BIG-IP has a virtual with http2 profile.
A client connects to the virtual and negotiates or starts HTTP/2 connection.
Impact:
The client may send more requests than the limit set by BIG-IP over the established HTTP/2 connection and it causes the BIG-IP system to reset the extra streams. If Reset Stream Protection is enabled, it may result in the connection being shutdown by the BIG-IP system.
Workaround:
None.
2200405-3 : Live Update proxy.host value requires brackets around IPv6 Addresses
Links to More Info: BT2200405
Component: Application Security Manager
Symptoms:
Curl calls used to download Live Update files will fail if using a proxy.host with an IPv6 address that does not include brackets.
Conditions:
Live Update is configured through a proxy.host that is using IPv6 and does not include brackets around the IPv6 value.
E.g. "[IPv6]"
Impact:
Live Update necessitates an IPv6 proxy.host have brackets, while IP Reputation necessitates that it does not have brackets. This discrepancy results in one or the other continually failing when attempting to use an IPv6 proxy.host.
Workaround:
If possible, utilize a proxy.host value that is not an IPv6 Address.
2200389-1 : CDS and CDNSKEY not included in DNSX zone transfer data
Links to More Info: BT2200389
Component: Global Traffic Manager (DNS)
Symptoms:
CDS and CDNSKEY not included in DNSX zone transfer data
Conditions:
Dnssec zone with "Publish CDS/CDNSKEY" option is enabled
Impact:
Missing CDS/CDNSKEY in zone transfer
Workaround:
None
2200217-1 : DNSSEC validation failures due to missing DS records in zone transfers
Links to More Info: BT2200217
Component: Global Traffic Manager (DNS)
Symptoms:
DNSSEC validation failures occur when querying child zones despite proper DNSSEC configuration, caused by missing DS records in parent zone transfers. The issue affects child zone delegations that use nameservers located outside the child zone itself, such as external nameservers or nameservers under the parent zone. Only delegations where nameservers are within the child zone's own domain hierarchy work correctly. This breaks the DNSSEC chain of trust between parent and child zones, preventing secure DNS resolution for affected delegations.
Conditions:
- DNSSEC is enabled on both parent and child zones.
- Child zones have DS records configured in the system.
- Child zone delegations use nameservers that are either external or located under the parent zone.
-Zone transfers are being performed for the parent zone.
Impact:
DNSSEC chain of trust broken.
Workaround:
None
2200009-1 : PEM HA failover may cause traffic drops for new connections
Links to More Info: BT2200009
Component: Policy Enforcement Manager
Symptoms:
All traffic belonging to some connections established to the new Active unit immediately after a failover between PEM units could be dropped.
Conditions:
- PEM units in HA pair.
- New connections established to the new Active unit immediately after a failover.
Impact:
All traffic belonging to new connections established immediately after a failover could be dropped.
Workaround:
None
2199485-3 : Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value
Links to More Info: BT2199485
Component: Application Security Manager
Symptoms:
Import fails with error: Field 'parameter/user_input_format' may not contain the value 'openapi-array'.
Conditions:
URL level parameter configured with Parameter value type: User-input value and Data type: URI
Impact:
Import of security policy in XML format fails.
Workaround:
Manually change user_input_format from openapi-array to uri in the xml file before importing.
2199469-3 : Serverssl-use-sni not working in HTTP2 to HTTP gateway setups.
Links to More Info: BT2199469
Component: Local Traffic Manager
Symptoms:
Virtual server's 'serverssl-use-sni' setting does not work when virtual server has HTTP2 profile attached on the client-side and HTTP profile on the server-side.
Conditions:
HTTP2 to HTTP gateway config with 'serverssl-use-sni' option enabled.
Impact:
Incorrect serverssl profile might be selected when establishing server-side connection.
Workaround:
iRule can be used to select the profile based on presented SNI, for example:
when CLIENTSSL_CLIENTHELLO {
binary scan [SSL::extensions -type 0] @9a* sni
log local0. "SNI: $sni"
}
when SERVER_CONNECTED {
switch -glob [string tolower $sni] {
"foo.com" {
SSL::profile foo-serverssl
}
"bar.com" {
SSL::profile bar-serverssl
}
}
}
2198781-2 : BIG-IP high availability (HA) systems may experience an unexpected active-active state after an upgrade
Component: Local Traffic Manager
Symptoms:
Multiple HA devices become active and attempt to process traffic.
A traffic group may report "Initializing / Not Synced" while the device group reports that it is in sync.
Conditions:
This has been observed after a new installation or an upgrade.
Impact:
Multiple devices in a traffic group become active and attempt to process traffic. Devices remain in active active state.
Workaround:
To work around this issue, you can reboot or restart the sod process on the affected system.
To restart sod, perform the following procedure:
Impact of workaround: Restarting the sod process after an upgrade or reboot clears the condition. The following procedure will disrupt traffic processing and should only be performed during a maintenance window.
Log in to the BIG-IP command line.
From the terminal while logged in as root:
bigstart restart sod
Or from tmsh while logged in as admin:
restart sys service sod
2198757-3 : PEM: use-after-free of mw_msg in session_del_msg_entries hash
Links to More Info: BT2198757
Component: Policy Enforcement Manager
Symptoms:
There is a rare scenario where tmm crashes while passing PEM traffic.
Conditions:
-- PEM is licensed and enabled.
-- Policies are assigned from the PCRF. Subscriber additions and deletions are happening regularly.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
2198721 : Apmd memory leak
Links to More Info: BT2198721
Component: Access Policy Manager
Symptoms:
Apmd memory leak
Conditions:
Upgrade from 16.1.4.2 to 17.1.3 caused memory leak in the apmd process.
Impact:
Apmd memory leak is observed and has to restart services to restore the service every few days.
2198589-3 : BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client
Links to More Info: BT2198589
Component: Access Policy Manager
Symptoms:
Intermittent tunnel traffic drops when Network Access compression is enabled
Tunnel stability is restored when Compression is disabled
No client-side errors clearly indicating unsupported configuration
Admins can still enable compression via BIG-IP UI/CLI despite deprecation
Conditions:
-- BIG-IP APM with Network Access resource configured
-- Compression enabled on Network Access resource
-- Edge Client version 7.2.6 or later
-- VPN tunnel established
-- Intermittent traffic flow over the tunnel
Impact:
-- Intermittent VPN tunnel instability
-- Hard-to-diagnose issues, potentially leading to unknowingly enabling unsupported configurations
Workaround:
Disable compression in the BIG-IP Network Access config and connectivity profile config
2197321-1 : BIG-IP does not select FFDHE key share provided by the client on session resumption.
Links to More Info: BT2197321
Component: Local Traffic Manager
Symptoms:
Connection terminates if the client does not allow secure renegotiation, otherwise renegotiation occurs.
Conditions:
ClientSSL that uses FFDHEgroups and has session tickets enabled.
The client tries to resume an SSL session with an FFDHE key share that used FFDHE previously.
Impact:
Connection terminates if the client does not allow secure renegotiation, otherwise renegotiation occurs.
Workaround:
None
2197305-1 : BIG-IP generates invalid SSL key share
Links to More Info: BT2197305
Component: Local Traffic Manager
Symptoms:
SSL handshakes fail on the client due to an Illegal Parameter alert.
Conditions:
ClientSSL that mixes both FFDHE and Non-FFDHE groups and has session tickets enabled.
The client tries to resume an SSL session with a Non-FFDHE key share that used FFDHE previously.
Impact:
SSL handshake fails and the connection terminates
Workaround:
None
2197289-1 : Enabling SSH access via the GUI blocks MCPD for 90 seconds
Links to More Info: BT2197289
Component: TMOS
Symptoms:
- Disconnections from the GUI occur (no responses to color advisory probe)
- SNMP query timeouts
- iQuery interruptions
Conditions:
-- SSH access is disabled via the GUI
-- SSH access is then enabled via the GUI
Impact:
-- MCPD is blocked for 90 seconds
-- sshd service does not come up for the first 90 seconds after enabling SSH access
Workaround:
None
2196597-1 : TMM generates core when large firewall policy is attached to multiple virtual servers due to SOD watchdog timeout
Links to More Info: BT2196597
Component: Advanced Firewall Manager
Symptoms:
-- TMM processes generate core dumps (SIGABRT) when activating firewall policies with high rule counts (20,000+ rules) across multiple virtual servers (20+)
--- SOD (System Oversight Daemon) sends SIGABRT signal to TMM processes
--- Observe the ltm log "sod[10802]: 01140041:5: Killing tmm.0 pid 23754."
Conditions:
1, Deploy couple of tenants with 8 slots on each Chasis
2, Set up an HA pair (Active/Standby).
3, Provision the system with LTM, AFM, and AVR modules.
4, Create a Network Firewall policy containing approximately 20,000 rules.
5, Attach the firewall policy to a virtual server.
6, Create 20 or more virtual servers, attaching the same firewall policy to each.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable SOD Heartbeat Monitoring for all TMMs
--- tmsh modify sys daemon-ha tmm heartbeat disabled.
2195709-1 : TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.
Links to More Info: BT2195709
Component: Policy Enforcement Manager
Symptoms:
TCP fingerprinting tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.
Conditions:
- PEM tethering detection, is configured in a PEM policy rule like this one:
pem policy policy-01 {
rules {
detect-01 {
dtos-tethering {
dtos-detect enabled
report {
dest {
hsl {
publisher default-ipsec-log-publisher
}
}
}
tethering-detect enabled
}
precedence 1000
}
}
transactional enabled
}
- The subscriber connects through a Windows, Android or IoS phone, and the phone OS is recognised in the PEM "Device OS" PEM session field, for example:
Device Name Nokia_Corporation-Nokia_Lumia_710
Device OS Windows_Mobile_8
- An iRule to detect tethering is configured in the relevant virtual server, for example:
ltm rule tethering-detection {
when CLIENT_ACCEPTED {
set ip [IP::client_addr]
set tether [PEM::session info tethering detected $ip]
if {$tether eq "1"} {
log local0. "Tethering detected !"
} else {
log local0. "no tethering detected"
}
}
}
- The subscriber is tethering through the phone using a MacOS operating system.
Impact:
Tethering from a MacOS operating system is never detected.
Workaround:
None
2189993 : Upgrade from 17.5.1.3 to 21.0.0 and the config failed to load with error:01071197:3: Metacharacter '*' must be at end of the session variable name★
Links to More Info: BT2189993
Component: TMOS
Symptoms:
When upgrading BIG-IP Virtual Edition from 17.5.1.3 to 21.0.0, a configuration load error occurs:
01071197:3: Metacharacter '*' must be at end of the session variable name.
Unexpected Error: Loading configuration process failed.
Conditions:
-- APM provisioned and configured
Impact:
You are unable to complete the upgrade from v17.5.1.3 to v21.0.0
Workaround:
None
2187429-3 : TMM might crash when using MRF framework.
Links to More Info: BT2187429
Component: Service Provider
Symptoms:
TMM might crash when using MRF framework.
Conditions:
Configurations that include message routing framework.
Impact:
Traffic disrupted while tmm restarts.
2187385-3 : Brute force set to CAPTCHA also raises a violation and blocks traffic
Links to More Info: BT2187385
Component: Application Security Manager
Symptoms:
Brute force is raised, but the config is set to CAPTCHA. Brute force contributes to the violation rating, and traffic is blocked by the violation rating, instead of triggering a CAPTCHA.
Conditions:
Brute force and violation Rating threat detected are both enabled.
Impact:
CAPTCHA does not occur as expected.
Workaround:
None
2187185-1 : BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests
Links to More Info: BT2187185
Component: Device Management
Symptoms:
On BIG-IP v21.0, REST-based file download requests may fail with errors such as “attempt to read past end of file” when the client includes a Content-Range header in an HTTP GET request. This occurs when the specified byte range exceeds the actual size of the requested file.
The failure is triggered by the BIG-IP REST framework incorrectly attempting to process the Content-Range header for GET requests, resulting in an invalid file offset calculation and an EOF read condition. As a result, the REST request is terminated and the file download does not complete.
Conditions:
HTTP GET request includes a Content-Range header
The byte range specified in Content-Range exceeds the actual size of the requested file
Impact:
REST-based file downloads fail unexpectedly
Workaround:
Determine the actual size of the target file and ensure that any Content-Range header sent by the client specifies a byte range that does not exceed the file length.
Alternatively, remove the Content-Range header entirely from HTTP GET requests, as it is not required and may cause request failures.
2186625-1 : Zone transfer from dns express with dnssec enabled includes extra RRSIG
Links to More Info: BT2186625
Component: Global Traffic Manager (DNS)
Symptoms:
AXFR zone transfer includes extra RRSIG for A/AAAA records.
Conditions:
When delegated NS record includes multiple name servers.
Impact:
Extra RRSIGs added to records that do not need RRSIG.
Workaround:
None
2186185-1 : Apmd occasionally fails to process a request if SecurID agent is present
Links to More Info: BT2186185
Component: Access Policy Manager
Symptoms:
Apm logs reports errors similar to following:
apmd[32302]: 01490000:3: ApmD.cpp func: "process_apd_request()" line: 2101 Msg: Error 3 reading/parsing response from socket 1023. strerror: Too many open files, queue size 0, time since accept 0 apm 2025-11-10 09:12:49.000 -07:00 Error
apmd[32302]: 01490000:3: HTTPParser.cpp func: "readFromSocket()" line: 117 Msg: epoll_create() failed [Too many open files].
Conditions:
SecuridAuth agent is enabled
Impact:
APMD stops processing further traffic and users are denied access
Workaround:
Restart APMD using the following command:
bigstart restart aced
bigstart restart apmd
2186009-2 : Increased TX IQ size for netvsc
Links to More Info: BT2186009
Component: TMOS
Symptoms:
In some environments, during periods of high traffic, messages could build up in the TX internal queue due to xnet-DPDK being slow to inform that messages were sent. If this goes for long enough, the internal queue will fill up and become stuck.
Conditions:
1) Using xnet-DPDK driver
2) Azure or Hyper-V
3) Sustained high (multi-GB/s) traffic rate
Impact:
Internal queue gets stuck preventing BIG-IP from being able to send messages and causing traffic disruption.
Workaround:
Create '/config/tmm_init.tcl' and add the following line
ndal tx_iq_sz 1024 f5f5:f550
Afterwards, restart tmm with 'bigstart restart tmm' to apply change.
2185537-3 : Application Security Administrator role cannot edit the General Settings of parent policies from the GUI
Links to More Info: BT2185537
Component: Application Security Manager
Symptoms:
When attempting to edit a parent ASM policy through the GUI, options under the General Settings tab will be greyed out or disabled.
Conditions:
A user with the Application Security Administrator role is logged in and attempting to edit the General Settings of a parent ASM policy through the GUI.
Impact:
Accounts with the Application Security Administrator role will be unable to edit the General Settings of a parent ASM policy through the GUI
Workaround:
By using REST calls instead of the GUI, Application Security Administrators can still make the necessary edits.
2185485-1 : The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs★
Links to More Info: BT2185485
Component: TMOS
Symptoms:
After a software upgrade to one of the affected versions, the value of /proc/sys/vm/min_free_kbytes might too big on Hyper-V and Azure VEs with multiple cores and multiple NICs.
This can prevent the Virtual Edition from booting into the new software volume installed with one of the affected versions.
Conditions:
BIG-IP VE running on Hyper-V hypervisor or on Azure with:
- more than 4 cores and more than 4 NICs configured
- 16GB of RAM or less allocated
Attempt to upgrade to one of the affected versions.
Impact:
After an upgrade to one of the affected versions, the BIG-IP VE boot process hangs, or the VE takes hours to boot into the new volume and is so slow to result unusable.
Workaround:
There are two possible workarounds:
(1)
Before booting into the new volume, shutdown the VE and increase the total allocated RAM to 32GB.
(2)
- Install the new software volume.
- Take note of the current value <KBYTES> of /proc/sys/vm/min_free_kbyte :
# cat /proc/sys/vm/min_free_kbyte
- Before rebooting into the new software volume, mount the "vg--db--vda-set.<N>.root" disk volume on a temporary directory, where <N> is the number of the new volume after the dot.
E.G.: if the new volume is "HD1.2", then <N> is 2.
# mkdir /mnt/temp
# mount /dev/mapper/vg--db--vda-set.<N>.root /mnt/temp/
- Edit the /etc/rc.sysinit.f5 file:
# vi /mnt/temp/etc/rc.sysinit.f5
- Replace this line:
echo $VADC_MIN_FREE_KB > /proc/sys/vm/min_free_kbytes
with this line (use the <KBYTES> value noted before):
echo <KBYTES> > /proc/sys/vm/min_free_kbytes
- Unmount the disk volume:
# umount /mnt/temp/
- Reboot into the new software volume
2183917-3 : BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled
Links to More Info: BT2183917
Component: Local Traffic Manager
Symptoms:
BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424).
Conditions:
The tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424 ).
This does not always occur.
Impact:
TCP transfer might stall.
Workaround:
None
2183353-4 : TMM Intel E810 VF driver updates the link state with 1 second delay
Links to More Info: BT2183353
Component: Local Traffic Manager
Symptoms:
TMM gets the old link state from the driver level. It leads to 1 second delay for the link state change.
The problem may also create link flapping messages in /var/log/ltm for the same interface in some conditions:
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Conditions:
- The interface link state is changed.
- Multiple VFs of the same physical interface are attached to BIG-IP VE.
Impact:
Link state is updated with a delay.
Workaround:
None
2183241-2 : Trunk egress traffic is not balanced on some platforms.
Links to More Info: BT2183241
Component: TMOS
Symptoms:
Trunk egress traffic (out) distribution might not be balanced on the following platforms:
- C117 iSeries i2000
- C117 iSeries i850 (Japan)
- C115 iSeries i4000
Conditions:
- Trunk configured.
- Platform on the affected list:
C117 iSeries i2000
C117 iSeries i850 (Japan)
C115 iSeries i4000
Impact:
Trunk egress (out) traffic is not balanced.
Workaround:
None
2183233-3 : TMM crash due to extra trailing CR/LF in iSession reconnects
Links to More Info: BT2183233
Component: Access Policy Manager
Symptoms:
On BIG-IP APM systems, a Traffic Management Microkernel (TMM) crash may occur when a client device sends an extra trailing carriage return/line feed (CR/LF) during an iSession tunnel reconnect. This issue was observed to be triggered by a specific client device and user scenario, where the Edge Client installation was a hybrid of multiple versions, resulting in the transmission of unexpected CR/LF characters after the iSession request.
Conditions:
iSession tunnels in use.
Client device sends an extra CR/LF after the iSession request, often due to a hybrid or corrupted Edge Client installation.
Impact:
Traffic disrupted while tmm restarts.
Disruption of user sessions.
The issue is highly specific to certain client configurations and is not expected to be widespread.
Workaround:
None.
2182061-3 : Management routes not installed on reboots when interface route is recursively required.
Links to More Info: BT2182061
Component: TMOS
Symptoms:
Management routes might not be installed on reboots or config loads when interface route is recursively required.
Conditions:
Have an interface mgmt route, similar to:
sys management-route /Common/mgmt_gw {
network 10.10.10.10/32
type interface
}
And a mgmt route that uses a hop defined by an interface route:
sys management-route r1{
gateway 10.10.10.10
network 10.10.20.1/32
}
Impact:
Some management routes are not installed properly post reboot or config load.
Workaround:
None
2182045-3 : The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers
Links to More Info: BT2182045
Component: Local Traffic Manager
Symptoms:
Some IPv6 packets that contain a destination option header and/or a routing type 2 header are processed by the BIG-IP.
A tcpdump on the BIG-IP does not show the packets.
The tmm/xnet_rx_stats:cd_empty stat is incremented
The tmm/xnet/iavf/per_q_stats:rx_sw_drop might be incremented.
Conditions:
A platform that utilizes the iavf driver:
R2800
R4800
VE with SR-IOV with an Intel 810 NIC
IPv6 traffic is sent to the BIG-IP that contains a destination option or routing type 2 header.
Impact:
Packets are dropped and not processed.
Workaround:
None
2181929-3 : Cipher suite order changes in cipher group after upgrading from v17.1.1.1 to v17.1.3★
Links to More Info: BT2181929
Component: Local Traffic Manager
Symptoms:
After upgrading from v17.1.1.1 to v17.1.3, client connections begin negotiating with unexpected lower-priority cipher suites.
Applications sensitive to cipher strength (e.g., credit card payment systems) experience transaction failures or service disruption.
Conditions:
BIG-IP system running v17.1.1.1 is upgraded to v17.1.3
or
When MCPD reload
After the upgrade or MCPD reload, the internal ordering of cipher rules within the cipher group is modified.
Impact:
Failed service due to wrong Ciphers being used by the LTM VS/ Client Profile
Workaround:
Change the group order from Default to Strength in Local Traffic ›› Ciphers : Groups
2181633-1 : Large BIG-IP SSL Orchestrator deployments can cause tmm crash
Links to More Info: BT2181633
Component: SSL Orchestrator
Symptoms:
When a large number of virtual servers are configured on a BIG-IP and traffic is processed by SSL Orchestrator inspection service, TMM can crash if traffic hits the main virtual server before the service virtual server is loaded by TMM.
Conditions:
- BIG-IP SSL Orchestrator deployment has deployed a large number of virtual servers and inspection services.
- BIG-IP loads the entire config simultaneously or TMM is restarted when connections are being continuously sent to the BIG-IP.
- Client connection hits the main SSL Orchestrator virtual server before service virtual server has finished loading the config in TMM.
Impact:
TMM crash occurs intermittently. Traffic disrupted while tmm restarts.
Workaround:
Before reloading a large SSL Orchestrator BIG-IP config or restarting TMM, mark the public virtual servers as disabled.
Enable the public virtual servers individually after reload or TMM restart is successful.
2172069-1 : GTM topology regions updates do not take effect within tmm
Links to More Info: BT2172069
Component: Global Traffic Manager (DNS)
Symptoms:
GTM topology regions updates do not take effect within tmm
Conditions:
Modifications made to gtm topology regions do not take effect when only one client is sending queries. Note that this issue is tmm-thread specific, meaning one or more tmm threads can get into this state, as long as DNS queries keep hitting the same tmm thread(s), coming from the same source IP address(es)
This is a very unlikely scenario in most production environments, and is likely to only be seen during lab testing with client traffic from one or few IP addresses.
Impact:
GTM not answering with latest GTM topology region updates.
Workaround:
Restart tmm, or perform the DNS lookup from a different client IP address (not the same address that the affected tmm thread previously processed a topology-based DNS query from)
2172041-2 : Zone transfer fails for dnsx when the zone file contains TLSA records
Links to More Info: BT2172041
Component: Global Traffic Manager (DNS)
Symptoms:
Dns express zone transfer fails.
Conditions:
Zone containing TLSA records.
Impact:
Zone not able to be transferred to dns express.
Workaround:
None
2162997-3 : AS3 becomes unresponsive after upgrade from 17.1.2.1 to 17.1.2.2 Build 0.311.1★
Links to More Info: BT2162997
Component: TMOS
Symptoms:
After upgrading, AS3 queries are not accepted
AS3 responds with:
{
"code": 404,
"message": "",
"referer": "172.18.23.178",
"errorStack": []
}
Conditions:
Upgraded from 17.1.2.1 to 17.1.2.2 Build 0.311.12
Impact:
After the upgrade, AS3 services become unavailable and attempts to access them return a 404 error
Workaround:
Uninstall the existing AS3 package and Reinstall the AS3 package
2162873-3 : Pipe and backslash characters are not escaped in ArcSight CEF remote logging
Component: Application Security Manager
Symptoms:
Pipe and backslash characters are not escaped in ArcSight CEF remote logging.
Conditions:
A logging profile is configured with ArcSight CEF remote logging format. A log field contains a pipe in the CEF header (such as an Attack Signature name), or a backslash in any log field.
Impact:
Logging records may not be correctly read by ArcSight or other log collector.
Workaround:
None
2162861-3 : 'Connectors' creation screen does not appear
Links to More Info: BT2162861
Component: Access Policy Manager
Symptoms:
When you click Access > Authentication from the WebUI, select AAA Server By Type > Connectors & Configurations from the pull-down menu, and click the Create button, the creation screen does not appear.
Conditions:
Connectors & Configurations from AAA Server by Type
Impact:
Creation screen does not appear.
Workaround:
None
2162189-3 : "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually★
Links to More Info: BT2162189
Component: Application Security Manager
Symptoms:
When operating in automatic mode, Live Update installs the genesis Automatic Signature Update (ASU) file instead of the manually installed latest ASU file.
Conditions:
Live Update is operating in automatic mode, there are only 2 installations in ASU files installations list, one is genesis file and another is latest ASU file that was published on ESDM.
Impact:
BIG-IP will not install the latest signatures.
Workaround:
Live Update should be switched to manual mode. The latest ASU file should be installed manually again instead of the genesis ASU file. When the newer ASU file is available on ESDM, do not install it manually, but switch Live Update to automatic mode again.
2154089-2 : "Test" button for monitor object is missing.
Component: TMOS
Symptoms:
Local Traffic >> Monitors >> select monitor >> fill in IP and port >> "Test" button is missing.
Conditions:
Need to test BIG-IP monitors via GUI.
Impact:
Impossible to test monitor from GUI.
Workaround:
Use tmsh instead of GUI for testing the monitor:
K60677941: Verifying monitor configurations using the tmsh utility
2154057-5 : MCPD validations not throwing error when snmpv3 password contains more than 77 characters★
Links to More Info: BT2154057
Component: TMOS
Symptoms:
After upgrading, mcpd goes into a restart loop. /var/log/ltm contains the following:
err mcpd[13691]: 0107102b:3: Master Key decrypt failure - decrypt failure - final
notice mcpd[13691]: 01071029:5: Master decrypt final
notice mcpd[13691]: 01071027:5: Master key OpenSSL error: 4006860532:error:0606506D:digital envelope routines:EVP_DecryptFinal_ex:wrong final block length:evp_enc.c:653:
notice mcpd[13691]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
err mcpd[13691]: 01071684:3: Unable to encrypt application variable (/Common/snmpv3user auth_password usmuser /Common/snmpd).
Conditions:
-- SNMPv3 configuration that uses a password containing more than 77 characters
-- An upgrade is performed
This also occurs within a release by saving the config and then forcing a load from text files (`touch /service/mcpd/forceload && pkill mcpd`)
This may also occur with auth-password or privacy-password values that are 78 characters in length or longer
Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.
Workaround:
If a device is currently in an inoperative state and affected by this issue:
- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.
2153897-1 : BIG-IP closes the transport connection immediately after sending a DPA to a peer
Links to More Info: BT2153897
Component: Service Provider
Symptoms:
With Diameter MRF setup, when the BIG-IP receives a diameter DPR message (Disconnect-Peer-Request), it sends a DPA to the peer (Disconnect-Peer-Answer) and then immediately closes the transport connection.
According to RFC6733, ("Diameter Base Protocol") the transport connection should be closed by the remote peer instead.
Conditions:
- BIG-IP configured with a MRF Diameter setup
- BIG-IP receives a Diameter DPR message
Impact:
The BIG-IP system closes the transport connection instead of waiting for the remote peer to close it.
Workaround:
None
2153421-3 : iControl REST /mgmt/toc endpoint and object browser pages are not functioning on BIG-IP v17.x
Links to More Info: BT2153421
Component: TMOS
Symptoms:
When accessing https://<BIG-IP IP address>/mgmt/toc the browser returns the below error
{"code":400,"message":"URI path /mgmt/logmein.html not registered. Please verify URI is supported and wait for /available suffix to be responsive.","referer":"https://10.1.255.175/mgmt/toc","restOperationId":45299775,"kind":":resterrorresponse"}
Conditions:
Access https://<BIG-IP IP address>/mgmt/toc
Impact:
In v17.x returns a blank page instead of object data.
Workaround:
None
2152545-2 : [APM][SAML] High TMM memory sso_saml leak
Links to More Info: BT2152545
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic
Conditions:
-- Configure a BIG-IP as SAML-SP with ACS binding.
-- Configure SSO for IDP.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2152445-3 : "Live Update" API is unresponsive after upgrade and recover only after tomcat restart★
Links to More Info: BT2152445
Component: Application Security Manager
Symptoms:
After upgrading BIG-IP, the Live Update GUI displays an empty installation list. Errors are logged in the Tomcat log file. When attempting to refresh the Live Update page, additional errors appear in the Live Update log file.
Conditions:
"Live Update" has very long list of installations of ASU files.
Impact:
After the upgrade, BIG-IP retains the latest signatures that were present before the upgrade. The Live Update feature becomes non-functional until it is restarted.
Workaround:
Before upgrading, shorten ASU file installations by removing old entries. This helps prevent issues. If a problem occurs, restart the Live Update system.
2152301-2 : After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.★
Links to More Info: BT2152301
Component: TMOS
Symptoms:
Guest-role user is unable to run the command show running-config in TMSH.
Executing this command from TMSH results in an error:
"Unexpected Error: Can't display all items, can't get object count from mcpd"
MCPD throws error:
result_message "01070823:3: Read Access Denied: user (myguest) type (HPKE Key)"
Conditions:
Except for all these 4 user roles, all the other user roles (operator, cert manager, app editor...etc) hit the same error.
- admin
- resource-admin
- log-manager
- auditor
Impact:
Unable to show the running config, or use list or list sys commands.
Workaround:
Login with an account with admin access.
2152257-3 : [BGP] remove-private-AS does not work with extended ASN numbers
Links to More Info: BT2152257
Component: TMOS
Symptoms:
Remove-private-AS does not work with extended (4-byte) ASN numbers
Conditions:
Remove-private-AS used in peer configuration.
Impact:
Private AS numbers are not removed.
Workaround:
None
2151885-3 : When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
Links to More Info: BT2151885
Component: Local Traffic Manager
Symptoms:
When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
Conditions:
DCHP virtual-server with a pool member using service-down-action feature set to 'reject' or 'drop'.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Re-configure service-down-action on a pool member to 'none'.
2151601-1 : No tmsh command to remove the stateless directive from a virtual server
Links to More Info: BT2151601
Component: Local Traffic Manager
Symptoms:
Cannot remove the stateless directive from a virtual server using tmsh, would need to delete and create the virtual again to achieve the same.
Conditions:
1) A stateless virtual server is present
2) Try making it not stateless using tmsh
Impact:
Virtual server remains stateless
Workaround:
Modify the virtual using GUI
2151505-1 : Cmp_dest_velos is automatically installed on system startup.
Links to More Info: BT2151505
Component: TMOS
Symptoms:
/var/run/cmp_dest_velos is automatically installed on tenant startup.
You no longer need to download it from the host containers.
Conditions:
A need to use the VELOS version of the cmp_dest utility.
Impact:
Previously, the cmp_dest utility had to be manually downloaded from the host containers.
Workaround:
Manually download cmp_dest from the host containers.
2150869-1 : Incorrect information for count of failed login for a user
Links to More Info: BT2150869
Component: TMOS
Symptoms:
/var/log/secure and /var/log/audit show incorrect information for the count of failed logins for a user
Conditions:
A user fails to login either through CLI or GUI
Impact:
Incorrect information in logs can be misleading
Workaround:
None
2150669-3 : TCP Packet loss after upgrade with AFM provisisoned★
Links to More Info: BT2150669
Component: Advanced Firewall Manager
Symptoms:
After an upgrade, disabled hardware DOS vectors may use old values.
Conditions:
-- F5OS tenant
-- Upgrade
-- AFM provisioned
Impact:
DOS thresholds may be incorrectly set or set too low resulting in packet loss that causes poor throughput.
Workaround:
Disable and re-enable the disabled DOS vectors.
Log into the BIG-IP GUI and navigate to
Security ›› DoS Protection : Device Protection
Filter attack vectors: tcp
click the "Network" text
Enable all the disabled vectors by clicking on the vector name and changing state from "disabled" to "mitigate".
Then disable the vectors by clicking on the vector name and changing state from "mitigate" to "disabled".
2150493-1 : BIG-IP DNS (GTM) may associate LTM virtual server names with the wrong GTM virtual-servers
Links to More Info: BT2150493
Component: Global Traffic Manager (DNS)
Symptoms:
Gtmd may display incorrectly associated the name of a virtual server, as known to the LTM device, with more than one virtual-server defined in the GTM configuration
This can lead to inconsistent probe results and misleading service availability information in GTM, where a gtm virtual server may reflect the status of a different LTM virtual server.
Conditions:
This issue occurs when multiple gtm server ... virtual-servers { ... } objects are configured with the same external address but distinct internal (translation) addresses. For this configuration to be effective, there must be logic in the network's NAT function that performs address translation based on the content of the incoming request, for example by using the SNI value of a TLS handshake, so that multiple internal virtual servers can share the same external IP address.
In such cases, the ltm_name learned from a big3d probe reply for one virtual server may be incorrectly associated with all virtual servers sharing that external IP.
As a result, subsequent <vip> probes may use the wrong ltm_name and reflect the status of an incorrect LTM virtual server.
Impact:
Incorrect virtual server state from gtmd's point of view, which may show services up that are actually down or down which are actually up.
Workaround:
Specify the ltm-name on each virtual server, so that the learned ltm_name from the big3d reply is never used:
tmsh modify gtm server gtmserver1 virtual-servers modify { gtm_name_vs1 { ltm-name ltm_name_vs1 } gtm_name_vs2 { ltm-name ltm_name_vs2 } gtm_name_vs3 { ltm-name ltm_name_vs3 } }
Note that the "ltm name" field can only be set using tmsh or API calls - it is not exposed in the BIG-IP GUI configuration utility.
2150489-5 : Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed.
Links to More Info: BT2150489
Component: TMOS
Symptoms:
After restarting mcpd, mcpd is stuck in a restart loop.
Conditions:
-- You set a DB variable that's encrypted ( proxy.password, configsync.password)
-- Change the SecureVault master key and save the configuration
Impact:
BIG-IP is in inoperative state , MCPD in a restart loop
Workaround:
If a system is affected by this issue, set the DB key back to its default value. Once the configuration is loaded, set the DB key back to the correct value:
- tmsh modify /sys db config.auditing.forward.sharedsecret value '<null>'
After changing the SecureValue master key but before encountering the issue, run the following command to update the value of the DB key on-disk:
setdb config.auditing.forward.sharedsecret "$(getdb config.auditing.forward.sharedsecret)"
2149333-1 : BD_XML logs memory usage at TS_DEBUG level
Links to More Info: BT2149333
Component: Application Security Manager
Symptoms:
There are two messages in BD_XML logs that the system reports at the TS_DEBUG log level, but they should be logged as TS_INFO.
BD_XML|DEBUG |Sep 10 14:51:19.335|1456|xml_validation.cpp:1687|after create of profile 754. (xml memory 5111702493 bytes)
BD_XML|DEBUG |Sep 10 14:51:19.335|1456|xml_validation.cpp:1586|add profile 755. name: /ws/replanifierIntervention_V1-0 is soap? 1 (xml memory before add 5111702493 bytes)
Conditions:
These messages can occur when XML/JSON profiles are configured.
Impact:
Messages that should be logged at the TS_INFO level are logged at the TS_DEBUG level. These are informational log messages.
Workaround:
None
2144397-3 : Problems compiling firewall policies when they contain rules using huge address lists
Links to More Info: BT2144397
Component: Advanced Firewall Manager
Symptoms:
Firewall rule compilation hangs indefinitely with high CPU usage, when large address lists (~100k entries) are used. With significant number of duplicate firewall policies.
Conditions:
Occurs on BIG-IP AFM (17.1.2) when firewall policies reference very large address lists as rule sources.
Impact:
Prevents deployment or updates of firewall policies, blocking operations.
Workaround:
None
2144309-3 : TMM might experience a crash when using a fix for Bug783077
Links to More Info: BT2144309
Component: Local Traffic Manager
Symptoms:
TMM might experience a crash when using a fix for Bug783077.
Conditions:
- Running a fix Bug783077.
- Performing operations on IPv6 routes that use nexthop over link-local address.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2144053-1 : IPS hitless upgrade results in TMM clock advance★
Component: Protocol Inspection
Symptoms:
IPS hitless upgrade results in TMM clock advance.
Conditions:
New IPS package is deployed in AFM.
Impact:
In some cases some degree of packet loss has been reported during a second.
Workaround:
None
2144029-1 : DB monitor does not use the correct timezone present in the system
Links to More Info: BT2144029
Component: Local Traffic Manager
Symptoms:
JDBC uses an incorrect timezone rather than the one configured on the system through 'sys ntp timezone'.
In a PostgreSQL-based health monitor, an error similar to the following may occur, for example when 'sys ntp timezone' is set as America/Los_Angeles' (default):
org.postgresql.util.PSQLException: FATAL: invalid value for parameter "TimeZone": "US/Pacific-New"
In an Oracle health monitor, an error similar to the following may occur, for example when 'sys ntp timezone' is set as 'UTC' when the client presents a timezone of 'Zulu':
java.sql.SQLException: ORA-00604: error occurred at recursive SQL level 1
ORA-01882: timezone region not found
Conditions:
1. A DB monitor is in use (eg. PostgreSQL, Oracle).
2. The current timezone of the system is set with a timezone that has multiple equivalent and possibly deprecated aliases, for example:
- America/Los_Angeles [US/Pacific-New, posix/US/Pacific-New ]
- UTC [ Zulu, posix/Zulu ]
3. System has /etc/localtime as a normal file instead of a symbolic link.
4. The remote database does not support the presented time zone parameter.
Impact:
Monitor incorrectly marks the pool member down when the remote database server does not recognize the time zone presented by the DB monitor.
Workaround:
Delete the file /etc/localtime:
rm /etc/localtime
Create a symbolic link for the file pointing to the desired timezone as listed in /usr/share/zoneinfo:
For example, if you have 'sys ntp timezone UTC', the command would be:
ln -sf /usr/share/zoneinfo/UTC /etc/localtime
If you have 'sys ntp timezone America/Los_Angeles', the command would be:
ln -sf /usr/share/zoneinfo/America/Los_Angeles /etc/localtime
2143109-3 : BIG-IP VE with more CPU cores than licensed enters TMM restart loop (TMM PU (<num_cores>) >= number of PUs (<num_licensed_cores>)) after mcpd restart
Links to More Info: BT2143109
Component: TMOS
Symptoms:
Mcpd crash or restart causes TMM to enter a restart loop.
Log - notice TMM PU (7) >= number of PUs (4)
Device becomes unreachable in the data plane.
Conditions:
BIG-IP VE with more vCPUs than licensed cores.
Example: 8-core Azure instance with a 4-core VE license.
Modules: AFM (nominal) and AVR (minimum) provisioned.
Occurs after mcpd restart or crash.
Impact:
System enters a TMM restart loop and remains offline.
Traffic processing and configuration access are unavailable until manual correction.
Workaround:
Manually set the provision.tmmcount DB variable to match the licensed core count, then restart services or reboot.
For example on an 8-core instance which is licensed for only 4-cores:
tmsh modify sys db provision.tmmcount value 4
2141297-3 : In TLSv1.3, BIG-IP enforces the use of FFDHE key share if it is preferred over other DH groups★
Links to More Info: BT2141297
Component: Local Traffic Manager
Symptoms:
The BIG-IP system sends back an FFDHE key share that forces the client to also use FFDHE, even if the client sent a key share that is still acceptable to the BIG-IP.
Conditions:
The BIG-IP system is configured to prefer an FFDHE DH group and the client sends the same FFDHE DH group as supported but sends a key share for a different DH group.
Impact:
Clients are forced to use the FFDHE group for its key share even if the client sent a key share that is still acceptable to the BIG-IP
Workaround:
Either remove the FFDHE groups, or reorder DH group preferences so that FFDHE groups are not preferred over other groups.
2141205-1 : Tpm-status returns: "System Integrity: Invalid" for some Engineering Hotfixes
Links to More Info: BT2141205
Component: TMOS
Symptoms:
The 'tmsh run sys integrity status-check -a -v' or 'tpm-status' commands incorrectly report system integrity status as 'Invalid' even when the system software has not been modified.
Detailed output of the "tpm-status -v 3 -q" command includes the following messages:
A SIRR database is invalid.
/shared/lib/sirr/v1.0/SIRR validity: 1
/usr/lib/sirr/SIRR validity: 0
Conditions:
This occurs if all of the following conditions are true:
-- Engineering Hotfix built on or after October 15, 2025, based on BIG-IP software v17.5.1.3, v17.1.3, v16.1.6.1, v15.1.10.8 or later version.
-- Engineering Hotfix installed on TPM-supported BIG-IP platform.
-- The Engineering Hotfix contains an updated 'sirr-tmos' package.
Impact:
Incorrect presentation of system software status; the status shows INVALID when it is actually valid.
Workaround:
None.
2141109-2 : The URL categorisation daemon's DNS cache is never refreshed
Links to More Info: BT2141109
Component: Traffic Classification Engine
Symptoms:
When the URL categorisation daemon (wr_urldbd) starts or restarts, it queries the DNS resolver for the Brightcloud online service domains that are used for some of the real-time URL queries, and populates the DNS Cache with the results.
After populating the cache, it never refreshes or updates it.
When Brightcloud change the DNS records of their service domains, all the new SSL handshakes from the URL categorisation daemon, needed for the real-time URL categorisation queries, fail with these errors in wr_urldbd.out:
WR_URLDBD: Sep 30 12:01:08.836:Tid(41843):async_lookupCallback:702 Error processing URL:*.example.com and Status Code:S_ErrArg
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1
BC_SDK: 2025-09-30 12:01:08 ERROR: SSL error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1
Conditions:
- URL categorisation license installed on the system, and URL categorisation configured and in use.
Impact:
Some time after the URL categorisation daemon starts or restarts, all URL categorisation real-time queries for URLs not already in the local database fail.
Workaround:
When the real-time queries start failing with the error described above, restart the wr_urldbd daemon with:
"bigstart restart wr_urlrdbd"
2140213-3 : Xnet-netvsc driver crash
Links to More Info: BT2140213
Component: TMOS
Symptoms:
TMM crashes due to lack of memory to configure subchannels needed for queues in DPDK which ultimately results in a NULL pointer exception.
The lack of memory occurs when the product of (number of TMMS)*(number of NICs) becomes very large due to memory footprint each TMM needs to operate so many NICs.
In /var/log/tmm:
notice hn_nvs_alloc_subchans(): nvs subch alloc failed: 0x2
notice hn_dev_configure(): subchannel configuration failed
notice Port5 dev_configure = -5
Conditions:
1) xnet-netvsc driver (HyperV or Azure)
2) (number of TMMs)*(number of NICs) is big; confirmed with 8 TMMs and 4 NICs on Azure F8s v2 instance.
Impact:
TMM goes into restart loop and never becomes Active, disrupting traffic.
Workaround:
A) Reduce the number of NICs in the environment
B) Reduce the number of TMMs by running the following and then restarting with 'bigstart restart tmm'
tmsh modify sys db provision.tmmcount value <tmm_count>
2139893-3 : vCMP guest may become unresponsive for several minutes due to kernel soft lockup
Links to More Info: BT2139893
Component: TMOS
Symptoms:
A vCMP guest may become unresponsive for approximately 600 seconds, during which time:
- Odd-numbered CPUs assigned to the guest (for example, CPUs 1, 3, 5, 7, 9, 11) show 100% utilization.
- No logs, statistics, or management-plane responses are generated.
- Kernel logs report NMI watchdog soft lockup messages indicating a kernel deadlock.
- The issue triggers a failover event and a restart of all services on the affected guest.
Kernel logs indicate the lockup occurs on control-plane CPUs and is associated with memory management and TLB flush operations.
Conditions:
This issue may occur under the following conditions:
-- vCMP guest running on a BIG-IP system.
-- Guest operating under a Linux 3.10-based kernel.
-- High control-plane activity involving memory operations (for example, process creation, termination, or memory unmapping).
-- Issue observed in virtualized environments (for example, KVM-based platforms).
-- Exact steps to reproduce are currently unknown.
Impact:
-- Temporary loss of management and control-plane responsiveness for the vCMP guest.
-- Automatic failover to a standby unit may occur.
-- Restart of BIG-IP services on the affected guest.
-- Potential disruption to traffic handling during failover, depending on deployment architecture.
Workaround:
None.
2139637-3 : TMM crash because of invalid context
Links to More Info: BT2139637
Component: Local Traffic Manager
Symptoms:
Tmm crashes during QUIC packet loss handling due to invalid context.
Conditions:
LTM configured with UDP and QUIC.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2138273-3 : Named service fails to start after an upgrade due to unsupported attributes in the named.conf file★
Links to More Info: BT2138273
Component: SSL Orchestrator
Symptoms:
Named fails to start with the following error after upgrading from older versions to 17.0 or newer releases due to the dnssec-lookaside and dnssec-enable options in the named.conf configuration file, which have been deprecated and are no longer supported in the latest BIND versions.
Logs in /var/log/daemon.log :
Oct 22 14:08:00 localhost.localdomain err named[16313]: /config/named.conf:35: option 'dnssec-lookaside' no longer exists
Oct 22 14:08:00 localhost.localdomain crit named[16313]: loading configuration: failure
Oct 22 14:08:00 localhost.localdomain crit named[16313]: exiting (due to fatal error)
Oct 22 14:08:00 localhost.localdomain notice systemd[1]: named.service: main process exited, code=exited, status=1/FAILURE
Oct 22 14:08:00 localhost.localdomain notice systemd[1]: Unit named.service entered failed state.
Oct 22 14:08:00 localhost.localdomain warning systemd[1]: named.service failed.
Conditions:
-- SSL Orchestrator System Settings >> DNS settings have been specified.
-- SSL Orchestrator L3 Explicit Topology Configured using the default SSL Orchestrator DNS resolver.
-- Check the BIND Version: Use the following command:
Example:
For example :
# named -v
BIND 9.11.36 (Extended Support Version) <id:68dbd5b>
Notes:
-- Starting with BIND 9.9, the dnssec-lookaside validation (DLV) feature was deprecated. By BIND 9.11, this feature was removed entirely.
-- Beginning with BIND 9.16, the dnssec-enable option was deprecated and subsequently removed.
Impact:
SSL Orchestrator will fail to resolve hostnames for the L3 Explicit topology causing end-to-end traffic to fail.
Workaround:
- Redeploy the affected L3 Explicit topology - this will use the native DNS resolver implementation and will no longer rely on BIND or named service, ensuring that end-to-end SSL Orchestrator traffic functions properly.
To fix the named service:
-- Remove the deprecated directives dnssec-lookaside and dnssec-enable from the BIND configuration file located at:
/var/named/config/named.conf.
-- After making these changes, restart the named service to apply the updated configuration by running the following command: bigstart restart named
2137909-2 : Portal Access: unwanted decoding html entities in attribute values of HTML tags★
Links to More Info: BT2137909
Component: Access Policy Manager
Symptoms:
HTML Entities in Attribute values in HTML tags are decoded when they shouldn't be.
Conditions:
Portal Access is enabled
Impact:
Unwanted Application errors
Workaround:
None
2135621-1 : Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces
Links to More Info: BT2135621
Component: Local Traffic Manager
Symptoms:
TCP retransmits occur on Hyper-V deployments with Cisco VIC networks (SR-IOV disabled).
The problem is related to large segments processing (TSO packets)
Conditions:
- Hyper-V VM with Network adapter on top of Cisco VIC interface
- SR-IOV is not enabled
- Virtual server uses TCP profile
Impact:
Poor TCP performance for virtual servers with TCP profile
Workaround:
- Disable TSO feature:
tmsh modify sys db tm.tcpsegmentationoffload value disable
- Other workaround is to switch to sock driver:
https://my.f5.com/manage/s/article/K000153024
2132209-3 : TMM crash while sending ACKs in invalid context
Links to More Info: BT2132209
Component: Local Traffic Manager
Symptoms:
Tmm crashes while QUIC is trying to send an ACK in invalid context.
Conditions:
LTM configured with UDP and QUIC.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2131833-5 : F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable
Links to More Info: BT2131833
Component: TMOS
Symptoms:
On F5OS/rSeriers r2xxx/r4xxx , in rare conditions the management interface is not reachable due to a timing and ordering issue probing network interfaces
In the BIG-IP Tenant, the network interfaces eth0 or mgmt are missing
Conditions:
This condition is rare and when it does its usually seen on tenant first boot.
Impact:
Unable to reach BIG-IP Tenant management address.
Workaround:
Reboot tenant
2131597-3 : BGP graceful restart might not accept a new connection immediatelly post neighbor failover.
Links to More Info: BT2131597
Component: TMOS
Symptoms:
When remote peer restarts and BGP graceful restart mechanism was advertised and received, BIG-IP might not immediately accept a new connection from a restarting peer.
Conditions:
- BIG-IP system is licensed for Routing Bundle.
- BGP graceful restart mechanism was advertised and received.
- Remote peer restarting.
Impact:
New connection might take longer to establish.
Workaround:
You can work the problem around by making sure BIG-IP local router-ID is lower than re-connecting peer ID.
2131085-2 : Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state
Links to More Info: BT2131085
Component: Local Traffic Manager
Symptoms:
Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest or VIPRION causes BIG-IP to get stuck in unhealthy state.
MCPD is failing to load with the error '01070710:3: Could not find master-key object':
slot3/tenant1.example.com notice clusterd[7956]: 013a0024:5: Blade 3: Changing primary from 0 (none) to 2
slot3/tenant1.example.com err clusterd[7956]: 013a0018:3: Blade 3 turned RED: Quorum: stepping slow clock forward by 747.133704 ms, HA TABLE offline
slot3/tenant1.example.com notice clusterd[7956]: 013a0006:5: Blade status: 0 GREEN 1 YELLOW 1 Not Ready
slot1/tenant1.example.com notice mcpd[4785]: 01070419:5: Platform initialization phase triggered.
slot2/tenant1.example.com emerg load_config_files[9951]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070
All slots will have an Availability of "offline" as reported in tmsh show sys cluster:
[root@rdt2:/S1-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.0.0.2/16
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26
-----------------------------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
-----------------------------------------------------------------------------------------------------
| 1 :: :: offline enabled true offline running Run, HA TABLE offline
| 2 :: :: offline enabled false offline running Run, HA TABLE offline
Conditions:
1. Multi-slot F5OS tenant or Multi-slot vCMP guest or multi-bladed VIPRION.
2. Rebooting all the slots of the guest or tenant (e.g. 'tmsh reboot slot all' or 'clsh reboot')
Impact:
All tenant or VCMP guest slots remain offline, and are inoperable from a traffic standpoint.
Workaround:
For both tenants and guests, re-deploying them has a high probability of resolving the issue.
That is changing the tenant's or guest's state from "deployed" to "provisioned" or "configured", and then back to "deployed".
or
Restarting mcpd on the primary slot also has a high probability of resolving the issue.
Tmsh show sys cluster will report the "Primary Slot ID"
# tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address address
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26
Both workarounds are highly likely to restore the tenant or guest to full functionality.
Note: the issue might return if all tenant or guest slots are rebooted.
2078277-2 : BD crash with an inappropriate configuration for request_max_chunks_number
Links to More Info: BT2078277
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
BD internal variable request_max_chunks_number has been configured with inappropriate value (above 200,000)
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
Revert request_max_chunks_number to the default value, 1000
2077357-3 : Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC.
Links to More Info: BT2077357
Component: Local Traffic Manager
Symptoms:
In a case where a proxy listener intercepts traffic going over a virtual-wire and there is no server-side traffic (TCP re-transmit timeout), a RST generated towards the server might have 00:00:00:00:00:00 source MAC.
Conditions:
Proxy listener intercepts traffic going over a virtual-wire.
There is no server-side traffic for the flow.
Impact:
RST might not be delivered to the server.
Workaround:
None
2064209-4 : FQDN node created from pool member via tmsh does not inherit "autopopulate" value
Links to More Info: BT2064209
Component: TMOS
Symptoms:
When using the tmsh command-line interface (CLI) to create an FQDN pool member, an FQDN node is created implicitly using values specified for the FQDN pool member.
However, if the "autopopulate" value is specified as "enabled" (instead of the default "disabled"), the FQDN node is created with the "autopopulate" value set to "disabled" (default).
Conditions:
This occurs when:
-- Creating an FQDN node implicitly by explicitly creating an FQDN pool member
-- Using the tmsh interface to perform this action.
-- Specifying a non-default value of "enabled" for the "autopopulate" option
Impact:
The FQDN node will be created with an "autopopulate" value of "disabled", which means that only a single ephemeral node will be created based on DNS resolution of the FQDN name.
Since only a single ephemeral node is created, only a single ephemeral pool member will be created, and the "autopopulate" option will not exhibit the "enabled" behavior.
Workaround:
To work around this issue using tmsh command-line interface (CLI):
-- First create the FQDN node with the desired configuration values.
-- Then create the FQDN pool member, referencing the previously-created FQDN node.
To correct the configuration of the FQDN node, the FQDN node and pool member must be deleted and re-created:
1. Delete FQDN pool member
2. Delete FQDN node
3. Create FQDN node with desired configuration
4. Create FQDN pool member with desired configuration
2053489-4 : Config Sync events may not be recorded in audit log
Links to More Info: BT2053489
Component: TMOS
Symptoms:
When a command is issued on a BIG-IP system to sync configuration to a Device Group from a given Device in the Device Group, the config sync command may not be recorded in the audit log on the device where the command was issued.
The audit log may not record this command, even though subsequent log messages in other log files may indicate successful completion of the config sync action.
Conditions:
This may occur when:
-- Issuing the command to sync configuration from a Device to a Device Group in which it is a member.
-- Issuing such a command from either the command-line interface (tmsh) or from the BIG-IP GUI (tmui).
-- Accepting the default/offered suggestion for the Device whose configuration is to be synced to the Device Group.
For example:
-- In the GUI, accepting the default selection indicated by the active radio button for which Device to sync to the Device Group, and clicking Sync.
-- In the CLI, issuing the "tmsh run cm config-sync" command with the "to-group" option from the Device which is suggested by the "tmsh show cm sync-status" command.
Impact:
When attempting to diagnose issues that occur in the context of syncing configuration across Devices in a Device Group, it may not be clear where, when, and by whom the command to initiate the config sync was issued.
2053309-5 : Changes to README - mention of duojs.org URL
Links to More Info: BT2053309
Component: TMOS
Symptoms:
https://my.f5.com/s/article/K000156036
Conditions:
https://my.f5.com/s/article/K000156036
Impact:
https://my.f5.com/s/article/K000156036
2047137-3 : TMM core may occur while using APM VDI with Blast UDP
Links to More Info: BT2047137
Component: Access Policy Manager
Symptoms:
User may fail to access the remote desktop using APM vmware VDI, if a TMM core occurs due to the unavailability of one of the internal database variable.
Conditions:
The user attempts to connect to the desktop or app using VMware Client or a browser via the Blast protocol over UDP, and the session variable is deleted due to a timeout.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2046941-6 : Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor
Links to More Info: BT2046941
Component: Application Security Manager
Symptoms:
Bot-defense profile detects a Distributed Cloud health monitor as a bot, and might block it (depends on configuration).
Conditions:
-- Bot-defense profile is attached to a virtual server.
-- BIG-IP is configured in front of Distributed Cloud.
Impact:
Distributed Cloud health monitors are blocked, false-positive bots are detected and logs.
Workaround:
None
2038429-2 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038429
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038425-2 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038425
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038421-2 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038421
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038417-2 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038417
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038277-3 : Double memory release in the enforcer
Links to More Info: BT2038277
Component: Application Security Manager
Symptoms:
Possible bd cores due to ignore positional parameter configurations
Conditions:
Positional parameters configured with ignore value flag enabled.
Impact:
Error in logs, and possible crash and core. Traffic disrupted while bd restarts.
Workaround:
None
2033781-4 : Memory allocation failed: can't allocate memory to extend db size
Links to More Info: BT2033781
Component: Local Traffic Manager
Symptoms:
When tmm cannot expand the eXtremeDB database, it logs an error in /var/log/tmm:
err tmm1[21087]: 01010004:3: Memory allocation failed: can't allocate memory to extend db size
Conditions:
-- BIG-IP in operation
-- A configuration change is made that causes tmm to allocate more memory to eXtremeDB. Examples include:
- Adding a clientssl or serverssl profile
- Modifying a datagroup
- A bot defense sync occurs
Impact:
Tmm does not crash but the eXtremeDB state is inconsistent with other tmms and could lead to unpredictable behavior such as virtual servers not working, iRules failing to work, bot defense failing to work
Workaround:
None
2016465-2 : Policy auto merge does not work for Base64 Decoding
Links to More Info: BT2016465
Component: Application Security Manager
Symptoms:
If an entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.
Conditions:
An entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.
Impact:
Expected changes may not be made to the merged policy resulting in unexpected Base64 value handling.
Workaround:
The values can be changed manually through GUI or REST.
2014597-4 : Async session db ops are missing flow control
Links to More Info: BT2014597
Component: TMOS
Symptoms:
Tmm crash while hanling SSL traffic
Conditions:
-- SSL traffic
-- Heavy load
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1991717-1 : Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN's★
Component: Advanced Firewall Manager
Symptoms:
- Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN addresses.
Conditions:
- AFM Provisioned on v17.5.0
- Configure a dns-resolver under global-fqdn-policy.
- Configure a shared object list with a Geo or FQDN address.
- Install 17.5.1 on a boot location.
- Upgrade to 17.5.1
Impact:
Upgrade fails from 17.5.0 to 17.5.1 with the following error:
Syntax Error:(/config/bigip_base.conf at line: 649) "geo" unknown property
Workaround:
- Identify the rules and the lists and comment them out of the bigip_base file that are involved in the firewall rules.
- Upgrade to 17.5.1 or load the config again.
or
1. Remove the shared objects address list from the AFM rules and then the shared objects address lists with Geo or FQDN addresses.
2. Once after an upgrade, add address list again to AFM rules and Geo or FQDN
1989033-4 : IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT
Links to More Info: BT1989033
Component: Local Traffic Manager
Symptoms:
In very rare circumstances the BIG-IP may fail to initiate or respond to an IKEv2 tunnel.
When debug2 is enabled, the following log messages in the tmm log indicates a potential match for this bug. ERR_PORT is a critical indicator of the failure condition.
<13> <date> <hostname> notice ike_connect/3154: @F: ike flow created 172.16.61.100:172.16.61.200 rd: 0 owner=0.2 me=0.2
<13> <date> <hostname> notice ike_connect/3218: @F: ISAKMP_CONN local=172.16.61.100:500 remote=172.16.61.200:500
<13> <date> <hostname> notice ike_proxy_connect/1510: @E: flow_connect() ERR ERR_PORT
<13> <date> <hostname> notice ike_connect/3241: @E: ERR ERR_PORT
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5231: @E: can't create isakmp flow to 172.16.61.100:500 172.16.61.200:500 %0, err ERR_PORT.
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5241: @E: ERR ERR_PORT
The ipsec.log will contain different messages.
ipsec.log - BIG-IP attempts to start the connection, the INTERNAL_ERR is a critical indicator:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:deepcopy:MAKE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INTERNAL_ERR]: ikev2_allocate_sa: ERR Invalid BIG-IP flow context for <local IP>[500]-><remote IP>[500] peer='/Common/<ike peer name>'
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_allocate_sa: @A: Insert ike_sa 0x4000c7aa2c88, SPI 1c96e4465b82fc39 0000000000000000 in list (peer='/Common/<ike peer name>')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state IDLING -> DH_REQ
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate_callback] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_REQ -> DH_DONE
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_next_request_id: @A: send message (id 0) sa=0x4000c7aa2c88 (loc=<local IP>[500] rem=<remote IP>[500])
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_DONE -> INI_IKE_SA_INIT_SENT
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:PUSH:ikev2_send_request' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (payloads dir=SEND at=ikev2_send_request payl=0x4000c442ca88 len=432 crc=0x47699687
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (v2_head i_spi=0x1c96e4465b82fc39 r_spi=0x0000000000000000 next=33:PAYLOAD_SA
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . . . ver=0x20 exch=34:IKE_SA_INIT flags=0x8:I-Q id=0 len=432 crc=0x47699687)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (hd type=33:PAYLOAD_SA next=34:PAYLOAD_KE byte=0 len=48 off=0x1c)
...
ipsec.log - BIG-IP retransmits a few more times:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 1
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 2
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 3
ipsec.log - BIG-IP cancels the negotiation after a timeout:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback1 ike_sa rmconf : 3335236104
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback2 rmconf ikev2 : 3343372872
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback3 ikev2 plog : 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: negotiation timeout: ike_sa (ick=0x1c96e4465b82fc39, rck=0x0000000000000000)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [PROTO_ERR]: __ikev2_abort: ike_sa=0x4000c7aa2c88 ABORT, ERR errno='110', SPI 1c96e4465b82fc39 0000000000000000
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state INI_IKE_SA_INIT_SENT -> DYING
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:POP:ikev2_cancel_retransmit_req' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DYING -> DEAD
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_ha_send_sa_delete: high availability (HA) SA is already deleted from Session DB
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:clean:FREE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
Conditions:
-- IPsec IKEv2
-- Tunnel may be newly configured
-- BIG-IP does not transmit or respond to any packets related to the configured tunnel.
Impact:
When this occurs, the tunnel will be down permanently.
Workaround:
If this is a High Availability (HA) peer and the config is sync'd with the Standby, failing over to the Standby may bring the tunnel up.
However, a second failover (fail back to the original high availability (HA) device) will lead to the tunnel down again. The original device once Active again, is still in the same failure mode.
One workaround is to failover, check the tunnel is up and then reboot or 'bigstart restart' the failing Standby device.
After that, the IKE SA should appear correctly mirrored on the Standby, use 'tmsh show net ipsec ike-sa' and check there is an SA with the peer's IP.
The second workaround is to delete all IPsec config objects, self IP and route-domain associated with the tunnel. In the case where the IPsec config, self IPs and routes exist entirely in route-domain 0 this is not a reasonable solution and rebooting is the most sensible recovery step.
1983145-2 : Memory Corruption due to xnet-DPDK★
Links to More Info: BT1983145
Component: TMOS
Symptoms:
TMM crashes due to data corruption caused by xnet-DPDK. This can occur after upgrading from version 17.5.0 to version 17.5.1.
Conditions:
1) Using xnet-DPDK driver
2) DPDK v20.11 is being used (BIG-IP v17.5.x or higher)
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1977037-2 : TMM Virtual Edition on Azure goes into crash loop due to missing kernel driver★
Links to More Info: K000153024, BT1977037
Component: Local Traffic Manager
Symptoms:
- TMM goes into crash loop
- Repeated logs similar to the following can be seen from /var/log/tmm*
notice dpdk[001dd800-2e3d-001d-d800-2e3d001dd800]: DPDK internal port_id 2
notice dpdk: Error: DMA mapping of application heap failed with rte_error Operation not supported
notice dpdk: Error: app_heap_dma_map: app heap DMA mapping failed with rte_errno Operation not supported
notice dpdk[001dd800-2e3d-001d-d800-2e3d001dd800]: Error: DMA mapping application heap
notice dpdk: Error: Removing heap memory (0x40016a600000, 67108864 bytes): Device or resource busy
notice xnet_lib [vmbus:eth2]: Error: Failed to initialize driver
notice xnet[00:e2.0]: Error: Unable to attach to xnet dev
notice xnet(1.2)[00:e2.0]: Error: Unable to initialize device
notice xnet(1.2)[00:e2.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
Conditions:
- BIG-IP Virtual Edition is running on Microsoft HyperV on Azure Cloud
- Mellanox ConnectX-3 NIC is used
- XNET driver is being used
Impact:
TMM is unable to successfully start. Device is unable to process traffic.
Workaround:
Configure BIG-IP Virtual Edition to use the sock driver by entering the following command:
echo "device driver vendor_dev f5f5:f550 sock" >> /config/tmm_init.tcl
Reboot the BIG-IP VE instance by entering the following command:
reboot
1975297-1 : TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs
Links to More Info: BT1975297
Component: TMOS
Symptoms:
There are "vmbus_open subchannel failed: -12" kernel errors for uio module, uio_hv_generic. These errors prevent the TMM module from finishing initialization.
Conditions:
-- Using VE Azure
-- Using Azure instances with <= 16 vCPUs
Impact:
Azure VM is unable to reach Active state.
Workaround:
Use an Azure instance with more RAM. For example, F8s_v2 has 16 GiB of RAM and has a total limit of 4 interfaces. Instance size, E8ds_v5, has 64 GiB of RAM and can reach Active state with 4 interfaces.
1967293-4 : Re-configuring BFD multihop for a BGP peer does not work reliably.
Links to More Info: BT1967293
Component: TMOS
Symptoms:
When changing the BFD multihop configuration of a BGP peer, the previously existing BFD session might not be cleared properly preventing a new session from getting established.
Conditions:
Change the BFD multihop configuration of a BGP peer.
Impact:
Unable to establish BFD session.
Workaround:
Remove the BFD completely, then apply a new config.
1962713-3 : Limit on BIND maximum records per type★
Links to More Info: BT1962713
Component: Global Traffic Manager (DNS)
Symptoms:
Zones with over 100 records of the same type trigger an error during loading after upgrading to 17.1.2 or higher release, similar to the following:
error: dns_master_load: db.external.example.f5.com.:378: record1.example.f5.com.: too many records
zoneload: error: zone example.f5.com/IN/external: loading from master file db.example.f5.com. failed: too many records
zoneload: error: zone example.f5.com/IN/external: not loaded due to errors.
Conditions:
Occurs when "max-records-per-type" in a zone exceeds the default limit of 100.
Upgrading to 17.1.2 or higher release, given the BIND version upgrade that comes along with it, especially if configured for a single GTM pool with more than 100 members or cumulative pools exceeding 100 members.
Configuration changes to "max-records-per-type" won’t be accepted prior to the upgrade given that new BIND version (9.18.28) is not yet installed.
Impact:
BIND refuses to load zones, resulting in service disruption for affected zones.
Workaround:
After upgrading to v17.1.2 or higher, increase the max-records-per-type value as required. For instructions on how to do that, follow the steps documented in this article: https://my.f5.com/manage/s/article/K000150564
1959549-2 : Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0★
Links to More Info: BT1959549
Component: TMOS
Symptoms:
When upgrading from versions below 17.5.0 to 17.5.0 or later, the #TMSH-VERSION marker in bigip_base.conf is rewritten to the target system version instead of preserving the source UCS version. This prevents MCPD schema migration code from executing, potentially causing configuration mismatches and missing schema-based workarounds.
Conditions:
- roll-forward upgrade from v14.x/v15.x/v16.x/v17.1.x to v17.5.1 and later releases. upgrade from v17.5.x to v21.x and later versions is not affected.
Impact:
Overwriting TMSH-VERSION in bigip_base.conf file, uses the wrong schema when loading the configuration and miss applying MCP schema based workarounds.
Workaround:
None
1938101-5 : Performance issue on specific parameters extractions
Links to More Info: BT1938101
Component: Application Security Manager
Symptoms:
Performance degradation on specific pages
Conditions:
When there are dynamic parameters extractions using HTML
Impact:
Slowdown of the extraction page load time
Workaround:
None
1937545-3 : Disabling ipsec.if.checkpolicy lead to premature connection termination for a tunneled traffic
Links to More Info: BT1937545
Component: TMOS
Symptoms:
Connections arriving at the BIG-IP over an IPsec tunnel may be unexpectedly closed when ipsec.if.checkpolicy is disabled and the Virtual Server uses SNAT.
Conditions:
- BIG-IP with more than 1 TMM.
- IPsec tunnel in Interface mode.
- FastL4 Virtual Server with SNAT.
- sys db ipsec.if.checkpolicy is disabled.
- Traffic is initiated from behind the remote peer and uses auto lasthop to return traffic, ie there is no routing for the protected traffic back towards the client.
Impact:
Connections arriving via IPsec are unexpectedly and prematurely closed.
Workaround:
The sys db ipsec.if.checkpolicy is enabled by default.
Do not disable ipsec.if.checkpolicy when SNAT is on the Virtual Server that handles traffic for an IPsec tunnel.
1935713-3 : TMM crash when handling traffic over vlangroup with autolasthop disabled
Links to More Info: BT1935713
Component: Local Traffic Manager
Symptoms:
In certain circumstances, TMM may crash when handling traffic over a vlangroup with autolasthop disabled.
Conditions:
- Vlangroup.
- No self-IP addresses configured.
- Autolasthop is disabled.
Impact:
Traffic is disrupted while restarting TMM.
Workaround:
Enable autolasthop.
1933373-4 : Newly added Threat Campaigns are missing REST ID
Links to More Info: BT1933373
Component: Application Security Manager
Symptoms:
Newly created UTF-8 policies have an empty value for the REST ID (rest_uuid) in some or all Policy Threat Campaigns.
Conditions:
- Create a new UTF-8 policy using BIG-IP with no Threat Campaign license.
- License the Threat Campaign functionality.
- Create a second UTF-8 policy with the Threat Campaign enabled.
Impact:
Newly added Threat Campaigns are missing the REST ID.
Workaround:
- After license Threat Campaigns, the cached binary policy templates must be cleared to ensure newly created policies use updated templates reflecting the licensed Threat Campaign functionality.
Remove cached binary policy templates by running:
rm /var/ts/install/policy_templates/*.bin
- Threat Campaigns in new UTF-8 policy should have REST IDs.
1933105-4 : TMM does not fragment the output before encapsulating the payload
Links to More Info: BT1933105
Component: TMOS
Symptoms:
Tmm does not fragment the traffic before it goes to encapsulation
Conditions:
- IPSec
-- Tmm receives fragmented payload
Impact:
Large packets are not fragmented on egress.
Workaround:
None
1927521-2 : DPDK has dependency on SSSE3
Links to More Info: BT1927521
Component: TMOS
Symptoms:
TMM goes into restart loop with following error in /var/log/tmm regarding SSSE3 not being available
notice ERROR: This system does not support "SSSE3".
notice Please check that RTE_MACHINE is set correctly.
notice EAL: FATAL: unsupported cpu type.
notice EAL: unsupported cpu type.
notice dpdk: Error: rte_eal_init() failed, err=-1
notice xnet_lib [pci:0000:02:00.0]: Error: Failed to initialize driver
notice xnet[02:00.0]: Error: Unable to attach to xnet dev
notice xnet(1.1)[02:00.0]: Error: Unable to initialize device
notice xnet(1.1)[02:00.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
notice Initiating TMM shutdown.
notice tap(tap)[00:00.0]: Waiting for tmm1 to reach state 4...
notice ---------------------------------------------
Conditions:
1) xnet-DPDK is being used
2) BIG-IP running in an environment where SSSE3 is not available either because CPU is so old that it does not support SSSE3 or SSSE3 has been disabled in VM's config.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Switch to 'sock' driver by adding the following line into /config/tmm_init.tcl, replacing <VENDOR_ID:DEVICE_ID> with the corresponding interfaces' Vendor and Device IDs shown via 'lspci -nn'.
For environments in HyperV or Azure, f5f5:f550 should be used for Vendor and Device.
[root@BIGIP:Active:Standalone] log # cat /config/tmm_init.tcl
device driver vendor_dev <VENDOR_ID:DEVICE_ID> sock
[root@BIGIP:Active:Standalone] log #
1922661-4 : JSON profile settings not displayed in REST API after attaching schema files
Links to More Info: BT1922661
Component: Application Security Manager
Symptoms:
When a JSON content profile has validation files attached, the following settings are not visible through the REST API:
"sensitiveData"
"attackSignaturesCheck"
"metacharElementCheck"
Conditions:
JSON content profile has schema validation files attached.
Impact:
JSON profile settings not visible in REST API.
Workaround:
None
1854353-4 : Users with Resource admin role are not able to save the UCS.
Links to More Info: BT1854353
Component: TMOS
Symptoms:
When creating a UCS file, an error occurs:
Data Input Error: Invalid partition ID request, partition does not exist ([All])
Error during config save.
Unexpected Error: UCS saving process failed.
Conditions:
-- Creating a UCS file
-- The user role that initiated the UCS save is Resource Admin
Impact:
Users in a Resource Admin role are unable to save a UCS file.
Workaround:
Other admin type roles are able to save the UCS file.
1848577-3 : VCMP guest stats are not visible on vCMP host GUI nor CLI
Links to More Info: BT1848577
Component: Application Visibility and Reporting
Symptoms:
- Issuing the command 'tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }' returns 'No data available'
- Graphs on 'Statistics ›› Analytics : vCMP : CPU Usage' says "There is no data to display either due to the lack of relevant traffic or due to the settings of the filter." even after the vCMP guest has been running for more than 10 minutes.
Conditions:
- vCMP host running v17.1.x
- The following tables are missing when issuing the command tmctl -f /var/tmstat/blade/vcmp_union_tables' from the vCMP host:
vcmp_tmm_stat_union
vcmp_pva_stat_union
vcmp_proc_pid_stat_union
vcmp_host_info_stat_union
Impact:
No stats (eg. CPU, Network, Disk Usage) can be seen for the vCMP guests when looking from the vCMP host.
Workaround:
Run this Bash one-liner from the vCMP host:
bigstart restart merged ; sleep 600 ; bigstart restart avrd ; sleep 600 ; bigstart restart avrd merged ; sleep 600 ;
Thereafter, check the tables and analytics with these commands:
tmctl -w$COLUMNS -f /var/tmstat/blade/vcmp_union_tables
tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }
1848541-1 : Invalid regular expression causing bd restart loop
Links to More Info: BT1848541
Component: Application Security Manager
Symptoms:
ASM (BD) restart loop
/var/log/ts/bd.log contains events reporting PCRE compilation failure:
ECARD|ERR |Jan 23 10:16:59.036|14826|regexp_table_management.cpp:0057|key crc f77c3b66 PCRE compilation failed at offset 3: PCRE does not support \L, \l, \N{name}, \U, or \u
Conditions:
An invalid regular expression exists in a policy prior to upgrade.
Impact:
Bd restart loop. ASM traffic disrupted while bd restarts.
Workaround:
Clear out incorrect regular expressions from DCC.GLOBAL_PARAM_REG_EXPS
Restart ASM or allow the device to restart.
# tmsh restart sys service asm
1827821-3 : isBase64 params and headers not blocking Attack Signatures
Links to More Info: BT1827821
Component: Application Security Manager
Symptoms:
The parameter value in GET requests are considered as base64 even when the calculated score is below 'base64_max_score'
Params and headers configured as "Base64Decode=required" do not detect base64 encoded attack signatures.
Conditions:
-- Create a parameter named "param" configured as "Base64Decode=required".
-- Send Request to URL /?param=PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==
Impact:
No Violations Detected, while the parameter included an attack signature (PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg== is the base64 encoded value of <script>alert(1)</script>)
Workaround:
None
1825357-3 : Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk
Links to More Info: BT1825357
Component: Local Traffic Manager
Symptoms:
Tmm crashes and generates a core file.
or
Network traffic via a trunk does not work.
Conditions:
Platform i2600, i2800, i4600, i4800, r2800, r4800 or VADC
All trunk members are removed from a trunk attached to a vlan.
Then, the trunk is removed from one or more vlans.
Then, the trunk is deleted.
This could result in a tmm crash.
or
A trunk with no members is added to a vlan.
Then, one or more members are added to the trunk.
This will result in traffic on that vlan not being being sent over that trunk.
Impact:
Traffic disrupted while tmm restarts
or
Traffic is not sent out via the trunk
Workaround:
Do not remove and a trunk with no members from a vlan.
It will be necessary to restart tmm to correct this situation.
Do not add a trunk with no members to a vlan.
If a trunk with no members was added to the vlan, the issue can be corrected by removing the trunk from the vlan, ensuring that there are members in the trunk and adding it back to the vlan.
1825057-3 : 'vs_name' field truncated at 64 characters with ASM's remote logging
Links to More Info: BT1825057
Component: Application Security Manager
Symptoms:
The virtual server name field (vs_name) is truncated at 64 bytes with ASM's remote logging handled by BD process.
The 'vs_name' field comprises of the partition name as well as virtual server name and the 64 character limit is inclusive of both these names.
Conditions:
ASM/Advanced WAF device running one of the versions listed under Known Affected Versions.
Impact:
Virtual server name gets truncated in remote logging events
Workaround:
None.
1814413-2 : Dynamic parameters are not extracted and cookies are not generated
Links to More Info: BT1814413
Component: Application Security Manager
Symptoms:
Dynamic parameters are not extracted and cookies are missed.
Conditions:
Create a parameter in extraction and in the Extracted Items configuration.
Impact:
Unable to extract dynamic parameters due to which false positives are generated.
Workaround:
Include the file type in the Extracted Items configuration.
1813625-3 : "tmsh show net ipsec-stat" command is not showing statistics - all values are zero.
Links to More Info: BT1813625
Component: TMOS
Symptoms:
Output of "tmsh show net ipsec-stat" shows all zeros for values of "Packets In", "Bytes In", "Packets Out" and "Bytes Out".
Conditions:
"tmctl ipsec_data_stat" displays separate statistics for encrypted and plain data but tmsh show zero values.
Impact:
Tmsh can't be used to display IPSec statistics
Workaround:
Data can be displayed with "tmctl ipsec_data_stat"
1812349-4 : IPsec phase 2 (IKEv1 Quick Mode) will not start after upgrade★
Links to More Info: BT1812349
Component: TMOS
Symptoms:
IPsec IKEv1 tunnels fail half way through tunnel negotiation. As a result the tunnel never comes up.
Conditions:
-- BIG-IP with IKEv1 IPsec tunnel
-- ISAKMP traffic to the remote peer is not in route-domain 0 (RD0)
-- Upgrade to version 16.x or 17.x
Impact:
IPsec tunnels are not able to connect remote peer networks.
Workaround:
There are two options:
-- Use IKEv2, this will require that the remote peer is also reconfigured to IKEv2.
-- Alternatively, move the IPsec peer's configuration to RD0.
1787645-4 : BD process fail to startup on specific XML configuration
Links to More Info: BT1787645
Component: Application Security Manager
Symptoms:
BD does not start up (restart loop).
Conditions:
An XML configuration with specific configuration in the profile.
Impact:
System does not start up.
Workaround:
Remove the specific configuration in the profile.
1782057-4 : BD crash related to dns lookup
Links to More Info: BT1782057
Component: Application Security Manager
Symptoms:
A bd daemon crash
Conditions:
Related to DNS lookup scenarios
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1778793-4 : Database health monitors may use the wrong connection when attempting to connect to database
Links to More Info: BT1778793
Component: Local Traffic Manager
Symptoms:
Database monitors fail periodically and mark a pool member down.
Periodically, the DB monitor will create user sessions on the DB server without closing them.
Conditions:
- Multiple database health monitor instances exist to probe a given node.
- The monitor instances share the same values for the following parameters:
- destination IP address
- destination port
- database name.
Impact:
Healthy pool members are not selected to receive traffic.
Workaround:
You can work around this issue by using a BIG-IP EAV external monitor to probe the health of your database. An example for MySQL is available on DevCentral at https://community.f5.com/kb/codeshare/mysql-monitor/273565.
Alternatively, you may also work around this issue by adding a unique connection property as a suffix to the database name. This ensures a unique JDBC connection string is constructed for each monitor in order to avoid this issue.
For example you can use the connection properties "ApplicationName=<monitor_name>" or "applicationName=<monitor_name>" in PostgreSQL or Microsoft SQL Server respectively to provide the name of the calling monitor to the database.
In Oracle a connection string similar to the following can be used:
database (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=%node_ip%)(PORT=%node_port%))(CONNECT_DATA=(SERVICE_NAME=ORACLE1))(SERVER=dedicated)(customKey=1))
or
database "%node_ip%:%node_port%:ORCLDB1?customkey=1"
Note that the PostgreSQL monitor requires a "?" character as a separator between the database name and the connection property, while MS SQL Server requires a ";" as separator.
Example tmsh commands to disambiguate monitorA and monitorB which both probe database "samedb" on the same node:
- PostgreSQL monitors:
- tmsh modify ltm monitor postgresql monitorA database samedb?ApplicationName=monitorA
- tmsh modify ltm monitor postgresql monitorB database samedb?ApplicationName=monitorB
- MS SQL Server:
- tmsh modify ltm monitor mssql monitorA database '"samedb;applicationName=monitorA"'
- tmsh modify ltm monitor mssql monitorB database '"samedb;applicationName=monitorB"'
- Oracle Server:
- tmsh modify ltm monitor oracle myoracle database '%node_ip%:%node_port%:PTDB3CC1?customkey=1'
Note that the extra quoting in the example command for MS SQL Server is required to preserve the ";" separator in the database name.
1772353-3 : Defaults for Associated Violations are re-added to a policy
Links to More Info: BT1772353
Component: Application Security Manager
Symptoms:
When Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported, the default elements are re-added to the list.
Conditions:
Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported
Impact:
The default Session Awareness Violations are set back to delay blocking unexpectedly.
Workaround:
Use binary format export and import.
1755113-5 : BD crash with specific JSON schema
Links to More Info: BT1755113
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
Using specific JSON schema in the JSON content profile applied on the ASM policy
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1708309-4 : Dynconfd crash with invalid ephemeral pool member
Links to More Info: BT1708309
Component: Local Traffic Manager
Symptoms:
If the BIG-IP configuration becomes corrupted in such a way that an ephemeral pool member exists with no corresponding FQDN template pool member, ephemeral node or FQDN template node, the dynconfd daemon may crash repeatedly.
Conditions:
This issue has only been encountered when corruption of the MCP database resulted in an ephemeral pool member existing with no corresponding FQDN template pool member, ephemeral node or FQDN template node. This is an invalid configuration which cannot be created through user action, and can only occur due to corruption of the MCP database. Such corruption is extremely rare, and the cause is not known.
Impact:
The dynconfd daemon performs the action of resolving node FQDN names to IP addresses and creating ephemeral nodes and pool members with those addresses. When this issue occurs, dynconfd will be unable to resolve FQDN names in any existing FQDN template nodes (and FQDN template pool members) to their corresponding IP addresses. This can result in a lack of available pool members to process traffic.
Workaround:
To recover from the MCP database corruption, perform the actions described in the following F5 knowledge article:
K13030: Forcing the mcpd process to reload the BIG-IP configuration
1690005-3 : Masquerade Mac is not removed when F5OS is rebooted
Links to More Info: BT1690005
Component: F5OS Messaging Agent
Symptoms:
Masquerade Mac is not removed when F5OS is rebooted.
It can be observed using the 'show fdb' command in confd
Conditions:
- A HA pair of tenants is used
- A traffic group uses a masquerade mac
- The Active tenant is rebooted
Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.
Workaround:
The masquerade mac's fdb can be manually deleted using the F5OS CLI.
From the standby F5OS system CLI:
config
no fdb mac-table entries entry <mac masquerade address>
commit
1671149-5 : Timestamp cookies may cause issue for PVA-accelerated connections
Links to More Info: BT1671149
Component: Advanced Firewall Manager
Symptoms:
Timestamp cookies may cause performance issues for PVA-accelerated connections on some older platforms and/or platforms without a performance license.
Conditions:
- PVA offload configured (any stage).
- DOS ACK (TS) vector has timestamp cookies option enabled.
- Platform supporting ePVA feature (Ref. https://my.f5.com/manage/s/article/K12837)
- Platform does not belong to the following subset:
B2250 (A112)
B4450N (A114)
B4460N (A121)
i10800 (C116)
i7800 (C118)
i5800 (C119)
i11800 (C123)
i11800-DS (C124)
i5820-DF (C125)
i7820-DF (C126)
i15800 (D116)
i15820-DF (D120)
VELOS BX110, BX520
r5800/5900, r10800/10900, r12800/12900 r-series platforms
Additionally, for platforms specified in the list above a license with support of turboflex 'Basic DoS vectors' capability is required. Note, this requires a 'Performance' license on some of platforms.
For more information about Turboflex please check article https://techdocs.f5.com/en-us/hw-platforms/f5-platform-turboflex-profiles/title-turboflex-overview.html
Impact:
Tmm resets the connection or causes slow performance.
Workaround:
Disable timestamp-cookie feature.
1644497-5 : TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed
Links to More Info: BT1644497
Component: TMOS
Symptoms:
In TMM memory, the old CRL data is available until the existing connections are closed. This may exhaust TMM memory.
Conditions:
- Connections last for a long time.
- Frequent updates on the CRL.
Impact:
TMM memory exhausts.
Workaround:
- Dynamic CRL or CRLDP on the Client-SSL profile can be configured to dynamically verify the SSL certificate revocation status.
or
- Online Certificate Status Protocol (OCSP) can be enabled on the Client-SSL profile to validate SSL certificate revocation status.
1642301-5 : Loading single large Pulse GeoIP RPM can cause TMM core
Links to More Info: BT1642301
Component: Global Traffic Manager (DNS)
Symptoms:
Creates a TMM core.
Conditions:
Loading large Pulse GeoIP RPM resources.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use GEOIP Edge database.
1635013-5 : The "show sys service" command works only for users with Administrator role
Links to More Info: BT1635013
Component: TMOS
Symptoms:
A guest or non-root user must be able to use the TMSH “show sys service” command, as there is no rule associated with a schema.
Conditions:
The issue occurs when the user is a non-root user.
Impact:
A non-root user will not be able to run the command even though they have permissions.
Workaround:
None
1632385-5 : Non-ASCII UTF-8 characters are mangled in JSON policy export
Links to More Info: BT1632385
Component: Application Security Manager
Symptoms:
Non-ASCII UTF-8 characters in a JSON policy are mangled when exported in JSON policy.
Conditions:
Values contains Non-ASCII UTF-8 characters and the policy is exported and imported back
Impact:
After re-importing the exported policy, the values change
Workaround:
None
1623669-3 : False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF)
Links to More Info: BT1623669
Component: Application Security Manager
Symptoms:
Requests may be blocked with the violation “Illegal dynamic parameter value” even though the parameter values were correctly extracted from application responses using “Search in Links” and should be treated as valid.
Conditions:
- A parameter is configured with Dynamic content value
- “Check – Search in Links” is enabled for the parameter
- The parameter value is extracted from response links (HREF)
- The extracted value is later used in a client request while the policy is enforced
Impact:
Legitimate application traffic may be blocked because values extracted from links are not recognized as valid dynamic parameter values.
Workaround:
None
1621977-1 : Rewrite memoryleak with "REWRITE::disable" irule
Links to More Info: BT1621977
Component: Access Policy Manager
Symptoms:
Rewrite memory leak.
Conditions:
"REWRITE::disable" irule attached to virtual server.
Impact:
Rewrite memory usage is high.
Workaround:
Avoid using 'REWRITE::disable'
If only URL rewriting required (and not content rewriting), the below custom iRule which is designed exclusively for URL rewriting can be utilized,
===========
when HTTP_REQUEST {
if {[HTTP::host] equals "<JS file name>"}
{
HTTP::uri [string map {F5CH=J F5CH=I} [HTTP::uri]]
HTTP::uri [string map {F5CH=H F5CH=I} [HTTP::uri]]
}
}
===========
1602629-5 : Tmm_mcpmsg_print can trigger SOD
Links to More Info: BT1602629
Component: TMOS
Symptoms:
TMM is killed by SOD.
Conditions:
Conditions are unknown, it was encountered when ID 1047789 was encountered, see https://cdn.f5.com/product/bugtracker/ID1047789.html
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1600617-5 : Few virtio driver configurations may result in excessive memory usage
Links to More Info: BT1600617
Component: TMOS
Symptoms:
Certain virtio driver configurations may result in excessive memory usage, which in some cases, leads to issues with forwarding traffic.
'tmctl page_stats' output can be examined on a newly launched system to verify if any of the TMMs except for TMM0 have their memory exhausted.
Conditions:
Virtio driver memory usage scales up with:
- Number of queues.
- Number of TMMs.
- Number of interfaces.
- Queue size.
Increasing these numbers might cause a problem trigger.
Impact:
Excessive memory usage, in some cases, leads to problems with traffic forwarding.
Workaround:
Scale down on the number of queues and their size. Reduce the number of interfaces.
1589629-5 : An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address
Links to More Info: BT1589629
Component: Local Traffic Manager
Symptoms:
The destination MAC address of the ICMPv6 Neighbor Solicitation message is incorrect.
Conditions:
An IPv6 SelfIP address is used, and tmm attempts to resolve the address of (for example) an IPv6 pool memeber which is using the last IPv6 address in the available subnet range.
Impact:
Nodes on the network do not respond to ICMPv6 Neighbor Solicitation messages.
In large environments with many affected addresses, this could potentially contribute to a broadcast storm or degrade overall network performance.
Workaround:
None (other than avoiding the use of the last address in the IPv6 subnet range)
1589269-4 : The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★
Links to More Info: BT1589269
Component: SSL Orchestrator
Symptoms:
From version 16.1.0 the maximum value of sys db provision.extramb is 4096 MB, reduced from 8192 MB. It will be automatically set to 4096 during the upgrade if it has a higher setting.
Conditions:
Any BIG-IP device running software version 16.1.0 or higher.
Impact:
It is extremely rare to need values of provision.extramb above 4096 MB.
No impact on upgrade if value of sys db provision.extramb is 4096 or less. After the upgrade, it is not possible to increase the value above 4096.
If greater than 4096 the value will be reduced to 4096 when upgrading to version 16.1.0 or higher. This may leave device with insufficient 4KB page memory (also known as host memory) which may lead to issues due to memory pressure such as oom killer killing processes, poor scheduling of processes which may cause core dumps, and sluggish management access.
Workaround:
None
1586745-3 : LACP trunk status became DOWN due to bcm56xxd failure
Links to More Info: BT1586745
Component: TMOS
Symptoms:
Lacp, lldp reports trunk(s) down and you may observe the below logs.
err lldpd[7489]: 01570004:3: HAL send PDU failed
err lldpd[7489]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lldpd[7489]: 01570004:3: HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: ING_SERVICE_COUNTER_TABLE_X.ipipe0 interrupt timeout
err lacpd[10571]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lacpd[10571]: 01160005:3: HalMsgHandler.cpp:125 - HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: FP_COUNTER_TABLE_X.ipipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: EFP_COUNTER_TABLE_X.epipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
Conditions:
Not known at this time.
Impact:
An outage was observed
Workaround:
Restart bcm56xxd, lldpd, lacpd process.
1586405-4 : "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page
Links to More Info: BT1586405
Component: Access Policy Manager
Symptoms:
Observe multiple "/f5-h-$$/" in URLs when accessing via Protected Access.
Conditions:
"<base href="xxxxx">" tag in the home page.
Impact:
URLs become lengthy upon every refresh and may lead to webapp misfunction.
Workaround:
Customized iRule
======================
when REWRITE_REQUEST_DONE {
if { [HTTP::path] ends_with "path_to_file1" } {
REWRITE::post_process 1
set rewrite_new 1
}
if { [HTTP::path] ends_with "path_to_file2" } {
REWRITE::post_process 1
set rewrite_new1 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists rewrite_new]} {
unset rewrite_new
set rewrite_str {<base href=""f5-h-$$path_in_file1"">}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file1">}
}
}
if {[info exists rewrite_new1]} {
unset rewrite_new1
set rewrite_str {<base href="f5-h-$$/path_in_file2">}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file2">}
}
}
}
======================
1583381-4 : "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default
Links to More Info: BT1583381
Component: Application Security Manager
Symptoms:
The pure wildcard cookie configuration "Insert Secure Attribute" is disabled and "Insert SameSite Attribute" is not set to "Lax".
Conditions:
Creating the policy using the policy templates.
Impact:
The configuration is incorrect.
Workaround:
Configure it manually: Enable "Insert Secure Attribute" and set "Insert SameSite Attribute" to "Lax".
1574521-3 : Intermittent high packet latency on R4000 and R2000 tenants
Links to More Info: BT1574521
Component: Performance
Symptoms:
When compared to previous platforms, BIG-IP tenants on R4000 and R2000 platforms may demonstrate higher jitter and packet latency / rtt. This affects pings, tcp, udp, and any other protocols processed by the software data plane (tmm).
This is because the r4000 and r2000 appliances have a slightly different hardware architecture than other appliances.
CPUs on this platform are not dedicated to the tenant and these platforms also run a different class of Intel processing, and do not utilize hyperthreading like the higher end platforms do.
See:
https://clouddocs.f5.com/training/community/rseries-training/html/rseries_performance_and_sizing.html#r4000-vcpu-sizing
Conditions:
BIG-IP tenants on R4000 and R2000 platforms
Impact:
Intermittent high latency and jitter.
Workaround:
None
1572045-3 : Login page config parameters are still case-sensitive with a case insensitive policy
Links to More Info: BT1572045
Component: Application Security Manager
Symptoms:
A login attempt is not detected.
Conditions:
- The policy is configured case-insensitive
- Upper case characters are used in the login page config parameters.
Impact:
Login attempt not detected.
Workaround:
Use only lower case for login page parameters configuration.
1571817-5 : FQDN ephemeral pool member user-down state is not synced to the peer device
Links to More Info: BT1571817
Component: TMOS
Symptoms:
One or more FQDN ephemeral pool members on a device group member is showing an incorrect state for the pool member.
Conditions:
1. Create the FQDN pool with an FQDN template pool member and ensure that the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
2. On one member of the device group, modify the state of the FQDN template pool member to 'user-down'.
3. Synchronize the configuration to the device group.
4. Check the status of the pool on the same member of the HA pair and verify that the state of any ephemeral pool member associated with the FQDN template pool member is 'user-down'.
5. On the other member of the device group, the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
Impact:
The state of the ephemeral pool members on one member of the device group is incorrect.
Workaround:
None
1481889-5 : High CPU utilization or crash when CACHE_REQUEST iRule parks.
Links to More Info: BT1481889
Component: Local Traffic Manager
Symptoms:
When CACHE_REQUEST iRule stops, the Ramcache filter stays in CACHE_INIT state when it restarts. This causes the request to be processed twice, which causes high CPU usage or a crash when an incorrect address is encountered.
Conditions:
- HTTP Virtual server
- CACHE_REQUEST iRule with ms delay
- Multiple attempts to request a compressed doc
Impact:
- High CPU on boxes with 4G of valid memory after the key is hashed - on smaller boxes, will crash when an invalid address is encountered.
Workaround:
- Removal of CACHE_REQUEST iRule if avoidable
1474877-5 : Unable to download large files through VIP due RST Compression error.
Links to More Info: BT1474877
Component: Local Traffic Manager
Symptoms:
- Download of files exceeding maximum tmm.deflate.memory.threshold fails at client.
- Client receives RSTs (Compression error)
Conditions:
- Virtual server with HTML profile or REWRITE profile.
- Size of decompressed http response from server exceeds max tmm.deflate.memory.threshold value i.e. 4718592 bytes.
Impact:
- Client may lose connection to the server.
Workaround:
- Based on URI matches in the HTTP request, decide which responses should NOT be rewritten (e.g. big downloads) and disable REWRITE profile for the selected responses.
- For example, URI starting with "/headsupp/api/data/compare/measures" :
when HTTP_REQUEST {
if { [HTTP::uri] starts_with "/headsupp/api/data/compare/measures" } {
set no_rewrite 1
}
}
when HTTP_RESPONSE {
if { $no_rewrite == 1 } {
REWRITE::disable
}
}
1463089-2 : TMM crash because of corrupted MQTT queue
Links to More Info: BT1463089
Component: Local Traffic Manager
Symptoms:
Tmm crashes while terminating an MQTT flow. Core file analysis indicates MQTT queue corruption.
Conditions:
LTM configured with TCP and MQTT.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1462337-6 : Intermittent false PSU status (not present) through SNMP
Links to More Info: BT1462337
Component: TMOS
Symptoms:
PSU status displays as (2) Not Present through SNMP.
or
sysChassisFanStatus status displays as (2) Not Present through SNMP.
Conditions:
Conditions are unknown. It occurs intermittently.
Impact:
Intermittent false alarm in SNMP monitoring.
Workaround:
None
1455805-3 : MCPD unstable/inoperative after copying SNMP configuration from another BIG-IP
Links to More Info: BT1455805
Component: TMOS
Symptoms:
If SNMP configuration that contains Secure Vault-protected attributes ("$M$...") is copied from a BIG-IP system to another and the devices do not have the same Secure Vault master key, the target device will appear to accept the configuration, but will be unable to decrypt the attributes.
If the system is subsequently rebooted, MCPD will remain inoperative or restart repeatedly during startup.
The LTM log files will contain error messages similar to the following:
bigip01 notice mcpd[30645]: 01071027:5: Master key OpenSSL error: 4008867572:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:664:
bigip01 notice mcpd[30645]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
bigip01 err mcpd[30645]: 01071684:3: Unable to encrypt application variable (/Common/ifoobar_1_1 auth_password usmuser /Common/snmpd).
Or
bigip01 notice mcpd[7011]: 01b00001:5: Processed value is empty: class name (trapsess) field name ()
bigip01 err mcpd[7011]: 01071684:3: Unable to encrypt application variable (/Common/i192_0_2_1 auth_password trapsess /Common/snmpd).
The LTM log file may contain this log message, indicating that MCPD exited and restarted while attempting to load the configuration:
bigip01 emerg load_config_files[25201]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed. -- Error: failed to reset strict operations; disconnecting from mcpd. Will reconnect on next command.
Conditions:
- SNMP configuration that contains Secure Vault-encrypted attributes ("$M$..."), present as SNMPv3 auth-password and/or privacy-password attributes
- SNMP configuration is copied from a BIG-IP system to another BIG-IP system, and the two devices do not share the same Secure Vault master key.
Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.
Workaround:
Do not copy SNMP configuration with encrypted attributes between disparate devices.
If a device is currently in an inoperative state and affected by this issue:
- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.
1440409-8 : TMM might crash or leak memory with certain logging configurations
Links to More Info: BT1440409
Component: Local Traffic Manager
Symptoms:
TMM might crash or leak memory with certain logging configurations.
Conditions:
Virtual-to-virtual chaining is used for handling syslog messages.
Impact:
Memory leak or Crash.
Workaround:
None
1429813-6 : ASM introduce huge delay from time to time
Links to More Info: BT1429813
Component: Application Security Manager
Symptoms:
During high traffic, the response to some requests will be delayed for more than 1 second.
Conditions:
ASM Policy attached to the Virtual Server and during high traffic conditions.
Impact:
Some critical URLs like payment links, will timeout for the user.
Workaround:
None
1407949-6 : iRules using regexp or regsub command with large expression can lead to SIGABRT.
Links to More Info: BT1407949
Component: Local Traffic Manager
Symptoms:
When iRule is using badly crafted regexp or regsub command, sometimes large regex compilation may lead to TMM core.
- Multiple clock advances will be logged in tmm logs.
- A message similar to the one below will be logged in tmm logs:
notice sod[9938]: 01140041:5: Killing tmm.0 pid <pid of tmm>.
Conditions:
- iRules using regexp or regsub command with large expression
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Update iRule to avoid using regex or regsub with large expressions.
either by
1. setting an upper-limit on the permitted size for regex expression or
2. rewrite the iRule to avoid the use of 'regsub'.
1395349-3 : The httpd service shows inactive/dead after "bigstart restart httpd"
Links to More Info: BT1395349
Component: TMOS
Symptoms:
The systemd service unit for httpd shows a status of inactive (dead) after you restart httpd using bigstart restart httpd. For example:
# systemctl status httpd
* httpd.service - LSB: start and stop Apache HTTP Server
Loaded: loaded (/etc/rc.d/init.d/httpd; enabled; vendor preset: enabled)
Active: inactive (dead) since Mon 2023-11-13 09:55:06 GMT; 5s ago
In versions v15.1.10.5 and above in v15.1.x, v16.1.5 and above in v16.1.x, and v17.1.1.4 and above, if a system is affected by this and then a user or process restarts httpd via systemd, the GUI will stop responding and return 403 Forbidden errors. This happens when attempting to renew or update the device certificate via the GUI.
Conditions:
Executing the command bigstart restart httpd. This will also happen behind-the-scenes when making HTTP configuration changes via tmsh/the GUI/iControl.
Impact:
httpd is running normally, but systemd is not aware of it.
Workaround:
To confirm httpd is running, you can use the following commands:
bigstart status httpd
OR
ps ax | grep '[h]ttpd'
If you would like to clear the stale state, restart httpd via its systemd service unit twice:
systemctl restart httpd && systemctl restart httpd
If the GUI is returning 403 Forbidden errors for everything, restart httpd ("systemctl restart httpd && systemctl restart httpd").
1366269-6 : NAT connections might not work properly when subscriber-id is confiured.
Links to More Info: BT1366269
Component: Advanced Firewall Manager
Symptoms:
When subscriber-aware NAT is configured or subscriber-id logging is enabled under NAT log profile some NAT connections might not work properly.
Conditions:
- Subscriber-aware NAT or NAT logging with subscriber-id enabled.
Impact:
Some NAT connections fail to complete.
Workaround:
Disable 'subscriber-id' under NAT logging profile.
1361021-5 : The management interface media on a BIG-IP Tenant on F5OS systems does not match the chassis
Links to More Info: BT1361021
Component: TMOS
Symptoms:
The management interface media on a BIG-IP tenant running on F5OS systems does not match the media/speed of the management interface on the system controllers.
Running 'tmsh show net interface' reports the media of the management interfaces (i.e. 'mgmt' or '1/mgmt') as "100TX-FD".
Conditions:
BIG-IP tenant running on F5OS systems (rSeries or VELOS).
Impact:
The media is reported as "100TX-FD".
Workaround:
Ignore the speed reported for the tenant's management interface(s), and instead, look at the speed of the management interfaces as reported in F5OS.
While running confd, run the following command to see the correct media settings:
VELOS: show interfaces interface 1/mgmt0
rSeries: show interfaces interface mgmt
1347861-5 : Monitor status update logs unclear for FQDN template pool member
Links to More Info: BT1347861
Component: TMOS
Symptoms:
When the state of an FQDN template node is changed (such as being forced offline by user action), one or more messages similar to the following may appear in the LTM log (/var/log/ltm):
notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status unchecked. [ ] [ was unknown for #hrs:##mins:##sec ]
Although such log messages indicate the current state of the FQDN template pool member, the prior status is indicated as "unknown" and does not accurately indicate the prior state of the FQDN template pool member.
Conditions:
This may occur when FQDN nodes and pool members are configured, and When the state of an FQDN template node is changed (such as being forced offline or re-enabled from an offline state by user action).
Impact:
Such messages may confuse users who are attempting to monitor changes in the BIG-IP system by not providing clear information.
Workaround:
The state of an FQDN template pool member is generally determined by the state of the referenced FQDN template node. The FQDN template node contains the configuration used to resolve the FQDN name to the corresponding IP addresses. FQDN template pool members are not involved in this process, and generally only reflect the status of the name resolution process centered on the FQDN template node.
Examining log messages related to to the associated FQDN template node can inform the interpretation of the FQDN template pool member state.
For example, if an FQDN template node is forced offline, messages similar to the following will be logged indicating the FQDN template node state change, which is subsequently reflected in FQDN template pool member state changes:
notice mcpd[####]: 01070641:5: Node /Common/nodename address :: session status forced disabled.
notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status forced down. [ ] [ was unknown for #hr:##min:##sec ]
notice mcpd[####]: 01070641:5: Node /Common/nodename address :: session status enabled.
notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status unchecked. [ ] [ was unknown for #hr:##min:##sec ]
1341093-6 : MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile
Links to More Info: BT1341093
Component: Local Traffic Manager
Symptoms:
A configuration error is seen on BIG-IP as below:
01070734:3: Configuration error: In Virtual Server (/Common/vsname) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/PORTAL-3119-cssl-tls13'; cipher ECDHE-RSA-AES128-GCM-SHA256 must be available
Conditions:
- Virtual Server with cipher rule that uses tlsv1_3 ciphers only
- Cipher group
- Client-SSL profile and HTTP/2 profile with enforce-tls-requirements enabled
Impact:
HTTP/2 and Client-SSL Profiles with TLS 1.3 is not supported.
Workaround:
None
1331037-6 : The message MCP message handling failed logs in TMM with FQDN nodes/pool members
Links to More Info: BT1331037
Component: TMOS
Symptoms:
When an FQDN node or pool member is created, one or more messages of the following form may appear in the TMM logs (/var/log/tmm*):
notice MCP message handling failed in 0x<hex value>
Conditions:
This may occur when creating an FQDN node or pool member on affected versions of BIG-IP.
Impact:
There is no known impact of this issue, besides the appearance of "notice" level messages in the TMM logs.
Workaround:
None
1327649-5 : Invalid certificate order within cert-chain associated to JWK configuration
Links to More Info: BT1327649
Component: TMOS
Symptoms:
An error occurs while validating the certificate and certificate chain in JSON web key configuration:
General error: 01071ca4:3: Invalid certificate order within cert-chain (/Common/mycert.crt) associated to JWK config (/Common/myjwk). in statement [SET TRANSACTION END]
Conditions:
Issue occurs when the certificate chain contains three or more certificates.
The proper order in issuing:
endpointchild
|
endpoint
|
intermediate
|
ca
Impact:
You are unable to create a policy with key configuration for OAuth when the certificate chain contains more than two certificates.
Workaround:
Note that there is no impact when the certificate chain order is valid and contains only two certificates in the chain.
1325649-4 : POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member
Links to More Info: BT1325649
Component: Local Traffic Manager
Symptoms:
After upgrading from a BIG-IP version prior to v16.1.0 to BIG-IP v16.1.0 or later, one specific virtual-server is not working as expected and unable to forward the POST request towards the pool member.
Conditions:
1) Upgrade to v16.1.0 or later
2) Send a POST request from client with "Expect: 100-Continue".
3) Attach an irule using http::collect plus http::release to the Virtual Server.
Impact:
Cannot send POST requests from client to server
Workaround:
If ASM is provisioned, a transparent ASM policy can be a workaround.
1. Create a transparent ASM policy
At GUI Security >> Application Security: Security Policies
Click Create
Fill in following
Policy name: <unique policy Name>
Policy Type: Security(Default)
Policy Template: Fundamental (Default)
Leaning and Blocking
Enforcement Mode: Transparent
Save
Click the policy name created above, and modify following
Policy Building Learning Mode: Disabled
Save and Apply Policy
2. Enable Application Security Policy with the ASM Policy created above at the LTM Virtul Server Security configuration.
1322413-6 : After config sync, FQDN node status changes to Unknown/Unchecked on peer device
Links to More Info: BT1322413
Component: TMOS
Symptoms:
If changes are made to the FQDN node configuration, which has a node monitor configured, and the configuration is synced to a device group, ephemeral nodes generated from the FQDN node may show Availability as “unknown” and Monitor Status as “unchecked”.
Conditions:
This may occur on versions of BIG-IP with fixes for ID724824 and ID1006157, under the following conditions:
- BIG-IP systems are configured in a device group
- The device group is configured for Manual Sync (Full or Incremental)
- One or more FQDN nodes are configured with a node monitor (which could be the Default Node Monitor)
- A change is made to the configuration of the FQDN node
- A Full configuration sync is performed (by a Manual sync with the device group configured for a Full sync, as an automatic fallback/recovery action from a failed Incremental sync, or by using the “force-full-load-push” keyword):
tmsh run cm config-sync to-group example-group force-full-load-push
Impact:
The affected nodes will be displayed with an Availability as “unknown” and Monitor Status as “unchecked”.
Workaround:
To resolve this condition, remove and add the node monitor:
- Remove the node monitor from the FQDN node configuration (or from default-node-monitor):
tmsh mod ltm node example monitor none
(tmsh mod ltm default-node-monitor rule none)
- Sync this change to the device group (Incremental sync)
- Add the node monitor again to the FQDN node configuration (or to default-node-monitor):
tmsh mod ltm node example monitor my_node_monitor
(tmsh mod ltm default-node-monitor rule my_node_monitor)
- Sync this change to the device group (Incremental sync)
1312225-5 : System Integrity Status: Invalid with some Engineering Hotfixes
Links to More Info: BT1312225
Component: TMOS
Symptoms:
After installing an Engineering Hotfix,
when to attempt to verify the TPM system integrity with either the "tpm-status" or "tmsh run sys integrity status-check" command, the following error massage may appear:
System Integrity Status: Invalid
Running the "tpm-status" command with a Verbosity of 1 (or greater) reveals the following detail:
Verifying system integrity...
...
The signature in 17 is valid
Output wrong commandline parameters
cmdline is *ro ima_hash=sha256 mce=ignore_ce *
The pcr value in 17 is invalid.
...
System Integrity Status: Invalid
Conditions:
This may occur if the Engineering Hotfix contains changes which cause the following packages to be included in the Engineering Hotfix ISO:
-- sirr-tmos
-- tboot
But the Engineering Hotfix ISO does not contain the following package:
-- nash-initrd
The contents of the Engineering Hotfix ISO can be checked using the 'isoinfo' utility:
isoinfo -Rf -i <path/to/Hotfix-*.iso> | grep -e sirr -e tboot -e nash
Impact:
The TPM System Integrity Status is shown as Invalid.
This may incorrectly suggest that system integrity has been compromised.
1301317-5 : Update Check request using a proxy will fail if the proxy inserts a custom header
Links to More Info: BT1301317
Component: TMOS
Symptoms:
Update check fails.
Conditions:
-- Update check is checking for updates
-- A proxy is configured
-- The proxy inserts a header in its response
Impact:
Update check will fail.
Workaround:
Do not add any header in the proxy response.
1298225-4 : Avrd generates core when dcd becomes unavailable due to some reason
Links to More Info: BT1298225
Component: Application Visibility and Reporting
Symptoms:
Avrd core file generates.
Conditions:
When avrd is writing to the external device and that device is unavailable temporarily.
Impact:
Potential system impact.
Workaround:
None
1294141-8 : ASM Resources Reporting graph displays over 1000% CPU usage
Links to More Info: BT1294141
Component: Application Visibility and Reporting
Symptoms:
The ASM resources graph which is present under Security > Reporting > ASM Resources > CPU Utilization displays over 100% CPU usage when ASM is under load. The unit is percentage so it shouldn't exceed 100.
Conditions:
ASM should be under load and utilizing most of CPU cycles.
Impact:
Reporting graph displays incorrect percent value.
Workaround:
1. Backup /etc/avr/monpd/monp_asm_cpu_info_measures.cfg file.
2. Run the following:
$ sed -i 's|distinct time_stamp))|distinct time_stamp)*100)|g' /etc/avr/monpd/monp_asm_cpu_info_measures.cfg
3. To make those changes take affect, run the following command:
$ bigstart restart monpd
1290937-4 : 'contentWindow' of a dynamically genereated iframe becomes null
Component: Access Policy Manager
Symptoms:
A web application using iframes may not work/render as expected using Portal Access.
Conditions:
A web application attempts to configure 'contentWindow' for an iframe while the Portal Access feature is in use.
Impact:
Web Application through Portal Access may fails to work/render as expected
Workaround:
Workaround: Using a customized irule/ifile to return un-patched 'contentWindow' from cache-fm*.js file. ifile has modern cache-fm file.
when CLIENT_ACCEPTED {
ACCESS::restrict_irule_events disable
}
when HTTP_REQUEST {
if {
[HTTP::path] ends_with "/cache-fm-Modern.js"
} {
HTTP::respond 200 content [ifile get cachefmUploadIssueWorkaround]
}
}
1283721-5 : Vmtoolsd memory leak
Links to More Info: BT1283721
Component: TMOS
Symptoms:
The Vmtoolsd service leaks memory on VMware BIG-IP VE guests when the Disk Type is IDE or any disk type other than SCSI.
Conditions:
VMware BIG-IP VE guest
Disk type of IDE or another type that is not SCSI.
Impact:
The VE will eventually run out of memory.
Workaround:
1. Create the file /etc/vmware-tools/tools.conf and add the following to the file:
[guestinfo]
# disable scan for disk device info
diskinfo-report-device=false
2. Restart the vmtoolsd service:
systemctl restart --ignore-dependencies vmtoolsd.service
NB "guestinfo" must be in lower case. The workaround will not work if any letter is not lower case including the following "guestInfo" which was the reported workaround in https://github.com/vmware/open-vm-tools/issues/452
1282029-2 : Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0★
Links to More Info: BT1282029
Component: Advanced Firewall Manager
Symptoms:
The following log is observed in the console or /var/log/ltm logs:
Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector.
If this is after an upgrade it's likely the configuration will fail to load, which in turn will cause memory provisioning not to complete leaving the system provisioned for LTM only. This may leave insufficient 4KB page memory for the actual provisioning, for example if ASM is provisioned. The unit may show low memory symptoms such as oom killer activity, unresponsive management, cores due to daemon heartbeat timeout.
Conditions:
1. The Only Count Suspicious Events option is enabled or the attribute suspicious is true on TCP Push Flood vector.
2. Upgrade to BIG-IP 17.1.0.
Impact:
The following log is observed in the console or /var/log/ltm logs:
Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector. in the console or /var/log/ltm
Failure to load configuration may be shown a few lines later:
emerg load_config_files[13166]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed.
Workaround:
1. Confirm config:
grep "suspicious true" /config/bigip.conf
2. Backup bigip.conf:
cp /config/bigip.conf /config/bigip.conf.bak_ID1282029
3. Change affected configuration values:
sed -i 's/suspicious true/suspicious false/g' /config/bigip.conf
4. Reload MCPD per K13030. AFM comes back up with config loaded fine.
1281929-5 : The BIG-IP system's time zone database does not reflect recent changes implemented by Mexico in regard to DST
Links to More Info: BT1281929
Component: TMOS
Symptoms:
In fall of 2023, Mexico is cancelling DST (Daylight Saving Time) and is now on standard time indefinitely. The BIG-IP time zone database need an updated to reflect this change.
Conditions:
- BIG-IPs operated in Mexico.
Impact:
BIG-IP systems configured to use "America/Mexico" (or other applicable Mexican localities) will still apply DST. Hence, time will spring forward and backward on previously designated dates.
This will have no impact to application traffic handled by the BIG-IP system. However, logs, alerts, reports, cron jobs, and other will use incorrect time.
Workaround:
As a workaround, you can set the BIG-IP time zone to that of a different country with the same UTC offset and already not observing DST.
1280813-5 : 'Illegal URL' violation may trigger after upgrade
Links to More Info: BT1280813
Component: Application Security Manager
Symptoms:
Illegal URL violation is triggered for Allowed URL(s).
Conditions:
The conditions that trigger this issue post-upgrade are unknown at this time and the occurrence is rare.
Impact:
Requests get blocked with an 'Illegal URL' violation despite the it being defined as an Allowed URL because the URL object's Content-Profile reference does not get inserted and is missing in the MySQL database post-upgrade.
Workaround:
- Delete the problematic URL within the 'Security ›› Application Security : URLs : Allowed URLs : Allowed HTTP URLs' section in Configuration Utility.
- Re-create the URL again.
- Save the changes with the 'Apply Policy' task.
1271941-5 : Tomcat CPU utilization increased after upgrading to 15.1.6 and higher versions.★
Links to More Info: BT1271941
Component: TMOS
Symptoms:
Tomcat CPU utilization is high after upgrading to BIG-IP 15.1.6, java garbage collector is running high. Tomcat needs more memory after upgrading OpenJDK.
Conditions:
- Upgrade from BIG-IP 15.1.5 and earlier versions to BIG-IP 15.1.6 and higher versions.
Impact:
Tomcat server runs in an unstable state as CPU utilization is abnormal.
Workaround:
Increase the value of the system DB variable provision.tomcat.extramb and restart tomcat. This value is an amount in MB to add to the default tomcat heap size. The default heap size varies depending on provisioning from about 130 MB for LTM only to about 270 MB for ASM systems.
provision.tomcat.extramb is 0 by default.
One approach would be to increment by 50MB a time so as not to waste memory, while monitoring CPU use of tomcat to see if it drops. Less tan 2% would be a typical CPU use assuming the web interface isn't being used. Usually the CPU drops a lot with 50 or 100, sometimes 200 or slightly more might be required.
# tmsh modify sys db provision.tomcat.extramb value 50
# bigstart restart tomcat
tomcat is a Java process with user tomcat. You can find out the pid by running this in bash, with an example output shown beneath :
# top -bn 1 | grep tomcat
18923 tomcat 20 0 731444 404080 ...
The first column is the PID, and can be used in a top command so only tomcat is monitored. Using the example above the PID was 18923, so this top command will allow monitoring that process:
# top -p 18923
(use q to quit).
Of course after each tomcat restart the pid will change.
There are other possible issues that are sometimes mitigated by very high values of provision.restjavad.extramb, for example 500 or more, even without large config size. One example is ID1856513, but it is better to workaround that directly as shown in:
https://cdn.f5.com/product/bugtracker/ID1856513.html
1268373-9 : MRF flow tear down can fill up the hudq causing leaks
Links to More Info: BT1268373
Component: Service Provider
Symptoms:
TMM Memory leaks are observed when MRF flows were torn down at once and the hud queue was full.
Conditions:
When the message queue becomes full.
Impact:
TMM memory leak
Workaround:
None
1256757-4 : Suspect keymgmtd memory leak while using dynamic CRL.
Links to More Info: BT1256757
Component: TMOS
Symptoms:
keymagmtd's memory size steadily increases. Specifically, in the emdeviced memory size.
Conditions:
CRL validation is enabled
Impact:
keymgmtd might crash due to out of memory conditions.
Workaround:
Need to reboot the machine to reset the memory usage.
1231889-6 : Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances
Links to More Info: BT1231889
Component: Local Traffic Manager
Symptoms:
When a VLAN configured in the tenant does not have the same name as the VLAN on in F5OS or the VLAN in the tenant is created in a partition other than "Common", VLANs may not pass traffic properly without manual configuration.
If any such VLANs exist, newly-configured VLANs may also exhibit this issue, even if the VLAN is in Common and has a name that matches the name in F5OS.
The system will have log messages similar to the following; these errors will still occur even once the workaround has been applied.
Feb 15 15:39:49 r4000-1.example.com err mcpd[19522]: 01070094:3: Referenced vlan (/Common/external) is hidden, does not exist, or is already on another instance.
Feb 15 15:39:49 r4000-1.example.com err chmand[19520]: 012a0003:3: hal_mcp_process_error: result_code=0x1070094 for result_operation=eom result_type=eom
Tenants running on an r2000 or r4000-series appliance need to know the VLAN<>interface associations, but the system is not able to populate this information when the VLAN is not in the Common partition. VLANs may not have any 'interfaces' referenced, or will have 'interfaces' that are not in-sync with the configuration on the F5OS host. For example:
R2000# show running-config interfaces interface LAG; show running-config vlans vlan 47
interfaces interface LAG
config type ieee8023adLag
config description ""
aggregation config lag-type LACP
aggregation config distribution-hash src-dst-ipport
aggregation switched-vlan config trunk-vlans [ 42 47 ]
!
vlans vlan 47
config vlan-id 47
config name vlan_47
!
R2000#
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240 # <-- interfaces is not listed
partition ottersPart
[...]
tag 47
}
[root@tenant:Active:Standalone] config #
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240
partition ottersPart
interfaces { # <-- configuration with a workaround in place
LAG {
tagged
}
}
[...]
tag 47
}
Conditions:
- BIG-IP tenant running on r2000 and r4000-series platforms
- VLANs moved to partitions other than "Common", or renamed so that the name does not match between hypervisor and tenant.
Impact:
Partitions other than the Common partition cannot have VLANs. VLANs created in other partitions will not be operational in the data path.
If such VLANs exist in the tenant, newly added VLANs will also exhibit this issue.
Workaround:
In the BIG-IP tenant, modify all VLAN objects to have 'interfaces' that align with the configuration on the host.
For example, for the VLAN 47 described above, the VLAN should be listed as being 'tagged' on the 'LAG' trunk:
tmsh modify net vlan /ottersPart/vlan_47 interfaces replace-all-with { LAG { tagged } }
tmsh save sys config
1196505-3 : BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
Links to More Info: BT1196505
Component: Local Traffic Manager
Symptoms:
BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
Conditions:
- HTTP2
- ASM provisioned and passing traffic
Impact:
Unexpected connection reset.
Workaround:
None
1168245-4 : Browser is intermittently unable to contact the BIG-IP device
Links to More Info: BT1168245
Component: TMOS
Symptoms:
When the coloradvisory probes generated by Javascript loaded on the browser do not get responded by the BIG-IP device within 30 seconds, the browser JS generates a pop-up message "Unable to contact BIG-IP device".
Conditions:
- MCPD is busy serving requests.
- Multiple browser connections to the BIG-IP.
- HTTP GET request from browser JS for /xui/update/configuration/alert/statusmenu/coloradvisory does not get responded within 30 seconds (default timeout).
Impact:
Browser frequently sees the BIG-IP as unavailable, causing interruptions to management of the device via the GUI.
Workaround:
1. Increase memory allocated to tomcat and restjavad.
tmsh modify sys db provision.tomcat.extramb value 512
tmsh modify sys db provision.restjavad.extramb value 2227
NB these are very large values, not suitable for most systems. It is probably best to increase tomcat heap size by 50MB a time, and restjavad by 200MB a time (value 600, 800, etc).
To have provision.restjavad.extramb values will be capped in effect to 384 + value of provision.extramb.
Both tomcat and restjavad need to be restarted to have changes take effect. restjavad will log startup info in ltm log.
2. Adjust the browser-based Javascript status update interval and timeout.
2.1. Remount /usr partition as read-write using the command:
mount -o remount,rw /usr
2.2. Edit the file /usr/local/www/xui/framework/scripts/variables.js, and modify the variables: time_updateXui to 8, and timeout_status to 60.
Default values are:
var time_updateXui = 5; // Seconds
var timeout_status = 30; //Timeout value for XUI status update
Change these values to:
var time_updateXui = 8; // Seconds
var timeout_status = 60; //Timeout value for XUI status update
2.3. Remount /usr partition back to read-only.
mount -o remount,ro /usr
3. Restart associated daemons:
bigstart restart httpd
bigstart restart tomcat
bigstart restart restjavad
1137521-3 : TLSv1.3 connections dropped when SSL Persistence is enabled
Links to More Info: BT1137521
Component: Local Traffic Manager
Symptoms:
A virtual server with an SSL persistence profile processing TLSv1.3 traffic may see dropped connections.
Conditions:
-- TLSv1.3 is enabled on ClientSSL profile on a virtual server.
-- SSL Persistence Mode is enabled on the virtual server.
Impact:
Traffic may be impacted as the optimizations due to SSL Persistence may not work for TLSv1.3
Workaround:
Do not enable SSL Persistence with TLSv1.3 on the affected versions.
1128429-9 : Rebooting one or more blades at different times may cause traffic imbalance results High CPU
Links to More Info: BT1128429
Component: Carrier-Grade NAT
Symptoms:
One or more TMMs are consuming more CPU cycles than the other TMMs. The increased CPU usage is caused by a significant number of internal TMM traffic redirections.
Conditions:
- LSN pools enabled.
- The sp-dag configured on the client-side and server-side VLANs (cmp-hash src-ip and cmp-hash dst-ip respectively).
Impact:
Increased TMM CPU usage on one or more TMMs.
Workaround:
- Set up an High Availability (HA) pair of VIPRIONs and make an active VIPRION cluster standby before doing any operation that involves the rebooting, insertion, or removal of one or more blades.
Or if the VIPRION is a stand-alone cluster:
- Stop all external traffic to the VIPRION before rebooting, inserting, or removing one or more blades.
- Restart or reboot all the blades at the same time from the primary, using the following "clsh" command:
"clsh reboot volume <NEW_VOLUME>" or "clsh bigstart restart".
1128033-6 : Neuron client constantly logs errors when TCAM database is full
Links to More Info: BT1128033
Component: Local Traffic Manager
Symptoms:
A database held in hardware (TCAM), shared between tenants, has a limit that is exceeded by software in tenants that adds and manages entries in the database.
Symptomatic logs on tenant:
in /var/log/ltm, repeating logs are recorded, following is an example:
err tmm[635]: 01010331:3: Neuron client neuron_client_pva_hwl failed with rule request submit(client connection is busy (has outstanding requests))
in /var/log/tmm, cycles of following group of logs are recorded:
notice neuron_client_negotiate: Neuron client connection established
notice [DDOS Neuron]Neuron daemon started
notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
notice [DDOS Neuron]Neuron daemon stopped
For F5OS host, in partition /var/F5/partitionX/log/velos.log repeating logs are recorded, following is an example:
tcam-manager[41]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="TCAM processing Error(-5) executing:TCAM_INSERT for ruleno:0x20000000937"
In the log message, the msgid and ruleno can vary, but the Error(-5) is an indication of this issue.
Conditions:
The BIG-IP system with a rSeries r5xxx, r10xxx, r12xxx or has VELOS blades such as BX110.
The rSeries 2xxx, 4xxx and iSeries platforms are not affected.
Large configurations, on the order of high hundreds of virtual servers, are more likely to encounter issue.
Impact:
The neuron client software will restart and log repeatedly.
Inefficient use of TCAM database.
Workaround:
None
1126505-4 : HSB and switch pause frames impact data traffic
Links to More Info: BT1126505
Component: TMOS
Symptoms:
There are cases where the HSB and switch report pause frames on the HSB <-> switch interfaces. This can be seen in the switch interface stats:
name counters.rx_pause
---- -----------------
9.1 11522051
10.1 11392101
Conditions:
The iSeries platforms with an HSB and switch.
Impact:
There can be an impact on networking traffic.
Workaround:
There is no workaround for this issue. When this condition happens, the unit needs to be rebooted to clear the issue.
1106489-6 : GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.
Links to More Info: BT1106489
Component: TMOS
Symptoms:
GRO/LRO packets are not received: "tmctl -d blade tmm/ndal_rx_stats" shows "0" in "lro". The linux host has GRO disabled: "ethtool -k eth1 | grep generic-receive-offload" shows "off".
Conditions:
-- BIG-IP is deployed in a Hyper-V environment.
-- Any environment such that "tmctl -d blade tmm/device_probed" displays "sock" in "driver_in_use".
Impact:
Performance is degraded.
Workaround:
Manually enable GRO on the device: ethtool -K eth1 gro on
Check that it's enabled with: ethtool -k eth1 | grep generic-receive-offload
1093717-7 : BGP4 SNMP traps are not working.
Links to More Info: BT1093717
Component: TMOS
Symptoms:
BGP4 SNMP traps are not working.
Conditions:
--Perform any BGP related event and check for snmp traps.
Impact:
No BGP SNMP traps.
Workaround:
None
1091021-8 : The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive.
Links to More Info: BT1091021
Component: Local Traffic Manager
Symptoms:
You may observe LTM monitors malfunctioning on your system. For instance, you may notice some probes are not sent out on the network, and some monitored objects are showing the wrong status.
Conditions:
-- The bigd daemon consists of multiple processes (which you can determine by running "ps aux | grep bigd").
-- One or more of the processes (but not all of them) become disrupted for some reason and stop serving heartbeats to the sod daemon.
Under these conditions, sod will not take any fail-safe action and the affected bigd processes will continue running impaired, potentially indefinitely.
Impact:
LTM monitoring is impacted.
Workaround:
If you suspect this issue is occurring in your system, you can resolve it by killing all bigd processes using the following command:
pgrep -f 'bigd\.[0-9]+' | xargs kill -9
However, this does not prevent the issue from manifesting again in the future if the cause for bigd's disruption occurs again.
Monitoring may become further disrupted as bigd restarts, and a failover may occur depending on your specific configuration.
Another work around is to set only one bigd if that is possible.
modify sys db bigd.numprocs value 1
If only a single bigd is available, sod will detect when it is down.
1090313-7 : Virtual server may remain in hardware SYN cookie mode longer than expected
Links to More Info: BT1090313
Component: TMOS
Symptoms:
A virtual server may remain in hardware SYN cookie mode longer than expected after the SYN flood attack has stopped. The TMSH 'show ltm virtual' command shows that the virtual has already exited SYN Cookie mode, but the SYN packets are still responded from hardware for a few minutes longer.
Conditions:
The problem is a result of a race condition in TMM, so the issue might show up intermittently.
Impact:
Discrepancy between the actual SYN Cookie mode and the reported SYN Cookie mode for a short period of time after a SYN flood attack.
Workaround:
Disable hardware SYN Cookie mode.
1089625-4 : Java core dump with SIGABRT while high cpu load in BIG-IP
Links to More Info: BT1089625
Component: TMOS
Symptoms:
Observe the logs in /var/log/daemon.log
Nov 8 01:13:27 localhost.localdomain emerg logger[6270]: Re-starting restjavad
Java core generated in folder /var/core.
Conditions:
1. Provision ASM
2. Huge number of requests to restjavad
3. cpu is hitting 100%
Impact:
Restjavad will be restarted.
Workaround:
More heap memory can reduce cpu consuming operations, fewer GC cycles, less frequent minor GCs, overall less overhead for memory management can add for less cpu usage.
Please increase the value of provision.extramb and provision.restjavad.extramb by 200MB at a time ( 400, 600, 800 ...) till the issue resolves. Since changing the value of provision.extramb is service affecting you may want to start with a higher value so there is more room to experiment to find a good value for restjavad heap size. Note 500MB is equivalent to large management provisioning and 200MB is the same as medium management provisioning.
Note: provision.extramb value does not sync between peers (by design) and must be changed on each peer, one at a time, and is service affecting when changed on active. On ASM provisioned system it can take approximately 15 minutes for system to reprovision.
tmsh modify sys db provision.extramb value 200 ( 400, 600, 800 ...)
tmsh modify sys db provision.restjavad.extramb value 600 (800, 1000, 1200 ...
bigstart restart restjavad
Increase timeout
# tmsh modify sys db icrd.timeout value 300
# tmsh modify sys db restjavad.timeout value 300
# tmsh modify sys db restnoded.timeout value 300
bigstart restart restjavad restnoded
1087569-8 : Changing max header table size according HTTP2 profile value may cause stream/connection to terminate
Links to More Info: BT1087569
Component: Local Traffic Manager
Symptoms:
BIG-IP initializes HEADER_TABLE_SIZE to the profile value and thus when it exceeds 4K (RFC default), the receiver's header table size is still at the default value. Therefore, upon receiving header indexes which has been removed from its table, receiver sends GOAWAY (COMPRESSION_ERROR)
Conditions:
-- HTTP2 profile used in a virtual server
-- In the HTTP2 profile, 'Header Table Size' is set to a value greater than 4096
Impact:
Stream/connection is terminated with GOAWAY (COMPRESSION_ERROR)
Workaround:
Issue can be avoided by restoring the header-table-size value to the default of 4096
1086473-8 : BIG-IP resumes a TLS session on the client-side but then proceeds to do a full handshake
Links to More Info: BT1086473
Component: Local Traffic Manager
Symptoms:
When a client attempts to resume the TLS session using the Session-ID in its Client Hello from a previous session, the BIG-IP agrees by using the same Session-ID in its Server Hello, but then proceeds to perform a full handshake (Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done) instead of an abbreviated handshake (Server Hello, Change Cipher Spec, Server Hello Done).
This is a violation of the TLS RFC.
Conditions:
- High availability (HA) pair of two BIG-IP units.
- LTM virtual server with a client-ssl profile.
- Mirroring enabled on the virtual server
Impact:
Client-side TLS session resumption not working.
Workaround:
Disable mirroring on the virtual server
1083405-8 : "Error connecting to named socket" from zrd
Links to More Info: BT1083405
Component: Global Traffic Manager (DNS)
Symptoms:
After an mcpd restart, zrd may not be able to re-establish a connection to named. This shows up in the /var/log/gtm file or in the GUI with a message similar to the following:
err zrd[27809]: 01150306:3: Error connecting to named socket 'Connection refused'.
(or)
err zrd[16198]: 01150306:3: Error connecting to named socket 'Connection timed out'.
Conditions:
After an mcpd restart
Impact:
Looking up or modifying zone records may fail.
Workaround:
Restart zrd and named
tmsh restart sys service zrd named
1077789-8 : System might become unresponsive after upgrading.★
Links to More Info: BT1077789
Component: TMOS
Symptoms:
After upgrading, the system encounters numerous issues:
-- Memory exhaustion (very low MemAvailable) with no particular process consuming excessive memory.
-- High CPU usage usually due to high kswapd or iowait activity
-- System is unresponsive, difficult to log in, slow to accept commands.
-- Provisioning is incomplete; there is a small amount of memory amount assigned to 'host' category.
Conditions:
The device is provisioned for more than LTM, typically with ASM or APM as well or instead, and needs more host memory than a pure LTM system.
-- The configuration loads in the previous release, but does not load successfully on the first boot into the release you are upgrading to.
-- Device is upgraded and the configuration is rolled forward.
-- There may be other conditions preventing the configuration from loading successfully after an upgrade.
Exact conditions that trigger this issue could be varied.
Failure to reactivate license, if needed, before upgrade could cause it, or an actual config issue. The config load error will be shown in the ltm log - search on 'emerg load'; the actual failure should be shown a few lines before the general warning about config load failure.
Impact:
-- System down, too little host (4KB page) memory to be stable.
-- Difficulty logging in over SSH might require serial console access.
Workaround:
Reboot to an unaffected, pre-upgrade volume.
-- If the system is responsive enough, use 'tmsh reboot volume <N>' or switchboot to select an unaffected volume.
-- If the system is completely unresponsive, physically powercycle a physical appliance or reboot a BIG-IP Virtual Edition (VE) from an applicable management panel, and then select an unaffected volume from the GRUB menu manually.
Note: This requires that you have console access, or even physical access to the BIG-IP device if you are unable to SSH in to the unit. On a physical device, a non-responsive system might require that you flip the power switch.
For more information, see:
-- K9296: Changing the default boot image location on VIPRION platforms :: https://support.f5.com/csp/article/K9296
-- K5658: Overview of the switchboot utility :: https://support.f5.com/csp/article/K5658
-- K10452: Overview of the GRUB 0.97 configuration file :: https://support.f5.com/csp/article/K10452.
1075045-7 : Proxy initialization failed, Defaulting to DENY, after applying additional profile to a virtual server
Links to More Info: BT1075045
Component: Local Traffic Manager
Symptoms:
Connections are reset when accessing a virtual server, with an F5 reset cause of "Port denied".
Messages in /var/log/ltm:
err tmm[<PID>]: 01010008:3: Proxy initialization failed for <virtual server>. Defaulting to DENY.
err tmm[<PID>]: 01010008:3: Listener config update failed for <virtual server>: ERR:ERR_MEM
Conditions:
-- A virtual server is configured with 23 hudchain elements, and an attempt is made to add one or more further elements, caused by a large number of attached profiles
-- The number of 'hudchain' elements does not directly correspond to the number of profiles, as some profiles add more than one hud chain element - particularly with APM, and some elements are enabled through other settings, such as compression with the http profile
-- To find the number of elements on a virtual server, set the db variable "tmm.verbose" to 'enable', add or remove a profile to/from the affected virtual server, then check the tmm log file for a line similar ot the following
-- A log line similar to the one below will be produced, which describes the hud chain elements ont the clientside flow, the proxy in the middle, and the elements on the serverside flow. The limitation of 24 includes all the elements in either the clientside or serverside flows, as well as the proxy in the middle (the proxy is counted on both the clientside and serverside flows)
<13> Oct 1 08:33:09 bigip1.local notice (L:/Common/test) hn :TCP -> SSL -> HTTP -> INFLATE -> DEFLATE -> SATELLITE -> <TCP> <- SATELLITE <- DEFLATE <- INFLATE <- HTTP <- SSL <- TCP:
In this case, the clientside flow has 6 elemnents plus the proxy, totalling 7, and the serverside flow also has 7. Either of those numbers can not exceed a fixed upper limit of 23.
Impact:
All connections to the virtual server are immediately reset.
Workaround:
Reduce the number of profiles applied to the virtual server.
1074285-5 : Apmd crashes while handling JWT tokens.
Links to More Info: BT1074285
Component: Access Policy Manager
Symptoms:
An apmd crash might occur while handling JWT tokens.
Conditions:
The payload has invalid JSON during authentication.
Impact:
BIG-IP authorization disrupted while apmd restarts.
Workaround:
None
1071021-5 : Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM
Links to More Info: BT1071021
Component: Access Policy Manager
Symptoms:
Dynamic address space parser not accepting few patterns(*cdn.example.net) which are added at the DNS address space field.
Conditions:
When the user configures Office 365 Dynamic Address Space with URLs formats like:
*-admin.sharepoint.com
*cdn.onenote.net
*-files.sharepoint.com
*-myfiles.sharepoint.com
Impact:
Due to the above pattern DNS relay proxy is not compatible with them.
Workaround:
None
1069977-4 : Repeated TMM SIGABRT during ips_flow_process_data
Links to More Info: BT1069977
Component: Protocol Inspection
Symptoms:
IPS consumes excessive CPU time processing GTP related context entries and this causes the tmm clock not to be updated, because of which SOD tries to restart the TMM.
Conditions:
-- Heavy GTP traffic, and request creation messages are sent without sending the response messages.
Impact:
Traffic disrupted while tmm restarts.
1062901-7 : The 'trap-source' and 'network' SNMP properties are ineffective, and SNMP traps may be sent from an unintended interface.
Links to More Info: BT1062901
Component: TMOS
Symptoms:
The BIG-IP system sends SNMP traps from an unintended interface (likely a TMM VLAN instead of the management port).
Conditions:
This issue occurs when the configuration:
- Includes a 'trap-source' property which matches the BIG-IP system's management IP address.
- Includes a SNMP trap destination which specifies 'mgmt' as the 'network' property.
- Includes routes to the aforementioned SNMP trap destination via both tmm and the management port (and the routes are such that the tmm one wins).
Impact:
Outgoing snmp traps fail to bind to the management IP address and to leave from the management port. Instead, they will bind to a self-ip matching TMM's route to the destination and leave from a TMM VLAN.
This can cause issues (or not work at all) depending on the configuration of the host system meant to receive the traps and/or of the surrounding network devices.
Workaround:
N/A
1060541-6 : Increase in bigd CPU utilization from 13.x when SSL/TLS session resumption is not utilized by HTTPS pool members due to Open SSL upgrade
Links to More Info: BT1060541
Component: Local Traffic Manager
Symptoms:
The bigd process uses more CPU than it did in previous versions when HTTPS monitors are used for pool members and the pool members do not resume the SSL/TLS session. This is due to upstream changes in the OpenSSL library.
Conditions:
-- HTTPS monitors.
-- Pool members that do not allow or are not using TLS/SSL session resumption.
Impact:
High CPU utilization.
Workaround:
Ensure the pool members have SSL/TLS session resumption enabled.
1052057-3 : FCS errors on switch/HSB interface impacts networking traffic
Links to More Info: BT1052057
Component: TMOS
Symptoms:
There are cases where the HSB and switch report FCS errors on the HSB <-> switch interfaces. This can be seen in the snmp_dot3_stat table:
name fcs_errors
---------- ----------
12.1 83233172
This can cause intermittent packet loss, leading to networking errors. This can be observed on the BIG-IP as pool monitor flapping, intermittent networking connectivity, etc.
Conditions:
An iSeries platform with an HSB and switch.
Impact:
There is impact on networking traffic.
Workaround:
There is no workaround for this issue. When this condition occurs, the unit needs to be rebooted to clear the issue.
ID1239905 can be used to detect and mitigate this issue.
1043985-7 : After editing an iRule, the execution order might change.
Links to More Info: BT1043985
Component: Local Traffic Manager
Symptoms:
After modification, the iRule execution order may change for events with the same priority.
Conditions:
Virtual server has an iRule that contains multiple events with the same priority.
Impact:
Unexpected behavior can cause virtual server malfunction.
Workaround:
Add desired priorities for iRules that contain the same event.
For example: when <event_name> priority nnn
1036289-4 : Signature ID not displayed in Attack Signature details
Links to More Info: BT1036289
Component: Application Security Manager
Symptoms:
Only signature name is displayed in the "Attack signature detected" violation details. The ID is not displayed in the details nor in the event log.
Conditions:
Reviewing attack signature details
Impact:
The attack signature ID is not displayed, which makes it more difficult to correlate which attack signature was encountered.
Workaround:
Click on Attack Signature Documentation to know the signature ID.
1036217-5 : Secondary blade restarts as a result of csyncd failing to sync files for a device group
Links to More Info: BT1036217
Component: TMOS
Symptoms:
Config sync fails on the secondary blade and mcpd restarts.
In /var/log/ltm:
remote transaction for device group /Common/<group> to commit id 45018 6946340995971480381 /Common/<dest> 0 failed with error 01070712:3: Caught configuration exception (0), Failed to sync files...
Configuration error: Configuration from primary failed validation: 01070712:3: Caught configuration exception (0), Failed to sync files..... failed validation with error 17237778.
Conditions:
-- A BIG-IP system with multiple blades configured for high availability
-- A device group with AFM objects in it
-- A config sync occurs
Other conditions necessary to trigger this issue are unknown.
Impact:
Config sync to the secondary blade fails and mcpd restarts on the secondary. The cluster primary blade has the correct configuration. This will impact incremental syncing to other peers in the device group.
Workaround:
None
1031945-7 : DNS cache configured and TMM is unresponsive in 'not ready' state indefinitely after TMM restart or reboot★
Links to More Info: BT1031945
Component: Global Traffic Manager (DNS)
Symptoms:
Clusterd reports "TMM not ready" right after "Active"
Following is an example:
Jun 23 18:21:14 slot2 notice sod[12345]: Active
Jun 23 18:21:14 slot2 notice clusterd[12345]:
Blade 2 turned Yellow: TMM not ready
All blades are showing 'unavailable'.
Conditions:
- Multiple DNS cache-resolver and/or net DNS resolver objects configured with names that are similar with only difference in letter case, for example, /Common/example-dns-cache and /Common/Example-DNS-cache
- Issue observed after rebooting or upgrading.
Impact:
The system remains inoperative.
Workaround:
- Remove one of the conflicting DNS cache-resolver and/or net DNS resolver objects.
or
- Rename one of the DNS cache-resolver and/or net DNS resolver objects to a name that does not result in a case-insensitive match to another DNS cache-resolver and/or net DNS resolver object name.
1027961-5 : Changes to an admin user's account properties may result in MCPD crash and failover
Links to More Info: BT1027961
Component: TMOS
Symptoms:
-- The mcpd process fails with a segmentation fault and restarts, leaving a core-dump file.
-- Active sessions in the Configuration Utility report "unable to contact BIG-IP device".
-- Various processes may record entries into the "ltm" log saying "Lost connection to mcpd."
Conditions:
-- Changes to properties of administrative user-login accounts are occurring.
-- A user account being changed has a current, active session in the Configuration Utility GUI.
Impact:
The failure and restart of mcpd will trigger a restart of many other processes, including the TMM daemons, thus interrupting network traffic handling. In high availability (HA) configurations, a failover will occur.
Workaround:
Before making changes to the account properties of an administrative user, where the changes affect the role, make certain that all GUI Configuration Utility sessions opened by that user are logged out.
1026781-7 : Standard HTTP monitor send strings have double CRLF appended
Links to More Info: BT1026781
Component: Local Traffic Manager
Symptoms:
Standard (bigd-based, not In-TMM) HTTP monitors have a double CRLF appended (\r\n\r\n) to the send string. This does not comply with RFC1945 section 5.1 which states requests must terminate with a single CRLF (\r\n). This non-compliant behavior can lead to unexpected results when probing servers.
Conditions:
Standard bigd (not In-TMM) HTTP monitors
Impact:
Servers probed by these non-RFC-compliant HTTP monitors may respond in an unexpected manner, resulting in false negative or false positive monitor results.
Workaround:
There are several workarounds:
1. If running 13.1.0 or later, switch monitoring from bigd-based to In-TMM. In-TMM monitors properly follow RFC1945 and will send only a single CRLF (\r\n)
2. Remain with bigd-based monitoring and configure probed servers to respond to double CRLF (\r\n\r\n) in a desired fashion
Depending on server configuration, a customized send string, even with the double CRLF, may still yield expected responses.
1022997-7 : TCP segments with an incorrect checksum are transmitted when the sock driver is used in AWS deployments (e.g., 1NIC)
Links to More Info: BT1022997
Component: TMOS
Symptoms:
Deployments on AWS that use the sock driver (1NIC, for example) transmit packets with bad checksums when TSO/GSO is required. This causes significant delays as TMM re-segments the packets with correct checksums for retransmission, and may cause some operations to time out (such as configsyncs of large configurations).
Conditions:
-- BIG-IP Virtual Edition (VE) using the sock driver on AWS (all 1NIC deployments use this)
-- TSO/GSO required due to MTU limitations on one or more VLANs
Impact:
-- Delayed packets.
-- Possible timeouts for some operations (configsyncs, for example).
Workaround:
Modify (or create, if not present) the file /config/tmm_init.tcl on the affected BIG-IP systems, and add the following line to it:
ndal force_sw_tcs off 1d0f:ec20
Then restart TMM:
bigstart restart tmm
Note: Restarting TMM will cause a failover (or an outage if there is no high availability (HA) peer available).
1022361-3 : Edge Client shows HTML encoding for non-English endpoint inspection message
Links to More Info: BT1022361
Component: Access Policy Manager
Symptoms:
HTML encoding characters are displayed in place of non-English characters, for example:
ó is displayed as ó
á is displayed as á
Conditions:
-- Modern access profile customization with Endpoint Inspection Message.
-- Using BIG-IP Edge Client on Microsoft Windows.
Impact:
HTML encoding displays instead of non-English characters in messages on Edge Client.
Workaround:
None
1021201-3 : JSON parser is not fully UTF-8 compliant
Links to More Info: BT1021201
Component: Application Security Manager
Symptoms:
JSON parser's character set does not include support for UTF-8 characters and that can result in 'Malformed JSON data' violation when processing requests containing those characters in JSON data.
Conditions:
Requests contain unsupported UTF-8 characters, such as emoji characters, in JSON payload.
Impact:
Requests are blocked.
Workaround:
The System Variable 'relax_unicode_in_json' can be utilized to ignore what JSON identifies as malformed characters when it encounters such unsupported characters.
(1) Enable 'relax_unicode_in_json' through CLI:
# /usr/share/ts/bin/add_del_internal add relax_unicode_in_json 1
(2) Restart ASM to ensure changes take effect:
# bigstart restart asm
1019641-7 : SCTP INIT_ACK not forwarded
Links to More Info: BT1019641
Component: Local Traffic Manager
Symptoms:
After SCTP link down/up (not physical IF link down up), SCTP session can't be established.
Conditions:
-- CMP forwarding enabled (source-port preserve-strict)
-- The BIG-IP system is encountering heavy traffic load
-- A connection is deleted from the connection table
Impact:
Flow state can become out of sync between TMMs
Workaround:
Once the problem occurs, execute "tmsh delete sys connection", and the SCTP session will be re-established.
1019261-7 : In-TMM HTTPS monitor with SSL Profile set to None does not use serverssl profile.
Links to More Info: BT1019261
Component: In-tmm monitors
Symptoms:
HTTPS monitors with SSL profile set to None (default) will not use the default ServerSSL profile of "serverssl" when In-TMM monitoring is enabled. Instead, another internal ServerSSL profile is used which has different values from "serverssl".
Conditions:
-- In-TMM monitoring is enabled
-- HTTPS monitor(s) with SSL profile field is set to the default of "None"
Impact:
The TLS settings for the HTTPS monitor monitor probes will not match those of the ServerSSL "serverssl" profile and may cause unexpected behavior such as utilizing TLS 1.3 (disabled by default in the "serverssl" profile) or random session IDs.
Workaround:
Specify a ServerSSL profile in every HTTPS monitor when using In-TMM monitoring.
Attaching the profile "serverssl" will result in the same behavior that SSL Profile "none" should provide, given that the "serverssl" profile should be the default.
1016273-3 : Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled★
Links to More Info: BT1016273
Component: TMOS
Symptoms:
TMM crash occurs on the standby device which is on a lower version
Conditions:
1) Active and Standby are on different versions during upgrade
2) Session mirroring enabled
Impact:
Continuous TMM crash on standby.
Workaround:
Disable session mirroring during the upgrade process. This can be done by disabling sys db statemirror.mirrorsessions.
1014761-7 : [DNS][GUI] Not able to enable/disable pool member from pool member property page
Links to More Info: BT1014761
Component: Global Traffic Manager (DNS)
Symptoms:
You are unable to enable/disable DNS pool members from the pool member property page.
Conditions:
Making changes via the DNS pool member property page.
Impact:
You can submit the changes but the changes do not persist.
Workaround:
1. tmsh
or
2. enable/disable pool member from list of pool members instead of 'general properties' page
1013793-3 : Pool members may flap on BIG-IP VE with provision.1nic set to forced_enable
Links to More Info: BT1013793
Component: TMOS
Symptoms:
-- Pool members flap up and down
-- Network trace shows BIG-IP sending TCP SYN followed immediately by RST to pool members for traffic.
Conditions:
-- BIG-IP Virtual Edition (VE)
-- System using the 'sock' network driver, as can be determined by reviewing the output of the following command:
tmctl -d blade tmm/device_probed
-- The 'provision.1nic' DB key is set to 'forced_enable'. This is common in BIG-IP VE configurations running on Azure.
Impact:
-- Monitor statuses unreliable.
Workaround:
Use the following commands to work around this on a running system (the word 'command' is a required part of what should be typed in)
command iptables -t raw -I PREROUTING 1 -i eth+ -j DROP
command ip6tables -t raw -I PREROUTING 1 -i eth+ -j DROP
In addition to that, to ensure the workaround persists after TMM restarts or system reboots, add the following to /config/user_alert.conf:
alert tmm_id1013793_workaround "HA reports tmm ready" {
exec command="iptables -t raw -D PREROUTING -i eth+ -j DROP";
exec command="ip6tables -t raw -D PREROUTING -i eth+ -j DROP";
exec command="iptables -t raw -I PREROUTING 1 -i eth+ -j DROP";
exec command="ip6tables -t raw -I PREROUTING 1 -i eth+ -j DROP";
}
And then restart alertd by running:
tmsh restart sys service alertd
1009337-8 : LACP trunk down due to bcm56xxd send failure
Links to More Info: BT1009337
Component: TMOS
Symptoms:
Lacp reports trunk(s) down. lacpd reports having trouble writing to bcm56xxd over the unix domain socket /var/run/uds_bcm56xxd.
Conditions:
Not known at this time.
Impact:
An outage was observed.
Workaround:
Restart bcm56xxd, lacpd, and lldpd daemons.
1006449-6 : High CPU utilization and slow SNMP response after upgrade★
Links to More Info: BT1006449
Component: TMOS
Symptoms:
After upgrading BIG-IP to version 14.0.0 or later, CPU utilization increases and SNMP queries take an unusually long time to respond.
Conditions:
-- SNMP client repeatedly polls BIG-IP for OIDs in multiple tables over a short period of time.
-- Following an upgrade
Impact:
SNMP queries take an unusually long time to return data, and BIG-IP CPU utilization is higher.
Workaround:
To the file /config/snmp/bigipTrafficMgmt.conf, add one line with the following content:
cacheObj 16
This could be accomplished by executing the following command line from bash:
# echo "cacheObj 16" >> /config/snmp/bigipTrafficMgmt.conf
After the above config file has been modified and saved, the "snmpd" daemon must be restarted, using one of two command variants:
(on a BIG-IP appliance or VE system)
# bigstart restart snmpd
(on a a multi-slot VIPRION or vCMP guest)
# clsh bigstart restart snmpd
(However, this adjustment will be lost when the BIG-IP software is next upgraded.)
1004953-8 : HTTP does not fall back to HTTP/1.1★
Links to More Info: BT1004953
Component: Local Traffic Manager
Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.
Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).
Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.
Workaround:
None.
1002969-8 : Csyncd can consume excessive CPU time★
Links to More Info: BT1002969
Component: Local Traffic Manager
Symptoms:
Following a configuration change or software upgrade, the "csyncd" process becomes always busy, consuming excessive CPU.
Conditions:
-- occurs on a multi-blade VIPRION chassis or VELOS tenant
-- may occur with or without vCMP
-- may occur after configuring F5 Telemetry Streaming, but may also occur in other circumstances
-- large numbers of files are contained in one or more of the directories being sync'ed between blades
Impact:
The overuse of CPU resources by "csyncd" may starve other control-plane processes. Handling of payload network traffic by the data plane is not directly affected.
Workaround:
To mitigate the processing load, identify which directory or directories contain excessive numbers of files being replicated between blades by "csyncd". If this replication is not absolutely needed (see below), such a directory can be removed from the set of directories being sync'ed.
For example: if there are too many files being generated in the "/run/pamcache" directory (same as "/var/run/pamcache"), remove this directory from the set being acted upon by "csyncd" by running the following commands to comment-out the associated lines in the configuration file.
[Note it is better to follow the more complete workaround from ID 1103369, https://cdn.f5.com/product/bugtracker/ID1103369.html ]
# clsh "cp /etc/csyncd.conf /etc/csyncd.conf.$(date +%Y%m%d_%H%M%S)"
# clsh "sed -i '/run\/pamcache/,+2s/^/#/' /etc/csyncd.conf"
# clsh "bigstart restart csyncd"
If the problem was observed soon after the installation of F5 Telemetry Streaming, the configuration can be adjusted to make csyncd ignore the related files in a subdirectory of "/var/config/rest/iapps". Run the following commands:
# clsh "cp /etc/csyncd.conf /etc/csyncd.conf.$(date +%Y%m%d_%H%M%S)"
# clsh "sed -i '/\/var\/config\/rest\/iapps/a \ \ \ \ \ \ \ \ ignore f5-telemetry' /etc/csyncd.conf"
# clsh "bigstart restart csyncd"
----
The impact of disabling replication for the pamcache folder is that in the event of a primary blade failover, the new primary blade would not be aware of the existing valid auth tokens, so the user (eg, a GUI user, or a REST script already in progress at the time of the failover) would need to authenticate again.
The impact of disabling replication for a folder under the /var/config/rest/iapps is that in the event of a primary blade failover, the new primary blade would not be aware of the iApps LX package, so the user would need to install the iApps LX package on the new primary blade.
★ This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade
For additional support resources and technical documentation, see:
- The F5 Technical Support website: http://www.f5.com/support/
- The MyF5 website: https://my.f5.com/manage/s/
- The F5 DevCentral website: http://community.f5.com/