Manual Chapter : BIG-IP 21.0.0.1 Fixes and Known Issues
BIG-IP Release Information

Version: 21.0.0.2
Build: 38.0

Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.

The blue background highlights fixes

Cumulative fixes from BIG-IP v21.0.0.1 that are included in this release
Known Issues in BIG-IP v21.0.x

Vulnerability Fixes

ID Number CVE Links to More Info Description Fixed Versions
929709-9 CVE-2020-11023 K66544153 jQuery vulnerability CVE-2020-1102321.0.0.2
2137805-3 CVE-2023-36478, CVE-2024-6763, CVE-2024-8184, CVE-2023-26049 K000157844 Jetty vulnerabilities CVE-2023-36478, CVE-2024-6763, CVE-2023-26049, CVE-2024-8184, and CVE-2023-4190021.0.0.2

Functional Change Fixes

ID Number Severity Links to More Info Description Fixed Versions
2152397-1 1-Blocking BIG-IP support for f5optics packages built after October 202521.0.0.2
2201813-1 3-Major BT2201813 BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection21.0.0.2

TMOS Fixes

ID Number Severity Links to More Info Description Fixed Versions
1924693 0-Unspecified CVE-2020-26939 bouncycastle: Address OAEP decoding side-channel leaking RSA private exponent21.0.0.2
2228837 1-Blocking BT2228837 System Integrity Status: Unavailable on BIG-IP versions with the fix for ID214120521.0.0.2, 17.5.1.5
2141205-1 1-Blocking BT2141205 Tpm-status returns: "System Integrity: Invalid" on BIG-IP versions released since October 202521.0.0.2
2264133-3 2-Critical TMSH improvements21.0.0.2
2259157-3 2-Critical Parsing failure may interpret data as a Memcached command21.0.0.2
2258981-3 2-Critical Remove Unnecessary internal User account from Non-Supported BIG-IP Platforms21.0.0.2
2257689-3 2-Critical Improvement in system account21.0.0.2
2257421-1 2-Critical TMSH enhancements21.0.0.2
2241493-3 2-Critical User facing login issues with newly created password-based Azure VMs21.0.0.2
2229613-1 2-Critical BT2229613 F5OS Tenant Inoperative Due to Incorrect Permissions on /etc/nsswitch.conf File21.0.0.2
2229021-1 2-Critical iControl REST issue21.0.0.2
2225017-1 2-Critical Config Sync not working in an HA setup21.0.0.2
2224937-1 2-Critical HA Devices staying out of sync21.0.0.2
2221517-1 2-Critical BIG-IP SCP hardening21.0.0.2
2221493-1 2-Critical SCP Improvement21.0.0.2
2221445-1 2-Critical Improving scripts of Failover21.0.0.2
2221413-1 2-Critical SCP Improvement21.0.0.2
2219173-1 2-Critical TMSH improvements21.0.0.2
2217713-1 2-Critical TMSH improvements21.0.0.2
2217485-1 2-Critical TMSH Improvements21.0.0.2
2202097-1 2-Critical Apply limitations on certain object creation21.0.0.2
2201965-1 2-Critical TMSH improvement21.0.0.2
2201789-4 2-Critical TMSH improvements21.0.0.2
2201769-1 2-Critical TMSH improvements21.0.0.2
2201745-1 2-Critical TMSH improvements21.0.0.2
2201725-1 2-Critical TMSH improvements21.0.0.2
2201697-1 2-Critical TMSH improvements21.0.0.2
2200561-1 2-Critical Repeated MCPD service crashes21.0.0.2
2200437-1 2-Critical SNMP Improvement21.0.0.2
2200421-1 2-Critical SNMP Improvement21.0.0.2
2200209-2 2-Critical Support NVMe-based disk (newer generation instance families)21.0.0.2
2196761-1 2-Critical TMM core found while doing DAG and SP DAG related tests21.0.0.2
2185485-1 2-Critical BT2185485 The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs21.0.0.2
2053309-5 2-Critical BT2053309 Changes to README - mention of duojs.org URL21.0.0.2, 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8
1983145-2 2-Critical K000153024, BT1983145 Memory Corruption due to xnet-DPDK21.0.0.2
1959549-2 2-Critical BT1959549 Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.021.0.0.2, 17.5.1.4
842525-3 3-Major BT842525 TMSH - Modifying sys httpd ssl-verify-client attribute to 'optional-no-ca' results in error21.0.0.2
760451-5 3-Major Enabling user to configure nonce disabled/enabled from Mgmt GUI login as well as CLI21.0.0.2
2262265-3 3-Major Backup UCS enhancements21.0.0.2
2262249-1 3-Major iControl REST hardening21.0.0.2
2227441-1 3-Major TMSH hardening21.0.0.2
2225201-3 3-Major iControl REST hardening21.0.0.2
2224681-1 3-Major iControl REST improvement21.0.0.2
2224673-1 3-Major iControl REST improvement21.0.0.2
2221689-3 3-Major TMSH hardening21.0.0.2
2221169-3 3-Major iControl REST Hardening21.0.0.2
2221161-3 3-Major TMSH hardening21.0.0.2
2220389-1 3-Major BT2220389 Enabling tm.ipv4dagfrag results in tmm not ready for world on a cluster with more than 4 blades21.0.0.2
2220369-1 3-Major BIG-IP GUI/API Improvements21.0.0.2
2219745-1 3-Major iControl REST hardening21.0.0.2
2218261-1 3-Major iControl REST Improvements21.0.0.2
2216645-1 3-Major UCS Backup Improvements21.0.0.2
2208913 3-Major iControl SOAP hardening21.0.0.2
2202281-1 3-Major Primary Admin DB Change to Non-Existing User Results in Admin User Lockout21.0.0.2
2201877-3 3-Major BT2201877 SCTP multihoming fails with ICMP unreachable for alternate paths.21.0.0.2
2201377-1 3-Major iControl REST improvements21.0.0.2
2198661-1 3-Major BT2198661 Resource administrator not working as expected21.0.0.2
2186009-2 3-Major BT2186009 Increased TX IQ size for netvsc21.0.0.2
2182357-3 3-Major Inconsistent Default Source Address Selection for Virtual Server Between POST and PUT Requests21.0.0.2
2161073-1 3-Major Certificate Bundle Improvement21.0.0.2
2152301-2 3-Major BT2152301 After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.21.0.0.2, 17.5.1.4
2152137-2 3-Major New DB variable ve.ndal.driver.netvsc to provide driver selection for Azure/HyperV deployments21.0.0.2
2140213-3 3-Major BT2140213 Xnet-netvsc driver crash21.0.0.2, 17.5.1.4
2132213-2 3-Major BT2132213 Hyper-V/Azure: Unable to pass traffic with tagged vlans when using the default dpdk driver.21.0.0.2
2083257-3 3-Major 502 error from BIG-IP during large AFM rule deployment21.0.0.2
1975297-1 3-Major BT1975297 TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs21.0.0.2
1967485-2 3-Major Old Logs in /var/log Not Deleted When Storage Exceeds Threshold21.0.0.2
1927521-2 3-Major BT1927521 DPDK has dependency on SSSE321.0.0.2
1621417-3 3-Major WALinuxAgent Updated to Version 2.14.0.121.0.0.2
1600617-5 3-Major BT1600617 Few virtio driver configurations may result in excessive memory usage21.0.0.2
1401569-5 3-Major Engineering Hotfix readme file refers to non-applicable "full_box_reboot" command21.0.0.2
1106489-6 3-Major BT1106489 GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.21.0.0.2, 17.1.3, 16.1.4, 15.1.10
1057305-5 3-Major BT1057305 On deployments that use DPDK, "-c" may be logged as the TMM process/thread name.21.0.0.2
659579 4-Minor BT659579 Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time21.0.0.2, 17.5.1.4
2171845-3 4-Minor BT2171845 Manual Sync in Sync-Failover device group may result in differences in attached Logging Profiles on virtual server21.0.0.2
1178225-7 4-Minor Scalability issues with F5-VE deployments21.0.0.2, 17.5.1.4, 17.1.3.1

Local Traffic Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2141125-4 1-Blocking BT2141125 Multicast traffic is dropped with incorrect VLAN tagging21.0.0.2
797573-6 2-Critical BT797573 TMM assert crash with resulting in core generation in multi-blade chassis21.0.0.2
2259109-3 2-Critical External users can run the track command21.0.0.2
2229881-3 2-Critical BT2229881 Multi-slot tenant may become inoperative after tenant upgrade followed by tmsh reboot slot all21.0.0.2
2229857-3 2-Critical BT2229857 Full load from text files fails with "01020036:3: The requested device (/Common/<device-name>) was not found" if deprecatedApiAllowed is false21.0.0.2
2221001-3 2-Critical TMM might restart with certain network traffic21.0.0.2
2219381-1 2-Critical TMSH improvement21.0.0.2
1825357-3 2-Critical BT1825357 Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk21.0.0.2, 17.5.1.4
2259173-3 3-Major Sanitize key in memcache library21.0.0.2
2244413-1 3-Major BT2244413 Client Certificates are cached even when Retain Certificate is disabled on a Clientssl profile21.0.0.2
2219929-2 3-Major BT2219929 Tmm running in Hyper-V environments might not receive multicast traffic21.0.0.2
2183353-4 3-Major BT2183353 TMM Intel E810 VF driver updates the link state with 1 second delay21.0.0.2, 17.5.1.4, 17.1.3.1
2182045-3 3-Major BT2182045 The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers21.0.0.2, 17.1.3.1
2141061-1 3-Major iControl REST API Endpoints enhancements21.0.0.2
2135621-1 3-Major BT2135621 Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces21.0.0.2
2258705-1 4-Minor BT2258705 A policy with overlapping range in different rules may never match21.0.0.2

Global Traffic Manager (DNS) Fixes

ID Number Severity Links to More Info Description Fixed Versions
2221177-3 2-Critical K000159906, BT2221177 Big3d cannot validate certificates after they are renewed21.0.0.2
2258929-1 3-Major BT2258929 Deleting/Adding virtual server on the LTM device object can change other disabled virtual server status on the LTM device object.21.0.0.2
2219053-1 3-Major CVE-2025-13878: Malformed BRID/HHIT records can cause named to terminate unexpectedly21.0.0.2
2217445-1 3-Major GTM Virtual Server can be deleted while referenced by GTM Pools21.0.0.2
1271453-2 3-Major BT1271453 DNS requests with NSEC or NSEC3 RR type Responding with no NSEC3 and no authority section from BIG-IP authoritative server.21.0.0.2

Application Security Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2173429-2 2-Critical Digest and NTLM Authorizations Not Functioning21.0.0.2
2139921-3 2-Critical BT2139921 Invalid Length PCRE Expression Was Allowed Through REST API21.0.0.2
919917-9 3-Major BT919917 File permission errors during bot-signature installation21.0.0.2
911661-3 3-Major BT911661 Remote event logs may truncate at 5k when maximum entry length is configured to 64k21.0.0.2
2251649-4 3-Major `sig_cve` and `staged_sig_cves` Fields Appear as N/A in Data Sent to Remote Syslog21.0.0.2
2221781-1 3-Major BT2221781 The DOS process utilizes CPU resources during configuration updates that are unrelated to its operation.21.0.0.2
2219081-1 3-Major BT2219081 Live Update configuration sync failure in HA setup21.0.0.2
2213605-1 3-Major BT2213605 "Live Update" ASU File Listed as Not Installed After Successful Scheduled Installation21.0.0.2
2208709-1 3-Major BT2208709 Failure to match specific WAF signatures21.0.0.2
2187385-3 3-Major BT2187385 Brute force set to CAPTCHA also raises a violation and blocks traffic21.0.0.2
2162189-3 3-Major BT2162189 "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually21.0.0.2, 17.5.1.4, 17.1.3.1
2152445-3 3-Major BT2152445 "Live Update" API is unresponsive after upgrade and recover only after tomcat restart21.0.0.2, 17.5.1.4, 17.1.3.1
2038277-3 3-Major BT2038277 Double memory release in the enforcer21.0.0.2
2016465-2 3-Major BT2016465 Policy auto merge does not work for Base64 Decoding21.0.0.2
1938101-5 3-Major BT1938101 Performance issue on specific parameters extractions21.0.0.2
1933373-4 3-Major BT1933373 Newly added Threat Campaigns are missing REST ID21.0.0.2, 17.1.3.1
1922661-4 3-Major BT1922661 JSON profile settings not displayed in REST API after attaching schema files21.0.0.2, 17.1.3.1
1825057-3 3-Major BT1825057 'vs_name' field truncated at 64 characters with ASM's remote logging21.0.0.2
1814413-2 3-Major BT1814413 Dynamic parameters are not extracted and cookies are not generated21.0.0.2
1632385-5 3-Major BT1632385 Non-ASCII UTF-8 characters are mangled in JSON policy export21.0.0.2
1623669-3 3-Major BT1623669 False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF)21.0.0.2, 17.1.3.1
1583381-4 3-Major BT1583381 "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default21.0.0.2
1562733-5 3-Major Bd can crash using JSON schema21.0.0.2
1057557-7 3-Major BT1057557 Exported policy has greater-than sign '>' not escaped to '&gt;' with response_html_code tag.21.0.0.2
2230277-2 4-Minor Help Content Missing on Live Update Page in Certain Scenarios21.0.0.2
2201693-3 4-Minor Empty Detected Value Length for Parameters with Empty Values21.0.0.2
2199485-3 4-Minor BT2199485 Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value21.0.0.2
2078277-2 4-Minor BT2078277 BD crash with an inappropriate configuration for request_max_chunks_number21.0.0.2
2046941-6 4-Minor BT2046941 Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor21.0.0.2, 17.5.1.4, 17.1.3.1

Access Policy Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2149197-1 1-Blocking Rotated Public key used for signature verification of apmclients iso bundle in BIG-IP21.0.0.2
2259165-3 2-Critical Input Validation on APM Logon Page21.0.0.2
2257673-3 2-Critical RSA SecurID improvements21.0.0.2
2257669-1 2-Critical APM my.policy improvement21.0.0.2
2230009-4 2-Critical BT2230009 Access Policy memory is not cleared between access policy executions21.0.0.2
2219801-2 3-Major BT2219801 Visual Policy Editor AD group search is limited to current page21.0.0.2
937665-4 4-Minor BT937665 Relaystate in SLO request results in two Relaystates in SLO Response21.0.0.2, 17.5.1.4

Service Provider Fixes

ID Number Severity Links to More Info Description Fixed Versions
2252481-3 2-Critical Undisclosed network traffic can cause a TMM crash21.0.0.2

Advanced Firewall Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2229569-4 2-Critical BT2229569 Evict FSD Received While SPVADWL Is Uninitialized21.0.0.2
2150669-3 2-Critical BT2150669 TCP Packet loss after upgrade with AFM provisisoned21.0.0.2
2251813-3 3-Major BT2251813 BIG-IP AFM: mcpd may crash when modifying address lists with cyclic nested references21.0.0.2
2222185-4 3-Major BT2222185 Even if it's possible to configure multiple stanzas under the auth-info section of a security ssh profile, the SSH proxy will always choose the first one that has a private key21.0.0.2
2163777-3 3-Major BT2163777 Tmm core on fw_nat_classify() while nat rule configuration is being changed21.0.0.2

Policy Enforcement Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2200009-1 3-Major BT2200009 PEM HA failover may cause traffic drops for new connections21.0.0.2
2198757-3 3-Major BT2198757 PEM: use-after-free of mw_msg in session_del_msg_entries hash21.0.0.2

Anomaly Detection Services Fixes

ID Number Severity Links to More Info Description Fixed Versions
2258257-3 3-Major BT2258257 Zombie connections after switching dos profile may cause tmm crash.21.0.0.2
2230841-4 3-Major Admd Crash During Restart Under Heavy Load21.0.0.2

Device Management Fixes

ID Number Severity Links to More Info Description Fixed Versions
718796-10 2-Critical K22162765, BT718796 iControl REST token issue after upgrade21.0.0.2
996129-8 3-Major BT996129 The /var partition is full as cleanup of files on secondary is not executing21.0.0.2
2187185-1 3-Major BT2187185 BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests21.0.0.2
2186697-5 3-Major BIG-IP REST Improvements21.0.0.2

iApp Technology Fixes

ID Number Severity Links to More Info Description Fixed Versions
2227725-1 3-Major iApp Template Improvements21.0.0.2

F5OS Messaging Agent Fixes

ID Number Severity Links to More Info Description Fixed Versions
2190373-1 2-Critical BT2190373 Platform_agent core found while tmstats updation.21.0.0.2, 17.5.1.3
2230749-1 3-Major Platform Agent Core Detected; Process Shutdown21.0.0.2


Cumulative fixes from BIG-IP v21.0.0.1 that are included in this release


Vulnerability Fixes

ID Number CVE Links to More Info Description Fixed Versions
2140621-4 CVE-2025-8677 K000157317, BT2140621 CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling21.0.0.1, 17.5.1.4, 17.1.3.1
551462-12 CVE-2014-9730 K17447 CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability21.0.0.1, 17.5.1.4, 17.1.3.1
1988993-4 CVE-2024-42516 K000153074, BT1988993 CVE-2024-42516 Apache HTTP Server vulnerability21.0.0.1, 17.5.1.4, 17.1.3.1
1983349-4 CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 K000152931, BT1983349 CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities21.0.0.1, 17.5.1.4, 17.1.3.1
1505309-3 CVE-2021-23337 K12492858, BT1505309 CVE-2021-23337 nodejs-lodash: command injection via template21.0.0.1, 17.5.1.4, 17.1.3.1
1498949-1 CVE-2023-2283 K000138682, BT1498949 CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature21.0.0.1, 17.5.1.4, 17.1.3.1
1083937-8 CVE-2002-20001, CVE-2022-40735 K83120834, BT1083937 CVE-2002-20001, CVE-2022-40735 DH Key Agreement vulnerability - OpenSSH Server21.0.0.1
912797-15 CVE-2020-11868 K44305703, BT912797 NTP Vulnerability: CVE-2020-1186821.0.0.1, 17.5.1.3, 17.1.3
714238-12 CVE-2018-1301 K78131906, BT714238 CVE-2018-1301: Apache Vulnerability21.0.0.1, 17.5.1.4, 17.1.3.1
1893905-3 CVE-2023-40217 K000139685, BT1893905 Python vulnerability CVE-2023-4021721.0.0.1, 17.5.1.4, 17.1.3.1
1086325-8 CVE-2016-4658 K49419538, BT1086325 CVE-2016-4658 libxml2 vulnerability21.0.0.1, 17.5.1.4, 17.1.3.1
1893473-3 CVE-2021-40438 K01552024, BT1893473 Apache vulnerability CVE-2021-4043821.0.0.1, 17.5.1.4, 17.1.3.1
1893309-5 CVE-2021-23337 K12492858 CVE-2021-23337 on HostOS: Command Injection via template function.\n' 'Link:https://sn21.0.0.1, 17.5.1.4, 17.1.3.1

Functional Change Fixes

None


TMOS Fixes

ID Number Severity Links to More Info Description Fixed Versions
658943-9 1-Blocking BT658943 Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants21.0.0.1, 14.1.4.1
2179729-1 1-Blocking BT2179729 MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity.21.0.0.1
2144513-1 1-Blocking BT2144513 Cannot install any BIG-IP version with ISO signature verification enabled21.0.0.1
2130485-4 1-Blocking BT2130485 Warning: the current license is not valid - Fault code: 5113321.0.0.1, 17.5.1.4, 17.1.3.1
935633-4 2-Critical BT935633 VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade21.0.0.1, 17.5.1.4, 17.1.3.1
901989-11 2-Critical BT901989 Corruption detected in /var/log/btmp21.0.0.1, 17.5.1.4, 17.1.3.1
2197173-1 2-Critical Insufficient sanitization in SNMP configuration21.0.0.1, 17.5.1.4, 17.1.3.1
2187365 2-Critical BT2187365 BIG-IP v21.0.0 VE or F5OS tenant remains INOPERATIVE after cold boot21.0.0.1
2163585-1 2-Critical BT2163585 Migration fails "Spanning Tree Protocol (STP) is not supported on this platform"21.0.0.1
2162849-2 2-Critical BT2162849 Removing the active controller does not trigger an immediate tenant failover21.0.0.1, 17.5.1.4
2153489-1 2-Critical BT2153489 MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21)21.0.0.1
2125953-5 2-Critical Insufficient access control to REST endpoint and TMSH for some CLI versions.21.0.0.1, 17.5.1.4, 17.1.3.1
1826345-6 2-Critical Security improvements in ca-bundle.crt21.0.0.1, 17.5.1.4, 17.1.3.1
2187529-3 3-Major CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound21.0.0.1, 17.5.1.4, 17.1.3.1
2184897-2 3-Major BT2184897 Tenant disk size modification is ineffective for var/log folder21.0.0.1, 17.5.1.3, 17.1.3.1
2161077-2 3-Major BT2161077 Bot profile properties page does not load when there are large number of SSL certs (> 1000)21.0.0.1, 17.5.1.4, 17.1.3.1
2152877-3 3-Major BT2152877 Exclude /opt/CrowdStrike directory from Integrity Test21.0.0.1, 17.5.1.4, 17.1.3.1
2152601 3-Major BT2152601 Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events21.0.0.1
2150525-1 3-Major Improvements in iControl SOAP21.0.0.1, 17.5.1.4, 17.1.3.1
2144497-2 3-Major BT2144497 Mellanox driver timeouts and packet drops on Azure instances with high NIC count21.0.0.1, 17.5.1.4, 17.1.3.1
2144445-1 3-Major Insufficient sanitization in TMSH21.0.0.1, 17.5.1.4, 17.1.3.1
2140905-3 3-Major BT2140905 System Integrity Test on VE is halting the whole system in FIPS mode21.0.0.1, 17.5.1.4, 17.1.3.1
2137977-3 3-Major BT2137977 Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy21.0.0.1, 17.5.1.4, 17.1.3.1
2078297-4 3-Major Unexpected PVA traffic spike21.0.0.1, 17.5.1.4, 17.1.3.1
2063265-6 3-Major Improvements in HTTP headers21.0.0.1, 17.5.1.4, 17.1.3.1
2047429-4 3-Major BT2047429 PostgreSQL should dump a corefile when not exiting21.0.0.1
1974701-3 3-Major BT1974701 PVA stats may be double incremented when pva mode is dedicated21.0.0.1, 17.5.1.4, 17.1.3.1
1966633-3 3-Major BT1966633 Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS21.0.0.1, 17.5.1.4
1925485 3-Major CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata21.0.0.1, 17.5.1.4, 17.1.3.1
1925369 3-Major CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service21.0.0.1, 17.5.1.4, 17.1.3.1
1925045 3-Major CVE-2024-35849 - Linux Kernel Btrfs Information Leak Vulnerability21.0.0.1, 17.5.1.4, 17.1.3.1
1925029 3-Major CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak21.0.0.1, 17.5.1.4, 17.1.3.1
1923997 3-Major CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling21.0.0.1, 17.5.1.4, 17.1.3.1
1893369-3 3-Major CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c21.0.0.1, 17.5.1.4, 17.1.3.1
1450481-6 3-Major TMSH hardening21.0.0.1, 17.5.1.4, 17.1.3.1
1148185-8 3-Major K05403841 getdb insufficient sanitisation21.0.0.1
1137269-8 3-Major BT1137269 MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes21.0.0.1, 17.5.1.4, 17.1.3.1
857973-5 4-Minor BT857973 GUI sets FQDN Pool Member "Auto Populate" value Enabled by default21.0.0.1, 17.5.1.4, 17.1.3.1
761853-1 4-Minor BT761853 Send HOST header in OCSP responder request21.0.0.1, 17.5.1.4, 17.1.3.1
423304-6 4-Minor Sync issues with certain objects' parameters.21.0.0.1
2186153-6 4-Minor CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile21.0.0.1, 17.5.1.4, 17.1.3.1
2141305-2 4-Minor BT2141305 SSH Proxy Profile Properties page does not render21.0.0.1
2131225-1 4-Minor BT2131225 Unclear Actions Displayed with L7 Profiles in Rule Creation21.0.0.1
2099441-2 4-Minor BT2099441 Garbled character in warning message when HA peer is added21.0.0.1
2035641-5 4-Minor APMd resource exhaustion21.0.0.1, 17.5.1.4, 17.1.3.1
1624701-5 4-Minor Security improvement in BIGIP GUI21.0.0.1, 17.5.1.4, 17.1.3.1
1341517-1 4-Minor BT1341517 With longer vlan names qkview generates invalid proc_module.xml file and ihealth parsing fails.21.0.0.1
1052477 4-Minor CVE-2020-10751 kernel: SELinux netlink permission check bypass21.0.0.1, 17.5.1.4, 17.1.3.1

Local Traffic Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
1923793-10 0-Unspecified CVE-2019-5739: DoS with keep-alive HTTP connection21.0.0.1, 17.5.1.4, 17.1.3.1
2162705-2 1-Blocking BT2162705 Tmm restarting on multi-NUMA AWS instances with ENA interfaces21.0.0.1, 17.5.1.4
745334-15 2-Critical CVE-2016-7099 NodeJS Vulnerability21.0.0.1
2152785-1 2-Critical TMM may crash under certain conditions.21.0.0.1, 17.5.1.4, 17.1.3.1
2144521-1 2-Critical BT2144521 WAF plugin gets incorrect response body when SSE profile is configured on virtual server21.0.0.1
2017137-5 2-Critical BT2017137 Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd21.0.0.1, 17.5.1.2, 17.1.3
901569-8 3-Major BT901569 Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.21.0.0.1, 17.5.1.4, 17.1.3.1
2149253-2 3-Major BT2149253 QUIC connection stalls with early data21.0.0.1
2149233-3 3-Major TMM crashes when using SSL21.0.0.1, 17.5.1.4, 17.1.3.1
2141233-2 3-Major BT2141233 Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate21.0.0.1, 17.5.1.4
1987309-4 3-Major BT1987309 Bigd may get stuck in legacy mode21.0.0.1, 17.5.1.4, 17.1.3.1
1923817 3-Major CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1)21.0.0.1, 17.5.1.4, 17.1.3.1
1889845-3 3-Major Improvements in Radius Monitor21.0.0.1, 17.5.1.4, 17.1.3.1
1849029-5 3-Major BT1849029 Debug TMM crashes in FIPS/CC mode21.0.0.1, 17.1.3, 16.1.6.1
1824985-4 3-Major BT1824985 In rare cases the Nitrox hardware compression queue may stop servicing requests.21.0.0.1, 17.5.1.4, 17.1.3.1
1818137-3 3-Major BT1818137 Tmm IPv4 fragmentation handling distribution21.0.0.1
1788105-3 3-Major BT1788105 TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes21.0.0.1, 17.1.3
1352213-1 3-Major BT1352213 Handshake fails with FFDHE key share extension21.0.0.1, 17.5.1.4, 17.1.3
1271341-6 3-Major Unable to use DTLS without TMM crashing21.0.0.1, 17.5.1.4, 17.1.3.1
1429861-9 4-Minor CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6)21.0.0.1, 17.5.1.4, 17.1.3.1

Global Traffic Manager (DNS) Fixes

ID Number Severity Links to More Info Description Fixed Versions
931149-5 2-Critical BT931149 Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings21.0.0.1
887681-5 2-Critical BT887681 Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c21.0.0.1
2197377-1 2-Critical TMM crashes under specific traffic.21.0.0.1
2153893-4 3-Major BT2153893 With DNS64 configured, resolution aborts early on the first error response without trying other name servers.21.0.0.1, 17.5.1.4, 17.1.3.1
2144353-4 3-Major BT2144353 BIND upgrade to stable version 9.18.4121.0.0.1, 17.5.1.4, 17.1.3.1
2141245-3 3-Major Undisclosed traffic to TMM can lead to resource exhaustion21.0.0.1, 17.5.1.4, 17.1.3.1
2106789-1 3-Major BIGIP LTM Monitors Hardening21.0.0.1, 17.5.1.4, 17.1.3.1
1966405-1 3-Major BT1966405 Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.121.0.0.1
1943269-1 3-Major BT1943269 GTM Server can be deleted while referenced by GTM Pools21.0.0.1, 17.5.1.4, 17.1.3.1
1933357-3 3-Major BT1933357 DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior.21.0.0.1, 17.5.1.4, 17.1.3.1
1473189-1 3-Major BT1473189 Offending IP is not logged when rate limiting is triggered21.0.0.1
1379649-6 3-Major BT1379649 GTM iRule not verifying WideIP type while getting pool from TCL command21.0.0.1, 17.1.3.1

Application Security Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2152689-3 3-Major BT2152689 ASM GUI "Failed to load requests" pop-up21.0.0.1, 17.5.1.4, 17.1.3.1
2143305-5 3-Major BT2143305 Tmm crash21.0.0.1
1552341-7 3-Major BT1552341 Excessive tmm memory during bot signature updates21.0.0.1
2162589-1 4-Minor BD crash with a specific configuration21.0.0.1, 17.5.1.4, 17.1.3.1
2139901-6 4-Minor BT2139901 Server-ssl profile "do-not-remove-without-replacement" is recreated21.0.0.1, 17.5.1.4, 17.1.3.1
1505257-3 4-Minor BT1505257 False positive with "illegal base64 value" for Authorization header21.0.0.1, 17.5.1.4, 17.1.3.1
1036221-4 4-Minor BT1036221 "Illegal parameter value length" is reported with parsing product length.21.0.0.1, 17.5.1.4

Application Visibility and Reporting Fixes

ID Number Severity Links to More Info Description Fixed Versions
2183705-1 3-Major K000156643, BT2183705 Improper access control on SMTP21.0.0.1, 17.5.1.4, 17.1.3.1

Access Policy Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2152269-8 2-Critical BT2152269 Low reputation URIs are found in the URL DB binary21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1
2138077-3 2-Critical BT2138077 SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x21.0.0.1
1991297-3 2-Critical BT1991297 [APD][SAML-SSO]high memory due to SAML SSO leak21.0.0.1
2143165-3 3-Major BT2143165 Oauth tokens are not shown in UI21.0.0.1, 17.5.1.4, 17.1.3.1
2034753-3 3-Major BT2034753 Domain name validation does not align with the error message on GUI21.0.0.1, 17.5.1.4, 17.1.3.1
1818949-3 3-Major BT1818949 [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.21.0.0.1
1772317-4 3-Major BT1772317 [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"21.0.0.1
1752873-3 3-Major BT1752873 [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed21.0.0.1, 17.5.1.4, 17.1.3.1

Advanced Firewall Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2162937 2-Critical BT2162937 TMM crash when AFM is enabled21.0.0.1
2162905-2 2-Critical BT2162905 AFM GUI does not display Port List members in Properties panel21.0.0.1, 17.5.1.4
2143101-3 3-Major BT2143101 SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported21.0.0.1, 17.5.1.4, 17.1.3.1
2077525-4 3-Major BT2077525 Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash21.0.0.1

Policy Enforcement Manager Fixes

ID Number Severity Links to More Info Description Fixed Versions
2086097-4 3-Major PEM iRules causing traffic disruption21.0.0.1, 17.5.1.4, 17.1.3.1
1934073-5 3-Major BT1934073 PEM policy rule incorrectly matching when using a flow condition21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1

Anomaly Detection Services Fixes

ID Number Severity Links to More Info Description Fixed Versions
2186897-3 3-Major BT2186897 TMM core SIGSEVG upon replacing L7 DOS policy21.0.0.1, 17.5.1.4, 17.1.3.1
1959361-2 3-Major BT1959361 When running a tenant with more than 72 VCPUs / cores, adminstall crashes21.0.0.1, 17.5.1.4, 17.1.3.1

Device Management Fixes

ID Number Severity Links to More Info Description Fixed Versions
1001429-10 4-Minor HTTP header Sanitization21.0.0.1

iApp Technology Fixes

ID Number Severity Links to More Info Description Fixed Versions
1505813-7 4-Minor CVE-2018-16487 lodash: Prototype pollution in utilities21.0.0.1, 17.5.1.4, 17.1.3.1
1505297-5 4-Minor CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function21.0.0.1, 17.5.1.4, 17.1.3.1

F5OS Messaging Agent Fixes

ID Number Severity Links to More Info Description Fixed Versions
1359817-4 3-Major BT1359817 The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1
2008409-4 4-Minor BT2008409 MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN21.0.0.1

Cumulative fix details for BIG-IP v21.0.0.2 that are included in this release

996129-8 : The /var partition is full as cleanup of files on secondary is not executing

Links to More Info: BT996129

Component: Device Management

Symptoms:
The system does not boot because the /var partition is full.

You see a large number of "storageXXXX.zip" files in /var/config/rest/

Conditions:
This may be observed on multi-blade vCMP guests and hosts, as well as on multi-blade tenants.

Impact:
The partition housing /var/config/ may become 100% full, impacting future disk IO operation and it may cause unexpected traffic disruption.

Workaround:
Important: This workaround is temporary, and may need to be periodically performed either manually or from a script.

Impact of Workaround: While these steps are performed, the BIG-IP REST API will be temporarily inaccessible, and higher disk IO may be seen.

Run the following commands, in sequence:

bigstart stop restjavad
rm -rf /var/config/rest/storage*.zip
rm -rf /var/config/rest/*.tmp
bigstart start restjavad

Manual application of these workaround steps clears the 100% utilized space condition and allows the partition to resume normal operation.

Fix:
N/A.

Fixed Versions:
21.0.0.2


937665-4 : Relaystate in SLO request results in two Relaystates in SLO Response

Links to More Info: BT937665

Component: Access Policy Manager

Symptoms:
When BIG-IP APM acts as the SAML IdP and receives a redirect binding single logout (SLO) request that contains a relaystate, the BIG-IP APM generates an SLO response that contains two relaystates.

Conditions:
-- BIG-IP APM configured as IdP
-- Redirect binding SLO request contains a relaystate

Impact:
SLO processing on SP may not work.

Workaround:
None.

Fixed Versions:
21.0.0.2, 17.5.1.4


935633-4 : VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade

Links to More Info: BT935633

Component: TMOS

Symptoms:
Sometimes, when vCMP guests or F5OS tenants are started after the host has been upgraded, the guests or tenants may enter an unhealthy state due to clusterd constantly restarting.

Conditions:
-- vCMP guest or F5OS tenant has Mirroring IP configured.
-- vCMP guest or F5OS tenant is powered on after vCMP host upgrade.
-- vCMP guest or F5OS tenant is powered on and receives a new license file from the host during startup.

Impact:
-- This issue might prevent the guest or tenant from servicing traffic if the system fails to load the config and clusterd keeps restarting.
-- During startup of the guest or tenant, the following message is logged to /var/log/ltm:

 err mcpd[6519]: 0107146f:3: Self-device state mirroring address cannot reference the non-existent Self IP ([IP address]); Create it in the /Common folder first.

-- /var/log/ltm shows clusterd constantly restarting.
-- One or more slots are in INOPERATIVE state, while the host shows slots as RUN/Healthy.

Workaround:
-- To avoid the issue before it occurs:
1. Prior to shutting down vCMP guests or F5OS tenants before host upgrade, ensure guests or tenants have free space in the /var partition.
2. Ensure any license updates (e.g., reactivation) are applied before shutting down the vCMP guest or F5OS tenant.
3. Issue 'tmsh save sys config' on the vCMP guest or F5OS tenant.
4. Issue 'ls /var/db/mcp*' and confirm the presence of mcpdb.bin and mcpdb.info in the /var/db directory.
5. Proceed with vCMP guest or F5OS tenant shutdown and host upgrade as per standard F5 recommended process.


-- To mitigate after the issue has been experienced on a vCMP guest or F5OS tenant:
1. Set the vCMP guest or F5OS tenant to the Configured state and wait for it to complete transition to Configured.
2. Set vCMP guest or F5OS tenant to Deployed state.
3. Review startup logs and confirm 'Self-device state mirroring address cannot reference the non-existent Self IP' message is no longer present.
4. Review /var/log/ltm and confirm clusterd is no longer restarting.
5. If issue persists, delete and recreate the vCMP guest or F5OS tenant.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


931149-5 : Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings

Links to More Info: BT931149

Component: Global Traffic Manager (DNS)

Symptoms:
RESOLV::lookup returns an empty string.

Conditions:
The name being looked up falls into one of these categories:

-- Forward DNS lookups in these zones:
    - localhost
    - onion
    - test
    - invalid

-- Reverse DNS lookups for:
    - 127.0.0.0/8
    - ::1
    - 10.0.0.0/8
    - 172.16.0.0/12
    - 192.168.0.0/16
    - 0.0.0.0/8
    - 169.254.0.0/16
    - 192.0.2.0/24
    - 198.51.100.0/24
    - 203.0.113.0/24
    - 255.255.255.255/32
    - 100.64.0.0/10
    - fd00::/8
    - fe80::/10
    - 2001:db8::/32
    - ::/64

Impact:
RESOLV::lookup fails.

Workaround:
Use a DNS Resolver ('net dns') and RESOLVER::name_lookup / DNSMSG:: instead of RESOLV::lookup:

1. Configure a local 'net dns' resolver, replacing '192.88.99.1' with the IP address of your DNS resolver:

    tmsh create net dns-resolver resolver-for-irules answer-default-zones no forward-zones add { . { nameservers add { 192.0.2.1:53 } } }

2. Use an iRule procedure similar to this to perform PTR lookups for IPv4 addresses:

proc resolv_ptr_v4 { addr_v4 } {
    # Convert $addr_v4 into its constituent bytes
    set ret [scan $addr_v4 {%d.%d.%d.%d} a b c d]
    if { $ret != 4 } {
        return
    }

    # Perform a PTR lookup on the IP address $addr_v4, and return the first answer
    set ret [RESOLVER::name_lookup "/Common/resolver-for-irules" "$d.$c.$b.$a.in-addr.arpa" PTR]
    set ret [lindex [DNSMSG::section $ret answer] 0]
    if { $ret eq "" } {
        # log local0.warn "DNS PTR lookup for $addr_v4 failed."
        return
    }

    # Last element in '1.1.1.10.in-addr.arpa. 600 IN PTR otters.example.com'
    return [lindex $ret end]
}

-- In an iRule, instead of:
    RESOLV::lookup @192.0.2.1 $ipv4_addr
Use:
    call resolv_ptr_v4 $ipv4_addr

Fixed Versions:
21.0.0.1


929709-9 : jQuery vulnerability CVE-2020-11023

Links to More Info: K66544153


919917-9 : File permission errors during bot-signature installation

Links to More Info: BT919917

Component: Application Security Manager

Symptoms:
When you install Bot-Sig IM file through LU, /var/log/ltm shows file permission errors.

Cannot open lock file (/var/run/config_lock), permission denied.

Cannot open command history file (/root/.tmsh-history-root), Permission denied : framework/CmdHistoryFile.cpp, line 92.

Conditions:
Installing bot-signature.

Impact:
If the BIG-IP device is rebooted, or the mcpd process is restarted, following an automatic bot-signature installation, without the config first being saved, the bot-signature installation will be reverted.

Workaround:
Save the BIG-IP configuration manually after the automatic bot-signature update has completed.

Fixed Versions:
21.0.0.2


912797-15 : NTP Vulnerability: CVE-2020-11868

Links to More Info: K44305703, BT912797


911661-3 : Remote event logs may truncate at 5k when maximum entry length is configured to 64k

Links to More Info: BT911661

Component: Application Security Manager

Symptoms:
Remote event logs are truncated at 5k instead of the configured 64k maximum entry length

Conditions:
Remote logging is configured with maximum entry length set to 64k

Impact:
Remote event logs are truncated at 5k, resulting in incomplete log entries

Workaround:
As a temporary workaround, change the maximum entry length to 2k or 10k, save the configuration, then change it back to 64k. Follow the same steps if the issue occurs again.

Fixed Versions:
21.0.0.2


901989-11 : Corruption detected in /var/log/btmp

Links to More Info: BT901989

Component: TMOS

Symptoms:
The boot_marker is written to /var/log/btmp, but /var/log/btmp is a binary file.

A message similar to:

warning <process>[10901]: pam_lastlog(<process>:session): corruption detected in /var/log/btmp

... may be logged to /var/log/secure.

Conditions:
This issue is triggered following a reboot of the BIG-IP system. Subsequently, you may observe the log message appearing in relation to various administrative activities, such as logging in through the console or restarting the tomcat service.

Impact:
Since this file is unknowingly corrupt after each boot, any potential investigation needing this data may be compromised.

Workaround:
Option 1; After bootup you can truncate the file.
$ truncate --size 0 /var/log/btmp
This will remove any instances of failed logins from the file.

--or--

Option 2; this will stop boot_markers from logging to /var/log/btmp:
CAVEATS:
- If the system has FIPS enabled, do not use this workaround! Modifying this file will cause FIPS validation to fail the next time it runs, and the system will halt on next boot.
- This workaround will not persist on software upgrades.
- Familiarity with vi is required to perform this.

Backup:
cp /etc/sysconfig/sysinit/01bootlogmarker.sysinit /var/tmp/01bootlogmarker.sysinit.bak

Open in vi:
vi /etc/sysconfig/sysinit/01bootlogmarker.sysinit

Change the following line to include "btmp":
old: excludeFiles=( "lastlog" "wtmp" "tmm*tech.out" "*.json" )
new: excludeFiles=( "lastlog" "wtmp" "btmp" "tmm*tech.out" "*.json" )

Force save and quit with (required since file is RO):
:wq!

Truncate the "/var/log/btmp" file:
truncate --size 0 /var/log/btmp

Reboot

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


901569-8 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.

Links to More Info: BT901569

Component: Local Traffic Manager

Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.

Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).

Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.

Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


887681-5 : Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c

Links to More Info: BT887681

Component: Global Traffic Manager (DNS)

Symptoms:
TMM Cored with SIGSEGV.

Conditions:
N/A.

Impact:
Traffic disrupted while tmm restarts.

Fixed Versions:
21.0.0.1


857973-5 : GUI sets FQDN Pool Member "Auto Populate" value Enabled by default

Links to More Info: BT857973

Component: TMOS

Symptoms:
In the GUI, the "autopopulate" value is Enabled by default when creating an FQDN template Pool Member, but Disabled by default when creating an FQDN template Node.

Conditions:
This is observed when using FQDN names to configure Pool Members and/or Nodes in the GUI.

Impact:
Differing default "autopopulate" values displayed in the GUI are confusing.
The "autopopulate" value for an FQDN Pool Member cannot be set to "enabled" if the "autopopulate" value of the corresponding FQDN Node is set to the default value of "disabled".
Attempting to do so via tmsh will generate an error similar to:
01070734:3: Configuration error: Cannot enable pool member to autopopulate: node (<fqdn node name>) has autopopulate set to disabled

Workaround:
Be careful to select the appropriate option for the "Auto Populate" parameter when configuring FQDN Pool Members using the GUI.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


842525-3 : TMSH - Modifying sys httpd ssl-verify-client attribute to 'optional-no-ca' results in error

Links to More Info: BT842525

Component: TMOS

Symptoms:
Error is seen when configuring the ssl-verify-client to optional-no-ca via tmsh

tmsh modify sys httpd ssl-verify-client optional-no-ca
01070920:3: Application error for confpp: AH00526: Syntax error on line 166 of /etc/httpd/conf.d/ssl.conf:
SSLVerifyClient: Invalid argument 'optional-no-ca'

Conditions:
Seen when configuring ssl-verify-client to optional-no-ca in httpd profile

Impact:
Unable to configure ssl-verify-client to optional-no-ca - impacts authentication

Workaround:
None

Fix:
You can now successfully execute
tmsh modify sys httpd ssl-verify-client optional-no-ca

Fixed Versions:
21.0.0.2


797573-6 : TMM assert crash with resulting in core generation in multi-blade chassis

Links to More Info: BT797573

Component: Local Traffic Manager

Symptoms:
TMM crashes while changing settings.

Conditions:
Seen on multi-blade chassis with either one of the options:
-- Running system with DoS and other traffic.
-- Create a new vCMP guest and deploy it.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.

Fixed Versions:
21.0.0.2


761853-1 : Send HOST header in OCSP responder request

Links to More Info: BT761853

Component: TMOS

Symptoms:
As per the Digicert documentation, the OCSP/CRL connections require either HTTP1.1 or HTTP1.0 with host header. (Digicert).
LTM uses HTTP1.1 without the host header in OCSP responder request

Conditions:
OCSP and CRL Authentication uses HTTP1.0 for OCSP responder requests

Impact:
OCSP in the current BIG-IP relies on OpenSSL for its operations and current version of OpenSSL that is available in BIG-IP is 1.0.2za
OpenSSL 1.0.2 is only capable of generating HTTP/1.0 requests for OCSP and CRL fetches; it does not support HTTP/1.1.
This limitation prevents clients from communicating with OCSP/CRL endpoints that require HTTP/1.1, resulting in failures for revocation checks in environments where modern protocols are mandated.

Workaround:
Add either of these iRules to the Virtual Server

Modify HTTP 1.0 to HTTP1.1

when HTTP_REQUEST {
    HTTP::version "1.1"
}

Add Host header
 
when HTTP_REQUEST {
    HTTP::host "[HTTP::host]”
}

Fix:
Support for HTTP1.1 is added. The OCSP requests for auth should now use HTTP1.1 version

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


760451-5 : Enabling user to configure nonce disabled/enabled from Mgmt GUI login as well as CLI

Component: TMOS

Symptoms:
When Remote client cert-ldap authentication is enabled in BIG-IP and ocsp-responder is configured. By default nonce was always added in ocsp request

Conditions:
-- Remote client cert-ldap authentication is enabled in BIG-IP and ocsp-responder is configured.

Impact:
A new configurable parameter "ssl-ocsp-use-request-nonce" is introduced in httpd, to configure whether to send the nonce in ocsp request. Default value is On

Workaround:
None

Fix:
1.Configure BIG-IP for Remote-cert-ldap authentication
2.Set httpd ssl-ocsp-use-request-nonce on in httpd profile
3.Capture the ocsp packet
4.When httpd ssl-ocsp-use-request-nonce is on, ocsp request should contain OCSP nonce in the extensions

Fixed Versions:
21.0.0.2


745334-15 : CVE-2016-7099 NodeJS Vulnerability

Component: Local Traffic Manager

Symptoms:
tls.checkServerIdentity does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.

Conditions:
The server runs Node.js 0.12.16 or earlier that has tls.checkServerIdentity function that does not handle wildcards in name fields of X.509 certificates.

Impact:
This allows man-in-the-middle attackers to spoof servers via a crafted certificate.

Fix:
Upgrade to Node.js 0.12.16 or later, where tls.checkServerIdentity function can handle wildcards in name fields of X.509 certificates.

Fixed Versions:
21.0.0.1


718796-10 : iControl REST token issue after upgrade

Links to More Info: K22162765, BT718796

Component: Device Management

Symptoms:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST lose the ability to make those calls.

Conditions:
You will notice this issue when you use iControl REST and are upgrading to version 13.1.0.x or later.

You can also detect if the user is impacted by this issue with the following steps

    1. Run below API to for impacted user account XYZ.

         # curl -ik -u username:XYZ -XPOST https://localhost/mgmt/shared/authn/login --data-binary '{"username":"XYZ", "password":"XYZpass", "loginProviderName":"tmos"}' -H "Content-Type: application/json"

    2. Find user XYZ's 'link' path under 'token' in previous output

       There are two formats possible for 'link'
       a. Path will have a UUID
          For example "token"->"link"->"https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>"

       b. Path will have a username (not UUID)
          For example "token"->"link"->"https://localhost/mgmt/shared/authz/users/<username>"

    3. Run below API to get list of user roles.

         # restcurl -u "admin:<admin-user-pass>" /shared/authz/roles | tee /var/tmp/rest_shared_authz_roles.json

    4. Check user XYZ's link path from step 2 in above output.

       Check under the "userReferences" section for group "iControl_REST_API_User" . You will see the link path in one of the two formats listed in 2a/2b. If you do not see the user link path then you are impacted by this bug

Impact:
A previously privileged user can no longer query iControl REST. In addition, some remotely authenticated users may lose access to the Network Map and Analytics view after the upgrade.

Workaround:
You can repair the current users permissions with the following process:

   1) Delete the state maintained by IControlRoleMigrationWorker and let it rerun by restarting restjavad process:
      # restcurl -X DELETE "shared/storage?key=shared/authz/icontrol-role-migrator"
     
   2) Restart services
      # bigstart restart restjavad *or* tmsh restart /sys service restjavad

   3) Now, the permissions should start in a healthy state. Re-try making an iControl REST call with an affected user.

   4) If this still does not resolve the issue you could update shared/authz/roles/iControl_REST_API_User userReference list to add all affected users' accounts using PUT. Here you may need to use the UUID path as described under 'Conditions'

      # restcurl shared/authz/roles/iControl_REST_API_User > role.json
      # vim role.json
          a. add { "link": "https://localhost/mgmt/shared/authz/users/[your-user-name]" } object to userReferences list
          OR
          b. add { "link": "https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>" } object to userReferences list
      # curl -u admin:admin -X PUT -d@role.json http://localhost/mgmt/shared/authz/roles/iControl_REST_API_User

Fix:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST retain the ability to make those calls.

Fixed Versions:
21.0.0.2


714238-12 : CVE-2018-1301: Apache Vulnerability

Links to More Info: K78131906, BT714238


659579 : Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time

Links to More Info: BT659579

Component: TMOS

Symptoms:
Logs on icrd, restnoded, and restjavad are in the UTC time zone and are not aligned to the system time, which makes it difficult to determine the time during troubleshooting operations.

Conditions:
Checking the icrd, restnoded, and restjavad logs timestamps.

Impact:
Difficult to troubleshoot as the logs are not aligned with system time.

Workaround:
None

Fixed Versions:
21.0.0.2, 17.5.1.4


658943-9 : Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants

Links to More Info: BT658943

Component: TMOS

Symptoms:
During the platform migration from a physical BIG-IP system to a BIG-IP vCMP guest/F5OS Tenant, the load fails with one of the following messages:

01070687:3: Link Aggregation Control Protocol (LACP) is not supported on this platform. Unexpected Error: Loading configuration process failed.

01070338:3: Cannot create trunk [name of trunk], maximum limit reached Unexpected Error: Loading configuration process failed.

Conditions:
-- The source device is a physical BIG-IP device with one or more trunks with or without LACP in its configuration.
-- The destination device is a vCMP guest/F5OS Tenant.

Impact:
The platform migration fails and the configuration does not load.

Workaround:
You can use one of the following workarounds:

-- Remove all trunks from the source configuration prior to generation of the UCS.

-- Before loading the UCS archive onto the target BIG-IP, edit the archive and remove the trunk configuration from ./config/bigip_base.conf, and then repack the UCS.

-- After the UCS load fails, edit the configuration manually on the destination to remove trunk references, and then reload the configuration.

-- K50152613

Fixed Versions:
21.0.0.1, 14.1.4.1


551462-12 : CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability

Links to More Info: K17447


423304-6 : Sync issues with certain objects' parameters.

Component: TMOS

Symptoms:
Synchronized configuration objects may contain invalid parameters after you delete an object and create a different object type with the same name.

Conditions:
This issue occurs when all of the following conditions are met: --
The BIG-IP systems are configured as part of a Device Group. -- You delete a configuration object of one type and then create a different type of object that uses the same name. -- The new object's configuration is synchronized to the other systems of the Device Group.

Impact:
An invalid configuration on the box that is synced to, and no obvious warning signs.

Workaround:
Use either of the following methods: -- Synchronize the configuration after you delete the original object and before you create the new object. -- Use a different name for the new configuration object.

Fixed Versions:
21.0.0.1


2264133-3 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.0.0.2


2262265-3 : Backup UCS enhancements

Component: TMOS

Symptoms:
Backup UCS is not working as expected

Impact:
Can lead to unexpected behaviour

Workaround:
NA

Fix:
Backup UCS is now working as expected.

Fixed Versions:
21.0.0.2


2262249-1 : iControl REST hardening

Component: TMOS

Symptoms:
iControl REST not following best practices

Impact:
Can lead to unexpected behaviour

Fix:
iControl REST now following best practices

Fixed Versions:
21.0.0.2


2259173-3 : Sanitize key in memcache library

Component: Local Traffic Manager

Symptoms:
Users may be able to store invalid keys in Memcached using client request

Conditions:
Invalid key value pair is passed in client request

Impact:
Fetching values for that key may fail and my provide unexpected values

Workaround:
-NA-

Fix:
Memcached should not allow invalid keys to be set

Fixed Versions:
21.0.0.2


2259165-3 : Input Validation on APM Logon Page

Component: Access Policy Manager

Symptoms:
The logon page in the per-session policy currently lacks user input validation for invalid characters.

Conditions:
The logon page is configured within the APM per session policy

Impact:
The logon page does not validate user input and directly stores the provided value as a session variable.

Workaround:
None

Fix:
The logon page has been updated to include the following input validations:

-- Fields of type TEXT now restrict the use of specific characters: single-quote (ASCII value 0x27), double-quote (ASCII value 0x22), pipe (ASCII value 0x7C), greater-than (ASCII value 0x3E), and less-than (ASCII value 0x3C).

-- For TEXT fields with the parameter name "username," the input is limited to a maximum length of 256 characters.

Fixed Versions:
21.0.0.2


2259157-3 : Parsing failure may interpret data as a Memcached command

Component: TMOS

Symptoms:
Some data-body commands (add, set, replace, incr, decr) failed to close connections properly on error, causing request data to be misinterpreted as commands.

Conditions:
There is a parsing failure in commands that require data in the request body.

Impact:
Connection remains open even in the event of command failures, which can result in data being accepted as a command.

Workaround:
N/A

Fixed Versions:
21.0.0.2


2259109-3 : External users can run the track command

Component: Local Traffic Manager

Symptoms:
The memcached proxy track command has been removed from the codebase to maintain optimal performance.

Conditions:
When users use the track command to monitor session events.

Impact:
End user can run the track command.

Workaround:
N/A

Fixed Versions:
21.0.0.2


2258981-3 : Remove Unnecessary internal User account from Non-Supported BIG-IP Platforms

Component: TMOS

Symptoms:
Occurs when an unnecessary internal user account is present on BIG-IP platforms that do not support LCD hardware.

Conditions:
NA

Impact:
No Functional Impact

Workaround:
NA

Fix:
This fix ensures the removal of unnecessary internal user account from BIG-IP platforms that do not support LCD hardware

Fixed Versions:
21.0.0.2


2258929-1 : Deleting/Adding virtual server on the LTM device object can change other disabled virtual server status on the LTM device object.

Links to More Info: BT2258929

Component: Global Traffic Manager (DNS)

Symptoms:
After adding/deleting unrelated virtual server on the LTM device object, disabled virtual server on the same LTM device object change its status from "available/disabled" (black circle icon on GUI) to "offline/disabled" (black rhombus icon on GUI). "no reply from big3d: timed out" error is thrown, despite there is no problem in iquery communication between DNS system and LTM system.

bigipdns.local alert gtmd[21078]: 011ae0f2:1: Monitor instance /Common/bigip 10.1.1.192:80 UP --> DOWN from /Common/bigipdns (no reply from big3d: timed out)
bigipdns.local alert gtmd[21078]: 011a6006:1: SNMP_TRAP: virtual server vs2 (ip:port=10.1.1.192:80) (Server /Common/bigipltm) state change green --> red ( Monitor /Common/bigip : no reply from big3d: timed out: disabled directly)

Conditions:
All of the following conditions need to be met.

-- DNS system manages remote LTM device and its virtual servers.
-- DNS system retrieves LTM virtual server monitor status from big3d running on remote LTM device via iquery.
-- There are disabled virtual servers on LTM device object.
-- "Monitor Disabled Object" parameter under "DNS >> Settings : GSLB : General" is unchecked (default).
-- Changes to virtual server (i.e., adding / deleting) on LTM device object is performed on DNS system.

Impact:
Disabled virtual server status change from "available/disabled" (black circle icon on GUI) to "offline/disabled" (black rhombus icon on GUI).

Once this problem occurs on disabled virtual servers, even after re-enabling those affected virtual servers on LTM device, the affected virtual servers stayed at "offline/enabled" (red rhombus icon on GUI) status.

Workaround:
To rescue already affected virtual servers, on the DNS system, temporarily assign any monitor object to the affected virtual servers and revert it back to none.

# tmsh modify gtm server bigipltm virtual-servers modify { vs1 { monitor gateway_icmp } vs2 { monitor gateway_icmp } }
# tmsh modify gtm server bigipltm virtual-servers modify { vs1 { monitor none } vs2 { monitor none } }
# tmsh save /sys config gtm-only

Or alternatively, restarting gtmd on DNS system can also rescue affected virtual servers.

# tmsh restart sys service gtmd

To prevent issues from recurring in the future, you can change "gtm global-settings general monitor-disabled-objects" parameter to "yes".

# tmsh modify /gtm global-settings general monitor-disabled-objects yes
# tmsh save /sys config gtm-only

Fixed Versions:
21.0.0.2


2258705-1 : A policy with overlapping range in different rules may never match

Links to More Info: BT2258705

Component: Local Traffic Manager

Symptoms:
An LTM policy with multiple rules may fail to match correctly if a rule matches an IP address range from the first rule but not the associated URL. Even if the same IP address fits the criteria for the second rule, it will not match the second rule.

Conditions:
An LTM policy rule with a 'tcp match address' statement that matches against an address range in the first rule will prevent any further rule to be check for if the IP address match

For example, if rule 1 contains
values { 10.16.0.0/12 } and URL foo.com
while rule 2 contains
values { 10.31.236.18 10.255.255.1 } with URL example.com
Then if the source IP address is 10.31.236.18 with example.com, it will be rejected ecause 10.31.236.18 would match the range 10.16.0.0/12 in rule 1 but not foo.com

Impact:
The policy rule fails to match even when it meets the specified criteria.

Workaround:
Avoid overlapping IP range in different rules

Fix:
This issue is fixed.

Fixed Versions:
21.0.0.2


2258257-3 : Zombie connections after switching dos profile may cause tmm crash.

Links to More Info: BT2258257

Component: Anomaly Detection Services

Symptoms:
Tmm can crash in rare cases

Conditions:
When switching a dos profile (with bados enabled), while connections are still active for aa long time after the switch, tmm crash might occur.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
21.0.0.2


2257689-3 : Improvement in system account

Component: TMOS

Symptoms:
System account was not working as expected.

Conditions:
Use the system account.

Impact:
Can lead to unexpected behaviour.

Fix:
The system account is now working as expected.

Fixed Versions:
21.0.0.2


2257673-3 : RSA SecurID improvements

Component: Access Policy Manager

Symptoms:
The RSA SecurID agent is not working as expected

Conditions:
An access policy uses the RSA SecurID agent.

Impact:
Can lead to unexpected behaviour

Fix:
The RSA SecurID agent now working as expected

Fixed Versions:
21.0.0.2


2257669-1 : APM my.policy improvement

Component: Access Policy Manager

Symptoms:
my.policy is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
my.policy is now working as expected

Fixed Versions:
21.0.0.2


2257421-1 : TMSH enhancements

Component: TMOS

Symptoms:
TMSH not working as expected

Conditions:
NA

Impact:
Unexpected behavior.

Workaround:
N/A

Fix:
TMSH is now working as expected

Fixed Versions:
21.0.0.2


2252481-3 : Undisclosed network traffic can cause a TMM crash

Component: Service Provider

Symptoms:
Undisclosed network traffic can cause a TMM crash.

Conditions:
NA

Impact:
TMM crashing and restarting.

Fix:
TMM now working as expected

Fixed Versions:
21.0.0.2


2251813-3 : BIG-IP AFM: mcpd may crash when modifying address lists with cyclic nested references

Links to More Info: BT2251813

Component: Advanced Firewall Manager

Symptoms:
Modifying an address list (such as adding or deleting an entry) can cause mcpd to crash with a segmentation fault (SIGSEGV).

Conditions:
Address lists are configured with nested references.

Impact:
Mcpd process crashes. Traffic disrupted while mcpd restarts.

Workaround:
Review and correct address list configurations to ensure no cycles exist

Fixed Versions:
21.0.0.2


2251649-4 : `sig_cve` and `staged_sig_cves` Fields Appear as N/A in Data Sent to Remote Syslog

Component: Application Security Manager

Symptoms:
While transmitting data to the remote syslog in BIG-IP, the sig_cve and staged_sig_cves fields may be displayed as "N/A"

Conditions:
The issue was introduced by the changes made in fix 911661. Therefore, it may surface only if a hotfix or version is installed that includes 911661 without the resolution for this problem

Impact:
The remote event log might incorrectly display "N/A" for the sig_cve and staged_sig_cves fields.

Workaround:
None

Fix:
sig_cve and staged_sig_cves fields are properly included in the remote logs.

Fixed Versions:
21.0.0.2


2244413-1 : Client Certificates are cached even when Retain Certificate is disabled on a Clientssl profile

Links to More Info: BT2244413

Component: Local Traffic Manager

Symptoms:
Client certificates are cached which can drive up memory usage.

Conditions:
TLS 1.2 sessions that are resumed with session tickets where the client also presents a certificate to the BIG-IP.

Impact:
Memory usage may increase due to caching certificates

Workaround:
None

Fixed Versions:
21.0.0.2


2241493-3 : User facing login issues with newly created password-based Azure VMs

Component: TMOS

Symptoms:
User is facing login issues with newly created password-based Azure VMs

Conditions:
Applicable to all Azure VM types

Impact:
User facing login issues with newly created password-based Azure VMs

Workaround:
User can create ssh-based Azure VMs

Fix:
Fixed the issues in the bundled WALinuxAgent.

Fixed Versions:
21.0.0.2


2230841-4 : Admd Crash During Restart Under Heavy Load

Component: Anomaly Detection Services

Symptoms:
Admd crash during the restart process.

Conditions:
Under heavy system load, if the admd anomaly process hangs, the system triggers an admd restart. However, the shutdown sequence does not release objects in the correct order, potentially causing a crash. Introducing a proper shutdown sequence resolves this issue.

Impact:
Core is created, though there is no functionality problem, as the admd was on its way to restart itself

Workaround:
None

Fix:
BADOS restarts performing a silent shutdown.

Fixed Versions:
21.0.0.2


2230749-1 : Platform Agent Core Detected; Process Shutdown

Component: F5OS Messaging Agent

Symptoms:
The platform agent encounters a crash during the shutdown process.

Conditions:
-- Platform agent shutdown

Impact:
Platform agent crashes. No functionality impact.

Workaround:
None.

Fix:
The issue has been resolved to ensure the shutdown process completes gracefully without any crashes.

Fixed Versions:
21.0.0.2


2230277-2 : Help Content Missing on Live Update Page in Certain Scenarios

Component: Application Security Manager

Symptoms:
When clicking the Live Update tab from another screen under Software Management (for example, the Update Check screen), the content in the Help tab is not displayed.
Instead, the following message appears:

"No help is available for this topic."

Conditions:
-- In the GUI, go to System ›› Software Management: Live Update.
-- Open the Help tab.

Result: Help content is available.

-- Click Update Check while the Help view remains open.
-- Click back on Live Update.
-- Open the Help tab again.

Result: The following message is displayed:
"No help is available for this topic."

Impact:
The user cannot see the help content.

Workaround:
Navigate to the Live Update page from another screen that is not under the Software Management tab.
For example:

Security ›› Application Security: Security Policies: Policies List

Fix:
The Live Update help content is displayed correctly.

Fixed Versions:
21.0.0.2


2230009-4 : Access Policy memory is not cleared between access policy executions

Links to More Info: BT2230009

Component: Access Policy Manager

Symptoms:
APD has a Tcl interpreter that can process commands provided inside an Access policy, for variable assignment or other purposes.

The Tcl environment provided does not reliably clear Tcl variables assigned in prior executions, so care must be taken to initialize the potentially dirty variables if they are used.

Conditions:
User uses some Tcl variables that can potentially be not initialized. For example, a variable assign:
session.test = regexp {(.+)@example.com} "[mcget {session.logon.last.username}]" foo captured; return $captured

Note that here, the regex may match or not match depending on the user input. If it does not match, the variable "captured" *may* contain the results from a different user who logged in previously.

Impact:
Unexpected results from Access Policy execution.

Workaround:
To work around the problem, any variable that was used must be checked. For example, instead of the regex statement above, this could be used:

if { [regexp {(.+)example.com} "[mcget {session.logon.last.username}]" foo captured] == 1 } { return $captured; } else { return "nomatch"; }

This way, if the regex does NOT match, then the result will be "nomatch" instead of potentially containing results from a previous session.

Fix:
APMD variable assign agent regex expression execution isolated from other sessions using namespace

Fixed Versions:
21.0.0.2


2229881-3 : Multi-slot tenant may become inoperative after tenant upgrade followed by tmsh reboot slot all

Links to More Info: BT2229881

Component: Local Traffic Manager

Symptoms:
After upgrading the tenant, if the command tmsh reboot slot all is executed on a multi-slot tenant, the tenant may fail to come back to an operational state and remain stuck in an inoperative state.

Load sys configuration process fails with the error: Could not find master-key object

slot2/tenant1 err tmsh[10271]: 01420006:3: Loading configuration process failed.
slot2/tenant1 emerg load_config_files[10255]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070

All slots will have an Availability of "offline" as reported in tmsh show sys cluster:
root@tenant1:/S2-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster

-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.144.192.210/22
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 02/26/26 15:23:52

  ---------------------------------------------------------------------------------------------------------
  | Sys::Cluster Members
  | ID Address Alt-Address Availability State Licensed HA Clusterd Reason
  ---------------------------------------------------------------------------------------------------------
  | 1 :: :: offline enabled false offline running Run, HA TABLE offline
  | 2 :: :: offline enabled true offline running Run, HA TABLE offline
  | 3 :: :: offline enabled false offline running Run, HA TABLE offline


Mcpd state will be base-config-load-failed
[root@tenant1:/S2-red-P::INOPERATIVE:Standalone] config # tmsh show sys mcp-state

-------------------------------------------------------
Sys::mcpd State:
-------------------------------------------------------
Running Phase platform
Last Configuration Load Status base-config-load-failed
End Platform ID Received true
Cluster Quorum Reached true

Conditions:
1. A tenant upgrade is performed on a multi-slot F5OS tenant.

2. All slots of the tenant are rebooted using tmsh reboot slot all or clsh reboot.

Impact:
All slots remain offline and are inoperable from a traffic processing standpoint. Additionally, loading the system configuration fails

Workaround:
To bring the system back to a working state:
reboot the current primary slot to change the primary slot, and then restart mcpd on the new primary slot using command: bigstart restart mcpd

tmsh show sys cluster will report the "Primary Slot ID"

# tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.144.192.210/22
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 02/26/26 15:23:52

Fixed Versions:
21.0.0.2


2229857-3 : Full load from text files fails with "01020036:3: The requested device (/Common/<device-name>) was not found" if deprecatedApiAllowed is false

Links to More Info: BT2229857

Component: Local Traffic Manager

Symptoms:
- After a reboot, upgrade, or otherwise forcing MCPD to load its configuration from the text config files (refer to K13030: Forcing the mcpd process to reload the BIG-IP configuration), MCPD remains inoperative and fails to load the configuration.

- The configuration fails to load with the following error:
  01020036:3: The requested device (/Common/<device-name>) was not found.

Conditions:
- deprecatedApiAllowed is set to false in /config/api_settings/availability.conf. The default is "true".

Impact:
The system remains inoperative and the configuration will not load.

Workaround:
Do not set deprecatedApiAllowed to false.

If the configuration currently will not load, log into the system as root and do the following:

1. Edit /config/api_settings/availability.conf and set "deprecatedApiAllowed" to "true". This can be done by running:

sed -i -e 's,deprecatedApiAllowed":false,deprecatedApiAllowed":true,' /config/api_settings/availability.conf

2. Load the configuration:

tmsh load sys config

Fixed Versions:
21.0.0.2


2229613-1 : F5OS Tenant Inoperative Due to Incorrect Permissions on /etc/nsswitch.conf File

Links to More Info: BT2229613

Component: TMOS

Symptoms:
Platform_agent cannot connect to api-svc-gateway, resulting in the tenant being inoperative.

Repeated entries are found at /var/log/ltm log file:

Feb 23 16:14:53 localhost.localdomain warning platform_agent[5887]: 01e10005:4: Unable to subscribe for stats.

Conditions:
A manually modified UCS archive that is loaded on the BIG-IP tenant has incorrect permissions/ownership of the ./etc/nsswitch.conf file.

Once UCS is loaded, the system file: /etc/nsswitch.conf does not contain the proper permissions/ownership, e.g.

[root@hostname:INOPERATIVE:] config # ls -lZ /etc/nsswitch.conf
-rw-------. tester abc system_u:object_r:etc_t:s0 /etc/nsswitch.conf

Impact:
The tenant is inoperative.

Workaround:
After loading the UCS, run the commands that update file ownership and permissions and restart platform_agent:

chown root:root /etc/nsswitch.conf
chmod 644 /etc/nsswitch.conf
bigstart restart platform_agent

Fix:
Update /etc/nsswitch.conf file permissions to 644 and ownership to root:root.

Fixed Versions:
21.0.0.2


2229569-4 : Evict FSD Received While SPVADWL Is Uninitialized

Links to More Info: BT2229569

Component: Advanced Firewall Manager

Symptoms:
The issue occurs when spvadwl, a hash data structure, is uninitialized, and an EVICT FSD request is received from the SEP driver.

Conditions:
The system expects the spvadwl hash to be initialized before handling an EVICT FSD request. If this assumption is incorrect, operations dependent on the hash fail due to its uninitialized state.

Impact:
tmm cores

Workaround:
N/A

Fix:
A NULL check has been added to the `spvadwl_search` function to confirm the spvadwl hash is properly initialized before processing. If the hash is uninitialized, the system will ignore the 'EVICT FSD' request, ensuring proper operation and preventing errors.

Fixed Versions:
21.0.0.2


2229021-1 : iControl REST issue

Component: TMOS

Symptoms:
Under undisclosed conditions iControl REST is not following best practices.

Conditions:
Undisclosed conditions

Impact:
Unexpected impact

Fix:
iControl REST now working as expected.

Fixed Versions:
21.0.0.2


2228837 : System Integrity Status: Unavailable on BIG-IP versions with the fix for ID2141205

Links to More Info: BT2228837

Component: TMOS

Symptoms:
The 'tmsh run sys integrity status-check' or 'tpm-status' commands incorrectly report system integrity status as 'Unavailable' although the system software has not been modified.

Detailed output of the "tpm-status -v 3" command includes the following messages:

Cert policy: 1.3.6.1.4.1.3375.0.1.1.1
Required policy:1.3.6.1.4.1.3375.0.1.1.1
Key certificate OID: 1.3.6.1.4.1.3375.0.1.1.1
Popping a key cert into keys
Key cert verification: 0
Invalid key cert detected, removing from verification chain
Verifying SIRR database contents...

System Integrity Status: Unavailable



In addition:

Some Engineering Hotfixes containing a fix for ID2141205 do not successfully resolve the symptoms of ID2141205.

Conditions:
This may occur on affected versions on or after April 4, 2026, when running on the following F5 hardware platforms which include TPM (Trusted Platform Module) hardware:
-- iSeries appliances
-- VIPRION B44xx blades (B4450, B4460)

This may occur when running the follow BIG-IP versions which include the fix for ID 2141205 (https://cdn.f5.com/product/bugtracker/ID2141205.html):
-- Pre-release versions of BIG-IP; specifically, sustaining branches for BIG-IP v21.0.x, v17.5.x and v17.1.x.
-- Engineering Hotfixes which include the fix for ID 2141205. To date, such Engineering Hotfixes have been provided for the following BIG-IP versions:
   -- v17.5.1.3, v17.5.1.4
   -- v17.1.0.1, v17.1.2.2, v17.1.3

Impact:
You are unable to determine the integrity of the system boot components validated by the Trusted Platform Module (TPM). The system integrity status shows Unavailable, when the actual status may be either Valid or Invalid.

Workaround:
None.

Fix:
Trusted Platform Module (TPM) status shows the correct system integrity status for BIG-IP versions which include the fix for ID2141205. ID2141205 is also resolved in BIG-IP releases and Engineering Hotfixes.

Fixed Versions:
21.0.0.2, 17.5.1.5


2227725-1 : iApp Template Improvements

Component: iApp Technology

Symptoms:
iApp template were not processing as expected

Conditions:
NA

Impact:
May lead to unexpected behaviour

Workaround:
N/A

Fix:
iApp is now processing templates as expected

Fixed Versions:
21.0.0.2


2227441-1 : TMSH hardening

Component: TMOS

Symptoms:
TMSH not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
TMSH is now working as expected

Fixed Versions:
21.0.0.2


2225201-3 : iControl REST hardening

Component: TMOS

Symptoms:
iControl REST not working as expected

Conditions:
NA

Impact:
Unexpected behaviour

Fix:
iControl REST now working as expected

Fixed Versions:
21.0.0.2


2225017-1 : Config Sync not working in an HA setup

Component: TMOS

Symptoms:
Config Sync not working in an HA setup

Conditions:
User has an HA setup.

Impact:
Config Sync not working

Fix:
Resolved the connection issue required for the config sync to work.

Fixed Versions:
21.0.0.2


2224937-1 : HA Devices staying out of sync

Component: TMOS

Symptoms:
On first attempt after creation of device group, devices are not getting into the "In Sync" state.

Conditions:
Reproducible on the instances with HA setup

Impact:
Devices stay out of sync for a longer duration blocks config sync and failover

Workaround:
Multiple attempts and after few minutes, devices get into the sync

Fix:
Added relevant TCP headers and updated the package handling.

Fixed Versions:
21.0.0.2


2224681-1 : iControl REST improvement

Component: TMOS

Symptoms:
iControl REST is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
iControl REST is working as expected

Fixed Versions:
21.0.0.2


2224673-1 : iControl REST improvement

Component: TMOS

Symptoms:
iControl REST is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
iControl REST is working as expected

Fixed Versions:
21.0.0.2


2222185-4 : Even if it's possible to configure multiple stanzas under the auth-info section of a security ssh profile, the SSH proxy will always choose the first one that has a private key

Links to More Info: BT2222185

Component: Advanced Firewall Manager

Symptoms:
In a security ssh profile, it's possible to configure multiple stanzas under the 'auth-info' section.

For example, using this configuration:

security ssh profile f5-test-ssh-proxy {
    ...
    auth-info {
        ed25519 {
            proxy-server-auth {
                private-key ...
                public-key ...
            }
            proxy-client-auth {
                private-key ...
                public-key ...
            }
            real-server-auth {
                public-key ...
            }
        }
        rsa {
            proxy-server-auth {
                private-key ...
                public-key ...
            }
            proxy-client-auth {
                private-key ...
                public-key ...
            }
            real-server-auth {
                public-key ...
            }
        }
    }
    description none
    lang-env-tolerance common
    timeout 0
}

Conditions:
- AFM module licensed and provisioned.

- security ssh profile configured with multiple stanzas under the auth-info section.

Impact:
On the client-side session establishment (external client to AFM), the SSH proxy will always choose the first section that has an entry with a proxy-server-auth private-key.

Workaround:
Configure only one stanza under the auth-info section of a security ssh profile.

Fix:
Updated SSH proxy host-key selection logic in security SSH profiles to process all configured auth-info stanzas, loads valid proxy-server keys for supported algorithms (RSA, DSA, ECDSA, ED25519), and enforce one key per algorithm type while skipping invalid or duplicate entries.

Fixed Versions:
21.0.0.2


2221781-1 : The DOS process utilizes CPU resources during configuration updates that are unrelated to its operation.

Links to More Info: BT2221781

Component: Application Security Manager

Symptoms:
The dosl7d process consumes high CPU resources during config updates that are unrelated to its operation.

Conditions:
- ASM provisioned
- Configuration update
- Verify CPU consumption of dosl7d

Impact:
The dosl7d process unnecessarily consumes CPU resources.

Workaround:
None.

Fix:
Fixed dosl7d to avoid internal locking during unrelated config updates.

Fixed Versions:
21.0.0.2


2221689-3 : TMSH hardening

Component: TMOS

Symptoms:
TMSH is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
TMSH now working as expected.

Fixed Versions:
21.0.0.2


2221517-1 : BIG-IP SCP hardening

Component: TMOS

Symptoms:
SCP does not follow current best practices.

Impact:
Can lead to undesirable behaviour

Fix:
SCP is now following best practices.

Fixed Versions:
21.0.0.2


2221493-1 : SCP Improvement

Component: TMOS

Symptoms:
SCP is not following best practices

Conditions:
NA

Impact:
Could lead to unexpected behaviour

Fix:
SCP now following best practices.

Fixed Versions:
21.0.0.2


2221445-1 : Improving scripts of Failover

Component: TMOS

Symptoms:
Failover scripts not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
Failover scripts working as expected

Fixed Versions:
21.0.0.2


2221413-1 : SCP Improvement

Component: TMOS

Symptoms:
SCP is not following best practices

Conditions:
NA

Impact:
Could lead to unexpected behaviour

Workaround:
NA

Fix:
SCP now following best practices.

Fixed Versions:
21.0.0.2


2221177-3 : Big3d cannot validate certificates after they are renewed

Links to More Info: K000159906, BT2221177

Component: Global Traffic Manager (DNS)

Symptoms:
After renewing your big3d certificates, LTM virtual servers become unavailable in GTM, and the bigip_add command starts failing.

Logs in /varl/og/ltm

"big3d SSL cert EXPIRED at IP <IP_ADDRESS>"
"SSL error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed"
"SSL error:14094413:SSL routines:ssl3_read_bytes:sslv3 alert unsupported certificate"

Conditions:
-- BIG-IP DNS (GTM)
-- A Public CA is used to sign the certificates used by big3d

Impact:
Big3d fails to verify the new certificate.

Note: This can also occur if you use a public CA to sign the device certificate used for high availability.

Workaround:
Follow the worksteps described in K000159906: BIG-IP GTM/DNS iQuery Connection Failure Due to Missing Extended Key Usage (EKU) Extensions in Device Certificates, available at https://my.f5.com/manage/s/article/K000159906

Fix:
Both `gtmd` and `big3d` traditionally use the device certificate for mutual TLS connections. This works if the certificate supports both client and server authentication or lacks extended key usage.

If the device certificate is limited to server authentication, configure a client certificate using DB variables `gtm.ssl.crt` and `gtm.ssl.key`. Once set, `gtmd` immediately uses the new certificates, and the `gtm_add` script exchanges them for TLS connections.

Updating the DB variables while in a sync group breaks existing TLS connections. Restore trust using `bigip_add`, `big3d_install`, or manually installing the client certificate as trusted on remote devices.

Fixed Versions:
21.0.0.2


2221169-3 : iControl REST Hardening

Component: TMOS

Symptoms:
iControl REST not working as expected

Conditions:
NA

Impact:
Leads to undesirable behaviour

Fix:
iControl REST now working as expected

Fixed Versions:
21.0.0.2


2221161-3 : TMSH hardening

Component: TMOS

Symptoms:
TMSH not working as expected

Conditions:
NA

Impact:
Leads to undesirable behaviour

Fix:
TMSH now working as expected.

Fixed Versions:
21.0.0.2


2221001-3 : TMM might restart with certain network traffic

Component: Local Traffic Manager

Symptoms:
TMM is not handling specific traffic as expected.

Conditions:
When configured with Multipath TCP configuration.

Impact:
Traffic disrupted while TMM restarts.

Fix:
TMM is now handling traffic as expected.

Fixed Versions:
21.0.0.2


2220389-1 : Enabling tm.ipv4dagfrag results in tmm not ready for world on a cluster with more than 4 blades

Links to More Info: BT2220389

Component: TMOS

Symptoms:
If tm.ipv4dagfrag is enabled on a multi slot system, tmm on all blades may not fully start up.

Conditions:
-- F5OS tenant or chassis with more than 4 blades.
- -tm.ipv4dagfrag enabled

Impact:
-- tmsh show sys cluster will show "TMM not ready"
-- The affected blades will not pass traffic

Workaround:
Disable tm.ipv4dagfrag

Fixed Versions:
21.0.0.2


2220369-1 : BIG-IP GUI/API Improvements

Component: TMOS

Symptoms:
BIG-IP management plane (GUI/API) is not following best practices.

Conditions:
When LDAP authentication is configured.

Impact:
Unexpected behaviour on BIG-IP.

Workaround:
NA

Fix:
BIG-IP management plane (GUI/API) is now following best practices.

Fixed Versions:
21.0.0.2


2219929-2 : Tmm running in Hyper-V environments might not receive multicast traffic

Links to More Info: BT2219929

Component: Local Traffic Manager

Symptoms:
Multicast is being sent towards the BIG-IP, but a capture on the BIG-IP does not show multicast packets arriving.

Conditions:
BIG-IP running on Hyper-V using the dpdk driver:

The interface is using the xnet driver:
# tmctl -d blade tmm/device_probed
pci_bdf pseudo_name type available_drivers driver_in_use
------------ ----------- --------- ----------------- -------------
0000:00:e1.0 1.1 F5DEV_PCI xnet, sock, xnet

And the xnet driver is using the dpdk driver:
# tmctl -d blade tmm/xnet/device_probed
id available_drivers driver_selected driver_in_use
------ ----------------- --------------- -------------
{UUID} sock, dpdk, dpdk Yes

Impact:
Tmm does not see multicast packets. If the BIG-IP us using IPv6, this will cause IPv6 neighbor discovery to fail for addresses on the BIG-IP.

It can also impact other multicast based traffic.

Workaround:
Switch to the sock driver: https://my.f5.com/manage/s/article/K000153024

Fixed Versions:
21.0.0.2


2219801-2 : Visual Policy Editor AD group search is limited to current page

Links to More Info: BT2219801

Component: Access Policy Manager

Symptoms:
The Search in AD Groups in the Visual Policy Editor is limited to the current page instead of a global search

Conditions:
1. Access Policy -> Edit
2. AD Groups Resource Assign -> Add new entry -> edit
3. Have multiple pages of AD groups

Impact:
Won't be able to search among AD Groups spanning multiple pages

Workaround:
None

Fixed Versions:
21.0.0.2


2219745-1 : iControl REST hardening

Component: TMOS

Symptoms:
iControl REST is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
iControl REST is working as expected

Fixed Versions:
21.0.0.2


2219381-1 : TMSH improvement

Component: Local Traffic Manager

Symptoms:
TMSH is not working as expected

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Workaround:
None

Fix:
TMSH is working as expected

Fixed Versions:
21.0.0.2


2219173-1 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.0.0.2


2219081-1 : Live Update configuration sync failure in HA setup

Links to More Info: BT2219081

Component: Application Security Manager

Symptoms:
The Live Update log records a YamlReader error for full_sync_asm-live-update, causing the Live Update configuration sync to fail.

Conditions:
The Live Update log shows a YamlReader error for the full_sync_asm-live-update file.

Impact:
Some servers in the HA setup may have incorrect Live Update configurations.

Workaround:
N/A

Fix:
Live Update sync process uses simplified YAML file

Fixed Versions:
21.0.0.2


2219053-1 : CVE-2025-13878: Malformed BRID/HHIT records can cause named to terminate unexpectedly

Component: Global Traffic Manager (DNS)

Symptoms:
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.

Conditions:
Triggered by specially crafted or malicious DNS queries.

Impact:
Potential denial of service (DoS) for DNS services.

Workaround:
None

Fix:
Upgraded BIND to a patched version that resolves CVE-2025-13878.

Fixed Versions:
21.0.0.2


2218261-1 : iControl REST Improvements

Component: TMOS

Symptoms:
iControl REST was not following best practices.

Conditions:
NA

Impact:
Could lead to unexpected behaviour.

Workaround:
NA

Fix:
iControl REST is now following best practices.

Fixed Versions:
21.0.0.2


2217713-1 : TMSH improvements

Component: TMOS

Symptoms:
TMSH not following best practices

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
TMSH is now following best practices.

Fixed Versions:
21.0.0.2


2217485-1 : TMSH Improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior.

Fix:
TMSH is now following best practices.

Fixed Versions:
21.0.0.2


2217445-1 : GTM Virtual Server can be deleted while referenced by GTM Pools

Component: Global Traffic Manager (DNS)

Symptoms:
A GTM virtual server object can be deleted even if it is referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.

Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.

Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.

Workaround:
None.

Fix:
A validation check has been added to prevent deletion of a GTM virtual server that is referenced by GTM pools, and a warning is now displayed to the user. This behavior is controlled by the DB variable gtm.gtmserverdeletevalidation, which is disabled by default and must be enabled to enforce the deletion restriction.

Fixed Versions:
21.0.0.2


2216645-1 : UCS Backup Improvements

Component: TMOS

Symptoms:
UCS Backup is not following best practices.

Conditions:
When BIG-IP is under Appliance mode.

Impact:
Could lead to unexpected behaviour.

Workaround:
NA

Fix:
UCS Backup is now working as expected.

Fixed Versions:
21.0.0.2


2213605-1 : "Live Update" ASU File Listed as Not Installed After Successful Scheduled Installation

Links to More Info: BT2213605

Component: Application Security Manager

Symptoms:
The "Live Update" ASU file appears with a "Pending" status in the GUI, even though it was successfully downloaded and installed.

Conditions:
Installations run in "Scheduled" mode

Impact:
The system provides incorrect reporting on the installation status of the latest "Live Update" ASU file.

Workaround:
Click on "Install" button for latest "Pending" ASU file

Fixed Versions:
21.0.0.2


2208913 : iControl SOAP hardening

Component: TMOS

Symptoms:
iControl SOAP not following best practices

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
iControl SOAP now following best practices

Fixed Versions:
21.0.0.2


2208709-1 : Failure to match specific WAF signatures

Links to More Info: BT2208709

Component: Application Security Manager

Symptoms:
A signature is not matched as expected.

Conditions:
Specific configuration and traffic.

Impact:
A false negative on a specific scenario.

Workaround:
None.

Fixed Versions:
21.0.0.2


2202281-1 : Primary Admin DB Change to Non-Existing User Results in Admin User Lockout

Component: TMOS

Symptoms:
When the `systemauth.primaryadminuser` value is changed to a non-existing user, the primary admin value is updated to the non-existing user, resulting in an admin user lockout scenario.

Conditions:
When a user does not existing in the system and primary admin value is changed to non existing user value.

Impact:
-- The admin user becomes disabled, logged out of TMUI and TMSH, and is unable to log back in.
-- If the root account login is also disabled, both the root and admin users are logged out of the system.

Workaround:
None

Fix:
When the primary admin DB is udated below operations takes place; in case of failure to update sys db these will get rollbacked.

-> Writes localusers file
-> Writes URP file
-> Clears PAM cache
-> Writes f5_public file

Fixed Versions:
21.0.0.2


2202097-1 : Apply limitations on certain object creation

Component: TMOS

Symptoms:
Creation with certain objects could cause unexpected behavior.

Conditions:
NA

Impact:
Could result in unexpected behavior.

Fix:
The objects now have limitations to avoid the unexpected behavior.

Fixed Versions:
21.0.0.2


2201965-1 : TMSH improvement

Component: TMOS

Symptoms:
TMSH is not working as expected.

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
TMSH is working as expected.

Fixed Versions:
21.0.0.2


2201877-3 : SCTP multihoming fails with ICMP unreachable for alternate paths.

Links to More Info: BT2201877

Component: TMOS

Symptoms:
SCTP multihoming fails with ICMP protocol unreachable for alternate paths.

Conditions:
- SCTP profile with multihoming and alternate addresses configured.
- Alternate address is a self-ip configured on a system.

Impact:
Unable to establish alternate path connection.

Workaround:
None

Fixed Versions:
21.0.0.2


2201813-1 : BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection

Links to More Info: BT2201813

Component: Local Traffic Manager

Symptoms:
BIG-IP negotiates a number of concurrent streams over HTTP/2 connection per RFC requirement. It immediately enforces this limitation once the protocol is agreed and first SETTINGS frame is issued.

Conditions:
-- BIG-IP virtual server with a http2 profile.
-- A client connects to the virtual server and negotiates or starts HTTP/2 connection.

Impact:
The client may send more requests than the limit set by BIG-IP over the established HTTP/2 connection and it causes the BIG-IP system to reset the extra streams. If Reset Stream Protection is enabled, it may result in the connection being shutdown by the BIG-IP system.

Workaround:
None.

Fix:
BIG-IP no longer sends RST_STREAM frames when the number of streams exceeded the configured limit until SETTINGS/ACK is received to designate the honoring of the the limit by BIG-IP peer.

Behavior Change:
On initial period until SETTINGS/ACK frame is arrived from the peer, TMM follows HTTP/2 RFC and assumes "unlimited" number of concurrent streams rather than enforcing the configured limit right away. If SETTINGS/ACK is not received, the timeout of 1 (one) seconds is used to start the stream concurrency enforcement. Until the enforcement starts, TMM queues stream-specific frames and "softly" enforces the limit to the configured one, allowing 128 frames and 128K of frame body (frame->length) at most.

Fixed Versions:
21.0.0.2


2201789-4 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.0.0.2


2201769-1 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.0.0.2


2201745-1 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.0.0.2


2201725-1 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.0.0.2


2201697-1 : TMSH improvements

Component: TMOS

Symptoms:
TMSH is not following best practices

Conditions:
NA

Impact:
Unexpected behavior

Workaround:
None

Fix:
Implemented best practices in TMSH

Fixed Versions:
21.0.0.2


2201693-3 : Empty Detected Value Length for Parameters with Empty Values

Component: Application Security Manager

Symptoms:
When a request contains a parameter with a zero-length value, the system fails to recognize it as having zero length and instead displays the parameter as having an empty value.

Conditions:
Using GUI with "Illegal parameter value length" violation

Impact:
GUI displays parameter length with an empty value when the parameter has zero length

Workaround:
Modify checking the parameter length also for zero length

Fix:
Modified the condition logic to use <= instead of < when comparing parameter lengths, ensuring zero-length values are correctly set

Fixed Versions:
21.0.0.2


2201377-1 : iControl REST improvements

Component: TMOS

Symptoms:
iControl REST is not following best practices

Conditions:
NA

Impact:
It can lead to unexpected system behaviour

Fix:
iControl REST is now following best practices

Fixed Versions:
21.0.0.2


2200561-1 : Repeated MCPD service crashes

Component: TMOS

Symptoms:
Repeated restart of the MCPD service in HA setup, or when a modified object is getting deleted in the same transaction.

Conditions:
In the same transaction when a modified object is getting deleted then it leads to restart of mcpd service due to SW issue.

Impact:
Restart of MCPD service which implies that the data path is disrupted due to TMM restart triggered as a result of MCPD crash.

Workaround:
There is no workaround other than to patch the software with a new release version.

Fix:
Avoid modification to the deleted object in the same transaction.

Fixed Versions:
21.0.0.2


2200437-1 : SNMP Improvement

Component: TMOS

Symptoms:
SNMP is not following best practices

Conditions:
NA

Impact:
Could lead to unexpected behaviour

Workaround:
NA

Fix:
SNMP now following best practices

Fixed Versions:
21.0.0.2


2200421-1 : SNMP Improvement

Component: TMOS

Symptoms:
SNMP is not following best practices

Conditions:
NA

Impact:
Could lead to unexpected behaviour

Workaround:
NA

Fix:
SNMP now following best practices

Fixed Versions:
21.0.0.2


2200209-2 : Support NVMe-based disk (newer generation instance families)

Component: TMOS

Symptoms:
The newer generation of instance families were not being supported for BIG IP Images

Conditions:
All prior versions of BIG-IP that did not have the NVMe Support flag set

Impact:
Enabling the NVMe support flag enhances disk I/O performance and ensures compatibility with modern Alibaba Cloud instance types, which utilize NVMe devices for disk exposure. This adjustment modifies the way block devices are identified and accessed at the operating system level.

Workaround:
Save the image as a custom image and set the NVMe support flag to yes

Fix:
Newer images are being published with the relevant flag turned on

Fixed Versions:
21.0.0.2


2200009-1 : PEM HA failover may cause traffic drops for new connections

Links to More Info: BT2200009

Component: Policy Enforcement Manager

Symptoms:
All traffic belonging to some connections established to the new Active unit immediately after a failover between PEM units could be dropped.

Conditions:
- PEM units in HA pair.

- New connections established to the new Active unit immediately after a failover.

Impact:
All traffic belonging to new connections established immediately after a failover could be dropped.

Workaround:
None

Fixed Versions:
21.0.0.2


2199485-3 : Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value

Links to More Info: BT2199485

Component: Application Security Manager

Symptoms:
Import fails with error: Field 'parameter/user_input_format' may not contain the value 'openapi-array'.

Conditions:
URL level parameter configured with Parameter value type: User-input value and Data type: URI

Impact:
Import of security policy in XML format fails.

Workaround:
Manually change user_input_format from openapi-array to uri in the xml file before importing.

Fixed Versions:
21.0.0.2


2198757-3 : PEM: use-after-free of mw_msg in session_del_msg_entries hash

Links to More Info: BT2198757

Component: Policy Enforcement Manager

Symptoms:
There is a rare scenario where tmm crashes while passing PEM traffic.

Conditions:
-- PEM is licensed and enabled.
-- Policies are assigned from the PCRF. Subscriber additions and deletions are happening regularly.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.

Fix:
The delayed response or timeout of the request is now handled gracefully.

Fixed Versions:
21.0.0.2


2198661-1 : Resource administrator not working as expected

Links to More Info: BT2198661

Component: TMOS

Symptoms:
The resource administrator user role is not working as expected

Conditions:
NA

Impact:
Unexpected behaviour

Workaround:
None

Fix:
Resource administrator user is now working as expected.

Fixed Versions:
21.0.0.2


2197377-1 : TMM crashes under specific traffic.

Component: Global Traffic Manager (DNS)

Symptoms:
The TMM crashes when handling a specific traffic.

Conditions:
A virtual with a DNS resolver or validating cache is configured.

Impact:
Traffic is interrupted as TMM restarts.

Fix:
TMM is now handling traffic as expected.

Fixed Versions:
21.0.0.1


2197173-1 : Insufficient sanitization in SNMP configuration

Component: TMOS

Symptoms:
SNMP configuration is not sanitizing input properly.

Conditions:
NA

Impact:
It can lead to unexpected behaviour.

Workaround:
Restrict SNMP access to localhost.

Fix:
SNMP configuration is now properly sanitizing the inputs.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2196761-1 : TMM core found while doing DAG and SP DAG related tests

Component: TMOS

Symptoms:
TMM crashes and restarts.

Conditions:
In an F5OS multi-slot tenant environment, during boot-up after a tmsh reboot slot all or upgrading to a new volume, a switch of the primary slot can occur between the slots due to slot readiness states. If tmm sends a shared_random_data message before receiving the updated primary slot ID from mcpd, it might use the previous primary slot ID, resulting in a data mismatch and causing tmm to crash and restart.

Note: This issue occurs very rarely as it depends on a race condition.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None.

Fix:
The issue has been fixed by skipping the setting of shared random data when this race condition occurs. The operation will be retried after TMM receives the primary slot change notification.

Fixed Versions:
21.0.0.2


2190373-1 : Platform_agent core found while tmstats updation.

Links to More Info: BT2190373

Component: F5OS Messaging Agent

Symptoms:
Platform agent crashes and restarts.

Conditions:
-- VELOS platforms with BX510 blades
-- Platform agent startup

Impact:
Platform agent crashes and successfully restarts. No functionality impact.

Workaround:
None.

Fix:
Issue fixed so that stats updation happens correctly without crashing, variable properly managed.

Fixed Versions:
21.0.0.2, 17.5.1.3


2187529-3 : CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound

Component: TMOS

Symptoms:
A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.

Conditions:
A client application using a vulnerable libpq version connects to a malicious or compromised PostgreSQL server that sends crafted responses triggering integer wraparound during memory allocation.

Impact:
It can cause out-of-bounds memory writes, leading to a client application crash or segmentation fault (denial of service).

Workaround:
Upgrade to a patched libpq/PostgreSQL client version and avoid connecting to untrusted or compromised PostgreSQL servers.

Fix:
Upgrade to a patched libpq/PostgreSQL client version and avoid connections to untrusted or compromised PostgreSQL servers.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2187385-3 : Brute force set to CAPTCHA also raises a violation and blocks traffic

Links to More Info: BT2187385

Component: Application Security Manager

Symptoms:
Brute force is raised, but the config is set to CAPTCHA. Brute force contributes to the violation rating, and traffic is blocked by the violation rating, instead of triggering a CAPTCHA.

Conditions:
Brute force and violation Rating threat detected are both enabled.

Impact:
CAPTCHA does not occur as expected.

Workaround:
None

Fixed Versions:
21.0.0.2


2187365 : BIG-IP v21.0.0 VE or F5OS tenant remains INOPERATIVE after cold boot

Links to More Info: BT2187365

Component: TMOS

Symptoms:
BIG-IP VE or F5OS tenant fails to reach an operational state after cold boot. For example, after stopping and starting the VM, or power cycling the rSeries appliance.

A message similar to the following is observed in /var/log/ltm:

err mcpd[983]: 01070596:3: An unexpected failure has occurred, Can't load structure (global_sync_status.sync_status) status:52 transaction: 2, status: 52 - EdbStructData.cpp, line 39, exiting...

Conditions:
- BIG-IP VE or F5OS tenant running TMOS v21.0.0
- Cold boot of the BIG-IP VE or F5OS tenant
- First startup of the BIG-IP VE or F5OS tenant ("cold boot")

Impact:
- MCPD starts but never becomes ready; the system remains INOPERATIVE
- ecmd CPU utilization is elevated
- Configuration management and control-plane services are unavailable due to MCPD not becoming ready
- High CPU utilization by ecmd can impact overall system stability and resource availability

Workaround:
From bash, delete the /var/db/mcpdb.bin and /var/db/mcpd.info files and reboot the BIG-IP VE or F5OS tenant:

rm -fv /var/db/mcpdb.bin /var/db/mcpdb.info
reboot

MCPD will perform a full configuration load on the next startup and the system will return to operation.

Note: In some cases the workaround may need to be applied more than once before a successful startup and configuration load will occur.

Fixed Versions:
21.0.0.1


2187185-1 : BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests

Links to More Info: BT2187185

Component: Device Management

Symptoms:
On BIG-IP v21.0, REST-based file download requests may fail with errors such as “attempt to read past end of file” when the client includes a Content-Range header in an HTTP GET request. This occurs when the specified byte range exceeds the actual size of the requested file.

The failure is triggered by the BIG-IP REST framework incorrectly attempting to process the Content-Range header for GET requests, resulting in an invalid file offset calculation and an EOF read condition. As a result, the REST request is terminated and the file download does not complete.

Conditions:
HTTP GET request includes a Content-Range header

The byte range specified in Content-Range exceeds the actual size of the requested file

Impact:
REST-based file downloads fail unexpectedly

Workaround:
Determine the actual size of the target file and ensure that any Content-Range header sent by the client specifies a byte range that does not exceed the file length.

Alternatively, remove the Content-Range header entirely from HTTP GET requests, as it is not required and may cause request failures.

Fixed Versions:
21.0.0.2


2186897-3 : TMM core SIGSEVG upon replacing L7 DOS policy

Links to More Info: BT2186897

Component: Anomaly Detection Services

Symptoms:
On rare cases of expired connection, tmm can crash.

Conditions:
BADOS L7 configured
Replacing DOS policy under traffic

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
TMM does not crash upon replacing L7 DOS policy.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2186697-5 : BIG-IP REST Improvements

Component: Device Management

Symptoms:
BIG-IP REST is not following best practices

Conditions:
NA

Impact:
BIG-IP GUI can behave unexpectedly.

Workaround:
None

Fix:
BIG-IP REST is following best practices and GUI is working as expected.

Fixed Versions:
21.0.0.2


2186153-6 : CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile

Component: TMOS

Symptoms:
A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.

Conditions:
The application uses the Python tarfile module to process an attacker-supplied malicious tar archive containing negative offsets.

Impact:
It can cause an infinite loop leading to application hang or denial of service.

Workaround:
Update to a patched Python version and avoid processing untrusted tar archives, or validate archives before extraction

Fix:
Upgrade to a Python version that includes the tarfile module fix for this issue.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2186009-2 : Increased TX IQ size for netvsc

Links to More Info: BT2186009

Component: TMOS

Symptoms:
In some environments, during periods of high traffic, messages could build up in the TX internal queue due to xnet-DPDK being slow to inform that messages were sent. If this goes for long enough, the internal queue will fill up and become stuck.

Conditions:
1) Using xnet-DPDK driver
2) Azure or Hyper-V
3) Sustained high (multi-GB/s) traffic rate

Impact:
Internal queue gets stuck preventing BIG-IP from being able to send messages and causing traffic disruption.

Workaround:
Create '/config/tmm_init.tcl' and add the following line
  ndal tx_iq_sz 1024 f5f5:f550

Afterwards, restart tmm with 'bigstart restart tmm' to apply change.

Fix:
Increased default size of TX IQ when netvsc driver is being used

Fixed Versions:
21.0.0.2


2185485-1 : The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs

Links to More Info: BT2185485

Component: TMOS

Symptoms:
After a software upgrade to one of the affected versions, the value of /proc/sys/vm/min_free_kbytes might too big on Hyper-V and Azure VEs with multiple cores and multiple NICs.

This can prevent the Virtual Edition from booting into the new software volume installed with one of the affected versions.

Conditions:
BIG-IP VE running on Hyper-V hypervisor or on Azure with:
- more than 4 cores and more than 4 NICs configured
- 16GB of RAM or less allocated

Attempt to upgrade to one of the affected versions.

Impact:
After an upgrade to one of the affected versions, the BIG-IP VE boot process hangs, or the VE takes hours to boot into the new volume and is so slow to result unusable.

Workaround:
There are two possible workarounds:


(1)
Before booting into the new volume, shutdown the VE and increase the total allocated RAM to 32GB.


(2)
- Install the new software volume.

- Take note of the current value <KBYTES> of /proc/sys/vm/min_free_kbyte :

# cat /proc/sys/vm/min_free_kbyte

- Before rebooting into the new software volume, mount the "vg--db--vda-set.<N>.root" disk volume on a temporary directory, where <N> is the number of the new volume after the dot.
E.G.: if the new volume is "HD1.2", then <N> is 2.

# mkdir /mnt/temp
# mount /dev/mapper/vg--db--vda-set.<N>.root /mnt/temp/

- Edit the /etc/rc.sysinit.f5 file:

# vi /mnt/temp/etc/rc.sysinit.f5

- Replace this line:

        echo $VADC_MIN_FREE_KB > /proc/sys/vm/min_free_kbytes

with this line (use the <KBYTES> value noted before):

        echo <KBYTES> > /proc/sys/vm/min_free_kbytes

- Unmount the disk volume:

# umount /mnt/temp/

- Reboot into the new software volume

Fixed Versions:
21.0.0.2


2184897-2 : Tenant disk size modification is ineffective for var/log folder

Links to More Info: BT2184897

Component: TMOS

Symptoms:
Due to insufficient free disk space on the VM, the /var/log resize operation could not be applied on reboot.

Conditions:
When available disk space on the VM is insufficient for the requested directory resizing.

Impact:
You will not know if resizing will succeed/fail ahead of time.

Workaround:
Manually calculate and allocate disk space within the range of available disk space.

Fix:
Improved validation has been added for directory resize operations. If the available disk space is less than the requested size, the command now fails immediately with a clear error message, allowing users to identify resize issues at the time of requesting.

Fixed Versions:
21.0.0.1, 17.5.1.3, 17.1.3.1


2183705-1 : Improper access control on SMTP

Links to More Info: K000156643, BT2183705

Component: Application Visibility and Reporting

Symptoms:
Security best practices are not being followed for SMTP in BIGIP.

Conditions:
NA

Impact:
Unexpected behaviour

Fix:
Security best practices are being followed.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2183353-4 : TMM Intel E810 VF driver updates the link state with 1 second delay

Links to More Info: BT2183353

Component: Local Traffic Manager

Symptoms:
TMM gets the old link state from the driver level. It leads to 1 second delay for the link state change.
The problem may also create link flapping messages in /var/log/ltm for the same interface in some conditions:
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP

Conditions:
- The interface link state is changed.
- Multiple VFs of the same physical interface are attached to BIG-IP VE.

Impact:
Link state is updated with a delay.

Workaround:
None

Fix:
TMM correctly get the link state from the driver layer.

Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1


2182357-3 : Inconsistent Default Source Address Selection for Virtual Server Between POST and PUT Requests

Component: TMOS

Symptoms:
When a PUT request is made without specifying a source address, the system defaults to an IPv6 address (::). If the destination address is IPv4, this causes a validation error due to the mismatch between the source and destination address types.

Conditions:
A PUT request issued without a source address, having the destination address IPv4
The system attempts to apply a default IPv6 source address

Impact:
The request fails with an address type mismatch error, requiring users to specify a compatible source address. This inconsistency between POST and PUT operations may cause confusion for users.

Workaround:
Explicitly specify a source address that matches the type (IPv4 or IPv6) of the destination address in the request payload.

Fix:
The behavior of PUT requests has been updated to match that of POST requests. If a source address is not specified, the system now selects an appropriate default (IPv4 or IPv6) based on the destination address, ensuring consistency and avoiding address type mismatch errors.

Fixed Versions:
21.0.0.2


2182045-3 : The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers

Links to More Info: BT2182045

Component: Local Traffic Manager

Symptoms:
Some IPv6 packets that contain a destination option header and/or a routing type 2 header are processed by the BIG-IP.

A tcpdump on the BIG-IP does not show the packets.

The tmm/xnet_rx_stats:cd_empty stat is incremented
The tmm/xnet/iavf/per_q_stats:rx_sw_drop might be incremented.

Conditions:
A platform that utilizes the iavf driver:
  R2800
  R4800
  VE with SR-IOV with an Intel 810 NIC

IPv6 traffic is sent to the BIG-IP that contains a destination option or routing type 2 header.

Impact:
Packets are dropped and not processed.

Workaround:
None

Fixed Versions:
21.0.0.2, 17.1.3.1


2179729-1 : MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity.

Links to More Info: BT2179729

Component: TMOS

Symptoms:
The eXtremeDB configuration database grows continuously over time in long‑duration testing, even when objects are deleted.

Conditions:
-- Long duration run with create, modify, delete configuration objects.
-- High Availability (HA) enabled

Impact:
MCPD memory becomes very large on lab HA devices.

Workaround:
None

Fixed Versions:
21.0.0.1


2173429-2 : Digest and NTLM Authorizations Not Functioning

Component: Application Security Manager

Symptoms:
-- Bruteforce violations are not raised for NTLM or Digest authorization types.

Conditions:
-- Bruteforce with NTLM or Digest authorization enabled

Impact:
-- Bruteforce enforcement is not happening for Digest and NTLM Authorization types

Workaround:
None

Fix:
Digest and NTLM authorizations work as expected

Fixed Versions:
21.0.0.2


2171845-3 : Manual Sync in Sync-Failover device group may result in differences in attached Logging Profiles on virtual server

Links to More Info: BT2171845

Component: TMOS

Symptoms:
Devices show "In Sync" but have different logging profiles attached to the same Virtual Server.

Conditions:
- Manual with Incremental sync or Manual with Full sync in sync and overwrite scenario

Impact:
Discrepancy in attached logging profiles on the Virtual Server across HA devices.

Workaround:
Manually align logging profiles

Fixed Versions:
21.0.0.2


2163777-3 : Tmm core on fw_nat_classify() while nat rule configuration is being changed

Links to More Info: BT2163777

Component: Advanced Firewall Manager

Symptoms:
TMM may crash with a segmentation fault in fw_nat_classify() during NAT rule configuration changes, causing service disruption.

Conditions:
Occurs during NAT rule delete configuration modification

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
21.0.0.2


2163585-1 : Migration fails "Spanning Tree Protocol (STP) is not supported on this platform"

Links to More Info: BT2163585

Component: TMOS

Symptoms:
Migration fails due to "Spanning Tree Protocol (STP) is not supported on this platform".
STP is a configuration for physical interfaces; F5OS tenants use interfaces/vlans defined in the F5OS underlying operating system.

Conditions:
migration to F5OS tenant from bare-metal BIG-IP with STP configured (e.g. from iSeries bare-metal to F5OS tenant).

Impact:
migration fails with:
010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
Unexpected Error: Loading configuration process failed.

/var/log/ltm shows:
Dec 2 13:55:11 localhost.localdomain err mcpd[7147]: 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
...
Dec 2 13:55:14 localhost. localdomain err mcpd[7147]: 01070686:3: Spanning Tree Protocol (STP) is not supported on this platform.
Dec 2 13:55:14 localhost.localdomain err tmsh[20673]: 01420006:3: Loading configuration process failed.
Dec 2 13:55:14 localhost.localdomain emerg load_config_files[20656]: "/usr/bin/tmsh -n -g -a load sys config partitions all platform-migrate" - failed. -- Loading schema version: <BIG-IP-version>

Workaround:
Modify the "net stp-globals" object to not contain "mode" stp/mstp/rstp

Fix:
STP configuration is removed during the migration to F5OS tenant.

Fixed Versions:
21.0.0.1


2162937 : TMM crash when AFM is enabled

Links to More Info: BT2162937

Component: Advanced Firewall Manager

Symptoms:
The BIG-IP system experiences repeated TMM crashes when handling DNS DoS traffic.

Conditions:
This issue occurs on BIG-IP AFM version 21.0.0 with DNS DoS

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fix:
Handled malformed packets.

Fixed Versions:
21.0.0.1


2162905-2 : AFM GUI does not display Port List members in Properties panel

Links to More Info: BT2162905

Component: Advanced Firewall Manager

Symptoms:
AFM GUI fails to display port-list members in the Properties pane

Conditions:
Occurs when viewing any Port List object in the AFM Policy Editor GUI

Impact:
Administrators cannot visually verify port-list contents in the GUI

Workaround:
Tmsh list security firewall port-list <port_list_name>

Fixed Versions:
21.0.0.1, 17.5.1.4


2162849-2 : Removing the active controller does not trigger an immediate tenant failover

Links to More Info: BT2162849

Component: TMOS

Symptoms:
When a system controller is removed from a VELOS chassis, any Active BIG-IP tenants running from that controller do not automatically fail over.

Conditions:
-- BIG-IP Tenant is active for a traffic group
-- The BIG-IP tenant is running on a controller that is active for the partition on which the tenant is running
-- The Active system controller is removed or powered off using AOM

Impact:
Tenant failover is delayed by up to 4 minutes when an active system controller of the active tenant is pulled out .

Workaround:
None

Fixed Versions:
21.0.0.1, 17.5.1.4


2162705-2 : Tmm restarting on multi-NUMA AWS instances with ENA interfaces

Links to More Info: BT2162705

Component: Local Traffic Manager

Symptoms:
Tmm is in the restart loop because dpdk driver is failing to attach with the error message in tmm log:

notice dpdk: [0000:00:06.0]: Multiple NUMA nodes usage is unsupported.

Conditions:
- BIG-IP VE large instance deployed on AWS cloud.
- NUMA node count more than 1 (check "lscpu | grep NUMA").

Impact:
Unable to use dpdk driver on some large AWS instances.

Workaround:
Switch to sock driver: https://my.f5.com/manage/s/article/K10142141

Fix:
DPDK correctly initializes the memory on multi-NUMA AWS instances.

Fixed Versions:
21.0.0.1, 17.5.1.4


2162589-1 : BD crash with a specific configuration

Component: Application Security Manager

Symptoms:
BD daemon crash and restart

Conditions:
Navigation parameter is configured

Impact:
traffic disturbance, failover.

Workaround:
Remove navigation parameter from the configuration.

Fix:
BD working properly.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2162189-3 : "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually

Links to More Info: BT2162189

Component: Application Security Manager

Symptoms:
When operating in automatic mode, Live Update installs the genesis Automatic Signature Update (ASU) file instead of the manually installed latest ASU file.

Conditions:
Live Update is operating in automatic mode, there are only 2 installations in ASU files installations list, one is genesis file and another is latest ASU file that was published on ESDM.

Impact:
BIG-IP will not install the latest signatures.

Workaround:
Live Update should be switched to manual mode. The latest ASU file should be installed manually again instead of the genesis ASU file. When the newer ASU file is available on ESDM, do not install it manually, but switch Live Update to automatic mode again.

Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1


2161077-2 : Bot profile properties page does not load when there are large number of SSL certs (> 1000)

Links to More Info: BT2161077

Component: TMOS

Symptoms:
When a large number of SSL certs are present, the Bot Defense profile properties page (Security > Bot Defense > Bot Profile Properties) does not load correctly

Conditions:
- ASM is provisioned
- SSL cert count > 1000

Impact:
Bot Defense profile properties page does not load

Workaround:
Use tmsh to manage the Bot profiles.

Fix:
Increase restjavad memory to 1.3GB after applying the fix and restart restjavad

> tmsh modify sys db provision.restjavad.extramb value 1280
> bigstart restart restjavad

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2161073-1 : Certificate Bundle Improvement

Component: TMOS

Symptoms:
Certificate Bundle is not following best practices

Conditions:
NA

Impact:
Can lead to unexpected behaviour.

Workaround:
No workaround.

Fix:
Certificate bundle is now following best practices

Fixed Versions:
21.0.0.2


2153893-4 : With DNS64 configured, resolution aborts early on the first error response without trying other name servers.

Links to More Info: BT2153893

Component: Global Traffic Manager (DNS)

Symptoms:
When multiple name servers for a zone are known, as soon as one name server responds with an error rcode, resolution is aborted and other name server are not tried.

Conditions:
-- DNS64 is configured.
-- More than one name server is configured for a zone.
-- One name server responds with an error rcode.

Impact:
DNS resolution will intermittently fail. DNS resolution will succeed only if the cache randomly selects a working name server to contact first.

Workaround:
Disable DNS64.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2153489-1 : MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21)

Links to More Info: BT2153489

Component: TMOS

Symptoms:
-- System crashes with a segmentation fault during folder deletion operations.

-- Core dump observed in FolderMgr::validate_deleted_folder_queue.

Conditions:
Concurrent Operations

Thread 1 is performing a folder deletion and iterating over folder_delete_queue in FolderMgr::validate_deleted_folder_queue.

Thread 2 is processing a virtual server query and calls AuthZ::current_context (setter), which invokes FolderMgr::reset_deleted_folder_queue().

Impact:
Traffic and management disrupted while mcpd restarts.

Workaround:
None

Fixed Versions:
21.0.0.1


2152877-3 : Exclude /opt/CrowdStrike directory from Integrity Test

Links to More Info: BT2152877

Component: TMOS

Symptoms:
CrowdStrike directory needs to be excluded from Integrity Test

Conditions:
CrowdStrike directory not present in Integrity Test exception list

Impact:
System integrity fails after Crowdstrike installation via falcon sensor

Workaround:
None

Fix:
CrowdStrike directory added Integrity Test exclusion

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2152785-1 : TMM may crash under certain conditions.

Component: Local Traffic Manager

Symptoms:
TMM crashes when HTTP/2 traffic

Conditions:
When HTTP/2 profile is configured on TMM.

Impact:
Traffic is disrupted

Workaround:
Add http router to the virtual, converting to HTTP/2 Full Proxy mode from HTTP/2 Gateway mode.

Fix:
TMM handling HTTP/2 traffic properly

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2152689-3 : ASM GUI "Failed to load requests" pop-up

Links to More Info: BT2152689

Component: Application Security Manager

Symptoms:
A "Failed to load requests" pop-up appears on the page.

REST framework responds with:
{"code":400,"message":"A valid filename must be supplied"}
This is visible in the log of the web browser's interaction with the BIG-IP UI (.har file).

Conditions:
A user with username that contains a slash i.e. "my\name"
clicking
on Security -> Event Logs -> Application -> Requests
or Security -> Event Logs -> Bot Defense -> Bot Requests

Impact:
Can't view request details

Workaround:
Do not use '/' in the username

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2152601 : Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events

Links to More Info: BT2152601

Component: TMOS

Symptoms:
Continuous restart of MCPD accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events.

Conditions:
This occurs after 10 restarts of MCPD service.

Impact:
BIGIP services are impacted as MCPD is down.

Workaround:
Reboot device.

Fix:
This issue is fixed by cleaning up the resource during every MCPD restart.

Fixed Versions:
21.0.0.1


2152445-3 : "Live Update" API is unresponsive after upgrade and recover only after tomcat restart

Links to More Info: BT2152445

Component: Application Security Manager

Symptoms:
After upgrading BIG-IP, the Live Update GUI displays an empty installation list. Errors are logged in the Tomcat log file. When attempting to refresh the Live Update page, additional errors appear in the Live Update log file.

Conditions:
"Live Update" has very long list of installations of ASU files.

Impact:
After the upgrade, BIG-IP retains the latest signatures that were present before the upgrade. The Live Update feature becomes non-functional until it is restarted.

Workaround:
Before upgrading, shorten ASU file installations by removing old entries. This helps prevent issues. If a problem occurs, restart the Live Update system.

Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1


2152397-1 : BIG-IP support for f5optics packages built after October 2025

Component: TMOS

Symptoms:
-- F5optics v1.0.0 packages released in November 2025 (build 66.0) or later cannot be installed on BIG-IP or BIG-IQ versions released during November 2025 or earlier.
-- If F5optics v1.0.0 packages prior to build 67.0 (January 2026) are included in an Engineering Hotfix, the F5optics v1.0.0 package will not be upgraded successfully.

Conditions:
This may occur under the following conditions:
-- Attempting to install an updated f5optics v1.0.0 package build 66.0 (November 2025) or later, on a BIG-IP or BIG-IQ version released November 2025 or earlier.
-- Installing an Engineering Hotfix containing F5optics v1.0.0 package build 66.0 or earlier.

Impact:
-- You cannot install the latest f5optics v1.0.0 package.
-- You may not be able to update the f5optics v1.0.0 package when included in an Engineering Hotfix.

Workaround:
None

Fix:
F5optics v1.0.0 packages released in November 2025 (build 66.0) or later can now be successfully installed.
F5optics v1.0.0 packages released in January 2026 (build 67.0) or later can now be successfully installed via an Engineering Hotfix.

Behavior Change:
BIG-IP and BIG-IQ releases with this fix will not allow installation of f5optics v1.0.0 packages prior to build 66.0.

Fixed Versions:
21.0.0.2


2152301-2 : After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.

Links to More Info: BT2152301

Component: TMOS

Symptoms:
Guest-role user is unable to run the command show running-config in TMSH.
Executing this command from TMSH results in an error:

"Unexpected Error: Can't display all items, can't get object count from mcpd"

MCPD throws error:

result_message "01070823:3: Read Access Denied: user (myguest) type (HPKE Key)"

Conditions:
Except for all these 4 user roles, all the other user roles (operator, cert manager, app editor...etc) hit the same error.

- admin
- resource-admin
- log-manager
- auditor

Impact:
Unable to show the running config, or use list or list sys commands.

Workaround:
Login with an account with admin access.

Fixed Versions:
21.0.0.2, 17.5.1.4


2152269-8 : Low reputation URIs are found in the URL DB binary

Links to More Info: BT2152269

Component: Access Policy Manager

Symptoms:
Publishing BIG-IQ image to Azure cloud is blocked due to malware scan detecting these low reputed URLs.

Conditions:
When uploading the image on Azure Cloud and these low reputed URLs are detected in malware scanners.

Impact:
No impact on the functionality

Workaround:
None.

Fix:
Low reputation URIs such as che168, cssplay, newliveplayer, tinypic.info referring test code are removed from the product.

Fixed Versions:
21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1


2152137-2 : New DB variable ve.ndal.driver.netvsc to provide driver selection for Azure/HyperV deployments

Component: TMOS

Symptoms:
Starting v17.5.0, data-plane interfaces in BIG-IP VE deployed in HyperV or Azure automatically use the high-speed, user-space "dpdk" as the default driver.

Conditions:
BIG-IP VE deployments on Microsoft Azure or HyperV with multiple interfaces.

Impact:
None

Workaround:
No mitigation needed as this is not a bug.

Fix:
The new DB variable ve.ndal.driver.netvsc is introduced to allow to switch the driver back to sock.

To switch to sock driver:
tmsh modify sys db ve.ndal.driver.netvsc value sock && reboot

To switch back to dpdk driver:
tmsh modify sys db ve.ndal.driver.netvsc value dpdk && reboot

Fixed Versions:
21.0.0.2


2150669-3 : TCP Packet loss after upgrade with AFM provisisoned

Links to More Info: BT2150669

Component: Advanced Firewall Manager

Symptoms:
After an upgrade, disabled hardware DOS vectors may use old values.

Conditions:
-- F5OS tenant
-- Upgrade
-- AFM provisioned

Impact:
DOS thresholds may be incorrectly set or set too low resulting in packet loss that causes poor throughput.

Workaround:
Disable and re-enable the disabled DOS vectors.


Log into the BIG-IP GUI and navigate to
Security ›› DoS Protection : Device Protection

Filter attack vectors: tcp

click the "Network" text

Enable all the disabled vectors by clicking on the vector name and changing state from "disabled" to "mitigate".

Then disable the vectors by clicking on the vector name and changing state from "mitigate" to "disabled".

Fixed Versions:
21.0.0.2


2150525-1 : Improvements in iControl SOAP

Component: TMOS

Symptoms:
Security best practices were not being followed in iControl SOAP.

Conditions:
NA

Impact:
Can lead to unexpected behaviour.

Workaround:
NA

Fix:
iControl SOAP now has security best practices.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2149253-2 : QUIC connection stalls with early data

Links to More Info: BT2149253

Component: Local Traffic Manager

Symptoms:
When QUIC client connect with early data, connection stalled.

Conditions:
Configure virtual server with quic + client-ssl with Data 0-RTT enabled (w/ anti-replay).

QUIC client connects with existing session and early data.

Impact:
Failed QUIC/HTTP3 connections.

Workaround:
Disable client-ssl Data 0-RTT.

Fix:
Release SSL egress data.

Fixed Versions:
21.0.0.1


2149233-3 : TMM crashes when using SSL

Component: Local Traffic Manager

Symptoms:
Under certain SSL condition, TMM crashes.

Conditions:
When SSL is configured

Impact:
Traffic is disrupted.

Fix:
TMM working properly now.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2149197-1 : Rotated Public key used for signature verification of apmclients iso bundle in BIG-IP

Component: Access Policy Manager

Symptoms:
When liveinstall.checksig sys db variable is enabled on the BIG-IP, the automatic installation of apmclients iso image fails.

Conditions:
Starting from apmclients-7262.2025.1203.525-7005.0.iso the automatic installation will fail.

Impact:
Apmclients iso installation fails.

Workaround:
-- Disable ISO Signature Verification
-- Install the desired apmclients iso version
-- Re-enable ISO Signature Verification

Fix:
Apmclients iso installation will be successful.

Fixed Versions:
21.0.0.2


2144521-1 : WAF plugin gets incorrect response body when SSE profile is configured on virtual server

Links to More Info: BT2144521

Component: Local Traffic Manager

Symptoms:
When the SSE plugin is enabled, the WAF plugin receives a partial response body.

Conditions:
SSE Profile (Server Sent Events) and WAF plugin enabled on a Virtual Server.

Impact:
WAF plugin sees only part of the ingress stream.

Workaround:
Disable SSE profile on virtual server when WAF plugin is configured.

Fix:
The HUDFILTER order on server side was adjusted to ensure both WAF plugin and SSE HUDFILTER receive the complete response body.

Fixed Versions:
21.0.0.1


2144513-1 : Cannot install any BIG-IP version with ISO signature verification enabled

Links to More Info: BT2144513

Component: TMOS

Symptoms:
On affected versions of BIG-IP, if the BIG-IP software ISO file signature checking feature is enabled, attempting to install any BIG-IP version will fail.

Attempting to install the BIG-IP image using either tmsh or the GUI will result in the following error messages (as shown by the "tmsh show /sys software status" command, or hovering a mouse over the "Failed" Install Status message in the GUI):

failed (Signature verification failed - no sig file found)

Conditions:
This occurs on affected versions if the BIG-IP software ISO file signature checking feature is enabled, as described in the following article:
K15225: Enabling signature verification for BIG-IP and BIG-IQ ISO image files
https://my.f5.com/manage/s/article/K15225

Impact:
It is not possible to install any BIG-IP version with the BIG-IP software ISO file signature checking feature enabled.

Workaround:
To successfully install the desired BIG-IP version in such cases:
1. Disable ISO Signature Verification
2. Install the desired BIG-IP version
3. Re-enable ISO Signature Verification

Fix:
BIG-IP versions released on or after October 2025 can be successfully installed with the BIG-IP software ISO file signature checking feature enabled.

Fixed Versions:
21.0.0.1


2144497-2 : Mellanox driver timeouts and packet drops on Azure instances with high NIC count

Links to More Info: BT2144497

Component: TMOS

Symptoms:
On Azure instances with high interface count (6 or more) Mellanox linux kernel driver mlx5_core may fail to initialize the interface or attach it very slow. Another symptom of this problem: packets drops because of timeouts in Mellanox device queue processing.
mlx_core will report multiple errors in the kernel logs (run "dmesg | grep mlx5_core" to display it).

Conditions:
- BIG-IP VE instance deployed in Azure with 6 or more interfaces
- Accelerated networking is enabled

Impact:
- Azure instance starting time may be significant
- SSH access may be unavailable
- Packets drops on dataplane Mellanox interfaces

Workaround:
None

Fix:
Device interrupts are assigned on correct vCPUs in Azure/HyperV environments to prevent Mellanox device timeouts.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2144445-1 : Insufficient sanitization in TMSH

Component: TMOS

Symptoms:
TMSH is not sanitizing input properly

Conditions:
NA

Impact:
Can cause unexpected behaviour in TMSH

Fix:
TMSH is now properly sanitizing the input.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2144353-4 : BIND upgrade to stable version 9.18.41

Links to More Info: BT2144353

Component: Global Traffic Manager (DNS)

Symptoms:
BIND upgrade to stable version 9.18.41.

Conditions:
Using local BIND.

Impact:
BIND upgrade to stable version 9.18.41.

Workaround:
None.

Fix:
BIND upgrade to stable version 9.18.41.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2143305-5 : Tmm crash

Links to More Info: BT2143305

Component: Application Security Manager

Symptoms:
TMM may crash when a policy dynamically disables and re-enables L7 DoS through multiple rules.

Conditions:
-- A policy containing multiple rules that disable and then re-enable L7 DoS is attached to a virtual server.
-- An L7 DoS profile is attached to the same virtual server.
-- The policy rule that re-enables L7 DoS does not specify the from-profile attribute.
-- Traffic passes through tmm.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Modify the policy rules that enable L7 DoS to explicitly include the from-profile attribute referencing the attached DoS profile.

Fix:
Handle policy rules that enable L7 DoS without the from-profile attribute in cases where L7 DoS was previously disabled.

Fixed Versions:
21.0.0.1


2143165-3 : Oauth tokens are not shown in UI

Links to More Info: BT2143165

Component: Access Policy Manager

Symptoms:
Oauth tokens are not shown in UI

Conditions:
Access >> Overview >> OAuth Reports >> Tokens

Impact:
Oauth tokens are not visible

Workaround:
Use tmsh to see the Oauth Tokens:
"tmsh list / apm oauth token-details db-instance oauthdb"

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2143101-3 : SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported

Links to More Info: BT2143101

Component: Advanced Firewall Manager

Symptoms:
The statistics counters retrieved via SNMP and tmctl do not reflect any increments for the corresponding blacklist category, despite packets being dropped and logged as expected.

Conditions:
Blacklist categories populated dynamically via feed lists or automatic updates.

Impact:
Inaccurate stats due to missing statistics.

Workaround:
None.

Fix:
When an IP address is dynamically blacklisted by IP Intelligence (IPI), packets from that source are dropped and logged as expected. The statistics counters for the relevant blacklist category viewed via SNMP or tmctl are also incremented.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2141305-2 : SSH Proxy Profile Properties page does not render

Links to More Info: BT2141305

Component: TMOS

Symptoms:
The 'Properties' button of a ssh proxy security profile does not correctly render the profile's page

Conditions:
- AFM provisioned
- Security ›› Protocol Security : Security Profiles : SSH Proxy : SSH
- Right-click on 'Properties' and open in new tab.

Impact:
You are unable to view the SSH Proxy security profile properties.

Workaround:
None

Fix:
SSH Proxy Profile Properties Page Rendering issue is fixed

Fixed Versions:
21.0.0.1


2141245-3 : Undisclosed traffic to TMM can lead to resource exhaustion

Component: Global Traffic Manager (DNS)

Symptoms:
Certain traffic sent to TMM is leading to resource exhaustion.

Conditions:
Undisclosed conditions

Impact:
TMM Resource exhaustion

Fix:
DNS LDNS API correction.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2141233-2 : Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate

Links to More Info: BT2141233

Component: Local Traffic Manager

Symptoms:
SSL handshakes timeout instead of finishing.

Conditions:
1. Clientssl profile configured with Client Authentication enabled with "Request" option
2. BIG-IP is in FIPS-CC mode
3. Client does not provide a certificate

or

1. Clientssl profile configured with Client Authentication enabled with "Ignore" option
2. BIG-IP is in FIPS-CC mode
3. Access Policy applied to the Virtual Server contains an OnDemand Cert Auth agent.
4. Client does not provide a certificate

Impact:
SSL handshakes do not finish but instead timeout.

Workaround:
Workaround 1:
Disable Client authentication.

Workaround 2:
Configure CRL on the Client SSL profile

Workaround 3:
Enable Client Certificate Constrained Delegation (c3d) feature on the SSL profiles(requires Server-SSL profile and this feature forges client cert to server upon cert request from app-server).

Fixed Versions:
21.0.0.1, 17.5.1.4


2141205-1 : Tpm-status returns: "System Integrity: Invalid" on BIG-IP versions released since October 2025

Links to More Info: BT2141205

Component: TMOS

Symptoms:
The 'tmsh run sys integrity status-check -a -v' or 'tpm-status' commands incorrectly report system integrity status as 'Invalid' even when the system software has not been modified.

Detailed output of the "tpm-status -v 3 -q" command includes the following messages:

A SIRR database is invalid.
/shared/lib/sirr/v1.0/SIRR validity: 1
/usr/lib/sirr/SIRR validity: 0

Conditions:
This occurs if all of the following conditions are true:

-- You are using one of the following BIG-IP software versions:
   -- v17.5.1.4 or v17.1.3.1, or later v17.x releases.
   -- Engineering Hotfixes built on or after October 15, 2025, based on BIG-IP software v17.5.1.3, v17.1.3, v16.1.6.1, v15.1.10.8 or later version, which contains an updated 'sirr-tmos' package in the Engineering Hotfix ISO.

-- You have installed one of the above software releases on one of the following TPM-supported BIG-IP platforms:
   -- iSeries appliances
   -- VIPRION B44xx blades (B4450, B4460)

Impact:
The integrity of the system boot components validated by the Trusted Platform Module (TPM) may not be correctly reported. The system integrity status shows Invalid, when the actual status may be Valid.

Workaround:
None.

Fix:
Trusted Platform Module (TPM) status now shows the correct system integrity status for supported releases and platforms.

Fixed Versions:
21.0.0.2


2141125-4 : Multicast traffic is dropped with incorrect VLAN tagging

Links to More Info: BT2141125

Component: Local Traffic Manager

Symptoms:
F5OS hardware platforms utilizing multicast routing and PIM across multiple VLAN interfaces may forward incoming multicast traffic to multiple outgoing VLAN interfaces with incorrect VLAN tagging. This behavior can lead to the successive addition of VLAN headers, resulting in a cascading accumulation of VLAN tags.

Conditions:
F5OS platforms configured with
 - Multicast routing enabled.
 - Configured with multicast protocols - PIM, OSPF etc.
 - 2 or more VLAN interfaces present for outgoing multicast traffic path .i.e. minimum of 3 or more VLAN interfaces configured with multicast routing, so that if one interface has incoming multicast traffic, it goes through atleast 2 or more other VLAN interfaces.

Impact:
Multicast traffic dropped on VLAN interfaces receiving more than 1 VLAN tagging in the packet.

Workaround:
None.

Fixed Versions:
21.0.0.2


2141061-1 : iControl REST API Endpoints enhancements

Component: Local Traffic Manager

Symptoms:
iControl REST API endpoints were not following best practices

Conditions:
NA

Impact:
Can lead to arbitrary behaviour

Fix:
iControl REST API endpoints are now following best practices

Fixed Versions:
21.0.0.2


2140905-3 : System Integrity Test on VE is halting the whole system in FIPS mode

Links to More Info: BT2140905

Component: TMOS

Symptoms:
System Integrity Test on VE halts the whole system in FIPS mode

Conditions:
-- BIG-IP Virtual Edition
-- FIPS Mode enabled
-- Falcon sensor installed

Impact:
System integrity test fails and the system will not boot.

Workaround:
None

Fix:
System Integrity Test on VE will stop tmm in FIPS mode now and user can bigstart tmm start.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2140621-4 : CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling

Links to More Info: K000157317, BT2140621


2140213-3 : Xnet-netvsc driver crash

Links to More Info: BT2140213

Component: TMOS

Symptoms:
TMM crashes due to lack of memory to configure subchannels needed for queues in DPDK which ultimately results in a NULL pointer exception.

The lack of memory occurs when the product of (number of TMMS)*(number of NICs) becomes very large due to memory footprint each TMM needs to operate so many NICs.

In /var/log/tmm:

notice hn_nvs_alloc_subchans(): nvs subch alloc failed: 0x2
notice hn_dev_configure(): subchannel configuration failed
notice Port5 dev_configure = -5

Conditions:
1) xnet-netvsc driver (HyperV or Azure)
2) (number of TMMs)*(number of NICs) is big; confirmed with 8 TMMs and 4 NICs on Azure F8s v2 instance.

Impact:
TMM goes into restart loop and never becomes Active, disrupting traffic.

Workaround:
A) Reduce the number of NICs in the environment
B) Reduce the number of TMMs by running the following and then restarting with 'bigstart restart tmm'
  tmsh modify sys db provision.tmmcount value <tmm_count>

Fix:
Added handling when DPDK subchannel configuration errors occur

Fixed Versions:
21.0.0.2, 17.5.1.4


2139921-3 : Invalid Length PCRE Expression Was Allowed Through REST API

Links to More Info: BT2139921

Component: Application Security Manager

Symptoms:
The regex validation string for parameters is intended to be limited to a maximum length of 254 characters, but this validation was not enforced correctly via the REST API.

Conditions:
A lengthy PRCE expression is set for a parameter using the REST API

Impact:
ASM goes into a restart loop.

Workaround:
None

Fix:
PCRE Expression with invalid length is no longer allowed through REST API

Fixed Versions:
21.0.0.2


2139901-6 : Server-ssl profile "do-not-remove-without-replacement" is recreated

Links to More Info: BT2139901

Component: Application Security Manager

Symptoms:
A required profile for a deprecated service is recreated on restart, but not saved to bigip.conf

Conditions:
The "do-not-remove-without-replacement" profile is deleted and the bewaf daemon is restarted

Impact:
The profile is recreated, but not saved to bigip.conf without another user action.

Workaround:
"tmsh save sys config" can be run to save the active config to bigip.conf

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2138077-3 : SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x

Links to More Info: BT2138077

Component: Access Policy Manager

Symptoms:
SAML authentication fails with errors such as “Invalid signature” or “Signature verification failed”

Conditions:
SAML SP is configured with:

is-authn-request-signed = true

sso-binding = http-redirect

want-detached-signature = true

A RelayState parameter is included in the SAML AuthnRequest.

Occurs on BIG-IP APM versions 17.1.x and above.

Impact:
End users are unable to log in using SSO due to authentication errors

Workaround:
Remove the RelayState parameter from the SAML AuthnRequest configuration, if possible.

This restores successful signature validation.

Example: remove relay-state from the SP AAA SAML object configuration.

Alternatively, use HTTP-POST binding instead of HTTP-Redirect.

There is no configuration-based workaround if RelayState is required and Redirect binding must be used.

Fixed Versions:
21.0.0.1


2137977-3 : Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy

Links to More Info: BT2137977

Component: TMOS

Symptoms:
The hyperlink for the policy on virtual server's resource page navigates to the incorrect location.

Conditions:
Virtual server with an ltm policy attached.

Impact:
The hyperlink navigates to the full policy list, so the specific policy would still need to be found in the full list to navigate to it.

Workaround:
None

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2137805-3 : Jetty vulnerabilities CVE-2023-36478, CVE-2024-6763, CVE-2023-26049, CVE-2024-8184, and CVE-2023-41900

Links to More Info: K000157844


2135621-1 : Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces

Links to More Info: BT2135621

Component: Local Traffic Manager

Symptoms:
TCP retransmits occur on Hyper-V deployments with Cisco VIC networks (SR-IOV disabled).
The problem is related to large segments processing (TSO packets)

Conditions:
- Hyper-V VM with Network adapter on top of Cisco VIC interface
- SR-IOV is not enabled
- Virtual server uses TCP profile

Impact:
Poor TCP performance for virtual servers with TCP profile

Workaround:
- Disable TSO feature:
tmsh modify sys db tm.tcpsegmentationoffload value disable
- Other workaround is to switch to sock driver:
https://my.f5.com/manage/s/article/K000153024

Fixed Versions:
21.0.0.2


2132213-2 : Hyper-V/Azure: Unable to pass traffic with tagged vlans when using the default dpdk driver.

Links to More Info: BT2132213

Component: TMOS

Symptoms:
On a BIG-IP VE deployed in a HyperV or Azure environment, traffic passing fails with tagged VLAN interfaces

Conditions:
-- BIG-IP VE is deployed in Azure or HyperV environment and has DPDK driver in use for the dataplane interfaces.
    -- User can check the driver in use by running "tmctl -d blade tmm/xnet/device_probed" table that should show them "dpdk" in the "driver_selected" column for their dataplane interfaces.
-- User has tagged VLANs configured.

Impact:
BIG-IP is unable to pass any data-plane traffic.

Workaround:
-- Switch to the default "sock" driver by running:
tmsh modify sys db ve.ndal.driver.netvsc value sock

-- For BIG-IP versions where the above dbvar is not available, the user can directly modify the /config/tmm_init.tcl file and set "sock" as the default driver for netvsc devices by adding this command:

>> cat tmm_init.tcl
device driver vendor_dev f5f5:f550 sock

Fix:
Unable to pass traffic with vlan tagging when using the default dpdk driver in HyperV or Azure environments.

Fixed Versions:
21.0.0.2


2131225-1 : Unclear Actions Displayed with L7 Profiles in Rule Creation

Links to More Info: BT2131225

Component: TMOS

Symptoms:
When creating a simple L7 profile and adding rules with specific actions (e.g., "Enable" + select "decompression" at "client accepted"), the actions are displayed unclearly with placeholders such as {{vm.getCapitalizedLabel(vm.action.action)}} instead of the expected action names.

Conditions:
Occurs when creating an L7 profile, adding a rule with custom options (e.g., "Match all of the following conditions: Enable + select decompression at client accepted"), and saving the rule.

Impact:
This issue confuses administrators, as it displays unclear placeholders instead of specific actions, potentially leading to misconfigurations and delayed troubleshooting.

Workaround:
Monitor release notes and timelines for the fixed version. Plan updates as per the release schedule to resolve the issue effectively.

Fix:
The issue is resolved by updating the actionText.controller.js file. The placeholders displaying {{vm.getCapitalizedLabel(vm.action.action)}} were replaced with the actual action labels. The fix is available in the patched version. Follow-up with support for patch application.

Fixed Versions:
21.0.0.1


2130485-4 : Warning: the current license is not valid - Fault code: 51133

Links to More Info: BT2130485

Component: TMOS

Symptoms:
License activation may fail on specific platforms.

root@(localhost)(cfg-sync Standalone)(NO LICENSE)(/Common)(tmos)# install sys license registration-key D1234-12345-12345-12345-1234567
Warning: the current license is not valid
License server has returned an exception.
   Fault code: 51133
   Fault text: Error 51133, F5 registration key is not compatible with the detected platform - This platform, "", cannot be activated with this registration key "I123456-1234567".

Conditions:
- KVM on HP AMD server
- IBM Bare Metal

Impact:
Unable to license BIG-IP.

Workaround:
None

Fix:
License activation is successful.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2125953-5 : Insufficient access control to REST endpoint and TMSH for some CLI versions.

Component: TMOS

Symptoms:
Security best practices are not followed for some CLI versions.

Conditions:
Not specified.

Impact:
Unexpected behaviour

Fix:
Security best practices are being followed.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2106789-1 : BIGIP LTM Monitors Hardening

Component: Global Traffic Manager (DNS)

Symptoms:
BIG-IP LTM External Monitors are not following the best security practices

Conditions:
When external montiors is configured

Impact:
Unexpected behaviour

Fix:
Best security practices are now applied

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2099441-2 : Garbled character in warning message when HA peer is added

Links to More Info: BT2099441

Component: TMOS

Symptoms:
Garbled character in warning message

Conditions:
When adding HA peer

Impact:
Unexpected behavior

Workaround:
None

Fixed Versions:
21.0.0.1


2086097-4 : PEM iRules causing traffic disruption

Component: Policy Enforcement Manager

Symptoms:
In some scenario, there is improper termination of connection and it is leading to TMM core

Conditions:
PEM iRules configured.

Impact:
TMM core. Service disruption.

Fix:
Connection is properly terminating and TMM is not coring.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2083257-3 : 502 error from BIG-IP during large AFM rule deployment

Component: TMOS

Symptoms:
Pushing large AFM rule sets from BIG-IQ to BIG-IP greatly increases response processing time, exceeding the default Apache HTTPD timeout and causing a 502 error on BIG-IQ.

Conditions:
Occurs when,
- AFM is provisioned on the device.
- The device has a large AFM rule set.
- BIG-IQ encounters a 502 error when communicating with BIG-IP.

Impact:
BIG-IQ receives a 502 error from BIG-IP when deploying AFM rules.

Workaround:
1. Apply the required sys db parameters:

modify sys db provision.extramb value 8192
modify sys db icrd.timeout value 600
modify sys db restjavad.timeout value 600
modify sys db restnoded.timeout value 600
modify sys db provision.restjavad.extramb value 4096
modify sys db provision.tomcat.extramb value 1024

2. Update and verify HTTPD timeout:
 grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf
 sed -i 's/^Timeout <timeoutValue>$/Timeout 900/' /etc/httpd/conf/httpd.conf
 Example:      
   # grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf Timeout
     300
   # sed -i 's/^Timeout 300$/Timeout 900/' /etc/httpd/conf/httpd.conf
   # grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf Timeout
     900 

3. Restart HTTPD
bigstart restart httpd

Fix:
Added support for configuring the HTTPD request timeout via tmsh:
tmsh modify sys httpd request-timeout 900

Fixed Versions:
21.0.0.2


2078297-4 : Unexpected PVA traffic spike

Component: TMOS

Symptoms:
In rare circumstances, traffic may spike on the graphs inside the tenant without corresponding graphs on the external interfaces.

Conditions:
F5OS tenant
ePVA traffic

Impact:
Loss of connectivity,
extremely high PVA traffic spike
tcpdump on the appliance ceases to function

Workaround:
Disabling PVA acceleration on affected virtual servers

Fix:
PVA traffic not spiking.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2078277-2 : BD crash with an inappropriate configuration for request_max_chunks_number

Links to More Info: BT2078277

Component: Application Security Manager

Symptoms:
BD crash

Conditions:
BD internal variable request_max_chunks_number has been configured with inappropriate value (above 200,000)

Impact:
ASM traffic disrupted while bd restarts.

Workaround:
Revert request_max_chunks_number to the default value, 1000

Fixed Versions:
21.0.0.2


2077525-4 : Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash

Links to More Info: BT2077525

Component: Advanced Firewall Manager

Symptoms:
Both of the following messages are frequently (several times per second) logged to /var/log/tmm*:
  <13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
  <13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat

Heavy log file writing can result in a possible tmm SIGABRT due to a heartbeat failure.

Conditions:
ip-intelligence is configured, and both the IPv4 and IPv6 intelligence databases are missing. IP intelligence is a optional subscription feature that can be configured in various BIG-IP modules, such as AFM, ASM, and APM, and irules.

Impact:
A frequent log message might slow TMM.

This might result in TMM missing a heartbeat, which will trigger a tmm SIGABRT and resulting core. Traffic disrupted while tmm restarts.

Workaround:
Unconfigure ip-intelligence and remove any configuration that refers to IP reputation, or ensure that the ip-intelligence databases are available.

Fixed Versions:
21.0.0.1


2063265-6 : Improvements in HTTP headers

Component: TMOS

Symptoms:
Certain flags were missing from HTTP headers.

Conditions:
NA

Impact:
Can lead to unexpected behaviour

Fix:
Headers now have proper flags.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2053309-5 : Changes to README - mention of duojs.org URL

Links to More Info: BT2053309

Component: TMOS

Symptoms:
https://my.f5.com/s/article/K000156036

Conditions:
https://my.f5.com/s/article/K000156036

Impact:
https://my.f5.com/s/article/K000156036

Fix:
https://my.f5.com/s/article/K000156036

Fixed Versions:
21.0.0.2, 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8


2047429-4 : PostgreSQL should dump a corefile when not exiting

Links to More Info: BT2047429

Component: TMOS

Symptoms:
When PostgreSQL does not exit gracefully, it does not create a core file.

Conditions:
PostgreSQL crashes.

Impact:
Diagnostic data missing.

Workaround:
None

Fixed Versions:
21.0.0.1


2046941-6 : Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor

Links to More Info: BT2046941

Component: Application Security Manager

Symptoms:
Bot-defense profile detects a Distributed Cloud health monitor as a bot, and might block it (depends on configuration).

Conditions:
-- Bot-defense profile is attached to a virtual server.
-- BIG-IP is configured in front of Distributed Cloud.

Impact:
Distributed Cloud health monitors are blocked, false-positive bots are detected and logs.

Workaround:
None

Fix:
Signature Category 'F5 Health Monitor' description added. New signature of category 'F5 Health Monitor' is included in latest Bot Signatures Live Update. While configuring BIG-IP device to work, user should make sure DNS resolvers are properly configured and reachable via data path

Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1


2038277-3 : Double memory release in the enforcer

Links to More Info: BT2038277

Component: Application Security Manager

Symptoms:
Possible bd cores due to ignore positional parameter configurations

Conditions:
Positional parameters configured with ignore value flag enabled.

Impact:
Error in logs, and possible crash and core. Traffic disrupted while bd restarts.

Workaround:
None

Fix:
No core and no errors.

Fixed Versions:
21.0.0.2


2035641-5 : APMd resource exhaustion

Component: TMOS

Symptoms:
Under certain conditions, APMd is exhausting resources leading to core.

Conditions:
Access sessions create, and sessions are processed

Impact:
APMd core may cause temporary traffic disruption.

Fix:
APMd not coring.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2034753-3 : Domain name validation does not align with the error message on GUI

Links to More Info: BT2034753

Component: Access Policy Manager

Symptoms:
Domain names which include hyphens are not accepted, an error message is shown on GUI.

Conditions:
Domain names with hyphens or forward slashes will cause this issue.

Impact:
BIG-IP administrator will not be able to update DNS Exclude/Include Fields in Network Access settings if they include hyphens/dashes.

Workaround:
None

Fix:
Update the mcp validation regex to allow hyphens and forward slashes.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


2017137-5 : Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd

Links to More Info: BT2017137

Component: Local Traffic Manager

Symptoms:
Unexpected behaviour or even a crash of pkcs11d

Conditions:
Configure the label/password values more than or equal to 32 characters.

Impact:
Configuring the label or password exceeding the allowed length, it could lead to memory corruption, unexpected behavior, or even a crash of the pkcs11d daemon.

Workaround:
Configure the values with 31 or fewer characters.

Fix:
The daemon now gracefully rejects inputs that exceed the length limit, logs an appropriate error, and exits the operation safely.

Fixed Versions:
21.0.0.1, 17.5.1.2, 17.1.3


2016465-2 : Policy auto merge does not work for Base64 Decoding

Links to More Info: BT2016465

Component: Application Security Manager

Symptoms:
If an entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.

Conditions:
An entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.

Impact:
Expected changes may not be made to the merged policy resulting in unexpected Base64 value handling.

Workaround:
The values can be changed manually through GUI or REST.

Fix:
Policy Diff/Merge functions correctly for differing Base64 Decoding values.

Fixed Versions:
21.0.0.2


2008409-4 : MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN

Links to More Info: BT2008409

Component: F5OS Messaging Agent

Symptoms:
Network traffic fails on a VLAN that is shared by multiple tenants.

Conditions:
-- F5OS tenants sharing a VLAN
-- MAC masquerade enabled on both tenants
-- No floating self-ips configured

Impact:
MAC masquerade may not work properly causing traffic failures such as packets not arriving on the tenant. Or excessive DLFs on the network.

Workaround:
Add floating self-ips to all traffic VLANs that are using MAC masquerade.

Fixed Versions:
21.0.0.1


1991297-3 : [APD][SAML-SSO]high memory due to SAML SSO leak

Links to More Info: BT1991297

Component: Access Policy Manager

Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic

Conditions:
SAML SSO configured with saml artifact sign.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None

Fixed Versions:
21.0.0.1


1988993-4 : CVE-2024-42516 Apache HTTP Server vulnerability

Links to More Info: K000153074, BT1988993


1987309-4 : Bigd may get stuck in legacy mode

Links to More Info: BT1987309

Component: Local Traffic Manager

Symptoms:
Https monitors may spuriously mark a pool member as down and it will fail to mark the pool member back up.

The monitor remains in legacy mode, and probes are sent using TLS 1.0.

Conditions:
-- Server supports version TLSv1.2 and above.
-- bigd is configured to monitor the server with SSL.
-- The monitor flips into legacy mode.

Impact:
Bigd is stuck in legacy mode.

Workaround:
Bigd can be brought out of legacy mode by detaching and re-attaching monitor to the pool.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1983349-4 : CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities

Links to More Info: K000152931, BT1983349


1983145-2 : Memory Corruption due to xnet-DPDK

Links to More Info: K000153024, BT1983145

Component: TMOS

Symptoms:
TMM crashes due to data corruption caused by xnet-DPDK. This can occur after upgrading from version 17.5.0 to version 17.5.1.

Conditions:
1) Using xnet-DPDK driver
2) DPDK v20.11 is being used (BIG-IP v17.5.x or higher)

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Two possible workarounds here:
1. Disable TSO globally:
tmsh modify sys db tm.tcpsegmentationoffload value disable
2. Switch to the sock driver:
https://my.f5.com/manage/s/article/K000153024

Fixed Versions:
21.0.0.2


1975297-1 : TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs

Links to More Info: BT1975297

Component: TMOS

Symptoms:
There are "vmbus_open subchannel failed: -12" kernel errors for uio module, uio_hv_generic. These errors prevent the TMM module from finishing initialization.

Conditions:
-- Using VE Azure
-- Using Azure instances with <= 16 vCPUs

Impact:
Azure VM is unable to reach Active state.

Workaround:
Use an Azure instance with more RAM. For example, F8s_v2 has 16 GiB of RAM and has a total limit of 4 interfaces. Instance size, E8ds_v5, has 64 GiB of RAM and can reach Active state with 4 interfaces.

Fix:
N/A

Fixed Versions:
21.0.0.2


1974701-3 : PVA stats may be double incremented when pva mode is dedicated

Links to More Info: BT1974701

Component: TMOS

Symptoms:
Offloaded connections may be double counted for dedicated PVA flows.

Conditions:
PVA mode is set to dedicated in fastl4 profile.

Impact:
Incorrect stats.

Workaround:
None

Fix:
Offloaded dedicated PVA flows are counted once.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1967485-2 : Old Logs in /var/log Not Deleted When Storage Exceeds Threshold

Component: TMOS

Symptoms:
Logs for various modules are stored in the /var/log directory, with older files compressed into tar files over time. When the storage in /var/log exceeds the warning threshold, a cleanup mechanism is triggered to delete tar files and free up space for incoming logs. However, the cleanup process deletes newer tar files first, leaving the oldest tar files untouched.

Conditions:
This issue occurs when BIG-IP accumulates logs to the point where the /var/log directory surpasses the storage threshold.

Impact:
When the storage threshold is exceeded, BIG-IP initiates cleanup of tar files. However, tar files containing the oldest module logs are not deleted.

Workaround:
Use the command below to delete the old tar files available in /var/log/ directory

rm <tarFileName>

Fix:
A fix has been implemented to ensure that when the /var/log directory exceeds its storage threshold, all tar files, including those containing the oldest logs, are deleted during the cleanup process.

Fixed Versions:
21.0.0.2


1966633-3 : Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS

Links to More Info: BT1966633

Component: TMOS

Symptoms:
Management connectivity is lost after licensing BIG-IP 17.5.0 on AWS. The parameter provision.managementeth was changed to non-eth0 interface during deployment with cloud-init. When the issue occurs, the mgmt bridge loses the associated interface ethX.

Conditions:
1. Deploy an instance on AWS.
2. Change provision.managementeth to non-eth0 device and reboot.
3. After boot up, any operation that restart tmm (i.e. licensing BIG-IP) will cause the issue.

Impact:
Management connectivity is lost to BIG-IP instance.

Workaround:
Reboot the device twice after licensing the device. One reboot will not resolve the issue.

Fixed Versions:
21.0.0.1, 17.5.1.4


1966405-1 : Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1

Links to More Info: BT1966405

Component: Global Traffic Manager (DNS)

Symptoms:
All DNS PTR queries are forwarded to the configured forward zone. If any change is made to the local zones, such as adding a new local zone; the system begins responding to PTR queries with NXDOMAIN.

Conditions:
Occurs on BIG-IP DNS version 17.1.2 and above
Triggered when changes are made to local zones

Impact:
Queries respond with NXDOMAIN.

Workaround:
Restart tmm:
bigstart restart tmm

Fixed Versions:
21.0.0.1


1959549-2 : Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0

Links to More Info: BT1959549

Component: TMOS

Symptoms:
When upgrading from versions below 17.5.0 to 17.5.0 or later, the #TMSH-VERSION marker in bigip_base.conf is rewritten to the target system version instead of preserving the source UCS version. This prevents MCPD schema migration code from executing, potentially causing configuration mismatches and missing schema-based workarounds.

Conditions:
- roll-forward upgrade from v14.x/v15.x/v16.x/v17.1.x to v17.5.1 and later releases. upgrade from v17.5.x to v21.x and later versions is not affected.

Impact:
Overwriting TMSH-VERSION in bigip_base.conf file, uses the wrong schema when loading the configuration and miss applying MCP schema based workarounds.

Workaround:
None

Fixed Versions:
21.0.0.2, 17.5.1.4


1959361-2 : When running a tenant with more than 72 VCPUs / cores, adminstall crashes

Links to More Info: BT1959361

Component: Anomaly Detection Services

Symptoms:
When running a tenant with more than 72 VCPUs / cores, adminstall crashes.

Conditions:
When ASM provisioned and running a Tenant with more than 72 VCPUs / cores per blade.

Impact:
DOSL7 (BADOS) is not functioning. Core created.

Workaround:
None

Fix:
Now adminstall donot crash, when ASM provisioned and Tenant with more than 72 VCPUs / cores per blade.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1943269-1 : GTM Server can be deleted while referenced by GTM Pools

Links to More Info: BT1943269

Component: Global Traffic Manager (DNS)

Symptoms:
A GTM server object can be deleted even when it was referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.

Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.

Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.

Workaround:
None.

Fix:
A validation check has been added to prevent deletion of a GTM server that is referenced by GTM pools, and a warning is now displayed to the user. This behavior is controlled by the DB variable gtm.gtmserverdeletevalidation, which is disabled by default and must be enabled to enforce the deletion restriction.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1938101-5 : Performance issue on specific parameters extractions

Links to More Info: BT1938101

Component: Application Security Manager

Symptoms:
Performance degradation on specific pages

Conditions:
When there are dynamic parameters extractions using HTML and also AJAX response page enabled.

Impact:
Slowdown of the extraction page load time

Workaround:
None

Fixed Versions:
21.0.0.2


1934073-5 : PEM policy rule incorrectly matching when using a flow condition

Links to More Info: BT1934073

Component: Policy Enforcement Manager

Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.

Conditions:
PEM policy rule is using flow conditions to match IP address and port

Impact:
An incorrect policy rule might be matched

Workaround:
None

Fix:
The PEM policy rule now correctly matches the source and destination IP addresses and ports when the flow condition is used.

Fixed Versions:
21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1


1933373-4 : Newly added Threat Campaigns are missing REST ID

Links to More Info: BT1933373

Component: Application Security Manager

Symptoms:
Newly created UTF-8 policies have an empty value for the REST ID (rest_uuid) in some or all Policy Threat Campaigns.

Conditions:
- Create a new UTF-8 policy using BIG-IP with no Threat Campaign license.
- License the Threat Campaign functionality.
- Create a second UTF-8 policy with the Threat Campaign enabled.

Impact:
Newly added Threat Campaigns are missing the REST ID.

Workaround:
- After license Threat Campaigns, the cached binary policy templates must be cleared to ensure newly created policies use updated templates reflecting the licensed Threat Campaign functionality.

Remove cached binary policy templates by running:

rm /var/ts/install/policy_templates/*.bin

- Threat Campaigns in new UTF-8 policy should have REST IDs.

Fix:
Fix newly created UTF-8 policies have value for REST ID (rest_uuid) in all Policy Threat Campaigns.

Fixed Versions:
21.0.0.2, 17.1.3.1


1933357-3 : DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior.

Links to More Info: BT1933357

Component: Global Traffic Manager (DNS)

Symptoms:
DNS64 stats (tmstat table profile_dns_stat) in the TMM behave as follows:

dns64reqs - A queries to the server after the AAAA queries fail. Does not include the AAAA queries.
dns64fails - Failed AAAA queries to the server. Does not include the subsequent A queries.

DNS64 stats (tmstat table dns_cache_resolver_stat) in the cache behave as follows:

mesh.dns64reqs - Includes both A and AAAA queries to the server. Includes both successful and failed AAAA queries.
mesh.dns64nodata - Includes both A and AAAA query nodata responses (rcode=0 and no records).
mesh.dns64error - Includes both A and AAAA query error rcode responses.
mesh.dns64timeout - Includes both A and AAAA query timed-out responses.

Conditions:
-- A DNS resolver cache is enabled on a DNS profile.
-- The DNS profile has DNS64 configured.

Impact:
The current cache resolver stats makes it difficult to diagnose backend DNS64 performance.

Workaround:
None

Fix:
Mesh.dns64reqs behaves like the TMM's dns64reqs (counts only DNS64 A queries to the server.) Additionally, a new stat mesh.dns64fails sums all failures (mesh.dns64nodata, mesh.dns64error, mesh.dns64timeout) and, like the TMM, only counts DNS64 AAAA failures to the server.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1927521-2 : DPDK has dependency on SSSE3

Links to More Info: BT1927521

Component: TMOS

Symptoms:
TMM goes into restart loop with following error in /var/log/tmm regarding SSSE3 not being available

notice ERROR: This system does not support "SSSE3".
notice Please check that RTE_MACHINE is set correctly.
notice EAL: FATAL: unsupported cpu type.
notice EAL: unsupported cpu type.
notice dpdk: Error: rte_eal_init() failed, err=-1
notice xnet_lib [pci:0000:02:00.0]: Error: Failed to initialize driver
notice xnet[02:00.0]: Error: Unable to attach to xnet dev
notice xnet(1.1)[02:00.0]: Error: Unable to initialize device
notice xnet(1.1)[02:00.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
notice Initiating TMM shutdown.
notice tap(tap)[00:00.0]: Waiting for tmm1 to reach state 4...
notice ---------------------------------------------

Conditions:
1) xnet-DPDK is being used
2) BIG-IP running in an environment where SSSE3 is not available either because CPU is so old that it does not support SSSE3 or SSSE3 has been disabled in VM's config.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Modify guest VM's config on hypervisor and enable SSSE3 feature in CPU settings. Most CPUs should support SSSE3, but hypervisor may be masking off feature from virtual CPU for guest. For best performance in this and other areas such as crypto it may be best to not mask the real CPU feature set from the virtual CPU.
For Azure/Hyper-V see https://my.f5.com/manage/s/article/K000159028 and note link for processor compatibility mode.

Or:

Switch to 'sock' driver by adding the following line into /config/tmm_init.tcl, replacing <VENDOR_ID:DEVICE_ID> with the corresponding interfaces' Vendor and Device IDs shown via 'lspci -nn'.
For environments in HyperV or Azure, f5f5:f550 should be used for Vendor and Device.

[root@BIGIP:Active:Standalone] log # cat /config/tmm_init.tcl
device driver vendor_dev <VENDOR_ID:DEVICE_ID> sock
[root@BIGIP:Active:Standalone] log #

Fix:
Fallback from DPDK to sock driver if CPU feature 'SSSE3' is not exposed in virtual CPU.

Fixed Versions:
21.0.0.2


1925485 : CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata

Component: TMOS

Symptoms:
An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.

Conditions:
NA

Impact:
It can cause a kernel crash or hang, resulting in a denial of service.

Workaround:
NA

Fix:
Denial of Service issue in the kernel has been resolved.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1925369 : CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service

Component: TMOS

Symptoms:
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.

Conditions:
NA

Impact:
It can trigger a kernel panic, resulting in a denial of service.

Workaround:
NA

Fix:
The Denial of Service issue has been resolved in the kernel.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1925045 : CVE-2024-35849 - Linux Kernel Btrfs Information Leak Vulnerability

Component: TMOS

Symptoms:
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix information leak in btrfs_ioctl_logical_to_ino() Syzbot reported the following information leak for in btrfs_ioctl_logical_to_ino(): BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40 instrument_copy_to_user include/linux/instrumented.h:114 [inline] _copy_to_user+0xbc/0x110 lib/usercopy.c:40 copy_to_user include/linux/uaccess.h:191 [inline] btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: __kmalloc_large_node+0x231/0x370 mm/slub.c:3921 __do_kmalloc_node mm/slub.c:3954 [inline] __kmalloc_node+0xb07/0x1060 mm/slub.c:3973 kmalloc_node include/linux/slab.h:648 [inline] kvmalloc_node+0xc0/0x2d0 mm/util.c:634 kvmalloc include/linux/slab.h:766 [inline] init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779 btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Bytes 40-65535 of 65536 are uninitialized Memory access of size 65536 starts at ffff888045a40000 This happens, because we're copying a 'struct btrfs_data_container' back to user-space. This btrfs_data_container is allocated in 'init_data_container()' via kvmalloc(), which does not zero-fill the memory. Fix this by using kvzalloc() which zeroes out the memory on allocation.

Conditions:
NA

Impact:
It can leak uninitialized kernel memory to user space, potentially exposing sensitive information.

Workaround:
NA

Fix:
The information leak issue has been resolved in the kernel.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1925029 : CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak

Component: TMOS

Symptoms:
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information leak

Conditions:
NA

Impact:
It can cause a kernel crash (denial of service) and may lead to a kernel information leak.

Fix:
The system crash and information leak issue has been resolved in the kernel.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1924693 : CVE-2020-26939 bouncycastle: Address OAEP decoding side-channel leaking RSA private exponent

Component: TMOS

Symptoms:
Attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.

Conditions:
Bouncy Castle BC versions before 1.61 are vulnerable

Impact:
The vulnerability leaks side-channel information about the RSA private exponent

Workaround:
N/A

Fix:
bouncycastle has been upgraded to 1.61 to address this vulnerability.

Fixed Versions:
21.0.0.2


1923997 : CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling

Component: TMOS

Symptoms:
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.

Conditions:
NA

Impact:
It can cause incorrect handling or misrouting of other IP packets, potentially leading to traffic disruption or denial of service.

Workaround:
NA

Fix:
The denial of service issue has been resolved in the package.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1923817 : CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1)

Component: Local Traffic Manager

Symptoms:
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.

Conditions:
NA

Impact:
It can cause high CPU usage and event loop blocking, leading to a remote denial of service.

Workaround:
NA

Fix:
Hash flooding remote DoS issue has been resolved in the package.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1923793-10 : CVE-2019-5739: DoS with keep-alive HTTP connection

Component: Local Traffic Manager

Symptoms:
Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.

Conditions:
NA

Impact:
It can exhaust server connections and resources, leading to a denial of service.

Fix:
The Denial of Service issue has been resolved in the package.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1922661-4 : JSON profile settings not displayed in REST API after attaching schema files

Links to More Info: BT1922661

Component: Application Security Manager

Symptoms:
When a JSON content profile has validation files attached, the following settings are not visible through the REST API:

"sensitiveData"
"attackSignaturesCheck"
"metacharElementCheck"

Conditions:
JSON content profile has schema validation files attached.

Impact:
JSON profile settings not visible in REST API.

Workaround:
None

Fix:
The REST API now correctly returns the JSON profile settings when schema files are attached.

Fixed Versions:
21.0.0.2, 17.1.3.1


1893905-3 : Python vulnerability CVE-2023-40217

Links to More Info: K000139685, BT1893905


1893473-3 : Apache vulnerability CVE-2021-40438

Links to More Info: K01552024, BT1893473


1893369-3 : CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c

Component: TMOS

Symptoms:
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.

Conditions:
NA

Impact:
It can either lead to a DOS or cause arbitrary write on the system.

Workaround:
NA

Fix:
The DOS and arbitrary write issue has been resolved in the kernel.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1893309-5 : CVE-2021-23337 on HostOS: Command Injection via template function.\n' 'Link:https://sn

Links to More Info: K12492858


1889845-3 : Improvements in Radius Monitor

Component: Local Traffic Manager

Symptoms:
Certain headers were missing from radius monitor packet.

Conditions:
When radius monitors is configured

Impact:
Can lead to unexpected behaviour

Fix:
Missing headers are now included in the packets.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1849029-5 : Debug TMM crashes in FIPS/CC mode

Links to More Info: BT1849029

Component: Local Traffic Manager

Symptoms:
A TMM in debug mode crash occurs in FIPS/CC mode when using ClientSSL or ServerSSL profile.

Conditions:
-- Debug tmm is running
-- FIPS/CC mode enabled

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Switch to non debug tmm.

Fix:
Fix memory issue.

Fixed Versions:
21.0.0.1, 17.1.3, 16.1.6.1


1826345-6 : Security improvements in ca-bundle.crt

Component: TMOS

Symptoms:
Security best practices were not being followed for CA bundles.

Conditions:
When SSL profile is configured.

Impact:
Can lead to unexpected behaviour

Workaround:
Manually updating the default CA bundle or using CA bundle Manager.

Fix:
Security best practices are now being followed.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1825357-3 : Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk

Links to More Info: BT1825357

Component: Local Traffic Manager

Symptoms:
Tmm crashes and generates a core file.

or

Network traffic via a trunk does not work.

Conditions:
Platform i2600, i2800, i4600, i4800, r2800, r4800 or VADC

All trunk members are removed from a trunk attached to a vlan.
Then, the trunk is removed from one or more vlans.
Then, the trunk is deleted.
This could result in a tmm crash.

or

A trunk with no members is added to a vlan.
Then, one or more members are added to the trunk.
This will result in traffic on that vlan not being being sent over that trunk.

Impact:
Traffic disrupted while tmm restarts
or
Traffic is not sent out via the trunk

Workaround:
Do not remove and a trunk with no members from a vlan.
It will be necessary to restart tmm to correct this situation.

Do not add a trunk with no members to a vlan.
If a trunk with no members was added to the vlan, the issue can be corrected by removing the trunk from the vlan, ensuring that there are members in the trunk and adding it back to the vlan.

Fix:
FIX is not yet available.

Fixed Versions:
21.0.0.2, 17.5.1.4


1825057-3 : 'vs_name' field truncated at 64 characters with ASM's remote logging

Links to More Info: BT1825057

Component: Application Security Manager

Symptoms:
The virtual server name field (vs_name) is truncated at 64 bytes with ASM's remote logging handled by BD process.

The 'vs_name' field comprises of the partition name as well as virtual server name and the 64 character limit is inclusive of both these names.

Conditions:
ASM/Advanced WAF device running one of the versions listed under Known Affected Versions.

Impact:
Virtual server name gets truncated in remote logging events

Workaround:
None.

Fixed Versions:
21.0.0.2


1824985-4 : In rare cases the Nitrox hardware compression queue may stop servicing requests.

Links to More Info: BT1824985

Component: Local Traffic Manager

Symptoms:
In rare cases, the Nitrox hardware may stop servicing requests.

When this issue occurs the tmctl compress table shows a high number of cur_enqueued entries and the number of requests handled in software (zlib) will be growing.

Conditions:
-- Nitrox compression hardware.
-- HTTP compression in use.

Impact:
Some connections may fail, and higher than expected CPU usage will be observed since requests will be handled in software.

Workaround:
Remove traffic from the device, or disable compression until the queues are completely drained.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1818949-3 : [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.

Links to More Info: BT1818949

Component: Access Policy Manager

Symptoms:
As per RFC states that, the provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client then should send a 400 Bad Request status code and a error json response
{"error": "invalid_grant", ...}

currently BIG-IP sending as {"error": "access_denied", ...}
with 400 status code.

Conditions:
OAuth configured.
using the refresh token to get the access token, when refresh token is expired. (ex: using postman)

Impact:
Returns Invalid error

Workaround:
None

Fix:
Corrected the logging as per Rfc.

Fixed Versions:
21.0.0.1


1818137-3 : Tmm IPv4 fragmentation handling distribution

Links to More Info: BT1818137

Component: Local Traffic Manager

Symptoms:
BIG-IP VE handles fragmented IPv4 traffic on the first tmm thread/tmm0. With this change the ability to spread the fragmented IPv4 traffic is introduced.

Conditions:
Handling of fragmented IPv4 traffic.

Impact:
Handling of fragmented IPv4 traffics distribution.

Workaround:
None

Fix:
With this fix the Handling of fragmented IPv4 traffic can be distributed.

Fixed Versions:
21.0.0.1


1814413-2 : Dynamic parameters are not extracted and cookies are not generated

Links to More Info: BT1814413

Component: Application Security Manager

Symptoms:
Dynamic parameters are not extracted and cookies are missed.

Conditions:
Create a parameter in extraction and in the Extracted Items configuration.

Impact:
Unable to extract dynamic parameters due to which false positives are generated.

Workaround:
Include the file type in the Extracted Items configuration.

Fixed Versions:
21.0.0.2


1788105-3 : TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes

Links to More Info: BT1788105

Component: Local Traffic Manager

Symptoms:
A TLS1.3 connection between the BIG-IP system and the server hangs.

Other reported symptoms:
-- SSL decryption fails
-- SSL handshake failure
-- SSL Orchestrator explicit proxy stops responding

This can be encountered after an upgrade to an affected version.

Conditions:
A virtual server that uses
1. TLS1.3 in the serverSSL profile
2. An APM policy that uses events that trigger after the SSL handshake on the server has completed

In an SSL Orchestrator setting, inline HTTP and ICAP services make use of APM policies that use L7 protocol lookup. Server Certificate and L7 protocol lookup conditions also make use of events that trigger the APM policy after the SSL handshake has completed.

Impact:
The connection hangs and the client is unable to connect to the server.

Workaround:
Apply either of these workarounds

1. Disable TLS1.3 on the serverSSL profile
2. Avoid using events that trigger the policy after the SSL handshake on the server has completed (for example avoid Event Wait and L7 protocol Lookup)

Fix:
The TLS1.3 connection between the BIG-IP and server no longer hangs if the APM policy is invoked after the SSL handshake.

Fixed Versions:
21.0.0.1, 17.1.3


1772317-4 : [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"

Links to More Info: BT1772317

Component: Access Policy Manager

Symptoms:
SAML authentication fails and following log is seen on BIG-IP as sp: "SAML Agent: /Common/web_auth_act_saml_auth_subsession_ag SAML assertion is invalid, error: NameID is missing, but idp-connector's identity location is set to subject"

Conditions:
-- SAML auth is configured as SP on BIG-IP as part of per-request policy
-- assertion has an encrypted subject "<saml2:Subject><saml2:EncryptedID><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"...."

Impact:
Authentication fails

Workaround:
Disable "encrypt-subject " in idp config

Fixed Versions:
21.0.0.1


1752873-3 : [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed

Links to More Info: BT1752873

Component: Access Policy Manager

Symptoms:
After upgrading, the order of SAML attribute values parsed from assertion are stored in reverse order.

Conditions:
-- BIG-IP as SAML SP,
-- Upgrade to 17.1.0

Impact:
The SAML assertion values are parsed in reverse order, which can cause iRules or policies to fail if they expect the values to arrive in a certain order.

Workaround:
None

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1632385-5 : Non-ASCII UTF-8 characters are mangled in JSON policy export

Links to More Info: BT1632385

Component: Application Security Manager

Symptoms:
Non-ASCII UTF-8 characters in a JSON policy are mangled when exported in JSON policy.

Conditions:
Values contains Non-ASCII UTF-8 characters and the policy is exported and imported back

Impact:
After re-importing the exported policy, the values change

Workaround:
None

Fix:
After exporting the policy with the Non-ASCII UTF-8 characters, the imported policy has the same identical values as before.

Fixed Versions:
21.0.0.2


1624701-5 : Security improvement in BIGIP GUI

Component: TMOS

Symptoms:
BIGIP GUI was not following best security practices.

Conditions:
NA

Impact:
Unexpected behaviour

Fix:
Security best practices are now being followed.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1623669-3 : False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF)

Links to More Info: BT1623669

Component: Application Security Manager

Symptoms:
Requests may be blocked with the violation “Illegal dynamic parameter value” even though the parameter values were correctly extracted from application responses using “Search in Links” and should be treated as valid.

Conditions:
- A parameter is configured with Dynamic content value

- “Check – Search in Links” is enabled for the parameter

- The parameter value is extracted from response links (HREF)

- The extracted value is later used in a client request while the policy is enforced

Impact:
Legitimate application traffic may be blocked because values extracted from links are not recognized as valid dynamic parameter values.

Workaround:
None

Fix:
Values extracted from response links are properly learned and recognized, and requests using those values are no longer incorrectly blocked with “Illegal dynamic parameter value.”

Fixed Versions:
21.0.0.2, 17.1.3.1


1621417-3 : WALinuxAgent Updated to Version 2.14.0.1

Component: TMOS

Symptoms:
Unexpected Behavior When Using Deprecated Waagent Configurations: Stricter Validation May Cause VM Extensions to Fail

Conditions:
Applicable to All Previous Versions of BIG-IP Azure Distributions

Impact:
The Azure Linux Agent (waLinuxAgent) has been upgraded from version 2.2.48.1 to 2.14.0.1, bringing enhanced security, stability, and compatibility with newer Azure features and Linux distributions. This major version update includes stricter extension handling.

Fix:
The bundled WALinuxAgent for Azure images has been updated to version 2.14.0.1.

Fixed Versions:
21.0.0.2


1600617-5 : Few virtio driver configurations may result in excessive memory usage

Links to More Info: BT1600617

Component: TMOS

Symptoms:
Certain virtio driver configurations may result in excessive memory usage, which in some cases, leads to issues with forwarding traffic.

'tmctl page_stats' output can be examined on a newly launched system to verify if any of the TMMs except for TMM0 have their memory exhausted.

Conditions:
Virtio driver memory usage scales up with:
- Number of queues.
- Number of TMMs.
- Number of interfaces.
- Queue size.

Increasing these numbers might cause a problem trigger.

Impact:
Excessive memory usage, in some cases, leads to problems with traffic forwarding.

Workaround:
Scale down on the number of queues and their size. Reduce the number of interfaces.

Fixed Versions:
21.0.0.2


1583381-4 : "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default

Links to More Info: BT1583381

Component: Application Security Manager

Symptoms:
The pure wildcard cookie configuration "Insert Secure Attribute" is disabled and "Insert SameSite Attribute" is not set to "Lax".

Conditions:
Creating the policy using the policy templates.

Impact:
The configuration is incorrect.

Workaround:
Configure it manually: Enable "Insert Secure Attribute" and set "Insert SameSite Attribute" to "Lax".

Fix:
Fixed the templates and now BIG-IP has the correct configuration for the pure wildcard cookie.

Fixed Versions:
21.0.0.2


1562733-5 : Bd can crash using JSON schema

Component: Application Security Manager

Symptoms:
Bd crashes while passing traffic.

Conditions:
Using JSON schema

Impact:
Traffic disrupted while bd restarts.

Workaround:
Remove JSON schema from JSON content profile, and enforce JSON payload via "parse parameter" feature available in JSON content profile.

Fixed Versions:
21.0.0.2


1552341-7 : Excessive tmm memory during bot signature updates

Links to More Info: BT1552341

Component: Application Security Manager

Symptoms:
During bot signature updates, memory usage may become unusually high. In some cases, updates can fail and leave the system in an inconsistent state.

Conditions:
This issue may occur when multiple bot signature overrides are configured in Bot Defense profiles. Updates that involve multiple signature overrides are more likely to trigger higher memory usage.

Impact:
Bot signature updates may fail due to insufficient memory, which can temporarily prevent new signatures from being applied.

Workaround:
Increase available TMM memory by provisioning the LTM module.

Reduce the number of multiple overrides (either individual signature overrides or signature category overrides) in Bot Defense profiles, as multiple overrides significantly increase memory usage during updates.

Fix:
The fix will optimize the bot signature update mechanism to reduce memory consumption, improve failure handling.

Fixed Versions:
21.0.0.1


1505813-7 : CVE-2018-16487 lodash: Prototype pollution in utilities

Component: iApp Technology

Symptoms:
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.

Conditions:
NA

Impact:
An attacker can use Function inside of vulnerable versions of lodash to execute malicious code using the Traffic Management User Interface (TMUI) or iControl REST API .it can impact confidentiality,integrity and availability of application.

Workaround:
NA

Fix:
Updated lodash version to 4.17.21

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1505309-3 : CVE-2021-23337 nodejs-lodash: command injection via template

Links to More Info: K12492858, BT1505309


1505297-5 : CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function

Component: iApp Technology

Symptoms:
A flaw was found in nodejs-lodash in versions 4.17.15 and earlier. A prototype pollution attack is possible which can lead to arbitrary code execution. The primary threat from this vulnerability is to data integrity and system availability.

Conditions:
The vulnerability can be exploited when a vulnerable lodash version (≤ 4.17.15) processes attacker-controlled input using prototype-modifying functions (e.g., merge, defaultsDeep) with malicious keys like __proto__ or constructor.

Impact:
It can allow prototype pollution, leading to data integrity issues, application crashes (DoS), or potentially arbitrary code execution.

Workaround:
Upgrade lodash to a fixed version (≥ 4.17.16), avoid using prototype-modifying functions on untrusted input, and validate or sanitize user-controlled data.

Fix:
Update nodejs-lodash to version 4.17.16 or later

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1505257-3 : False positive with "illegal base64 value" for Authorization header

Links to More Info: BT1505257

Component: Application Security Manager

Symptoms:
False positive "illegal base64 value" is detected

Conditions:
The given base64 encoded value is legal base64 but the decoded auth-param is unparsable. Such request triggers "HTTP Protocol Compliance" violation when configured to do so and it is indeed triggering, but such request should not trigger "illegal base64 value".

Impact:
A false positive is detected.

Workaround:
None

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1498949-1 : CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature

Links to More Info: K000138682, BT1498949


1473189-1 : Offending IP is not logged when rate limiting is triggered

Links to More Info: BT1473189

Component: Global Traffic Manager (DNS)

Symptoms:
The log only contains the rate limit message without the offending IP address.

Conditions:
The number of requests exceeds the server's configured maximum rate limit.

Impact:
You are unable to determine which IP address exceeded the threshold.

Workaround:
None

Fix:
The system now logs the offending IP address when the rate limit is triggered.

Fixed Versions:
21.0.0.1


1450481-6 : TMSH hardening

Component: TMOS

Symptoms:
TMSH is not following security best practices.

Conditions:
NA

Impact:
Unexpected behaviour

Workaround:
NA

Fix:
TMSH is now following security best practices.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1429861-9 : CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6)

Component: Local Traffic Manager

Symptoms:
It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server's headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.

Conditions:
The server runs a vulnerable Node.js HTTP implementation and accepts persistent connections where an attacker can send two specially crafted HTTP requests on the same connection to bypass headersTimeout.

Impact:
An attacker can bypass Slowloris protections and cause a denial of service by exhausting server connections.

Workaround:
Upgrade to a Node.js version that includes the corrected Slowloris fix and enforce strict request timeouts and connection limits.

Fix:
Upgrade to a Node.js version with the updated Slowloris fix and enforce strict request timeout and connection limits.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1401569-5 : Engineering Hotfix readme file refers to non-applicable "full_box_reboot" command

Component: TMOS

Symptoms:
The readme file automatically produced for BIG-IP Engineering Hotfixes contains the following instructions:

This hotfix may not be operational without a FULL
system restart. To accomplish this, use the command:
/usr/bin/full_box_reboot

However, the full_box_reboot command is not part of the documented or recommended workflows for current BIG-IP versions.

Conditions:
These instructions are contained in the .readme file that may accompany a BIG-IP Engineering Hotfix provided by F5 to resolve critical issues, under the terms and conditions of the F5 critical issue hotfix policy as described at:
https://my.f5.com/manage/s/article/K4918

Impact:
The instructions in the Engineering Hotfix readme file may be confusing due to inconsistency with documented workflows for installing BIG-IP Engineering Hotfixes.

Workaround:
After the software installs and boots to the volume with installed software no further reboot is required.

Fix:
None

Fixed Versions:
21.0.0.2


1379649-6 : GTM iRule not verifying WideIP type while getting pool from TCL command

Links to More Info: BT1379649

Component: Global Traffic Manager (DNS)

Symptoms:
When the pool name is same for different pool types, the GTM iRule cannot segregate the pool types thus giving a wrong DNS response.

Conditions:
-- Both A/AAAA same name WideIP and pools.
-- GTM iRule with pool command pointing to common pool name in different WideIP types.

Impact:
Traffic impact as a non-existent pool member address in DNS response.

Workaround:
None

Fixed Versions:
21.0.0.1, 17.1.3.1


1359817-4 : The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly

Links to More Info: BT1359817

Component: F5OS Messaging Agent

Symptoms:
TMM is not configuring L2 listener entry for a new MASQUEREDE MAC created from a base MAC and VLAN ID when the DB variable tm.macmasqaddr_per_vlan is true.

Conditions:
- F5OS Tenant
- MAC MASQUEREDE is configured
- DB variable tm.macmasqaddr_per_vlan is true

Impact:
Connectivity issues may occur, pinging a self-IP will fail.

Workaround:
None

Fixed Versions:
21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1


1352213-1 : Handshake fails with FFDHE key share extension

Links to More Info: BT1352213

Component: Local Traffic Manager

Symptoms:
SSL handshake fails to complete and various errors show in the LTM logs


01010025:2: Device error: crypto codec Couldn't create an OpenSSL EC group object OpenSSL error:00000000:lib(0):func(0):reason(0)
01010282:3: Crypto codec error: sw_crypto-1 Couldn't initialize the elliptic curve parameters.
01010025:2: Device error: crypto codec No codec available to initialize request context.

Conditions:
An SSL profile uses TLS1.3, and a TLS Client Hello attempts to use FFDHE as part of the key share extension.

Impact:
SSL handshake fails and results in connection failure.

Workaround:
Set the SSL profile to disallow using FFDHE groups.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3


1341517-1 : With longer vlan names qkview generates invalid proc_module.xml file and ihealth parsing fails.

Links to More Info: BT1341517

Component: TMOS

Symptoms:
With longer vlan names, invalid proc_module.xml file are generated by qkview and iHealth parsing fails intermittently.

Conditions:
VLAN names longer than 13 characters are used.

Impact:
iHealth may fail to process the qkview file.

Workaround:
Use shorter VLAN names.

Fixed Versions:
21.0.0.1


1271453-2 : DNS requests with NSEC or NSEC3 RR type Responding with no NSEC3 and no authority section from BIG-IP authoritative server.

Links to More Info: BT1271453

Component: Global Traffic Manager (DNS)

Symptoms:
DNS requests with NSEC or NSEC3 RR type Responding with no NSEC/NSEC3 and no authority section from BIG-IP authoritative server.

Conditions:
-- Create a Zone in BIND.
-- Create DNSSEC zone on BIG-IP.
-- Send dig -t nsec3 ZONENAME @BIG_IP_listener +dnssec
-- Observe the lack of AUTHORITY SECTION, NSEC3 and RRSIG records in the reply

Impact:
DNSSEC Validation failure at resolver.

Workaround:
None

Fix:
None

Fixed Versions:
21.0.0.2


1271341-6 : Unable to use DTLS without TMM crashing

Component: Local Traffic Manager

Symptoms:
The TMM crashes when DTLS is used.

Conditions:
- Using DTLS.

Impact:
TMM core is observed, traffic is disrupted while TMM restarts.

Workaround:
Disable 'allow-dynamic-record-sizing' in the client-ssl profile.


Following is an example:

ltm profile client-ssl /Common/otters-ssl {
    allow-dynamic-record-sizing disabled

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1178225-7 : Scalability issues with F5-VE deployments

Component: TMOS

Symptoms:
Two TMM threads can end up running on the same physical core on hypervisors where any 2 consecutive virtual cores are hyperthreaded siblings running on the same physical core.

Seen on any platform which assigns virtual CPUs in the order given in the example below, where numerically adjacent logical CPU numbers represent cores on the same physical CPU:

cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 0

cpu2 - assigned to physical core 1
cpu3 - assigned to physical core 1

cpu4 - assigned to physical core 2
cpu5 - assigned to physical core 2
etc.

BIG-IP expects the order of the logical CPUs to iterate through the physical cores, so that hyperthreaded siblings are never numberically adjacent, for example:

cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 1
cpu2 - assigned to physical core 2
cpu3 - assigned to physical core 3

cpu4 - assigned to physical core 0
cpu5 - assigned to physical core 1
cpu6 - assigned to physical core 2
cpu7 - assigned to physical core 3

The order that logical CPUs are assigned to the virtual machine can be determined with the 'lscpu --extended' command.

Conditions:
Virtual Edition (VE) BIG-IP as it does not support split planes

Impact:
Scalability issues with F5-VE deployments which run on infrastructures/hypervisors which provide virtual CPU resources in the order given above.

Workaround:
None

An EHF is available that adds a db variable that alter the the order that tmm allocates CPU cores to threads.

Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1


1148185-8 : getdb insufficient sanitisation

Links to More Info: K05403841

Component: TMOS

Symptoms:
https://support.f5.com/csp/article/K05403841

Conditions:
https://support.f5.com/csp/article/K05403841

Impact:
https://support.f5.com/csp/article/K05403841

Fix:
https://support.f5.com/csp/article/K05403841

Fixed Versions:
21.0.0.1


1137269-8 : MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes

Links to More Info: BT1137269

Component: TMOS

Symptoms:
MCPD does not reply to the request if the publisher's connection closes or fails. In this case, when bcm56xxd
is restarted, the perceivable signs of failure are:
- The snmpwalk failing with a timeout and
- The "MCPD query response exceeding" log messages.

Conditions:
1) Configure SNMP on the BIG-IP to run snmpwalk locally on the BIG-IP.
2) From the first session on the BIG-IP, run a snmpwalk in the while loop.
    
while true;do date; snmpwalk -v2c -c public 127.0.0.1 sysDot1dbaseStat;sleep 2;done
Sample output:
Sat Aug 21 00:57:23 PDT 2021
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatResetStats.0 = INTEGER: 0
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatMacAddr.0 = STRING: 0:23:e9:e3:8b:41
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatNumPorts.0 = INTEGER: 12
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatType.0 = INTEGER: transparentonly(2)

3) From a second session on the BIG-IP restart bcm56xxd

bigstart restart bcm56xxd

4) The snmpwalk will continually report the following:

Timeout: No Response from 127.0.0.1

      And snmpd will continually log "MCPD query response exceeding" every 30 seconds in /var/log/ltm.

Impact:
SNMP stopped responding to queries after upgrade.

Workaround:
Restart SNMP.

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1106489-6 : GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.

Links to More Info: BT1106489

Component: TMOS

Symptoms:
GRO/LRO packets are not received: "tmctl -d blade tmm/ndal_rx_stats" shows "0" in "lro". The linux host has GRO disabled: "ethtool -k eth1 | grep generic-receive-offload" shows "off".

Conditions:
-- BIG-IP is deployed in a Hyper-V environment.
-- Any environment such that "tmctl -d blade tmm/device_probed" displays "sock" in "driver_in_use".

Impact:
Performance is degraded.

Workaround:
Manually enable GRO on the device: ethtool -K eth1 gro on

Check that it's enabled with: ethtool -k eth1 | grep generic-receive-offload

Fix:
When sending large payload, "tmctl -d blade tmm/ndal_rx_stats" shows "1" in "lro". "tmctl -d blade tmm/ndal_dev_status" shows "y:y" (available:enabled) in "lro". The linux host indicates the device has GRO enabled: "ethtool -k eth1 | grep generic-receive-offload" shows "on".

Fixed Versions:
21.0.0.2, 17.1.3, 16.1.4, 15.1.10


1086325-8 : CVE-2016-4658 libxml2 vulnerability

Links to More Info: K49419538, BT1086325


1083937-8 : CVE-2002-20001, CVE-2022-40735 DH Key Agreement vulnerability - OpenSSH Server

Links to More Info: K83120834, BT1083937


1057557-7 : Exported policy has greater-than sign '>' not escaped to '&gt;' with response_html_code tag.

Links to More Info: BT1057557

Component: Application Security Manager

Symptoms:
The greater-than sign '>' is not escaped/converted to '&gt;' with response_html_code tag.

Having an un-escaped greater-than sign can cause issues when re-importing the policy, if the greater-than sign appears in a specific sequence, ']]>'. In other words, if the greater-than sign does not appear in the specific sequence, you can successfully re-import the policy without problem.

The specific sequence can be possible with a custom response page configuration. If you modify the custom response page in the way it has a sequence of characters ']]>', as the greater-than sign is not converted due this issue, the exported policy has the sequence of characters ']]>'. The expected characters are ']]&gt;'

The characters ']]>' in XML is CDATA End delimiter and not allowed. The exported policy causes parser error and can not be re-imported.

Conditions:
This issue occurs if you modify the default custom response page where this specific character sequence is observed ']]>'.

Impact:
The exported policy cannot be re-imported.

Workaround:
This workaround forces the greater-than sign to be escaped to '&gt;' so that that policy can be re-imported without problem.

- make /usr writable
# mount -o remount,rw /usr

- backup
# cp /usr/local/share/perl5/F5/ExportPolicy/XML.pm /usr/local/share/perl5/F5/ExportPolicy/XML.pm.orig

- see this line exists
# grep "gt;" /usr/local/share/perl5/F5/ExportPolicy/XML.pm
            $xml =~ s/&gt;/>/g;

- delete the line and verify
# sed -i '/$xml =~ s\/&gt;.*/d' /usr/local/share/perl5/F5/ExportPolicy/XML.pm

- should not see the line
# grep "gt;" /usr/local/share/perl5/F5/ExportPolicy/XML.pm

- move /usr read-only
mount -o remount,ro /usr

- make the change in effect
# pkill -f asm_config_server

Fixed Versions:
21.0.0.2


1057305-5 : On deployments that use DPDK, "-c" may be logged as the TMM process/thread name.

Links to More Info: BT1057305

Component: TMOS

Symptoms:
"-c" may be logged as the process/thread name on deployments that use DPDK:

notice -c[17847]: 01010044:5: Gx feature is not licensed
notice -c[17847]: 01010044:5: LTM Transparent feature is licensed
notice -c[17847]: 01010044:5: NAT feature is licensed

Conditions:
- BIG-IP Virtual Edition using XNET with DPDK. This can be AWS, Mellanox, or Cisco eNIC.

Impact:
Confusing logging.

Workaround:
N/A

Fix:
N/A

Fixed Versions:
21.0.0.2


1052477 : CVE-2020-10751 kernel: SELinux netlink permission check bypass

Component: TMOS

Symptoms:
A flaw was found in the Linux kernel SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.

Conditions:
NA

Impact:
A local attacker could bypass SELinux restrictions, potentially leading to unauthorized access, privilege escalation, or, in some scenarios, a system crash (denial of service).

Workaround:
NA

Fix:
Applied patch to fix the CVE

Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1


1036221-4 : "Illegal parameter value length" is reported with parsing product length.

Links to More Info: BT1036221

Component: Application Security Manager

Symptoms:
"Illegal parameter value length" violation is reported with wrong parameter length.

Conditions:
A JSON parameter is encoded.

Impact:
The decoded value length of the parameter in the JSON payload will be reported instead of its original length.

Workaround:
None

Fix:
The original parameters value length is reported with "Illegal parameter value length" violation.

Fixed Versions:
21.0.0.1, 17.5.1.4


1001429-10 : HTTP header Sanitization

Component: Device Management

Symptoms:
Some HTTP headers were improperly sanitised.

Conditions:
NA

Impact:
It could lead to unexpected behaviour

Fix:
Headers are now properly sanitised.

Fixed Versions:
21.0.0.1



Known Issues in BIG-IP v21.0.x


TMOS Issues

ID Number Severity Links to More Info Description
1991485-2 1-Blocking BT1991485 Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.
967769-5 2-Critical BT967769 During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks
780437-11 2-Critical BT780437 Upon rebooting a VIPRION chassis provisioned as a vCMP host, some vCMP guests can return online with no configuration.
777389-10 2-Critical BT777389 In rare occurrences related to PostgreSQL monitor, the mcpd process restarts
721591-6 2-Critical K000141369, BT721591 Java crashes with core during with high load on REST API
701341-6 2-Critical K52941103, BT701341 If /config/BigDB.dat is empty or the file is corrupt, mcpd continuously restarts
2263721-2 2-Critical BT2263721 TMM crashes on Azure VE when virtual function is removed during runtime
2229273-1 2-Critical BT2229273 LDAP authentication fails when multiple LDAP servers are configured
2221585-3 2-Critical BT2221585 When tenant renews DHCP lease on eth2, the interface IP address on mgmt also gets modified
2189993 2-Critical BT2189993 Upgrade from 17.5.1.3 to 21.0.0 and the config failed to load with error:01071197:3: Metacharacter '*' must be at end of the session variable name
2154089-2 2-Critical "Test" button for monitor object is missing.
2154057-5 2-Critical BT2154057 MCPD validations not throwing error when snmpv3 password contains more than 77 characters
2139893-3 2-Critical BT2139893 vCMP guest may become unresponsive for several minutes due to kernel soft lockup
2132125-8 2-Critical K000157248, BT2132125 Unable to upload QKView to iHealth
1812349-4 2-Critical BT1812349 IPsec phase 2 (IKEv1 Quick Mode) will not start after upgrade
1571817-5 2-Critical BT1571817 FQDN ephemeral pool member user-down state is not synced to the peer device
1395349-3 2-Critical BT1395349 The httpd service shows inactive/dead after "bigstart restart httpd"
1327649-5 2-Critical BT1327649 Invalid certificate order within cert-chain associated to JWK configuration
1093717-7 2-Critical BT1093717 BGP4 SNMP traps are not working.
1077789-8 2-Critical BT1077789 System might become unresponsive after upgrading.
1027961-5 2-Critical BT1027961 Changes to an admin user's account properties may result in MCPD crash and failover
1006449-6 2-Critical BT1006449 High CPU utilization and slow SNMP response after upgrade
977953-8 3-Major BT977953 Show running config interface CLI could not fetch the interface info and crashes the imi
941961-9 3-Major BT941961 Upgrading system using WAM TCP profiles may prevent the configuration from loading
923745-8 3-Major BT923745 Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition
921069-7 3-Major BT921069 Neurond cores while adding or deleting rules
891333-7 3-Major K32545132, BT891333 The HSB on BIG-IP platforms can get into a bad state resulting in packet corruption.
883149-10 3-Major BT883149 The fix for ID 439539 can cause mcpd to core.
870349-6 3-Major BT870349 Continuous restart of ntlmconnpool after the license reinstallation
851837-7 3-Major BT851837 Mcpd fails to start for single NIC VE devices configured in a trust domain
809089-8 3-Major BT809089 TMM crash after sessiondb ref_cnt overflow
791365-8 3-Major BT791365 Bad encryption password error on UCS save
783077-5 3-Major BT783077 IPv6 host defined via static route unreachable after BIG-IP reboot
775845-10 3-Major BT775845 Httpd fails to start after restarting the service using the iControl REST API
759258-10 3-Major BT759258 Instances shows incorrect pools if the same members are used in other pools
741621-6 3-Major BT741621 CLI preference 'suppress-warnings' setting may show incorrectly
739904-7 3-Major BT739904 /var/log/ecm log is not rotated
675742-4 3-Major BT675742 Hardware-to-VE-platform-migrate of a UCS may fail with an error on db variable license.maxcores
637827-5 3-Major BT637827 VADC: after re-deploying a single-nic VM with multiple nics, a load can fail due to stp member 1.0
566995-7 3-Major BT566995 bgpd might crash in rare circumstances.
554506-6 3-Major K47835034, BT554506 PMTU discovery from the management interface does not work
469724-7 3-Major BT469724 When evaluation/demonstration features expire, features enabled by both evaluation and perpetual licenses also expire
2277461-1 3-Major Current tzdata version of BIG-IP is outdated and may cause discrepancies
2261337-2 3-Major BT2261337 TMUI displays Local Traffic menu on rSeries Best Bundle tenant without LTM provisioned
2240889-1 3-Major BT2240889 TMM route can unexpectedly overwrite MGMT kernel route
2230137-3 3-Major BT2230137 Multicast forwarding entry might not be created during a traffic burst.
2228421-1 3-Major BT2228421 GUI: Help contents missing for "System >> Crypto Offloading : Acceleration Strategy" (404 error)
2217677-1 3-Major BT2217677 BIG-IP v21.0: Tunnel object exists in MCPD but missing Linux tunnel tap device, causing ioctl failure and config deployment failure
2202005 3-Major BT2202005 IPsec can send packets across tunnels on standby node.
2197289-1 3-Major BT2197289 Enabling SSH access via the GUI blocks MCPD for 90 seconds
2183241-2 3-Major BT2183241 Trunk egress traffic is not balanced on some platforms.
2182061-3 3-Major BT2182061 Management routes not installed on reboots when interface route is recursively required.
2162997-3 3-Major BT2162997 AS3 becomes unresponsive after upgrade from 17.1.2.1 to 17.1.2.2 Build 0.311.1
2153421-3 3-Major BT2153421 iControl REST /mgmt/toc endpoint and object browser pages are not functioning on BIG-IP v17.x
2152257-3 3-Major BT2152257 [BGP] remove-private-AS does not work with extended ASN numbers
2150489-5 3-Major BT2150489 Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed.
2143109-3 3-Major BT2143109 BIG-IP VE with more CPU cores than licensed enters TMM restart loop (TMM PU (<num_cores>) >= number of PUs (<num_licensed_cores>)) after mcpd restart
2131833-5 3-Major BT2131833 F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable
2058541-4 3-Major BT2058541 [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer.
2053489-4 3-Major BT2053489 Config Sync events may not be recorded in audit log
2038429-2 3-Major BT2038429 Issue with ike_ctx causes memory corruption
2038425-2 3-Major BT2038425 Issue with ike_ctx causes memory corruption
2038421-2 3-Major BT2038421 Issue with ike_ctx causes memory corruption
2038417-2 3-Major BT2038417 Issue with ike_ctx causes memory corruption
2014597-4 3-Major BT2014597 Async session db ops are missing flow control
1937545-3 3-Major BT1937545 Disabling ipsec.if.checkpolicy lead to premature connection termination for a tunneled traffic
1933105-4 3-Major BT1933105 TMM does not fragment the output before encapsulating the payload
1854353-4 3-Major BT1854353 Users with Resource admin role are not able to save the UCS.
1826505-3 3-Major BT1826505 Restjavad API usage statistics memory leak
1707921-4 3-Major BT1707921 Tenant upgrade fails with disk full error on BIG-IP 17.x created with T2 image
1644497-5 3-Major BT1644497 TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed
1603869-3 3-Major BT1603869 Wrong Fallback to local for TACACS authentication with empty password when source fallback is set to true
1602629-5 3-Major BT1602629 Tmm_mcpmsg_print can trigger SOD
1596313-3 3-Major BT1596313 F5OS LAG fails MCPD validation, tenant trunk has no interfaces.
1586745-3 3-Major BT1586745 LACP trunk status became DOWN due to bcm56xxd failure
1455805-3 3-Major BT1455805 MCPD unstable/inoperative after copying SNMP configuration from another BIG-IP
1347861-5 3-Major BT1347861 Monitor status update logs unclear for FQDN template pool member
1322413-6 3-Major BT1322413 After config sync, FQDN node status changes to Unknown/Unchecked on peer device
1312225-5 3-Major BT1312225 System Integrity Status: Invalid with some Engineering Hotfixes
1302101-5 3-Major BT1302101 Sflow receiver flows are not established at TMM startup on sDAG platforms due to sDAG delay
1296925-5 3-Major BT1296925 Unable to create two boot locations using the 'ALL' F5OS tenant image at default storage size
1283721-5 3-Major BT1283721 Vmtoolsd memory leak
1281929-5 3-Major BT1281929 The BIG-IP system's time zone database does not reflect recent changes implemented by Mexico in regard to DST
1271941-5 3-Major BT1271941 Tomcat CPU utilization increased after upgrading to 15.1.6 and higher versions.
1256757-4 3-Major BT1256757 Suspect keymgmtd memory leak while using dynamic CRL.
1183529-4 3-Major BT1183529 OCSP request burst when cert-ldap authentication is enabled
1168245-4 3-Major BT1168245 Browser is intermittently unable to contact the BIG-IP device
1126505-4 3-Major BT1126505 HSB and switch pause frames impact data traffic
1120345-10 3-Major Running tmsh load sys config verify can trigger high availability (HA) failover
1090313-7 3-Major BT1090313 Virtual server may remain in hardware SYN cookie mode longer than expected
1062901-7 3-Major BT1062901 The 'trap-source' and 'network' SNMP properties are ineffective, and SNMP traps may be sent from an unintended interface.
1052057-3 3-Major BT1052057 FCS errors on switch/HSB interface impacts networking traffic
1044281-7 3-Major BT1044281 In some cases, cpcfg does not trigger selinux relabel, leaving files unlabeled
1043141-1 3-Major K36822000, BT1043141 Misleading error 'Symmetric Unit Key decrypt failure - decrypt failure' when loading UCS from another BIG-IP
1036217-5 3-Major BT1036217 Secondary blade restarts as a result of csyncd failing to sync files for a device group
1022997-7 3-Major BT1022997 TCP segments with an incorrect checksum are transmitted when the sock driver is used in AWS deployments (e.g., 1NIC)
1016273-3 3-Major BT1016273 Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled
1013793-3 3-Major BT1013793 Pool members may flap on BIG-IP VE with provision.1nic set to forced_enable
1009337-8 3-Major BT1009337 LACP trunk down due to bcm56xxd send failure
929173-9 4-Minor BT929173 Watchdog reset due to CPU stall detected by rcu_sched
928665-8 4-Minor BT928665 Kernel nf_conntrack table might get full with large configurations.
824953-1 4-Minor BT824953 The sFlow sample collection for VLAN does not work with VLAN groups
745125-5 4-Minor BT745125 Network Map page Virtual Servers with associated Address/Port List have a blank address.
694765-10 4-Minor BT694765 Changing the system's admin user causes vCMP host guest health info to be unavailable
2277421-3 4-Minor BT2277421 TCP profile Help tab displays incorrect default values for Memory Management fields
2262641-3 4-Minor BT2262641 [BGP] Peering deadlock when modifying supported capabilities
2260837-2 4-Minor BT2260837 IPsec GUI sets encryption to null on auth update
2259001-3 4-Minor BT2259001 /Common VLANs can be assigned to non-Common partition route domains via VLAN-groups
2251921-1 4-Minor BT2251921 GUI audit logs inside the /var/log/audit files have a different format from all other daemons' audit logs
2251549-4 4-Minor BT2251549 Uneditable fields for Guest, Auditor, and Operator roles may appear to be editable in the GUI
2151505-1 4-Minor BT2151505 Cmp_dest_velos is automatically installed on system startup.
2150869-1 4-Minor BT2150869 Incorrect information for count of failed login for a user
2131597-3 4-Minor BT2131597 BGP graceful restart might not accept a new connection immediately after neighbor failover.
2064209-4 4-Minor BT2064209 FQDN node created from pool member via tmsh does not inherit "autopopulate" value
1967293-4 4-Minor BT1967293 Re-configuring BFD multihop for a BGP peer does not work reliably.
1813625-3 4-Minor BT1813625 "tmsh show net ipsec-stat" command is not showing statistics - all values are zero.
1635013-5 4-Minor BT1635013 The "show sys service" command works only for users with Administrator role
1575805-2 4-Minor bcm56xxd Process Killed by SOD After Failing to Send a Heartbeat During Firewall Rule Statistics Query
1462337-6 4-Minor BT1462337 Intermittent false PSU status (not present) through SNMP
1331037-6 4-Minor BT1331037 The message MCP message handling failed logs in TMM with FQDN nodes/pool members
1301317-5 4-Minor BT1301317 Update Check request using a proxy will fail if the proxy inserts a custom header
1361021-5 5-Cosmetic BT1361021 The management interface media on a BIG-IP Tenant on F5OS systems does not match the chassis

Local Traffic Manager Issues

ID Number Severity Links to More Info Description
886045-9 2-Critical BT886045 Multi-NIC instances fail to come up when trying to use memory-mapped virtio device
824437-11 2-Critical BT824437 Chaining a standard virtual server and an ipother virtual server together can crash TMM.
758491-8 2-Critical BT758491 When using NetHSM integration, after upgrade to 14.1.0 or later (or creating keys using fipskey.nethsm), BIG-IP cannot use the keys
632553-9 2-Critical K14947100, BT632553 DHCP: OFFER packets from server are intermittently dropped
2246933-3 2-Critical BT2246933 Memory leak in QUIC under rare sequence of packets/events
2225173-1 2-Critical BT2225173 HA Failover does not happen when a tenant's Active controller is pulled out and one or more blades goes offline
2220397-1 2-Critical BT2220397 Modifying iRule proc while iRule in use may cause connection to reset
2220285-1 2-Critical BT2220285 Modifying iRule proc with ILX::call may result in tmm crash
2208821-3 2-Critical BT2208821 VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade
2131085-2 2-Critical BT2131085 Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state
1481889-5 2-Critical BT1481889 High CPU utilization or crash when CACHE_REQUEST iRule parks.
1091021-8 2-Critical BT1091021 The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive.
978953-6 3-Major BT978953 The value of the sys db variable vlan.backplane.mtu intermittently out-of-sync with the value of the MTU of the kernel interface tmm_bp during the initial boot up
976853-3 3-Major BT976853 SNAT pool traffic-group setting may override non-floating self IP's traffic-group
967353-10 3-Major BT967353 HTTP proxy should trim spaces between a header field-name and colon in its downstream responses.
950665-3 3-Major BT950665 Pool and pool members created for dynamic ECMP routes are not freed
928445-11 3-Major BT928445 HTTPS monitor is down when server_ssl profile cipher string is configured to TLSv1_2
912293-9 3-Major BT912293 Persistence might not work properly on virtual servers that utilize address lists
905477-9 3-Major BT905477 The sdmd daemon cores during config sync when multiple devices configured for iRules LX
898389-9 3-Major BT898389 Traffic is not classified when adding port-list to virtual server from GUI
881937-7 3-Major BT881937 TMM and the kernel choose different VLANs as source IPs when using IPv6.
867985-9 3-Major BT867985 LTM policy with a 'shutdown' action incorrectly allows iRule execution
857769-6 3-Major BT857769 FastL4+HTTP or FastL4+Hash-Persistence virtual servers do not work correctly in DSR mode.
842137-9 3-Major BT842137 Keys cannot be created on module protected partitions when strict FIPS mode is set
812693-8 3-Major BT812693 Connection in FIN_WAIT_2 state may fail to be removed
779137-10 3-Major BT779137 Using a source address list for a virtual server does not preserve the destination address prefix
751451-7 3-Major BT751451 When upgrading to v14.0.0 or later, the 'no-tlsv1.3' option is missing from HTTPS monitors automatically created server SSL profiles
739475-10 3-Major BT739475 Site-Local IPv6 Unicast Addresses support.
687044-9 3-Major BT687044 Tcp-half-open monitors might mark a node up or down in error
683706-9 3-Major BT683706 Monitor status may show 'checking' after a pool member has been manually forced down
637613-10 3-Major K24133500, BT637613 Cluster blade status immediately returns to enabled/green after it is disabled.
2288173-3 3-Major BT2288173 Some TMMs not ready and failed to bring up full cluster due to failed cmp dag transition
2287865-2 3-Major BT2287865 Dynamic CRL always fails connections that use self-signed certificates
2279009-1 3-Major BT2279009 With large configured receive-window-size, BIG-IP advertises non-zero SYN/SYN-ACK window, but zero window in final 3WHS ACK and all subsequent packets
2269969-3 3-Major BT2269969 Using TCP congestion BBR might lead to TMM core
2264037-2 3-Major BT2264037 TMM may generate a core file after an SSL cipher group is deleted
2262981-4 3-Major BT2262981 TMM may corrupt stack during class lookup
2251517-3 3-Major BT2251517 Stream profile is not supported on HTTP/2 Full proxy (HTTP MRF Router enabled)
2244393-3 3-Major BT2244393 TLS 1.3 sessions are unnecessarily cached
2230709-2 3-Major BT2230709 iRule class match fails after modifying IP data group entries with route-domains
2230705-3 3-Major BT2230705 SSL handshake failure with Session Ticket that is rejected by backend server
2230597-3 3-Major BT2230597 Under syncookie mode, temporary listeners may fail to complete connections
2227513-3 3-Major BT2227513 Tmm crash in Google Cloud during a live migration
2224537-3 3-Major BT2224537 Tmm crash in Google Cloud during a live migration
2223645-3 3-Major BT2223645 BIG-IP does not implement traffic forwarding as per RFC 3927
2222141 3-Major BT2222141 JSON parser does not reject certain invalid JSON patterns that violate RFC 8259
2221017-3 3-Major BT2221017 The BIG-IP virtio driver may core during startup
2220009-1 3-Major BT2220009 OCSP monitoring of traffic certificates using a proxy server sends malformed HTTP host header
2217093-3 3-Major BT2217093 L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used
2211133-3 3-Major BT2211133 ICMP error length does not follow RFC 812 guidance
2209157-3 3-Major BT2209157 FastL4 late binding does not proxy MSS when establishing server-side connection.
2199469-3 3-Major BT2199469 Serverssl-use-sni not working in HTTP2 to HTTP gateway setups.
2197321-1 3-Major BT2197321 BIG-IP does not select FFDHE key share provided by the client on session resumption.
2197305-1 3-Major BT2197305 BIG-IP generates invalid SSL key share
2186933-4 3-Major ILX Plugin may not work after use of npm install command on workspace.
2183917-3 3-Major BT2183917 BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled
2181929-3 3-Major BT2181929 Cipher suite order changes in cipher group after upgrading from v17.1.1.1 to v17.1.3
2151885-3 3-Major BT2151885 When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
2144309-3 3-Major BT2144309 TMM might experience a crash when using a fix for Bug783077
2141297-3 3-Major BT2141297 In TLSv1.3, BIG-IP enforces the use of FFDHE key share if it is preferred over other DH groups
2139637-3 3-Major BT2139637 TMM crash because of invalid context
2132209-3 3-Major BT2132209 TMM crash while sending ACKs in invalid context
2033781-4 3-Major BT2033781 Memory allocation failed: can't allocate memory to extend db size
1989033-4 3-Major BT1989033 IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT
1987405-4 3-Major BT1987405 Virtual address ICMP and ARP setting might be inconsistent when traffic-matching-criteria is in use.
1977037-2 3-Major K000153024, BT1977037 TMM Virtual Edition on Azure goes into crash loop due to missing kernel driver
1935713-3 3-Major BT1935713 TMM crash when handling traffic over vlangroup with autolasthop disabled
1930897-5 3-Major BT1930897 Tmm core due to overflow of ifc ref counts with flow forwarding
1889741-3 3-Major BT1889741 Need for the SYS DB variable to toggle ssl_crypto::queue_max
1778793-4 3-Major BT1778793 Database health monitors may use the wrong connection when attempting to connect to database
1758193-2 3-Major BT1758193 Trunk with LACP and virtual-wire flaps after an upgrade.
1708309-4 3-Major BT1708309 Dynconfd crash with invalid ephemeral pool member
1589629-5 3-Major BT1589629 An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address
1505753-4 3-Major BT1505753 Maximum Fragment Length extension is not visible in ServerHello even though it is present in ClientHello
1474877-5 3-Major BT1474877 Unable to download large files through VIP due RST Compression error.
1463089-2 3-Major BT1463089 TMM crash because of corrupted MQTT queue
1440409-8 3-Major BT1440409 TMM might crash or leak memory with certain logging configurations
1407949-6 3-Major BT1407949 iRules using regexp or regsub command with large expression can lead to SIGABRT.
1380009-4 3-Major BT1380009 TLS 1.3 server-side resumption resulting in TMM crash due to NULL session
1341093-6 3-Major BT1341093 MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile
1325649-4 3-Major BT1325649 POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member
1231889-6 3-Major BT1231889 Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances
1196505-3 3-Major BT1196505 BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
1148053-2 3-Major BT1148053 When client SSL profile has "cache-size 0" or "authenticate always", BIG-IP is unable to decrypt client-side traffic when using tcpdump with "--f5 ssl" method
1137521-3 3-Major BT1137521 TLSv1.3 connections dropped when SSL Persistence is enabled
1128033-6 3-Major BT1128033 Neuron client constantly logs errors when TCAM database is full
1087569-8 3-Major BT1087569 Changing max header table size according HTTP2 profile value may cause stream/connection to terminate
1086473-8 3-Major BT1086473 BIG-IP resumes a TLS session on the client-side but then proceeds to do a full handshake
1075045-7 3-Major BT1075045 Proxy initialization failed, Defaulting to DENY, after applying additional profile to a virtual server
1064725-6 3-Major BT1064725 CHMAN request for tag:19 as failed.
1060541-6 3-Major BT1060541 Increase in bigd CPU utilization from 13.x when SSL/TLS session resumption is not utilized by HTTPS pool members due to Open SSL upgrade
1043985-7 3-Major BT1043985 After editing an iRule, the execution order might change.
1026781-7 3-Major BT1026781 Standard HTTP monitor send strings have double CRLF appended
1019641-7 3-Major BT1019641 SCTP INIT_ACK not forwarded
1002969-8 3-Major BT1002969 Csyncd can consume excessive CPU time
932553-10 4-Minor BT932553 An HTTP request is not served when a remote logging server is down
804089-5 4-Minor BT804089 iRules LX Streaming Extension dies with Uncaught, unspecified error event
2151601-1 4-Minor BT2151601 No tmsh command to remove the stateless directive from a virtual server
2144029-1 4-Minor BT2144029 DB monitor does not use the correct timezone present in the system
2077357-3 4-Minor BT2077357 Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC.
1100421-3 4-Minor BT1100421 HTTP/2 full-proxy virtual server uses wrong source MAC address and incorrect SNAT address selection
1004953-8 4-Minor BT1004953 HTTP does not fall back to HTTP/1.1

Performance Issues

ID Number Severity Links to More Info Description
1574521-3 5-Cosmetic BT1574521 Intermittent high packet latency on R4000 and R2000 tenants

Global Traffic Manager (DNS) Issues

ID Number Severity Links to More Info Description
2228869 2-Critical BT2228869 Continuous tmm cores in domain_table_search with null dereferencing
2224853 2-Critical BT2224853 BIG-IP DNS may not respond to RRSIG type queries correctly with DNSSEC zones
1962713 2-Critical BT1962713 Limit on BIND maximum records per type
1083405-8 2-Critical BT1083405 "Error connecting to named socket" from zrd
1031945-7 2-Critical BT1031945 DNS cache configured and TMM is unresponsive in 'not ready' state indefinitely after TMM restart or reboot
936777-10 3-Major BT936777 Old local config is synced to other devices in the sync group.
821589-7 3-Major BT821589 DNSSEC does not insert NSEC3 records for NXDOMAIN responses
751540-8 3-Major BT751540 GTM Sync group not syncing properly with multiple self IP addresses configured on one VLAN but not all configured for GTM server
705869-8 3-Major BT705869 TMM crashes as a result of repeated loads of the GeoIP database
2264845-3 3-Major BT2264845 TMM may crash when enabling DNS Express
2263101-1 3-Major TMSH rrset commands do not list DNS cache serve-expired records
2261137-1 3-Major BT2261137 TMM may crash if DNS cache resolver concurrency settings are changed during live traffic
2252201-1 3-Major BT2252201 Monitor to GTM link is skipped if there are no devices are associated with the link
222220-12 3-Major K11931 Distributed application statistics are not passed correctly.
2217181 3-Major When "Publish CDS/CDNSKEY" is enabled for a DNSSEC zone on BIG-IP DNS, the system signs CDS and CDNSKEY records with both the Key Signing Key (KSK) and Zone Signing Key (ZSK)
2200389-1 3-Major BT2200389 CDS and CDNSKEY not included in DNSX zone transfer data
2200217-1 3-Major BT2200217 DNSSEC validation failures due to missing DS records in zone transfers
2199701 3-Major BT2199701 big3d was stuck in high CPU after network disruption
2187141-3 3-Major BT2187141 DNS generic server stuck offline after monitor removal
2172069-1 3-Major BT2172069 GTM topology regions updates do not take effect within tmm
2172041-2 3-Major BT2172041 Zone transfer fails for dnsx when the zone file contains TLSA records
2161209 3-Major A GTM link can become unmonitored when adding a second link to a datacenter
2150493 3-Major BT2150493 BIG-IP DNS (GTM) may associate LTM virtual server names with the wrong GTM virtual-servers
2137661-2 3-Major BT2137661 GTM link object is deleted automatically after being added
1988953 3-Major BT1988953 A DNS profile with edns0-client-subnet-insert enabled does not handle EDNS version greater than zero
1970969-4 3-Major BT1970969 Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache
1965149 3-Major A local zone with "." as its prefix is allowed through tmsh and webui
1953273-5 3-Major BT1953273 Big3d high CPU with thousands of https monitors with SNI
1936049 3-Major BT1936049 A configuration of wideips with same FQDNs but different paths may not be prevented by the control plane
1927993 3-Major BT1927993 Following knowledge-based article K7032 through steps 1-8 to freeze zone files may lead to a zone loaded before being able to run named-checkzone
1894113 3-Major BT1894113 GTM pool with min-members-up-value configured causes synchronisation problems after deleting virtual servers on LTM
1857473 3-Major BT1857473 A BIG-IP monitor may not get removed when changing product type from BIG-IP to Generic Host
1824113 3-Major BT1824113 GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent.
1754325 3-Major BT1754325 Disabled status from manual resume on a BIG-IP DNS pool can sync to other BIG-IP DNS devices in synchronization-group
1603605 3-Major BT1603605 DNS response is malformed when the response message size reaches 2017 bytes
1073673-6 3-Major BT1073673 Prevent possible early exit from persist sync
464708-7 4-Minor BT464708 DNS logging does not support Splunk format log
2186625-1 4-Minor BT2186625 Zone transfer from dns express with dnssec enabled includes extra RRSIG
2130329 4-Minor BT2130329 [GTM] Deletion of topology records makes MCPD memory ramp up
2047585 4-Minor BT2047585 Modifying GTM monitor type from https to tcp to back https could set "compatibility" field to "none"
1826485 4-Minor BT1826485 Creating a GTM pool in a custom partition with a custom route domain via GUI can fail
1642301-5 4-Minor BT1642301 Loading single large Pulse GeoIP RPM can cause TMM core
1636273 4-Minor In BIND 9.18.28, a new configurable parameter (max-records-per-type) has been introduced with a default limit of 100 to address a security issue.
1014761-7 4-Minor BT1014761 [DNS][GUI] Not able to enable/disable pool member from pool member property page
1225941-5 5-Cosmetic BT1225941 OLH Default Values on Notification and Early Retransmit Settings

Application Security Manager Issues

ID Number Severity Links to More Info Description
1934373-3 2-Critical BT1934373 DoS attack is blocking while transparent
1824745-3 2-Critical BT1824745 Bd crash and generate core
1787645-4 2-Critical BT1787645 BD process fail to startup on specific XML configuration
1755113-5 2-Critical BT1755113 BD crash with specific JSON schema
902445-6 3-Major BT902445 ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation
2289885-2 3-Major BT2289885 Malformed protobuf file synced from secondary blades cause asmlogs coredump
2260293-3 3-Major LiveUpdate status stuck on Pending after successful installation
2256725-1 3-Major Unable to trigger "Disallowed file upload content detected" violation in some cases
2252129-1 3-Major The database (BD) fails to start up (restart loops)
2225313-3 3-Major ASM CAPTCHA refresh and audio icons are missing after policy import
2200537-2 3-Major BT2200537 Audio captcha script error
2200405-3 3-Major BT2200405 Live Update proxy.host value requires brackets around IPv6 Addresses
2185537-3 3-Major BT2185537 Application Security Administrator role cannot edit the General Settings of parent policies from the GUI
2185109-3 3-Major High memory usage in REST query for ASM policies and virtualServers with huge L7 policy
2053893-4 3-Major BT2053893 Incompletely-synced ASM configuration can be synced back to the original device or group
1920637-4 3-Major BT1920637 Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade
1848541-1 3-Major BT1848541 Invalid regular expression causing bd restart loop
1827821-3 3-Major BT1827821 isBase64 params and headers not blocking Attack Signatures
1772353-3 3-Major BT1772353 Defaults for Associated Violations are re-added to a policy
1586877-3 3-Major BT1586877 Behavior difference in auto-full sync virtual server and manual-incremental config sync
1429813-6 3-Major BT1429813 ASM introduce huge delay from time to time
1280813-5 3-Major BT1280813 'Illegal URL' violation may trigger after upgrade
1021201-3 3-Major BT1021201 JSON parser is not fully UTF-8 compliant
638863-4 4-Minor BT638863 Attack Signature Detected Keyword is not masked in the logs
2230613-3 4-Minor Bot defense stateful anomalies and microservices not fully enforced on blade setups
2228753-1 4-Minor BT2228753 Violation_details may contain unexpected line break
2162873-3 4-Minor Pipe and backslash characters are not escaped in ArcSight CEF remote logging
2149333-1 4-Minor BT2149333 BD_XML logs memory usage at TS_DEBUG level
1782057-4 4-Minor BT1782057 BD crash related to dns lookup
1572045-3 4-Minor BT1572045 Login page config parameters are still case-sensitive with a case insensitive policy
1036289-4 4-Minor BT1036289 Signature ID not displayed in Attack Signature details

Application Visibility and Reporting Issues

ID Number Severity Links to More Info Description
1848577-3 2-Critical BT1848577 VCMP guest stats are not visible on vCMP host GUI nor CLI
1294141-8 3-Major BT1294141 ASM Resources Reporting graph displays over 1000% CPU usage
868801-6 4-Minor BT868801 BIG-IP still sends STARTTLS if the 'No encryption' SNMP option is enabled
1298225-4 4-Minor BT1298225 Avrd generates core when dcd becomes unavailable due to some reason

Access Policy Manager Issues

ID Number Severity Links to More Info Description
2219209-1 2-Critical BT2219209 Resetting profile statistics may lead to memory corruption
2211137-3 2-Critical BT2211137 EPSEC upgrade fails when default package is pre-uploaded
2186185-1 2-Critical BT2186185 Apmd occasionally fails to process a request if SecurID agent is present
2171921-2 2-Critical BIG-IP APN and VPN - ACCESS can leak HUDEVT_REQUEST_DONE after responding
2162861-3 2-Critical BT2162861 'Connectors' creation screen does not appear
995877-3 3-Major BT995877 Edge Client 'Save Password'' checkbox not visible when 'Allow Password Caching' method is 'memory'
527119-12 3-Major BT527119 An iframe document body might be null after iframe creation in rewritten document.
2285101 3-Major APM policy export (ng_export) resulting in import failure for default oauth-request objects
2258853-2 3-Major BT2258853 [APM][SAML] SP automation fails to update, when bound to an IdP with a SAML Resource
2256681-1 3-Major BT2256681 [APM] ECA random rumber fetch is stuck after forced TMM Core
2198721-1 3-Major BT2198721 SAML apmd memory leak
2198589-3 3-Major BT2198589 BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client
2183233-3 3-Major BT2183233 TMM crash due to extra trailing CR/LF in iSession reconnects
2152545-2 3-Major BT2152545 [APM][SAML] High TMM memory sso_saml leak
2137909-2 3-Major BT2137909 Portal Access: unwanted decoding html entities in attribute values of HTML tags
2047137-3 3-Major BT2047137 TMM core may occur while using APM VDI with Blast UDP
1621977-1 3-Major BT1621977 Rewrite memoryleak with "REWRITE::disable" irule
1586405-4 3-Major BT1586405 "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page
1290937-4 3-Major 'contentWindow' of a dynamically genereated iframe becomes null
1074285-5 3-Major BT1074285 Apmd crashes while handling JWT tokens.
1071021-5 3-Major BT1071021 Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM
1022361-3 3-Major BT1022361 Edge Client shows HTML encoding for non-English endpoint inspection message
893161-3 4-Minor BT893161 Internal request to volatile.html used for cookie transport in Portal Access is sometime rewritten
869541-6 4-Minor BT869541 Series of unexpected <aborted> requests to same URL
869121-6 4-Minor BT869121 Logon Page configured after OAuth client in access policy VPE, get error message Access policy evaluation is already in progress for your current session
745645-5 4-Minor BT745645 Portal Access does not rewrite the script element with textNode children
349706-7 4-Minor NetworkAccess assigns 1.1.1.1 address to remote ppp endpoint APM VPN

Service Provider Issues

ID Number Severity Links to More Info Description
2187429-3 2-Critical BT2187429 TMM might crash when using MRF framework.
1268373-9 2-Critical BT1268373 MRF flow tear down can fill up the hudq causing leaks
2230889-3 3-Major BT2230889 SIP parser mishandles RFC 3261 folded headers, causing 200 OK forwarding failure with iRule routing
1156149-7 3-Major BT1156149 Early responses on standby may cause TMM to crash
836205-4 4-Minor [SIP-MRF] Transport-config source port behavior changed needs after upgrading to version with new source-port-mode attribute
2153897-1 4-Minor BT2153897 BIG-IP closes the transport connection immediately after sending a DPA to a peer

Advanced Firewall Manager Issues

ID Number Severity Links to More Info Description
680804-6 2-Critical BT680804 TMM restart due to delayed keep alives
2144397-3 2-Critical BT2144397 Problems compiling firewall policies when they contain rules using huge address lists
1974869-3 2-Critical BT1974869 Unable to load config after upgrading to v17.1.3/v17.5.x with the Syntax Error: "state" may not be specified more than once.
1671149-5 2-Critical BT1671149 Timestamp cookies may cause issue for PVA-accelerated connections
2218157-3 3-Major BT2218157 IP Intelligence database load log displayed periodically
2217793-3 3-Major BT2217793 I5800 AFM 17.5.1.3 - After upgrade to 17.5.1.3, unable to reorder rules under AFM policy.
2196597-1 3-Major BT2196597 TMM generates core when large firewall policy is attached to multiple virtual servers due to SOD watchdog timeout
2138181-1 3-Major BT2138181 Low thresholds for tcp-ack-ts vector caused outage after BIG-IP upgrade to 17.1.3
1991717-1 3-Major BT1991717 Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN's
1934865-3 3-Major BT1934865 Remove multiple redundant entries for port-list objects in configuration file
1818861-4 3-Major BT1818861 Timestamp cookies are not compatible with fastl4 mirroring.
1282029-2 3-Major BT1282029 Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0
760355-8 4-Minor BT760355 Firewall rule to block ICMP/DHCP from 'required' to 'default'
1366269-6 4-Minor BT1366269 NAT connections might not work properly when subscriber-id is confiured.

Policy Enforcement Manager Issues

ID Number Severity Links to More Info Description
2262537-1 2-Critical BT2262537 pem_sessiondump crashes when listing subscriber sessions with custom attributes
2195709-1 4-Minor BT2195709 TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.

Carrier-Grade NAT Issues

ID Number Severity Links to More Info Description
2229185-1 4-Minor BT2229185 Virtual server stops responding to ICMP requests
1128429-9 4-Minor BT1128429 Rebooting one or more blades at different times may cause traffic imbalance results High CPU

Anomaly Detection Services Issues

ID Number Severity Links to More Info Description
2263657-3 3-Major BT2263657 Crash in Bados Signature Management operations results in a memory leak

Traffic Classification Engine Issues

ID Number Severity Links to More Info Description
2141109-2 1-Blocking BT2141109 The URL categorisation daemon's DNS cache is never refreshed
2229525-3 2-Critical BT2229525 TMM crash due to stale shared memory mapping after wr_urldbd restart
1824965-5 3-Major Implement iRule support to fetch SNI from SSL, HTTP and QUIC traffic

Device Management Issues

ID Number Severity Links to More Info Description
942521-10 3-Major BT942521 Certificate Managers are unable to move certificates to BIG-IP via REST
717174-8 3-Major BT717174 WebUI shows error: Error getting auth token from login provider

Protocol Inspection Issues

ID Number Severity Links to More Info Description
760740-6 3-Major BT760740 Mysql error is displayed when saving UCS configuration on BIG-IP system when MySQL is not running
2217273-2 3-Major BT2217273 TMM crashes with a SIGFPE when it receives IPS traffic.
2144053-1 3-Major BT2144053 IPS hitless upgrade results in TMM clock advance
1069977-4 3-Major BT1069977 Repeated TMM SIGABRT during ips_flow_process_data

In-tmm monitors Issues

ID Number Severity Links to More Info Description
1019261-7 3-Major BT1019261 In-TMM HTTPS monitor with SSL Profile set to None does not use serverssl profile.
1002345-7 3-Major BT1002345 Transparent monitor does not work after upgrade

SSL Orchestrator Issues

ID Number Severity Links to More Info Description
2181633-1 3-Major BT2181633 Large BIG-IP SSL Orchestrator deployments can cause tmm crash
2138273-3 3-Major BT2138273 Named service fails to start after an upgrade due to unsupported attributes in the named.conf file
1589269-4 3-Major BT1589269 The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB

Client-Side Defense Issues

ID Number Severity Links to More Info Description
2229625-1 3-Major BT2229625 Client Side Defense silently fails with an empty 200 response when there is no route to the XC server

F5OS Messaging Agent Issues

ID Number Severity Links to More Info Description
2240945-1 1-Blocking platform_agent crash when deleting a virtual_server.
1690005-3 3-Major BT1690005 Unable to ping the floating self addresses from the Standby tenant

Known Issue details for BIG-IP v21.0.x

995877-3 : Edge Client 'Save Password'' checkbox not visible when 'Allow Password Caching' method is 'memory'

Links to More Info: BT995877

Component: Access Policy Manager

Symptoms:
The 'Save Password' checkbox is not displayed.

Conditions:
-- 'Allow Password Caching' is selected in the connectivity profile.
-- The 'Allow Password Caching' method is 'memory'.
-- From the Edge Client, access the virtual server.

Impact:
The 'Save Password' option does not exist on the logon page.

Workaround:
Use the 'disk' option in 'Allow Password Caching' instead of 'memory'.


978953-6 : The value of the sys db variable vlan.backplane.mtu intermittently out-of-sync with the value of the MTU of the kernel interface tmm_bp during the initial boot up

Links to More Info: BT978953

Component: Local Traffic Manager

Symptoms:
During the initial boot of the device the MTU of the tmm_bp kernel interface is out-of-sync with the value of sys db vlan.backplane.mtu as well as out-of-sync with the MTU displayed by the following command:
 tmsh show /net vlan all-properties -hidden.
 tmsh list net vlan tmm_bp all-properties -hidden.

Additionally, running the following command:

modify sys db vlan.backplane.mtu value <some value> (within the range accepted), and saving the configuration change does not last through a reboot.

Conditions:
This issue occurs on the first boot intermittently.

Impact:
When the values are seen at non-sync, after the modification of the backplane vlan mtu and saving the config, changing the mtu config value does not last through a reboot.

Workaround:
Rebooting the device resolves the issue


977953-8 : Show running config interface CLI could not fetch the interface info and crashes the imi

Links to More Info: BT977953

Component: TMOS

Symptoms:
The confd command 'show running-config' does not display interface information if nsm and bgpd are the only processes running.

If you run 'show running-config interface', imi crashes.

Conditions:
1. nsm and bgpd are the daemons running.
2. Run the "show running-config" command

Impact:
Imish cannot retrieve interface information from the show running-config command.

Workaround:
* Enable OSPF. For example,

  # tmsh modify /net route-domain 0 routing-protocol add { BGP OSPFv3 }

  # ps -ef | egrep -i ospf
  root 11954 4654 0 11:25 ? S 0:00 ospf6d%0


976853-3 : SNAT pool traffic-group setting may override non-floating self IP's traffic-group

Links to More Info: BT976853

Component: Local Traffic Manager

Symptoms:
A non-floating self IP fails to respond to ARP on the standby system.

Conditions:
An LTM SNAT translation address has been created which matches a non-floating self IP on the system, and the SNAT is configured in a floating traffic group.

Impact:
A standby device does not respond to ARP requests for floating IP addresses. If a SNAT is configured on the same IP as a non-floating self-ip on the standby, ARP responses will be disabled for that self-ip.

Even after deleting the snat, or configuring it for another IP, ARP response for that self-ip will remain disabled.

The effect of this will be that other IP devices will be unable to communicate with the self-ip after the ARP entry times out.

For example:


-- BIG-IP does not respond to ARP requests for the non-floating self-ip
-- ConfigSync no longer working (if the affected self IP is the ConfigSync address)
-- Health check traffic fails

Note that simply deleting the SNAT translation will not restore service to the self-ip.

Workaround:
Delete the SNAT address, and then move the self-ip back to the non-floating traffic group, and disable and re-enable the arp setting by creating a virtual-address with the same IP in the non-floating traffic-group, and then deleting it.

    tmsh create ltm virtual-address <self-ip> arp enabled traffic-group traffic-group-local-only
    tmsh modify ltm virtual-address <self-ip> arp disabled
    tmsh delete ltm virtual-address <self-ip>

Alternatively, after deleting the SNAT translation, reboot the device (or at least restart tmm). When using this approach on multi-blade chassis devices, all blades need to be restarted.


967769-5 : During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks

Links to More Info: BT967769

Component: TMOS

Symptoms:
Tmm crashes and restarts. The following panic message is found in /var/log/tmm:

    notice panic: ../dev/hsb/if_hsb.c:6129: Assertion "HSB lockup, see ltm and tmm log files" failed.

Conditions:
-- Some error or glitch is detected on the high-speed bus (HSB).
-- Software commands a reset of the HSB and interface hardware.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


967353-10 : HTTP proxy should trim spaces between a header field-name and colon in its downstream responses.

Links to More Info: BT967353

Component: Local Traffic Manager

Symptoms:
Client receives no response along with a connection reset by the BIG-IP system.

Conditions:
-- HTTP profile is enabled on the BIG-IP system.
-- Server sends HTTP response with one or more header field names separated with the trailing colon by a space.

Impact:
HTTP responses that should be delivered to the client by the proxy are not being sent out.

Workaround:
None


950665-3 : Pool and pool members created for dynamic ECMP routes are not freed

Links to More Info: BT950665

Component: Local Traffic Manager

Symptoms:
-- Dynamic ECMP routes.
-- High usage of TMM memory may be reported.
-- The ltm log may record the following errors:
err merged[9436]: 011b0900:3: TMSTAT error tmstat_remerge: Cannot allocate memory.

Conditions:
Dynamic routing is used and routes with more then one nexthop are repeatedly added and removed by the router(s)

Impact:
- tmm memory leak
- tmstat segments for tmm could grow very large.

Workaround:
Use a default gateway pool instead of dynamic routing for routes with more then one nexthop - https://support.f5.com/csp/article/K15582


942521-10 : Certificate Managers are unable to move certificates to BIG-IP via REST

Links to More Info: BT942521

Component: Device Management

Symptoms:
You cannot upload a cert/key via the REST API if you are using a certificate manager account

Conditions:
-- Using the REST API to upload a certificate and/or key
-- User is logged in as a Certificate Manager

Impact:
Unable to upload certificates as Certificate Manager

Workaround:
Use admin account instead of using Certificate Manager account to upload certs and keys


941961-9 : Upgrading system using WAM TCP profiles may prevent the configuration from loading

Links to More Info: BT941961

Component: TMOS

Symptoms:
If a BIG-IP is on version 13.1.0 through 15.1.x and has profiles in use that use wam-tcp-wan-optimized and/or wam-tcp-lan-optimized as parent profiles, then when the configuration is upgraded to 16.0.0, the configuration fails to load, with an error similar to:

err mcpd[10087]: 01020036:3: The requested parent profile (/Common/wam-tcp-wan-optimized) was not found.

On devices that are provisioned with not just the LTM module this may lead to an out of memory condition as the config load failure prevents memory provisioning completing leaving too little 4KB page (host) memory and too much huge page memory.

If suffering memory pressure then management access to device will be sluggish or not possible.

Conditions:
-- Upgrading from version 13.1.0 through 15.1.x.
-- Using profiles derived from wam-tcp-wan-optimized and/or wam-tcp-lan-optimized.

Impact:
Configuration does not load.

Workaround:
Remove these profiles and adjust the configuration elements that use them accordingly. If it is difficult to work on the device it may be necessary to rollback to earlier version and make changes there. Usually it would be better then to delete newer software volume and reinstall it at which point the modified config will be copied across and installed on newer volume.

Here are two examples:

-- Copy the definition of 'wam-tcp-wan-optimized' from /defaults/wam_base.conf into /config/bigip.conf, and then reload the configuration.

-- Change the references to wam-tcp-wan-optimized to something else in your config file (e.g., tcp-wan-optimized), and then reload the configuration.


936777-10 : Old local config is synced to other devices in the sync group.

Links to More Info: BT936777

Component: Global Traffic Manager (DNS)

Symptoms:
Newly added DNS/GTM device may sync old local config to other devices in the sync group.

Conditions:
Newly added DNS/GTM device has a more recent change than other devices in the sync group.

Impact:
Config on other DNS/GTM devices in the sync group are lost.

Workaround:
You can use either of the following workarounds:

-- Make a small DNS/GTM configuration change before adding new devices to the sync group.

-- Make a small DNS/GTM configuration change on the newly added device to re-sync the correct config to other DNS/GTM devices.


932553-10 : An HTTP request is not served when a remote logging server is down

Links to More Info: BT932553

Component: Local Traffic Manager

Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.

Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.

Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.

Workaround:
None.


929173-9 : Watchdog reset due to CPU stall detected by rcu_sched

Links to More Info: BT929173

Component: TMOS

Symptoms:
Rcu_sched detected CPU stall, which can cause vCMP host reboot. The device reboots without core and records "Host Watchdog timeout."

Typically there will logs in kern.log similar to:
err kernel: : [526684.876928] INFO: rcu_sched detected stalls on CPUs/tasks: ...

Conditions:
Host undergoing a watchdog reset in a vCMP environment.

Impact:
CPU RCU stalls and host watchdog reboots


928665-8 : Kernel nf_conntrack table might get full with large configurations.

Links to More Info: BT928665

Component: TMOS

Symptoms:
Linux host connections are unreliable, and you see warning messages in /var/log/kern.log:

warning kernel: : [182365.380925] nf_conntrack: table full, dropping packet.

Conditions:
This can occur during normal operation for configurations with a large number of monitors, for example, 15,000 or more active entries.

Impact:
Monitors are unstable/not working at all.

Workaround:
1. Modify /etc/modprobe.d/f5-platform-el7-conntrack-default.conf
increasing the hashsize value:

options nf_conntrack hashsize=262144

2. Save the file.
3. Reboot the system.


928445-11 : HTTPS monitor is down when server_ssl profile cipher string is configured to TLSv1_2

Links to More Info: BT928445

Component: Local Traffic Manager

Symptoms:
HTTPS monitor is down when the Server SSL profile associated with the monitor utilises a cipher string containing a keyword such as '!TLSv1_1' or '!TLSv1_2' to disable TLS protocol version.

A configured cipher string, such as TLSv1_2 or TLSv1_1 is rejected by OpenSSL.

Conditions:
-- Pool member is attached to the HTTPS monitor.
-- HTTPS monitor is configured with a Server SSL profile.
-- Server SSL profile is configured with cipher string containing a keyword such as '!TLSv1_2' and/or '!TLSv1_1' to disable TLS protocol version.

Impact:
Pool status is down.

Workaround:
-- Enable 'in-tmm' monitoring.
-- Use the 'Options List' setting available in the Server SSL profile to disable TLS protocol version instead of cipher string.
-- Use the same cipher string with cipher group / cipher rule that is attached to the SSL profile.


923745-8 : Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition

Links to More Info: BT923745

Component: TMOS

Symptoms:
A device reboot occurs upon sending a Ctrl-Alt-Del signal to the console of a BIG-IP Virtual Edition (VE) virtual machine.

Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console.
This signal may be sent in different ways according to the interface used to connect to the console of the BIG-IP virtual machine.

Impact:
Accidental reboots of the BIG-IP VE instance are possible. You should not reboot a BIG-IP VE instance using Ctrl-Alt-Del.

Workaround:
To disallow the effect of this key chord, run the following command from the advanced shell (bash):

systemctl mask ctrl-alt-del.target


921069-7 : Neurond cores while adding or deleting rules

Links to More Info: BT921069

Component: TMOS

Symptoms:
Neurond cores if it receives error while adding or deleting rules in neuron hardware.

Conditions:
Adding or deleting rules in neuron hardware

Impact:
Neurond cores

Workaround:
None


912293-9 : Persistence might not work properly on virtual servers that utilize address lists

Links to More Info: BT912293

Component: Local Traffic Manager

Symptoms:
-- Connections to the virtual server might hang.
-- Increased tmm CPU utilization. This can occur after upgrading.

Conditions:
-- A virtual server is configured with a traffic-matching-criteria that utilizes a source-address-list and/or destination-address-list.

-- The virtual server utilizes certain persistence one of the following persistence types:
  + Source Address (but not hash-algorithm carp)
  + Destination Address (but not hash-algorithm carp)
  + Universal
  + Cookie (only cookie hash)
  + Host
  + SSL session
  + SIP
  + Hash (but not hash-algorithm carp)

Impact:
-- High tmm CPU utilization.
-- Stalled connections.

Workaround:
Enable match-across-virtuals in the persistence profile.

Note: Enabling match-across-virtuals might affect the behaviour of other virtual servers in the configuration that utilise persistence.


905477-9 : The sdmd daemon cores during config sync when multiple devices configured for iRules LX

Links to More Info: BT905477

Component: Local Traffic Manager

Symptoms:
The iRules LX workspaces belong on only one device in a Device Service Cluster (DSC) (config sync device-group). If you have the same iRules LX workspace configured on multiple devices and then perform a config sync operation, the sdmd daemon cores.

Conditions:
-- Multiple devices configured with the same iRules LX workspace in a DSC.
-- Change one of the devices such that the configuration requires a config sync.
-- Perform the config sync.

Impact:
The sdmd daemon cores. Although having multiple devices configured with the same iRules LX workspace is an incorrect configuration, sdmd should not core.

Workaround:
When the iRules LX workspace is correctly configured, i.e., on only one device in a DSC, there is no need to config sync, so this issues does not occur.


902445-6 : ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation

Links to More Info: BT902445

Component: Application Security Manager

Symptoms:
ASM event logging stops working.

Conditions:
This can occur during normal ASM operation. It occurs after ASM executes 'No space in shmem' error disconnection mitigation, and this error is logged.

Impact:
ASM Policy Event Logging stop working; new event is not saved.

Workaround:
Restart asmlogd and pabnagd:
pkill asmlogd
pkill pabnagd


898389-9 : Traffic is not classified when adding port-list to virtual server from GUI

Links to More Info: BT898389

Component: Local Traffic Manager

Symptoms:
Traffic is not matching to the virtual server.

Conditions:
Using the GUI to configure traffic-matching-criteria by adding port-list to the virtual server.

Impact:
Traffic loss.

Workaround:
Creating traffic-matching-criteria from the command line

root@(localhost)(cfg-sync Standalone)(Active)(/Common)(tmos)# create ltm traffic-matching-criteria tmc_name_here destination-address-inline <IP ADDR>%10 route-domain <Route domain name>


893161-3 : Internal request to volatile.html used for cookie transport in Portal Access is sometime rewritten

Links to More Info: BT893161

Component: Access Policy Manager

Symptoms:
Request to volatile.html gets rewritten which reaches the backend server causing error responses from backend server.

Conditions:
Re-definition of XMLHttpREquest.prototype.open in the web application.

Impact:
Error response from the back end server since volatile.html is internal to Portal Access

Workaround:
Custom iRule, there is no generic irule but it can be implemented depending on the web application requirement.

Sample iRule:
XXXXX is web application path

#
# workaround for rewritten request for /volatile.html
# (remove link to opener if opener is full webtop)
#

when REWRITE_REQUEST_DONE {
  if {
    [HTTP::path] ends_with "XXXXX"
  } {

    # log "URI=([HTTP::path])"
    # Found the file to modify

    REWRITE::post_process 1
    set do_fix 1
  }
}

when REWRITE_RESPONSE_DONE {
  if {[info exists do_fix]} {
    unset do_fix

    set str {if(typeof(F5_flush)!=='function')}

    set strt [string first $str [REWRITE::payload]]

    if {$strt > 0} {
      REWRITE::payload replace 0 $strlen {
         if (window.opener && window.opener.name === 'F5_Opener') window.opener=null;
      }
    }
  }


891333-7 : The HSB on BIG-IP platforms can get into a bad state resulting in packet corruption.

Links to More Info: K32545132, BT891333

Component: TMOS

Symptoms:
Networking connectivity issues, such as ARP resolution issues, high availability (HA) failures, health monitor instability, etc.

Packet captures with Wireshark or tshark can be used to show bit-errors/corruption in the network packet for traffic passing through the HSB. This corruption can occur in various parts of the packet such as the MAC address, EtherType, packet checksums, etc.

Conditions:
This can occur on BIG-IP hardware platforms containing a high-speed bridge (HSB).

Impact:
Network connectivity problems on some traffic passing through the affected HSB. Could be reflected in the status of Config Sync or more health monitors down on one member of HA pair.

Workaround:
Reboot the affected device.

If a reboot does not resolve the issue, then its most likely a hardware issue. Please work with Support on a RMA.

F5 has introduced a detection mechanism in newer versions of code. Please refer to the following document for more details: https://cdn.f5.com/product/bugtracker/ID1211513.html


886045-9 : Multi-NIC instances fail to come up when trying to use memory-mapped virtio device

Links to More Info: BT886045

Component: Local Traffic Manager

Symptoms:
Multi-NIC instances fail to come up while using memory-mapped virtio device.

Running the command 'lspci -s <pci-id> -vv' results in the 'region' field reporting 'Memory at xxxxx'.

Conditions:
TMM crashes as soon as the BIG-IP system tries to come up.

Impact:
The BIG-IP system fails to attach to the underlying virtio devices.

Workaround:
Switch to the sock driver by overriding tmm_init.tcl.

For instructions on how to enable the sock driver, see the workaround in K74921042: BIG-IP VE may fail to process traffic after upgrading the VMware ESXi 6.7 host to Update 2 (or later), available at https://support.f5.com/csp/article/K74921042.


883149-10 : The fix for ID 439539 can cause mcpd to core.

Links to More Info: BT883149

Component: TMOS

Symptoms:
Mcpd cores during config sync.

Conditions:
This occurs on rare occasions when the device transitions from standby to active, and the connection between the BIG-IP peers stalls out.

Impact:
Mcpd cores. Traffic disrupted while mcpd restarts.

Workaround:
None


881937-7 : TMM and the kernel choose different VLANs as source IPs when using IPv6.

Links to More Info: BT881937

Component: Local Traffic Manager

Symptoms:
IPv6 traffic generated from the host, either from a host daemon, monitors, or from the command line, can use a MAC and IPv6 source address from different VLANs.

Conditions:
-- Multiple VLANs configured with IPv6 addresses.
-- Multiple routes to the same destination, either the same or more specific, default routes, etc., that cover the traffic destination.
-- Changes are made to routes that cause the traffic to the destination to shift from one VLAN and gateway to another. This can be typically observed with dynamic routing updates.
- The db key snat.hosttraffic is set to disable.

Impact:
Traffic to the destination may fail because the incorrect source IPv6/MAC address is used, which might cause monitor traffic to fail.

Workaround:
Tmsh list sys db snat.hosttraffic
tmsh modify sys db snat.hosttraffic value enable
tmsh save sys config


870349-6 : Continuous restart of ntlmconnpool after the license reinstallation

Links to More Info: BT870349

Component: TMOS

Symptoms:
The ntlmconnpool process continuously restarts after reinstalling the license. The system reports a message in the BIG-IP console:

Re-starting ntlmconnpool.

The BIG-IP may show as 'Disconnected', and 'TMM outbound listener not yet created' messages may be present in /var/log/ltm.

Conditions:
This occurs when you upgrade your license such that the new license changes the number of available TMMs.

Impact:
The system requires a reboot and reports a ‘Re-starting ntlmconnpool’ message continuously in the BIG-IP console.

Workaround:
To resolve the issue, it is necessary to reboot. Once the system restarts, it operates as expected.


869541-6 : Series of unexpected <aborted> requests to same URL

Links to More Info: BT869541

Component: Access Policy Manager

Symptoms:
Series of unexpected <aborted> requests to same URL

Conditions:
Web-app using special code pattern in JavaScript.

For example:

     loc = window.location;

     obj = {}

     for (i in loc) {
        obj[i] = loc[i];
     }

Impact:
Page load is aborted

Workaround:
Following iRule can be used with customized SPECIFIC PAGE_URL value:

when REWRITE_REQUEST_DONE {
  if {
    [HTTP::path] ends_with "SPECIFIC_PAGE_URL"
  } {

    # log "URI=([HTTP::path])"
    # Found the file we wanted to modify

    REWRITE::post_process 1
    set do_fix 1
  }
}

when REWRITE_RESPONSE_DONE {
  if {[info exists do_fix]} {
    unset do_fix

    set strt [string first {<script>try} [REWRITE::payload]]

    if {$strt > 0} {
      REWRITE::payload replace $strt 0 {
        <script>
          (function () {
            var dl = F5_Deflate_location;
            F5_Deflate_location = function (o) {
              if (o.F5_Location) Object.preventExtensions(o.F5_Location)
              return dl(o);
            }
          })()
        </script>
      }
    }
  }
}


869121-6 : Logon Page configured after OAuth client in access policy VPE, get error message Access policy evaluation is already in progress for your current session

Links to More Info: BT869121

Component: Access Policy Manager

Symptoms:
When 'Logon Page' agent is configured after 'OAuth client' in access policy VPE, you see an error message that says 'Access policy evaluation is already in progress for your current session'

Conditions:
In access VPE, Logon page after OAuth client agent in standard customization type.

Impact:
Cannot process further to reach resources.

Workaround:
Try to configure the access policy in Modern customization if it's not already configured that way.

When message box configured after OAuth client and observing the same above Access policy evaluation error message

Workaround:
Use a 'Logon Page' agent instead of the 'Message Box' agent and configure it such as:

all fields Type will be set to 'none'
message for the users will be mentioned in the 'Form Header text' field
Logon Button value will be changed from 'Logon' to 'Continue'

This should simulate exactly the look and feel of a message box but will prevent the issue from happening.


868801-6 : BIG-IP still sends STARTTLS if the 'No encryption' SNMP option is enabled

Links to More Info: BT868801

Component: Application Visibility and Reporting

Symptoms:
The SMTP 'No Encryption' configuration option is not honored by the BIG-IP device.

Conditions:
The 'No Encryption' option is selected under the SMTP configuration object.

Impact:
BIG-IP disregards its SMTP configuration and attempts to initiate TLS.

Workaround:
None


867985-9 : LTM policy with a 'shutdown' action incorrectly allows iRule execution

Links to More Info: BT867985

Component: Local Traffic Manager

Symptoms:
BIG-IP systems provide manipulation tools over a connection with an LTM policy and/or iRule. LTM policy takes precedence over iRules and has an option to shutdown a connection based on satisfied conditions. When a connection is closing, an iRule should not be executed under the same conditions.

Conditions:
-- The BIG-IP system has a virtual server with an LTM policy and an iRule.
-- The LTM policy has action 'shutdown connection' under certain conditions.
-- The iRule has an event which is triggered under the same conditions.

Impact:
The iRule is executed before the connection is being reset.

Workaround:
None.


857769-6 : FastL4+HTTP or FastL4+Hash-Persistence virtual servers do not work correctly in DSR mode.

Links to More Info: BT857769

Component: Local Traffic Manager

Symptoms:
Given a long-lived TCP connection that can carry multiple client requests (for example, but not limited to, HTTP requests), the BIG-IP system fails to forward requests after the forty-eighth one.

The client will try re-transmitting the answered request, but the BIG-IP system will persist in dropping it.

Conditions:
This issue occurs when all of the following conditions are met:

1) The virtual server uses the FastL4 profile.
2) The virtual server also uses the HTTP or Hash-Persistence profiles.
3) The virtual server operates in DSR (Direct Server Return) mode (also known as N-Path).

Impact:
The BIG-IP system fails to forward traffic.

Workaround:
Do not use the HTTP or Hash-Persistence profiles with a FastL4 virtual server operating in DSR mode.

Note: It is fine to use an iRule that calls hash persistence commands (for example, "persist carp [...]") as long as the Hash-Persistence profile is not associated to the virtual server. This technique will allow you to persist on a hash based on L4 information that you can extract at CLIENT_ACCEPTED time. For example, the following iRule correctly persists a specific client socket to a pool member in a FastL4 DSR configuration:

when CLIENT_ACCEPTED {
   persist carp [IP::client_addr]:[TCP::client_port]
}


851837-7 : Mcpd fails to start for single NIC VE devices configured in a trust domain

Links to More Info: BT851837

Component: TMOS

Symptoms:
Single NIC BIG-IP Virtual Edition (VE) devices configured in a trust domain (e.g., in high availability (HA)) cannot reload a running configuration when restarted and/or when mcpd fails to load the config, and reports a validation error:

err mcpd[25194]: 0107146f:3: Self-device config sync address cannot reference the non-existent Self IP ([IP ADDR]); Create it in the /Common folder first.

Conditions:
Single NIC VE devices configured in a trust domain (e.g., HA)

Impact:
The mcpd process fails to start, and the configuration does not load.

Workaround:
Manually copy and paste the self IP configuration snippet into the /config/bigip_base.conf file:

1. Connect to the CLI.

2. Edit bigip_base.conf, and add the following:

net self self_1nic {
    address 10.0.0.1/24
    allow-service {
       default
    }
    traffic-group traffic-group-local-only
    vlan internal
}

Note: replace 10.0.0.1 with the IP indicated in the error message

3. Save the changes and exit.

4. Load the configuration using the command:
tmsh load sys config

5. If APM or ASM is provisioned/configured, then also restart services with this command:
bigstart restart


842137-9 : Keys cannot be created on module protected partitions when strict FIPS mode is set

Links to More Info: BT842137

Component: Local Traffic Manager

Symptoms:
When the Hardware Security Module (HSM) FIPS mode is set to FIPS 140-2 Level 3 protection, new keys cannot be created in the module's protected partition.

Note: Although FIPS grade Internal HSM (PCI card) is validated by the Marvell company at FIPS 140-2 Level 3, the BIG-IP system is not 140-2 Level 3 validated.

Conditions:
-- FIPS 140-2 Level 3 protection is configured on a NetHSM partition.
-- You attempt to create a FIPS key using that partition.

Impact:
New Keys cannot be create.

Workaround:
Follow these steps to generate a new NetHSM key called 'workaround' and install it into the BIG-IP config:

1. Generate the key:

[root@bigip1::Active:Standalone] config # fipskey.nethsm --genkey -o workaround -c module
WARNING: fipskey.nethsm will soon be deprecated for use with Thales. Please switch to using tmsh commands instead.
tmsh commands...

Generate Key:
tmsh create sys crypto key <key_name> security-type nethsm [gen-certificate|gen-csr] ...
For an exhaustive list of options, please consult F5's tmsh documentation.
Generate CSR for existing key:
tmsh create sys crypto csr <csr_name> key <key name> ...
For an exhaustive list of options, please consult F5's tmsh documentation.
Generate Self-Signed Certificate for existing key:
tmsh create sys crypto cert <cert_name> key <key name> ...
For an exhaustive list of options, please consult F5's tmsh documentation.
Delete Key:
tmsh delete sys crypto key <keyname>


str[cd /shared/tmp && /opt/nfast/bin/generatekey -b pkcs11 certreq=yes selfcert=yes protect=module size=2048 embedsavefile="workaround" plainname="workaround" digest=sha256]
key generation parameters:
 operation Operation to perform generate
 application Application pkcs11
 protect Protected by module
 verify Verify security of key yes
 type Key type RSA
 size Key size 2048
 pubexp Public exponent for RSA key (hex)
 embedsavefile Filename to write key to workaround
 plainname Key name workaround
 x509country Country code
 x509province State or province
 x509locality City or locality
 x509org Organisation
 x509orgunit Organisation unit
 x509dnscommon Domain name
 x509email Email address
 nvram Blob in NVRAM (needs ACS) no
 digest Digest to sign cert req with sha256

Key successfully generated.
Path to key: /opt/nfast/kmdata/local/key_pkcs11_ua882aa9fadee7e440772cb6686358f4b283922622
Starting synchronisation, task ID 5de83486.6e9e32d7f367eaf4
Directory listing failed: No such file or directory


2. Confirm the presence of the key with the label 'workaround':

[root@bigip1::Active:Standalone] config # nfkminfo -l

Keys with module protection:

 key_pkcs11_ua882aa9fadee7e440772cb6686358f4b283922622 `workaround'

Keys protected by cardsets:
...


3. Install the key:

[root@bigip1::Active:Standalone] config # tmsh install sys crypto key workaround from-nethsm


4. Install the public certificate:

[root@bigip1::Active:Standalone] config # tmsh install sys crypto cert workaround from-local-file /config/ssl/ssl.crt/workaround


836205-4 : [SIP-MRF] Transport-config source port behavior changed needs after upgrading to version with new source-port-mode attribute

Component: Service Provider

Symptoms:
A new parameter "source-port-mode" was added in MRF transport-config in V16.0.0; its default setting is "Change".

Users who upgrade from an older configuration version and have a value set in source-port will experience a change in behavior after updating. To achieve equivalent behavior when upgrading to the new config, the source-port should retain its value, but IF it is non-zero, the source-port-mode should be set to preserve-strict.

Conditions:
When BIG-IP is upgraded from a version without the Transport-Config:source-port-mode setting to a version (v16.0.0 or later) that includes it.

Transport-Config with non-zero source-port configured.

Impact:
After BIG-IP upgrading, with the same transport-config, BIG-IP changed the source-port when connecting to a pool member, and caused SIP responses to be unable to be sent back to the client.

Workaround:
Manually change "source-port-mode" to "preserve-strict" after upgrade.


824953-1 : The sFlow sample collection for VLAN does not work with VLAN groups

Links to More Info: BT824953

Component: TMOS

Symptoms:
The sFlow FLOW packets containing traffic samples for a VLAN are not generated and not sent to the receiver, although CNTR telemetry packets are sent.

Conditions:
-- The VLAN is a member of a VLAN group.
-- The VLAN has sFlow packet sampling configured and enabled.

Impact:
No traffic samples are available from the VLANs that are part of VLAN groups.

Workaround:
Although there is no workaround for VLANs that are part of VLAN groups, the sFlow traffic samples work with VLANs that are not part of VLAN groups.


824437-11 : Chaining a standard virtual server and an ipother virtual server together can crash TMM.

Links to More Info: BT824437

Component: Local Traffic Manager

Symptoms:
TMM crashes with a SIGFPE and restarts. The TMM logs contain the following panic message:

Assertion "xbuf_delete_until successful" failed.

Conditions:
This issue occurs when the following conditions are met:

-- The system has been configured with a standard virtual server and an Any IP (ipother) virtual server chained together. This can be done explicitly using an iRule that features the 'virtual' command to connect the two virtual servers, or implicitly with certain APM configurations.

-- The pool member on the server-side asks this specific virtual server configuration on the BIG-IP system to retransmit data.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Ensure the target virtual server in the chain configuration does not use the ipother profile.


821589-7 : DNSSEC does not insert NSEC3 records for NXDOMAIN responses

Links to More Info: BT821589

Component: Global Traffic Manager (DNS)

Symptoms:
DNSSEC does not insert NSEC3 records for NXDOMAIN responses.

Conditions:
-- "process-xfr yes" is set for the dns profile associated with the listener;
And
-- There is no "Zone Transfer Clients" nameserver configured for that zone.
And
-- There is no wideip configured.

Impact:
DNSSEC does not respond NSEC3 for non-existent domain.

Workaround:
1. Change this setting for dns profile from "process-xfr yes" to "process-xfr no";
Or
2. Add a nameserver for "Zone Transfer Clients" of that zone.
Or
3. Add a wideip.


812693-8 : Connection in FIN_WAIT_2 state may fail to be removed

Links to More Info: BT812693

Component: Local Traffic Manager

Symptoms:
If a connection that has a fully closed client-side, but a server-side still in FIN_WAIT_2, receives a SYN matching the same connflow, the idle time is reset. This can result in the fin-wait-2-timeout never being reached. The SYN will be responded to with a RST - 'TCP Closed'

Conditions:
- Client side connection has been fully closed. This may occur if a client SSL profile is in use and an 'Encrypted Alert' has been received.
- Server side has sent a FIN which has been ACK'd, but no FIN has been received from the server.
- SYN received matching the existing connflow before the FIN-WAIT-2-timeout has been reached (300 default).

Impact:
Connection may fail to be removed in a timely manner. New connection attempts are RST with 'TCP Closed'

Workaround:
You can use either of the following:
-- Ensure servers are sending FIN's so as not to leave the connection in a FIN_WAIT_2 state.

-- Mitigate the issue by lowering the FIN-WAIT-2-timeout to a smaller value, e.g., FIN-WAIT-2-timeout 10.


809089-8 : TMM crash after sessiondb ref_cnt overflow

Links to More Info: BT809089

Component: TMOS

Symptoms:
Log message that indicates this issue may happen:
session_reply_multi: ERROR: unable to send session reply: ERR_BOUNDS
[...] valid s_entry->ref_cnt

Conditions:
-- Specific MRF configuration where a single router is configured and shared by ~500 virtual servers

-- also the traffic is routed by iRules similar to the following iRule: MR::message route peer "peer-[IP::local_addr]-[TCP::local_port]" that sends traffic to the same destination IP, 500 destination ports that could lead to a huge number of session entries owned by a single tmm.

-- High rate of session lookups with a lot of entries returned.

Note: This issue does not affect HTTP/2 MRF configurations.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
- Create unique MRF routers and assign a different MRF router to each virtual server
- Use different destination IP address


Note: while this issue seems to be a generic sessionDB issue, above provided workaround is when it is only evident that MRF config seems to be causing the issue.


804089-5 : iRules LX Streaming Extension dies with Uncaught, unspecified error event

Links to More Info: BT804089

Component: Local Traffic Manager

Symptoms:
You are using a virtual with an ilx profile generated from an iRules LX Streaming extension and observed the following error or similar.
  
Sep 05 09:16:52 pid[5850] Error: Uncaught, unspecified "error" event. (ETIMEDOUT)
Sep 05 09:16:52 pid[5850] at ILXFlow.emit (events.js:163:17)
Sep 05 09:16:52 pid[5850] at ILXFlowWrap.ilxFlowErrorCb [as onIlxError] (/var/sdm/plugin_store/plugins/<pluginName>/extensions/<workspaceName>/node_modules/f5-nodejs/lib/ilx_flow.js:108:10)

Conditions:
Virtual server with an ilx profile generated from an iRules LX Streaming extension. The problem is aggravated if a web-acceleration profile is configured.

Impact:
Traffic may be disrupted until the sdmd daemon has respawned another node.js process.


791365-8 : Bad encryption password error on UCS save

Links to More Info: BT791365

Component: TMOS

Symptoms:
When a user with the admin role attempts to save a UCS with a passphrase, the following error is encountered:

[resource-admin@inetgtm1dev:Active:Standalone] ucs # tmsh save sys ucs /var/local/ucs/test-ucs passphrase password
Saving active configuration...
Error: Bad encryption password. <=========
Operation aborted.
/var/tmp/configsync.spec: Error creating package

WARNING:There are error(s) during saving.
        Not everything was saved.
        Be very careful when using this saved file!

Error creating package
Error during config save.
Unexpected Error: UCS saving process failed.

Conditions:
1) Log into the BIG-IP system as a user with admin role that has Advanced Shell access.
2) Attempt to create a UCS with a passphrase.

Impact:
Unable to save UCS with a passphrase.

Workaround:
This affects users logged in with the Admin role; you will be able to create a UCS with a passphrase while logged in firstly as root user and then use 'resource-admin' user to save a ucs with passphrase.


783077-5 : IPv6 host defined via static route unreachable after BIG-IP reboot

Links to More Info: BT783077

Component: TMOS

Symptoms:
Static route unreachable after BIG-IP system reboot.

Conditions:
-- Add a static route.
-- Issue a ping (works fine).
-- Reboot the BIG-IP system.
-- Issue a ping (cannot pint the route).

Impact:
Static route exists in both kernel and LTM routing table but unable to ping the route after rebooting the BIG-IP system.

Workaround:
Workaround-1:
Delete the IPv6 route entry and recreate the route by issuing the following commands in sequence:

tmsh delete net route IPv6
tmsh create net route IPv6 network 2a05:d01c:959:8408::b/128 gw fe80::250:56ff:fe86:2065 interface internal

Workaround-2:

net route /Common/IPv6 {
    gw fe80::456:54ff:fea1:ee02 <-- Change this address to unicast address from 2a05:d01c:959:8409::/64 network
    interface /Common/Internal
    mtu 1500
    network 2a05:d01c:959:8408::b/128
}


780437-11 : Upon rebooting a VIPRION chassis provisioned as a vCMP host, some vCMP guests can return online with no configuration.

Links to More Info: BT780437

Component: TMOS

Symptoms:
It is possible for a vCMP host to scan the /shared/vmdisks directory for virtual disk files while the directory is unmounted.

As such, virtual disk files that existed before the reboot will not be detected, and the vCMP host will proceed to create them again.

The virtual disks get created again, delaying the guests from booting. Once the guests finally boot, they have no configuration.

Additionally, the new virtual disk files are created on the wrong disk device, as /shared/vmdisks is still unmounted.

Symptoms for this issue include:

-- Running the 'mount' command on affected host blades and noticing that /shared/vmdisks is not mounted.

-- Running the 'tmsh show vcmp guest' command on affected host blades (early on after the reboot) and noticing some guests have status 'installing-vdisk'.

-- Running the 'lsof' command on affected and unaffected host blades shows different device numbers for the filesystem hosting the virtual disks, as shown in the following example (note 253,16 and 253,1):

qemu-kvm 19386 qemu 15u REG 253,16 161061273600 8622659 /shared/vmdisks/s1g2.img

qemu-kvm 38655 qemu 15u REG 253,1 161061273600 2678798 /shared/vmdisks/s2g1.img

-- The /var/log/ltm file includes entries similar to the following example, indicating new virtual disks are being created for one of more vCMP guests:

info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Adding.
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:0]
notice vcmpd[x]: 01510006:5: Guest (s2g1): Creating VDisk (/shared/vmdisks/s2g1.img)
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:1]
info vcmpd[x]: 01510007:6: Guest (s2g1): VS_ACQUIRING_VDISK->VS_WAITING_INSTALL
info vcmpd[x]: 01510007:6: Guest (s2g1): VS_WAITING_INSTALL->VS_INSTALLING_VDISK
notice vcmpd[x]: 01510006:5: Guest (s2g1): Installing image (/shared/images/BIGIP-12.1.2.0.0.249.iso) to VDisk (/shared/vmdisks/s2g1.img).
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:2]

Conditions:
-- VIPRION chassis provisioned in vCMP mode with more than one blade in it.

-- Large configuration with many guests.

-- The VIPRION chassis is rebooted.

-- A different issue, of type 'Configuration from primary failed validation' occurs during startup on one or more Secondary blades. By design, MCPD restarts once on affected Secondary blades, which is the trigger for this issue. An example of such a trigger issue is ID 563905: Upon rebooting a multi-blade VIPRION or vCMP guest, MCPD can restart once on Secondary blades.

Impact:
-- Loss of entire configuration on previously working vCMP guests.

-- The /shared/vmdisks directory, in its unmounted state, may not have sufficient disk space to accommodate all the virtual disks for the vCMP guests designated to run on that blade. As such, some guests may fail to start.

-- If you continue using the affected guests by re-deploying configuration to them, further configuration loss may occur after a new chassis reboot during which this issue does not happen. This occurs because the guests would then be using the original virtual disk files; however, their configuration may have changed since then, and so some recently created objects may be missing.

Workaround:
There is no workaround to prevent this issue. However, you can minimize the risk of hitting this issue by ensuring you are running a software version (on the host system) where all known 'Configuration from primary failed validation' issues have been resolved.

If you believe you are currently affected by this issue, please contact F5 Networks Technical Support for assistance in recovering the original virtual disk files.


779137-10 : Using a source address list for a virtual server does not preserve the destination address prefix

Links to More Info: BT779137

Component: Local Traffic Manager

Symptoms:
Configuring a network virtual server with a source address list causes the system to treat the virtual server as a host.

Conditions:
-- Configure a source address list on the virtual server.
-- Configure a network address for the destination of the virtual server (not an address list).

Impact:
Traffic does not flow to the virtual server as expected.

Workaround:
See K58807232


777389-10 : In rare occurrences related to PostgreSQL monitor, the mcpd process restarts

Links to More Info: BT777389

Component: TMOS

Symptoms:
Possible indications include the following:

-- Errors such as the following may appear in ltm/log:

   - notice postgres[10872]: [466-1] WARNING: pgstat wait timeout.
   - notice sod[27693]: 01140041:5: Killing /usr/bin/mcpd pid 7144.
   - BD_CONF|ERR| ...failed to connect to mcpd after 5 retries, giving up...
   - BD_CONF|ERR| ...can't read message from mcp conn, status:16908291.
   - BD_MISC|CRIT| ...Received SIGABRT - terminating.

-- Errors such as the following may appear in the dwbld/log:

   - Couldn't send BLOB notification - MCP err 16908291.
   - Got a terminate/abort signal - terminating ...
   - Terminating mcp_bridge thread.

-- Processes may restart unexpectedly, including mcpd, bd, and postgresql.

Conditions:
-- The 'mcpd' process attempts to read monitoring data from the PostgreSQL server, but no data is available.

-- A contributing factor might be that the AFM module is licensed but not configured.

Impact:
Failing to receive a monitoring response from the SQL server, MCPD goes into an infinite loop and skips the heartbeat report, resulting in its restart. While MCPD is restarting, the system is offline and does not process traffic. After restart, system operation returns to normal.

Workaround:
The chance of occurrence can be minimized by making sure that control-plane processes have sufficient memory to run efficiently.


775845-10 : Httpd fails to start after restarting the service using the iControl REST API

Links to More Info: BT775845

Component: TMOS

Symptoms:
After restarting httpd using the iControl REST API, httpd fails to start, even with a subsequent restart of httpd at the command line.

Similar to the following example:

config # restcurl -u admin:admin /tm/sys/service -X POST -d '{"name":"httpd", "command":"restart"}'
{
  "kind": "tm:sys:service:restartstate",
  "name": "httpd",
  "command": "restart",
  "commandResult": "Stopping httpd: [ OK ]\r\nStarting httpd: [FAILED]\r\n(98)Address already in use: AH00072: make_sock: could not bind to address n.n.n.n:n\nno listening sockets available, shutting down\nAH00015: Unable to open logs\n"
}

config # tmsh restart sys service httpd
Stopping httpd: [ OK ]
Starting httpd: [FAILED]

Conditions:
Restarting httpd service using iControl REST API.

Impact:
Httpd fails to start.

Workaround:
To recover from the failed httpd state, you can kill all instances of the httpd daemon and start httpd:

killall -9 httpd

tmsh start sys service httpd


760740-6 : Mysql error is displayed when saving UCS configuration on BIG-IP system when MySQL is not running

Links to More Info: BT760740

Component: Protocol Inspection

Symptoms:
When saving the configuration to a UCS file, the process tries save the IPS learning information stored in the MySQL database.

MySQL runs only when particular modules are provisioned. If MySQL was previously running as a result of different provisioning, but is not currently running, saving the configuration to a UCS file succeeds, but the system reports a spurious message during the operation:

Can't connect to local MySQL server through socket '/var/lib/mysql/mysql.sock.

Conditions:
-- Saving the configuration to a UCS file.
-- BIG-IP system provisioning only includes modules that do not require MySQL. These modules may include:
   + LTM
   + FPS
   + GTM (DNS)
   + LC
   + SWG
   + iLX
   + SSLo

-- BIG-IP system was previously provisioned with a module that starts MySQL, which results in the creation of the file /var/db/mysqlpw. These modules may include:
   + APM
   + ASM
   + AVR
   + PEM
   + AFM
   + vCMP

Impact:
The error message is cosmetic and has no impact on the UCS save process.

Workaround:
None.


760355-8 : Firewall rule to block ICMP/DHCP from 'required' to 'default'

Links to More Info: BT760355

Component: Advanced Firewall Manager

Symptoms:
If a firewall is configured on the management port with an ICMP rule, after upgrading to v14.1.x or later, the ICMP rule does not work.

Conditions:
- Firewall is configured on the management port.
- Firewall is configured with an ICMP rule to block.
- Firewall is configured with an ICMP rule to allow.

Impact:
ICMP packets cannot be blocked with a firewall rule to drop on the management port. ICMP packets are allowed from the management port and will not increase the counter even if explicitly allowed by a rule.

Workaround:
Run the following commands after upgrading to v14.1.x or later from earlier versions.

# /sbin/iptables -N id760355
# /sbin/iptables -I INPUT 1 -j id760355
# /sbin/iptables -A id760355 -i mgmt -p icmp --icmp-type 8 -s 172.28.4.32 -j DROP


759258-10 : Instances shows incorrect pools if the same members are used in other pools

Links to More Info: BT759258

Component: TMOS

Symptoms:
Monitor 'Instances' tab shows incorrect pools if the same members are used in other pools.

Conditions:
Steps to Reproduce:

1. Create custom monitor or use system default.
2. Assign that monitor to a test pool.
3. Navigate to Local Traffic :: Monitors, click the test monitor, then select the Instances tab.

Impact:
The test pool is displayed, as well any other pools that use the same member or members (but with other monitors assigned).

Workaround:
Use tmsh to list monitor instances

For example:

   tmsh show ltm monitor gateway-icmp /Common/gateway_icmp


758491-8 : When using NetHSM integration, after upgrade to 14.1.0 or later (or creating keys using fipskey.nethsm), BIG-IP cannot use the keys

Links to More Info: BT758491

Component: Local Traffic Manager

Symptoms:
For Thales:
The ltm/log shows SSL handshake failures with similar lines (this is for Diffie-Hellman Key Exchange):

-- warning bigip1 tmm1[28813] 01260013 SSL Handshake failed for TCP 192.0.2.1:5106 -> 192.0.2.200:5607
-- warning bigip1 tmm1[28813] 01260009 Connection error: ssl_hs_vfy_sign_srvkeyxchg:13583: sign_srvkeyxchg (80)
-- debug bigip1 tmm1[28813] 01260036 FIPS acceleration device error: fips_poll_completed_reqs: req: 4 status: 0x1 : Cancel
-- err bigip1 pkcs11d[26259] 01680002 Key table lookup failed. error.

After enabling pkcs11d debug, the pkcs11d.debug log shows:

-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute class CKO_PRIVATE_KEY attribute CKA_CLASS
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute type CKA_CLASS matches
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute class CKO_PRIVATE_KEY attribute CKA_ID
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute type CKA_ID does not match <===


For Safenet:
-- warning tmm1[17495]: 01260009:4: Connection error: ssl_hs_vfy_sign_srvkeyxchg:13544: sign_srvkeyxchg (80)
-- warning tmm1[17495]: 01260013:4: SSL Handshake failed for TCP 10.1.1.11:6009 -> 10.1.1.201:443
-- err pkcs11d[5856]: 01680002:3: Key table lookup failed. error.

Conditions:
1. Keys were created on earlier versions of BIG-IP software, no matter if using tmsh (Safenet) or using fipskey.nethsm (Thales, Safenet) and the device was upgraded to 14.1.0 or later.

2. Keys were created on BIG-IP v14.1.0 or later directly, using fipskey.nethsm (Thales). For Safenet, fipskey.nethsm was deprecated in 14.0.0.

Impact:
SSL handshake failures.

Workaround:
There are two workarounds:
-- Re-create the keys using tmsh command.

IMPORTANT: This workaround is suitable for deployments that are new and not in production.


-- Re-import the keys from nethsm using:
tmsh install sys crypto key <key_label> from-nethsm


You can find the key_label here:
-- The rightmost string in the output of the Thales command:
nfkminfo -l

-- The string after label= in the 'cmu list' command for Safenet.


751540-8 : GTM Sync group not syncing properly with multiple self IP addresses configured on one VLAN but not all configured for GTM server

Links to More Info: BT751540

Component: Global Traffic Manager (DNS)

Symptoms:
GTM changes in some devices are not synced to other GTM-configured devices in the same syncgroup.

Conditions:
-- There are multiple self IP addresses configured on one VLAN.
-- Some, but not all, self IP addresses are configured for GTM server.

Impact:
GTM Sync group not syncing properly.

Workaround:
Configure all self IP addresses in the syncgroup for GTM server.


751451-7 : When upgrading to v14.0.0 or later, the 'no-tlsv1.3' option is missing from HTTPS monitors automatically created server SSL profiles

Links to More Info: BT751451

Component: Local Traffic Manager

Symptoms:
If there are HTTPS monitor objects that were created using BIG-IP software v12.x, when the BIG-IP is upgraded directly to v14.0.0 or later, the operation automatically creates server SSL profiles for the HTTPS monitors as needed. Those server SSL profile objects do not have 'no-tlsv1.3' included in their 'options' configuration.

Conditions:
-- Having HTTPS monitors configured in v12.x before upgrading.
-- Directly upgrading from v12.x to v14.0.0 or later

Impact:
TLSv1.3 gets enabled on the server SSL profiles.

Workaround:
-- To avoid this issue, upgrade from v12.x to v13.x, and then upgrade to v14.0.0 or later


-- To mitigate this issue, modify the affected profile to disable TLSv1.3.


745645-5 : Portal Access does not rewrite the script element with textNode children

Links to More Info: BT745645

Component: Access Policy Manager

Symptoms:
Web-application defining script element with textNode children are not rewritten by Portal Access. This can cause the web application to fail to load.

Conditions:
Web-application defining script element with textNode children which requires client-side dynamic script rewriting

Impact:
- Web application may fail to load.
- Non-rewritten HTTP request

Workaround:
Custom iRule to rewrite the content of textNode. There is no generic iRule but it can be implemented depending on the web application requirement.


745125-5 : Network Map page Virtual Servers with associated Address/Port List have a blank address.

Links to More Info: BT745125

Component: TMOS

Symptoms:
On the Local Traffic > Network Map page, some virtual servers have a blank address.

Conditions:
An address list or port list is associated with the virtual server

Impact:
The Network Map will display a blank address field.


741621-6 : CLI preference 'suppress-warnings' setting may show incorrectly

Links to More Info: BT741621

Component: TMOS

Symptoms:
At times when the 'suppress-warnings' setting is at its default value ('none'), it may be listed like this instead:

suppress-warnings { }

After loading the configuration, the 'suppress-warnings' setting may return to the default value, in which case it is no longer visible when listing out the CLI preferences (without specifying 'all-properties').

Conditions:
-- Using the default value for 'suppress-warnings' in the CLI preferences.
-- Listing out the CLI preferences.

Impact:
Possibly confusing listing for this value. The 'suppress-warnings' setting auto-populates with an incorrect default of empty { } (instead of 'none') on config load, causing it to be displayed when listing CLI preference in tmsh.

Workaround:
None


739904-7 : /var/log/ecm log is not rotated

Links to More Info: BT739904

Component: TMOS

Symptoms:
/var/log/ecm log is not rotated.

Conditions:
Log file /var/log/ecm exists in the /var/log directory.

Impact:
Log rotate does not work. May fill disk with logs over time.

Workaround:
Use tmsh sys log-rotate command to modify the logrotate settings to add /var/log.ecm.
The syntax is:
tmsh modify sys log-rotate common-include '"
/var/log/ecm {
compress
missingok
notifempty
}"'


739475-10 : Site-Local IPv6 Unicast Addresses support.

Links to More Info: BT739475

Component: Local Traffic Manager

Symptoms:
No reply to Neighbor Advertisement packets.

Conditions:
Using FE80::/10 addresses in network.

Impact:
Cannot use FE80::/10 addressees in network.

Workaround:
None


721591-6 : Java crashes with core during with high load on REST API

Links to More Info: K000141369, BT721591

Component: TMOS

Symptoms:
Java crashes with core.

Conditions:
This is a random crash and there are no known conditions for reproducing it.

Impact:
This crash occurs randomly during normal operation and has following impact:
-- Stats are not available.

Workaround:
-- Restart the Java service with "bigstart restart restjavad" or "tmsh restart sys service restjavad".
-- Restart the BIG-IP system.


717174-8 : WebUI shows error: Error getting auth token from login provider

Links to More Info: BT717174

Component: Device Management

Symptoms:
Occasionally, the BIG-IP Admin Utility TMUI fails to function correctly and produces the following error:
Error getting auth token from login provider.

This occurs when the BIG-IP REST Daemon restjavad fails to start up properly.

Conditions:
This error most often occurs on the first or second boot after upgrade, and more often on Virtual Edition BIG-IP platforms running on oversubscribed or slow hypervisors.

Impact:
TMUI and any other BIG-IP system components that rely on REST Workers such as: OpenID Connect key rotation discovery, portions of the TMOS Web Configuration Utility, and Guided Configuration (AGC and WGC) fail to function properly.

Workaround:
Restarting the BIG-IP REST daemons restjavad and restnoded will usually correct the problem. To do so, connect to the SSH console and issue the following two commands:

bigstart restart restjavad
bigstart restart restnoded


705869-8 : TMM crashes as a result of repeated loads of the GeoIP database

Links to More Info: BT705869

Component: Global Traffic Manager (DNS)

Symptoms:
TMM crash due to the repeated loading of the GeoIP database.

Conditions:
Repeatedly loading the GeoIP database in rapid succession.

Impact:
Traffic is disrupted while TMM restarts.

Workaround:
Avoid repeated loading of the GeoIP Database.


701341-6 : If /config/BigDB.dat is empty or the file is corrupt, mcpd continuously restarts

Links to More Info: K52941103, BT701341

Component: TMOS

Symptoms:
If an issue causes /config/BigDB.dat to be empty or its contents become corrupted, mcpd fails to start up.

System commands report errors about being unable to read DB keys. 'bigstart' outputs errors:

--dbval: Unable to find variable: [security.commoncriteria]

Conditions:
The event causing BigDB.dat to be truncated is unknown at this time.

Impact:
The system fails to start up, and mcpd continually restarts. The BIG-IP system fails to process traffic while the mcpd process is restarting.

Workaround:
To work around this issue, you can remove the empty or corrupted BigDB.dat file. To do so, perform the following procedure:

Impact of workaround: Performing the following procedure should not have a negative impact on your system.

1. Log in to bash.
2. To remove the zero-byte or corrupted BigDB.dat file, type the following command:
rm /config/BigDB.dat


694765-10 : Changing the system's admin user causes vCMP host guest health info to be unavailable

Links to More Info: BT694765

Component: TMOS

Symptoms:
On the host, 'tmsh show vcmp health' does not display guest info.

The iControl REST log at /var/log/icrd contains entries similar to the following:

 notice icrd_child[32206]: 01420003:5: Cannot load user credentials for user "admin" Current session has been terminated.

Conditions:
The default admin user "admin" has been changed.

Note: You changed the default admin user by following the steps in the Article K15632: Disabling the admin and root accounts using the BIG-IP Configuration utility or the Traffic Management Shell: https://my.f5.com/manage/s/article/K15632.

Impact:
Many REST APIs do not function, and functionality such as vCMP guest health that depend on REST fails.

Workaround:
Rename the default system admin back to 'admin':
tmsh modify /sys db systemauth.primaryadminuser value admin

Note: If you are using the default 'admin' account, make sure you change the password as well.


687044-9 : Tcp-half-open monitors might mark a node up or down in error

Links to More Info: BT687044

Component: Local Traffic Manager

Symptoms:
The tcp-half-open monitor might mark a node or pool member up when it is actually down, or down when it is actually up, when multiple transparent monitors within multiple 'bigd' processes probe the same IP-address/port.

Conditions:
All of the following are true:
-- There are multiple bigd processes running on the BIG-IP system.
-- There are multiple tcp-half-open monitors configured to monitor the same IP address.
-- One or more of the monitored objects are up and one or more of the monitored objects are down.

Impact:
The BIG-IP system might occasionally have an incorrect node or pool-member status, where future probes may fix an incorrect status.

Workaround:
You can use any of the following workarounds:

-- Configure bigd to run in single process mode by running the following command:
   tmsh modify sys db bigd.numprocs value 1

-- Use a tcp monitor in place of the tcp-half-open monitor.

-- Configure each transparent monitor for different polling cycles to reduce the probability that an 'up' response from the IP address/port is mistakenly viewed as a response to another monitor that is currently 'down' (or vice-versa).


683706-9 : Monitor status may show 'checking' after a pool member has been manually forced down

Links to More Info: BT683706

Component: Local Traffic Manager

Symptoms:
Following certain sequences of actions, a pool member that is forced offline (e.g., '{session user-disabled state user-down}'), may have an associated monitor status (status of the associated monitor instance) that is shown as 'checking'.

Conditions:
This result may occur as the result of one of the following sequences of actions:

1. A pool member is created with an associated monitor, and that pool member is simultaneously forced offline.

Example:
tmsh create ltm pool test1 members add { 10.1.108.2:80 { session user-disabled state user-down } } monitor http

2. A pool member is disabled or forced offline, the configuration is saved, and the BIG-IP system is restarted (for example, by 'bigstart restart' or 'reboot' commands).

Example:
tmsh modify ltm pool test1 members modify 10.1.108.2:80 { session user-disabled state user-down } }
tmsh save sys config
bigstart restart

Impact:
The pool member remains offline as directed, but the associated monitor status (monitor instance status) indicates 'checking', which does not appear to match the pool member status.

If the pool member is subsequently re-enabled, the associated monitor status (status of the associated monitor instance) will be updated to show the result of current monitor pings.

Workaround:
The 'checking' status of the monitor instance may be unexpected, in this context, but:

- The monitor status (monitor instance status) does not affect the status of a disabled pool member.

- This monitor status indicates that no monitor pings have been performed to update the initial state of the monitored object from 'checking' to a result determined by a monitor ping. The BIG-IP monitoring subsystem does not ping disabled pool members to update this status.


680804-6 : TMM restart due to delayed keep alives

Links to More Info: BT680804

Component: Advanced Firewall Manager

Symptoms:
TMM killed with SIGABRT by the SOD process that monitors all process's health. TMM misses the keep alive, hence the restart.

The stack trace shows that tmm was killed when it was waiting on a memory map (sys_mmap_obj) call.

Conditions:
The memory map call is known to take a long time to complete when the disk IO sub-system is very slow.

High IO can also be a result of memory starvation accompanied by intensive paging

Impact:
Traffic disrupted while TMM restarts.

Workaround:
This problem is not likely to persist after a TMM service restart. So no user intervention is required.

If this problem happens repeatedly, it would be required to take a look at IO Resources in use at time of the database load or reload, and see if a way to lower IO can be found.


675742-4 : Hardware-to-VE-platform-migrate of a UCS may fail with an error on db variable license.maxcores

Links to More Info: BT675742

Component: TMOS

Symptoms:
Using the platform-migrate option to load a UCS from a different platform may show this error from loaddb:

01080023:3: Error return while getting reply from mcpd: 0x107178a, 0107178a:3: Modifying license.maxcores to a value other than 8 is not allowed.

The UCS loads successfully, other than the DB variable, but this error message is printed and the DB variables are not loaded.

Conditions:
-- Migrating a UCS from physical platform hardware to a Virtual Edition (VE) configuration.

-- License has an attribute limiting the maximum number of cores, and the incoming UCS has a value of the DB variable 'license.maxcores' that contradicts this.

Impact:
The DB variable file fails to load, generating the error message, but that does not stop the loading of the regular configuration files in BIG-IP*.conf.

Workaround:
The 'license.maxcores' value is ignored on hardware devices, so set it to 8 before saving the UCS.


638863-4 : Attack Signature Detected Keyword is not masked in the logs

Links to More Info: BT638863

Component: Application Security Manager

Symptoms:
Attack Signature Detected Keyword is not masked in the logs

Conditions:
When the signature is matching a full request, and there is a sensitive keyword around the signature location, in some cases the signature appears in the logs and is not masked.

Impact:
Sensitive data may appear in the logs

Workaround:
None


637827-5 : VADC: after re-deploying a single-nic VM with multiple nics, a load can fail due to stp member 1.0

Links to More Info: BT637827

Component: TMOS

Symptoms:
The configuration fails to load with the following message:

01070523:3: No Vlan association for STP Interface Member 1.0
Unexpected Error: Loading configuration process failed.

Conditions:
In single-nic mode, the interface 1.0 exists and can be saved as a VLAN member. Upon re-deploying the virtual-machine from single nic mode to multi-nic, the 1.0 interface becomes pending and should no longer impact any configuration. However, a condition exists after a VLAN delete, where the associated (automatically created) stp member is not removed from the running config and can cause a load error.

Impact:
Load fails and requires manual intervention. Otherwise, the STP member is benign because vADC does not support STP.

Workaround:
Remove the STP interface member 1.0 and reload.


637613-10 : Cluster blade status immediately returns to enabled/green after it is disabled.

Links to More Info: K24133500, BT637613

Component: Local Traffic Manager

Symptoms:
In some scenarios, disabling a blade will result in the blade immediately returning to online.

Conditions:
This can occur intermittently under these conditions:

- 2 chassis in an HA pair configured with min-up-members (for example, 2 chassis, 2 blades each, and min-up-members=2)
- You disable a primary blade on the active unit, causing the cluster to failover due to insufficient min-up-members.

Impact:
Disabling the primary blade fails and it remains the primary blade with a status of online.

Workaround:
This is an intermittent issue, and re-trying may work. If it does not, you can configure min-up-members to a lower value or disable it completely while you are disabling the primary blade. The issue is triggered when the act of disabling the primary blade would cause the number of members to drop below min-up-members.


632553-9 : DHCP: OFFER packets from server are intermittently dropped

Links to More Info: K14947100, BT632553

Component: Local Traffic Manager

Symptoms:
With a DHCP relay virtual server, OFFER packets from DHCP server are intermittently not forwarded to the client and dropped on BIG-IP system.

Conditions:
It is not known exactly what triggers this condition, but it occurs intermittently when the DHCP relay virtual server is in use.

Impact:
Client machines joining the network do not receive DHCP OFFER messages.

Workaround:
Manually delete the serverside to force it to be recreated by the next DHCP request.

For example, if the flow to the DHCP server 10.0.66.222 is broken, issue the following tmsh command:

tmsh delete sys connection ss-server-addr 10.0.66.222 cs-server-port 67


566995-7 : bgpd might crash in rare circumstances.

Links to More Info: BT566995

Component: TMOS

Symptoms:
Under unspecified conditions and in rare cases, bgpd might crash. Although bgpd restarts right away, routing table might be impacted.

Conditions:
The conditions under which this occurs are not known.

Impact:
This might impact routing table and reachability.

Workaround:
None known.


554506-6 : PMTU discovery from the management interface does not work

Links to More Info: K47835034, BT554506

Component: TMOS

Symptoms:
Network connectivity issues to the BIG-IP management interface.

The management interface 'auto lasthop' feature (not to be confused with the auto lasthop setting on a virtual server) allows the BIG-IP to route responses to packets received on the management interface back to the MAC address of the layer-3 device that sent them, removing the need for static management-routes to be configured on the BIG-IP for communication beyond the management subnet.

The operation of the lasthop module interferes with the management interface's ability to dynamically learn Path MTU (PTMU) through ICMP unreachable messages.

Conditions:
The MTU on one section of the network path between a client device and BIG-IP management interface is lower than the BIG-IP management interface's configured MTU (for example, part of the path passes through a tunnel), and an intermediary router is sending 'ICMP unreachable, fragmentation required' packets back to the BIG-IP to instruct it to send smaller datagrams.

Impact:
Unable to complete a TLS handshake to the management interface IP, or other similar operations that require large frames.

Workaround:
BIG-IP management interface auto lasthop functionality can be disabled to allow the interface to function normally.

For more information see K52592992: Overview of the Auto Last Hop feature on the management interface, available at
https://support.f5.com/csp/article/K52592992.


527119-12 : An iframe document body might be null after iframe creation in rewritten document.

Links to More Info: BT527119

Component: Access Policy Manager

Symptoms:
Cannot use certain page elements (such as the Portal Access menu) in Google Chrome, and it appears that JavaScript has not properly initialized, and results in JavaScript errors on the following kinds of code:
    iframe.contentDocument.write(html)
    iframe.contentDocument.close()
    <any operation with iframe.contentDocument.body>

Conditions:
-- The body of a dynamically created iframe document might be initialized asynchronously after APM rewriting.

-- Using the Chrome browser.

Impact:
Some JavaScript applications might not work correctly when accessed through Portal Access. For example, one of applications known to contain such code and fail after APM rewriting is TinyMCE editor.

Workaround:
Revert rewriting of the document.write call with a post-processing iRule.

The workaround iRule will be unique for each affected application.


469724-7 : When evaluation/demonstration features expire, features enabled by both evaluation and perpetual licenses also expire

Links to More Info: BT469724

Component: TMOS

Symptoms:
Evaluation features cause perpetual features to expire when the evaluation license expires.

Conditions:
-- Perpetual license with an evaluation/demonstration add-on feature.
-- The add-on license expires or is expired.

Impact:
When an evaluation/demonstration add-on license expires, features included in both the evaluation add-on as well as the regular, perpetual license stop working.

This behavior is covered in F5 article K4679: BIG-IP evaluation and demonstration licenses do expire :: https://support.f5.com/csp/article/K4679.

Workaround:
To work around this issue, activate the license from the command line:

When reactivating an existing license, and deactivating an expired evaluation license key, specify the base registration key and add-on (if any), and use the -i option for the expired evaluation license key in the get_dossier command.

For example, if the expired evaluation license key is ABCDEFG-ZZZZZZZ, use the following command:

get_dossier -b ABCDE-ABCDE-ABCDE-ABCDE-ABCDEFG -a ABCDEFG-ABCDEFG -i ABCDEFG-ZZZZZZZ

You can find these steps detailed in K2595: Activating and installing a license file from the command line :: https://support.f5.com/csp/article/K2595. This part in particular is required to work around this issue


464708-7 : DNS logging does not support Splunk format log

Links to More Info: BT464708

Component: Global Traffic Manager (DNS)

Symptoms:
DNS logging does not support Splunk format logging. It fails to log the events, instead logging err messages:

hostname="XXXXXXXXXXXXX.XX",errdefs_msgno="01230140:3:

Conditions:
DNS logging configured for Splunk format.

Impact:
DNS logging does not log Splunk format to HSL.

Workaround:
Use an iRule to send Splunk-formatted messages to the Splunk server.

For example:

ltm rule dns_logging_to_splunk {

   when DNS_REQUEST {
      set ldns [IP::client_addr]
      set vs_name [virtual name]
      set q_name [DNS::question name]
      set q_type [DNS::question type]

      set hsl [HSL::open -proto UDP -pool splunk-servers]
      HSL::send $hsl "<190>,f5-dns-event=DNS_REQUEST,ldns=$ldns,virtual=$vs_name,query_name=$q_name,query_type=$q_type"
   }

   when DNS_RESPONSE {
      set ldns [IP::client_addr]
      set vs_name [virtual name]
      set q_name [DNS::question name]
      set q_type [DNS::question type]
      set answer [DNS::answer]

      set hsl [HSL::open -proto UDP -pool splunk-servers]
      HSL::send $hsl "<190>,f5-dns-event=DNS_RESPONSE,ldns=$ldns,virtual=$vs_name,query_name=$q_name,query_type=$q_type,answer=\"$answer\""
   }
}


349706-7 : NetworkAccess assigns 1.1.1.1 address to remote ppp endpoint APM VPN

Component: Access Policy Manager

Symptoms:
Network access sends 1.1.1.1 as X-VPN-serer-IP and Edge client reserves this IP for PPP communication with APM server.

Conditions:
-- VPN is configured on BIG-IP.
-- Edge Client/webtop is used to connect to VPN.

Impact:
If VPN is connected:
1. The user may not access the 1.1.1.1 address from the client machine.
2. if 1.1.1.1 is used as a dns server ip in Network Access configuration, DNS resolution may fail on the client machine.

Workaround:
NA


2289885-2 : Malformed protobuf file synced from secondary blades cause asmlogs coredump

Links to More Info: BT2289885

Component: Application Security Manager

Symptoms:
asmlogd spontaneously coredump on the tenant (SIGSEGV)

asmlogd log shows "Secondary file /var/asmdata1/cluster/request_log/transfer/request_log__20260331_230212__slot_2 does not match integrity check", right before the crash.

Conditions:
ASM provisioned

multi-blade platform with at least 2 blades

Impact:
asmlogd spontaneously crashed on the primary blade and then restarted automatically in about 30seconds

Workaround:
none


2288173-3 : Some TMMs not ready and failed to bring up full cluster due to failed cmp dag transition

Links to More Info: BT2288173

Component: Local Traffic Manager

Symptoms:
On VELOS chassis platforms, when you reboot or restart the tenant, the cluster fails to come up fully with some TMMs indicating tmm-not-ready state, and performance is degraded as it fails to bring up the full cluster.

Conditions:
VELOS chassis platforms, with scenarios leading to reboot or restart of the tenant, possibly triggered by
- some software upgrade
- some power reset or
- configuration change causes occasional problems in tmm cluster bring-up and reduces the capacity handled by the tenant.

When the problem happens, it is observed that
- tmctl tmm/cmp shows queue_drops
- tmctl tmm/mpi_mem shows tx-full
Due to a lot of internal background traffic in the cluster

and tmctl tmm/ready_for_world_stat indicates "not read" state for "dag_transition".

Impact:
Performance degraded due to reduced cluster size.

Workaround:
No Workaround
As it is an intermittent problem, reboot/restart the problematic blade may help to recover.


2287865-2 : Dynamic CRL always fails connections that use self-signed certificates

Links to More Info: BT2287865

Component: Local Traffic Manager

Symptoms:
Connections fail with alert(46) unknown certificate error

The following is logged in /var/log/ltm

"unable to build certificate trust chain for profile"

Conditions:
Serverssl profile that uses Dynamic CRL, and the backend servers are configured with self-signed certificates.

Impact:
Dynamic CRLs cannot be used if backend servers are configured with self-signed certificates.

Workaround:
Add any self-signed certificates to the trusted CA of the ssl profile.


2285101 : APM policy export (ng_export) resulting in import failure for default oauth-request objects

Component: Access Policy Manager

Symptoms:
When exporting an APM access policy containing OAuth Client agents that reference default built-in oauth-request objects.

Conditions:
Policy contains OAuth Client agent referencing the default built-in apm aaa oauth-request objects
Policy exported using ng_export and imported using ng_import

Impact:
Policy import fails, preventing migration or restoration of APM access policies containing default oauth-request references.

Workaround:
Manually extract ng-export.conf from the exported .tar.gz file, add the leading slash ('/') to the affected oauth-request references, repackage the archive, and re-import the policy. This allows ng_import to complete successfully.


2279009-1 : With large configured receive-window-size, BIG-IP advertises non-zero SYN/SYN-ACK window, but zero window in final 3WHS ACK and all subsequent packets

Links to More Info: BT2279009

Component: Local Traffic Manager

Symptoms:
BIG-IP advertises non-zero window in SYN/SYN-ACK (as expected), but zero window in the final 3WHS ACK and in all subsequent packets, stalling the tcp connection forever.

Conditions:
Virtual server configured with a tcp profile having a Receive Window value ('receive-window-size' in tmsh) between 536862721 and 1073725440

Impact:
All tcp connections get stalled, both on the client-side and on the server-side.

Workaround:
Two possible workarounds.

- Configure a Receive Window value ('receive-window-size' in tmsh) to any value lower than 536862721.

- On the tcp profile, set the Initial Receive Window Size ('init-rwnd' in tmsh) to 64


2277461-1 : Current tzdata version of BIG-IP is outdated and may cause discrepancies

Component: TMOS

Symptoms:
Discrepancies may show up if a timezone has been updated since 2018.
For example, America/Sao_Paulo does not observe DST, but the current tzdata does not represent that.

Conditions:
BIG-IP's timezone is changed to a timezone that has been changed since 2018

Impact:
The time of the system is incorrect from the actual time


2277421-3 : TCP profile Help tab displays incorrect default values for Memory Management fields

Links to More Info: BT2277421

Component: TMOS

Symptoms:
The Help tab for TCP profiles shows incorrect default values for Proxy Buffer High (131072) and Proxy Buffer Low (98304) in the Memory Management section.

Conditions:
Viewing the Help tab for any built-in TCP profile in the GUI or tmsh help for TCP profile proxy-buffer-high/proxy-buffer-low.

Impact:
Help text displays incorrect default values, which may cause confusion when configuring TCP profiles. No functional impact - actual profile behavior is correct.

Workaround:
Refer to the actual profile values shown in the configuration instead of the Help tab text.


2269969-3 : Using TCP congestion BBR might lead to TMM core

Links to More Info: BT2269969

Component: Local Traffic Manager

Symptoms:
Using TCP congestion BBR might lead to TMM core

Conditions:
TCP congestion BBR is in use.

Impact:
TMM crash/core.

Workaround:
N/A


2264845-3 : TMM may crash when enabling DNS Express

Links to More Info: BT2264845

Component: Global Traffic Manager (DNS)

Symptoms:
TMM may crash when enabling DNS Express.

Conditions:
Occurs when enabling DNS express feature with traffic actively hitting the modified virtual-server.

Impact:
TMM core crashes.

Workaround:
N/A


2264037-2 : TMM may generate a core file after an SSL cipher group is deleted

Links to More Info: BT2264037

Component: Local Traffic Manager

Symptoms:
TMM crashes and generates a core file

Conditions:
- An SSL cipher group previously referenced by an SSL profile is removed from the configuration.
- Connections established while the profile referenced that cipher group remain active.
- At least one of those connections initiates a TLS renegotiation.

Impact:
Traffic interruption while TMM generates a core file and restarts.

Workaround:
Do not remove a cipher group if any active connections may still reference an older SSL profile that used it.


2263721-2 : TMM crashes on Azure VE when virtual function is removed during runtime

Links to More Info: BT2263721

Component: TMOS

Symptoms:
TMM crashes unexpectedly on BIG-IP VE running on Microsoft Azure when an accelerated networking virtual function (VF) is removed at runtime.

Conditions:
- BIG-IP VE deployed on Microsoft Azure with Accelerated Networking enabled.
- Azure platform performs host maintenance, live migration, or other operation that removes and restores accelerated networking virtual functions.

Impact:
Traffic disruption. TMM crashes and must be restarted. If running in an HA pair, failover occurs.

Workaround:
There is no workaround. Deploy BIG-IP VE in an HA (Active/Standby) configuration to minimize traffic disruption during a crash.


2263657-3 : Crash in Bados Signature Management operations results in a memory leak

Links to More Info: BT2263657

Component: Anomaly Detection Services

Symptoms:
The ADMD does not manage response control messages related to the creation or modification of signatures.

Conditions:
When using heavy configuration file with bados signatures, where signatures are saved or modified.

Impact:
Either MCPD or ADMD may encounter a crash.

Workaround:
NA


2263101-1 : TMSH rrset commands do not list DNS cache serve-expired records

Component: Global Traffic Manager (DNS)

Symptoms:
With serve-expired enabled on a DNS cache resolver, records at TTL=0 no longer appear in the rrset cache via tmsh show and cannot be deleted via tmsh delete, yet they may still be served to clients as stale responses.

Conditions:
Serve-expired is enabled for a DNS cache resolver

Impact:
Records could still be served to clients as stale responses via the serve-expired mechanism.

Workaround:
N/A


2262981-4 : TMM may corrupt stack during class lookup

Links to More Info: BT2262981

Component: Local Traffic Manager

Symptoms:
TMM core
Log may contain
can'tt read "domain": no such variable while executing "class match -value percentage contains ${path}/${domain}-cluster

Conditions:
The iRule uses a class match (class match -value percentage contains ${path}/${domain}-cluster) and fails if the path/domain doesn’t exist or the class name exceeds 265 characters.

Impact:
Tmm does not operate during reboot

Workaround:
Update the iRule to avoid using a class or path longer than 265 characters, or ensure the class exists.


2262641-3 : [BGP] Peering deadlock when modifying supported capabilities

Links to More Info: BT2262641

Component: TMOS

Symptoms:
When modifying capabilities BGP peering might enter a deadlock with local peer ignoring incoming and not creating outbound connections.

Conditions:
Modifying BGP capabilities when local peer tries to connect.

Impact:
BGP peering enters a deadlock.

Workaround:
Remove peer (neighbor) configuration and reapply it.


2262537-1 : pem_sessiondump crashes when listing subscriber sessions with custom attributes

Links to More Info: BT2262537

Component: Policy Enforcement Manager

Symptoms:
On BIG-IP, running pem_sessiondump --list when PEM subscriber sessions have custom attributes may crash with a segmentation fault and generate a core in /var/core.

Conditions:
This happens when PEM is provisioned with RADIUS subscriber sessions that have custom attributes and a transient memcached connection interruption occurs while pem_sessiondump is iterating sessions.

Impact:
The pem_sessiondump diagnostic utility crashes. No impact to data-plane traffic or TMM. Administrators are unable to use pem_sessiondump to list subscriber sessions until the utility is re-run.

Workaround:
Re-run pem_sessiondump --list. The crash occurs only when a transient memcached connection interruption coincides with the session iteration. Retrying typically succeeds.


2261337-2 : TMUI displays Local Traffic menu on rSeries Best Bundle tenant without LTM provisioned

Links to More Info: BT2261337

Component: TMOS

Symptoms:
In rSeries BIG-IP tenants with a Best Bundle license, TMUI shows the Local Traffic menu even when LTM is not provisioned (GTM dedicated, LTM none), which does not occur on DNS-only tenants with the same provisioning.

Conditions:
This issue occurs when,

- Platform is rSeries (eg: R5900, R10900)
- Deployment is a BIG-IP tenant
- License is Best Bundle
- GTM is set to dedicated and LTM is set to none

Impact:
This reveals LTM configuration options (virtual servers, pools, nodes, etc.) on a DNS‑dedicated tenant, increasing the risk of accidental object creation.

Workaround:
None


2261137-1 : TMM may crash if DNS cache resolver concurrency settings are changed during live traffic

Links to More Info: BT2261137

Component: Global Traffic Manager (DNS)

Symptoms:
TMM crashes with a SIGSEGV and then restarts.

Conditions:
- The DNS cache resolver is configured and processing queries.
- A DNS cache-resolver object is changed, specifically a setting that alters max-concurrent-queries or max-concurrent-tcp.
- Live DNS traffic is in progress when the change is applied.

Impact:
Traffic is disrupted during a TMM restart, and the redundant unit fails over.


2260837-2 : IPsec GUI sets encryption to null on auth update

Links to More Info: BT2260837

Component: TMOS

Symptoms:
- Discrepancy exists between BIG-IP Configuration Utility (GUI) and TMOS Shell (CLI) in how IPsec policy changes are handled
- In the GUI, editing an existing IPsec policy and changing the authentication algorithm to any SHA variant (e.g., SHA-1 to SHA-256) causes the encryption algorithm to be reset to NULL

Conditions:
- Create a IPsec policy with authentication algorithm from sha1/sha256/sha384/sha512 and encryption algorithm from aes-128/aes-192/aes-256
- Save the above policy
- Edit the policy. While modifying authentication algorithm to other sha algorithms, the encryption algorithm gets updated to NULL.

Impact:
The GUI provides no warning that the encryption algorithm has been removed. This silent change causes unexpected IPsec tunnel failures in production.


2260293-3 : LiveUpdate status stuck on Pending after successful installation

Component: Application Security Manager

Symptoms:
The update installs successfully as scheduled, but its status remains "Pending."

Conditions:
Race condition occurs during automatic installation

Impact:
The incorrect status is fixed at the next scheduled time.


2259001-3 : /Common VLANs can be assigned to non-Common partition route domains via VLAN-groups

Links to More Info: BT2259001

Component: TMOS

Symptoms:
/Common VLANs present in non-Common partition route domain

Conditions:
1. A non-Common partition route domain is present
2. A non-Common partition VLAN group containing /Common VLANs is present
3. The non-Common partition VLAN group is assigned to the route domain

Impact:
/Common VLANs are now present in a non-Common route domain

Workaround:
1. Remove the VLAN-group from the Route Domain using CLI
2. Remove each /Common VLAN from the Route Domain individually using either WebUI or CLI


2258853-2 : [APM][SAML] SP automation fails to update, when bound to an IdP with a SAML Resource

Links to More Info: BT2258853

Component: Access Policy Manager

Symptoms:
SAML SP connector automation fails whenever the metadata changes, i.e., a change in certificate.
In IDP initiated SAML, SAML service is configured in SAML resource which prevents the certificate update in the filestore.

Conditions:
SAML connector automation to create SP connectors.

Impact:
Unable to create SP connectors through connector automation.


2256725-1 : Unable to trigger "Disallowed file upload content detected" violation in some cases

Component: Application Security Manager

Symptoms:
The "Disallowed file upload content detected" violation is not triggered in some cases.

Conditions:
Under a specific traffic scenario, the violation is not triggered.

Impact:
Traffic with violation passes through.

Workaround:
N/A


2256681-1 : [APM] ECA random rumber fetch is stuck after forced TMM Core

Links to More Info: BT2256681

Component: Access Policy Manager

Symptoms:
After a forced TMM core, the ECA process may use abnormally high CPU indefinitely.

Conditions:
This issue occurs when:

1. TMM core is forcibly generated.
2. ECA attempts to fetch random numbers from TMM while TMM is unavailable or restarting.

Impact:
- The ECA process sustains high CPU usage.
- APM services may degrade.
- The issue persists until the ECA process is restarted.

Workaround:
Restart the ECA process to restore normal CPU utilization


2252201-1 : Monitor to GTM link is skipped if there are no devices are associated with the link

Links to More Info: BT2252201

Component: Global Traffic Manager (DNS)

Symptoms:
GTM link is reported as DOWN even though it is up.

Conditions:
No devices are associated with the link.

Impact:
GTM link is marked down, traffic will be interrupted.

Workaround:
None


2252129-1 : The database (BD) fails to start up (restart loops)

Component: Application Security Manager

Symptoms:
The DB fails to start up - the kernel oom killer kills it while starting up due to excessive memory usage.

Conditions:
A configuration consisting of large number of large JSON schemas

Impact:
The DB daemon goes up and down all without stopping. The system is generally down.

Workaround:
Reduce the number or size of JSON schemas by uniting profiles that share the same schemas in the same policies, unless the policy comes from a Swagger file.


2251921-1 : GUI audit logs inside the /var/log/audit files have a different format from all other daemons' audit logs

Links to More Info: BT2251921

Component: TMOS

Symptoms:
The GUI audit logs in the /var/log/audit files have a different format from all other daemons audit logs.

This is an example of a GUI audit log:

Mar 18 04:50:39 localhost.localdomain info GUI[10683@bigip-2.f5.internal]: 00000001:20000: AUDIT - user admin - RAW: GUI: host=192.168.1.1 user=admin partition=Common action=list object=[All] type=Certificate and Key result=OK

that is different from most of the other audit log formats.
This is an example of a tmsh audit log:

Mar 18 04:46:06 bigip-2.f5.internal notice tmsh[1454]: 01420002:5: AUDIT - pid=1454 user=root folder=/Common module=(tmos)# status=[Command OK] cmd_data=save / sys config partitions all

Conditions:
GUI audit logs are enabled.

From the GUI selecting:
"System ›› Logs : Configuration : Options".
Then, under 'Audit Logging', set 'GUI' to 'Enable'.

or from TMSH with:
"tmsh modify sys global-settings gui-audit enabled"

Impact:
The different format can be confusing because log elements are in different positions.

The different format could also be problematic when audit logs are ingested into a log repository or SIEM, because different entries require a separate parsing logic.

Workaround:
None


2251549-4 : Uneditable fields for Guest, Auditor, and Operator roles may appear to be editable in the GUI

Links to More Info: BT2251549

Component: TMOS

Symptoms:
Protocol profile GUI fields for a virtual server appear to be editable for a Guest, Operator, or Auditor role although they are actually not accessible for these roles

Conditions:
1. A virtual server is present
2. This virtual server has selected at least one Client SSL Profile
3. On the virtual server's properties page, a guest/auditor/operator user clicks on the name of a profile in the Selected column of Client SSL Profile field

Impact:
GUI fields appear to be editable as if the user had admin access.
The save/update of any edits does not occur; the fields only appear to be editable in the GUI

Workaround:
None


2251517-3 : Stream profile is not supported on HTTP/2 Full proxy (HTTP MRF Router enabled)

Links to More Info: BT2251517

Component: Local Traffic Manager

Symptoms:
Trying to add a stream profile to a virtual server gets rejected

tmsh modify ltm virtual vs_http2_stream profiles add { stream_simonSIMON }
01070734:3: Configuration error: Profile(s) found on /Common/vs_http2_stream that are not allowed: Only (TCP Profile, UDP Profile, QUIC Profile, ClientSSL Profile, ServerSSL Profile, HTTP Profile, HTTP2 Profile, HTTP3 Profile, HTTP Compression Profile, Application Visibility and Reporting Profile, DNS Profile, DOH Proxy Profile, profile statistics, Protection Profile, Bot Defense Profile, Bot Defense ASM Profile, Web Security Profile, HTTP Router Profile, Web Accelerator Profile, Request Logging Profile, TDR Profile, ATI Profile, BD Profile, CSD Profile, AP and AI Profile)

Conditions:
The virtual server contains a profile with http/http2 and httprouter
        /Common/http { }
        /Common/http2 { }
        /Common/httprouter { }

Same issue if an http2/httprouter profile is attempted to be added to virtual server with a stream profile in it

Impact:
Not able to add a stream profile

Workaround:
None


2246933-3 : Memory leak in QUIC under rare sequence of packets/events

Links to More Info: BT2246933

Component: Local Traffic Manager

Symptoms:
QUIC experiences a slow/small memory leak.

Conditions:
On a system with heavy load on crypto operations, QUIC will leak some data on specific rare sequence of packets/events which can exhaust the memory slowly and eventually could lead to a crash due to OOM.

Impact:
TMM crashes due to OOM.

Workaround:
N/A


2244393-3 : TLS 1.3 sessions are unnecessarily cached

Links to More Info: BT2244393

Component: Local Traffic Manager

Symptoms:
More sessions than necessary are getting cached which can cause an increase in memory usage.

Conditions:
TLS 1.3 is enabled and used.

Impact:
Memory usage increases.

Workaround:
Disable the Retain Certificate setting in the SSL profile (https://my.f5.com/manage/s/article/K19802202).


2240945-1 : platform_agent crash when deleting a virtual_server.

Component: F5OS Messaging Agent

Symptoms:
platform_agent may crash when deleting a virtual server.

Conditions:
- The system has the fix for ID2008409;
- A Mac masquerade is configured on a traffic group;
- A tunnel terminating at a BIG-IP or a vlan-group is used;
- A virtual server is deleted.

Impact:
platform_agent will restart, dumping a core.
This should have no impact on passing traffic.

Workaround:
NA


2240889-1 : TMM route can unexpectedly overwrite MGMT kernel route

Links to More Info: BT2240889

Component: TMOS

Symptoms:
MGMT kernel route gets overwritten by a TMM route with the same destination and netmask as the MGMT kernel route.

Conditions:
1. VELOS tenant
2. mgmt route exists with a dest and netmask (ex. 192.0.2.0/24 dev mgmt proto kernel scope link src 192.0.2.24)
3. A TMM route is created with the same dest and netmask as the mgmt route: tmsh create net route test network 192.0.2.0/24 gw 198.51.100.1

Impact:
Mgmt route is no longer present in 'ip route' and gets overwritten by the TMM route created

Workaround:
Do not create a tmm route with the same destination and netmask as the mgmt route.
Filter out the mgmt route from the receiving dynamic route


2230889-3 : SIP parser mishandles RFC 3261 folded headers, causing 200 OK forwarding failure with iRule routing

Links to More Info: BT2230889

Component: Service Provider

Symptoms:
With a SIP profile and iRule routing by string match, a valid 200 OK with a folded (multi-line) Accept header is not forwarded, but it forwards correctly if the Accept header is on a single line.

Conditions:
Virtual Server: UDP port 5060 (SIP)
Profiles: SIP profile, UDP profile (default settings)
Pool: At least one pool member
iRule: Attached to the virtual server

Send a SIP 200 OK response to the BIG-IP with a folded Accept header.

Impact:
When a SIP profile is applied and Content-Length is present, SIP messages with folded (multi-line) headers are silently dropped, causing call setup failures, missed responses, or other signaling disruptions.

Workaround:
Use the flattened Accept Header in payload:

Accept: application/sdp, application/isup, multipart/mixed, application/dtmf


2230709-2 : iRule class match fails after modifying IP data group entries with route-domains

Links to More Info: BT2230709

Component: Local Traffic Manager

Symptoms:
After adding and then removing an IP data group entry that includes a route-domain (for example, 10.0.0.0%10/8), iRule class match commands against the data group stop matching entries that were previously working. All traffic may be treated as if it does not match the data group.

Conditions:
- An IP data group is in use by an iRule with a class match command.
- An entry with a route-domain qualifier (for example, %10) is added to the data group and then removed.

Impact:
iRule class match lookups against the affected data group return no match, causing traffic to be classified incorrectly. For example, traffic that should match an internal users data group may be treated as external.

Workaround:
Restart TMM (bigstart restart tmm — causes a traffic disruption), reboot the BIG-IP system, or create a new data group with the same entries and update the iRule to reference the new data group.


2230705-3 : SSL handshake failure with Session Ticket that is rejected by backend server

Links to More Info: BT2230705

Component: Local Traffic Manager

Symptoms:
SSL handshake failure occurs with "Connection error: ssl_hs_rx:5756: alert(10) unexpected msg" found in /var/log/ltm

Conditions:
- Server SSL profile is enabled with the Session Ticket feature
- Backend server also supports Session Ticket
- Backend server rejects the Session Ticket sent by the BIG-IP

Impact:
- Service is disrupted because of a handshake failure.

Workaround:
Disable the Session Ticket feature on the Server SSL Profile or the backend server.


2230613-3 : Bot defense stateful anomalies and microservices not fully enforced on blade setups

Component: Application Security Manager

Symptoms:
Bot-Defense is failing to sync statefull anomalies (including microservices) between blades, causing partial enforcement.

Conditions:
Bot Defense is attached to VS, and includes a statefull anomalies enables, and/or microservices.
Instance contains blades (VELOS etc)

Impact:
Statefull anomalies and Microservices enforcement works on primary blade only.

Workaround:
N/A


2230597-3 : Under syncookie mode, temporary listeners may fail to complete connections

Links to More Info: BT2230597

Component: Local Traffic Manager

Symptoms:
Temporary listeners might not complete a connection under a syncookie mode.

Conditions:
Occurs when,
- Temporary listener is used for handling traffic (for example FTP).
- Device under syncookie mode.

Impact:
BIG-IP may fail to establish a proxied TCP connection if it doesn’t complete the TCP three-way handshake with the pool member.

Workaround:
1. Disable syncookies.

2. Disable inheritance when possible. For example, FTP ephemeral listeners inherit syncookie behavior from the FTP virtual server; disabling inherit-parent-profile prevents the ephemeral listener from inheriting syncookies.


2230137-3 : Multicast forwarding entry might not be created during a traffic burst.

Links to More Info: BT2230137

Component: TMOS

Symptoms:
When handling a traffic burst of multicast traffic going to different multicast destinations, some multicast forwarding cache entries might not be created in TMM.

Conditions:
BIG-IP configured with multicast routing.

Impact:
Some multicast routes might not be created. Some streams might not be forwarded.

Workaround:
None


2229625-1 : Client Side Defense silently fails with an empty 200 response when there is no route to the XC server

Links to More Info: BT2229625

Component: Client-Side Defense

Symptoms:
If a Client Side Defense profile is configured with an API Domain Pool but there is no route to the pool, it will silently fail and just sent an empty 200 response.

Conditions:
Client Side Defense profile configured with an API Domain Pool and there is no route to the pool.

Impact:
Connections work but it is difficult to determine why the Client Side Defense Profile is failing.

Workaround:
None


2229525-3 : TMM crash due to stale shared memory mapping after wr_urldbd restart

Links to More Info: BT2229525

Component: Traffic Classification Engine

Symptoms:
When the webroot database (wr_urldbd) is restarted, tmm can crash.

Conditions:
wr_urldbd is restarted

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2229273-1 : LDAP authentication fails when multiple LDAP servers are configured

Links to More Info: BT2229273

Component: TMOS

Symptoms:
When 2 or more ldap servers are configured for ldap authentication, auth fails due to timer expired (PAM timeout).

Conditions:
-- Multiple ldap servers are configured for Remote-LDAP authentication
-- The bind-timeout and search-timeout values are set to 30 seconds (this is the default)

Impact:
LDAP authentication fails due to PAM timeout- even when one of the servers responds with success.

Workaround:
Set the bind-timeout and search-timeout to lower values i.e 5 seconds


2229185-1 : Virtual server stops responding to ICMP requests

Links to More Info: BT2229185

Component: Carrier-Grade NAT

Symptoms:
ICMP is enabled by default on virtual server destination addresses.

"icmp-echo' is disabled by default on security nat source-translation objects.
"proxy-arp" is disabled by default on security nat source-translation objects.

When a security nat source-translation object shares one of its addresses with a virtual server destination address:

- If the security nat source-translation was created *before* the virtual server, enabling "proxy-arp" on the security nat source-translation object disables ICMP on the virtual server address. Even if "proxy-arp" shouldn't have anything to do with the ICMP behaviour of the virtual address.

- If the security nat source-translation was created *after* the virtual server, enabling "proxy-arp" on the security nat source-translation does not have any effect on the ICMP behaviour of the virtual server address. This is the expected behaviour.

Conditions:
- A security nat source-translation object shares one of its addresses with a virtual server destination address.

- The security nat source-translation object was created before the virtual server

- The "proxy-arp" setting of the security nat source-translation object is set to "enabled"

Impact:
ICMP is disabled on the virtual server address.

Workaround:
Two possible workarounds:

(1)
- Delete the virtual server and the security nat source-translation object sharing the address.
- Recreate the virtual server, and then recreate the security nat source-translation object.

Or:

(2)
Set "proxy-arp" on the security nat source-translation object to "disabled".


2228869 : Continuous tmm cores in domain_table_search with null dereferencing

Links to More Info: BT2228869

Component: Global Traffic Manager (DNS)

Symptoms:
Tmm cores

Conditions:
Corrupt zone express database

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2228753-1 : Violation_details may contain unexpected line break

Links to More Info: BT2228753

Component: Application Security Manager

Symptoms:
Violation_details field may contain an unexpected line break, such as 0x0d or 0x0a.

Conditions:
- Using remote logging
- Sending violation_details
- Using "Maximum Request Size" with a specified length, not Any

Impact:
Remote logging server may be confused by the line break.

Workaround:
Do not send violation_details or use "Maximum Request Size: Any".


2228421-1 : GUI: Help contents missing for "System >> Crypto Offloading : Acceleration Strategy" (404 error)

Links to More Info: BT2228421

Component: TMOS

Symptoms:
The GUI Help frame for 'Acceleration Strategy' page under 'System >> Crypto Offloading' shows a 404 error:

===========================
Object Not Found - 404 Error
The object (https://10.10.0.1/tmui/help/en/tmui/system/crypto/acceleration_strategy/properties.jsp) you were trying to reach does not exist.

The URL or bookmark you clicked is old or misspelled.

Check your URL and try again, or go back to the home page.
===========================

Conditions:
On the GUI, select "System >> Crypto Offloading : Acceleration Strategy" and click the "Help" tab on left side menu panel.

Impact:
No GUI help available for 'Acceleration Strategy'.

Workaround:
Inline help is available using tmsh.
From the command-line:

# tmsh help sys crypto acceleration-strategy


2227513-3 : Tmm crash in Google Cloud during a live migration

Links to More Info: BT2227513

Component: Local Traffic Manager

Symptoms:
When running in Google Cloud and a live migration occurs tmm may crash.

Conditions:
- BIG-IP is running in Google Cloud
- tmm is utilizing the virtio driver
- A live migration is occurring

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable live migration in GCP.
or
Use the sock driver.


2225313-3 : ASM CAPTCHA refresh and audio icons are missing after policy import

Component: Application Security Manager

Symptoms:
ASM CAPTCHA refresh, and audio icons may be missing when a policy is imported and applied directly.

Conditions:
A policy is imported and applied directly.

Impact:
ASM CAPTCHA refresh and audio icons may be missing.

Workaround:
Make a spurious change to any Blocking Response Page and apply policy.


2225173-1 : HA Failover does not happen when a tenant's Active controller is pulled out and one or more blades goes offline

Links to More Info: BT2225173

Component: Local Traffic Manager

Symptoms:
In an extremely rare scenario where one or more blade goes offline when the active system controller of the tenant is pulled out, there is no corresponding drop in HA score on the tenant and failover does not occur.

Conditions:
1) Active controller on the tenant is pulled out
2) One or more blades go offline erroneously after this
3) HA group on the tenant is configured with F5OS_INTERNAL trunk component with an appropriate weight

Impact:
1) No tenant failover happens though the number of working trunk members went down

Workaround:
In this condition, restart sod by using the below command

bigstart restart sod


2224853 : BIG-IP DNS may not respond to RRSIG type queries correctly with DNSSEC zones

Links to More Info: BT2224853

Component: Global Traffic Manager (DNS)

Symptoms:
BIG-IP DNS may not return RRSIG records when queried directly via RRSIG type queries on DNSSEC-enabled zones.

Conditions:
A DNSSEC zone is created on BIG-IP-DNS and a DNS query with type RRSIG is sent.

Impact:
BIG-IP-DNS may not respond to RRSIG type queries correctly.
The response may differ for under apex records. If they exist, the response is NODATA; if they do not exist, the response is NXDOMAIN.
BIG-IP should respond as this is a valid request with RRSIG for all types.

Workaround:
NA


2224537-3 : Tmm crash in Google Cloud during a live migration

Links to More Info: BT2224537

Component: Local Traffic Manager

Symptoms:
When running in Google Cloud and a live migration occurs tmm may crash.

Conditions:
- BIG-IP is running in Google Cloud
- tmm is utilizing the virtio driver
- A live migration is occurring

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable live migration in GCP.
or
Use the sock driver.


2223645-3 : BIG-IP does not implement traffic forwarding as per RFC 3927

Links to More Info: BT2223645

Component: Local Traffic Manager

Symptoms:
BIG-IP does not implement traffic forwarding as per RFC 3927#section-7

   Routers must not forward packets with an IPv4 link-local source or destination address, regardless of routing configuration.

Conditions:
BIG-IP acting as a proxy for Ipv4 traffic.

Impact:
Incorrect traffic forwarding.

Workaround:
Create an iRule to drop traffic to or from specific addresses.


222220-12 : Distributed application statistics are not passed correctly.

Links to More Info: K11931

Component: Global Traffic Manager (DNS)

Symptoms:
Distributed application statistics include only requests passed to its first wide IP.

For BIG-IP versions 12.0.0 and later, distributed application statistics are always zero.

Conditions:
Viewing distributed application statistics on configurations with multiple wide-IP members.

Impact:
The system does not pass statistics for requests to all wide-IP members in the distributed application.

Note: For BIG-IP versions 12.0.0 and later, the system does not pass statistics for requests to any wide-IP-members in the distributed application.

Workaround:
None


2222141 : JSON parser does not reject certain invalid JSON patterns that violate RFC 8259

Links to More Info: BT2222141

Component: Local Traffic Manager

Symptoms:
The JSON_REQUEST_ERROR event is not triggered for certain invalid JSON payloads that should be rejected according to RFC 8259.

Invalid JSON patterns that are NOT caught include:
Trailing commas in objects: {"mystring": "addcomma",}
Nested objects with missing values: {"nested": {"missing": }}
Leading zeros in numbers: {"number": 01234}
Duplicate keys: {"duplicate": 1, "duplicate": 2}
Trailing commas in arrays: {"tools": [{"name": "value"},]}
Valid JSON patterns that ARE correctly rejected:
Single quotes instead of double quotes: {"single": 'quotes'}
Unquoted keys: {invalid: "no quotes on key"}
Undefined values: {"bad_value": undefined}
Incomplete JSON: {"incomplete": "missing closing brace"

Conditions:
1) BIG-IP version 21.0.0 with JSON profile configured
2) Using new LTM iRule events (JSON_REQUEST_ERROR, JSON_REQUEST_MISSING) introduced in v21.0.0
3) Processing HTTP or HTTP/2 requests with JSON content

Impact:
1) The BIG-IP JSON profile parser is less strict than other JSON validation tools (e.g., jq, standard JSON parsers)
2) Applications relying on JSON_REQUEST_ERROR event to reject malformed JSON may allow invalid JSON payloads to pass through
Security policies depending on strict JSON validation may be bypassed
3) Inconsistent behavior compared to industry-standard JSON validators


2221585-3 : When tenant renews DHCP lease on eth2, the interface IP address on mgmt also gets modified

Links to More Info: BT2221585

Component: TMOS

Symptoms:
When eth2 DHCP lease renews on rSeries tenant, management interface IP is incorrectly changed to eth2 IP (100.69.1.1/24) causing loss of remote management access.

This can occur when eth2 renews the lease after 999 days or when executing manual command to renew eth2's DHCP lease (dhclient -r).

Logs similar to the following can be seen from the tenant's /var/log/boot.log:

    info dhcp_config[20430]: management_ip = 100.69.1.1
    info dhcp_config[20430]: F5::COAPI::TransactionalSave Succeeded.
    info dhcp_config[20430]: domain_search = <default.svc.cluster.local. svc.cluster.local. cluster.local. chassis.local.>
    info dhcp_config[20430]: domain_name = <default.svc.cluster.local>
    info dhcp_config[20430]: In update_ltcfg_field().
    info dhcp_config[20430]: LTCFG Field => ('dns', 'search', 'dns')
    info dhcp_config[20430]: New value => 'default.svc.cluster.local.,svc.cluster.local.,cluster.local.,chassis.local.'
    info dhcp_config[20430]: Existing value => 'localhost'
    info dhcp_config[20430]: dns_servers = <10.10.1.10>
    info dhcp_config[20430]: In update_ltcfg_field().
    info dhcp_config[20430]: LTCFG Field => ('dns', 'nameservers', 'dns')
    info dhcp_config[20430]: New value => '10.10.1.10'
    info dhcp_config[20430]: Existing value => '10.10.1.241,10.10.1.242,10.10.1.243'
    info dhcp_config[20430]: In update_ltcfg_config_source() for 'dns'.
    info dhcp_config[20430]: New 'config_source' value => '0'
    info dhcp_config[20430]: Existing value => '0'
    info dhcp_config[20430]: No change in 'config_source' for 'dns'. Skip update.
    info dhcp_config[20430]: In update_ltcfg_field().
    info dhcp_config[20430]: LTCFG Field => ('dns', 'description', 'dns')
    info dhcp_config[20430]: New value => 'configured-by-dhcp'
    info dhcp_config[20430]: Existing value => ''
    info dhcp_config[20430]: F5::COAPI::TransactionalSave Succeeded.
    info dhcp_config[20430]: hostname = 'bigip1.default.svc.cluster.local'
    info dhcp_config[20430]: In update_ltcfg_field().
    info dhcp_config[20430]: LTCFG Field => ('system', 'hostname', 'system')
    info dhcp_config[20430]: New value => 'bigip1.default.svc.cluster.local'
    info dhcp_config[20430]: Existing value => 'bigip1.default.svc.cluster.local'
    info dhcp_config[20430]: No change in ltcfg field 'hostname'. Skip update.
    info dhcp_config[20430]: Successfully finished the execution of /usr/libexec/dhcp-config.

Notice that in addition to changing the management IP address it also changes the DNS and hostname.

Conditions:
- rSeries tenant running for 999 days and its DHCP-enabled eth2 interface renews the lease.
- This may also occur if an administrator manually executes a command that forces eth2 to renew its lease.

Impact:
Loss of remote connectivity to management interface.

Workaround:
Reboot the affected BIG-IP tenant or
change tenant state from "deployed" to "configured" and back to "deployed" via F5OS host.

DNS and hostname settings may also need to be changed back to their previous value.


2221017-3 : The BIG-IP virtio driver may core during startup

Links to More Info: BT2221017

Component: Local Traffic Manager

Symptoms:
If a failure occurs in the BIG-IP's virtio driver during startup, it may core when attempting to modify statistics that have not yet been initialized.

Conditions:
-- Virtio driver in use.
-- BIG-IP is starting up.
-- An error occurs that is tracked by a statistic.

Impact:
TMM cores and restarts.


2220397-1 : Modifying iRule proc while iRule in use may cause connection to reset

Links to More Info: BT2220397

Component: Local Traffic Manager

Symptoms:
Connection gets aborted with logs similar to the following on ltm logs :
TCL error: /Common/[irule-name] <EVENT_NAME> - proc [Proc name] not found

Conditions:
1. iRule is using proc command
2. iRule proc is renamed or deleted while the iRule is in use.

Impact:
Incoming client connections may get aborted.

Workaround:
None


2220285-1 : Modifying iRule proc with ILX::call may result in tmm crash

Links to More Info: BT2220285

Component: Local Traffic Manager

Symptoms:
TMM may crash if the iRule Proc with ILX::call is renamed or deleted while the iRule is in use.

Conditions:
1. ILX::call is within irule proc
2. iRule proc is either renamed or deleted while the iRule is in use.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2220009-1 : OCSP monitoring of traffic certificates using a proxy server sends malformed HTTP host header

Links to More Info: BT2220009

Component: Local Traffic Manager

Symptoms:
The HTTP/1.1 request is malformed as the HOST header contains the host plus the path after it

Conditions:
OCSP responder configured that
1. Enables "Use Proxy Server"
2. The responder URL has a path after the host

Impact:
The HTTP/1.1 OCSP request is malformed as the HOST header contains the host plus the path after it

Workaround:
None


2219209-1 : Resetting profile statistics may lead to memory corruption

Links to More Info: BT2219209

Component: Access Policy Manager

Symptoms:
TMM may crash or generate wrong behavior

Conditions:
API Protection profile statistics have been reset, an issue internally might overwrite memory in other area.

Impact:
Can cause unexpected behavior or even a crash

Workaround:
N/A


2218157-3 : IP Intelligence database load log displayed periodically

Links to More Info: BT2218157

Component: Advanced Firewall Manager

Symptoms:
IP Intelligence database load log is displayed periodically in TMM log files.

Conditions:
- Configuration refers to IP intelligence feature.
- No active subscription for IP intelligence.
- IP intelligence database load fails periodically.

Impact:
- TMM log files contain messages similar to:
  <13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
  <13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat


- LTM log files contain messages similar to this one, logged by each tmm into the every 5 minutes:

Sep 24 10:00:05 f5test.localhost err tmm2[1492]: 01010377:3: Failed to open IpRep database file /var/IpRep/F5IpV6Rep.dat

Workaround:
- Update the license to include an IP Intelligence subscription

or

- Remove the ip-intelligence objects from the configuration


2217793-3 : I5800 AFM 17.5.1.3 - After upgrade to 17.5.1.3, unable to reorder rules under AFM policy.

Links to More Info: BT2217793

Component: Advanced Firewall Manager

Symptoms:
AFM firewall rule reorder functionality fails in webUI when "Inline Rule Editor" is disabled (afm.inlineruleeditor=false) after upgrading to version v17.5.1.3.

Conditions:
BIG-IP AFM versions 17.5.1.3, or 21.0.0 with sys db key afm.inlineruleeditor set to false.

Impact:
AFM firewall rules cannot be reordered via the webUI drag-and-drop interface.

Workaround:
Configure using TMSH or enable Inline Rule Editor.


2217677-1 : BIG-IP v21.0: Tunnel object exists in MCPD but missing Linux tunnel tap device, causing ioctl failure and config deployment failure

Links to More Info: BT2217677

Component: TMOS

Symptoms:
- Configuration reapplication fails with the error:
  01070712:3: Cannot get device index for <tunnel_name> in <route_domain_name> - ioctl failed: No such device
- IPsec tunnel configuration deployment fails in BIG-IP v21.0.
- Tunnel object is present in MCPD, but the corresponding Linux tunnel tap device is missing.
- HA configuration synchronization fails or remains out of sync.
- This may affect other config objects like that need to setup tuntap devices on the linux host, but the problem has only been observed for IPsec.

Conditions:
- BIG-IP version 21.0.x.
- IPsec tunnel configured within a non-default route domain (e.g., RD 31).
- Associated objects (self IPs, route domains, IPsec policies, traffic selectors, tunnels) are present in MCPD.
- HA environment with configuration synchronization enabled between peers.
- Repeated configurations add/delete operations or automation-driven deployments.

Impact:
Application and IPsec tunnel configuration deployment fails.
HA synchronization cannot complete successfully, leaving devices out of sync.

Workaround:
It is possible to create the missing tuntap device on the linux host.

# rdexec <route_domain_id> ip tuntap add <tunnel_name> mode tap

It is unsafe to let this placeholder interface stay in place, so delete the config object via tmsh, web UI, etc. Then deploy the desired config again to create the tunnel object.


2217273-2 : TMM crashes with a SIGFPE when it receives IPS traffic.

Links to More Info: BT2217273

Component: Protocol Inspection

Symptoms:
TMM crashes with a SIGFPE when it receives IPS traffic.

Conditions:
It occurs when traffic reaches a virtual server or firewall policy with an IPS profile while IPS signature blobs are still being created and the IPS engines are not yet ready.

Impact:
TMM crash (service disruption/crash loop possible).


2217181 : When "Publish CDS/CDNSKEY" is enabled for a DNSSEC zone on BIG-IP DNS, the system signs CDS and CDNSKEY records with both the Key Signing Key (KSK) and Zone Signing Key (ZSK)

Component: Global Traffic Manager (DNS)

Symptoms:
When "Publish CDS/CDNSKEY" is enabled for a DNSSEC zone on BIG-IP DNS, the system signs CDS and CDNSKEY records with both the Key Signing Key (KSK) and Zone Signing Key (ZSK). This behavior follows older DNSSEC practices from RFC 6781, when BIND also signed these records with both keys.

BIG-IP's current behavior is non-compliant with RFC 7344.

Conditions:
Using DNSSEC
"Publish CDS/CDNSKEY" is enabled

Impact:
When querying for CDS/CDNSKEY, the response will show two RRSIG records signed: one with KSK and one with ZSK.

Workaround:
NA


2217093-3 : L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used

Links to More Info: BT2217093

Component: Local Traffic Manager

Symptoms:
On platforms without the switch (i2000/i4000) configured with multiple interfaces under a single VLAN, traffic to masquerade MAC address will be flooded to all available interfaces and will not follow FDB entries.

Conditions:
- Switchless platform (like i2000/i4000).
- Multiple interfaces configured under a single VLAN. For example:

net vlan vlan2 {
    interfaces {
        2.0 {
            tagged
        }
        trunk1 {
            tagged
        }
    }
}
- traffic to masquarade MAC is misdirected to Standby unit.

Impact:
Unnecessary flooding occurs.

Workaround:
None.


2211137-3 : EPSEC upgrade fails when default package is pre-uploaded

Links to More Info: BT2211137

Component: Access Policy Manager

Symptoms:
After upgrading BIG-IP APM from version 17.1.2 to 17.1.3, the APM directories /var/apm/lib and /var/apm/www are missing. The system shows an empty EPSEC version (apm.epsec.version = ""), and APM functionality is impacted. This issue occurs on both units in an HA pair.

Conditions:
This issue occurs when all of the following conditions are met:

1. BIG-IP APM is running version 17.1.2 (default EPSEC package version 1749)
2. EPSEC package version 1915 was uploaded via GUI but not installed on the 17.1.2 system
3. System is upgraded to version 17.1.3 (which has EPSEC 1915 as the default package)
4. The upgrade creates an upload marker for EPSEC 1915 in the configuration filestore

Impact:
Endpoint security checks cannot be performed, APM policies and access profiles may fail to function properly, and end users may be unable to access APM-protected resources.

Workaround:
Upload and install a newer EPSEC package (version 1941 or later) via the GUI:
1. Navigate to Access > System > File Management > Endpoint Software Management
2. Upload a newer EPSEC package (e.g., epsec-1.0.0-1941.0.iso or later)
3. Install the uploaded package
4. Verify the directories are created: ls -l /var/apm/
5. Confirm EPSEC version: tmsh list sys db apm.epsec.version


2211133-3 : ICMP error length does not follow RFC 812 guidance

Links to More Info: BT2211133

Component: Local Traffic Manager

Symptoms:
Only 8 bytes of original payload is included in ICMP error message sent from BIG-IP. RFC 1812 section 4.3.2.3 indicates systems should include as much as possible, up to 576 bytes total.

Conditions:
ICMP error message sent from BIG-IP.

Impact:
With only 8 bytes included in the ICMP error message, provides limited context for debugging. The TCP and UDP headers are truncated mid-header.

Workaround:
None.


2209157-3 : FastL4 late binding does not proxy MSS when establishing server-side connection.

Links to More Info: BT2209157

Component: Local Traffic Manager

Symptoms:
FastL4 late binding does not proxy MSS when establishing server-side connection.

Conditions:
FastL4 profile with late-binding option enabled.

Impact:
Sub-optimal connection performance.

Workaround:
MSS-overwrite option can be used to manually adjust server-side MSS.


2208821-3 : VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade

Links to More Info: BT2208821

Component: Local Traffic Manager

Symptoms:
After upgrading BIG-IP software on a VIPRION system, the device may fail to load the configuration and enter an INOPERATIVE state. The system remains stuck during the configuration load phase, preventing normal operation.

Conditions:
1. VIPRION platform with clustered configuration.
2. Performing a BIG-IP software upgrade.
3. System attempts to load post-upgrade configuration during boot or blade role transition

Impact:
The VIPRION cluster becomes INOPERATIVE and is unable to load the configuration. Traffic is impacted as the system cannot process or pass traffic until the issue is resolved.

Workaround:
Restarting the system with a different blade set as primary, or reverting to the previously working software version, allows the configuration to load successfully. In some cases, re-attempting the upgrade after correcting the blade role transition also resolves the issue.


2202005 : IPsec can send packets across tunnels on standby node.

Links to More Info: BT2202005

Component: TMOS

Symptoms:
IPsec is sending packets over the tunnel from the standby node, which should not occur.

Conditions:
In an HA setup with IPsec configured, once the tunnel is established, there is a possibility that the standby node may send packets.

Impact:
IPsec functionality may be impacted if both the active and standby nodes send ESP packets to the peer.

Workaround:
Added an HA check that first verifies the device status, if it is in standby, the packet is dropped accordingly.


2200537-2 : Audio captcha script error

Links to More Info: BT2200537

Component: Application Security Manager

Symptoms:
A script error in audio captcha on specific browsers

Conditions:
-- Audio captcha is required.
-- The user is using Internet Explorer on Windows 11

Impact:
Error in the captcha page. Unable to use captcha causing client side enforcement to fail.

Workaround:
None


2200405-3 : Live Update proxy.host value requires brackets around IPv6 Addresses

Links to More Info: BT2200405

Component: Application Security Manager

Symptoms:
Curl calls used to download Live Update files will fail if using a proxy.host with an IPv6 address that does not include brackets.

Conditions:
Live Update is configured through a proxy.host that is using IPv6 and does not include brackets around the IPv6 value.

E.g. "[IPv6]"

Impact:
Live Update necessitates an IPv6 proxy.host have brackets, while IP Reputation necessitates that it does not have brackets. This discrepancy results in one or the other continually failing when attempting to use an IPv6 proxy.host.

Workaround:
If possible, utilize a proxy.host value that is not an IPv6 Address.


2200389-1 : CDS and CDNSKEY not included in DNSX zone transfer data

Links to More Info: BT2200389

Component: Global Traffic Manager (DNS)

Symptoms:
CDS and CDNSKEY not included in DNSX zone transfer data

Conditions:
Dnssec zone with "Publish CDS/CDNSKEY" option is enabled

Impact:
Missing CDS/CDNSKEY in zone transfer

Workaround:
None


2200217-1 : DNSSEC validation failures due to missing DS records in zone transfers

Links to More Info: BT2200217

Component: Global Traffic Manager (DNS)

Symptoms:
DNSSEC validation failures occur when querying child zones despite proper DNSSEC configuration, caused by missing DS records in parent zone transfers. The issue affects child zone delegations that use nameservers located outside the child zone itself, such as external nameservers or nameservers under the parent zone. Only delegations where nameservers are within the child zone's own domain hierarchy work correctly. This breaks the DNSSEC chain of trust between parent and child zones, preventing secure DNS resolution for affected delegations.

Conditions:
- DNSSEC is enabled on both parent and child zones.
- Child zones have DS records configured in the system.
- Child zone delegations use nameservers that are either external or located under the parent zone.
-Zone transfers are being performed for the parent zone.

Impact:
DNSSEC chain of trust broken.

Workaround:
None


2199701 : big3d was stuck in high CPU after network disruption

Links to More Info: BT2199701

Component: Global Traffic Manager (DNS)

Symptoms:
big3d consuming high CPU

Conditions:
Network disruption

Impact:
big3d overloaded with high CPU usage


2199469-3 : Serverssl-use-sni not working in HTTP2 to HTTP gateway setups.

Links to More Info: BT2199469

Component: Local Traffic Manager

Symptoms:
Virtual server's 'serverssl-use-sni' setting does not work when virtual server has HTTP2 profile attached on the client-side and HTTP profile on the server-side.

Conditions:
HTTP2 to HTTP gateway config with 'serverssl-use-sni' option enabled.

Impact:
Incorrect serverssl profile might be selected when establishing server-side connection.

Workaround:
iRule can be used to select the profile based on presented SNI, for example:

when CLIENTSSL_CLIENTHELLO {
    binary scan [SSL::extensions -type 0] @9a* sni
    log local0. "SNI: $sni"
}

when SERVER_CONNECTED {
    switch -glob [string tolower $sni] {
        "foo.com" {
            SSL::profile foo-serverssl
        }
        "bar.com" {
            SSL::profile bar-serverssl
        }
    }
}


2198721-1 : SAML apmd memory leak

Links to More Info: BT2198721

Component: Access Policy Manager

Symptoms:
Apmd process will leak memory when configured with SAML authentication.

Conditions:
APM configured with SAML
Any BIG-IP version >= 17.1.0

Impact:
BIG-IP can run out of memory and some services killed to release memory.

Workaround:
None


2198589-3 : BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client

Links to More Info: BT2198589

Component: Access Policy Manager

Symptoms:
Intermittent tunnel traffic drops when Network Access compression is enabled

Tunnel stability is restored when Compression is disabled

No client-side errors clearly indicating unsupported configuration

Admins can still enable compression via BIG-IP UI/CLI despite deprecation

Conditions:
-- BIG-IP APM with Network Access resource configured
-- Compression enabled on Network Access resource
-- Edge Client version 7.2.6 or later
-- VPN tunnel established
-- Intermittent traffic flow over the tunnel

Impact:
-- Intermittent VPN tunnel instability
-- Hard-to-diagnose issues, potentially leading to unknowingly enabling unsupported configurations

Workaround:
Disable compression in the BIG-IP Network Access config and connectivity profile config


2197321-1 : BIG-IP does not select FFDHE key share provided by the client on session resumption.

Links to More Info: BT2197321

Component: Local Traffic Manager

Symptoms:
Connection terminates if the client does not allow secure renegotiation, otherwise renegotiation occurs.

Conditions:
ClientSSL that uses FFDHEgroups and has session tickets enabled.

The client tries to resume an SSL session with an FFDHE key share that used FFDHE previously.

Impact:
Connection terminates if the client does not allow secure renegotiation, otherwise renegotiation occurs.

Workaround:
None


2197305-1 : BIG-IP generates invalid SSL key share

Links to More Info: BT2197305

Component: Local Traffic Manager

Symptoms:
SSL handshakes fail on the client due to an Illegal Parameter alert.

Conditions:
ClientSSL that mixes both FFDHE and Non-FFDHE groups and has session tickets enabled.

The client tries to resume an SSL session with a Non-FFDHE key share that used FFDHE previously.

Impact:
SSL handshake fails and the connection terminates

Workaround:
None


2197289-1 : Enabling SSH access via the GUI blocks MCPD for 90 seconds

Links to More Info: BT2197289

Component: TMOS

Symptoms:
- Disconnections from the GUI occur (no responses to color advisory probe)
- SNMP query timeouts
- iQuery interruptions

Conditions:
-- SSH access is disabled via the GUI
-- SSH access is then enabled via the GUI

Impact:
-- MCPD is blocked for 90 seconds
-- sshd service does not come up for the first 90 seconds after enabling SSH access

Workaround:
None


2196597-1 : TMM generates core when large firewall policy is attached to multiple virtual servers due to SOD watchdog timeout

Links to More Info: BT2196597

Component: Advanced Firewall Manager

Symptoms:
-- TMM processes generate core dumps (SIGABRT) when activating firewall policies with high rule counts (20,000+ rules) across multiple virtual servers (20+)
--- SOD (System Oversight Daemon) sends SIGABRT signal to TMM processes
--- Observe the ltm log "sod[10802]: 01140041:5: Killing tmm.0 pid 23754."

Conditions:
1, Deploy couple of tenants with 8 slots on each Chasis
2, Set up an HA pair (Active/Standby).
3, Provision the system with LTM, AFM, and AVR modules.
4, Create a Network Firewall policy containing approximately 20,000 rules.
5, Attach the firewall policy to a virtual server.
6, Create 20 or more virtual servers, attaching the same firewall policy to each.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Disable SOD Heartbeat Monitoring for all TMMs
--- tmsh modify sys daemon-ha tmm heartbeat disabled.


2195709-1 : TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.

Links to More Info: BT2195709

Component: Policy Enforcement Manager

Symptoms:
TCP fingerprinting tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.

Conditions:
- PEM tethering detection, is configured in a PEM policy rule like this one:

pem policy policy-01 {
    rules {
        detect-01 {
            dtos-tethering {
                dtos-detect enabled
                report {
                    dest {
                        hsl {
                            publisher default-ipsec-log-publisher
                        }
                    }
                }
                tethering-detect enabled
            }
            precedence 1000
        }
    }
    transactional enabled
}



- The subscriber connects through a Windows, Android or IoS phone, and the phone OS is recognised in the PEM "Device OS" PEM session field, for example:

Device Name Nokia_Corporation-Nokia_Lumia_710
Device OS Windows_Mobile_8



- An iRule to detect tethering is configured in the relevant virtual server, for example:

ltm rule tethering-detection {
  when CLIENT_ACCEPTED {
    set ip [IP::client_addr]
    set tether [PEM::session info tethering detected $ip]
    if {$tether eq "1"} {
        log local0. "Tethering detected !"
    } else {
        log local0. "no tethering detected"
    }
  }
}



- The subscriber is tethering through the phone using a MacOS operating system.

Impact:
Tethering from a MacOS operating system is never detected.

Workaround:
None


2189993 : Upgrade from 17.5.1.3 to 21.0.0 and the config failed to load with error:01071197:3: Metacharacter '*' must be at end of the session variable name

Links to More Info: BT2189993

Component: TMOS

Symptoms:
When upgrading BIG-IP Virtual Edition from 17.5.1.3 to 21.0.0, a configuration load error occurs:

01071197:3: Metacharacter '*' must be at end of the session variable name.
Unexpected Error: Loading configuration process failed.

Conditions:
-- APM provisioned and configured

Impact:
You are unable to complete the upgrade from v17.5.1.3 to v21.0.0

Workaround:
None


2187429-3 : TMM might crash when using MRF framework.

Links to More Info: BT2187429

Component: Service Provider

Symptoms:
TMM might crash when using MRF framework.

Conditions:
Configurations that include message routing framework.

Impact:
Traffic disrupted while tmm restarts.


2187141-3 : DNS generic server stuck offline after monitor removal

Links to More Info: BT2187141

Component: Global Traffic Manager (DNS)

Symptoms:
Removing the monitor from the virtual server can leave the DNS generic server stuck in “Offline (Enabled) – No enabled virtual server available.”

Conditions:
Removes a monitor from the Virtual Server and uses a Generic Server type.

Impact:
The generic server shows the same status as the Virtual Server.

Workaround:
NA


2186933-4 : ILX Plugin may not work after use of npm install command on workspace.

Component: Local Traffic Manager

Symptoms:
After using the 'npm install' command on the workspace.

The below message will be logged in ltm logs after plugin reload:
err sdmd[21349]: 018e0018:3: pid[17783] plugin[<plugin-name>.<extension-name>] Error: Cannot find module 'f5-nodejs'
err sdmd[21349]: 018e0010:3: Extension <plugin-name>.<extension-name> exceeded the maximum number of restarts (5) over the last 60 seconds and has been disabled

Conditions:
1. The ILX plugin is in use with node version 6.
2. ILX workspace has been modified with npm install command.
3. Plugin has been reloaded after 'npm install'

Impact:
Traffic processing on virtual server with plugin attached will fail with the following logs:
Could not find ILX extension <extension-name> in path <workspace-name>

Workaround:
To prevent the issue:
1. Use NPM install command with '--no-package-lock' flag.
- npm install --no-package-lock <package-name>
 
If already Encountered the issue:
1. Restore package.json from /usr/share/packages
 
- tar -xzf /usr/share/packages/nodejs/f5-nodejs-6.tgz -C /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/node_modules
 
2. Update package.json at path /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/
- Set the "f5-nodejs" version to "1.0.0" instead of "0.0.3".
 
3. Reload the plugin.


2186625-1 : Zone transfer from dns express with dnssec enabled includes extra RRSIG

Links to More Info: BT2186625

Component: Global Traffic Manager (DNS)

Symptoms:
AXFR zone transfer includes extra RRSIG for A/AAAA records.

Conditions:
When delegated NS record includes multiple name servers.

Impact:
Extra RRSIGs added to records that do not need RRSIG.

Workaround:
None


2186185-1 : Apmd occasionally fails to process a request if SecurID agent is present

Links to More Info: BT2186185

Component: Access Policy Manager

Symptoms:
Apm logs reports errors similar to following:

apmd[32302]: 01490000:3: ApmD.cpp func: "process_apd_request()" line: 2101 Msg: Error 3 reading/parsing response from socket 1023. strerror: Too many open files, queue size 0, time since accept 0 apm 2025-11-10 09:12:49.000 -07:00 Error
apmd[32302]: 01490000:3: HTTPParser.cpp func: "readFromSocket()" line: 117 Msg: epoll_create() failed [Too many open files].

Conditions:
SecuridAuth agent is enabled

Impact:
APMD stops processing further traffic and users are denied access

Workaround:
Restart APMD using the following command:

bigstart restart aced
bigstart restart apmd


2185537-3 : Application Security Administrator role cannot edit the General Settings of parent policies from the GUI

Links to More Info: BT2185537

Component: Application Security Manager

Symptoms:
When attempting to edit a parent ASM policy through the GUI, options under the General Settings tab will be greyed out or disabled.

Conditions:
A user with the Application Security Administrator role is logged in and attempting to edit the General Settings of a parent ASM policy through the GUI.

Impact:
Accounts with the Application Security Administrator role will be unable to edit the General Settings of a parent ASM policy through the GUI

Workaround:
By using REST calls instead of the GUI, Application Security Administrators can still make the necessary edits.


2185109-3 : High memory usage in REST query for ASM policies and virtualServers with huge L7 policy

Component: Application Security Manager

Symptoms:
A REST query for ASM policies with associated Virtual Servers fails and causes the ASM-config daemon process to consume massive amounts of memory. This only occurs if there is a large LTM policy on the system with many ASM policy associations.

Conditions:
There is a large LTM policy on the system with many ASM policy associations, and a REST query for ASM policies with associated Virtual Servers is issued.

Impact:
The REST query fails and causes the ASM-config daemon process to consume massive amounts of memory.


2183917-3 : BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled

Links to More Info: BT2183917

Component: Local Traffic Manager

Symptoms:
BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424).

Conditions:
The tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424 ).

This does not always occur.

Impact:
TCP transfer might stall.

Workaround:
None


2183241-2 : Trunk egress traffic is not balanced on some platforms.

Links to More Info: BT2183241

Component: TMOS

Symptoms:
Trunk egress traffic (out) distribution might not be balanced on the following platforms:
- C117 iSeries i2000
- C117 iSeries i850 (Japan)
- C115 iSeries i4000

Conditions:
- Trunk configured.
- Platform on the affected list:
 C117 iSeries i2000
 C117 iSeries i850 (Japan)
 C115 iSeries i4000

Impact:
Trunk egress (out) traffic is not balanced.

Workaround:
None


2183233-3 : TMM crash due to extra trailing CR/LF in iSession reconnects

Links to More Info: BT2183233

Component: Access Policy Manager

Symptoms:
On BIG-IP APM systems, a Traffic Management Microkernel (TMM) crash may occur when a client device sends an extra trailing carriage return/line feed (CR/LF) during an iSession tunnel reconnect. This issue was observed to be triggered by a specific client device and user scenario, where the Edge Client installation was a hybrid of multiple versions, resulting in the transmission of unexpected CR/LF characters after the iSession request.

Conditions:
iSession tunnels in use.
Client device sends an extra CR/LF after the iSession request, often due to a hybrid or corrupted Edge Client installation.

Impact:
Traffic disrupted while tmm restarts.
Disruption of user sessions.
The issue is highly specific to certain client configurations and is not expected to be widespread.

Workaround:
None.


2182061-3 : Management routes not installed on reboots when interface route is recursively required.

Links to More Info: BT2182061

Component: TMOS

Symptoms:
Management routes might not be installed on reboots or config loads when interface route is recursively required.

Conditions:
Have an interface mgmt route, similar to:

    sys management-route /Common/mgmt_gw {
        network 10.10.10.10/32
        type interface
    }

And a mgmt route that uses a hop defined by an interface route:

sys management-route r1{
    gateway 10.10.10.10
    network 10.10.20.1/32
}

Impact:
Some management routes are not installed properly post reboot or config load.

Workaround:
None


2181929-3 : Cipher suite order changes in cipher group after upgrading from v17.1.1.1 to v17.1.3

Links to More Info: BT2181929

Component: Local Traffic Manager

Symptoms:
After upgrading from v17.1.1.1 to v17.1.3, client connections begin negotiating with unexpected lower-priority cipher suites.

Applications sensitive to cipher strength (e.g., credit card payment systems) experience transaction failures or service disruption.

Conditions:
BIG-IP system running v17.1.1.1 is upgraded to v17.1.3
or
When MCPD reload

After the upgrade or MCPD reload, the internal ordering of cipher rules within the cipher group is modified.

Impact:
Failed service due to wrong Ciphers being used by the LTM VS/ Client Profile

Workaround:
Change the group order from Default to Strength in Local Traffic ›› Ciphers : Groups


2181633-1 : Large BIG-IP SSL Orchestrator deployments can cause tmm crash

Links to More Info: BT2181633

Component: SSL Orchestrator

Symptoms:
When a large number of virtual servers are configured on a BIG-IP and traffic is processed by SSL Orchestrator inspection service, TMM can crash if traffic hits the main virtual server before the service virtual server is loaded by TMM.

Conditions:
- BIG-IP SSL Orchestrator deployment has deployed a large number of virtual servers and inspection services.
- BIG-IP loads the entire config simultaneously or TMM is restarted when connections are being continuously sent to the BIG-IP.
- Client connection hits the main SSL Orchestrator virtual server before service virtual server has finished loading the config in TMM.

Impact:
TMM crash occurs intermittently. Traffic disrupted while tmm restarts.

Workaround:
Before reloading a large SSL Orchestrator BIG-IP config or restarting TMM, mark the public virtual servers as disabled.

Enable the public virtual servers individually after reload or TMM restart is successful.


2172069-1 : GTM topology regions updates do not take effect within tmm

Links to More Info: BT2172069

Component: Global Traffic Manager (DNS)

Symptoms:
GTM topology regions updates do not take effect within tmm

Conditions:
Modifications made to gtm topology regions do not take effect when only one client is sending queries. Note that this issue is tmm-thread specific, meaning one or more tmm threads can get into this state, as long as DNS queries keep hitting the same tmm thread(s), coming from the same source IP address(es)

This is a very unlikely scenario in most production environments, and is likely to only be seen during lab testing with client traffic from one or few IP addresses.

Impact:
GTM not answering with latest GTM topology region updates.

Workaround:
Restart tmm, or perform the DNS lookup from a different client IP address (not the same address that the affected tmm thread previously processed a topology-based DNS query from)


2172041-2 : Zone transfer fails for dnsx when the zone file contains TLSA records

Links to More Info: BT2172041

Component: Global Traffic Manager (DNS)

Symptoms:
Dns express zone transfer fails.

Conditions:
Zone containing TLSA records.

Impact:
Zone not able to be transferred to dns express.

Workaround:
None


2171921-2 : BIG-IP APN and VPN - ACCESS can leak HUDEVT_REQUEST_DONE after responding

Component: Access Policy Manager

Symptoms:
When the new DNS record is added to the BIG-IP APM, the Access is crashed in the BIG-IP which results in traffic disruption.

Conditions:
Issue is observed when the New DNS record added/updated to the BIG-IP.

Impact:
TMM crashes thereby impacting traffic.

Workaround:
None.


2162997-3 : AS3 becomes unresponsive after upgrade from 17.1.2.1 to 17.1.2.2 Build 0.311.1

Links to More Info: BT2162997

Component: TMOS

Symptoms:
After upgrading, AS3 queries are not accepted

AS3 responds with:
{
  "code": 404,
  "message": "",
  "referer": "172.18.23.178",
  "errorStack": []
}

Conditions:
Upgraded from 17.1.2.1 to 17.1.2.2 Build 0.311.12

Impact:
After the upgrade, AS3 services become unavailable and attempts to access them return a 404 error

Workaround:
Uninstall the existing AS3 package and Reinstall the AS3 package


2162873-3 : Pipe and backslash characters are not escaped in ArcSight CEF remote logging

Component: Application Security Manager

Symptoms:
Pipe and backslash characters are not escaped in ArcSight CEF remote logging.

Conditions:
A logging profile is configured with ArcSight CEF remote logging format. A log field contains a pipe in the CEF header (such as an Attack Signature name), or a backslash in any log field.

Impact:
Logging records may not be correctly read by ArcSight or other log collector.

Workaround:
None


2162861-3 : 'Connectors' creation screen does not appear

Links to More Info: BT2162861

Component: Access Policy Manager

Symptoms:
When you click Access > Authentication from the WebUI, select AAA Server By Type > Connectors & Configurations from the pull-down menu, and click the Create button, the creation screen does not appear.

Conditions:
Connectors & Configurations from AAA Server by Type

Impact:
Creation screen does not appear.

Workaround:
None


2161209 : A GTM link can become unmonitored when adding a second link to a datacenter

Component: Global Traffic Manager (DNS)

Symptoms:
When a second link is added to a datacenter in BIG-IP DNS GTM, the first link becomes unmonitored if both use gateway_icmp monitors with explicit destination IPs.

Conditions:
Using two links in a GTM Datacenter, and both use gateway ICMP monitors with explicit destination IPs.

Impact:
Only one link may work when both/All links should be monitored independently and remain healthy if reachable.

Workaround:
Use the command "tmsh modify gtm global-settings general monitor-disabled-objects yes."


2154089-2 : "Test" button for monitor object is missing.

Component: TMOS

Symptoms:
Local Traffic >> Monitors >> select monitor >> fill in IP and port >> "Test" button is missing.

Conditions:
Need to test BIG-IP monitors via GUI.

Impact:
Impossible to test monitor from GUI.

Workaround:
Use tmsh instead of GUI for testing the monitor:
K60677941: Verifying monitor configurations using the tmsh utility


2154057-5 : MCPD validations not throwing error when snmpv3 password contains more than 77 characters

Links to More Info: BT2154057

Component: TMOS

Symptoms:
After upgrading, mcpd goes into a restart loop. /var/log/ltm contains the following:

err mcpd[13691]: 0107102b:3: Master Key decrypt failure - decrypt failure - final
notice mcpd[13691]: 01071029:5: Master decrypt final
notice mcpd[13691]: 01071027:5: Master key OpenSSL error: 4006860532:error:0606506D:digital envelope routines:EVP_DecryptFinal_ex:wrong final block length:evp_enc.c:653:
notice mcpd[13691]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
err mcpd[13691]: 01071684:3: Unable to encrypt application variable (/Common/snmpv3user auth_password usmuser /Common/snmpd).

Conditions:
-- SNMPv3 configuration that uses a password containing more than 77 characters
-- An upgrade is performed

This also occurs within a release by saving the config and then forcing a load from text files (`touch /service/mcpd/forceload && pkill mcpd`)

This may also occur with auth-password or privacy-password values that are 78 characters in length or longer

Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.

Workaround:
If a device is currently in an inoperative state and affected by this issue:

- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.


2153897-1 : BIG-IP closes the transport connection immediately after sending a DPA to a peer

Links to More Info: BT2153897

Component: Service Provider

Symptoms:
With Diameter MRF setup, when the BIG-IP receives a diameter DPR message (Disconnect-Peer-Request), it sends a DPA to the peer (Disconnect-Peer-Answer) and then immediately closes the transport connection.

According to RFC6733, ("Diameter Base Protocol") the transport connection should be closed by the remote peer instead.

Conditions:
- BIG-IP configured with a MRF Diameter setup
- BIG-IP receives a Diameter DPR message

Impact:
The BIG-IP system closes the transport connection instead of waiting for the remote peer to close it.

Workaround:
None


2153421-3 : iControl REST /mgmt/toc endpoint and object browser pages are not functioning on BIG-IP v17.x

Links to More Info: BT2153421

Component: TMOS

Symptoms:
When accessing https://<BIG-IP IP address>/mgmt/toc the browser returns the below error

{"code":400,"message":"URI path /mgmt/logmein.html not registered. Please verify URI is supported and wait for /available suffix to be responsive.","referer":"https://10.1.255.175/mgmt/toc","restOperationId":45299775,"kind":":resterrorresponse"}

Conditions:
Access https://<BIG-IP IP address>/mgmt/toc

Impact:
In v17.x returns a blank page instead of object data.

Workaround:
None


2152545-2 : [APM][SAML] High TMM memory sso_saml leak

Links to More Info: BT2152545

Component: Access Policy Manager

Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic

Conditions:
-- Configure a BIG-IP as SAML-SP with ACS binding.
-- Configure SSO for IDP.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2152257-3 : [BGP] remove-private-AS does not work with extended ASN numbers

Links to More Info: BT2152257

Component: TMOS

Symptoms:
Remove-private-AS does not work with extended (4-byte) ASN numbers

Conditions:
Remove-private-AS used in peer configuration.

Impact:
Private AS numbers are not removed.

Workaround:
None


2151885-3 : When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.

Links to More Info: BT2151885

Component: Local Traffic Manager

Symptoms:
When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.

Conditions:
DCHP virtual-server with a pool member using service-down-action feature set to 'reject' or 'drop'.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Re-configure service-down-action on a pool member to 'none'.


2151601-1 : No tmsh command to remove the stateless directive from a virtual server

Links to More Info: BT2151601

Component: Local Traffic Manager

Symptoms:
Cannot remove the stateless directive from a virtual server using tmsh, would need to delete and create the virtual again to achieve the same.

Conditions:
1) A stateless virtual server is present
2) Try making it not stateless using tmsh

Impact:
Virtual server remains stateless

Workaround:
Modify the virtual using GUI


2151505-1 : Cmp_dest_velos is automatically installed on system startup.

Links to More Info: BT2151505

Component: TMOS

Symptoms:
/var/run/cmp_dest_velos is automatically installed on tenant startup.
You no longer need to download it from the host containers.

Conditions:
A need to use the VELOS version of the cmp_dest utility.

Impact:
Previously, the cmp_dest utility had to be manually downloaded from the host containers.

Workaround:
Manually download cmp_dest from the host containers.


2150869-1 : Incorrect information for count of failed login for a user

Links to More Info: BT2150869

Component: TMOS

Symptoms:
/var/log/secure and /var/log/audit show incorrect information for the count of failed logins for a user

Conditions:
A user fails to login either through CLI or GUI

Impact:
Incorrect information in logs can be misleading

Workaround:
None


2150493 : BIG-IP DNS (GTM) may associate LTM virtual server names with the wrong GTM virtual-servers

Links to More Info: BT2150493

Component: Global Traffic Manager (DNS)

Symptoms:
Gtmd may display incorrectly associated the name of a virtual server, as known to the LTM device, with more than one virtual-server defined in the GTM configuration

This can lead to inconsistent probe results and misleading service availability information in GTM, where a gtm virtual server may reflect the status of a different LTM virtual server.

Conditions:
This issue occurs when multiple gtm server ... virtual-servers { ... } objects are configured with the same external address but distinct internal (translation) addresses. For this configuration to be effective, there must be logic in the network's NAT function that performs address translation based on the content of the incoming request, for example by using the SNI value of a TLS handshake, so that multiple internal virtual servers can share the same external IP address.

In such cases, the ltm_name learned from a big3d probe reply for one virtual server may be incorrectly associated with all virtual servers sharing that external IP.

As a result, subsequent <vip> probes may use the wrong ltm_name and reflect the status of an incorrect LTM virtual server.

Impact:
Incorrect virtual server state from gtmd's point of view, which may show services up that are actually down or down which are actually up.

Workaround:
Specify the ltm-name on each virtual server, so that the learned ltm_name from the big3d reply is never used:
 
      tmsh modify gtm server gtmserver1 virtual-servers modify { gtm_name_vs1 { ltm-name ltm_name_vs1 } gtm_name_vs2 { ltm-name ltm_name_vs2 } gtm_name_vs3 { ltm-name ltm_name_vs3 } }

Note that the "ltm name" field can only be set using tmsh or API calls - it is not exposed in the BIG-IP GUI configuration utility.


2150489-5 : Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed.

Links to More Info: BT2150489

Component: TMOS

Symptoms:
After restarting mcpd, mcpd is stuck in a restart loop.

Conditions:
-- You set a DB variable that's encrypted ( proxy.password, configsync.password)
-- Change the SecureVault master key and save the configuration

Impact:
BIG-IP is in inoperative state , MCPD in a restart loop

Workaround:
If a system is affected by this issue, set the DB key back to its default value. Once the configuration is loaded, set the DB key back to the correct value:

   - tmsh modify /sys db config.auditing.forward.sharedsecret value '<null>'


After changing the SecureValue master key but before encountering the issue, run the following command to update the value of the DB key on-disk:

    setdb config.auditing.forward.sharedsecret "$(getdb config.auditing.forward.sharedsecret)"


2149333-1 : BD_XML logs memory usage at TS_DEBUG level

Links to More Info: BT2149333

Component: Application Security Manager

Symptoms:
There are two messages in BD_XML logs that the system reports at the TS_DEBUG log level, but they should be logged as TS_INFO.

BD_XML|DEBUG |Sep 10 14:51:19.335|1456|xml_validation.cpp:1687|after create of profile 754. (xml memory 5111702493 bytes)
BD_XML|DEBUG |Sep 10 14:51:19.335|1456|xml_validation.cpp:1586|add profile 755. name: /ws/replanifierIntervention_V1-0 is soap? 1 (xml memory before add 5111702493 bytes)

Conditions:
These messages can occur when XML/JSON profiles are configured.

Impact:
Messages that should be logged at the TS_INFO level are logged at the TS_DEBUG level. These are informational log messages.

Workaround:
None


2144397-3 : Problems compiling firewall policies when they contain rules using huge address lists

Links to More Info: BT2144397

Component: Advanced Firewall Manager

Symptoms:
Firewall rule compilation hangs indefinitely with high CPU usage, when large address lists (~100k entries) are used. With significant number of duplicate firewall policies.

Conditions:
Occurs on BIG-IP AFM (17.1.2) when firewall policies reference very large address lists as rule sources.

Impact:
Prevents deployment or updates of firewall policies, blocking operations.

Workaround:
None


2144309-3 : TMM might experience a crash when using a fix for Bug783077

Links to More Info: BT2144309

Component: Local Traffic Manager

Symptoms:
TMM might experience a crash when using a fix for Bug783077.

Conditions:
- Running a fix Bug783077.
- Performing operations on IPv6 routes that use nexthop over link-local address.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2144053-1 : IPS hitless upgrade results in TMM clock advance

Links to More Info: BT2144053

Component: Protocol Inspection

Symptoms:
IPS hitless upgrade results in TMM clock advance.

Conditions:
New IPS package is deployed in AFM.

Impact:
In some cases some degree of packet loss has been reported during a second.

Workaround:
None


2144029-1 : DB monitor does not use the correct timezone present in the system

Links to More Info: BT2144029

Component: Local Traffic Manager

Symptoms:
JDBC uses an incorrect timezone rather than the one configured on the system through 'sys ntp timezone'.

In a PostgreSQL-based health monitor, an error similar to the following may occur, for example when 'sys ntp timezone' is set as America/Los_Angeles' (default):

  org.postgresql.util.PSQLException: FATAL: invalid value for parameter "TimeZone": "US/Pacific-New"

In an Oracle health monitor, an error similar to the following may occur, for example when 'sys ntp timezone' is set as 'UTC' when the client presents a timezone of 'Zulu':

  java.sql.SQLException: ORA-00604: error occurred at recursive SQL level 1
  ORA-01882: timezone region not found

Conditions:
1. A DB monitor is in use (eg. PostgreSQL, Oracle).
2. The current timezone of the system is set with a timezone that has multiple equivalent and possibly deprecated aliases, for example:

   - America/Los_Angeles [US/Pacific-New, posix/US/Pacific-New ]
   - UTC [ Zulu, posix/Zulu ]

3. System has /etc/localtime as a normal file instead of a symbolic link.
4. The remote database does not support the presented time zone parameter.

Impact:
Monitor incorrectly marks the pool member down when the remote database server does not recognize the time zone presented by the DB monitor.

Workaround:
Delete the file /etc/localtime:

  rm /etc/localtime

Create a symbolic link for the file pointing to the desired timezone as listed in /usr/share/zoneinfo:

  For example, if you have 'sys ntp timezone UTC', the command would be:

  ln -sf /usr/share/zoneinfo/UTC /etc/localtime


  If you have 'sys ntp timezone America/Los_Angeles', the command would be:

  ln -sf /usr/share/zoneinfo/America/Los_Angeles /etc/localtime


2143109-3 : BIG-IP VE with more CPU cores than licensed enters TMM restart loop (TMM PU (<num_cores>) >= number of PUs (<num_licensed_cores>)) after mcpd restart

Links to More Info: BT2143109

Component: TMOS

Symptoms:
Mcpd crash or restart causes TMM to enter a restart loop.
Log - notice TMM PU (7) >= number of PUs (4)
Device becomes unreachable in the data plane.

Conditions:
BIG-IP VE with more vCPUs than licensed cores.
Example: 8-core Azure instance with a 4-core VE license.

Modules: AFM (nominal) and AVR (minimum) provisioned.

Occurs after mcpd restart or crash.

Impact:
System enters a TMM restart loop and remains offline.
Traffic processing and configuration access are unavailable until manual correction.

Workaround:
Manually set the provision.tmmcount DB variable to match the licensed core count, then restart services or reboot.

For example on an 8-core instance which is licensed for only 4-cores:

  tmsh modify sys db provision.tmmcount value 4


2141297-3 : In TLSv1.3, BIG-IP enforces the use of FFDHE key share if it is preferred over other DH groups

Links to More Info: BT2141297

Component: Local Traffic Manager

Symptoms:
The BIG-IP system sends back an FFDHE key share that forces the client to also use FFDHE, even if the client sent a key share that is still acceptable to the BIG-IP.

Conditions:
The BIG-IP system is configured to prefer an FFDHE DH group and the client sends the same FFDHE DH group as supported but sends a key share for a different DH group.

Impact:
Clients are forced to use the FFDHE group for its key share even if the client sent a key share that is still acceptable to the BIG-IP

Workaround:
Either remove the FFDHE groups, or reorder DH group preferences so that FFDHE groups are not preferred over other groups.


2141109-2 : The URL categorisation daemon's DNS cache is never refreshed

Links to More Info: BT2141109

Component: Traffic Classification Engine

Symptoms:
When the URL categorisation daemon (wr_urldbd) starts or restarts, it queries the DNS resolver for the Brightcloud online service domains that are used for some of the real-time URL queries, and populates the DNS Cache with the results.
After populating the cache, it never refreshes or updates it.

When Brightcloud change the DNS records of their service domains, all the new SSL handshakes from the URL categorisation daemon, needed for the real-time URL categorisation queries, fail with these errors in wr_urldbd.out:

WR_URLDBD: Sep 30 12:01:08.836:Tid(41843):async_lookupCallback:702 Error processing URL:*.example.com and Status Code:S_ErrArg
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1

BC_SDK: 2025-09-30 12:01:08 ERROR: SSL error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1

Conditions:
- URL categorisation license installed on the system, and URL categorisation configured and in use.

Impact:
Some time after the URL categorisation daemon starts or restarts, all URL categorisation real-time queries for URLs not already in the local database fail.

Workaround:
When the real-time queries start failing with the error described above, restart the wr_urldbd daemon with:
"bigstart restart wr_urlrdbd"


2139893-3 : vCMP guest may become unresponsive for several minutes due to kernel soft lockup

Links to More Info: BT2139893

Component: TMOS

Symptoms:
A vCMP guest may become unresponsive for approximately 600 seconds, during which time:

- Odd-numbered CPUs assigned to the guest (for example, CPUs 1, 3, 5, 7, 9, 11) show 100% utilization.
- No logs, statistics, or management-plane responses are generated.
- Kernel logs report NMI watchdog soft lockup messages indicating a kernel deadlock.
- The issue triggers a failover event and a restart of all services on the affected guest.

Kernel logs indicate the lockup occurs on control-plane CPUs and is associated with memory management and TLB flush operations.

Conditions:
This issue may occur under the following conditions:

-- vCMP guest running on a BIG-IP system.
-- Guest operating under a Linux 3.10-based kernel.
-- High control-plane activity involving memory operations (for example, process creation, termination, or memory unmapping).
-- Issue observed in virtualized environments (for example, KVM-based platforms).
-- Exact steps to reproduce are currently unknown.

Impact:
-- Temporary loss of management and control-plane responsiveness for the vCMP guest.
-- Automatic failover to a standby unit may occur.
-- Restart of BIG-IP services on the affected guest.
-- Potential disruption to traffic handling during failover, depending on deployment architecture.

Workaround:
None.


2139637-3 : TMM crash because of invalid context

Links to More Info: BT2139637

Component: Local Traffic Manager

Symptoms:
Tmm crashes during QUIC packet loss handling due to invalid context.

Conditions:
LTM configured with UDP and QUIC.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2138273-3 : Named service fails to start after an upgrade due to unsupported attributes in the named.conf file

Links to More Info: BT2138273

Component: SSL Orchestrator

Symptoms:
Named fails to start with the following error after upgrading from older versions to 17.0 or newer releases due to the dnssec-lookaside and dnssec-enable options in the named.conf configuration file, which have been deprecated and are no longer supported in the latest BIND versions.

Logs in /var/log/daemon.log :
Oct 22 14:08:00 localhost.localdomain err named[16313]: /config/named.conf:35: option 'dnssec-lookaside' no longer exists
Oct 22 14:08:00 localhost.localdomain crit named[16313]: loading configuration: failure
Oct 22 14:08:00 localhost.localdomain crit named[16313]: exiting (due to fatal error)
Oct 22 14:08:00 localhost.localdomain notice systemd[1]: named.service: main process exited, code=exited, status=1/FAILURE
Oct 22 14:08:00 localhost.localdomain notice systemd[1]: Unit named.service entered failed state.
Oct 22 14:08:00 localhost.localdomain warning systemd[1]: named.service failed.

Conditions:
-- SSL Orchestrator System Settings >> DNS settings have been specified.
-- SSL Orchestrator L3 Explicit Topology Configured using the default SSL Orchestrator DNS resolver.
-- Check the BIND Version: Use the following command:
Example:
For example :
# named -v
BIND 9.11.36 (Extended Support Version) <id:68dbd5b>

Notes:

-- Starting with BIND 9.9, the dnssec-lookaside validation (DLV) feature was deprecated. By BIND 9.11, this feature was removed entirely.
-- Beginning with BIND 9.16, the dnssec-enable option was deprecated and subsequently removed.

Impact:
SSL Orchestrator will fail to resolve hostnames for the L3 Explicit topology causing end-to-end traffic to fail.

Workaround:
- Redeploy the affected L3 Explicit topology - this will use the native DNS resolver implementation and will no longer rely on BIND or named service, ensuring that end-to-end SSL Orchestrator traffic functions properly.


To fix the named service:

-- Remove the deprecated directives dnssec-lookaside and dnssec-enable from the BIND configuration file located at:
/var/named/config/named.conf.
-- After making these changes, restart the named service to apply the updated configuration by running the following command: bigstart restart named


2138181-1 : Low thresholds for tcp-ack-ts vector caused outage after BIG-IP upgrade to 17.1.3

Links to More Info: BT2138181

Component: Advanced Firewall Manager

Symptoms:
A number of DoS vectors were added in version 17.1.0 and are set to Mitigate by default. The list of vectors that were added is described in K41305885: BIG-IP AFM DoS vectors
https://my.f5.com/manage/s/article/K41305885

These include
- TCP ACK (TS)
- TCP ACK Flood
- TCP Flags Uncommon

Additionally, a DoS vector behavior has changed:
- Bad TCP Flags Malformed

Conditions:
Old threshold values (Detection EPS Threshold: 200, Mitigation EPS Threshold: 100) are still being used, which are too low compared to the new defaults.

Impact:
These low thresholds trigger frequent DoS attack detections, leading to disruptions in service.

Workaround:
Change the threshold to the new defaults or any reasonable values accordingly.

For example:
#tmsh modify security dos device-config dos-device-config dos-device-vector { tcp-ack-ts {default-internal-rate-limit 300000 detection-threshold-pps 200000}}


2137909-2 : Portal Access: unwanted decoding html entities in attribute values of HTML tags

Links to More Info: BT2137909

Component: Access Policy Manager

Symptoms:
HTML Entities in Attribute values in HTML tags are decoded when they shouldn't be.

Conditions:
Portal Access is enabled

Impact:
Unwanted Application errors

Workaround:
None


2137661-2 : GTM link object is deleted automatically after being added

Links to More Info: BT2137661

Component: Global Traffic Manager (DNS)

Symptoms:
GTM link is deleted.

Conditions:
Link auto discovery is enabled on GTM server object.

Impact:
GTM link is falsely deleted by the system.

Workaround:
Disable link auto discovery on GTM server object.


2132209-3 : TMM crash while sending ACKs in invalid context

Links to More Info: BT2132209

Component: Local Traffic Manager

Symptoms:
Tmm crashes while QUIC is trying to send an ACK in invalid context.

Conditions:
LTM configured with UDP and QUIC.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2132125-8 : Unable to upload QKView to iHealth

Links to More Info: K000157248, BT2132125

Component: TMOS

Symptoms:
Message displayed after attempting to upload a QKview:
Failed to upload the QKView file to iHealth

Conditions:
Unable to upload QKView.

Impact:
Can't upload.

Workaround:
You can download the qkview file from the BIG-IP and then upload it through the iHealth webui.


2131833-5 : F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable

Links to More Info: BT2131833

Component: TMOS

Symptoms:
On F5OS/rSeriers r2xxx/r4xxx , in rare conditions the management interface is not reachable due to a timing and ordering issue probing network interfaces

In the BIG-IP Tenant, the network interfaces eth0 or mgmt are missing

Conditions:
This condition is rare and when it does its usually seen on tenant first boot.

Impact:
Unable to reach BIG-IP Tenant management address.

Workaround:
Reboot tenant


2131597-3 : BGP graceful restart might not accept a new connection immediately after neighbor failover.

Links to More Info: BT2131597

Component: TMOS

Symptoms:
When a remote peer restarts and BGP graceful restart mechanism is advertised and received, BIG-IP might not immediately accept a new connection from a restarting peer.

Conditions:
- BIG-IP system is licensed for Routing Bundle.
- BGP graceful restart mechanism is advertised and received.
- Remote peer is still restarting.

Impact:
New connection might take longer to establish.

Workaround:
Make sure the BIG-IP local router-ID is lower than the re-connecting peer ID.


2131085-2 : Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state

Links to More Info: BT2131085

Component: Local Traffic Manager

Symptoms:
Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest or VIPRION causes BIG-IP to get stuck in unhealthy state.

MCPD is failing to load with the error '01070710:3: Could not find master-key object':

slot3/tenant1.example.com notice clusterd[7956]: 013a0024:5: Blade 3: Changing primary from 0 (none) to 2
slot3/tenant1.example.com err clusterd[7956]: 013a0018:3: Blade 3 turned RED: Quorum: stepping slow clock forward by 747.133704 ms, HA TABLE offline
slot3/tenant1.example.com notice clusterd[7956]: 013a0006:5: Blade status: 0 GREEN 1 YELLOW 1 Not Ready
slot1/tenant1.example.com notice mcpd[4785]: 01070419:5: Platform initialization phase triggered.
slot2/tenant1.example.com emerg load_config_files[9951]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070

All slots will have an Availability of "offline" as reported in tmsh show sys cluster:

[root@rdt2:/S1-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster

-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.0.0.2/16
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26

  -----------------------------------------------------------------------------------------------------
  | Sys::Cluster Members
  | ID Address Alt-Address Availability State Licensed HA Clusterd Reason
  -----------------------------------------------------------------------------------------------------
  | 1 :: :: offline enabled true offline running Run, HA TABLE offline
  | 2 :: :: offline enabled false offline running Run, HA TABLE offline

Conditions:
1. Multi-slot F5OS tenant or Multi-slot vCMP guest or multi-bladed VIPRION.

2. Rebooting all the slots of the guest or tenant (e.g. 'tmsh reboot slot all' or 'clsh reboot')

Impact:
All tenant or VCMP guest slots remain offline, and are inoperable from a traffic standpoint.

Multiple blades might hold the cluster mgmt addr.

Workaround:
For both tenants and guests, re-deploying them has a high probability of resolving the issue.
That is changing the tenant's or guest's state from "deployed" to "provisioned" or "configured", and then back to "deployed".

or

Restarting mcpd on the primary slot also has a high probability of resolving the issue.

Tmsh show sys cluster will report the "Primary Slot ID"

# tmsh show sys cluster

-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address address
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26

Both workarounds are highly likely to restore the tenant or guest to full functionality.

Note: the issue might return if all tenant or guest slots are rebooted.


2130329 : [GTM] Deletion of topology records makes MCPD memory ramp up

Links to More Info: BT2130329

Component: Global Traffic Manager (DNS)

Symptoms:
The MCPD memory ramp-up might result in being killed by sod or out of memory.

Conditions:
Delete thousands of GTM topology records in a short period of time, and the full GTM sync is triggered.

Impact:
The MCDP memory is stuck or being killed by sod.

Workaround:
Do not delete a large number of GTM topology records in a short period of time.


2077357-3 : Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC.

Links to More Info: BT2077357

Component: Local Traffic Manager

Symptoms:
In a case where a proxy listener intercepts traffic going over a virtual-wire and there is no server-side traffic (TCP re-transmit timeout), a RST generated towards the server might have 00:00:00:00:00:00 source MAC.

Conditions:
Proxy listener intercepts traffic going over a virtual-wire.
There is no server-side traffic for the flow.

Impact:
RST might not be delivered to the server.

Workaround:
None


2064209-4 : FQDN node created from pool member via tmsh does not inherit "autopopulate" value

Links to More Info: BT2064209

Component: TMOS

Symptoms:
When using the tmsh command-line interface (CLI) to create an FQDN pool member, an FQDN node is created implicitly using values specified for the FQDN pool member.
However, if the "autopopulate" value is specified as "enabled" (instead of the default "disabled"), the FQDN node is created with the "autopopulate" value set to "disabled" (default).

Conditions:
This occurs when:
-- Creating an FQDN node implicitly by explicitly creating an FQDN pool member
-- Using the tmsh interface to perform this action.
-- Specifying a non-default value of "enabled" for the "autopopulate" option

Impact:
The FQDN node will be created with an "autopopulate" value of "disabled", which means that only a single ephemeral node will be created based on DNS resolution of the FQDN name.
Since only a single ephemeral node is created, only a single ephemeral pool member will be created, and the "autopopulate" option will not exhibit the "enabled" behavior.

Workaround:
To work around this issue using tmsh command-line interface (CLI):
-- First create the FQDN node with the desired configuration values.
-- Then create the FQDN pool member, referencing the previously-created FQDN node.

To correct the configuration of the FQDN node, the FQDN node and pool member must be deleted and re-created:
1. Delete FQDN pool member
2. Delete FQDN node
3. Create FQDN node with desired configuration
4. Create FQDN pool member with desired configuration


2058541-4 : [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer.

Links to More Info: BT2058541

Component: TMOS

Symptoms:
BIG-IP does not follow the updated section (https://www.rfc-editor.org/rfc/rfc4724.html#section-4.2) when handling a new connection from a peer. Instead, section https://datatracker.ietf.org/doc/html/rfc4271#section-6.8 is followed.

This leads to a new connection from a peer being dropped when Graceful Restart happens.

Conditions:
BGP is configured with graceful restart.
Peer restarts.

Impact:
BIG-IP will drop a new connection request and try to open a new connection right away.

Workaround:
None


2053893-4 : Incompletely-synced ASM configuration can be synced back to the original device or group

Links to More Info: BT2053893

Component: Application Security Manager

Symptoms:
The incomplete ASM configuration on the new device may be synced to the device group, overwriting the original and complete ASM configuration when an ASM configuration is in the process of being synced from an existing device or group to a new device joined to the group, and there is a request to sync the new device to the group.

Conditions:
This may occur when,
-- Multiple device groups are configured, including:
   -- a (non-ASM) Sync Failover device group
   -- an ASM Sync-Only device group
-- Both device groups are configured for Manual Full Sync.
-- The ASM configuration is large enough to require several minutes to apply the complete configuration.
-- A new device has joined the cluster and device groups, which has no existing ASM configuration (or, a much smaller subset of the cluster's existing ASM configuration.
-- The configuration is synced from an existing device to the non-ASM device group (and thus to the new device).
-- After the ASM configuration is synced from an existing device to the ASM device group (and thus to the new device).
-- After the ASM configuration is synced from the new device to the ASM device group (and thus to the existing devices).

Impact:
Depending on the size of the ASM configuration, system performance and network throughput, the ASM configuration may take a long time to sync to the new device, and may appear to be only partially synced in the meantime.
Depending on timing and other non-deterministic conditions, this partially-synced ASM configuration may be synced back to the device group.
When this occurs, the existing ASM configuration may be overwritten by the partial ASM configuration on the new device, resulting in a loss of ASM functionality.

Workaround:
To avoid this issue when multiple device groups are configured, which include both an ASM and non ASM device group, and both groups are configured for Manual Full Sync:
-- Sync the ASM device group first.
-- Wait to confirm that the full ASM configuration has been synced to the new device before initiating any further sync operations.
-- Be careful not to inadvertently select the new device (with incomplete ASM configuration) as the device to sync to the device group.


2053489-4 : Config Sync events may not be recorded in audit log

Links to More Info: BT2053489

Component: TMOS

Symptoms:
When a command is issued on a BIG-IP system to sync configuration to a Device Group from a given Device in the Device Group, the config sync command may not be recorded in the audit log on the device where the command was issued.
The audit log may not record this command, even though subsequent log messages in other log files may indicate successful completion of the config sync action.

Conditions:
This may occur when:
-- Issuing the command to sync configuration from a Device to a Device Group in which it is a member.
-- Issuing such a command from either the command-line interface (tmsh) or from the BIG-IP GUI (tmui).
-- Accepting the default/offered suggestion for the Device whose configuration is to be synced to the Device Group.
For example:
-- In the GUI, accepting the default selection indicated by the active radio button for which Device to sync to the Device Group, and clicking Sync.
-- In the CLI, issuing the "tmsh run cm config-sync" command with the "to-group" option from the Device which is suggested by the "tmsh show cm sync-status" command.

Impact:
When attempting to diagnose issues that occur in the context of syncing configuration across Devices in a Device Group, it may not be clear where, when, and by whom the command to initiate the config sync was issued.


2047585 : Modifying GTM monitor type from https to tcp to back https could set "compatibility" field to "none"

Links to More Info: BT2047585

Component: Global Traffic Manager (DNS)

Symptoms:
When creating a GTM HTTPS monitor, then changing it to TCP monitor type and back to HTTPS, the compatibility field is set to "none."

Conditions:
Using GTM and an HTTPS monitor.
Changing the monitor type to TCP and then back to HTTPS

Impact:
The compatibility field can be set back to "none."

Workaround:
After changing an HTTPS monitor type to TCP and then back to HTTPS, make sure that the compatibility is set appropriately.


2047137-3 : TMM core may occur while using APM VDI with Blast UDP

Links to More Info: BT2047137

Component: Access Policy Manager

Symptoms:
User may fail to access the remote desktop using APM vmware VDI, if a TMM core occurs due to the unavailability of one of the internal database variable.

Conditions:
The user attempts to connect to the desktop or app using VMware Client or a browser via the Blast protocol over UDP, and the session variable is deleted due to a timeout.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


2038429-2 : Issue with ike_ctx causes memory corruption

Links to More Info: BT2038429

Component: TMOS

Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.

Conditions:
Occurs on systems with long uptimes and when IPsec is configured.

Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.

Workaround:
None


2038425-2 : Issue with ike_ctx causes memory corruption

Links to More Info: BT2038425

Component: TMOS

Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.

Conditions:
Occurs on systems with long uptimes and when IPsec is configured.

Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.

Workaround:
None


2038421-2 : Issue with ike_ctx causes memory corruption

Links to More Info: BT2038421

Component: TMOS

Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.

Conditions:
Occurs on systems with long uptimes and when IPsec is configured.

Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.

Workaround:
None


2038417-2 : Issue with ike_ctx causes memory corruption

Links to More Info: BT2038417

Component: TMOS

Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.

Conditions:
Occurs on systems with long uptimes and when IPsec is configured.

Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.

Workaround:
None


2033781-4 : Memory allocation failed: can't allocate memory to extend db size

Links to More Info: BT2033781

Component: Local Traffic Manager

Symptoms:
When tmm cannot expand the eXtremeDB database, it logs an error in /var/log/tmm:

err tmm1[21087]: 01010004:3: Memory allocation failed: can't allocate memory to extend db size

Conditions:
-- BIG-IP in operation
-- A configuration change is made that causes tmm to allocate more memory to eXtremeDB. Examples include:
  - Adding a clientssl or serverssl profile
  - Modifying a datagroup
  - A bot defense sync occurs

Impact:
Tmm does not crash but the eXtremeDB state is inconsistent with other tmms and could lead to unpredictable behavior such as virtual servers not working, iRules failing to work, bot defense failing to work

Workaround:
None


2014597-4 : Async session db ops are missing flow control

Links to More Info: BT2014597

Component: TMOS

Symptoms:
Tmm crash while hanling SSL traffic

Conditions:
-- SSL traffic
-- Heavy load

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1991717-1 : Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN's

Links to More Info: BT1991717

Component: Advanced Firewall Manager

Symptoms:
- Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN addresses.

Conditions:
- AFM Provisioned on v17.5.0
- Configure a dns-resolver under global-fqdn-policy.
- Configure a shared object list with a Geo or FQDN address.
- Install 17.5.1 on a boot location.
- Upgrade to 17.5.1

Impact:
Upgrade fails from 17.5.0 to 17.5.1 with the following error:

Syntax Error:(/config/bigip_base.conf at line: 649) "geo" unknown property

Workaround:
- Identify the rules and the lists and comment them out of the bigip_base file that are involved in the firewall rules.
- Upgrade to 17.5.1 or load the config again.

or

1. Remove the shared objects address list from the AFM rules and then the shared objects address lists with Geo or FQDN addresses.
2. Once after an upgrade, add address list again to AFM rules and Geo or FQDN


1991485-2 : Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.

Links to More Info: BT1991485

Component: TMOS

Symptoms:
Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.

Conditions:
Deleting and re-adding a tunnel with exactly same name as the tunnel that was just deleted.

Impact:
Tunnel might no longer pass traffic indicating 'Incoming Discard' drops.

Workaround:
Use a different name for the tunnel.


1989033-4 : IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT

Links to More Info: BT1989033

Component: Local Traffic Manager

Symptoms:
In very rare circumstances the BIG-IP may fail to initiate or respond to an IKEv2 tunnel.

When debug2 is enabled, the following log messages in the tmm log indicates a potential match for this bug. ERR_PORT is a critical indicator of the failure condition.

<13> <date> <hostname> notice ike_connect/3154: @F: ike flow created 172.16.61.100:172.16.61.200 rd: 0 owner=0.2 me=0.2
<13> <date> <hostname> notice ike_connect/3218: @F: ISAKMP_CONN local=172.16.61.100:500 remote=172.16.61.200:500
<13> <date> <hostname> notice ike_proxy_connect/1510: @E: flow_connect() ERR ERR_PORT
<13> <date> <hostname> notice ike_connect/3241: @E: ERR ERR_PORT
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5231: @E: can't create isakmp flow to 172.16.61.100:500 172.16.61.200:500 %0, err ERR_PORT.
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5241: @E: ERR ERR_PORT

The ipsec.log will contain different messages.

ipsec.log - BIG-IP attempts to start the connection, the INTERNAL_ERR is a critical indicator:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:deepcopy:MAKE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INTERNAL_ERR]: ikev2_allocate_sa: ERR Invalid BIG-IP flow context for <local IP>[500]-><remote IP>[500] peer='/Common/<ike peer name>'
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_allocate_sa: @A: Insert ike_sa 0x4000c7aa2c88, SPI 1c96e4465b82fc39 0000000000000000 in list (peer='/Common/<ike peer name>')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state IDLING -> DH_REQ
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate_callback] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_REQ -> DH_DONE
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_next_request_id: @A: send message (id 0) sa=0x4000c7aa2c88 (loc=<local IP>[500] rem=<remote IP>[500])
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_DONE -> INI_IKE_SA_INIT_SENT
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:PUSH:ikev2_send_request' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (payloads dir=SEND at=ikev2_send_request payl=0x4000c442ca88 len=432 crc=0x47699687
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (v2_head i_spi=0x1c96e4465b82fc39 r_spi=0x0000000000000000 next=33:PAYLOAD_SA
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . . . ver=0x20 exch=34:IKE_SA_INIT flags=0x8:I-Q id=0 len=432 crc=0x47699687)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (hd type=33:PAYLOAD_SA next=34:PAYLOAD_KE byte=0 len=48 off=0x1c)
...

ipsec.log - BIG-IP retransmits a few more times:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 1
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 2
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 3

ipsec.log - BIG-IP cancels the negotiation after a timeout:

<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback1 ike_sa rmconf : 3335236104
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback2 rmconf ikev2 : 3343372872
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback3 ikev2 plog : 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: negotiation timeout: ike_sa (ick=0x1c96e4465b82fc39, rck=0x0000000000000000)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [PROTO_ERR]: __ikev2_abort: ike_sa=0x4000c7aa2c88 ABORT, ERR errno='110', SPI 1c96e4465b82fc39 0000000000000000
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state INI_IKE_SA_INIT_SENT -> DYING
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:POP:ikev2_cancel_retransmit_req' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DYING -> DEAD
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_ha_send_sa_delete: high availability (HA) SA is already deleted from Session DB
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:clean:FREE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')

Conditions:
-- IPsec IKEv2
-- Tunnel may be newly configured
-- BIG-IP does not transmit or respond to any packets related to the configured tunnel.

Impact:
When this occurs, the tunnel will be down permanently.

Workaround:
If this is a High Availability (HA) peer and the config is sync'd with the Standby, failing over to the Standby may bring the tunnel up.

However, a second failover (fail back to the original high availability (HA) device) will lead to the tunnel down again. The original device once Active again, is still in the same failure mode.

One workaround is to failover, check the tunnel is up and then reboot or 'bigstart restart' the failing Standby device.

After that, the IKE SA should appear correctly mirrored on the Standby, use 'tmsh show net ipsec ike-sa' and check there is an SA with the peer's IP.

The second workaround is to delete all IPsec config objects, self IP and route-domain associated with the tunnel. In the case where the IPsec config, self IPs and routes exist entirely in route-domain 0 this is not a reasonable solution and rebooting is the most sensible recovery step.


1988953 : A DNS profile with edns0-client-subnet-insert enabled does not handle EDNS version greater than zero

Links to More Info: BT1988953

Component: Global Traffic Manager (DNS)

Symptoms:
A DNS profile with edns0-client-subnet-insert enabled does not handle EDNS versions greater than zero

Conditions:
DNS profile setup with edns0-client-subnet-insert enabled

Impact:
The response will show RCODE NOERROR (0x0) when it should show RCODE BADVERS (0x10)

Workaround:
NA


1987405-4 : Virtual address ICMP and ARP setting might be inconsistent when traffic-matching-criteria is in use.

Links to More Info: BT1987405

Component: Local Traffic Manager

Symptoms:
Using traffic-matching-criteria [TMC] destination IP lists and defining virtual-addresses matching TMC destinations might lead to unpredictable behavior on ARP/ICMP virtual-address settings.

Conditions:
-- Using traffic-matching-criteria.
-- Destination specified in traffic-matching-criteria list is the same as defined virtual-address.

Impact:
ICMP/ARP settings might not apply properly to configured virtual-addresses.

Workaround:
None


1977037-2 : TMM Virtual Edition on Azure goes into crash loop due to missing kernel driver

Links to More Info: K000153024, BT1977037

Component: Local Traffic Manager

Symptoms:
- TMM goes into crash loop
- Repeated logs similar to the following can be seen from /var/log/tmm*

 notice dpdk[001dd800-2e3d-001d-d800-2e3d001dd800]: DPDK internal port_id 2
 notice dpdk: Error: DMA mapping of application heap failed with rte_error Operation not supported
 notice dpdk: Error: app_heap_dma_map: app heap DMA mapping failed with rte_errno Operation not supported
 notice dpdk[001dd800-2e3d-001d-d800-2e3d001dd800]: Error: DMA mapping application heap
 notice dpdk: Error: Removing heap memory (0x40016a600000, 67108864 bytes): Device or resource busy
 notice xnet_lib [vmbus:eth2]: Error: Failed to initialize driver
 notice xnet[00:e2.0]: Error: Unable to attach to xnet dev
 notice xnet(1.2)[00:e2.0]: Error: Unable to initialize device
 notice xnet(1.2)[00:e2.0]: Waiting for tmm1 to reach state 4...
 notice ndal Error: Restarting TMM

Conditions:
- BIG-IP Virtual Edition is running on Microsoft HyperV on Azure Cloud
- Mellanox ConnectX-3 NIC is used
- XNET driver is being used

Impact:
TMM is unable to successfully start. Device is unable to process traffic.

Workaround:
Configure BIG-IP Virtual Edition to use the sock driver by entering the following command:

  echo "device driver vendor_dev f5f5:f550 sock" >> /config/tmm_init.tcl

Reboot the BIG-IP VE instance by entering the following command:

  reboot


1974869-3 : Unable to load config after upgrading to v17.1.3/v17.5.x with the Syntax Error: "state" may not be specified more than once.

Links to More Info: BT1974869

Component: Advanced Firewall Manager

Symptoms:
After upgrading a BIG-IP AFM device from version 16.1.x to 17.1.3/17.5.x, the device fails to come online.

Affected vectors that might have duplicated state entries in bigip.conf:

-- bad-tcp-flags-malformed
-- tcp-ack-ts
-- tcp-flags-uncommon

Conditions:
Set the all network device-config vectors into detect-only state and then initiate upgrade from v16.1.x to v17.1.3/v17.5.x

Impact:
The BIG-IP device fails to load its configuration and does not come online after the upgrade.

Workaround:
-- Manually remove the duplicate state entry in bigip.conf.
-- Perform "tmsh load sys config verify" or reboot


1970969-4 : Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache

Links to More Info: BT1970969

Component: Global Traffic Manager (DNS)

Symptoms:
Stale Record Answers counter increments incorrectly when no stale record is served and a SERVFAIL is sent.

Conditions:
-- Configure DNS cache resolver with a forwarder.
-- Make sure forwarder does not respond to DNS queries.
-- Enable 'ltm dns cache global-settings serve-expired'
-- Send a few DNS requests to DNS cache for a record which is to be handled by not responding forwarder.
-- Observe 'Stale Record Answers' counter for DNS cache.

Impact:
Leads to incorrect Stale Record Answers stat, potentially misleading monitoring, troubleshooting, and operational decisions.

Workaround:
None


1967293-4 : Re-configuring BFD multihop for a BGP peer does not work reliably.

Links to More Info: BT1967293

Component: TMOS

Symptoms:
When changing the BFD multihop configuration of a BGP peer, the previously existing BFD session might not be cleared properly preventing a new session from getting established.

Conditions:
Change the BFD multihop configuration of a BGP peer.

Impact:
Unable to establish BFD session.

Workaround:
Remove the BFD completely, then apply a new config.


1965149 : A local zone with "." as its prefix is allowed through tmsh and webui

Component: Global Traffic Manager (DNS)

Symptoms:
Adding a local zone with "." as its prefix is allowed through tmsh and webui.
A leading dot implies an empty label before the dot, which violates DNS syntax rules.

Conditions:
Using Local zone

Impact:
zone name as "." prefixes are allowed when they should be blocked

Workaround:
Do not set up local zones with '.' as a prefix, as it violates DNS syntax rules.


1962713 : Limit on BIND maximum records per type

Links to More Info: BT1962713

Component: Global Traffic Manager (DNS)

Symptoms:
Zones with over 100 records of the same type trigger an error during loading after upgrading to 17.1.2 or higher release, similar to the following:

error: dns_master_load: db.external.example.f5.com.:378: record1.example.f5.com.: too many records

zoneload: error: zone example.f5.com/IN/external: loading from master file db.example.f5.com. failed: too many records

zoneload: error: zone example.f5.com/IN/external: not loaded due to errors.

Conditions:
Occurs when "max-records-per-type" in a zone exceeds the default limit of 100.

Upgrading to 17.1.2 or higher release, given the BIND version upgrade that comes along with it, especially if configured for a single GTM pool with more than 100 members or cumulative pools exceeding 100 members.

Configuration changes to "max-records-per-type" won’t be accepted prior to the upgrade given that new BIND version (9.18.28) is not yet installed.

Impact:
BIND refuses to load zones, resulting in service disruption for affected zones.

Workaround:
After upgrading to v17.1.2 or higher, increase the max-records-per-type value as required. For instructions on how to do that, follow the steps documented in this article: https://my.f5.com/manage/s/article/K000150564


1953273-5 : Big3d high CPU with thousands of https monitors with SNI

Links to More Info: BT1953273

Component: Global Traffic Manager (DNS)

Symptoms:
Big3d high CPU utilization occurs

Conditions:
Large volume of https monitors and monitored resources with SNI configured.

Impact:
Big3d high CPU utilization

Workaround:
None


1937545-3 : Disabling ipsec.if.checkpolicy lead to premature connection termination for a tunneled traffic

Links to More Info: BT1937545

Component: TMOS

Symptoms:
Connections arriving at the BIG-IP over an IPsec tunnel may be unexpectedly closed when ipsec.if.checkpolicy is disabled and the Virtual Server uses SNAT.

Conditions:
- BIG-IP with more than 1 TMM.
- IPsec tunnel in Interface mode.
- FastL4 Virtual Server with SNAT.
- sys db ipsec.if.checkpolicy is disabled.
- Traffic is initiated from behind the remote peer and uses auto lasthop to return traffic, ie there is no routing for the protected traffic back towards the client.

Impact:
Connections arriving via IPsec are unexpectedly and prematurely closed.

Workaround:
The sys db ipsec.if.checkpolicy is enabled by default.

Do not disable ipsec.if.checkpolicy when SNAT is on the Virtual Server that handles traffic for an IPsec tunnel.


1936049 : A configuration of wideips with same FQDNs but different paths may not be prevented by the control plane

Links to More Info: BT1936049

Component: Global Traffic Manager (DNS)

Symptoms:
If a wideIP is created within a partition and folder that also includes an alias, and subsequently a new wideIP with the same FQDN, but a different type, is created in the same partition but without the folder, the new wideIP is not rejected.

Conditions:
A wideIP is created within a partition and folder that also includes an alias.
Subsequently, a new wideIP with the same FQDN, but a different type, is created in the same partition.

Impact:
The config is saved, and subsequently running 'tmsh load sys config gtm-only' may fail.

Workaround:
NA


1935713-3 : TMM crash when handling traffic over vlangroup with autolasthop disabled

Links to More Info: BT1935713

Component: Local Traffic Manager

Symptoms:
In certain circumstances, TMM may crash when handling traffic over a vlangroup with autolasthop disabled.

Conditions:
- Vlangroup.
- No self-IP addresses configured.
- Autolasthop is disabled.

Impact:
Traffic is disrupted while restarting TMM.

Workaround:
Enable autolasthop.


1934865-3 : Remove multiple redundant entries for port-list objects in configuration file

Links to More Info: BT1934865

Component: Advanced Firewall Manager

Symptoms:
When a port-list object is created using TMSH, REST or GUI under any context, redundant entries for the same object are generated in the configuration file under three contexts:

net port-list
security firewall port-list
security shared-objects port-list
For example, a port-list created using one CLI results in multiple entries referring to the same schema object, such as:
net port-list /Common/portListExample {
    ports {
        80 { }
        443 { }
    }
}

security shared-objects port-list /Common/portListExample {
    ports {
        80 { }
        443 { }
    }
}


security firewall port-list /Common/portListExample {
    ports {
        80 { }
        443 { }
    }
}

This behaviour causes unnecessary duplication in the configuration file.

Conditions:
Creating a port-list object in any context results in the same object being added as three separate entries in the configuration file.

Ex: Using TMSH CLI configuration.
Redundant entries occur in the configuration file when:
A port-list object is created using any one of the following TMSH CLIs:
1. tmsh create net port-list
2. tmsh create security firewall port-list
3. tmsh create security shared-objects port-list
All three CLI commands point to the same object and record three separate entries in the configuration file.

Impact:
Redundant entries in the configuration file lead to:
1. Increased configuration file size unnecessarily.
2. Risk of user confusion during manual editing or review of configuration files.

This issue does not impact runtime functionality or object behaviour, but it introduces maintenance overhead when users interact with their configurations.

Workaround:
None


1934373-3 : DoS attack is blocking while transparent

Links to More Info: BT1934373

Component: Application Security Manager

Symptoms:
A DoS attack is blocking while configured as transparent.
The blocking is only by resets

Conditions:
A transparent volumetric dosl7 and web acceleration profile are configured on the same virtual

Impact:
Blocking even though the configuration is transparent.

Workaround:
tmsh modify sys db dosl7d.static_uri_protection value disable


1933105-4 : TMM does not fragment the output before encapsulating the payload

Links to More Info: BT1933105

Component: TMOS

Symptoms:
Tmm does not fragment the traffic before it goes to encapsulation

Conditions:
- IPSec
-- Tmm receives fragmented payload

Impact:
Large packets are not fragmented on egress.

Workaround:
None


1930897-5 : Tmm core due to overflow of ifc ref counts with flow forwarding

Links to More Info: BT1930897

Component: Local Traffic Manager

Symptoms:
Tmm crashes when passing high amounts of traffic.

Conditions:
Flow forwarding rejected when accepting flows due to high volume of packets that exhausts connection limit and overflows the ifc ref count.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1927993 : Following knowledge-based article K7032 through steps 1-8 to freeze zone files may lead to a zone loaded before being able to run named-checkzone

Links to More Info: BT1927993

Component: Global Traffic Manager (DNS)

Symptoms:
When following the knowledge-based article K7032 to freeze zone files, the named will reload its configuration before step 8.

Conditions:
Following knowledge-based article K7032 through steps 1-8 to freeze zone files and allow manual update to ZoneRunner-managed zone files.

Impact:
The zone can be loaded before the ability to run named-checkzone per instruction 8.

Workaround:
NA


1920637-4 : Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade

Links to More Info: BT1920637

Component: Application Security Manager

Symptoms:
After an upgrade or a re-import, duplicate signature sets denoted by a "_1" are created containing NULL values instead of empty strings.

Conditions:
A user-defined signature set has an empty string for the tagged signature filter.

Impact:
Additional "duplicate" sets are created every time a policy is re-imported. This does not affect any functionality, but does increase the total configuration size, and makes the configuration more difficult to manage.

Workaround:
You can repair the policy by navigating to “Security ›› Application Security : Policy Building : Learning and Blocking Settings”, clicking on “change”, and choosing the original created sets instead of the duplicated sets. Save, and then apply the policy. The duplicated sets can be deleted after that.


1894113 : GTM pool with min-members-up-value configured causes synchronisation problems after deleting virtual servers on LTM

Links to More Info: BT1894113

Component: Global Traffic Manager (DNS)

Symptoms:
GTM pool are not in sync, running list gtm pool does not show the same pool members.

Conditions:
This happens after deleting an ltm virtual that is listed in a gtm server configured with virtual-server-discovery enabled and in which a GTM Pool has min-members-up-value configured.
If the deletion of the ltm virtual server (example: tmsh delete ltm virtual vs1) brings the number of virtual server below the configured value with min-members-up-value, then a mismatch occurs with the other GTM on other BIG-IP.

Impact:
GTM devices are out of sync.

Workaround:
Avoid the deletion of ltm virtual if this would bring the number of members below the configured min-members-up-value.


1889741-3 : Need for the SYS DB variable to toggle ssl_crypto::queue_max

Links to More Info: BT1889741

Component: Local Traffic Manager

Symptoms:
While ssl_crypto::queue_max can be configured using TCL commands, a corresponding TMSH equivalent is required.

Conditions:
When the system handles a large number of concurrent SSL handshakes or cryptographic operations

Impact:
-- SSL handshake failures
-- Inability to configure the ssl_crypto::queue_max via tmsh

Workaround:
None


1857473 : A BIG-IP monitor may not get removed when changing product type from BIG-IP to Generic Host

Links to More Info: BT1857473

Component: Global Traffic Manager (DNS)

Symptoms:
A BIG-IP monitor may not get removed when changing product type from BIG-IP to Generic Host.

Conditions:
- A generic-host is added to the GTM config as type BIG-IP.
- The User then manually changes the product-type to generic-host

Impact:
The BIG-IP monitor is not removed. Running 'tmsh load sys config gtm-only' will then fail because validation will not permit a server of type generic-host with a monitor of type /Common/bigip

Workaround:
None


1854353-4 : Users with Resource admin role are not able to save the UCS.

Links to More Info: BT1854353

Component: TMOS

Symptoms:
When creating a UCS file, an error occurs:

Data Input Error: Invalid partition ID request, partition does not exist ([All])
Error during config save.
Unexpected Error: UCS saving process failed.

Conditions:
-- Creating a UCS file
-- The user role that initiated the UCS save is Resource Admin

Impact:
Users in a Resource Admin role are unable to save a UCS file.

Workaround:
Other admin type roles are able to save the UCS file.


1848577-3 : VCMP guest stats are not visible on vCMP host GUI nor CLI

Links to More Info: BT1848577

Component: Application Visibility and Reporting

Symptoms:
- Issuing the command 'tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }' returns 'No data available'
- Graphs on 'Statistics ›› Analytics : vCMP : CPU Usage' says "There is no data to display either due to the lack of relevant traffic or due to the settings of the filter." even after the vCMP guest has been running for more than 10 minutes.

Conditions:
- vCMP host running v17.1.x
- The following tables are missing when issuing the command tmctl -f /var/tmstat/blade/vcmp_union_tables' from the vCMP host:
  vcmp_tmm_stat_union
  vcmp_pva_stat_union
  vcmp_proc_pid_stat_union
  vcmp_host_info_stat_union

Impact:
No stats (eg. CPU, Network, Disk Usage) can be seen for the vCMP guests when looking from the vCMP host.

Workaround:
Run this Bash one-liner from the vCMP host:

 bigstart restart merged ; sleep 600 ; bigstart restart avrd ; sleep 600 ; bigstart restart avrd merged ; sleep 600 ;

Thereafter, check the tables and analytics with these commands:

 tmctl -w$COLUMNS -f /var/tmstat/blade/vcmp_union_tables
 tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }


1848541-1 : Invalid regular expression causing bd restart loop

Links to More Info: BT1848541

Component: Application Security Manager

Symptoms:
ASM (BD) restart loop

/var/log/ts/bd.log contains events reporting PCRE compilation failure:

ECARD|ERR |Jan 23 10:16:59.036|14826|regexp_table_management.cpp:0057|key crc f77c3b66 PCRE compilation failed at offset 3: PCRE does not support \L, \l, \N{name}, \U, or \u

Conditions:
An invalid regular expression exists in a policy prior to upgrade.

Impact:
Bd restart loop. ASM traffic disrupted while bd restarts.

Workaround:
Clear out incorrect regular expressions from DCC.GLOBAL_PARAM_REG_EXPS

Restart ASM or allow the device to restart.

# tmsh restart sys service asm


1827821-3 : isBase64 params and headers not blocking Attack Signatures

Links to More Info: BT1827821

Component: Application Security Manager

Symptoms:
The parameter value in GET requests are considered as base64 even when the calculated score is below 'base64_max_score'

Params and headers configured as "Base64Decode=required" do not detect base64 encoded attack signatures.

Conditions:
-- Create a parameter named "param" configured as "Base64Decode=required".
-- Send Request to URL /?param=PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==

Impact:
No Violations Detected, while the parameter included an attack signature (PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg== is the base64 encoded value of <script>alert(1)</script>)

Workaround:
None


1826505-3 : Restjavad API usage statistics memory leak

Links to More Info: BT1826505

Component: TMOS

Symptoms:
A memory leak develops on the standby device but may persist on the active device.

Restjavad may fail and restart with a similar error to the following log snippet (in /var/log/restjavad.0.log if failure is recent):

'DieOnUncaughtErrorHandler Uncaught Error causing restjavad to exit.'

It may also trigger frequent CPU intensive garbage collection such as many invocations of 'Full GC'. These will not be able to clear the memory, and that may be observable in GC logs as only small drops in restjavad heap size when Full GC runs.

Restart of restjavad may not clear the issue fully or for long. Issue may persist after upgrade.

/var/log/restjavad-api-usage.json has a large file size. Typically it will be tens of Kilobytes before leak develops and eventually grow to Megabytes or tens of MB.

Conditions:
Restjavad that fails or exhibits issues will have had a long time as standby in a HA cluster, but may not be standby at time of failure.

Impact:
Restjavad exits and restarts, perhaps repeatedly.
High CPU use due to frequent intensive garbage collection may occur.

Workaround:
See K000153118: Procedure to clear restjavad API statistics memory leak, ID 1826505
https://my.f5.com/manage/s/article/K000153118

This procedure should have a low impact if your environment does not require constant availability of REST API. For systems that are more dependent on REST API availability such as SSL Orchestrator, you may want to restrict this to a maintenance window.


1826485 : Creating a GTM pool in a custom partition with a custom route domain via GUI can fail

Links to More Info: BT1826485

Component: Global Traffic Manager (DNS)

Symptoms:
Creating a GTM pool in a custom partition with a custom route domain via GUI can fail with the following error message:

"The specified IP address(es) specified by (0.0.0.0%1) cannot be a route domain address(es) (fallback "IP address)."

Conditions:
Using a custom partition and custom route domain

Impact:
A GTM pool will not be created via the GUI

Workaround:
The same pool can be created using the TMSH command "create gtm pool"


1824965-5 : Implement iRule support to fetch SNI from SSL, HTTP and QUIC traffic

Component: Traffic Classification Engine

Symptoms:
You can not use an iRule to look up the SNI/hostname from SSL, HTTP, and QUIC traffic.

Conditions:
You need to look up the SNI/hostname in an iRule

Impact:
You are unable to look up the SNI or hostname.

Workaround:
None


1824745-3 : Bd crash and generate core

Links to More Info: BT1824745

Component: Application Security Manager

Symptoms:
Bd crashes

Conditions:
Unknown

Impact:
Traffic disrupted while bd restarts.

Workaround:
None


1824113 : GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent.

Links to More Info: BT1824113

Component: Global Traffic Manager (DNS)

Symptoms:
Disabling a pool or virtual server that is referenced by a pool member affects how pool <poolname> selects a response, but [active_members <poolname>] still returns a value that ignores these status effects.

Conditions:
-- GTM pool
-- An iRule that checks the available_members of the pool is greater than zero before selecting the pool
-- Disable the pool

The pool is still selected for client queries to the wideIP

Logs show that the available_members is equal to the number of pool members, even though the pool is disabled.

Impact:
Unable to manage availability by disabling the pool.

Workaround:
None


1818861-4 : Timestamp cookies are not compatible with fastl4 mirroring.

Links to More Info: BT1818861

Component: Advanced Firewall Manager

Symptoms:
DOS tcp-ack-ts vector with tscookies option enabled is not compatible with fastl4 (L4) mirroring.

Conditions:
- DOS tcp-ack-ts vector with tscookies option enabled
- Mirroring configured on fastL4 TCP virtual.
- FastL4 profile with timestamp 'preserve' option configured.

Impact:
Existing connections hang due to tsval not being transformed properly on a newly active device.

Workaround:
Set fastl4 timestamp option to strip/rewrite.


1813625-3 : "tmsh show net ipsec-stat" command is not showing statistics - all values are zero.

Links to More Info: BT1813625

Component: TMOS

Symptoms:
Output of "tmsh show net ipsec-stat" shows all zeros for values of "Packets In", "Bytes In", "Packets Out" and "Bytes Out".

Conditions:
"tmctl ipsec_data_stat" displays separate statistics for encrypted and plain data but tmsh show zero values.

Impact:
Tmsh can't be used to display IPSec statistics

Workaround:
Data can be displayed with "tmctl ipsec_data_stat"


1812349-4 : IPsec phase 2 (IKEv1 Quick Mode) will not start after upgrade

Links to More Info: BT1812349

Component: TMOS

Symptoms:
IPsec IKEv1 tunnels fail half way through tunnel negotiation. As a result the tunnel never comes up.

Conditions:
-- BIG-IP with IKEv1 IPsec tunnel
-- ISAKMP traffic to the remote peer is not in route-domain 0 (RD0)
-- Upgrade to version 16.x or 17.x

Impact:
IPsec tunnels are not able to connect remote peer networks.

Workaround:
There are two options:

-- Use IKEv2, this will require that the remote peer is also reconfigured to IKEv2.

-- Alternatively, move the IPsec peer's configuration to RD0.


1787645-4 : BD process fail to startup on specific XML configuration

Links to More Info: BT1787645

Component: Application Security Manager

Symptoms:
BD does not start up (restart loop).

Conditions:
An XML configuration with specific configuration in the profile.

Impact:
System does not start up.

Workaround:
Remove the specific configuration in the profile.


1782057-4 : BD crash related to dns lookup

Links to More Info: BT1782057

Component: Application Security Manager

Symptoms:
A bd daemon crash

Conditions:
Related to DNS lookup scenarios

Impact:
ASM traffic disrupted while bd restarts.

Workaround:
None


1778793-4 : Database health monitors may use the wrong connection when attempting to connect to database

Links to More Info: BT1778793

Component: Local Traffic Manager

Symptoms:
Database monitors fail periodically and mark a pool member down.

Periodically, the DB monitor will create user sessions on the DB server without closing them.

Conditions:
- Multiple database health monitor instances exist to probe a given node.

- The monitor instances share the same values for the following parameters:
 - destination IP address
 - destination port
 - database name.

Impact:
Healthy pool members are not selected to receive traffic.

Workaround:
You can work around this issue by using a BIG-IP EAV external monitor to probe the health of your database. An example for MySQL is available on DevCentral at https://community.f5.com/kb/codeshare/mysql-monitor/273565.
 
Alternatively, you may also work around this issue by adding a unique connection property as a suffix to the database name. This ensures a unique JDBC connection string is constructed for each monitor in order to avoid this issue.
 
For example you can use the connection properties "ApplicationName=<monitor_name>" or "applicationName=<monitor_name>" in PostgreSQL or Microsoft SQL Server respectively to provide the name of the calling monitor to the database.

In Oracle a connection string similar to the following can be used:

database (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=%node_ip%)(PORT=%node_port%))(CONNECT_DATA=(SERVICE_NAME=ORACLE1))(SERVER=dedicated)(customKey=1))

or

database "%node_ip%:%node_port%:ORCLDB1?customkey=1"

Note that the PostgreSQL monitor requires a "?" character as a separator between the database name and the connection property, while MS SQL Server requires a ";" as separator.
 
Example tmsh commands to disambiguate monitorA and monitorB which both probe database "samedb" on the same node:
 
- PostgreSQL monitors:
  - tmsh modify ltm monitor postgresql monitorA database samedb?ApplicationName=monitorA
  - tmsh modify ltm monitor postgresql monitorB database samedb?ApplicationName=monitorB
 
- MS SQL Server:
  - tmsh modify ltm monitor mssql monitorA database '"samedb;applicationName=monitorA"'
  - tmsh modify ltm monitor mssql monitorB database '"samedb;applicationName=monitorB"'

- Oracle Server:
  - tmsh modify ltm monitor oracle myoracle database '%node_ip%:%node_port%:PTDB3CC1?customkey=1'

Note that the extra quoting in the example command for MS SQL Server is required to preserve the ";" separator in the database name.


1772353-3 : Defaults for Associated Violations are re-added to a policy

Links to More Info: BT1772353

Component: Application Security Manager

Symptoms:
When Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported, the default elements are re-added to the list.

Conditions:
Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported

Impact:
The default Session Awareness Violations are set back to delay blocking unexpectedly.

Workaround:
Use binary format export and import.


1758193-2 : Trunk with LACP and virtual-wire flaps after an upgrade.

Links to More Info: BT1758193

Component: Local Traffic Manager

Symptoms:
After performing an upgrade from a version lower than 16.0 to a version higher or equal to 16.0, BIG-IP will fail to establish LACP trunk when interfaces are configured in virtual-wire mode.

Version 16.0 introduced transparent LACP bridging of LACP allowing LAG to be established across BIG-IP. This feature is enabled by default in versions > 16.0.

Conditions:
- Trunk configured with LACP.
- Virtual-wire configured across the trunk.
- Upgrading from version lower than 16.0 to a version higher or equal to 16.0.

Impact:
Fail to establish LACP trunk.

Workaround:
Setting l2.virtualwire.multicast.bridging to disabled allows BIG-IP to establish LACP directly with other devices without bridging maintaining the behavior from versions < 16.


1755113-5 : BD crash with specific JSON schema

Links to More Info: BT1755113

Component: Application Security Manager

Symptoms:
BD crash

Conditions:
Using specific JSON schema in the JSON content profile applied on the ASM policy

Impact:
ASM traffic disrupted while bd restarts.

Workaround:
None


1754325 : Disabled status from manual resume on a BIG-IP DNS pool can sync to other BIG-IP DNS devices in synchronization-group

Links to More Info: BT1754325

Component: Global Traffic Manager (DNS)

Symptoms:
BIG-IP DNS pool with the manual resume feature enabled loses its iQuery connection and loses its network path to monitor the manual resume, the pool will mark pool members associated with that pool down and disabled.

When the BIG-IP DNS device that lost the iQuery connection re-establishes a connection, it will continue to leave pool members disabled on pools with manual resume configured and the disabled status may sync to other devices in the synchronization-group if their config timestamp is older then this disconnected/reconnected BIG-IP DNS device.

Conditions:
-- BIG-IP DNS pool with the manual resume feature enabled
-- The iQuery connection is lost

Impact:
Pool is disabled for all BIG-IP DNS devices in the synchronization-group

Workaround:
Manually re-enable disabled pool members on the BIG-IP DNS system and the re-enabled status will sync to the other BIG-IP DNS devices in the synchronization-group


1708309-4 : Dynconfd crash with invalid ephemeral pool member

Links to More Info: BT1708309

Component: Local Traffic Manager

Symptoms:
If the BIG-IP configuration becomes corrupted in such a way that an ephemeral pool member exists with no corresponding FQDN template pool member, ephemeral node or FQDN template node, the dynconfd daemon may crash repeatedly.

Conditions:
This issue has only been encountered when corruption of the MCP database resulted in an ephemeral pool member existing with no corresponding FQDN template pool member, ephemeral node or FQDN template node. This is an invalid configuration which cannot be created through user action, and can only occur due to corruption of the MCP database. Such corruption is extremely rare, and the cause is not known.

Impact:
The dynconfd daemon performs the action of resolving node FQDN names to IP addresses and creating ephemeral nodes and pool members with those addresses. When this issue occurs, dynconfd will be unable to resolve FQDN names in any existing FQDN template nodes (and FQDN template pool members) to their corresponding IP addresses. This can result in a lack of available pool members to process traffic.

Workaround:
To recover from the MCP database corruption, perform the actions described in the following F5 knowledge article:
K13030: Forcing the mcpd process to reload the BIG-IP configuration


1707921-4 : Tenant upgrade fails with disk full error on BIG-IP 17.x created with T2 image

Links to More Info: BT1707921

Component: TMOS

Symptoms:
Upgrade failed with "disk full" error in 17.1.x version.

-----------------------------------------------------------------------------------------------------------
Sys::Software Status
Volume Product Version Build Active Status Allowed Version
-----------------------------------------------------------------------------------------------------------
HD1.1 BIG-IP 17.1.1.4 0.0.9 yes complete yes
HD1.2 BIG-IP 17.1.1.3 0.0.5 no failed (Disk full (volume group). See SOL#10636)

Conditions:
- Deployed BIG-IP tenant with v17.x.x T2 image
- Trying to create an additional boot location

Impact:
Creation of additional boot location fails with "disk full" error.

Workaround:
Expand the tenant's virtual disk (storage-size) from F5OS to accommodate an additional boot location in the tenant.

Values of 46G/47G have worked well in lab testing.


1690005-3 : Unable to ping the floating self addresses from the Standby tenant

Links to More Info: BT1690005

Component: F5OS Messaging Agent

Symptoms:
Masquerade Mac is not removed when F5OS is rebooted.
It can be observed using the 'show fdb' command in confd

This can cause the standby tenant to be unable to ping the floating SelfIP address on the active device, but the active device can ping the standby device.

Conditions:
- An HA pair of tenants is used
- Tenants running on a VELOS chassis, or on r5000-series, r10000-series, or r12000-series appliances
- A traffic group uses a masquerade mac
- The Active tenant is rebooted

Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.

Workaround:
The masquerade mac's fdb can be manually deleted using the F5OS CLI.
From the standby F5OS system CLI:
config
no fdb mac-table entries entry <mac masquerade address>
commit


1671149-5 : Timestamp cookies may cause issue for PVA-accelerated connections

Links to More Info: BT1671149

Component: Advanced Firewall Manager

Symptoms:
Timestamp cookies may cause performance issues for PVA-accelerated connections on some older platforms and/or platforms without a performance license.

Conditions:
- PVA offload configured (any stage).
- DOS ACK (TS) vector has timestamp cookies option enabled.
- Platform supporting ePVA feature (Ref. https://my.f5.com/manage/s/article/K12837)
- Platform does not belong to the following subset:
    B2250 (A112)
    B4450N (A114)
    B4460N (A121)
    i10800 (C116)
    i7800 (C118)
    i5800 (C119)
    i11800 (C123)
    i11800-DS (C124)
    i5820-DF (C125)
    i7820-DF (C126)
    i15800 (D116)
    i15820-DF (D120)
    VELOS BX110, BX520
    r5800/5900, r10800/10900, r12800/12900 r-series platforms
 
Additionally, for platforms specified in the list above a license with support of turboflex 'Basic DoS vectors' capability is required. Note, this requires a 'Performance' license on some of platforms.
For more information about Turboflex please check article https://techdocs.f5.com/en-us/hw-platforms/f5-platform-turboflex-profiles/title-turboflex-overview.html

Impact:
Tmm resets the connection or causes slow performance.

Workaround:
Disable timestamp-cookie feature.


1644497-5 : TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed

Links to More Info: BT1644497

Component: TMOS

Symptoms:
In TMM memory, the old CRL data is available until the existing connections are closed. This may exhaust TMM memory.

Conditions:
- Connections last for a long time.
- Frequent updates on the CRL.

Impact:
TMM memory exhausts.

Workaround:
- Dynamic CRL or CRLDP on the Client-SSL profile can be configured to dynamically verify the SSL certificate revocation status.

or

- Online Certificate Status Protocol (OCSP) can be enabled on the Client-SSL profile to validate SSL certificate revocation status.


1642301-5 : Loading single large Pulse GeoIP RPM can cause TMM core

Links to More Info: BT1642301

Component: Global Traffic Manager (DNS)

Symptoms:
Creates a TMM core.

Conditions:
Loading large Pulse GeoIP RPM resources.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Use GEOIP Edge database.


1636273 : In BIND 9.18.28, a new configurable parameter (max-records-per-type) has been introduced with a default limit of 100 to address a security issue.

Component: Global Traffic Manager (DNS)

Symptoms:
No DNS response is received for more than 100 records.

Conditions:
Resolve a domain with more than 100 records of the same type.

Impact:
DNS resolution fails.

Workaround:
Adjust the max-records-per-type value in the BIND configuration as needed.


1635013-5 : The "show sys service" command works only for users with Administrator role

Links to More Info: BT1635013

Component: TMOS

Symptoms:
A guest or non-root user must be able to use the TMSH “show sys service” command, as there is no rule associated with a schema.

Conditions:
The issue occurs when the user is a non-root user.

Impact:
A non-root user will not be able to run the command even though they have permissions.

Workaround:
None


1621977-1 : Rewrite memoryleak with "REWRITE::disable" irule

Links to More Info: BT1621977

Component: Access Policy Manager

Symptoms:
Rewrite memory leak.

Conditions:
"REWRITE::disable" irule attached to virtual server.

Impact:
Rewrite memory usage is high.

Workaround:
Avoid using 'REWRITE::disable'
 
If only URL rewriting required (and not content rewriting), the below custom iRule which is designed exclusively for URL rewriting can be utilized,

===========

when HTTP_REQUEST {
  
    if {[HTTP::host] equals "<JS file name>"}
    {
           HTTP::uri [string map {F5CH=J F5CH=I} [HTTP::uri]]
           HTTP::uri [string map {F5CH=H F5CH=I} [HTTP::uri]]
          
    }
}
===========


1603869-3 : Wrong Fallback to local for TACACS authentication with empty password when source fallback is set to true

Links to More Info: BT1603869

Component: TMOS

Symptoms:
When remote auth configured with fallback is set to true and if try to login to the BIG-IP with local user credentials by providing empty password first then authentication mechanism fall back to local and then if provided with correct local user password the access is granted which causes security issues.

Conditions:
-- configure auth source fallback true.
-- Configure the remote auth mechanism in this case, TACACS.
-- Configure a local user that is not present in the TACACS server.

auth source {
fallback true
type tacacs
}

Impact:
Unauthorized access is given to the BIG-IP with a local user, even though the authentication mechanism is configured as remote.

Workaround:
Configure the auth source fallback as false.

auth source {
fallback false
type tacacs
}


1603605 : DNS response is malformed when the response message size reaches 2017 bytes

Links to More Info: BT1603605

Component: Global Traffic Manager (DNS)

Symptoms:
DNS response is malformed.

Conditions:
When the response message size reaches 2017 bytes.

Impact:
The formatting of the DNS response is incorrect.

Workaround:
None


1602629-5 : Tmm_mcpmsg_print can trigger SOD

Links to More Info: BT1602629

Component: TMOS

Symptoms:
TMM is killed by SOD.

Conditions:
Conditions are unknown, it was encountered when ID 1047789 was encountered, see https://cdn.f5.com/product/bugtracker/ID1047789.html

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1596313-3 : F5OS LAG fails MCPD validation, tenant trunk has no interfaces.

Links to More Info: BT1596313

Component: TMOS

Symptoms:
After creating an HA group with a trunk in an LTM tenant, the first reboot triggers an error: "Invalid attempt to register an n-stage validator; the stage must be greater than the current stage and within 1–101 (current stage: 7, registered: 5). Unexpected."

Conditions:
Occurs when,

- BIG-IP tenant running on F5OS
- High availability system
- HA group with a trunk
- The tenant is rebooted for the first time

Impact:
No impact on TMM VLAN traffic

Workaround:
Rerun the tmsh create sys ha-group command.


1589629-5 : An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address

Links to More Info: BT1589629

Component: Local Traffic Manager

Symptoms:
The destination MAC address of the ICMPv6 Neighbor Solicitation message is incorrect.

Conditions:
An IPv6 SelfIP address is used, and tmm attempts to resolve the address of (for example) an IPv6 pool memeber which is using the last IPv6 address in the available subnet range.

Impact:
Nodes on the network do not respond to ICMPv6 Neighbor Solicitation messages.

In large environments with many affected addresses, this could potentially contribute to a broadcast storm or degrade overall network performance.

Workaround:
None (other than avoiding the use of the last address in the IPv6 subnet range)


1589269-4 : The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB

Links to More Info: BT1589269

Component: SSL Orchestrator

Symptoms:
From version 16.1.0 the maximum value of sys db provision.extramb is 4096 MB, reduced from 8192 MB. It will be automatically set to 4096 during the upgrade if it has a higher setting.

Conditions:
Any BIG-IP device running software version 16.1.0 or higher.

Impact:
It is extremely rare to need values of provision.extramb above 4096 MB.

If the value of sys db provision.extramb is 4096 or less prior to upgrading, then there will be no impact post-upgrade. After the upgrade, it is not possible to increase the value above 4096.

If the value is greater than 4096, it will be reduced to 4096 when upgrading to version 16.1.0 or higher. This may leave devices with insufficient 4KB page memory (also known as host memory) which may lead to issues due to memory pressure, such as OOM killer killing processes, poor scheduling of processes leading to core dumps, and sluggish management access.

Workaround:
None


1586877-3 : Behavior difference in auto-full sync virtual server and manual-incremental config sync

Links to More Info: BT1586877

Component: Application Security Manager

Symptoms:
An ASM policy is assigned to a virtual server with the same name in a Sync-Only device group in Auto-Sync mode.

Conditions:
Devices with same virtual server name in a Sync-Only device group.

Impact:
The ASM policy is synced, which is unexpected behavior.

Workaround:
None


1586745-3 : LACP trunk status became DOWN due to bcm56xxd failure

Links to More Info: BT1586745

Component: TMOS

Symptoms:
Lacp, lldp reports trunk(s) down and you may observe the below logs.

err lldpd[7489]: 01570004:3: HAL send PDU failed
err lldpd[7489]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lldpd[7489]: 01570004:3: HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: ING_SERVICE_COUNTER_TABLE_X.ipipe0 interrupt timeout
err lacpd[10571]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lacpd[10571]: 01160005:3: HalMsgHandler.cpp:125 - HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: FP_COUNTER_TABLE_X.ipipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: EFP_COUNTER_TABLE_X.epipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed

Conditions:
Not known at this time.

Impact:
An outage was observed

Workaround:
Restart bcm56xxd, lldpd, lacpd process.


1586405-4 : "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page

Links to More Info: BT1586405

Component: Access Policy Manager

Symptoms:
Observe multiple "/f5-h-$$/" in URLs when accessing via Protected Access.

Conditions:
"<base href="xxxxx">" tag in the home page.

Impact:
URLs become lengthy upon every refresh and may lead to webapp misfunction.

Workaround:
Customized iRule

======================
when REWRITE_REQUEST_DONE {

    if { [HTTP::path] ends_with "path_to_file1" } {
        REWRITE::post_process 1
        set rewrite_new 1
        
    }
    if { [HTTP::path] ends_with "path_to_file2" } {
        REWRITE::post_process 1
        set rewrite_new1 1
        
    }
    
}

when REWRITE_RESPONSE_DONE {

    if {[info exists rewrite_new]} {
        unset rewrite_new
    
        set rewrite_str {<base href=""f5-h-$$path_in_file1"">}
        set rewrite_str_len [string length $rewrite_str]
        set strt [string first $rewrite_str [REWRITE::payload]]
        
        if {$strt > 0} {
            REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file1">}
        }
    }
    
    if {[info exists rewrite_new1]} {
        unset rewrite_new1
    
        set rewrite_str {<base href="f5-h-$$/path_in_file2">}
        set rewrite_str_len [string length $rewrite_str]
        set strt [string first $rewrite_str [REWRITE::payload]]
        
        if {$strt > 0} {
            REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file2">}
        }
    }
}
======================


1575805-2 : bcm56xxd Process Killed by SOD After Failing to Send a Heartbeat During Firewall Rule Statistics Query

Component: TMOS

Symptoms:
When firewall rule statistics are requested using query_stats { fw_rule_stat { } }, the system may experience delays and bcm56xxd process is killed by sod, eventually impacting the traffic.

Conditions:
This issue may occur if a user/daemon sends a query_stats { l2_forward_stat {} } query where the mcp message header has validation_only set to 1

Impact:
Impact to Application traffic.

Workaround:
Limit validation‑only firewall rule statistics queries on systems with large or complex firewall rule configurations


1574521-3 : Intermittent high packet latency on R4000 and R2000 tenants

Links to More Info: BT1574521

Component: Performance

Symptoms:
When compared to previous platforms, BIG-IP tenants on R4000 and R2000 platforms may demonstrate higher jitter and packet latency / rtt. This affects pings, tcp, udp, and any other protocols processed by the software data plane (tmm).

This is because the r4000 and r2000 appliances have a slightly different hardware architecture than other appliances.

CPUs on this platform are not dedicated to the tenant and these platforms also run a different class of Intel processing, and do not utilize hyperthreading like the higher end platforms do.

See:
https://clouddocs.f5.com/training/community/rseries-training/html/rseries_performance_and_sizing.html#r4000-vcpu-sizing

Conditions:
BIG-IP tenants on R4000 and R2000 platforms

Impact:
Intermittent high latency and jitter.

Workaround:
None


1572045-3 : Login page config parameters are still case-sensitive with a case insensitive policy

Links to More Info: BT1572045

Component: Application Security Manager

Symptoms:
A login attempt is not detected.

Conditions:
- The policy is configured case-insensitive
- Upper case characters are used in the login page config parameters.

Impact:
Login attempt not detected.

Workaround:
Use only lower case for login page parameters configuration.


1571817-5 : FQDN ephemeral pool member user-down state is not synced to the peer device

Links to More Info: BT1571817

Component: TMOS

Symptoms:
One or more FQDN ephemeral pool members on a device group member is showing an incorrect state for the pool member.

Conditions:
1. Create the FQDN pool with an FQDN template pool member and ensure that the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
2. On one member of the device group, modify the state of the FQDN template pool member to 'user-down'.
3. Synchronize the configuration to the device group.
4. Check the status of the pool on the same member of the HA pair and verify that the state of any ephemeral pool member associated with the FQDN template pool member is 'user-down'.
5. On the other member of the device group, the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.

Impact:
The state of the ephemeral pool members on one member of the device group is incorrect.

Workaround:
None


1505753-4 : Maximum Fragment Length extension is not visible in ServerHello even though it is present in ClientHello

Links to More Info: BT1505753

Component: Local Traffic Manager

Symptoms:
When the request from the client contains the Maximum Fragment Length header, BIG-IP is able to process it and honors the functionality, but this parameter is not added to the ServerHello.

Conditions:
Send a request from a client that contains the maximum fragment length extension.

Impact:
The ClientHello succeeds but the TLS Handshake fails when the Server Hello is received.

Workaround:
None


1481889-5 : High CPU utilization or crash when CACHE_REQUEST iRule parks.

Links to More Info: BT1481889

Component: Local Traffic Manager

Symptoms:
When CACHE_REQUEST iRule stops, the Ramcache filter stays in CACHE_INIT state when it restarts. This causes the request to be processed twice, which causes high CPU usage or a crash when an incorrect address is encountered.

Conditions:
- HTTP Virtual server
- CACHE_REQUEST iRule with ms delay
- Multiple attempts to request a compressed doc

Impact:
- High CPU on boxes with 4G of valid memory after the key is hashed - on smaller boxes, will crash when an invalid address is encountered.

Workaround:
- Removal of CACHE_REQUEST iRule if avoidable


1474877-5 : Unable to download large files through VIP due RST Compression error.

Links to More Info: BT1474877

Component: Local Traffic Manager

Symptoms:
- Download of files exceeding maximum tmm.deflate.memory.threshold fails at client.
- Client receives RSTs (Compression error)

Conditions:
- Virtual server with HTML profile or REWRITE profile.
- Size of decompressed http response from server exceeds max tmm.deflate.memory.threshold value i.e. 4718592 bytes.

Impact:
- Client may lose connection to the server.

Workaround:
- Based on URI matches in the HTTP request, decide which responses should NOT be rewritten (e.g. big downloads) and disable REWRITE profile for the selected responses.
- For example, URI starting with "/headsupp/api/data/compare/measures" :

when HTTP_REQUEST {
   if { [HTTP::uri] starts_with "/headsupp/api/data/compare/measures" } {
      set no_rewrite 1
   }
}
when HTTP_RESPONSE {
  if { $no_rewrite == 1 } {
     REWRITE::disable
  }
}


1463089-2 : TMM crash because of corrupted MQTT queue

Links to More Info: BT1463089

Component: Local Traffic Manager

Symptoms:
Tmm crashes while terminating an MQTT flow. Core file analysis indicates MQTT queue corruption.

Conditions:
LTM configured with TCP and MQTT.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1462337-6 : Intermittent false PSU status (not present) through SNMP

Links to More Info: BT1462337

Component: TMOS

Symptoms:
PSU status displays as (2) Not Present through SNMP.
or
sysChassisFanStatus status displays as (2) Not Present through SNMP.

Conditions:
Conditions are unknown. It occurs intermittently.

Impact:
Intermittent false alarm in SNMP monitoring.

Workaround:
None


1455805-3 : MCPD unstable/inoperative after copying SNMP configuration from another BIG-IP

Links to More Info: BT1455805

Component: TMOS

Symptoms:
If SNMP configuration that contains Secure Vault-protected attributes ("$M$...") is copied from a BIG-IP system to another and the devices do not have the same Secure Vault master key, the target device will appear to accept the configuration, but will be unable to decrypt the attributes.

If the system is subsequently rebooted, MCPD will remain inoperative or restart repeatedly during startup.

The LTM log files will contain error messages similar to the following:

bigip01 notice mcpd[30645]: 01071027:5: Master key OpenSSL error: 4008867572:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:664:
bigip01 notice mcpd[30645]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
bigip01 err mcpd[30645]: 01071684:3: Unable to encrypt application variable (/Common/ifoobar_1_1 auth_password usmuser /Common/snmpd).

Or

bigip01 notice mcpd[7011]: 01b00001:5: Processed value is empty: class name (trapsess) field name ()
bigip01 err mcpd[7011]: 01071684:3: Unable to encrypt application variable (/Common/i192_0_2_1 auth_password trapsess /Common/snmpd).

The LTM log file may contain this log message, indicating that MCPD exited and restarted while attempting to load the configuration:

bigip01 emerg load_config_files[25201]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed. -- Error: failed to reset strict operations; disconnecting from mcpd. Will reconnect on next command.

Conditions:
- SNMP configuration that contains Secure Vault-encrypted attributes ("$M$..."), present as SNMPv3 auth-password and/or privacy-password attributes
- SNMP configuration is copied from a BIG-IP system to another BIG-IP system, and the two devices do not share the same Secure Vault master key.

Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.

Workaround:
Do not copy SNMP configuration with encrypted attributes between disparate devices.

If a device is currently in an inoperative state and affected by this issue:

- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.


1440409-8 : TMM might crash or leak memory with certain logging configurations

Links to More Info: BT1440409

Component: Local Traffic Manager

Symptoms:
TMM might crash or leak memory with certain logging configurations.

Conditions:
Virtual-to-virtual chaining is used for handling syslog messages.

Impact:
Memory leak or Crash.

Workaround:
None


1429813-6 : ASM introduce huge delay from time to time

Links to More Info: BT1429813

Component: Application Security Manager

Symptoms:
During high traffic, the response to some requests will be delayed for more than 1 second.

Conditions:
ASM Policy attached to the Virtual Server and during high traffic conditions.

Impact:
Some critical URLs like payment links, will timeout for the user.

Workaround:
None


1407949-6 : iRules using regexp or regsub command with large expression can lead to SIGABRT.

Links to More Info: BT1407949

Component: Local Traffic Manager

Symptoms:
When iRule is using badly crafted regexp or regsub command, sometimes large regex compilation may lead to TMM core.

- Multiple clock advances will be logged in tmm logs.

- A message similar to the one below will be logged in tmm logs:
notice sod[9938]: 01140041:5: Killing tmm.0 pid <pid of tmm>.

Conditions:
- iRules using regexp or regsub command with large expression

Impact:
Traffic disrupted while tmm restarts.

Workaround:
Update iRule to avoid using regex or regsub with large expressions.
either by
1. setting an upper-limit on the permitted size for regex expression or
2. rewrite the iRule to avoid the use of 'regsub'.


1395349-3 : The httpd service shows inactive/dead after "bigstart restart httpd"

Links to More Info: BT1395349

Component: TMOS

Symptoms:
The systemd service unit for httpd shows a status of inactive (dead) after you restart httpd using bigstart restart httpd. For example:

# systemctl status httpd
* httpd.service - LSB: start and stop Apache HTTP Server
   Loaded: loaded (/etc/rc.d/init.d/httpd; enabled; vendor preset: enabled)
   Active: inactive (dead) since Mon 2023-11-13 09:55:06 GMT; 5s ago



In versions v15.1.10.5 and above in v15.1.x, v16.1.5 and above in v16.1.x, and v17.1.1.4 and above, if a system is affected by this and then a user or process restarts httpd via systemd, the GUI will stop responding and return 403 Forbidden errors. This happens when attempting to renew or update the device certificate via the GUI.

Conditions:
Executing the command bigstart restart httpd. This will also happen behind-the-scenes when making HTTP configuration changes via tmsh/the GUI/iControl.

Impact:
httpd is running normally, but systemd is not aware of it.

Workaround:
To confirm httpd is running, you can use the following commands:

bigstart status httpd

OR

ps ax | grep '[h]ttpd'

If you would like to clear the stale state, restart httpd via its systemd service unit twice:

systemctl restart httpd && systemctl restart httpd


If the GUI is returning 403 Forbidden errors for everything, restart httpd ("systemctl restart httpd && systemctl restart httpd").


1380009-4 : TLS 1.3 server-side resumption resulting in TMM crash due to NULL session

Links to More Info: BT1380009

Component: Local Traffic Manager

Symptoms:
TMM core is observed when TLS 1.3 server-side resumes.

Conditions:
- TLS 1.3 handshake

Impact:
TMM cores, traffic is disrupted.

Workaround:
None


1366269-6 : NAT connections might not work properly when subscriber-id is confiured.

Links to More Info: BT1366269

Component: Advanced Firewall Manager

Symptoms:
When subscriber-aware NAT is configured or subscriber-id logging is enabled under NAT log profile some NAT connections might not work properly.

Conditions:
- Subscriber-aware NAT or NAT logging with subscriber-id enabled.

Impact:
Some NAT connections fail to complete.

Workaround:
Disable 'subscriber-id' under NAT logging profile.


1361021-5 : The management interface media on a BIG-IP Tenant on F5OS systems does not match the chassis

Links to More Info: BT1361021

Component: TMOS

Symptoms:
The management interface media on a BIG-IP tenant running on F5OS systems does not match the media/speed of the management interface on the system controllers.

Running 'tmsh show net interface' reports the media of the management interfaces (i.e. 'mgmt' or '1/mgmt') as "100TX-FD".

Conditions:
BIG-IP tenant running on F5OS systems (rSeries or VELOS).

Impact:
The media is reported as "100TX-FD".

Workaround:
Ignore the speed reported for the tenant's management interface(s), and instead, look at the speed of the management interfaces as reported in F5OS.

While running confd, run the following command to see the correct media settings:

VELOS: show interfaces interface 1/mgmt0
rSeries: show interfaces interface mgmt


1347861-5 : Monitor status update logs unclear for FQDN template pool member

Links to More Info: BT1347861

Component: TMOS

Symptoms:
When the state of an FQDN template node is changed (such as being forced offline by user action), one or more messages similar to the following may appear in the LTM log (/var/log/ltm):

notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status unchecked. [ ] [ was unknown for #hrs:##mins:##sec ]

Although such log messages indicate the current state of the FQDN template pool member, the prior status is indicated as "unknown" and does not accurately indicate the prior state of the FQDN template pool member.

Conditions:
This may occur when FQDN nodes and pool members are configured, and When the state of an FQDN template node is changed (such as being forced offline or re-enabled from an offline state by user action).

Impact:
Such messages may confuse users who are attempting to monitor changes in the BIG-IP system by not providing clear information.

Workaround:
The state of an FQDN template pool member is generally determined by the state of the referenced FQDN template node. The FQDN template node contains the configuration used to resolve the FQDN name to the corresponding IP addresses. FQDN template pool members are not involved in this process, and generally only reflect the status of the name resolution process centered on the FQDN template node.

Examining log messages related to to the associated FQDN template node can inform the interpretation of the FQDN template pool member state.
For example, if an FQDN template node is forced offline, messages similar to the following will be logged indicating the FQDN template node state change, which is subsequently reflected in FQDN template pool member state changes:

notice mcpd[####]: 01070641:5: Node /Common/nodename address :: session status forced disabled.
notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status forced down. [ ] [ was unknown for #hr:##min:##sec ]

notice mcpd[####]: 01070641:5: Node /Common/nodename address :: session status enabled.
notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status unchecked. [ ] [ was unknown for #hr:##min:##sec ]


1341093-6 : MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile

Links to More Info: BT1341093

Component: Local Traffic Manager

Symptoms:
A configuration error is seen on BIG-IP as below:
01070734:3: Configuration error: In Virtual Server (/Common/vsname) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/PORTAL-3119-cssl-tls13'; cipher ECDHE-RSA-AES128-GCM-SHA256 must be available

Conditions:
- Virtual Server with cipher rule that uses tlsv1_3 ciphers only
- Cipher group
- Client-SSL profile and HTTP/2 profile with enforce-tls-requirements enabled

Impact:
HTTP/2 and Client-SSL Profiles with TLS 1.3 is not supported.

Workaround:
None


1331037-6 : The message MCP message handling failed logs in TMM with FQDN nodes/pool members

Links to More Info: BT1331037

Component: TMOS

Symptoms:
When an FQDN node or pool member is created, one or more messages of the following form may appear in the TMM logs (/var/log/tmm*):

notice MCP message handling failed in 0x<hex value>

Conditions:
This may occur when creating an FQDN node or pool member on affected versions of BIG-IP.

Impact:
There is no known impact of this issue, besides the appearance of "notice" level messages in the TMM logs.

Workaround:
None


1327649-5 : Invalid certificate order within cert-chain associated to JWK configuration

Links to More Info: BT1327649

Component: TMOS

Symptoms:
An error occurs while validating the certificate and certificate chain in JSON web key configuration:

General error: 01071ca4:3: Invalid certificate order within cert-chain (/Common/mycert.crt) associated to JWK config (/Common/myjwk). in statement [SET TRANSACTION END]

Conditions:
Issue occurs when the certificate chain contains three or more certificates.

The proper order in issuing:
endpointchild
|
 endpoint
 |
  intermediate
   |
    ca

Impact:
You are unable to create a policy with key configuration for OAuth when the certificate chain contains more than two certificates.

Workaround:
Note that there is no impact when the certificate chain order is valid and contains only two certificates in the chain.


1325649-4 : POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member

Links to More Info: BT1325649

Component: Local Traffic Manager

Symptoms:
After upgrading from a BIG-IP version prior to v16.1.0 to BIG-IP v16.1.0 or later, one specific virtual-server is not working as expected and unable to forward the POST request towards the pool member.

Conditions:
1) Upgrade to v16.1.0 or later

2) Send a POST request from client with "Expect: 100-Continue".

3) Attach an irule using http::collect plus http::release to the Virtual Server.

Impact:
Cannot send POST requests from client to server

Workaround:
If ASM is provisioned, a transparent ASM policy can be a workaround.

1. Create a transparent ASM policy
At GUI Security >> Application Security: Security Policies
Click Create
Fill in following
Policy name: <unique policy Name>
Policy Type: Security(Default)
Policy Template: Fundamental (Default)
Leaning and Blocking
Enforcement Mode: Transparent
Save
Click the policy name created above, and modify following
Policy Building Learning Mode: Disabled
Save and Apply Policy

2. Enable Application Security Policy with the ASM Policy created above at the LTM Virtul Server Security configuration.


1322413-6 : After config sync, FQDN node status changes to Unknown/Unchecked on peer device

Links to More Info: BT1322413

Component: TMOS

Symptoms:
If changes are made to the FQDN node configuration, which has a node monitor configured, and the configuration is synced to a device group, ephemeral nodes generated from the FQDN node may show Availability as “unknown” and Monitor Status as “unchecked”.

Conditions:
This may occur on versions of BIG-IP with fixes for ID724824 and ID1006157, under the following conditions:
- BIG-IP systems are configured in a device group
- The device group is configured for Manual Sync (Full or Incremental)
- One or more FQDN nodes are configured with a node monitor (which could be the Default Node Monitor)
- A change is made to the configuration of the FQDN node
- A Full configuration sync is performed (by a Manual sync with the device group configured for a Full sync, as an automatic fallback/recovery action from a failed Incremental sync, or by using the “force-full-load-push” keyword):
   tmsh run cm config-sync to-group example-group force-full-load-push

Impact:
The affected nodes will be displayed with an Availability as “unknown” and Monitor Status as “unchecked”.

Workaround:
To resolve this condition, remove and add the node monitor:
- Remove the node monitor from the FQDN node configuration (or from default-node-monitor):
   tmsh mod ltm node example monitor none
   (tmsh mod ltm default-node-monitor rule none)
- Sync this change to the device group (Incremental sync)
- Add the node monitor again to the FQDN node configuration (or to default-node-monitor):
   tmsh mod ltm node example monitor my_node_monitor
   (tmsh mod ltm default-node-monitor rule my_node_monitor)
- Sync this change to the device group (Incremental sync)


1312225-5 : System Integrity Status: Invalid with some Engineering Hotfixes

Links to More Info: BT1312225

Component: TMOS

Symptoms:
After installing an Engineering Hotfix,
when to attempt to verify the TPM system integrity with either the "tpm-status" or "tmsh run sys integrity status-check" command, the following error massage may appear:
System Integrity Status: Invalid

Running the "tpm-status" command with a Verbosity of 1 (or greater) reveals the following detail:

Verifying system integrity...
...
The signature in 17 is valid
Output wrong commandline parameters
cmdline is *ro ima_hash=sha256 mce=ignore_ce *
The pcr value in 17 is invalid.
...
System Integrity Status: Invalid

Conditions:
This may occur if the Engineering Hotfix contains changes which cause the following packages to be included in the Engineering Hotfix ISO:
-- sirr-tmos
-- tboot
But the Engineering Hotfix ISO does not contain the following package:
-- nash-initrd

The contents of the Engineering Hotfix ISO can be checked using the 'isoinfo' utility:

isoinfo -Rf -i <path/to/Hotfix-*.iso> | grep -e sirr -e tboot -e nash

Impact:
The TPM System Integrity Status is shown as Invalid.
This may incorrectly suggest that system integrity has been compromised.


1302101-5 : Sflow receiver flows are not established at TMM startup on sDAG platforms due to sDAG delay

Links to More Info: BT1302101

Component: TMOS

Symptoms:
No sflow data is sent.

Conditions:
Either configure a valid sflow receiver and restart the tmm or, configure a valid sflow receiver reachable via dynamic route on non sDAG platforms and restart the tmm.

Impact:
Sflow data is dropped.

Workaround:
Modify the receiver configuration (any field, including description). This allows triggering an update which will get sflow working.


1301317-5 : Update Check request using a proxy will fail if the proxy inserts a custom header

Links to More Info: BT1301317

Component: TMOS

Symptoms:
Update check fails.

Conditions:
-- Update check is checking for updates
-- A proxy is configured
-- The proxy inserts a header in its response

Impact:
Update check will fail.

Workaround:
Do not add any header in the proxy response.


1298225-4 : Avrd generates core when dcd becomes unavailable due to some reason

Links to More Info: BT1298225

Component: Application Visibility and Reporting

Symptoms:
Avrd core file generates.

Conditions:
When avrd is writing to the external device and that device is unavailable temporarily.

Impact:
Potential system impact.

Workaround:
None


1296925-5 : Unable to create two boot locations using the 'ALL' F5OS tenant image at default storage size

Links to More Info: BT1296925

Component: TMOS

Symptoms:
Configuration fails to load in second boot location created in F5OS tenant deployed with "ALL" image:

01071008:3: Provisioning failed with error 1 - 'Disk limit exceeded. 16188 MB are required to provision these modules, but only 16028 MB are available.'

Conditions:
-- Tenant deployed using the "ALL" image, with default "storage size"
-- Multiple modules provisioned (e.g. AFM+APM+ASM+LTM), or AFM provisioned
-- Create a second boot location

Impact:
This issue causes a configuration load failure in the second boot location.

Workaround:
Set the tenant(s) in question to configured state, increase the "storage size", then deploy the tenant once more.


1294141-8 : ASM Resources Reporting graph displays over 1000% CPU usage

Links to More Info: BT1294141

Component: Application Visibility and Reporting

Symptoms:
The ASM resources graph which is present under Security > Reporting > ASM Resources > CPU Utilization displays over 100% CPU usage when ASM is under load. The unit is percentage so it shouldn't exceed 100.

Conditions:
ASM should be under load and utilizing most of CPU cycles.

Impact:
Reporting graph displays incorrect percent value.

Workaround:
1. Backup /etc/avr/monpd/monp_asm_cpu_info_measures.cfg file.

2. Run the following:

    $ sed -i 's|distinct time_stamp))|distinct time_stamp)*100)|g' /etc/avr/monpd/monp_asm_cpu_info_measures.cfg

3. To make those changes take affect, run the following command:

    $ bigstart restart monpd


1290937-4 : 'contentWindow' of a dynamically genereated iframe becomes null

Component: Access Policy Manager

Symptoms:
A web application using iframes may not work/render as expected using Portal Access.

Conditions:
A web application attempts to configure 'contentWindow' for an iframe while the Portal Access feature is in use.

Impact:
Web Application through Portal Access may fails to work/render as expected

Workaround:
Workaround: Using a customized irule/ifile to return un-patched 'contentWindow' from cache-fm*.js file. ifile has modern cache-fm file.

when CLIENT_ACCEPTED {
  ACCESS::restrict_irule_events disable
}

when HTTP_REQUEST {
 if {
   [HTTP::path] ends_with "/cache-fm-Modern.js"
 } {
   HTTP::respond 200 content [ifile get cachefmUploadIssueWorkaround]
 }
}


1283721-5 : Vmtoolsd memory leak

Links to More Info: BT1283721

Component: TMOS

Symptoms:
The Vmtoolsd service leaks memory on VMware BIG-IP VE guests when the Disk Type is IDE or any disk type other than SCSI.

Conditions:
VMware BIG-IP VE guest
Disk type of IDE or another type that is not SCSI.

Impact:
The VE will eventually run out of memory.

Workaround:
1. Create the file /etc/vmware-tools/tools.conf and add the following to the file:

[guestinfo]

# disable scan for disk device info
diskinfo-report-device=false


2. Restart the vmtoolsd service:

systemctl restart --ignore-dependencies vmtoolsd.service

NB "guestinfo" must be in lower case. The workaround will not work if any letter is not lower case including the following "guestInfo" which was the reported workaround in https://github.com/vmware/open-vm-tools/issues/452


1282029-2 : Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0

Links to More Info: BT1282029

Component: Advanced Firewall Manager

Symptoms:
The following log is observed in the console or /var/log/ltm logs:

Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector.

If this is after an upgrade it's likely the configuration will fail to load, which in turn will cause memory provisioning not to complete leaving the system provisioned for LTM only. This may leave insufficient 4KB page memory for the actual provisioning, for example if ASM is provisioned. The unit may show low memory symptoms such as oom killer activity, unresponsive management, cores due to daemon heartbeat timeout.

Conditions:
1. The Only Count Suspicious Events option is enabled or the attribute suspicious is true on TCP Push Flood vector.
2. Upgrade to BIG-IP 17.1.0.

Impact:
The following log is observed in the console or /var/log/ltm logs:

Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector. in the console or /var/log/ltm

Failure to load configuration may be shown a few lines later:
  emerg load_config_files[13166]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed.

Workaround:
1. Confirm config:
grep "suspicious true" /config/bigip.conf

2. Backup bigip.conf:
cp /config/bigip.conf /config/bigip.conf.bak_ID1282029

3. Change affected configuration values:
sed -i 's/suspicious true/suspicious false/g' /config/bigip.conf

4. Reload MCPD per K13030. AFM comes back up with config loaded fine.


1281929-5 : The BIG-IP system's time zone database does not reflect recent changes implemented by Mexico in regard to DST

Links to More Info: BT1281929

Component: TMOS

Symptoms:
In fall of 2023, Mexico is cancelling DST (Daylight Saving Time) and is now on standard time indefinitely. The BIG-IP time zone database need an updated to reflect this change.

Conditions:
- BIG-IPs operated in Mexico.

Impact:
BIG-IP systems configured to use "America/Mexico" (or other applicable Mexican localities) will still apply DST. Hence, time will spring forward and backward on previously designated dates.

This will have no impact to application traffic handled by the BIG-IP system. However, logs, alerts, reports, cron jobs, and other will use incorrect time.

Workaround:
As a workaround, you can set the BIG-IP time zone to that of a different country with the same UTC offset and already not observing DST.


1280813-5 : 'Illegal URL' violation may trigger after upgrade

Links to More Info: BT1280813

Component: Application Security Manager

Symptoms:
Illegal URL violation is triggered for Allowed URL(s).

Conditions:
The conditions that trigger this issue post-upgrade are unknown at this time and the occurrence is rare.

Impact:
Requests get blocked with an 'Illegal URL' violation despite the it being defined as an Allowed URL because the URL object's Content-Profile reference does not get inserted and is missing in the MySQL database post-upgrade.

Workaround:
- Delete the problematic URL within the 'Security ›› Application Security : URLs : Allowed URLs : Allowed HTTP URLs' section in Configuration Utility.
- Re-create the URL again.
- Save the changes with the 'Apply Policy' task.


1271941-5 : Tomcat CPU utilization increased after upgrading to 15.1.6 and higher versions.

Links to More Info: BT1271941

Component: TMOS

Symptoms:
Tomcat CPU utilization is high after upgrading to BIG-IP 15.1.6, java garbage collector is running high. Tomcat needs more memory after upgrading OpenJDK.

Conditions:
- Upgrade to BIG-IP 15.1.6 and higher versions.

Impact:
Tomcat server runs in an unstable state as CPU utilization is abnormal.

Workaround:
Increase the value of the system DB variable provision.tomcat.extramb and restart tomcat. This value is an amount in MB to add to the default tomcat heap size. The default heap size varies depending on provisioning from about 130 MB for LTM only to about 270 MB for ASM systems.

provision.tomcat.extramb is 0 by default.

One approach would be to increment by 50MB a time so as not to waste memory, while monitoring CPU use of tomcat to see if it drops. Less tan 2% would be a typical CPU use assuming the web interface isn't being used. Usually the CPU drops a lot with 50 or 100, sometimes 200 or slightly more might be required.

 # tmsh modify sys db provision.tomcat.extramb value 50
 # bigstart restart tomcat

tomcat is a Java process with user tomcat. You can find out the pid by running this in bash, with an example output shown beneath :

 # top -bn 1 | grep tomcat
18923 tomcat 20 0 731444 404080 ...

The first column is the PID, and can be used in a top command so only tomcat is monitored. Using the example above the PID was 18923, so this top command will allow monitoring that process:

 # top -p 18923
(use q to quit).

Of course after each tomcat restart the pid will change.

There are other possible issues that are sometimes mitigated by very high values of provision.restjavad.extramb, for example 500 or more, even without large config size. One example is ID1856513, but it is better to workaround that directly as shown in:

https://cdn.f5.com/product/bugtracker/ID1856513.html


1268373-9 : MRF flow tear down can fill up the hudq causing leaks

Links to More Info: BT1268373

Component: Service Provider

Symptoms:
TMM Memory leaks are observed when MRF flows were torn down at once and the hud queue was full.

Conditions:
When the message queue becomes full.

Impact:
TMM memory leak

Workaround:
None


1256757-4 : Suspect keymgmtd memory leak while using dynamic CRL.

Links to More Info: BT1256757

Component: TMOS

Symptoms:
keymagmtd's memory size steadily increases. Specifically, in the emdeviced memory size.

Conditions:
CRL validation is enabled

Impact:
keymgmtd might crash due to out of memory conditions.

Workaround:
Need to reboot the machine to reset the memory usage.


1231889-6 : Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances

Links to More Info: BT1231889

Component: Local Traffic Manager

Symptoms:
When a VLAN configured in the tenant does not have the same name as the VLAN on in F5OS or the VLAN in the tenant is created in a partition other than "Common", VLANs may not pass traffic properly without manual configuration.

If any such VLANs exist, newly-configured VLANs may also exhibit this issue, even if the VLAN is in Common and has a name that matches the name in F5OS.

The system will have log messages similar to the following; these errors will still occur even once the workaround has been applied.

Feb 15 15:39:49 r4000-1.example.com err mcpd[19522]: 01070094:3: Referenced vlan (/Common/external) is hidden, does not exist, or is already on another instance.
Feb 15 15:39:49 r4000-1.example.com err chmand[19520]: 012a0003:3: hal_mcp_process_error: result_code=0x1070094 for result_operation=eom result_type=eom


Tenants running on an r2000 or r4000-series appliance need to know the VLAN<>interface associations, but the system is not able to populate this information when the VLAN is not in the Common partition. VLANs may not have any 'interfaces' referenced, or will have 'interfaces' that are not in-sync with the configuration on the F5OS host. For example:

R2000# show running-config interfaces interface LAG; show running-config vlans vlan 47
interfaces interface LAG
 config type ieee8023adLag
 config description ""
 aggregation config lag-type LACP
 aggregation config distribution-hash src-dst-ipport
 aggregation switched-vlan config trunk-vlans [ 42 47 ]
!
vlans vlan 47
 config vlan-id 47
 config name vlan_47
!

R2000#

[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
    dag-adjustment none
    if-index 240 # <-- interfaces is not listed
    partition ottersPart
    [...]
    tag 47
}
[root@tenant:Active:Standalone] config #




[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
    dag-adjustment none
    if-index 240
    partition ottersPart
    interfaces { # <-- configuration with a workaround in place
        LAG {
            tagged
        }
    }
    [...]
    tag 47
}

Conditions:
- BIG-IP tenant running on r2000 and r4000-series platforms
- VLANs moved to partitions other than "Common", or renamed so that the name does not match between hypervisor and tenant.

Impact:
Partitions other than the Common partition cannot have VLANs. VLANs created in other partitions will not be operational in the data path.

If such VLANs exist in the tenant, newly added VLANs will also exhibit this issue.

Workaround:
In the BIG-IP tenant, modify all VLAN objects to have 'interfaces' that align with the configuration on the host.

For example, for the VLAN 47 described above, the VLAN should be listed as being 'tagged' on the 'LAG' trunk:

tmsh modify net vlan /ottersPart/vlan_47 interfaces replace-all-with { LAG { tagged } }
tmsh save sys config


1225941-5 : OLH Default Values on Notification and Early Retransmit Settings

Links to More Info: BT1225941

Component: Global Traffic Manager (DNS)

Symptoms:
Online Help description of the 2 settings, Explicit Congestion Notification and Early Retransmit, has incorrect default values.

Conditions:
Online Help description of the 2 settings, Explicit Congestion Notification and Early Retransmit setting is disabled by default.

Impact:
NO

Workaround:
None


1196505-3 : BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.

Links to More Info: BT1196505

Component: Local Traffic Manager

Symptoms:
BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.

Conditions:
- HTTP2
- ASM provisioned and passing traffic

Impact:
Unexpected connection reset.

Workaround:
None


1183529-4 : OCSP request burst when cert-ldap authentication is enabled

Links to More Info: BT1183529

Component: TMOS

Symptoms:
Issue observed : When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.

Cause: webUI update default value is 5 seconds - updates every 5 seconds triggering SSL handshake which results in OCSP request bursts on the OCSP responder which may be lead to responder becoming irresponsive . Each request triggers two OCSP responder messages, leading to unnecessary traffic and causing performance issues in customer environments.

Conditions:
When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.

WebUI makes an OCSP check for every HTTP request. This generates a lot of OCSP requests and If the OCSP server doesn't respond consistently, then the system is immediately redirected to the login page to re-authenticate.

Impact:
The OCSP (Online Certificate Status Protocol) Responder may experience service degradation or complete failure when subjected to excessive request volumes within compressed time intervals, particularly in environments where multiple systems share a single OCSP endpoint.

Workaround:
1. In /etc/httpd/conf.d/ssl.conf ,replace the below lines

SSLVerifyClient none
<LocationMatch "^[/][^/]+[/]">
SSLVerifyClient require
</LocationMatch>

with
 
SSLVerifyClient require

2. restart the httpd service - bigstart restart httpd

Note:The workaround does not survive a device reboot, an upgrade, or modification of any of the authentication and/or HTTPD configurations.


1168245-4 : Browser is intermittently unable to contact the BIG-IP device

Links to More Info: BT1168245

Component: TMOS

Symptoms:
When the coloradvisory probes running in the GUI do not receive a response from the BIG-IP device within 30 seconds, the GUI generates a pop-up message "Unable to contact BIG-IP device".

Conditions:
- MCPD is busy serving requests.
- Multiple browser connections to the BIG-IP.
- HTTP GET request from browser JS for /xui/update/configuration/alert/statusmenu/coloradvisory does not get a response within 30 seconds (default timeout).

Impact:
Browser frequently sees the BIG-IP as unavailable, causing interruptions to management of the device via the GUI.

Workaround:
1. Increase memory allocated to tomcat and restjavad.

   tmsh modify sys db provision.tomcat.extramb value 512
   tmsh modify sys db provision.restjavad.extramb value 2227

Note: these are very large values, not suitable for most systems. Increase tomcat heap size by 50MB a time, and restjavad by 200MB a time (value 600, 800, etc).
To have provision.restjavad.extramb values will be capped in effect to 384 + value of provision.extramb.
Both tomcat and restjavad need to be restarted to have changes take effect. restjavad will log startup info in ltm log.

2. Adjust the browser-based Javascript status update interval and timeout.

   2.1. Remount /usr partition as read-write using the command:
       
        mount -o remount,rw /usr

   2.2. Edit the file /usr/local/www/xui/framework/scripts/variables.js, and modify the variables: time_updateXui to 8, and timeout_status to 60.

        Default values are:

          var time_updateXui = 5; // Seconds
          var timeout_status = 30; //Timeout value for XUI status update

        Change these values to:

          var time_updateXui = 8; // Seconds
          var timeout_status = 60; //Timeout value for XUI status update

   2.3. Remount /usr partition back to read-only.

        mount -o remount,ro /usr

3. Restart associated daemons:

   bigstart restart httpd
   bigstart restart tomcat
   bigstart restart restjavad


1156149-7 : Early responses on standby may cause TMM to crash

Links to More Info: BT1156149

Component: Service Provider

Symptoms:
TMM cores with an early response and retransmit mechanism and has also happened during a failover event.

The following log entry can be found in /var/log/ltm

err tmm1[20721]: 01220001:3: TCL error: /Common/irule_diameter_e2_3868_be <MR_INGRESS> - Illegal argument (line 1) invoked from within "DIAMETER::is_request"

Conditions:
If the response of the request message reaches before the request on standby box.

Impact:
Traffic disrupted while tmm restarts.

Workaround:
None


1148053-2 : When client SSL profile has "cache-size 0" or "authenticate always", BIG-IP is unable to decrypt client-side traffic when using tcpdump with "--f5 ssl" method

Links to More Info: BT1148053

Component: Local Traffic Manager

Symptoms:
When client SSL profile has "cache-size 0" and/or "authenticate always", the SSL functionality fails to include SSL secrets in the F5 Ethernet Trailers (f5ethtrailer), thus not being able to decrypt client-side traffic.

Conditions:
- Client SSL profile has "cache-size 0"
- Client SSL profile has "authenticate always"

Impact:
The "cache-size 0" and the "authenticate always" options indicate that BIG-IP does not memorize any session, TMM disables session reuse. No renegotiation is provided even it is enabled.
No "session ID" should be present during the SSL/TLS handshake.

Workaround:
- For "cache-size 0" scenario, use client SSL profile default cache size
- For "authenticate always" scenario, use default value of "authenticate once"
- if changing config is not desired, iRule decryption method (K12783074) should work normally


1137521-3 : TLSv1.3 connections dropped when SSL Persistence is enabled

Links to More Info: BT1137521

Component: Local Traffic Manager

Symptoms:
A virtual server with an SSL persistence profile processing TLSv1.3 traffic may see dropped connections.

Conditions:
-- TLSv1.3 is enabled on ClientSSL profile on a virtual server.
-- SSL Persistence Mode is enabled on the virtual server.

Impact:
Traffic may be impacted as the optimizations due to SSL Persistence may not work for TLSv1.3

Workaround:
Do not enable SSL Persistence with TLSv1.3 on the affected versions.


1128429-9 : Rebooting one or more blades at different times may cause traffic imbalance results High CPU

Links to More Info: BT1128429

Component: Carrier-Grade NAT

Symptoms:
One or more TMMs are consuming more CPU cycles than the other TMMs. The increased CPU usage is caused by a significant number of internal TMM traffic redirections.

Conditions:
- LSN pools enabled.
- The sp-dag configured on the client-side and server-side VLANs (cmp-hash src-ip and cmp-hash dst-ip respectively).

Impact:
Increased TMM CPU usage on one or more TMMs.

Workaround:
- Set up an High Availability (HA) pair of VIPRIONs and make an active VIPRION cluster standby before doing any operation that involves the rebooting, insertion, or removal of one or more blades.

Or if the VIPRION is a stand-alone cluster:

- Stop all external traffic to the VIPRION before rebooting, inserting, or removing one or more blades.

- Restart or reboot all the blades at the same time from the primary, using the following "clsh" command:
"clsh reboot volume <NEW_VOLUME>" or "clsh bigstart restart".


1128033-6 : Neuron client constantly logs errors when TCAM database is full

Links to More Info: BT1128033

Component: Local Traffic Manager

Symptoms:
A database held in hardware (TCAM), shared between tenants, has a limit that is exceeded by software in tenants that adds and manages entries in the database.

Symptomatic logs on tenant:

in /var/log/ltm, repeating logs are recorded, following is an example:

  err tmm[635]: 01010331:3: Neuron client neuron_client_pva_hwl failed with rule request submit(client connection is busy (has outstanding requests))

in /var/log/tmm, cycles of following group of logs are recorded:

  notice neuron_client_negotiate: Neuron client connection established
  notice [DDOS Neuron]Neuron daemon started
  notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
  notice [DDOS Neuron]Neuron daemon stopped
  
  For F5OS host, in partition /var/F5/partitionX/log/velos.log repeating logs are recorded, following is an example:
  
  tcam-manager[41]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="TCAM processing Error(-5) executing:TCAM_INSERT for ruleno:0x20000000937"
  
In the log message, the msgid and ruleno can vary, but the Error(-5) is an indication of this issue.

Conditions:
The BIG-IP system with a rSeries r5xxx, r10xxx, r12xxx or has VELOS blades such as BX110.
The rSeries 2xxx, 4xxx and iSeries platforms are not affected.

Large configurations, on the order of high hundreds of virtual servers, are more likely to encounter issue.

Impact:
The neuron client software will restart and log repeatedly.
Inefficient use of TCAM database.

Workaround:
None


1126505-4 : HSB and switch pause frames impact data traffic

Links to More Info: BT1126505

Component: TMOS

Symptoms:
There are cases where the HSB and switch report pause frames on the HSB <-> switch interfaces. This can be seen in the switch interface stats:

name counters.rx_pause
---- -----------------
9.1 11522051
10.1 11392101

Conditions:
The iSeries platforms with an HSB and switch.

Impact:
There can be an impact on networking traffic.

Workaround:
There is no workaround for this issue. When this condition happens, the unit needs to be rebooted to clear the issue.


1120345-10 : Running tmsh load sys config verify can trigger high availability (HA) failover

Component: TMOS

Symptoms:
When running tmsh 'tmsh load sys config verify' on a config that contains both a high availability (HA) group and a traffic group referencing that high availability (HA) group, this will trigger a high availability (HA) fault and failover.

Conditions:
- Running 2 BIG-IP systems in a high availability (HA) pair
- Run tmsh 'load sys config verify' on a config with the following conditions:
- Config to be verified contains a high availability (HA) group
- Config to be verified also contains a traffic group referencing the high availability (HA) group

Impact:
HA fault and failover. The high availability (HA) pair will enter a degraded state.

Workaround:
No workaround currently known, but the failover fault can be cleared by running tmsh 'load sys config' on the system that had 'load sys config verify' run on it.


1100421-3 : HTTP/2 full-proxy virtual server uses wrong source MAC address and incorrect SNAT address selection

Links to More Info: BT1100421

Component: Local Traffic Manager

Symptoms:
When using an HTTP/2 full-proxy virtual server (with httprouter profile), server-side connections may exhibit the following issues:

- Egress packets use the system base MAC address instead of the configured masquerade MAC address.
- SNAT automap selects a non-floating self-IP instead of the expected floating self-IP.
- SNAT pool member selection does not prefer members matching the traffic-group of the virtual server.

This can cause MAC address flapping alerts on upstream network equipment and may disrupt traffic during HA failover events.

Conditions:
- Virtual server configured with the httprouter profile (HTTP/2 full-proxy).
- Masquerade MAC address configured on a traffic-group, and/or SNAT automap or SNAT pool in use with floating self-IPs.

Impact:
Server-side traffic uses incorrect source MAC address and may select non-floating SNAT addresses. Upstream network devices (such as switches or SDN controllers) may detect duplicate MAC/IP entries, causing traffic disruption. During HA failover, connections may not behave as expected because the correct traffic-group was not used.

Workaround:
None. Use a standard virtual server configuration without the httprouter profile as an alternative if HTTP/2 full-proxy is not required.


1093717-7 : BGP4 SNMP traps are not working.

Links to More Info: BT1093717

Component: TMOS

Symptoms:
BGP4 SNMP traps are not working.

Conditions:
--Perform any BGP related event and check for snmp traps.

Impact:
No BGP SNMP traps.

Workaround:
None


1091021-8 : The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive.

Links to More Info: BT1091021

Component: Local Traffic Manager

Symptoms:
You may observe LTM monitors malfunctioning on your system.

For instance, you may notice some probes are not sent out on the network, and some monitored objects are showing the wrong status, and the fail-safe action is not triggered to restart the bigd process.

Conditions:
-- The bigd daemon consists of multiple processes (which you can determine by running "ps aux | grep bigd").

-- One or more of the processes (but not all of them) become disrupted for some reason and stop serving heartbeats to the sod daemon.

Under these conditions, sod will not take any fail-safe action and the affected bigd processes will continue running impaired, potentially indefinitely.

Impact:
If LTM monitoring (bigd process) encounters a problem and stop sending out monitors, the system may not detect this, and therefore will not restart the bigd process, leaving it in an impacted state.

Workaround:
If you suspect this issue is occurring in your system, you can resolve it by killing all bigd processes using the following command:

pgrep -f 'bigd\.[0-9]+' | xargs kill -9

However, this does not prevent the issue from manifesting again in the future if the cause for bigd's disruption occurs again.

Monitoring may become further disrupted as bigd restarts, and a failover may occur depending on your specific configuration.

Another work around is to set only one bigd if that is possible.
modify sys db bigd.numprocs value 1
If only a single bigd is available, sod will detect when it is down.


1090313-7 : Virtual server may remain in hardware SYN cookie mode longer than expected

Links to More Info: BT1090313

Component: TMOS

Symptoms:
A virtual server may remain in hardware SYN cookie mode longer than expected after the SYN flood attack has stopped. The TMSH 'show ltm virtual' command shows that the virtual has already exited SYN Cookie mode, but the SYN packets are still responded from hardware for a few minutes longer.

Conditions:
The problem is a result of a race condition in TMM, so the issue might show up intermittently.

Impact:
Discrepancy between the actual SYN Cookie mode and the reported SYN Cookie mode for a short period of time after a SYN flood attack.

Workaround:
Disable hardware SYN Cookie mode.


1087569-8 : Changing max header table size according HTTP2 profile value may cause stream/connection to terminate

Links to More Info: BT1087569

Component: Local Traffic Manager

Symptoms:
BIG-IP initializes HEADER_TABLE_SIZE to the profile value and thus when it exceeds 4K (RFC default), the receiver's header table size is still at the default value. Therefore, upon receiving header indexes which has been removed from its table, receiver sends GOAWAY (COMPRESSION_ERROR)

Conditions:
-- HTTP2 profile used in a virtual server
-- In the HTTP2 profile, 'Header Table Size' is set to a value greater than 4096

Impact:
Stream/connection is terminated with GOAWAY (COMPRESSION_ERROR)

Workaround:
Issue can be avoided by restoring the header-table-size value to the default of 4096


1086473-8 : BIG-IP resumes a TLS session on the client-side but then proceeds to do a full handshake

Links to More Info: BT1086473

Component: Local Traffic Manager

Symptoms:
When a client attempts to resume the TLS session using the Session-ID in its Client Hello from a previous session, the BIG-IP agrees by using the same Session-ID in its Server Hello, but then proceeds to perform a full handshake (Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done) instead of an abbreviated handshake (Server Hello, Change Cipher Spec, Server Hello Done).

This is a violation of the TLS RFC.

Conditions:
- High availability (HA) pair of two BIG-IP units.
- LTM virtual server with a client-ssl profile.
- Mirroring enabled on the virtual server

Impact:
Client-side TLS session resumption not working.

Workaround:
Disable mirroring on the virtual server


1083405-8 : "Error connecting to named socket" from zrd

Links to More Info: BT1083405

Component: Global Traffic Manager (DNS)

Symptoms:
After an mcpd restart, zrd may not be able to re-establish a connection to named. This shows up in the /var/log/gtm file or in the GUI with a message similar to the following:

err zrd[27809]: 01150306:3: Error connecting to named socket 'Connection refused'.
(or)
err zrd[16198]: 01150306:3: Error connecting to named socket 'Connection timed out'.

Conditions:
After an mcpd restart

Impact:
Looking up or modifying zone records may fail.

Workaround:
Restart zrd and named

tmsh restart sys service zrd named


1077789-8 : System might become unresponsive after upgrading.

Links to More Info: BT1077789

Component: TMOS

Symptoms:
After upgrading, the system encounters numerous issues:

-- Memory exhaustion (very low MemAvailable) with no particular process consuming excessive memory.
-- High CPU usage usually due to high kswapd or iowait activity
-- System is unresponsive, difficult to log in, slow to accept commands.
-- Provisioning is incomplete; there is a small amount of memory amount assigned to 'host' category.

Conditions:
The device is provisioned for more than LTM, typically with ASM or APM as well or instead, and needs more host memory than a pure LTM system.

-- The configuration loads in the previous release, but does not load successfully on the first boot into the release you are upgrading to.
-- Device is upgraded and the configuration is rolled forward.
-- There may be other conditions preventing the configuration from loading successfully after an upgrade.

Exact conditions that trigger this issue could be varied.
Failure to reactivate license, if needed, before upgrade could cause it, or an actual config issue. The config load error will be shown in the ltm log - search on 'emerg load'; the actual failure should be shown a few lines before the general warning about config load failure.

Impact:
-- System down, too little host (4KB page) memory to be stable.
-- Difficulty logging in over SSH might require serial console access.

Workaround:
Reboot to an unaffected, pre-upgrade volume.

-- If the system is responsive enough, use 'tmsh reboot volume <N>' or switchboot to select an unaffected volume.

-- If the system is completely unresponsive, physically powercycle a physical appliance or reboot a BIG-IP Virtual Edition (VE) from an applicable management panel, and then select an unaffected volume from the GRUB menu manually.

Note: This requires that you have console access, or even physical access to the BIG-IP device if you are unable to SSH in to the unit. On a physical device, a non-responsive system might require that you flip the power switch.

For more information, see:
-- K9296: Changing the default boot image location on VIPRION platforms :: https://support.f5.com/csp/article/K9296
-- K5658: Overview of the switchboot utility :: https://support.f5.com/csp/article/K5658
-- K10452: Overview of the GRUB 0.97 configuration file :: https://support.f5.com/csp/article/K10452.


1075045-7 : Proxy initialization failed, Defaulting to DENY, after applying additional profile to a virtual server

Links to More Info: BT1075045

Component: Local Traffic Manager

Symptoms:
Connections are reset when accessing a virtual server, with an F5 reset cause of "Port denied".

Messages in /var/log/ltm:

err tmm[<PID>]: 01010008:3: Proxy initialization failed for <virtual server>. Defaulting to DENY.
err tmm[<PID>]: 01010008:3: Listener config update failed for <virtual server>: ERR:ERR_MEM

Conditions:
-- A virtual server is configured with 23 hudchain elements, and an attempt is made to add one or more further elements, caused by a large number of attached profiles

-- The number of 'hudchain' elements does not directly correspond to the number of profiles, as some profiles add more than one hud chain element - particularly with APM, and some elements are enabled through other settings, such as compression with the http profile

-- To find the number of elements on a virtual server, set the db variable "tmm.verbose" to 'enable', add or remove a profile to/from the affected virtual server, then check the tmm log file for a line similar ot the following

-- A log line similar to the one below will be produced, which describes the hud chain elements ont the clientside flow, the proxy in the middle, and the elements on the serverside flow. The limitation of 24 includes all the elements in either the clientside or serverside flows, as well as the proxy in the middle (the proxy is counted on both the clientside and serverside flows)

<13> Oct 1 08:33:09 bigip1.local notice (L:/Common/test) hn :TCP -> SSL -> HTTP -> INFLATE -> DEFLATE -> SATELLITE -> <TCP> <- SATELLITE <- DEFLATE <- INFLATE <- HTTP <- SSL <- TCP:

In this case, the clientside flow has 6 elemnents plus the proxy, totalling 7, and the serverside flow also has 7. Either of those numbers can not exceed a fixed upper limit of 23.

Impact:
All connections to the virtual server are immediately reset.

Workaround:
Reduce the number of profiles applied to the virtual server.


1074285-5 : Apmd crashes while handling JWT tokens.

Links to More Info: BT1074285

Component: Access Policy Manager

Symptoms:
An apmd crash might occur while handling JWT tokens.

Conditions:
The payload has invalid JSON during authentication.

Impact:
BIG-IP authorization disrupted while apmd restarts.

Workaround:
None


1073673-6 : Prevent possible early exit from persist sync

Links to More Info: BT1073673

Component: Global Traffic Manager (DNS)

Symptoms:
When a new GTM is added to the Sync group, it takes a significant amount of time, and the newly added GTM won't become ready.

Conditions:
-- GTMs in a cluster with a large number of persist records
-- A new GTM device is added

Impact:
Clients of the BIG-IP GTM do not receive an answer, and application failures may occur.

Workaround:
None


1071021-5 : Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM

Links to More Info: BT1071021

Component: Access Policy Manager

Symptoms:
Dynamic address space parser not accepting few patterns(*cdn.example.net) which are added at the DNS address space field.

Conditions:
When the user configures Office 365 Dynamic Address Space with URLs formats like:

 *-admin.sharepoint.com
 *cdn.onenote.net
 *-files.sharepoint.com
 *-myfiles.sharepoint.com

Impact:
Due to the above pattern DNS relay proxy is not compatible with them.

Workaround:
None


1069977-4 : Repeated TMM SIGABRT during ips_flow_process_data

Links to More Info: BT1069977

Component: Protocol Inspection

Symptoms:
IPS consumes excessive CPU time processing GTP related context entries and this causes the tmm clock not to be updated, because of which SOD tries to restart the TMM.

Conditions:
-- Heavy GTP traffic, and request creation messages are sent without sending the response messages.

Impact:
Traffic disrupted while tmm restarts.


1064725-6 : CHMAN request for tag:19 as failed.

Links to More Info: BT1064725

Component: Local Traffic Manager

Symptoms:
The following log is seen in /var/log/ltm when a qkview is generated:

warning chmand[6307]: 012a0004:4: CHMAN request (from qkview) for tag:19 failed.

or when a tcpdump capture is started:

warning chmand[792]: 012a0004:4: CHMAN request (from bigpcapq33E5-24) for tag:19 failed

or when get a dossier from GUI/CLI:

warning chmand[4319]: 012a0004:4: CHMAN request (from get_dossier) for tag:19 failed

or when reboot:

warning chmand[8263]: 012a0004:4: CHMAN request (from mcpd) for tag:19 failed
warning chmand[8263]: 012a0004:4: CHMAN request (from DossierValidator) for tag:19 failed
warning chmand[8263]: 012a0004:4: CHMAN request (from LACPD_USER) for tag:19 failed
warning chmand[8263]: 012a0004:4: CHMAN request (from get_dossier) for tag:19 failed

Conditions:
Any one of the following:

-- Generate a qkview file from the GUI/CLI
-- Start a tcpdump command from the CLI
-- Get a dossier from GUI/CLI
-- Reboot

Impact:
No functional impact.

Workaround:
None


1062901-7 : The 'trap-source' and 'network' SNMP properties are ineffective, and SNMP traps may be sent from an unintended interface.

Links to More Info: BT1062901

Component: TMOS

Symptoms:
The BIG-IP system sends SNMP traps from an unintended interface (likely a TMM VLAN instead of the management port).

Conditions:
This issue occurs when the configuration:

- Includes a 'trap-source' property which matches the BIG-IP system's management IP address.

- Includes a SNMP trap destination which specifies 'mgmt' as the 'network' property.

- Includes routes to the aforementioned SNMP trap destination via both tmm and the management port (and the routes are such that the tmm one wins).

Impact:
Outgoing snmp traps fail to bind to the management IP address and to leave from the management port. Instead, they will bind to a self-ip matching TMM's route to the destination and leave from a TMM VLAN.

This can cause issues (or not work at all) depending on the configuration of the host system meant to receive the traps and/or of the surrounding network devices.

Workaround:
N/A


1060541-6 : Increase in bigd CPU utilization from 13.x when SSL/TLS session resumption is not utilized by HTTPS pool members due to Open SSL upgrade

Links to More Info: BT1060541

Component: Local Traffic Manager

Symptoms:
The bigd process uses more CPU than it did in previous versions when HTTPS monitors are used for pool members and the pool members do not resume the SSL/TLS session. This is due to upstream changes in the OpenSSL library.

Conditions:
-- HTTPS monitors.
-- Pool members that do not allow or are not using TLS/SSL session resumption.

Impact:
High CPU utilization.

Workaround:
Ensure the pool members have SSL/TLS session resumption enabled.


1052057-3 : FCS errors on switch/HSB interface impacts networking traffic

Links to More Info: BT1052057

Component: TMOS

Symptoms:
There are cases where the HSB and switch report FCS errors on the HSB <-> switch interfaces. This can be seen in the snmp_dot3_stat table:

name fcs_errors
---------- ----------
12.1 83233172

This can cause intermittent packet loss, leading to networking errors. This can be observed on the BIG-IP as pool monitor flapping, intermittent networking connectivity, etc.

Conditions:
All BIG‑IP platforms using HSB, including VIPRION B2250 .e.g., i‑Series and VIPRION blades.

Impact:
There is impact on networking traffic.

Workaround:
There is no workaround for this issue. When this condition occurs, the unit needs to be rebooted to clear the issue.

ID1239905 can be used to detect and mitigate this issue.


1044281-7 : In some cases, cpcfg does not trigger selinux relabel, leaving files unlabeled

Links to More Info: BT1044281

Component: TMOS

Symptoms:
Under certain circumstances, if a configuration is copied to a boot location that has has already been booted into, files restored by the UCS archive remain unlabeled. After booting to the target volume, the BIG-IP will not function and will have the status "INOPERATIVE".

Conditions:
-- APM is provisioned.
-- Performing a cpcfg copy to another volume.

Impact:
-- APM localdbmgr restarts, and fails to restore configuration from UCS archive
-- Spurious system permissions failures as a result of SELinux

Workaround:
After booting into the affected boot location, force an SELinux relabeling:

# touch /.autorelabel && reboot


1043985-7 : After editing an iRule, the execution order might change.

Links to More Info: BT1043985

Component: Local Traffic Manager

Symptoms:
After modification, the iRule execution order may change for events with the same priority.

Conditions:
Virtual server has an iRule that contains multiple events with the same priority.

Impact:
Unexpected behavior can cause virtual server malfunction.

Workaround:
Add desired priorities for iRules that contain the same event.
For example: when <event_name> priority nnn


1043141-1 : Misleading error 'Symmetric Unit Key decrypt failure - decrypt failure' when loading UCS from another BIG-IP

Links to More Info: K36822000, BT1043141

Component: TMOS

Symptoms:
Loading a UCS file from another BIG-IP results in an error message similar to:

"/usr/bin/tmsh -n -g -a load sys config partitions all platform-migrate" - failed. -- 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure

The error message is misleading as the issue is unrelated to master key decryption.

Conditions:
-- Loading a UCS archive from a different BIG-IP.
-- The UCS archive does not contain a ".unitkey" file.
-- The target system does have the correct master key value configured.
-- There is some other MCPD validation issue in the configuration.

Impact:
Platform migration fails with a misleading error message.

Workaround:
Once the issue has happened, you can either:

- Examine the LTM log file for other error messages from MCPD and then correct the configuration issue(s).

OR:

- Re-start MCPD.

For more information, refer K36822000.


1036289-4 : Signature ID not displayed in Attack Signature details

Links to More Info: BT1036289

Component: Application Security Manager

Symptoms:
Only signature name is displayed in the "Attack signature detected" violation details. The ID is not displayed in the details nor in the event log.

Conditions:
Reviewing attack signature details

Impact:
The attack signature ID is not displayed, which makes it more difficult to correlate which attack signature was encountered.

Workaround:
Click on Attack Signature Documentation to know the signature ID.


1036217-5 : Secondary blade restarts as a result of csyncd failing to sync files for a device group

Links to More Info: BT1036217

Component: TMOS

Symptoms:
Config sync fails on the secondary blade and mcpd restarts.

In /var/log/ltm:

remote transaction for device group /Common/<group> to commit id 45018 6946340995971480381 /Common/<dest> 0 failed with error 01070712:3: Caught configuration exception (0), Failed to sync files...

Configuration error: Configuration from primary failed validation: 01070712:3: Caught configuration exception (0), Failed to sync files..... failed validation with error 17237778.

Conditions:
-- A BIG-IP system with multiple blades configured for high availability
-- A device group with AFM objects in it
-- A config sync occurs

Other conditions necessary to trigger this issue are unknown.

Impact:
Config sync to the secondary blade fails and mcpd restarts on the secondary. The cluster primary blade has the correct configuration. This will impact incremental syncing to other peers in the device group.

Workaround:
None


1031945-7 : DNS cache configured and TMM is unresponsive in 'not ready' state indefinitely after TMM restart or reboot

Links to More Info: BT1031945

Component: Global Traffic Manager (DNS)

Symptoms:
Clusterd reports "TMM not ready" right after "Active"

Following is an example:

Jun 23 18:21:14 slot2 notice sod[12345]: Active
Jun 23 18:21:14 slot2 notice clusterd[12345]:
Blade 2 turned Yellow: TMM not ready

All blades are showing 'unavailable'.

Conditions:
- Multiple DNS cache-resolver and/or net DNS resolver objects configured with names that are similar with only difference in letter case, for example, /Common/example-dns-cache and /Common/Example-DNS-cache

- Issue observed after rebooting or upgrading.

Impact:
The system remains inoperative.

Workaround:
- Remove one of the conflicting DNS cache-resolver and/or net DNS resolver objects.

or

- Rename one of the DNS cache-resolver and/or net DNS resolver objects to a name that does not result in a case-insensitive match to another DNS cache-resolver and/or net DNS resolver object name.


1027961-5 : Changes to an admin user's account properties may result in MCPD crash and failover

Links to More Info: BT1027961

Component: TMOS

Symptoms:
-- The mcpd process fails with a segmentation fault and restarts, leaving a core-dump file.
-- Active sessions in the Configuration Utility report "unable to contact BIG-IP device".
-- Various processes may record entries into the "ltm" log saying "Lost connection to mcpd."

Conditions:
-- Changes to properties of administrative user-login accounts are occurring.
-- A user account being changed has a current, active session in the Configuration Utility GUI.

Impact:
The failure and restart of mcpd will trigger a restart of many other processes, including the TMM daemons, thus interrupting network traffic handling. In high availability (HA) configurations, a failover will occur.

Workaround:
Before making changes to the account properties of an administrative user, where the changes affect the role, make certain that all GUI Configuration Utility sessions opened by that user are logged out.


1026781-7 : Standard HTTP monitor send strings have double CRLF appended

Links to More Info: BT1026781

Component: Local Traffic Manager

Symptoms:
Standard (bigd-based, not In-TMM) HTTP monitors have a double CRLF appended (\r\n\r\n) to the send string. This does not comply with RFC1945 section 5.1 which states requests must terminate with a single CRLF (\r\n). This non-compliant behavior can lead to unexpected results when probing servers.

Conditions:
Standard bigd (not In-TMM) HTTP monitors

Impact:
Servers probed by these non-RFC-compliant HTTP monitors may respond in an unexpected manner, resulting in false negative or false positive monitor results.

Workaround:
There are several workarounds:

1. If running 13.1.0 or later, switch monitoring from bigd-based to In-TMM. In-TMM monitors properly follow RFC1945 and will send only a single CRLF (\r\n)

2. Remain with bigd-based monitoring and configure probed servers to respond to double CRLF (\r\n\r\n) in a desired fashion

Depending on server configuration, a customized send string, even with the double CRLF, may still yield expected responses.


1022997-7 : TCP segments with an incorrect checksum are transmitted when the sock driver is used in AWS deployments (e.g., 1NIC)

Links to More Info: BT1022997

Component: TMOS

Symptoms:
Deployments on AWS that use the sock driver (1NIC, for example) transmit packets with bad checksums when TSO/GSO is required. This causes significant delays as TMM re-segments the packets with correct checksums for retransmission, and may cause some operations to time out (such as configsyncs of large configurations).

Conditions:
-- BIG-IP Virtual Edition (VE) using the sock driver on AWS (all 1NIC deployments use this)
-- TSO/GSO required due to MTU limitations on one or more VLANs

Impact:
-- Delayed packets.
-- Possible timeouts for some operations (configsyncs, for example).

Workaround:
Modify (or create, if not present) the file /config/tmm_init.tcl on the affected BIG-IP systems, and add the following line to it:

ndal force_sw_tcs off 1d0f:ec20

Then restart TMM:

bigstart restart tmm

Note: Restarting TMM will cause a failover (or an outage if there is no high availability (HA) peer available).


1022361-3 : Edge Client shows HTML encoding for non-English endpoint inspection message

Links to More Info: BT1022361

Component: Access Policy Manager

Symptoms:
HTML encoding characters are displayed in place of non-English characters, for example:

ó is displayed as &oacute;
á is displayed as &aacute;

Conditions:
-- Modern access profile customization with Endpoint Inspection Message.
-- Using BIG-IP Edge Client on Microsoft Windows.

Impact:
HTML encoding displays instead of non-English characters in messages on Edge Client.

Workaround:
None


1021201-3 : JSON parser is not fully UTF-8 compliant

Links to More Info: BT1021201

Component: Application Security Manager

Symptoms:
JSON parser's character set does not include support for UTF-8 characters and that can result in 'Malformed JSON data' violation when processing requests containing those characters in JSON data.

Conditions:
Requests contain unsupported UTF-8 characters, such as emoji characters, in JSON payload.

Impact:
Requests are blocked.

Workaround:
The System Variable 'relax_unicode_in_json' can be utilized to ignore what JSON identifies as malformed characters when it encounters such unsupported characters.

(1) Enable 'relax_unicode_in_json' through CLI:
# /usr/share/ts/bin/add_del_internal add relax_unicode_in_json 1

(2) Restart ASM to ensure changes take effect:
# bigstart restart asm


1019641-7 : SCTP INIT_ACK not forwarded

Links to More Info: BT1019641

Component: Local Traffic Manager

Symptoms:
After SCTP link down/up (not physical IF link down up), SCTP session can't be established.

Conditions:
-- CMP forwarding enabled (source-port preserve-strict)
-- The BIG-IP system is encountering heavy traffic load
-- A connection is deleted from the connection table

Impact:
Flow state can become out of sync between TMMs

Workaround:
Once the problem occurs, execute "tmsh delete sys connection", and the SCTP session will be re-established.


1019261-7 : In-TMM HTTPS monitor with SSL Profile set to None does not use serverssl profile.

Links to More Info: BT1019261

Component: In-tmm monitors

Symptoms:
HTTPS monitors with SSL profile set to None (default) will not use the default ServerSSL profile of "serverssl" when In-TMM monitoring is enabled. Instead, another internal ServerSSL profile is used which has different values from "serverssl".

Conditions:
-- In-TMM monitoring is enabled
-- HTTPS monitor(s) with SSL profile field is set to the default of "None"

Impact:
The TLS settings for the HTTPS monitor monitor probes will not match those of the ServerSSL "serverssl" profile and may cause unexpected behavior such as utilizing TLS 1.3 (disabled by default in the "serverssl" profile) or random session IDs.

Workaround:
Specify a ServerSSL profile in every HTTPS monitor when using In-TMM monitoring.

Attaching the profile "serverssl" will result in the same behavior that SSL Profile "none" should provide, given that the "serverssl" profile should be the default.


1016273-3 : Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled

Links to More Info: BT1016273

Component: TMOS

Symptoms:
TMM crash occurs on the standby device which is on a lower version

Conditions:
1) Active and Standby are on different versions during upgrade
2) Session mirroring enabled

Impact:
Continuous TMM crash on standby.

Workaround:
Disable session mirroring during the upgrade process. This can be done by disabling sys db statemirror.mirrorsessions.


1014761-7 : [DNS][GUI] Not able to enable/disable pool member from pool member property page

Links to More Info: BT1014761

Component: Global Traffic Manager (DNS)

Symptoms:
You are unable to enable/disable DNS pool members from the pool member property page.

Conditions:
Making changes via the DNS pool member property page.

Impact:
You can submit the changes but the changes do not persist.

Workaround:
1. tmsh
or
2. enable/disable pool member from list of pool members instead of 'general properties' page


1013793-3 : Pool members may flap on BIG-IP VE with provision.1nic set to forced_enable

Links to More Info: BT1013793

Component: TMOS

Symptoms:
-- Pool members flap up and down
-- Network trace shows BIG-IP sending TCP SYN followed immediately by RST to pool members for traffic.

Conditions:
-- BIG-IP Virtual Edition (VE)
-- System using the 'sock' network driver, as can be determined by reviewing the output of the following command:

    tmctl -d blade tmm/device_probed

-- The 'provision.1nic' DB key is set to 'forced_enable'. This is common in BIG-IP VE configurations running on Azure.

Impact:
-- Monitor statuses unreliable.

Workaround:
Use the following commands to work around this on a running system (the word 'command' is a required part of what should be typed in)

    command iptables -t raw -I PREROUTING 1 -i eth+ -j DROP
    command ip6tables -t raw -I PREROUTING 1 -i eth+ -j DROP

In addition to that, to ensure the workaround persists after TMM restarts or system reboots, add the following to /config/user_alert.conf:

alert tmm_id1013793_workaround "HA reports tmm ready" {
        exec command="iptables -t raw -D PREROUTING -i eth+ -j DROP";
        exec command="ip6tables -t raw -D PREROUTING -i eth+ -j DROP";
        exec command="iptables -t raw -I PREROUTING 1 -i eth+ -j DROP";
        exec command="ip6tables -t raw -I PREROUTING 1 -i eth+ -j DROP";
}

And then restart alertd by running:

    tmsh restart sys service alertd


1009337-8 : LACP trunk down due to bcm56xxd send failure

Links to More Info: BT1009337

Component: TMOS

Symptoms:
Lacp reports trunk(s) down. lacpd reports having trouble writing to bcm56xxd over the unix domain socket /var/run/uds_bcm56xxd.

Conditions:
Not known at this time.

Impact:
An outage was observed.

Workaround:
Restart bcm56xxd, lacpd, and lldpd daemons.


1006449-6 : High CPU utilization and slow SNMP response after upgrade

Links to More Info: BT1006449

Component: TMOS

Symptoms:
After upgrading BIG-IP to version 14.0.0 or later, CPU utilization increases and SNMP queries take an unusually long time to respond.

Conditions:
-- SNMP client repeatedly polls BIG-IP for OIDs in multiple tables over a short period of time.
-- Following an upgrade

Impact:
SNMP queries take an unusually long time to return data, and BIG-IP CPU utilization is higher.

Workaround:
To the file /config/snmp/bigipTrafficMgmt.conf, add one line with the following content:

  cacheObj 16

This could be accomplished by executing the following command line from bash:

  # echo "cacheObj 16" >> /config/snmp/bigipTrafficMgmt.conf

After the above config file has been modified and saved, the "snmpd" daemon must be restarted, using one of two command variants:

  (on a BIG-IP appliance or VE system)

  # bigstart restart snmpd

  (on a a multi-slot VIPRION or vCMP guest)

  # clsh bigstart restart snmpd

(However, this adjustment will be lost when the BIG-IP software is next upgraded.)


1004953-8 : HTTP does not fall back to HTTP/1.1

Links to More Info: BT1004953

Component: Local Traffic Manager

Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.

Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).

Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.

Workaround:
None.


1002969-8 : Csyncd can consume excessive CPU time

Links to More Info: BT1002969

Component: Local Traffic Manager

Symptoms:
Following a configuration change or software upgrade, the "csyncd" process becomes always busy, consuming excessive CPU.

Conditions:
-- occurs on a multi-blade VIPRION chassis or VELOS tenant
-- may occur with or without vCMP
-- may occur after configuring F5 Telemetry Streaming, but may also occur in other circumstances
-- large numbers of files are contained in one or more of the directories being sync'ed between blades

Impact:
The overuse of CPU resources by "csyncd" may starve other control-plane processes. Handling of payload network traffic by the data plane is not directly affected.

Workaround:
To mitigate the processing load, identify which directory or directories contain excessive numbers of files being replicated between blades by "csyncd". If this replication is not absolutely needed (see below), such a directory can be removed from the set of directories being sync'ed.

For example: if there are too many files being generated in the "/run/pamcache" directory (same as "/var/run/pamcache"), remove this directory from the set being acted upon by "csyncd" by running the following commands to comment-out the associated lines in the configuration file.
[Note it is better to follow the more complete workaround from ID 1103369, https://cdn.f5.com/product/bugtracker/ID1103369.html ]

# clsh "cp /etc/csyncd.conf /etc/csyncd.conf.$(date +%Y%m%d_%H%M%S)"

# clsh "sed -i '/run\/pamcache/,+2s/^/#/' /etc/csyncd.conf"

# clsh "bigstart restart csyncd"



If the problem was observed soon after the installation of F5 Telemetry Streaming, the configuration can be adjusted to make csyncd ignore the related files in a subdirectory of "/var/config/rest/iapps". Run the following commands:

# clsh "cp /etc/csyncd.conf /etc/csyncd.conf.$(date +%Y%m%d_%H%M%S)"

# clsh "sed -i '/\/var\/config\/rest\/iapps/a \ \ \ \ \ \ \ \ ignore f5-telemetry' /etc/csyncd.conf"

# clsh "bigstart restart csyncd"


----

The impact of disabling replication for the pamcache folder is that in the event of a primary blade failover, the new primary blade would not be aware of the existing valid auth tokens, so the user (eg, a GUI user, or a REST script already in progress at the time of the failover) would need to authenticate again.

The impact of disabling replication for a folder under the /var/config/rest/iapps is that in the event of a primary blade failover, the new primary blade would not be aware of the iApps LX package, so the user would need to install the iApps LX package on the new primary blade.


1002345-7 : Transparent monitor does not work after upgrade

Links to More Info: BT1002345

Component: In-tmm monitors

Symptoms:
Pool state changes from up to down following an upgrade.

Conditions:
A transparent monitor is configured to use the loopback address.
You are using BIG-IP Virtual Edition with a TAP interface handling linux host traffic.

Impact:
The pool is marked down.

Workaround:
None




This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade


*********************** NOTICE ***********************

For additional support resources and technical documentation, see:
******************************************************