Updated Date: 04/29/2026
Version: 21.0.0.2
Build: 38.0
Note: This content is current as of the software release date
Updates to bug information occur periodically. For the most up-to-date bug data, see Bug Tracker.
| The blue background highlights fixes |
Cumulative fixes from BIG-IP v21.0.0.1 that are included in this release
Known Issues in BIG-IP v21.0.x
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 929709-9 | CVE-2020-11023 | K66544153 | jQuery vulnerability CVE-2020-11023 | 21.0.0.2 |
| 2137805-3 | CVE-2023-36478, CVE-2024-6763, CVE-2024-8184, CVE-2023-26049 | K000157844 | Jetty vulnerabilities CVE-2023-36478, CVE-2024-6763, CVE-2023-26049, CVE-2024-8184, and CVE-2023-41900 | 21.0.0.2 |
Functional Change Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2152397-1 | 1-Blocking | BIG-IP support for f5optics packages built after October 2025★ | 21.0.0.2 | |
| 2201813-1 | 3-Major | BT2201813 | BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection | 21.0.0.2 |
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1924693 | 0-Unspecified | CVE-2020-26939 bouncycastle: Address OAEP decoding side-channel leaking RSA private exponent | 21.0.0.2 | |
| 2228837 | 1-Blocking | BT2228837 | System Integrity Status: Unavailable on BIG-IP versions with the fix for ID2141205 | 21.0.0.2, 17.5.1.5 |
| 2141205-1 | 1-Blocking | BT2141205 | Tpm-status returns: "System Integrity: Invalid" on BIG-IP versions released since October 2025 | 21.0.0.2 |
| 2264133-3 | 2-Critical | TMSH improvements | 21.0.0.2 | |
| 2259157-3 | 2-Critical | Parsing failure may interpret data as a Memcached command | 21.0.0.2 | |
| 2258981-3 | 2-Critical | Remove Unnecessary internal User account from Non-Supported BIG-IP Platforms | 21.0.0.2 | |
| 2257689-3 | 2-Critical | Improvement in system account | 21.0.0.2 | |
| 2257421-1 | 2-Critical | TMSH enhancements | 21.0.0.2 | |
| 2241493-3 | 2-Critical | User facing login issues with newly created password-based Azure VMs | 21.0.0.2 | |
| 2229613-1 | 2-Critical | BT2229613 | F5OS Tenant Inoperative Due to Incorrect Permissions on /etc/nsswitch.conf File | 21.0.0.2 |
| 2229021-1 | 2-Critical | iControl REST issue | 21.0.0.2 | |
| 2225017-1 | 2-Critical | Config Sync not working in an HA setup | 21.0.0.2 | |
| 2224937-1 | 2-Critical | HA Devices staying out of sync | 21.0.0.2 | |
| 2221517-1 | 2-Critical | BIG-IP SCP hardening | 21.0.0.2 | |
| 2221493-1 | 2-Critical | SCP Improvement | 21.0.0.2 | |
| 2221445-1 | 2-Critical | Improving scripts of Failover | 21.0.0.2 | |
| 2221413-1 | 2-Critical | SCP Improvement | 21.0.0.2 | |
| 2219173-1 | 2-Critical | TMSH improvements | 21.0.0.2 | |
| 2217713-1 | 2-Critical | TMSH improvements | 21.0.0.2 | |
| 2217485-1 | 2-Critical | TMSH Improvements | 21.0.0.2 | |
| 2202097-1 | 2-Critical | Apply limitations on certain object creation | 21.0.0.2 | |
| 2201965-1 | 2-Critical | TMSH improvement | 21.0.0.2 | |
| 2201789-4 | 2-Critical | TMSH improvements | 21.0.0.2 | |
| 2201769-1 | 2-Critical | TMSH improvements | 21.0.0.2 | |
| 2201745-1 | 2-Critical | TMSH improvements | 21.0.0.2 | |
| 2201725-1 | 2-Critical | TMSH improvements | 21.0.0.2 | |
| 2201697-1 | 2-Critical | TMSH improvements | 21.0.0.2 | |
| 2200561-1 | 2-Critical | Repeated MCPD service crashes | 21.0.0.2 | |
| 2200437-1 | 2-Critical | SNMP Improvement | 21.0.0.2 | |
| 2200421-1 | 2-Critical | SNMP Improvement | 21.0.0.2 | |
| 2200209-2 | 2-Critical | Support NVMe-based disk (newer generation instance families) | 21.0.0.2 | |
| 2196761-1 | 2-Critical | TMM core found while doing DAG and SP DAG related tests | 21.0.0.2 | |
| 2185485-1 | 2-Critical | BT2185485 | The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs★ | 21.0.0.2 |
| 2053309-5 | 2-Critical | BT2053309 | Changes to README - mention of duojs.org URL | 21.0.0.2, 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8 |
| 1983145-2 | 2-Critical | K000153024, BT1983145 | Memory Corruption due to xnet-DPDK★ | 21.0.0.2 |
| 1959549-2 | 2-Critical | BT1959549 | Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0★ | 21.0.0.2, 17.5.1.4 |
| 842525-3 | 3-Major | BT842525 | TMSH - Modifying sys httpd ssl-verify-client attribute to 'optional-no-ca' results in error | 21.0.0.2 |
| 760451-5 | 3-Major | Enabling user to configure nonce disabled/enabled from Mgmt GUI login as well as CLI | 21.0.0.2 | |
| 2262265-3 | 3-Major | Backup UCS enhancements | 21.0.0.2 | |
| 2262249-1 | 3-Major | iControl REST hardening | 21.0.0.2 | |
| 2227441-1 | 3-Major | TMSH hardening | 21.0.0.2 | |
| 2225201-3 | 3-Major | iControl REST hardening | 21.0.0.2 | |
| 2224681-1 | 3-Major | iControl REST improvement | 21.0.0.2 | |
| 2224673-1 | 3-Major | iControl REST improvement | 21.0.0.2 | |
| 2221689-3 | 3-Major | TMSH hardening | 21.0.0.2 | |
| 2221169-3 | 3-Major | iControl REST Hardening | 21.0.0.2 | |
| 2221161-3 | 3-Major | TMSH hardening | 21.0.0.2 | |
| 2220389-1 | 3-Major | BT2220389 | Enabling tm.ipv4dagfrag results in tmm not ready for world on a cluster with more than 4 blades | 21.0.0.2 |
| 2220369-1 | 3-Major | BIG-IP GUI/API Improvements | 21.0.0.2 | |
| 2219745-1 | 3-Major | iControl REST hardening | 21.0.0.2 | |
| 2218261-1 | 3-Major | iControl REST Improvements | 21.0.0.2 | |
| 2216645-1 | 3-Major | UCS Backup Improvements | 21.0.0.2 | |
| 2208913 | 3-Major | iControl SOAP hardening | 21.0.0.2 | |
| 2202281-1 | 3-Major | Primary Admin DB Change to Non-Existing User Results in Admin User Lockout | 21.0.0.2 | |
| 2201877-3 | 3-Major | BT2201877 | SCTP multihoming fails with ICMP unreachable for alternate paths. | 21.0.0.2 |
| 2201377-1 | 3-Major | iControl REST improvements | 21.0.0.2 | |
| 2198661-1 | 3-Major | BT2198661 | Resource administrator not working as expected | 21.0.0.2 |
| 2186009-2 | 3-Major | BT2186009 | Increased TX IQ size for netvsc | 21.0.0.2 |
| 2182357-3 | 3-Major | Inconsistent Default Source Address Selection for Virtual Server Between POST and PUT Requests | 21.0.0.2 | |
| 2161073-1 | 3-Major | Certificate Bundle Improvement | 21.0.0.2 | |
| 2152301-2 | 3-Major | BT2152301 | After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.★ | 21.0.0.2, 17.5.1.4 |
| 2152137-2 | 3-Major | New DB variable ve.ndal.driver.netvsc to provide driver selection for Azure/HyperV deployments | 21.0.0.2 | |
| 2140213-3 | 3-Major | BT2140213 | Xnet-netvsc driver crash | 21.0.0.2, 17.5.1.4 |
| 2132213-2 | 3-Major | BT2132213 | Hyper-V/Azure: Unable to pass traffic with tagged vlans when using the default dpdk driver. | 21.0.0.2 |
| 2083257-3 | 3-Major | 502 error from BIG-IP during large AFM rule deployment | 21.0.0.2 | |
| 1975297-1 | 3-Major | BT1975297 | TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs | 21.0.0.2 |
| 1967485-2 | 3-Major | Old Logs in /var/log Not Deleted When Storage Exceeds Threshold | 21.0.0.2 | |
| 1927521-2 | 3-Major | BT1927521 | DPDK has dependency on SSSE3 | 21.0.0.2 |
| 1621417-3 | 3-Major | WALinuxAgent Updated to Version 2.14.0.1 | 21.0.0.2 | |
| 1600617-5 | 3-Major | BT1600617 | Few virtio driver configurations may result in excessive memory usage | 21.0.0.2 |
| 1401569-5 | 3-Major | Engineering Hotfix readme file refers to non-applicable "full_box_reboot" command★ | 21.0.0.2 | |
| 1106489-6 | 3-Major | BT1106489 | GRO/LRO is disabled in environments using the TMM raw socket "sock" driver. | 21.0.0.2, 17.1.3, 16.1.4, 15.1.10 |
| 1057305-5 | 3-Major | BT1057305 | On deployments that use DPDK, "-c" may be logged as the TMM process/thread name. | 21.0.0.2 |
| 659579 | 4-Minor | BT659579 | Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time | 21.0.0.2, 17.5.1.4 |
| 2171845-3 | 4-Minor | BT2171845 | Manual Sync in Sync-Failover device group may result in differences in attached Logging Profiles on virtual server | 21.0.0.2 |
| 1178225-7 | 4-Minor | Scalability issues with F5-VE deployments | 21.0.0.2, 17.5.1.4, 17.1.3.1 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2141125-4 | 1-Blocking | BT2141125 | Multicast traffic is dropped with incorrect VLAN tagging | 21.0.0.2 |
| 797573-6 | 2-Critical | BT797573 | TMM assert crash with resulting in core generation in multi-blade chassis | 21.0.0.2 |
| 2259109-3 | 2-Critical | External users can run the track command | 21.0.0.2 | |
| 2229881-3 | 2-Critical | BT2229881 | Multi-slot tenant may become inoperative after tenant upgrade followed by tmsh reboot slot all | 21.0.0.2 |
| 2229857-3 | 2-Critical | BT2229857 | Full load from text files fails with "01020036:3: The requested device (/Common/<device-name>) was not found" if deprecatedApiAllowed is false★ | 21.0.0.2 |
| 2221001-3 | 2-Critical | TMM might restart with certain network traffic | 21.0.0.2 | |
| 2219381-1 | 2-Critical | TMSH improvement | 21.0.0.2 | |
| 1825357-3 | 2-Critical | BT1825357 | Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk | 21.0.0.2, 17.5.1.4 |
| 2259173-3 | 3-Major | Sanitize key in memcache library | 21.0.0.2 | |
| 2244413-1 | 3-Major | BT2244413 | Client Certificates are cached even when Retain Certificate is disabled on a Clientssl profile | 21.0.0.2 |
| 2219929-2 | 3-Major | BT2219929 | Tmm running in Hyper-V environments might not receive multicast traffic | 21.0.0.2 |
| 2183353-4 | 3-Major | BT2183353 | TMM Intel E810 VF driver updates the link state with 1 second delay | 21.0.0.2, 17.5.1.4, 17.1.3.1 |
| 2182045-3 | 3-Major | BT2182045 | The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers | 21.0.0.2, 17.1.3.1 |
| 2141061-1 | 3-Major | iControl REST API Endpoints enhancements | 21.0.0.2 | |
| 2135621-1 | 3-Major | BT2135621 | Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces | 21.0.0.2 |
| 2258705-1 | 4-Minor | BT2258705 | A policy with overlapping range in different rules may never match | 21.0.0.2 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2221177-3 | 2-Critical | K000159906, BT2221177 | Big3d cannot validate certificates after they are renewed | 21.0.0.2 |
| 2258929-1 | 3-Major | BT2258929 | Deleting/Adding virtual server on the LTM device object can change other disabled virtual server status on the LTM device object. | 21.0.0.2 |
| 2219053-1 | 3-Major | CVE-2025-13878: Malformed BRID/HHIT records can cause named to terminate unexpectedly | 21.0.0.2 | |
| 2217445-1 | 3-Major | GTM Virtual Server can be deleted while referenced by GTM Pools | 21.0.0.2 | |
| 1271453-2 | 3-Major | BT1271453 | DNS requests with NSEC or NSEC3 RR type Responding with no NSEC3 and no authority section from BIG-IP authoritative server. | 21.0.0.2 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2173429-2 | 2-Critical | Digest and NTLM Authorizations Not Functioning | 21.0.0.2 | |
| 2139921-3 | 2-Critical | BT2139921 | Invalid Length PCRE Expression Was Allowed Through REST API | 21.0.0.2 |
| 919917-9 | 3-Major | BT919917 | File permission errors during bot-signature installation | 21.0.0.2 |
| 911661-3 | 3-Major | BT911661 | Remote event logs may truncate at 5k when maximum entry length is configured to 64k | 21.0.0.2 |
| 2251649-4 | 3-Major | `sig_cve` and `staged_sig_cves` Fields Appear as N/A in Data Sent to Remote Syslog | 21.0.0.2 | |
| 2221781-1 | 3-Major | BT2221781 | The DOS process utilizes CPU resources during configuration updates that are unrelated to its operation. | 21.0.0.2 |
| 2219081-1 | 3-Major | BT2219081 | Live Update configuration sync failure in HA setup | 21.0.0.2 |
| 2213605-1 | 3-Major | BT2213605 | "Live Update" ASU File Listed as Not Installed After Successful Scheduled Installation | 21.0.0.2 |
| 2208709-1 | 3-Major | BT2208709 | Failure to match specific WAF signatures | 21.0.0.2 |
| 2187385-3 | 3-Major | BT2187385 | Brute force set to CAPTCHA also raises a violation and blocks traffic | 21.0.0.2 |
| 2162189-3 | 3-Major | BT2162189 | "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually★ | 21.0.0.2, 17.5.1.4, 17.1.3.1 |
| 2152445-3 | 3-Major | BT2152445 | "Live Update" API is unresponsive after upgrade and recover only after tomcat restart★ | 21.0.0.2, 17.5.1.4, 17.1.3.1 |
| 2038277-3 | 3-Major | BT2038277 | Double memory release in the enforcer | 21.0.0.2 |
| 2016465-2 | 3-Major | BT2016465 | Policy auto merge does not work for Base64 Decoding | 21.0.0.2 |
| 1938101-5 | 3-Major | BT1938101 | Performance issue on specific parameters extractions | 21.0.0.2 |
| 1933373-4 | 3-Major | BT1933373 | Newly added Threat Campaigns are missing REST ID | 21.0.0.2, 17.1.3.1 |
| 1922661-4 | 3-Major | BT1922661 | JSON profile settings not displayed in REST API after attaching schema files | 21.0.0.2, 17.1.3.1 |
| 1825057-3 | 3-Major | BT1825057 | 'vs_name' field truncated at 64 characters with ASM's remote logging | 21.0.0.2 |
| 1814413-2 | 3-Major | BT1814413 | Dynamic parameters are not extracted and cookies are not generated | 21.0.0.2 |
| 1632385-5 | 3-Major | BT1632385 | Non-ASCII UTF-8 characters are mangled in JSON policy export | 21.0.0.2 |
| 1623669-3 | 3-Major | BT1623669 | False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF) | 21.0.0.2, 17.1.3.1 |
| 1583381-4 | 3-Major | BT1583381 | "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default | 21.0.0.2 |
| 1562733-5 | 3-Major | Bd can crash using JSON schema | 21.0.0.2 | |
| 1057557-7 | 3-Major | BT1057557 | Exported policy has greater-than sign '>' not escaped to '>' with response_html_code tag. | 21.0.0.2 |
| 2230277-2 | 4-Minor | Help Content Missing on Live Update Page in Certain Scenarios | 21.0.0.2 | |
| 2201693-3 | 4-Minor | Empty Detected Value Length for Parameters with Empty Values | 21.0.0.2 | |
| 2199485-3 | 4-Minor | BT2199485 | Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value | 21.0.0.2 |
| 2078277-2 | 4-Minor | BT2078277 | BD crash with an inappropriate configuration for request_max_chunks_number | 21.0.0.2 |
| 2046941-6 | 4-Minor | BT2046941 | Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor | 21.0.0.2, 17.5.1.4, 17.1.3.1 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2149197-1 | 1-Blocking | Rotated Public key used for signature verification of apmclients iso bundle in BIG-IP | 21.0.0.2 | |
| 2259165-3 | 2-Critical | Input Validation on APM Logon Page | 21.0.0.2 | |
| 2257673-3 | 2-Critical | RSA SecurID improvements | 21.0.0.2 | |
| 2257669-1 | 2-Critical | APM my.policy improvement | 21.0.0.2 | |
| 2230009-4 | 2-Critical | BT2230009 | Access Policy memory is not cleared between access policy executions | 21.0.0.2 |
| 2219801-2 | 3-Major | BT2219801 | Visual Policy Editor AD group search is limited to current page | 21.0.0.2 |
| 937665-4 | 4-Minor | BT937665 | Relaystate in SLO request results in two Relaystates in SLO Response | 21.0.0.2, 17.5.1.4 |
Service Provider Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2252481-3 | 2-Critical | Undisclosed network traffic can cause a TMM crash | 21.0.0.2 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2229569-4 | 2-Critical | BT2229569 | Evict FSD Received While SPVADWL Is Uninitialized | 21.0.0.2 |
| 2150669-3 | 2-Critical | BT2150669 | TCP Packet loss after upgrade with AFM provisisoned★ | 21.0.0.2 |
| 2251813-3 | 3-Major | BT2251813 | BIG-IP AFM: mcpd may crash when modifying address lists with cyclic nested references | 21.0.0.2 |
| 2222185-4 | 3-Major | BT2222185 | Even if it's possible to configure multiple stanzas under the auth-info section of a security ssh profile, the SSH proxy will always choose the first one that has a private key | 21.0.0.2 |
| 2163777-3 | 3-Major | BT2163777 | Tmm core on fw_nat_classify() while nat rule configuration is being changed | 21.0.0.2 |
Policy Enforcement Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2200009-1 | 3-Major | BT2200009 | PEM HA failover may cause traffic drops for new connections | 21.0.0.2 |
| 2198757-3 | 3-Major | BT2198757 | PEM: use-after-free of mw_msg in session_del_msg_entries hash | 21.0.0.2 |
Anomaly Detection Services Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2258257-3 | 3-Major | BT2258257 | Zombie connections after switching dos profile may cause tmm crash. | 21.0.0.2 |
| 2230841-4 | 3-Major | Admd Crash During Restart Under Heavy Load | 21.0.0.2 |
Device Management Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 718796-10 | 2-Critical | K22162765, BT718796 | iControl REST token issue after upgrade★ | 21.0.0.2 |
| 996129-8 | 3-Major | BT996129 | The /var partition is full as cleanup of files on secondary is not executing | 21.0.0.2 |
| 2187185-1 | 3-Major | BT2187185 | BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests | 21.0.0.2 |
| 2186697-5 | 3-Major | BIG-IP REST Improvements | 21.0.0.2 |
iApp Technology Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2227725-1 | 3-Major | iApp Template Improvements | 21.0.0.2 |
F5OS Messaging Agent Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2190373-1 | 2-Critical | BT2190373 | Platform_agent core found while tmstats updation. | 21.0.0.2, 17.5.1.3 |
| 2230749-1 | 3-Major | Platform Agent Core Detected; Process Shutdown | 21.0.0.2 |
Cumulative fixes from BIG-IP v21.0.0.1 that are included in this release
Vulnerability Fixes
| ID Number | CVE | Links to More Info | Description | Fixed Versions |
| 2140621-4 | CVE-2025-8677 | K000157317, BT2140621 | CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 551462-12 | CVE-2014-9730 | K17447 | CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1988993-4 | CVE-2024-42516 | K000153074, BT1988993 | CVE-2024-42516 Apache HTTP Server vulnerability | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1983349-4 | CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 | K000152931, BT1983349 | CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1505309-3 | CVE-2021-23337 | K12492858, BT1505309 | CVE-2021-23337 nodejs-lodash: command injection via template | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1498949-1 | CVE-2023-2283 | K000138682, BT1498949 | CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1083937-8 | CVE-2002-20001, CVE-2022-40735 | K83120834, BT1083937 | CVE-2002-20001, CVE-2022-40735 DH Key Agreement vulnerability - OpenSSH Server | 21.0.0.1 |
| 912797-15 | CVE-2020-11868 | K44305703, BT912797 | NTP Vulnerability: CVE-2020-11868 | 21.0.0.1, 17.5.1.3, 17.1.3 |
| 714238-12 | CVE-2018-1301 | K78131906, BT714238 | CVE-2018-1301: Apache Vulnerability | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1893905-3 | CVE-2023-40217 | K000139685, BT1893905 | Python vulnerability CVE-2023-40217 | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1086325-8 | CVE-2016-4658 | K49419538, BT1086325 | CVE-2016-4658 libxml2 vulnerability | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1893473-3 | CVE-2021-40438 | K01552024, BT1893473 | Apache vulnerability CVE-2021-40438 | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1893309-5 | CVE-2021-23337 | K12492858 | CVE-2021-23337 on HostOS: Command Injection via template function.\n' 'Link:https://sn | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Functional Change Fixes
None
TMOS Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 658943-9 | 1-Blocking | BT658943 | Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants | 21.0.0.1, 14.1.4.1 |
| 2179729-1 | 1-Blocking | BT2179729 | MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity. | 21.0.0.1 |
| 2144513-1 | 1-Blocking | BT2144513 | Cannot install any BIG-IP version with ISO signature verification enabled★ | 21.0.0.1 |
| 2130485-4 | 1-Blocking | BT2130485 | Warning: the current license is not valid - Fault code: 51133 | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 935633-4 | 2-Critical | BT935633 | VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade★ | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 901989-11 | 2-Critical | BT901989 | Corruption detected in /var/log/btmp | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2197173-1 | 2-Critical | Insufficient sanitization in SNMP configuration | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2187365 | 2-Critical | BT2187365 | BIG-IP v21.0.0 VE or F5OS tenant remains INOPERATIVE after cold boot | 21.0.0.1 |
| 2163585-1 | 2-Critical | BT2163585 | Migration fails "Spanning Tree Protocol (STP) is not supported on this platform" | 21.0.0.1 |
| 2162849-2 | 2-Critical | BT2162849 | Removing the active controller does not trigger an immediate tenant failover | 21.0.0.1, 17.5.1.4 |
| 2153489-1 | 2-Critical | BT2153489 | MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21) | 21.0.0.1 |
| 2125953-5 | 2-Critical | Insufficient access control to REST endpoint and TMSH for some CLI versions. | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1826345-6 | 2-Critical | Security improvements in ca-bundle.crt | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2187529-3 | 3-Major | CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2184897-2 | 3-Major | BT2184897 | Tenant disk size modification is ineffective for var/log folder | 21.0.0.1, 17.5.1.3, 17.1.3.1 |
| 2161077-2 | 3-Major | BT2161077 | Bot profile properties page does not load when there are large number of SSL certs (> 1000) | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2152877-3 | 3-Major | BT2152877 | Exclude /opt/CrowdStrike directory from Integrity Test | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2152601 | 3-Major | BT2152601 | Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events | 21.0.0.1 |
| 2150525-1 | 3-Major | Improvements in iControl SOAP | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2144497-2 | 3-Major | BT2144497 | Mellanox driver timeouts and packet drops on Azure instances with high NIC count | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2144445-1 | 3-Major | Insufficient sanitization in TMSH | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2140905-3 | 3-Major | BT2140905 | System Integrity Test on VE is halting the whole system in FIPS mode | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2137977-3 | 3-Major | BT2137977 | Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy★ | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2078297-4 | 3-Major | Unexpected PVA traffic spike | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2063265-6 | 3-Major | Improvements in HTTP headers | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2047429-4 | 3-Major | BT2047429 | PostgreSQL should dump a corefile when not exiting | 21.0.0.1 |
| 1974701-3 | 3-Major | BT1974701 | PVA stats may be double incremented when pva mode is dedicated | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1966633-3 | 3-Major | BT1966633 | Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS★ | 21.0.0.1, 17.5.1.4 |
| 1925485 | 3-Major | CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1925369 | 3-Major | CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1925045 | 3-Major | CVE-2024-35849 - Linux Kernel Btrfs Information Leak Vulnerability | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1925029 | 3-Major | CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1923997 | 3-Major | CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1893369-3 | 3-Major | CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1450481-6 | 3-Major | TMSH hardening | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1148185-8 | 3-Major | K05403841 | getdb insufficient sanitisation | 21.0.0.1 |
| 1137269-8 | 3-Major | BT1137269 | MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 857973-5 | 4-Minor | BT857973 | GUI sets FQDN Pool Member "Auto Populate" value Enabled by default | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 761853-1 | 4-Minor | BT761853 | Send HOST header in OCSP responder request | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 423304-6 | 4-Minor | Sync issues with certain objects' parameters. | 21.0.0.1 | |
| 2186153-6 | 4-Minor | CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2141305-2 | 4-Minor | BT2141305 | SSH Proxy Profile Properties page does not render | 21.0.0.1 |
| 2131225-1 | 4-Minor | BT2131225 | Unclear Actions Displayed with L7 Profiles in Rule Creation | 21.0.0.1 |
| 2099441-2 | 4-Minor | BT2099441 | Garbled character in warning message when HA peer is added | 21.0.0.1 |
| 2035641-5 | 4-Minor | APMd resource exhaustion | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1624701-5 | 4-Minor | Security improvement in BIGIP GUI | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1341517-1 | 4-Minor | BT1341517 | With longer vlan names qkview generates invalid proc_module.xml file and ihealth parsing fails. | 21.0.0.1 |
| 1052477 | 4-Minor | CVE-2020-10751 kernel: SELinux netlink permission check bypass | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Local Traffic Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1923793-10 | 0-Unspecified | CVE-2019-5739: DoS with keep-alive HTTP connection | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2162705-2 | 1-Blocking | BT2162705 | Tmm restarting on multi-NUMA AWS instances with ENA interfaces★ | 21.0.0.1, 17.5.1.4 |
| 745334-15 | 2-Critical | CVE-2016-7099 NodeJS Vulnerability | 21.0.0.1 | |
| 2152785-1 | 2-Critical | TMM may crash under certain conditions. | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2144521-1 | 2-Critical | BT2144521 | WAF plugin gets incorrect response body when SSE profile is configured on virtual server | 21.0.0.1 |
| 2017137-5 | 2-Critical | BT2017137 | Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd | 21.0.0.1, 17.5.1.2, 17.1.3 |
| 901569-8 | 3-Major | BT901569 | Loopback traffic might get dropped when VLAN filter is enabled for a virtual server. | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2149253-2 | 3-Major | BT2149253 | QUIC connection stalls with early data | 21.0.0.1 |
| 2149233-3 | 3-Major | TMM crashes when using SSL | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2141233-2 | 3-Major | BT2141233 | Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate★ | 21.0.0.1, 17.5.1.4 |
| 1987309-4 | 3-Major | BT1987309 | Bigd may get stuck in legacy mode | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1923817 | 3-Major | CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1) | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1889845-3 | 3-Major | Improvements in Radius Monitor | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1849029-5 | 3-Major | BT1849029 | Debug TMM crashes in FIPS/CC mode | 21.0.0.1, 17.1.3, 16.1.6.1 |
| 1824985-4 | 3-Major | BT1824985 | In rare cases the Nitrox hardware compression queue may stop servicing requests. | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1818137-3 | 3-Major | BT1818137 | Tmm IPv4 fragmentation handling distribution | 21.0.0.1 |
| 1788105-3 | 3-Major | BT1788105 | TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★ | 21.0.0.1, 17.1.3 |
| 1352213-1 | 3-Major | BT1352213 | Handshake fails with FFDHE key share extension | 21.0.0.1, 17.5.1.4, 17.1.3 |
| 1271341-6 | 3-Major | Unable to use DTLS without TMM crashing | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1429861-9 | 4-Minor | CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6) | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Global Traffic Manager (DNS) Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 931149-5 | 2-Critical | BT931149 | Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings | 21.0.0.1 |
| 887681-5 | 2-Critical | BT887681 | Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c | 21.0.0.1 |
| 2197377-1 | 2-Critical | TMM crashes under specific traffic. | 21.0.0.1 | |
| 2153893-4 | 3-Major | BT2153893 | With DNS64 configured, resolution aborts early on the first error response without trying other name servers. | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2144353-4 | 3-Major | BT2144353 | BIND upgrade to stable version 9.18.41 | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2141245-3 | 3-Major | Undisclosed traffic to TMM can lead to resource exhaustion | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2106789-1 | 3-Major | BIGIP LTM Monitors Hardening | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1966405-1 | 3-Major | BT1966405 | Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1★ | 21.0.0.1 |
| 1943269-1 | 3-Major | BT1943269 | GTM Server can be deleted while referenced by GTM Pools | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1933357-3 | 3-Major | BT1933357 | DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior. | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1473189-1 | 3-Major | BT1473189 | Offending IP is not logged when rate limiting is triggered | 21.0.0.1 |
| 1379649-6 | 3-Major | BT1379649 | GTM iRule not verifying WideIP type while getting pool from TCL command | 21.0.0.1, 17.1.3.1 |
Application Security Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2152689-3 | 3-Major | BT2152689 | ASM GUI "Failed to load requests" pop-up | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2143305-5 | 3-Major | BT2143305 | Tmm crash | 21.0.0.1 |
| 1552341-7 | 3-Major | BT1552341 | Excessive tmm memory during bot signature updates | 21.0.0.1 |
| 2162589-1 | 4-Minor | BD crash with a specific configuration | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 2139901-6 | 4-Minor | BT2139901 | Server-ssl profile "do-not-remove-without-replacement" is recreated | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1505257-3 | 4-Minor | BT1505257 | False positive with "illegal base64 value" for Authorization header | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1036221-4 | 4-Minor | BT1036221 | "Illegal parameter value length" is reported with parsing product length. | 21.0.0.1, 17.5.1.4 |
Application Visibility and Reporting Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2183705-1 | 3-Major | K000156643, BT2183705 | Improper access control on SMTP | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Access Policy Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2152269-8 | 2-Critical | BT2152269 | Low reputation URIs are found in the URL DB binary | 21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1 |
| 2138077-3 | 2-Critical | BT2138077 | SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x | 21.0.0.1 |
| 1991297-3 | 2-Critical | BT1991297 | [APD][SAML-SSO]high memory due to SAML SSO leak | 21.0.0.1 |
| 2143165-3 | 3-Major | BT2143165 | Oauth tokens are not shown in UI | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2034753-3 | 3-Major | BT2034753 | Domain name validation does not align with the error message on GUI | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1818949-3 | 3-Major | BT1818949 | [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired. | 21.0.0.1 |
| 1772317-4 | 3-Major | BT1772317 | [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing" | 21.0.0.1 |
| 1752873-3 | 3-Major | BT1752873 | [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed★ | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Advanced Firewall Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2162937 | 2-Critical | BT2162937 | TMM crash when AFM is enabled | 21.0.0.1 |
| 2162905-2 | 2-Critical | BT2162905 | AFM GUI does not display Port List members in Properties panel | 21.0.0.1, 17.5.1.4 |
| 2143101-3 | 3-Major | BT2143101 | SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 2077525-4 | 3-Major | BT2077525 | Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash | 21.0.0.1 |
Policy Enforcement Manager Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2086097-4 | 3-Major | PEM iRules causing traffic disruption | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1934073-5 | 3-Major | BT1934073 | PEM policy rule incorrectly matching when using a flow condition | 21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1 |
Anomaly Detection Services Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 2186897-3 | 3-Major | BT2186897 | TMM core SIGSEVG upon replacing L7 DOS policy | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
| 1959361-2 | 3-Major | BT1959361 | When running a tenant with more than 72 VCPUs / cores, adminstall crashes | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
Device Management Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1001429-10 | 4-Minor | HTTP header Sanitization | 21.0.0.1 |
iApp Technology Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1505813-7 | 4-Minor | CVE-2018-16487 lodash: Prototype pollution in utilities | 21.0.0.1, 17.5.1.4, 17.1.3.1 | |
| 1505297-5 | 4-Minor | CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function | 21.0.0.1, 17.5.1.4, 17.1.3.1 |
F5OS Messaging Agent Fixes
| ID Number | Severity | Links to More Info | Description | Fixed Versions |
| 1359817-4 | 3-Major | BT1359817 | The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly | 21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1 |
| 2008409-4 | 4-Minor | BT2008409 | MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN | 21.0.0.1 |
Cumulative fix details for BIG-IP v21.0.0.2 that are included in this release
996129-8 : The /var partition is full as cleanup of files on secondary is not executing
Links to More Info: BT996129
Component: Device Management
Symptoms:
The system does not boot because the /var partition is full.
You see a large number of "storageXXXX.zip" files in /var/config/rest/
Conditions:
This may be observed on multi-blade vCMP guests and hosts, as well as on multi-blade tenants.
Impact:
The partition housing /var/config/ may become 100% full, impacting future disk IO operation and it may cause unexpected traffic disruption.
Workaround:
Important: This workaround is temporary, and may need to be periodically performed either manually or from a script.
Impact of Workaround: While these steps are performed, the BIG-IP REST API will be temporarily inaccessible, and higher disk IO may be seen.
Run the following commands, in sequence:
bigstart stop restjavad
rm -rf /var/config/rest/storage*.zip
rm -rf /var/config/rest/*.tmp
bigstart start restjavad
Manual application of these workaround steps clears the 100% utilized space condition and allows the partition to resume normal operation.
Fix:
N/A.
Fixed Versions:
21.0.0.2
937665-4 : Relaystate in SLO request results in two Relaystates in SLO Response
Links to More Info: BT937665
Component: Access Policy Manager
Symptoms:
When BIG-IP APM acts as the SAML IdP and receives a redirect binding single logout (SLO) request that contains a relaystate, the BIG-IP APM generates an SLO response that contains two relaystates.
Conditions:
-- BIG-IP APM configured as IdP
-- Redirect binding SLO request contains a relaystate
Impact:
SLO processing on SP may not work.
Workaround:
None.
Fixed Versions:
21.0.0.2, 17.5.1.4
935633-4 : VCMP guests or F5OS tenants may experience constant clusterd restart after host upgrade★
Links to More Info: BT935633
Component: TMOS
Symptoms:
Sometimes, when vCMP guests or F5OS tenants are started after the host has been upgraded, the guests or tenants may enter an unhealthy state due to clusterd constantly restarting.
Conditions:
-- vCMP guest or F5OS tenant has Mirroring IP configured.
-- vCMP guest or F5OS tenant is powered on after vCMP host upgrade.
-- vCMP guest or F5OS tenant is powered on and receives a new license file from the host during startup.
Impact:
-- This issue might prevent the guest or tenant from servicing traffic if the system fails to load the config and clusterd keeps restarting.
-- During startup of the guest or tenant, the following message is logged to /var/log/ltm:
err mcpd[6519]: 0107146f:3: Self-device state mirroring address cannot reference the non-existent Self IP ([IP address]); Create it in the /Common folder first.
-- /var/log/ltm shows clusterd constantly restarting.
-- One or more slots are in INOPERATIVE state, while the host shows slots as RUN/Healthy.
Workaround:
-- To avoid the issue before it occurs:
1. Prior to shutting down vCMP guests or F5OS tenants before host upgrade, ensure guests or tenants have free space in the /var partition.
2. Ensure any license updates (e.g., reactivation) are applied before shutting down the vCMP guest or F5OS tenant.
3. Issue 'tmsh save sys config' on the vCMP guest or F5OS tenant.
4. Issue 'ls /var/db/mcp*' and confirm the presence of mcpdb.bin and mcpdb.info in the /var/db directory.
5. Proceed with vCMP guest or F5OS tenant shutdown and host upgrade as per standard F5 recommended process.
-- To mitigate after the issue has been experienced on a vCMP guest or F5OS tenant:
1. Set the vCMP guest or F5OS tenant to the Configured state and wait for it to complete transition to Configured.
2. Set vCMP guest or F5OS tenant to Deployed state.
3. Review startup logs and confirm 'Self-device state mirroring address cannot reference the non-existent Self IP' message is no longer present.
4. Review /var/log/ltm and confirm clusterd is no longer restarting.
5. If issue persists, delete and recreate the vCMP guest or F5OS tenant.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
931149-5 : Some RESOLV::lookup queries, including PTR lookups for RFC1918 addresses, return empty strings
Links to More Info: BT931149
Component: Global Traffic Manager (DNS)
Symptoms:
RESOLV::lookup returns an empty string.
Conditions:
The name being looked up falls into one of these categories:
-- Forward DNS lookups in these zones:
- localhost
- onion
- test
- invalid
-- Reverse DNS lookups for:
- 127.0.0.0/8
- ::1
- 10.0.0.0/8
- 172.16.0.0/12
- 192.168.0.0/16
- 0.0.0.0/8
- 169.254.0.0/16
- 192.0.2.0/24
- 198.51.100.0/24
- 203.0.113.0/24
- 255.255.255.255/32
- 100.64.0.0/10
- fd00::/8
- fe80::/10
- 2001:db8::/32
- ::/64
Impact:
RESOLV::lookup fails.
Workaround:
Use a DNS Resolver ('net dns') and RESOLVER::name_lookup / DNSMSG:: instead of RESOLV::lookup:
1. Configure a local 'net dns' resolver, replacing '192.88.99.1' with the IP address of your DNS resolver:
tmsh create net dns-resolver resolver-for-irules answer-default-zones no forward-zones add { . { nameservers add { 192.0.2.1:53 } } }
2. Use an iRule procedure similar to this to perform PTR lookups for IPv4 addresses:
proc resolv_ptr_v4 { addr_v4 } {
# Convert $addr_v4 into its constituent bytes
set ret [scan $addr_v4 {%d.%d.%d.%d} a b c d]
if { $ret != 4 } {
return
}
# Perform a PTR lookup on the IP address $addr_v4, and return the first answer
set ret [RESOLVER::name_lookup "/Common/resolver-for-irules" "$d.$c.$b.$a.in-addr.arpa" PTR]
set ret [lindex [DNSMSG::section $ret answer] 0]
if { $ret eq "" } {
# log local0.warn "DNS PTR lookup for $addr_v4 failed."
return
}
# Last element in '1.1.1.10.in-addr.arpa. 600 IN PTR otters.example.com'
return [lindex $ret end]
}
-- In an iRule, instead of:
RESOLV::lookup @192.0.2.1 $ipv4_addr
Use:
call resolv_ptr_v4 $ipv4_addr
Fixed Versions:
21.0.0.1
929709-9 : jQuery vulnerability CVE-2020-11023
Links to More Info: K66544153
919917-9 : File permission errors during bot-signature installation
Links to More Info: BT919917
Component: Application Security Manager
Symptoms:
When you install Bot-Sig IM file through LU, /var/log/ltm shows file permission errors.
Cannot open lock file (/var/run/config_lock), permission denied.
Cannot open command history file (/root/.tmsh-history-root), Permission denied : framework/CmdHistoryFile.cpp, line 92.
Conditions:
Installing bot-signature.
Impact:
If the BIG-IP device is rebooted, or the mcpd process is restarted, following an automatic bot-signature installation, without the config first being saved, the bot-signature installation will be reverted.
Workaround:
Save the BIG-IP configuration manually after the automatic bot-signature update has completed.
Fixed Versions:
21.0.0.2
911661-3 : Remote event logs may truncate at 5k when maximum entry length is configured to 64k
Links to More Info: BT911661
Component: Application Security Manager
Symptoms:
Remote event logs are truncated at 5k instead of the configured 64k maximum entry length
Conditions:
Remote logging is configured with maximum entry length set to 64k
Impact:
Remote event logs are truncated at 5k, resulting in incomplete log entries
Workaround:
As a temporary workaround, change the maximum entry length to 2k or 10k, save the configuration, then change it back to 64k. Follow the same steps if the issue occurs again.
Fixed Versions:
21.0.0.2
901989-11 : Corruption detected in /var/log/btmp
Links to More Info: BT901989
Component: TMOS
Symptoms:
The boot_marker is written to /var/log/btmp, but /var/log/btmp is a binary file.
A message similar to:
warning <process>[10901]: pam_lastlog(<process>:session): corruption detected in /var/log/btmp
... may be logged to /var/log/secure.
Conditions:
This issue is triggered following a reboot of the BIG-IP system. Subsequently, you may observe the log message appearing in relation to various administrative activities, such as logging in through the console or restarting the tomcat service.
Impact:
Since this file is unknowingly corrupt after each boot, any potential investigation needing this data may be compromised.
Workaround:
Option 1; After bootup you can truncate the file.
$ truncate --size 0 /var/log/btmp
This will remove any instances of failed logins from the file.
--or--
Option 2; this will stop boot_markers from logging to /var/log/btmp:
CAVEATS:
- If the system has FIPS enabled, do not use this workaround! Modifying this file will cause FIPS validation to fail the next time it runs, and the system will halt on next boot.
- This workaround will not persist on software upgrades.
- Familiarity with vi is required to perform this.
Backup:
cp /etc/sysconfig/sysinit/01bootlogmarker.sysinit /var/tmp/01bootlogmarker.sysinit.bak
Open in vi:
vi /etc/sysconfig/sysinit/01bootlogmarker.sysinit
Change the following line to include "btmp":
old: excludeFiles=( "lastlog" "wtmp" "tmm*tech.out" "*.json" )
new: excludeFiles=( "lastlog" "wtmp" "btmp" "tmm*tech.out" "*.json" )
Force save and quit with (required since file is RO):
:wq!
Truncate the "/var/log/btmp" file:
truncate --size 0 /var/log/btmp
Reboot
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
901569-8 : Loopback traffic might get dropped when VLAN filter is enabled for a virtual server.
Links to More Info: BT901569
Component: Local Traffic Manager
Symptoms:
Loopback traffic (local traffic) destined to a virtual server might get dropped when the incoming packet matches a terminating connection flow.
Conditions:
-- VLAN filter is enabled on the virtual server created for loopback traffic processing.
-- An incoming packet matches a terminating connection flow (i.e., the connection flow terminates because of timeout, being dropped by iRule, etc.).
Impact:
Traffic that is matched against a terminating connection flow of a virtual is not processed by the virtual server.
Workaround:
Because this filter is ignored for loopback traffic, removing the 'Enabled On VLAN' filter at the virtual server mitigates the issue.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
887681-5 : Tmm SIGSEGV in rrset_array_lock,services/cache/rrset.c
Links to More Info: BT887681
Component: Global Traffic Manager (DNS)
Symptoms:
TMM Cored with SIGSEGV.
Conditions:
N/A.
Impact:
Traffic disrupted while tmm restarts.
Fixed Versions:
21.0.0.1
857973-5 : GUI sets FQDN Pool Member "Auto Populate" value Enabled by default
Links to More Info: BT857973
Component: TMOS
Symptoms:
In the GUI, the "autopopulate" value is Enabled by default when creating an FQDN template Pool Member, but Disabled by default when creating an FQDN template Node.
Conditions:
This is observed when using FQDN names to configure Pool Members and/or Nodes in the GUI.
Impact:
Differing default "autopopulate" values displayed in the GUI are confusing.
The "autopopulate" value for an FQDN Pool Member cannot be set to "enabled" if the "autopopulate" value of the corresponding FQDN Node is set to the default value of "disabled".
Attempting to do so via tmsh will generate an error similar to:
01070734:3: Configuration error: Cannot enable pool member to autopopulate: node (<fqdn node name>) has autopopulate set to disabled
Workaround:
Be careful to select the appropriate option for the "Auto Populate" parameter when configuring FQDN Pool Members using the GUI.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
842525-3 : TMSH - Modifying sys httpd ssl-verify-client attribute to 'optional-no-ca' results in error
Links to More Info: BT842525
Component: TMOS
Symptoms:
Error is seen when configuring the ssl-verify-client to optional-no-ca via tmsh
tmsh modify sys httpd ssl-verify-client optional-no-ca
01070920:3: Application error for confpp: AH00526: Syntax error on line 166 of /etc/httpd/conf.d/ssl.conf:
SSLVerifyClient: Invalid argument 'optional-no-ca'
Conditions:
Seen when configuring ssl-verify-client to optional-no-ca in httpd profile
Impact:
Unable to configure ssl-verify-client to optional-no-ca - impacts authentication
Workaround:
None
Fix:
You can now successfully execute
tmsh modify sys httpd ssl-verify-client optional-no-ca
Fixed Versions:
21.0.0.2
797573-6 : TMM assert crash with resulting in core generation in multi-blade chassis
Links to More Info: BT797573
Component: Local Traffic Manager
Symptoms:
TMM crashes while changing settings.
Conditions:
Seen on multi-blade chassis with either one of the options:
-- Running system with DoS and other traffic.
-- Create a new vCMP guest and deploy it.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fixed Versions:
21.0.0.2
761853-1 : Send HOST header in OCSP responder request
Links to More Info: BT761853
Component: TMOS
Symptoms:
As per the Digicert documentation, the OCSP/CRL connections require either HTTP1.1 or HTTP1.0 with host header. (Digicert).
LTM uses HTTP1.1 without the host header in OCSP responder request
Conditions:
OCSP and CRL Authentication uses HTTP1.0 for OCSP responder requests
Impact:
OCSP in the current BIG-IP relies on OpenSSL for its operations and current version of OpenSSL that is available in BIG-IP is 1.0.2za
OpenSSL 1.0.2 is only capable of generating HTTP/1.0 requests for OCSP and CRL fetches; it does not support HTTP/1.1.
This limitation prevents clients from communicating with OCSP/CRL endpoints that require HTTP/1.1, resulting in failures for revocation checks in environments where modern protocols are mandated.
Workaround:
Add either of these iRules to the Virtual Server
Modify HTTP 1.0 to HTTP1.1
when HTTP_REQUEST {
HTTP::version "1.1"
}
Add Host header
when HTTP_REQUEST {
HTTP::host "[HTTP::host]”
}
Fix:
Support for HTTP1.1 is added. The OCSP requests for auth should now use HTTP1.1 version
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
760451-5 : Enabling user to configure nonce disabled/enabled from Mgmt GUI login as well as CLI
Component: TMOS
Symptoms:
When Remote client cert-ldap authentication is enabled in BIG-IP and ocsp-responder is configured. By default nonce was always added in ocsp request
Conditions:
-- Remote client cert-ldap authentication is enabled in BIG-IP and ocsp-responder is configured.
Impact:
A new configurable parameter "ssl-ocsp-use-request-nonce" is introduced in httpd, to configure whether to send the nonce in ocsp request. Default value is On
Workaround:
None
Fix:
1.Configure BIG-IP for Remote-cert-ldap authentication
2.Set httpd ssl-ocsp-use-request-nonce on in httpd profile
3.Capture the ocsp packet
4.When httpd ssl-ocsp-use-request-nonce is on, ocsp request should contain OCSP nonce in the extensions
Fixed Versions:
21.0.0.2
745334-15 : CVE-2016-7099 NodeJS Vulnerability
Component: Local Traffic Manager
Symptoms:
tls.checkServerIdentity does not properly handle wildcards in name fields of X.509 certificates, which allows man-in-the-middle attackers to spoof servers via a crafted certificate.
Conditions:
The server runs Node.js 0.12.16 or earlier that has tls.checkServerIdentity function that does not handle wildcards in name fields of X.509 certificates.
Impact:
This allows man-in-the-middle attackers to spoof servers via a crafted certificate.
Fix:
Upgrade to Node.js 0.12.16 or later, where tls.checkServerIdentity function can handle wildcards in name fields of X.509 certificates.
Fixed Versions:
21.0.0.1
718796-10 : iControl REST token issue after upgrade★
Links to More Info: K22162765, BT718796
Component: Device Management
Symptoms:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST lose the ability to make those calls.
Conditions:
You will notice this issue when you use iControl REST and are upgrading to version 13.1.0.x or later.
You can also detect if the user is impacted by this issue with the following steps
1. Run below API to for impacted user account XYZ.
# curl -ik -u username:XYZ -XPOST https://localhost/mgmt/shared/authn/login --data-binary '{"username":"XYZ", "password":"XYZpass", "loginProviderName":"tmos"}' -H "Content-Type: application/json"
2. Find user XYZ's 'link' path under 'token' in previous output
There are two formats possible for 'link'
a. Path will have a UUID
For example "token"->"link"->"https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>"
b. Path will have a username (not UUID)
For example "token"->"link"->"https://localhost/mgmt/shared/authz/users/<username>"
3. Run below API to get list of user roles.
# restcurl -u "admin:<admin-user-pass>" /shared/authz/roles | tee /var/tmp/rest_shared_authz_roles.json
4. Check user XYZ's link path from step 2 in above output.
Check under the "userReferences" section for group "iControl_REST_API_User" . You will see the link path in one of the two formats listed in 2a/2b. If you do not see the user link path then you are impacted by this bug
Impact:
A previously privileged user can no longer query iControl REST. In addition, some remotely authenticated users may lose access to the Network Map and Analytics view after the upgrade.
Workaround:
You can repair the current users permissions with the following process:
1) Delete the state maintained by IControlRoleMigrationWorker and let it rerun by restarting restjavad process:
# restcurl -X DELETE "shared/storage?key=shared/authz/icontrol-role-migrator"
2) Restart services
# bigstart restart restjavad *or* tmsh restart /sys service restjavad
3) Now, the permissions should start in a healthy state. Re-try making an iControl REST call with an affected user.
4) If this still does not resolve the issue you could update shared/authz/roles/iControl_REST_API_User userReference list to add all affected users' accounts using PUT. Here you may need to use the UUID path as described under 'Conditions'
# restcurl shared/authz/roles/iControl_REST_API_User > role.json
# vim role.json
a. add { "link": "https://localhost/mgmt/shared/authz/users/[your-user-name]" } object to userReferences list
OR
b. add { "link": "https://localhost/mgmt/cm/system/authn/providers/tmos/1f44a60e-11a7-3c51-a49f-82983026b41b/users/<UUID>" } object to userReferences list
# curl -u admin:admin -X PUT -d@role.json http://localhost/mgmt/shared/authz/roles/iControl_REST_API_User
Fix:
When upgrading to version 13.1.0.x or later, users who previously had permissions to make calls to iControl REST retain the ability to make those calls.
Fixed Versions:
21.0.0.2
659579 : Timestamps in icrd, restjavad, and restnoded logs are not synchronized with the system time
Links to More Info: BT659579
Component: TMOS
Symptoms:
Logs on icrd, restnoded, and restjavad are in the UTC time zone and are not aligned to the system time, which makes it difficult to determine the time during troubleshooting operations.
Conditions:
Checking the icrd, restnoded, and restjavad logs timestamps.
Impact:
Difficult to troubleshoot as the logs are not aligned with system time.
Workaround:
None
Fixed Versions:
21.0.0.2, 17.5.1.4
658943-9 : Errors when platform migration process is loading UCS using trunks on vCMP guest/F5OS Tenants
Links to More Info: BT658943
Component: TMOS
Symptoms:
During the platform migration from a physical BIG-IP system to a BIG-IP vCMP guest/F5OS Tenant, the load fails with one of the following messages:
01070687:3: Link Aggregation Control Protocol (LACP) is not supported on this platform. Unexpected Error: Loading configuration process failed.
01070338:3: Cannot create trunk [name of trunk], maximum limit reached Unexpected Error: Loading configuration process failed.
Conditions:
-- The source device is a physical BIG-IP device with one or more trunks with or without LACP in its configuration.
-- The destination device is a vCMP guest/F5OS Tenant.
Impact:
The platform migration fails and the configuration does not load.
Workaround:
You can use one of the following workarounds:
-- Remove all trunks from the source configuration prior to generation of the UCS.
-- Before loading the UCS archive onto the target BIG-IP, edit the archive and remove the trunk configuration from ./config/bigip_base.conf, and then repack the UCS.
-- After the UCS load fails, edit the configuration manually on the destination to remove trunk references, and then reload the configuration.
-- K50152613
Fixed Versions:
21.0.0.1, 14.1.4.1
551462-12 : CVE-2014-9730 - Linux Kernel UDF Filesystem Denial of Service Vulnerability
Links to More Info: K17447
423304-6 : Sync issues with certain objects' parameters.
Component: TMOS
Symptoms:
Synchronized configuration objects may contain invalid parameters after you delete an object and create a different object type with the same name.
Conditions:
This issue occurs when all of the following conditions are met: --
The BIG-IP systems are configured as part of a Device Group. -- You delete a configuration object of one type and then create a different type of object that uses the same name. -- The new object's configuration is synchronized to the other systems of the Device Group.
Impact:
An invalid configuration on the box that is synced to, and no obvious warning signs.
Workaround:
Use either of the following methods: -- Synchronize the configuration after you delete the original object and before you create the new object. -- Use a different name for the new configuration object.
Fixed Versions:
21.0.0.1
2264133-3 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.0.0.2
2262265-3 : Backup UCS enhancements
Component: TMOS
Symptoms:
Backup UCS is not working as expected
Impact:
Can lead to unexpected behaviour
Workaround:
NA
Fix:
Backup UCS is now working as expected.
Fixed Versions:
21.0.0.2
2262249-1 : iControl REST hardening
Component: TMOS
Symptoms:
iControl REST not following best practices
Impact:
Can lead to unexpected behaviour
Fix:
iControl REST now following best practices
Fixed Versions:
21.0.0.2
2259173-3 : Sanitize key in memcache library
Component: Local Traffic Manager
Symptoms:
Users may be able to store invalid keys in Memcached using client request
Conditions:
Invalid key value pair is passed in client request
Impact:
Fetching values for that key may fail and my provide unexpected values
Workaround:
-NA-
Fix:
Memcached should not allow invalid keys to be set
Fixed Versions:
21.0.0.2
2259165-3 : Input Validation on APM Logon Page
Component: Access Policy Manager
Symptoms:
The logon page in the per-session policy currently lacks user input validation for invalid characters.
Conditions:
The logon page is configured within the APM per session policy
Impact:
The logon page does not validate user input and directly stores the provided value as a session variable.
Workaround:
None
Fix:
The logon page has been updated to include the following input validations:
-- Fields of type TEXT now restrict the use of specific characters: single-quote (ASCII value 0x27), double-quote (ASCII value 0x22), pipe (ASCII value 0x7C), greater-than (ASCII value 0x3E), and less-than (ASCII value 0x3C).
-- For TEXT fields with the parameter name "username," the input is limited to a maximum length of 256 characters.
Fixed Versions:
21.0.0.2
2259157-3 : Parsing failure may interpret data as a Memcached command
Component: TMOS
Symptoms:
Some data-body commands (add, set, replace, incr, decr) failed to close connections properly on error, causing request data to be misinterpreted as commands.
Conditions:
There is a parsing failure in commands that require data in the request body.
Impact:
Connection remains open even in the event of command failures, which can result in data being accepted as a command.
Workaround:
N/A
Fixed Versions:
21.0.0.2
2259109-3 : External users can run the track command
Component: Local Traffic Manager
Symptoms:
The memcached proxy track command has been removed from the codebase to maintain optimal performance.
Conditions:
When users use the track command to monitor session events.
Impact:
End user can run the track command.
Workaround:
N/A
Fixed Versions:
21.0.0.2
2258981-3 : Remove Unnecessary internal User account from Non-Supported BIG-IP Platforms
Component: TMOS
Symptoms:
Occurs when an unnecessary internal user account is present on BIG-IP platforms that do not support LCD hardware.
Conditions:
NA
Impact:
No Functional Impact
Workaround:
NA
Fix:
This fix ensures the removal of unnecessary internal user account from BIG-IP platforms that do not support LCD hardware
Fixed Versions:
21.0.0.2
2258929-1 : Deleting/Adding virtual server on the LTM device object can change other disabled virtual server status on the LTM device object.
Links to More Info: BT2258929
Component: Global Traffic Manager (DNS)
Symptoms:
After adding/deleting unrelated virtual server on the LTM device object, disabled virtual server on the same LTM device object change its status from "available/disabled" (black circle icon on GUI) to "offline/disabled" (black rhombus icon on GUI). "no reply from big3d: timed out" error is thrown, despite there is no problem in iquery communication between DNS system and LTM system.
bigipdns.local alert gtmd[21078]: 011ae0f2:1: Monitor instance /Common/bigip 10.1.1.192:80 UP --> DOWN from /Common/bigipdns (no reply from big3d: timed out)
bigipdns.local alert gtmd[21078]: 011a6006:1: SNMP_TRAP: virtual server vs2 (ip:port=10.1.1.192:80) (Server /Common/bigipltm) state change green --> red ( Monitor /Common/bigip : no reply from big3d: timed out: disabled directly)
Conditions:
All of the following conditions need to be met.
-- DNS system manages remote LTM device and its virtual servers.
-- DNS system retrieves LTM virtual server monitor status from big3d running on remote LTM device via iquery.
-- There are disabled virtual servers on LTM device object.
-- "Monitor Disabled Object" parameter under "DNS >> Settings : GSLB : General" is unchecked (default).
-- Changes to virtual server (i.e., adding / deleting) on LTM device object is performed on DNS system.
Impact:
Disabled virtual server status change from "available/disabled" (black circle icon on GUI) to "offline/disabled" (black rhombus icon on GUI).
Once this problem occurs on disabled virtual servers, even after re-enabling those affected virtual servers on LTM device, the affected virtual servers stayed at "offline/enabled" (red rhombus icon on GUI) status.
Workaround:
To rescue already affected virtual servers, on the DNS system, temporarily assign any monitor object to the affected virtual servers and revert it back to none.
# tmsh modify gtm server bigipltm virtual-servers modify { vs1 { monitor gateway_icmp } vs2 { monitor gateway_icmp } }
# tmsh modify gtm server bigipltm virtual-servers modify { vs1 { monitor none } vs2 { monitor none } }
# tmsh save /sys config gtm-only
Or alternatively, restarting gtmd on DNS system can also rescue affected virtual servers.
# tmsh restart sys service gtmd
To prevent issues from recurring in the future, you can change "gtm global-settings general monitor-disabled-objects" parameter to "yes".
# tmsh modify /gtm global-settings general monitor-disabled-objects yes
# tmsh save /sys config gtm-only
Fixed Versions:
21.0.0.2
2258705-1 : A policy with overlapping range in different rules may never match
Links to More Info: BT2258705
Component: Local Traffic Manager
Symptoms:
An LTM policy with multiple rules may fail to match correctly if a rule matches an IP address range from the first rule but not the associated URL. Even if the same IP address fits the criteria for the second rule, it will not match the second rule.
Conditions:
An LTM policy rule with a 'tcp match address' statement that matches against an address range in the first rule will prevent any further rule to be check for if the IP address match
For example, if rule 1 contains
values { 10.16.0.0/12 } and URL foo.com
while rule 2 contains
values { 10.31.236.18 10.255.255.1 } with URL example.com
Then if the source IP address is 10.31.236.18 with example.com, it will be rejected ecause 10.31.236.18 would match the range 10.16.0.0/12 in rule 1 but not foo.com
Impact:
The policy rule fails to match even when it meets the specified criteria.
Workaround:
Avoid overlapping IP range in different rules
Fix:
This issue is fixed.
Fixed Versions:
21.0.0.2
2258257-3 : Zombie connections after switching dos profile may cause tmm crash.
Links to More Info: BT2258257
Component: Anomaly Detection Services
Symptoms:
Tmm can crash in rare cases
Conditions:
When switching a dos profile (with bados enabled), while connections are still active for aa long time after the switch, tmm crash might occur.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0.2
2257689-3 : Improvement in system account
Component: TMOS
Symptoms:
System account was not working as expected.
Conditions:
Use the system account.
Impact:
Can lead to unexpected behaviour.
Fix:
The system account is now working as expected.
Fixed Versions:
21.0.0.2
2257673-3 : RSA SecurID improvements
Component: Access Policy Manager
Symptoms:
The RSA SecurID agent is not working as expected
Conditions:
An access policy uses the RSA SecurID agent.
Impact:
Can lead to unexpected behaviour
Fix:
The RSA SecurID agent now working as expected
Fixed Versions:
21.0.0.2
2257669-1 : APM my.policy improvement
Component: Access Policy Manager
Symptoms:
my.policy is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
my.policy is now working as expected
Fixed Versions:
21.0.0.2
2257421-1 : TMSH enhancements
Component: TMOS
Symptoms:
TMSH not working as expected
Conditions:
NA
Impact:
Unexpected behavior.
Workaround:
N/A
Fix:
TMSH is now working as expected
Fixed Versions:
21.0.0.2
2252481-3 : Undisclosed network traffic can cause a TMM crash
Component: Service Provider
Symptoms:
Undisclosed network traffic can cause a TMM crash.
Conditions:
NA
Impact:
TMM crashing and restarting.
Fix:
TMM now working as expected
Fixed Versions:
21.0.0.2
2251813-3 : BIG-IP AFM: mcpd may crash when modifying address lists with cyclic nested references
Links to More Info: BT2251813
Component: Advanced Firewall Manager
Symptoms:
Modifying an address list (such as adding or deleting an entry) can cause mcpd to crash with a segmentation fault (SIGSEGV).
Conditions:
Address lists are configured with nested references.
Impact:
Mcpd process crashes. Traffic disrupted while mcpd restarts.
Workaround:
Review and correct address list configurations to ensure no cycles exist
Fixed Versions:
21.0.0.2
2251649-4 : `sig_cve` and `staged_sig_cves` Fields Appear as N/A in Data Sent to Remote Syslog
Component: Application Security Manager
Symptoms:
While transmitting data to the remote syslog in BIG-IP, the sig_cve and staged_sig_cves fields may be displayed as "N/A"
Conditions:
The issue was introduced by the changes made in fix 911661. Therefore, it may surface only if a hotfix or version is installed that includes 911661 without the resolution for this problem
Impact:
The remote event log might incorrectly display "N/A" for the sig_cve and staged_sig_cves fields.
Workaround:
None
Fix:
sig_cve and staged_sig_cves fields are properly included in the remote logs.
Fixed Versions:
21.0.0.2
2244413-1 : Client Certificates are cached even when Retain Certificate is disabled on a Clientssl profile
Links to More Info: BT2244413
Component: Local Traffic Manager
Symptoms:
Client certificates are cached which can drive up memory usage.
Conditions:
TLS 1.2 sessions that are resumed with session tickets where the client also presents a certificate to the BIG-IP.
Impact:
Memory usage may increase due to caching certificates
Workaround:
None
Fixed Versions:
21.0.0.2
2241493-3 : User facing login issues with newly created password-based Azure VMs
Component: TMOS
Symptoms:
User is facing login issues with newly created password-based Azure VMs
Conditions:
Applicable to all Azure VM types
Impact:
User facing login issues with newly created password-based Azure VMs
Workaround:
User can create ssh-based Azure VMs
Fix:
Fixed the issues in the bundled WALinuxAgent.
Fixed Versions:
21.0.0.2
2230841-4 : Admd Crash During Restart Under Heavy Load
Component: Anomaly Detection Services
Symptoms:
Admd crash during the restart process.
Conditions:
Under heavy system load, if the admd anomaly process hangs, the system triggers an admd restart. However, the shutdown sequence does not release objects in the correct order, potentially causing a crash. Introducing a proper shutdown sequence resolves this issue.
Impact:
Core is created, though there is no functionality problem, as the admd was on its way to restart itself
Workaround:
None
Fix:
BADOS restarts performing a silent shutdown.
Fixed Versions:
21.0.0.2
2230749-1 : Platform Agent Core Detected; Process Shutdown
Component: F5OS Messaging Agent
Symptoms:
The platform agent encounters a crash during the shutdown process.
Conditions:
-- Platform agent shutdown
Impact:
Platform agent crashes. No functionality impact.
Workaround:
None.
Fix:
The issue has been resolved to ensure the shutdown process completes gracefully without any crashes.
Fixed Versions:
21.0.0.2
2230277-2 : Help Content Missing on Live Update Page in Certain Scenarios
Component: Application Security Manager
Symptoms:
When clicking the Live Update tab from another screen under Software Management (for example, the Update Check screen), the content in the Help tab is not displayed.
Instead, the following message appears:
"No help is available for this topic."
Conditions:
-- In the GUI, go to System ›› Software Management: Live Update.
-- Open the Help tab.
Result: Help content is available.
-- Click Update Check while the Help view remains open.
-- Click back on Live Update.
-- Open the Help tab again.
Result: The following message is displayed:
"No help is available for this topic."
Impact:
The user cannot see the help content.
Workaround:
Navigate to the Live Update page from another screen that is not under the Software Management tab.
For example:
Security ›› Application Security: Security Policies: Policies List
Fix:
The Live Update help content is displayed correctly.
Fixed Versions:
21.0.0.2
2230009-4 : Access Policy memory is not cleared between access policy executions
Links to More Info: BT2230009
Component: Access Policy Manager
Symptoms:
APD has a Tcl interpreter that can process commands provided inside an Access policy, for variable assignment or other purposes.
The Tcl environment provided does not reliably clear Tcl variables assigned in prior executions, so care must be taken to initialize the potentially dirty variables if they are used.
Conditions:
User uses some Tcl variables that can potentially be not initialized. For example, a variable assign:
session.test = regexp {(.+)@example.com} "[mcget {session.logon.last.username}]" foo captured; return $captured
Note that here, the regex may match or not match depending on the user input. If it does not match, the variable "captured" *may* contain the results from a different user who logged in previously.
Impact:
Unexpected results from Access Policy execution.
Workaround:
To work around the problem, any variable that was used must be checked. For example, instead of the regex statement above, this could be used:
if { [regexp {(.+)example.com} "[mcget {session.logon.last.username}]" foo captured] == 1 } { return $captured; } else { return "nomatch"; }
This way, if the regex does NOT match, then the result will be "nomatch" instead of potentially containing results from a previous session.
Fix:
APMD variable assign agent regex expression execution isolated from other sessions using namespace
Fixed Versions:
21.0.0.2
2229881-3 : Multi-slot tenant may become inoperative after tenant upgrade followed by tmsh reboot slot all
Links to More Info: BT2229881
Component: Local Traffic Manager
Symptoms:
After upgrading the tenant, if the command tmsh reboot slot all is executed on a multi-slot tenant, the tenant may fail to come back to an operational state and remain stuck in an inoperative state.
Load sys configuration process fails with the error: Could not find master-key object
slot2/tenant1 err tmsh[10271]: 01420006:3: Loading configuration process failed.
slot2/tenant1 emerg load_config_files[10255]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070
All slots will have an Availability of "offline" as reported in tmsh show sys cluster:
root@tenant1:/S2-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.144.192.210/22
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 02/26/26 15:23:52
---------------------------------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
---------------------------------------------------------------------------------------------------------
| 1 :: :: offline enabled false offline running Run, HA TABLE offline
| 2 :: :: offline enabled true offline running Run, HA TABLE offline
| 3 :: :: offline enabled false offline running Run, HA TABLE offline
Mcpd state will be base-config-load-failed
[root@tenant1:/S2-red-P::INOPERATIVE:Standalone] config # tmsh show sys mcp-state
-------------------------------------------------------
Sys::mcpd State:
-------------------------------------------------------
Running Phase platform
Last Configuration Load Status base-config-load-failed
End Platform ID Received true
Cluster Quorum Reached true
Conditions:
1. A tenant upgrade is performed on a multi-slot F5OS tenant.
2. All slots of the tenant are rebooted using tmsh reboot slot all or clsh reboot.
Impact:
All slots remain offline and are inoperable from a traffic processing standpoint. Additionally, loading the system configuration fails
Workaround:
To bring the system back to a working state:
reboot the current primary slot to change the primary slot, and then restart mcpd on the new primary slot using command: bigstart restart mcpd
tmsh show sys cluster will report the "Primary Slot ID"
# tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.144.192.210/22
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 2
Primary Selection Time 02/26/26 15:23:52
Fixed Versions:
21.0.0.2
2229857-3 : Full load from text files fails with "01020036:3: The requested device (/Common/<device-name>) was not found" if deprecatedApiAllowed is false★
Links to More Info: BT2229857
Component: Local Traffic Manager
Symptoms:
- After a reboot, upgrade, or otherwise forcing MCPD to load its configuration from the text config files (refer to K13030: Forcing the mcpd process to reload the BIG-IP configuration), MCPD remains inoperative and fails to load the configuration.
- The configuration fails to load with the following error:
01020036:3: The requested device (/Common/<device-name>) was not found.
Conditions:
- deprecatedApiAllowed is set to false in /config/api_settings/availability.conf. The default is "true".
Impact:
The system remains inoperative and the configuration will not load.
Workaround:
Do not set deprecatedApiAllowed to false.
If the configuration currently will not load, log into the system as root and do the following:
1. Edit /config/api_settings/availability.conf and set "deprecatedApiAllowed" to "true". This can be done by running:
sed -i -e 's,deprecatedApiAllowed":false,deprecatedApiAllowed":true,' /config/api_settings/availability.conf
2. Load the configuration:
tmsh load sys config
Fixed Versions:
21.0.0.2
2229613-1 : F5OS Tenant Inoperative Due to Incorrect Permissions on /etc/nsswitch.conf File
Links to More Info: BT2229613
Component: TMOS
Symptoms:
Platform_agent cannot connect to api-svc-gateway, resulting in the tenant being inoperative.
Repeated entries are found at /var/log/ltm log file:
Feb 23 16:14:53 localhost.localdomain warning platform_agent[5887]: 01e10005:4: Unable to subscribe for stats.
Conditions:
A manually modified UCS archive that is loaded on the BIG-IP tenant has incorrect permissions/ownership of the ./etc/nsswitch.conf file.
Once UCS is loaded, the system file: /etc/nsswitch.conf does not contain the proper permissions/ownership, e.g.
[root@hostname:INOPERATIVE:] config # ls -lZ /etc/nsswitch.conf
-rw-------. tester abc system_u:object_r:etc_t:s0 /etc/nsswitch.conf
Impact:
The tenant is inoperative.
Workaround:
After loading the UCS, run the commands that update file ownership and permissions and restart platform_agent:
chown root:root /etc/nsswitch.conf
chmod 644 /etc/nsswitch.conf
bigstart restart platform_agent
Fix:
Update /etc/nsswitch.conf file permissions to 644 and ownership to root:root.
Fixed Versions:
21.0.0.2
2229569-4 : Evict FSD Received While SPVADWL Is Uninitialized
Links to More Info: BT2229569
Component: Advanced Firewall Manager
Symptoms:
The issue occurs when spvadwl, a hash data structure, is uninitialized, and an EVICT FSD request is received from the SEP driver.
Conditions:
The system expects the spvadwl hash to be initialized before handling an EVICT FSD request. If this assumption is incorrect, operations dependent on the hash fail due to its uninitialized state.
Impact:
tmm cores
Workaround:
N/A
Fix:
A NULL check has been added to the `spvadwl_search` function to confirm the spvadwl hash is properly initialized before processing. If the hash is uninitialized, the system will ignore the 'EVICT FSD' request, ensuring proper operation and preventing errors.
Fixed Versions:
21.0.0.2
2229021-1 : iControl REST issue
Component: TMOS
Symptoms:
Under undisclosed conditions iControl REST is not following best practices.
Conditions:
Undisclosed conditions
Impact:
Unexpected impact
Fix:
iControl REST now working as expected.
Fixed Versions:
21.0.0.2
2228837 : System Integrity Status: Unavailable on BIG-IP versions with the fix for ID2141205
Links to More Info: BT2228837
Component: TMOS
Symptoms:
The 'tmsh run sys integrity status-check' or 'tpm-status' commands incorrectly report system integrity status as 'Unavailable' although the system software has not been modified.
Detailed output of the "tpm-status -v 3" command includes the following messages:
Cert policy: 1.3.6.1.4.1.3375.0.1.1.1
Required policy:1.3.6.1.4.1.3375.0.1.1.1
Key certificate OID: 1.3.6.1.4.1.3375.0.1.1.1
Popping a key cert into keys
Key cert verification: 0
Invalid key cert detected, removing from verification chain
Verifying SIRR database contents...
System Integrity Status: Unavailable
In addition:
Some Engineering Hotfixes containing a fix for ID2141205 do not successfully resolve the symptoms of ID2141205.
Conditions:
This may occur on affected versions on or after April 4, 2026, when running on the following F5 hardware platforms which include TPM (Trusted Platform Module) hardware:
-- iSeries appliances
-- VIPRION B44xx blades (B4450, B4460)
This may occur when running the follow BIG-IP versions which include the fix for ID 2141205 (https://cdn.f5.com/product/bugtracker/ID2141205.html):
-- Pre-release versions of BIG-IP; specifically, sustaining branches for BIG-IP v21.0.x, v17.5.x and v17.1.x.
-- Engineering Hotfixes which include the fix for ID 2141205. To date, such Engineering Hotfixes have been provided for the following BIG-IP versions:
-- v17.5.1.3, v17.5.1.4
-- v17.1.0.1, v17.1.2.2, v17.1.3
Impact:
You are unable to determine the integrity of the system boot components validated by the Trusted Platform Module (TPM). The system integrity status shows Unavailable, when the actual status may be either Valid or Invalid.
Workaround:
None.
Fix:
Trusted Platform Module (TPM) status shows the correct system integrity status for BIG-IP versions which include the fix for ID2141205. ID2141205 is also resolved in BIG-IP releases and Engineering Hotfixes.
Fixed Versions:
21.0.0.2, 17.5.1.5
2227725-1 : iApp Template Improvements
Component: iApp Technology
Symptoms:
iApp template were not processing as expected
Conditions:
NA
Impact:
May lead to unexpected behaviour
Workaround:
N/A
Fix:
iApp is now processing templates as expected
Fixed Versions:
21.0.0.2
2227441-1 : TMSH hardening
Component: TMOS
Symptoms:
TMSH not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
TMSH is now working as expected
Fixed Versions:
21.0.0.2
2225201-3 : iControl REST hardening
Component: TMOS
Symptoms:
iControl REST not working as expected
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
iControl REST now working as expected
Fixed Versions:
21.0.0.2
2225017-1 : Config Sync not working in an HA setup
Component: TMOS
Symptoms:
Config Sync not working in an HA setup
Conditions:
User has an HA setup.
Impact:
Config Sync not working
Fix:
Resolved the connection issue required for the config sync to work.
Fixed Versions:
21.0.0.2
2224937-1 : HA Devices staying out of sync
Component: TMOS
Symptoms:
On first attempt after creation of device group, devices are not getting into the "In Sync" state.
Conditions:
Reproducible on the instances with HA setup
Impact:
Devices stay out of sync for a longer duration blocks config sync and failover
Workaround:
Multiple attempts and after few minutes, devices get into the sync
Fix:
Added relevant TCP headers and updated the package handling.
Fixed Versions:
21.0.0.2
2224681-1 : iControl REST improvement
Component: TMOS
Symptoms:
iControl REST is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
iControl REST is working as expected
Fixed Versions:
21.0.0.2
2224673-1 : iControl REST improvement
Component: TMOS
Symptoms:
iControl REST is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
iControl REST is working as expected
Fixed Versions:
21.0.0.2
2222185-4 : Even if it's possible to configure multiple stanzas under the auth-info section of a security ssh profile, the SSH proxy will always choose the first one that has a private key
Links to More Info: BT2222185
Component: Advanced Firewall Manager
Symptoms:
In a security ssh profile, it's possible to configure multiple stanzas under the 'auth-info' section.
For example, using this configuration:
security ssh profile f5-test-ssh-proxy {
...
auth-info {
ed25519 {
proxy-server-auth {
private-key ...
public-key ...
}
proxy-client-auth {
private-key ...
public-key ...
}
real-server-auth {
public-key ...
}
}
rsa {
proxy-server-auth {
private-key ...
public-key ...
}
proxy-client-auth {
private-key ...
public-key ...
}
real-server-auth {
public-key ...
}
}
}
description none
lang-env-tolerance common
timeout 0
}
Conditions:
- AFM module licensed and provisioned.
- security ssh profile configured with multiple stanzas under the auth-info section.
Impact:
On the client-side session establishment (external client to AFM), the SSH proxy will always choose the first section that has an entry with a proxy-server-auth private-key.
Workaround:
Configure only one stanza under the auth-info section of a security ssh profile.
Fix:
Updated SSH proxy host-key selection logic in security SSH profiles to process all configured auth-info stanzas, loads valid proxy-server keys for supported algorithms (RSA, DSA, ECDSA, ED25519), and enforce one key per algorithm type while skipping invalid or duplicate entries.
Fixed Versions:
21.0.0.2
2221781-1 : The DOS process utilizes CPU resources during configuration updates that are unrelated to its operation.
Links to More Info: BT2221781
Component: Application Security Manager
Symptoms:
The dosl7d process consumes high CPU resources during config updates that are unrelated to its operation.
Conditions:
- ASM provisioned
- Configuration update
- Verify CPU consumption of dosl7d
Impact:
The dosl7d process unnecessarily consumes CPU resources.
Workaround:
None.
Fix:
Fixed dosl7d to avoid internal locking during unrelated config updates.
Fixed Versions:
21.0.0.2
2221689-3 : TMSH hardening
Component: TMOS
Symptoms:
TMSH is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
TMSH now working as expected.
Fixed Versions:
21.0.0.2
2221517-1 : BIG-IP SCP hardening
Component: TMOS
Symptoms:
SCP does not follow current best practices.
Impact:
Can lead to undesirable behaviour
Fix:
SCP is now following best practices.
Fixed Versions:
21.0.0.2
2221493-1 : SCP Improvement
Component: TMOS
Symptoms:
SCP is not following best practices
Conditions:
NA
Impact:
Could lead to unexpected behaviour
Fix:
SCP now following best practices.
Fixed Versions:
21.0.0.2
2221445-1 : Improving scripts of Failover
Component: TMOS
Symptoms:
Failover scripts not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
Failover scripts working as expected
Fixed Versions:
21.0.0.2
2221413-1 : SCP Improvement
Component: TMOS
Symptoms:
SCP is not following best practices
Conditions:
NA
Impact:
Could lead to unexpected behaviour
Workaround:
NA
Fix:
SCP now following best practices.
Fixed Versions:
21.0.0.2
2221177-3 : Big3d cannot validate certificates after they are renewed
Links to More Info: K000159906, BT2221177
Component: Global Traffic Manager (DNS)
Symptoms:
After renewing your big3d certificates, LTM virtual servers become unavailable in GTM, and the bigip_add command starts failing.
Logs in /varl/og/ltm
"big3d SSL cert EXPIRED at IP <IP_ADDRESS>"
"SSL error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed"
"SSL error:14094413:SSL routines:ssl3_read_bytes:sslv3 alert unsupported certificate"
Conditions:
-- BIG-IP DNS (GTM)
-- A Public CA is used to sign the certificates used by big3d
Impact:
Big3d fails to verify the new certificate.
Note: This can also occur if you use a public CA to sign the device certificate used for high availability.
Workaround:
Follow the worksteps described in K000159906: BIG-IP GTM/DNS iQuery Connection Failure Due to Missing Extended Key Usage (EKU) Extensions in Device Certificates, available at https://my.f5.com/manage/s/article/K000159906
Fix:
Both `gtmd` and `big3d` traditionally use the device certificate for mutual TLS connections. This works if the certificate supports both client and server authentication or lacks extended key usage.
If the device certificate is limited to server authentication, configure a client certificate using DB variables `gtm.ssl.crt` and `gtm.ssl.key`. Once set, `gtmd` immediately uses the new certificates, and the `gtm_add` script exchanges them for TLS connections.
Updating the DB variables while in a sync group breaks existing TLS connections. Restore trust using `bigip_add`, `big3d_install`, or manually installing the client certificate as trusted on remote devices.
Fixed Versions:
21.0.0.2
2221169-3 : iControl REST Hardening
Component: TMOS
Symptoms:
iControl REST not working as expected
Conditions:
NA
Impact:
Leads to undesirable behaviour
Fix:
iControl REST now working as expected
Fixed Versions:
21.0.0.2
2221161-3 : TMSH hardening
Component: TMOS
Symptoms:
TMSH not working as expected
Conditions:
NA
Impact:
Leads to undesirable behaviour
Fix:
TMSH now working as expected.
Fixed Versions:
21.0.0.2
2221001-3 : TMM might restart with certain network traffic
Component: Local Traffic Manager
Symptoms:
TMM is not handling specific traffic as expected.
Conditions:
When configured with Multipath TCP configuration.
Impact:
Traffic disrupted while TMM restarts.
Fix:
TMM is now handling traffic as expected.
Fixed Versions:
21.0.0.2
2220389-1 : Enabling tm.ipv4dagfrag results in tmm not ready for world on a cluster with more than 4 blades
Links to More Info: BT2220389
Component: TMOS
Symptoms:
If tm.ipv4dagfrag is enabled on a multi slot system, tmm on all blades may not fully start up.
Conditions:
-- F5OS tenant or chassis with more than 4 blades.
- -tm.ipv4dagfrag enabled
Impact:
-- tmsh show sys cluster will show "TMM not ready"
-- The affected blades will not pass traffic
Workaround:
Disable tm.ipv4dagfrag
Fixed Versions:
21.0.0.2
2220369-1 : BIG-IP GUI/API Improvements
Component: TMOS
Symptoms:
BIG-IP management plane (GUI/API) is not following best practices.
Conditions:
When LDAP authentication is configured.
Impact:
Unexpected behaviour on BIG-IP.
Workaround:
NA
Fix:
BIG-IP management plane (GUI/API) is now following best practices.
Fixed Versions:
21.0.0.2
2219929-2 : Tmm running in Hyper-V environments might not receive multicast traffic
Links to More Info: BT2219929
Component: Local Traffic Manager
Symptoms:
Multicast is being sent towards the BIG-IP, but a capture on the BIG-IP does not show multicast packets arriving.
Conditions:
BIG-IP running on Hyper-V using the dpdk driver:
The interface is using the xnet driver:
# tmctl -d blade tmm/device_probed
pci_bdf pseudo_name type available_drivers driver_in_use
------------ ----------- --------- ----------------- -------------
0000:00:e1.0 1.1 F5DEV_PCI xnet, sock, xnet
And the xnet driver is using the dpdk driver:
# tmctl -d blade tmm/xnet/device_probed
id available_drivers driver_selected driver_in_use
------ ----------------- --------------- -------------
{UUID} sock, dpdk, dpdk Yes
Impact:
Tmm does not see multicast packets. If the BIG-IP us using IPv6, this will cause IPv6 neighbor discovery to fail for addresses on the BIG-IP.
It can also impact other multicast based traffic.
Workaround:
Switch to the sock driver: https://my.f5.com/manage/s/article/K000153024
Fixed Versions:
21.0.0.2
2219801-2 : Visual Policy Editor AD group search is limited to current page
Links to More Info: BT2219801
Component: Access Policy Manager
Symptoms:
The Search in AD Groups in the Visual Policy Editor is limited to the current page instead of a global search
Conditions:
1. Access Policy -> Edit
2. AD Groups Resource Assign -> Add new entry -> edit
3. Have multiple pages of AD groups
Impact:
Won't be able to search among AD Groups spanning multiple pages
Workaround:
None
Fixed Versions:
21.0.0.2
2219745-1 : iControl REST hardening
Component: TMOS
Symptoms:
iControl REST is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
iControl REST is working as expected
Fixed Versions:
21.0.0.2
2219381-1 : TMSH improvement
Component: Local Traffic Manager
Symptoms:
TMSH is not working as expected
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Workaround:
None
Fix:
TMSH is working as expected
Fixed Versions:
21.0.0.2
2219173-1 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.0.0.2
2219081-1 : Live Update configuration sync failure in HA setup
Links to More Info: BT2219081
Component: Application Security Manager
Symptoms:
The Live Update log records a YamlReader error for full_sync_asm-live-update, causing the Live Update configuration sync to fail.
Conditions:
The Live Update log shows a YamlReader error for the full_sync_asm-live-update file.
Impact:
Some servers in the HA setup may have incorrect Live Update configurations.
Workaround:
N/A
Fix:
Live Update sync process uses simplified YAML file
Fixed Versions:
21.0.0.2
2219053-1 : CVE-2025-13878: Malformed BRID/HHIT records can cause named to terminate unexpectedly
Component: Global Traffic Manager (DNS)
Symptoms:
Malformed BRID/HHIT records can cause `named` to terminate unexpectedly. This issue affects BIND 9 versions 9.18.40 through 9.18.43, 9.20.13 through 9.20.17, 9.21.12 through 9.21.16, 9.18.40-S1 through 9.18.43-S1, and 9.20.13-S1 through 9.20.17-S1.
Conditions:
Triggered by specially crafted or malicious DNS queries.
Impact:
Potential denial of service (DoS) for DNS services.
Workaround:
None
Fix:
Upgraded BIND to a patched version that resolves CVE-2025-13878.
Fixed Versions:
21.0.0.2
2218261-1 : iControl REST Improvements
Component: TMOS
Symptoms:
iControl REST was not following best practices.
Conditions:
NA
Impact:
Could lead to unexpected behaviour.
Workaround:
NA
Fix:
iControl REST is now following best practices.
Fixed Versions:
21.0.0.2
2217713-1 : TMSH improvements
Component: TMOS
Symptoms:
TMSH not following best practices
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
TMSH is now following best practices.
Fixed Versions:
21.0.0.2
2217485-1 : TMSH Improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior.
Fix:
TMSH is now following best practices.
Fixed Versions:
21.0.0.2
2217445-1 : GTM Virtual Server can be deleted while referenced by GTM Pools
Component: Global Traffic Manager (DNS)
Symptoms:
A GTM virtual server object can be deleted even if it is referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.
Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.
Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.
Workaround:
None.
Fix:
A validation check has been added to prevent deletion of a GTM virtual server that is referenced by GTM pools, and a warning is now displayed to the user. This behavior is controlled by the DB variable gtm.gtmserverdeletevalidation, which is disabled by default and must be enabled to enforce the deletion restriction.
Fixed Versions:
21.0.0.2
2216645-1 : UCS Backup Improvements
Component: TMOS
Symptoms:
UCS Backup is not following best practices.
Conditions:
When BIG-IP is under Appliance mode.
Impact:
Could lead to unexpected behaviour.
Workaround:
NA
Fix:
UCS Backup is now working as expected.
Fixed Versions:
21.0.0.2
2213605-1 : "Live Update" ASU File Listed as Not Installed After Successful Scheduled Installation
Links to More Info: BT2213605
Component: Application Security Manager
Symptoms:
The "Live Update" ASU file appears with a "Pending" status in the GUI, even though it was successfully downloaded and installed.
Conditions:
Installations run in "Scheduled" mode
Impact:
The system provides incorrect reporting on the installation status of the latest "Live Update" ASU file.
Workaround:
Click on "Install" button for latest "Pending" ASU file
Fixed Versions:
21.0.0.2
2208913 : iControl SOAP hardening
Component: TMOS
Symptoms:
iControl SOAP not following best practices
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
iControl SOAP now following best practices
Fixed Versions:
21.0.0.2
2208709-1 : Failure to match specific WAF signatures
Links to More Info: BT2208709
Component: Application Security Manager
Symptoms:
A signature is not matched as expected.
Conditions:
Specific configuration and traffic.
Impact:
A false negative on a specific scenario.
Workaround:
None.
Fixed Versions:
21.0.0.2
2202281-1 : Primary Admin DB Change to Non-Existing User Results in Admin User Lockout
Component: TMOS
Symptoms:
When the `systemauth.primaryadminuser` value is changed to a non-existing user, the primary admin value is updated to the non-existing user, resulting in an admin user lockout scenario.
Conditions:
When a user does not existing in the system and primary admin value is changed to non existing user value.
Impact:
-- The admin user becomes disabled, logged out of TMUI and TMSH, and is unable to log back in.
-- If the root account login is also disabled, both the root and admin users are logged out of the system.
Workaround:
None
Fix:
When the primary admin DB is udated below operations takes place; in case of failure to update sys db these will get rollbacked.
-> Writes localusers file
-> Writes URP file
-> Clears PAM cache
-> Writes f5_public file
Fixed Versions:
21.0.0.2
2202097-1 : Apply limitations on certain object creation
Component: TMOS
Symptoms:
Creation with certain objects could cause unexpected behavior.
Conditions:
NA
Impact:
Could result in unexpected behavior.
Fix:
The objects now have limitations to avoid the unexpected behavior.
Fixed Versions:
21.0.0.2
2201965-1 : TMSH improvement
Component: TMOS
Symptoms:
TMSH is not working as expected.
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
TMSH is working as expected.
Fixed Versions:
21.0.0.2
2201877-3 : SCTP multihoming fails with ICMP unreachable for alternate paths.
Links to More Info: BT2201877
Component: TMOS
Symptoms:
SCTP multihoming fails with ICMP protocol unreachable for alternate paths.
Conditions:
- SCTP profile with multihoming and alternate addresses configured.
- Alternate address is a self-ip configured on a system.
Impact:
Unable to establish alternate path connection.
Workaround:
None
Fixed Versions:
21.0.0.2
2201813-1 : BIG-IP enforces maximum concurrent streams limit immediately over HTTP/2 connection
Links to More Info: BT2201813
Component: Local Traffic Manager
Symptoms:
BIG-IP negotiates a number of concurrent streams over HTTP/2 connection per RFC requirement. It immediately enforces this limitation once the protocol is agreed and first SETTINGS frame is issued.
Conditions:
-- BIG-IP virtual server with a http2 profile.
-- A client connects to the virtual server and negotiates or starts HTTP/2 connection.
Impact:
The client may send more requests than the limit set by BIG-IP over the established HTTP/2 connection and it causes the BIG-IP system to reset the extra streams. If Reset Stream Protection is enabled, it may result in the connection being shutdown by the BIG-IP system.
Workaround:
None.
Fix:
BIG-IP no longer sends RST_STREAM frames when the number of streams exceeded the configured limit until SETTINGS/ACK is received to designate the honoring of the the limit by BIG-IP peer.
Behavior Change:
On initial period until SETTINGS/ACK frame is arrived from the peer, TMM follows HTTP/2 RFC and assumes "unlimited" number of concurrent streams rather than enforcing the configured limit right away. If SETTINGS/ACK is not received, the timeout of 1 (one) seconds is used to start the stream concurrency enforcement. Until the enforcement starts, TMM queues stream-specific frames and "softly" enforces the limit to the configured one, allowing 128 frames and 128K of frame body (frame->length) at most.
Fixed Versions:
21.0.0.2
2201789-4 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.0.0.2
2201769-1 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.0.0.2
2201745-1 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.0.0.2
2201725-1 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.0.0.2
2201697-1 : TMSH improvements
Component: TMOS
Symptoms:
TMSH is not following best practices
Conditions:
NA
Impact:
Unexpected behavior
Workaround:
None
Fix:
Implemented best practices in TMSH
Fixed Versions:
21.0.0.2
2201693-3 : Empty Detected Value Length for Parameters with Empty Values
Component: Application Security Manager
Symptoms:
When a request contains a parameter with a zero-length value, the system fails to recognize it as having zero length and instead displays the parameter as having an empty value.
Conditions:
Using GUI with "Illegal parameter value length" violation
Impact:
GUI displays parameter length with an empty value when the parameter has zero length
Workaround:
Modify checking the parameter length also for zero length
Fix:
Modified the condition logic to use <= instead of < when comparing parameter lengths, ensuring zero-length values are correctly set
Fixed Versions:
21.0.0.2
2201377-1 : iControl REST improvements
Component: TMOS
Symptoms:
iControl REST is not following best practices
Conditions:
NA
Impact:
It can lead to unexpected system behaviour
Fix:
iControl REST is now following best practices
Fixed Versions:
21.0.0.2
2200561-1 : Repeated MCPD service crashes
Component: TMOS
Symptoms:
Repeated restart of the MCPD service in HA setup, or when a modified object is getting deleted in the same transaction.
Conditions:
In the same transaction when a modified object is getting deleted then it leads to restart of mcpd service due to SW issue.
Impact:
Restart of MCPD service which implies that the data path is disrupted due to TMM restart triggered as a result of MCPD crash.
Workaround:
There is no workaround other than to patch the software with a new release version.
Fix:
Avoid modification to the deleted object in the same transaction.
Fixed Versions:
21.0.0.2
2200437-1 : SNMP Improvement
Component: TMOS
Symptoms:
SNMP is not following best practices
Conditions:
NA
Impact:
Could lead to unexpected behaviour
Workaround:
NA
Fix:
SNMP now following best practices
Fixed Versions:
21.0.0.2
2200421-1 : SNMP Improvement
Component: TMOS
Symptoms:
SNMP is not following best practices
Conditions:
NA
Impact:
Could lead to unexpected behaviour
Workaround:
NA
Fix:
SNMP now following best practices
Fixed Versions:
21.0.0.2
2200209-2 : Support NVMe-based disk (newer generation instance families)
Component: TMOS
Symptoms:
The newer generation of instance families were not being supported for BIG IP Images
Conditions:
All prior versions of BIG-IP that did not have the NVMe Support flag set
Impact:
Enabling the NVMe support flag enhances disk I/O performance and ensures compatibility with modern Alibaba Cloud instance types, which utilize NVMe devices for disk exposure. This adjustment modifies the way block devices are identified and accessed at the operating system level.
Workaround:
Save the image as a custom image and set the NVMe support flag to yes
Fix:
Newer images are being published with the relevant flag turned on
Fixed Versions:
21.0.0.2
2200009-1 : PEM HA failover may cause traffic drops for new connections
Links to More Info: BT2200009
Component: Policy Enforcement Manager
Symptoms:
All traffic belonging to some connections established to the new Active unit immediately after a failover between PEM units could be dropped.
Conditions:
- PEM units in HA pair.
- New connections established to the new Active unit immediately after a failover.
Impact:
All traffic belonging to new connections established immediately after a failover could be dropped.
Workaround:
None
Fixed Versions:
21.0.0.2
2199485-3 : Export and re-import of a security policy in XML format fails due to invalid 'openapi-array' user_input_format value
Links to More Info: BT2199485
Component: Application Security Manager
Symptoms:
Import fails with error: Field 'parameter/user_input_format' may not contain the value 'openapi-array'.
Conditions:
URL level parameter configured with Parameter value type: User-input value and Data type: URI
Impact:
Import of security policy in XML format fails.
Workaround:
Manually change user_input_format from openapi-array to uri in the xml file before importing.
Fixed Versions:
21.0.0.2
2198757-3 : PEM: use-after-free of mw_msg in session_del_msg_entries hash
Links to More Info: BT2198757
Component: Policy Enforcement Manager
Symptoms:
There is a rare scenario where tmm crashes while passing PEM traffic.
Conditions:
-- PEM is licensed and enabled.
-- Policies are assigned from the PCRF. Subscriber additions and deletions are happening regularly.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
The delayed response or timeout of the request is now handled gracefully.
Fixed Versions:
21.0.0.2
2198661-1 : Resource administrator not working as expected
Links to More Info: BT2198661
Component: TMOS
Symptoms:
The resource administrator user role is not working as expected
Conditions:
NA
Impact:
Unexpected behaviour
Workaround:
None
Fix:
Resource administrator user is now working as expected.
Fixed Versions:
21.0.0.2
2197377-1 : TMM crashes under specific traffic.
Component: Global Traffic Manager (DNS)
Symptoms:
The TMM crashes when handling a specific traffic.
Conditions:
A virtual with a DNS resolver or validating cache is configured.
Impact:
Traffic is interrupted as TMM restarts.
Fix:
TMM is now handling traffic as expected.
Fixed Versions:
21.0.0.1
2197173-1 : Insufficient sanitization in SNMP configuration
Component: TMOS
Symptoms:
SNMP configuration is not sanitizing input properly.
Conditions:
NA
Impact:
It can lead to unexpected behaviour.
Workaround:
Restrict SNMP access to localhost.
Fix:
SNMP configuration is now properly sanitizing the inputs.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2196761-1 : TMM core found while doing DAG and SP DAG related tests
Component: TMOS
Symptoms:
TMM crashes and restarts.
Conditions:
In an F5OS multi-slot tenant environment, during boot-up after a tmsh reboot slot all or upgrading to a new volume, a switch of the primary slot can occur between the slots due to slot readiness states. If tmm sends a shared_random_data message before receiving the updated primary slot ID from mcpd, it might use the previous primary slot ID, resulting in a data mismatch and causing tmm to crash and restart.
Note: This issue occurs very rarely as it depends on a race condition.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None.
Fix:
The issue has been fixed by skipping the setting of shared random data when this race condition occurs. The operation will be retried after TMM receives the primary slot change notification.
Fixed Versions:
21.0.0.2
2190373-1 : Platform_agent core found while tmstats updation.
Links to More Info: BT2190373
Component: F5OS Messaging Agent
Symptoms:
Platform agent crashes and restarts.
Conditions:
-- VELOS platforms with BX510 blades
-- Platform agent startup
Impact:
Platform agent crashes and successfully restarts. No functionality impact.
Workaround:
None.
Fix:
Issue fixed so that stats updation happens correctly without crashing, variable properly managed.
Fixed Versions:
21.0.0.2, 17.5.1.3
2187529-3 : CVE-2025-12818: postgresql: libpq undersizes allocations, via integer wraparound
Component: TMOS
Symptoms:
A vulnerability has been identified in PostgreSQL’s libpq client library, where integer wraparound in several allocation-size calculations allows a peer or input provider to cause an undersized buffer and then write out-of-bounds by hundreds of megabytes. This can lead to a client application segmentation fault or crash when using libpq to connect to a PostgreSQL server.
Conditions:
A client application using a vulnerable libpq version connects to a malicious or compromised PostgreSQL server that sends crafted responses triggering integer wraparound during memory allocation.
Impact:
It can cause out-of-bounds memory writes, leading to a client application crash or segmentation fault (denial of service).
Workaround:
Upgrade to a patched libpq/PostgreSQL client version and avoid connecting to untrusted or compromised PostgreSQL servers.
Fix:
Upgrade to a patched libpq/PostgreSQL client version and avoid connections to untrusted or compromised PostgreSQL servers.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2187385-3 : Brute force set to CAPTCHA also raises a violation and blocks traffic
Links to More Info: BT2187385
Component: Application Security Manager
Symptoms:
Brute force is raised, but the config is set to CAPTCHA. Brute force contributes to the violation rating, and traffic is blocked by the violation rating, instead of triggering a CAPTCHA.
Conditions:
Brute force and violation Rating threat detected are both enabled.
Impact:
CAPTCHA does not occur as expected.
Workaround:
None
Fixed Versions:
21.0.0.2
2187365 : BIG-IP v21.0.0 VE or F5OS tenant remains INOPERATIVE after cold boot
Links to More Info: BT2187365
Component: TMOS
Symptoms:
BIG-IP VE or F5OS tenant fails to reach an operational state after cold boot. For example, after stopping and starting the VM, or power cycling the rSeries appliance.
A message similar to the following is observed in /var/log/ltm:
err mcpd[983]: 01070596:3: An unexpected failure has occurred, Can't load structure (global_sync_status.sync_status) status:52 transaction: 2, status: 52 - EdbStructData.cpp, line 39, exiting...
Conditions:
- BIG-IP VE or F5OS tenant running TMOS v21.0.0
- Cold boot of the BIG-IP VE or F5OS tenant
- First startup of the BIG-IP VE or F5OS tenant ("cold boot")
Impact:
- MCPD starts but never becomes ready; the system remains INOPERATIVE
- ecmd CPU utilization is elevated
- Configuration management and control-plane services are unavailable due to MCPD not becoming ready
- High CPU utilization by ecmd can impact overall system stability and resource availability
Workaround:
From bash, delete the /var/db/mcpdb.bin and /var/db/mcpd.info files and reboot the BIG-IP VE or F5OS tenant:
rm -fv /var/db/mcpdb.bin /var/db/mcpdb.info
reboot
MCPD will perform a full configuration load on the next startup and the system will return to operation.
Note: In some cases the workaround may need to be applied more than once before a successful startup and configuration load will occur.
Fixed Versions:
21.0.0.1
2187185-1 : BIG-IP v21.0 REST framework incorrectly processes Content-Range in HTTP GET requests
Links to More Info: BT2187185
Component: Device Management
Symptoms:
On BIG-IP v21.0, REST-based file download requests may fail with errors such as “attempt to read past end of file” when the client includes a Content-Range header in an HTTP GET request. This occurs when the specified byte range exceeds the actual size of the requested file.
The failure is triggered by the BIG-IP REST framework incorrectly attempting to process the Content-Range header for GET requests, resulting in an invalid file offset calculation and an EOF read condition. As a result, the REST request is terminated and the file download does not complete.
Conditions:
HTTP GET request includes a Content-Range header
The byte range specified in Content-Range exceeds the actual size of the requested file
Impact:
REST-based file downloads fail unexpectedly
Workaround:
Determine the actual size of the target file and ensure that any Content-Range header sent by the client specifies a byte range that does not exceed the file length.
Alternatively, remove the Content-Range header entirely from HTTP GET requests, as it is not required and may cause request failures.
Fixed Versions:
21.0.0.2
2186897-3 : TMM core SIGSEVG upon replacing L7 DOS policy
Links to More Info: BT2186897
Component: Anomaly Detection Services
Symptoms:
On rare cases of expired connection, tmm can crash.
Conditions:
BADOS L7 configured
Replacing DOS policy under traffic
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
TMM does not crash upon replacing L7 DOS policy.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2186697-5 : BIG-IP REST Improvements
Component: Device Management
Symptoms:
BIG-IP REST is not following best practices
Conditions:
NA
Impact:
BIG-IP GUI can behave unexpectedly.
Workaround:
None
Fix:
BIG-IP REST is following best practices and GUI is working as expected.
Fixed Versions:
21.0.0.2
2186153-6 : CVE-2025-8194 cpython: Cpython infinite loop when parsing a tarfile
Component: TMOS
Symptoms:
A flaw was found in the Python tarfile module. Processing a specially crafted tar archive, specifically an archive with negative offsets, can cause an infinite loop and deadlock. This issue results in a denial of service in the Python application using the tarfile module.
Conditions:
The application uses the Python tarfile module to process an attacker-supplied malicious tar archive containing negative offsets.
Impact:
It can cause an infinite loop leading to application hang or denial of service.
Workaround:
Update to a patched Python version and avoid processing untrusted tar archives, or validate archives before extraction
Fix:
Upgrade to a Python version that includes the tarfile module fix for this issue.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2186009-2 : Increased TX IQ size for netvsc
Links to More Info: BT2186009
Component: TMOS
Symptoms:
In some environments, during periods of high traffic, messages could build up in the TX internal queue due to xnet-DPDK being slow to inform that messages were sent. If this goes for long enough, the internal queue will fill up and become stuck.
Conditions:
1) Using xnet-DPDK driver
2) Azure or Hyper-V
3) Sustained high (multi-GB/s) traffic rate
Impact:
Internal queue gets stuck preventing BIG-IP from being able to send messages and causing traffic disruption.
Workaround:
Create '/config/tmm_init.tcl' and add the following line
ndal tx_iq_sz 1024 f5f5:f550
Afterwards, restart tmm with 'bigstart restart tmm' to apply change.
Fix:
Increased default size of TX IQ when netvsc driver is being used
Fixed Versions:
21.0.0.2
2185485-1 : The value of /proc/sys/vm/min_free_kbytes might be too big on Hyper-V and Azure VEs with multiple cores and multiple NICs★
Links to More Info: BT2185485
Component: TMOS
Symptoms:
After a software upgrade to one of the affected versions, the value of /proc/sys/vm/min_free_kbytes might too big on Hyper-V and Azure VEs with multiple cores and multiple NICs.
This can prevent the Virtual Edition from booting into the new software volume installed with one of the affected versions.
Conditions:
BIG-IP VE running on Hyper-V hypervisor or on Azure with:
- more than 4 cores and more than 4 NICs configured
- 16GB of RAM or less allocated
Attempt to upgrade to one of the affected versions.
Impact:
After an upgrade to one of the affected versions, the BIG-IP VE boot process hangs, or the VE takes hours to boot into the new volume and is so slow to result unusable.
Workaround:
There are two possible workarounds:
(1)
Before booting into the new volume, shutdown the VE and increase the total allocated RAM to 32GB.
(2)
- Install the new software volume.
- Take note of the current value <KBYTES> of /proc/sys/vm/min_free_kbyte :
# cat /proc/sys/vm/min_free_kbyte
- Before rebooting into the new software volume, mount the "vg--db--vda-set.<N>.root" disk volume on a temporary directory, where <N> is the number of the new volume after the dot.
E.G.: if the new volume is "HD1.2", then <N> is 2.
# mkdir /mnt/temp
# mount /dev/mapper/vg--db--vda-set.<N>.root /mnt/temp/
- Edit the /etc/rc.sysinit.f5 file:
# vi /mnt/temp/etc/rc.sysinit.f5
- Replace this line:
echo $VADC_MIN_FREE_KB > /proc/sys/vm/min_free_kbytes
with this line (use the <KBYTES> value noted before):
echo <KBYTES> > /proc/sys/vm/min_free_kbytes
- Unmount the disk volume:
# umount /mnt/temp/
- Reboot into the new software volume
Fixed Versions:
21.0.0.2
2184897-2 : Tenant disk size modification is ineffective for var/log folder
Links to More Info: BT2184897
Component: TMOS
Symptoms:
Due to insufficient free disk space on the VM, the /var/log resize operation could not be applied on reboot.
Conditions:
When available disk space on the VM is insufficient for the requested directory resizing.
Impact:
You will not know if resizing will succeed/fail ahead of time.
Workaround:
Manually calculate and allocate disk space within the range of available disk space.
Fix:
Improved validation has been added for directory resize operations. If the available disk space is less than the requested size, the command now fails immediately with a clear error message, allowing users to identify resize issues at the time of requesting.
Fixed Versions:
21.0.0.1, 17.5.1.3, 17.1.3.1
2183705-1 : Improper access control on SMTP
Links to More Info: K000156643, BT2183705
Component: Application Visibility and Reporting
Symptoms:
Security best practices are not being followed for SMTP in BIGIP.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
Security best practices are being followed.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2183353-4 : TMM Intel E810 VF driver updates the link state with 1 second delay
Links to More Info: BT2183353
Component: Local Traffic Manager
Symptoms:
TMM gets the old link state from the driver level. It leads to 1 second delay for the link state change.
The problem may also create link flapping messages in /var/log/ltm for the same interface in some conditions:
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is UP
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.2 is DOWN
Sep 17 15:02:22 notice mcpd[7553]: 01b5004a:5: Link: 1.8 is UP
Conditions:
- The interface link state is changed.
- Multiple VFs of the same physical interface are attached to BIG-IP VE.
Impact:
Link state is updated with a delay.
Workaround:
None
Fix:
TMM correctly get the link state from the driver layer.
Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1
2182357-3 : Inconsistent Default Source Address Selection for Virtual Server Between POST and PUT Requests
Component: TMOS
Symptoms:
When a PUT request is made without specifying a source address, the system defaults to an IPv6 address (::). If the destination address is IPv4, this causes a validation error due to the mismatch between the source and destination address types.
Conditions:
A PUT request issued without a source address, having the destination address IPv4
The system attempts to apply a default IPv6 source address
Impact:
The request fails with an address type mismatch error, requiring users to specify a compatible source address. This inconsistency between POST and PUT operations may cause confusion for users.
Workaround:
Explicitly specify a source address that matches the type (IPv4 or IPv6) of the destination address in the request payload.
Fix:
The behavior of PUT requests has been updated to match that of POST requests. If a source address is not specified, the system now selects an appropriate default (IPv4 or IPv6) based on the destination address, ensuring consistency and avoiding address type mismatch errors.
Fixed Versions:
21.0.0.2
2182045-3 : The iavf driver might drop some IPv6 packets that contain destination option or routing type 2 headers
Links to More Info: BT2182045
Component: Local Traffic Manager
Symptoms:
Some IPv6 packets that contain a destination option header and/or a routing type 2 header are processed by the BIG-IP.
A tcpdump on the BIG-IP does not show the packets.
The tmm/xnet_rx_stats:cd_empty stat is incremented
The tmm/xnet/iavf/per_q_stats:rx_sw_drop might be incremented.
Conditions:
A platform that utilizes the iavf driver:
R2800
R4800
VE with SR-IOV with an Intel 810 NIC
IPv6 traffic is sent to the BIG-IP that contains a destination option or routing type 2 header.
Impact:
Packets are dropped and not processed.
Workaround:
None
Fixed Versions:
21.0.0.2, 17.1.3.1
2179729-1 : MCPD memory leaks during repetitive configuration create/modify/delete cycles combined with ongoing config-sync activity.
Links to More Info: BT2179729
Component: TMOS
Symptoms:
The eXtremeDB configuration database grows continuously over time in long‑duration testing, even when objects are deleted.
Conditions:
-- Long duration run with create, modify, delete configuration objects.
-- High Availability (HA) enabled
Impact:
MCPD memory becomes very large on lab HA devices.
Workaround:
None
Fixed Versions:
21.0.0.1
2173429-2 : Digest and NTLM Authorizations Not Functioning
Component: Application Security Manager
Symptoms:
-- Bruteforce violations are not raised for NTLM or Digest authorization types.
Conditions:
-- Bruteforce with NTLM or Digest authorization enabled
Impact:
-- Bruteforce enforcement is not happening for Digest and NTLM Authorization types
Workaround:
None
Fix:
Digest and NTLM authorizations work as expected
Fixed Versions:
21.0.0.2
2171845-3 : Manual Sync in Sync-Failover device group may result in differences in attached Logging Profiles on virtual server
Links to More Info: BT2171845
Component: TMOS
Symptoms:
Devices show "In Sync" but have different logging profiles attached to the same Virtual Server.
Conditions:
- Manual with Incremental sync or Manual with Full sync in sync and overwrite scenario
Impact:
Discrepancy in attached logging profiles on the Virtual Server across HA devices.
Workaround:
Manually align logging profiles
Fixed Versions:
21.0.0.2
2163777-3 : Tmm core on fw_nat_classify() while nat rule configuration is being changed
Links to More Info: BT2163777
Component: Advanced Firewall Manager
Symptoms:
TMM may crash with a segmentation fault in fw_nat_classify() during NAT rule configuration changes, causing service disruption.
Conditions:
Occurs during NAT rule delete configuration modification
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0.2
2163585-1 : Migration fails "Spanning Tree Protocol (STP) is not supported on this platform"
Links to More Info: BT2163585
Component: TMOS
Symptoms:
Migration fails due to "Spanning Tree Protocol (STP) is not supported on this platform".
STP is a configuration for physical interfaces; F5OS tenants use interfaces/vlans defined in the F5OS underlying operating system.
Conditions:
migration to F5OS tenant from bare-metal BIG-IP with STP configured (e.g. from iSeries bare-metal to F5OS tenant).
Impact:
migration fails with:
010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
Unexpected Error: Loading configuration process failed.
/var/log/ltm shows:
Dec 2 13:55:11 localhost.localdomain err mcpd[7147]: 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
...
Dec 2 13:55:14 localhost. localdomain err mcpd[7147]: 01070686:3: Spanning Tree Protocol (STP) is not supported on this platform.
Dec 2 13:55:14 localhost.localdomain err tmsh[20673]: 01420006:3: Loading configuration process failed.
Dec 2 13:55:14 localhost.localdomain emerg load_config_files[20656]: "/usr/bin/tmsh -n -g -a load sys config partitions all platform-migrate" - failed. -- Loading schema version: <BIG-IP-version>
Workaround:
Modify the "net stp-globals" object to not contain "mode" stp/mstp/rstp
Fix:
STP configuration is removed during the migration to F5OS tenant.
Fixed Versions:
21.0.0.1
2162937 : TMM crash when AFM is enabled
Links to More Info: BT2162937
Component: Advanced Firewall Manager
Symptoms:
The BIG-IP system experiences repeated TMM crashes when handling DNS DoS traffic.
Conditions:
This issue occurs on BIG-IP AFM version 21.0.0 with DNS DoS
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fix:
Handled malformed packets.
Fixed Versions:
21.0.0.1
2162905-2 : AFM GUI does not display Port List members in Properties panel
Links to More Info: BT2162905
Component: Advanced Firewall Manager
Symptoms:
AFM GUI fails to display port-list members in the Properties pane
Conditions:
Occurs when viewing any Port List object in the AFM Policy Editor GUI
Impact:
Administrators cannot visually verify port-list contents in the GUI
Workaround:
Tmsh list security firewall port-list <port_list_name>
Fixed Versions:
21.0.0.1, 17.5.1.4
2162849-2 : Removing the active controller does not trigger an immediate tenant failover
Links to More Info: BT2162849
Component: TMOS
Symptoms:
When a system controller is removed from a VELOS chassis, any Active BIG-IP tenants running from that controller do not automatically fail over.
Conditions:
-- BIG-IP Tenant is active for a traffic group
-- The BIG-IP tenant is running on a controller that is active for the partition on which the tenant is running
-- The Active system controller is removed or powered off using AOM
Impact:
Tenant failover is delayed by up to 4 minutes when an active system controller of the active tenant is pulled out .
Workaround:
None
Fixed Versions:
21.0.0.1, 17.5.1.4
2162705-2 : Tmm restarting on multi-NUMA AWS instances with ENA interfaces★
Links to More Info: BT2162705
Component: Local Traffic Manager
Symptoms:
Tmm is in the restart loop because dpdk driver is failing to attach with the error message in tmm log:
notice dpdk: [0000:00:06.0]: Multiple NUMA nodes usage is unsupported.
Conditions:
- BIG-IP VE large instance deployed on AWS cloud.
- NUMA node count more than 1 (check "lscpu | grep NUMA").
Impact:
Unable to use dpdk driver on some large AWS instances.
Workaround:
Switch to sock driver: https://my.f5.com/manage/s/article/K10142141
Fix:
DPDK correctly initializes the memory on multi-NUMA AWS instances.
Fixed Versions:
21.0.0.1, 17.5.1.4
2162589-1 : BD crash with a specific configuration
Component: Application Security Manager
Symptoms:
BD daemon crash and restart
Conditions:
Navigation parameter is configured
Impact:
traffic disturbance, failover.
Workaround:
Remove navigation parameter from the configuration.
Fix:
BD working properly.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2162189-3 : "Live Update" reinstalls the genesis ASU file, while the latest ASU file is installed manually★
Links to More Info: BT2162189
Component: Application Security Manager
Symptoms:
When operating in automatic mode, Live Update installs the genesis Automatic Signature Update (ASU) file instead of the manually installed latest ASU file.
Conditions:
Live Update is operating in automatic mode, there are only 2 installations in ASU files installations list, one is genesis file and another is latest ASU file that was published on ESDM.
Impact:
BIG-IP will not install the latest signatures.
Workaround:
Live Update should be switched to manual mode. The latest ASU file should be installed manually again instead of the genesis ASU file. When the newer ASU file is available on ESDM, do not install it manually, but switch Live Update to automatic mode again.
Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1
2161077-2 : Bot profile properties page does not load when there are large number of SSL certs (> 1000)
Links to More Info: BT2161077
Component: TMOS
Symptoms:
When a large number of SSL certs are present, the Bot Defense profile properties page (Security > Bot Defense > Bot Profile Properties) does not load correctly
Conditions:
- ASM is provisioned
- SSL cert count > 1000
Impact:
Bot Defense profile properties page does not load
Workaround:
Use tmsh to manage the Bot profiles.
Fix:
Increase restjavad memory to 1.3GB after applying the fix and restart restjavad
> tmsh modify sys db provision.restjavad.extramb value 1280
> bigstart restart restjavad
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2161073-1 : Certificate Bundle Improvement
Component: TMOS
Symptoms:
Certificate Bundle is not following best practices
Conditions:
NA
Impact:
Can lead to unexpected behaviour.
Workaround:
No workaround.
Fix:
Certificate bundle is now following best practices
Fixed Versions:
21.0.0.2
2153893-4 : With DNS64 configured, resolution aborts early on the first error response without trying other name servers.
Links to More Info: BT2153893
Component: Global Traffic Manager (DNS)
Symptoms:
When multiple name servers for a zone are known, as soon as one name server responds with an error rcode, resolution is aborted and other name server are not tried.
Conditions:
-- DNS64 is configured.
-- More than one name server is configured for a zone.
-- One name server responds with an error rcode.
Impact:
DNS resolution will intermittently fail. DNS resolution will succeed only if the cache randomly selects a working name server to contact first.
Workaround:
Disable DNS64.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2153489-1 : MCPD crash in FolderMgr::validate_deleted_folder_queue due to race condition clearing folder_delete_queue mid-iteration (v21)
Links to More Info: BT2153489
Component: TMOS
Symptoms:
-- System crashes with a segmentation fault during folder deletion operations.
-- Core dump observed in FolderMgr::validate_deleted_folder_queue.
Conditions:
Concurrent Operations
Thread 1 is performing a folder deletion and iterating over folder_delete_queue in FolderMgr::validate_deleted_folder_queue.
Thread 2 is processing a virtual server query and calls AuthZ::current_context (setter), which invokes FolderMgr::reset_deleted_folder_queue().
Impact:
Traffic and management disrupted while mcpd restarts.
Workaround:
None
Fixed Versions:
21.0.0.1
2152877-3 : Exclude /opt/CrowdStrike directory from Integrity Test
Links to More Info: BT2152877
Component: TMOS
Symptoms:
CrowdStrike directory needs to be excluded from Integrity Test
Conditions:
CrowdStrike directory not present in Integrity Test exception list
Impact:
System integrity fails after Crowdstrike installation via falcon sensor
Workaround:
None
Fix:
CrowdStrike directory added Integrity Test exclusion
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2152785-1 : TMM may crash under certain conditions.
Component: Local Traffic Manager
Symptoms:
TMM crashes when HTTP/2 traffic
Conditions:
When HTTP/2 profile is configured on TMM.
Impact:
Traffic is disrupted
Workaround:
Add http router to the virtual, converting to HTTP/2 Full Proxy mode from HTTP/2 Gateway mode.
Fix:
TMM handling HTTP/2 traffic properly
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2152689-3 : ASM GUI "Failed to load requests" pop-up
Links to More Info: BT2152689
Component: Application Security Manager
Symptoms:
A "Failed to load requests" pop-up appears on the page.
REST framework responds with:
{"code":400,"message":"A valid filename must be supplied"}
This is visible in the log of the web browser's interaction with the BIG-IP UI (.har file).
Conditions:
A user with username that contains a slash i.e. "my\name"
clicking
on Security -> Event Logs -> Application -> Requests
or Security -> Event Logs -> Bot Defense -> Bot Requests
Impact:
Can't view request details
Workaround:
Do not use '/' in the username
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2152601 : Repeated restarts of the MCPD service result in a continuous restart loop accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events
Links to More Info: BT2152601
Component: TMOS
Symptoms:
Continuous restart of MCPD accompanied by error messages: An unexpected failure has occurred, MCO_ERR_EV_SYN - Synchronous events.
Conditions:
This occurs after 10 restarts of MCPD service.
Impact:
BIGIP services are impacted as MCPD is down.
Workaround:
Reboot device.
Fix:
This issue is fixed by cleaning up the resource during every MCPD restart.
Fixed Versions:
21.0.0.1
2152445-3 : "Live Update" API is unresponsive after upgrade and recover only after tomcat restart★
Links to More Info: BT2152445
Component: Application Security Manager
Symptoms:
After upgrading BIG-IP, the Live Update GUI displays an empty installation list. Errors are logged in the Tomcat log file. When attempting to refresh the Live Update page, additional errors appear in the Live Update log file.
Conditions:
"Live Update" has very long list of installations of ASU files.
Impact:
After the upgrade, BIG-IP retains the latest signatures that were present before the upgrade. The Live Update feature becomes non-functional until it is restarted.
Workaround:
Before upgrading, shorten ASU file installations by removing old entries. This helps prevent issues. If a problem occurs, restart the Live Update system.
Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1
2152397-1 : BIG-IP support for f5optics packages built after October 2025★
Component: TMOS
Symptoms:
-- F5optics v1.0.0 packages released in November 2025 (build 66.0) or later cannot be installed on BIG-IP or BIG-IQ versions released during November 2025 or earlier.
-- If F5optics v1.0.0 packages prior to build 67.0 (January 2026) are included in an Engineering Hotfix, the F5optics v1.0.0 package will not be upgraded successfully.
Conditions:
This may occur under the following conditions:
-- Attempting to install an updated f5optics v1.0.0 package build 66.0 (November 2025) or later, on a BIG-IP or BIG-IQ version released November 2025 or earlier.
-- Installing an Engineering Hotfix containing F5optics v1.0.0 package build 66.0 or earlier.
Impact:
-- You cannot install the latest f5optics v1.0.0 package.
-- You may not be able to update the f5optics v1.0.0 package when included in an Engineering Hotfix.
Workaround:
None
Fix:
F5optics v1.0.0 packages released in November 2025 (build 66.0) or later can now be successfully installed.
F5optics v1.0.0 packages released in January 2026 (build 67.0) or later can now be successfully installed via an Engineering Hotfix.
Behavior Change:
BIG-IP and BIG-IQ releases with this fix will not allow installation of f5optics v1.0.0 packages prior to build 66.0.
Fixed Versions:
21.0.0.2
2152301-2 : After upgrading from version 17.1.2 to 17.5.1.3, the guest-role user is unable to run the command show running-config in TMSH.★
Links to More Info: BT2152301
Component: TMOS
Symptoms:
Guest-role user is unable to run the command show running-config in TMSH.
Executing this command from TMSH results in an error:
"Unexpected Error: Can't display all items, can't get object count from mcpd"
MCPD throws error:
result_message "01070823:3: Read Access Denied: user (myguest) type (HPKE Key)"
Conditions:
Except for all these 4 user roles, all the other user roles (operator, cert manager, app editor...etc) hit the same error.
- admin
- resource-admin
- log-manager
- auditor
Impact:
Unable to show the running config, or use list or list sys commands.
Workaround:
Login with an account with admin access.
Fixed Versions:
21.0.0.2, 17.5.1.4
2152269-8 : Low reputation URIs are found in the URL DB binary
Links to More Info: BT2152269
Component: Access Policy Manager
Symptoms:
Publishing BIG-IQ image to Azure cloud is blocked due to malware scan detecting these low reputed URLs.
Conditions:
When uploading the image on Azure Cloud and these low reputed URLs are detected in malware scanners.
Impact:
No impact on the functionality
Workaround:
None.
Fix:
Low reputation URIs such as che168, cssplay, newliveplayer, tinypic.info referring test code are removed from the product.
Fixed Versions:
21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1
2152137-2 : New DB variable ve.ndal.driver.netvsc to provide driver selection for Azure/HyperV deployments
Component: TMOS
Symptoms:
Starting v17.5.0, data-plane interfaces in BIG-IP VE deployed in HyperV or Azure automatically use the high-speed, user-space "dpdk" as the default driver.
Conditions:
BIG-IP VE deployments on Microsoft Azure or HyperV with multiple interfaces.
Impact:
None
Workaround:
No mitigation needed as this is not a bug.
Fix:
The new DB variable ve.ndal.driver.netvsc is introduced to allow to switch the driver back to sock.
To switch to sock driver:
tmsh modify sys db ve.ndal.driver.netvsc value sock && reboot
To switch back to dpdk driver:
tmsh modify sys db ve.ndal.driver.netvsc value dpdk && reboot
Fixed Versions:
21.0.0.2
2150669-3 : TCP Packet loss after upgrade with AFM provisisoned★
Links to More Info: BT2150669
Component: Advanced Firewall Manager
Symptoms:
After an upgrade, disabled hardware DOS vectors may use old values.
Conditions:
-- F5OS tenant
-- Upgrade
-- AFM provisioned
Impact:
DOS thresholds may be incorrectly set or set too low resulting in packet loss that causes poor throughput.
Workaround:
Disable and re-enable the disabled DOS vectors.
Log into the BIG-IP GUI and navigate to
Security ›› DoS Protection : Device Protection
Filter attack vectors: tcp
click the "Network" text
Enable all the disabled vectors by clicking on the vector name and changing state from "disabled" to "mitigate".
Then disable the vectors by clicking on the vector name and changing state from "mitigate" to "disabled".
Fixed Versions:
21.0.0.2
2150525-1 : Improvements in iControl SOAP
Component: TMOS
Symptoms:
Security best practices were not being followed in iControl SOAP.
Conditions:
NA
Impact:
Can lead to unexpected behaviour.
Workaround:
NA
Fix:
iControl SOAP now has security best practices.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2149253-2 : QUIC connection stalls with early data
Links to More Info: BT2149253
Component: Local Traffic Manager
Symptoms:
When QUIC client connect with early data, connection stalled.
Conditions:
Configure virtual server with quic + client-ssl with Data 0-RTT enabled (w/ anti-replay).
QUIC client connects with existing session and early data.
Impact:
Failed QUIC/HTTP3 connections.
Workaround:
Disable client-ssl Data 0-RTT.
Fix:
Release SSL egress data.
Fixed Versions:
21.0.0.1
2149233-3 : TMM crashes when using SSL
Component: Local Traffic Manager
Symptoms:
Under certain SSL condition, TMM crashes.
Conditions:
When SSL is configured
Impact:
Traffic is disrupted.
Fix:
TMM working properly now.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2149197-1 : Rotated Public key used for signature verification of apmclients iso bundle in BIG-IP
Component: Access Policy Manager
Symptoms:
When liveinstall.checksig sys db variable is enabled on the BIG-IP, the automatic installation of apmclients iso image fails.
Conditions:
Starting from apmclients-7262.2025.1203.525-7005.0.iso the automatic installation will fail.
Impact:
Apmclients iso installation fails.
Workaround:
-- Disable ISO Signature Verification
-- Install the desired apmclients iso version
-- Re-enable ISO Signature Verification
Fix:
Apmclients iso installation will be successful.
Fixed Versions:
21.0.0.2
2144521-1 : WAF plugin gets incorrect response body when SSE profile is configured on virtual server
Links to More Info: BT2144521
Component: Local Traffic Manager
Symptoms:
When the SSE plugin is enabled, the WAF plugin receives a partial response body.
Conditions:
SSE Profile (Server Sent Events) and WAF plugin enabled on a Virtual Server.
Impact:
WAF plugin sees only part of the ingress stream.
Workaround:
Disable SSE profile on virtual server when WAF plugin is configured.
Fix:
The HUDFILTER order on server side was adjusted to ensure both WAF plugin and SSE HUDFILTER receive the complete response body.
Fixed Versions:
21.0.0.1
2144513-1 : Cannot install any BIG-IP version with ISO signature verification enabled★
Links to More Info: BT2144513
Component: TMOS
Symptoms:
On affected versions of BIG-IP, if the BIG-IP software ISO file signature checking feature is enabled, attempting to install any BIG-IP version will fail.
Attempting to install the BIG-IP image using either tmsh or the GUI will result in the following error messages (as shown by the "tmsh show /sys software status" command, or hovering a mouse over the "Failed" Install Status message in the GUI):
failed (Signature verification failed - no sig file found)
Conditions:
This occurs on affected versions if the BIG-IP software ISO file signature checking feature is enabled, as described in the following article:
K15225: Enabling signature verification for BIG-IP and BIG-IQ ISO image files
https://my.f5.com/manage/s/article/K15225
Impact:
It is not possible to install any BIG-IP version with the BIG-IP software ISO file signature checking feature enabled.
Workaround:
To successfully install the desired BIG-IP version in such cases:
1. Disable ISO Signature Verification
2. Install the desired BIG-IP version
3. Re-enable ISO Signature Verification
Fix:
BIG-IP versions released on or after October 2025 can be successfully installed with the BIG-IP software ISO file signature checking feature enabled.
Fixed Versions:
21.0.0.1
2144497-2 : Mellanox driver timeouts and packet drops on Azure instances with high NIC count
Links to More Info: BT2144497
Component: TMOS
Symptoms:
On Azure instances with high interface count (6 or more) Mellanox linux kernel driver mlx5_core may fail to initialize the interface or attach it very slow. Another symptom of this problem: packets drops because of timeouts in Mellanox device queue processing.
mlx_core will report multiple errors in the kernel logs (run "dmesg | grep mlx5_core" to display it).
Conditions:
- BIG-IP VE instance deployed in Azure with 6 or more interfaces
- Accelerated networking is enabled
Impact:
- Azure instance starting time may be significant
- SSH access may be unavailable
- Packets drops on dataplane Mellanox interfaces
Workaround:
None
Fix:
Device interrupts are assigned on correct vCPUs in Azure/HyperV environments to prevent Mellanox device timeouts.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2144445-1 : Insufficient sanitization in TMSH
Component: TMOS
Symptoms:
TMSH is not sanitizing input properly
Conditions:
NA
Impact:
Can cause unexpected behaviour in TMSH
Fix:
TMSH is now properly sanitizing the input.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2144353-4 : BIND upgrade to stable version 9.18.41
Links to More Info: BT2144353
Component: Global Traffic Manager (DNS)
Symptoms:
BIND upgrade to stable version 9.18.41.
Conditions:
Using local BIND.
Impact:
BIND upgrade to stable version 9.18.41.
Workaround:
None.
Fix:
BIND upgrade to stable version 9.18.41.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2143305-5 : Tmm crash
Links to More Info: BT2143305
Component: Application Security Manager
Symptoms:
TMM may crash when a policy dynamically disables and re-enables L7 DoS through multiple rules.
Conditions:
-- A policy containing multiple rules that disable and then re-enable L7 DoS is attached to a virtual server.
-- An L7 DoS profile is attached to the same virtual server.
-- The policy rule that re-enables L7 DoS does not specify the from-profile attribute.
-- Traffic passes through tmm.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Modify the policy rules that enable L7 DoS to explicitly include the from-profile attribute referencing the attached DoS profile.
Fix:
Handle policy rules that enable L7 DoS without the from-profile attribute in cases where L7 DoS was previously disabled.
Fixed Versions:
21.0.0.1
2143165-3 : Oauth tokens are not shown in UI
Links to More Info: BT2143165
Component: Access Policy Manager
Symptoms:
Oauth tokens are not shown in UI
Conditions:
Access >> Overview >> OAuth Reports >> Tokens
Impact:
Oauth tokens are not visible
Workaround:
Use tmsh to see the Oauth Tokens:
"tmsh list / apm oauth token-details db-instance oauthdb"
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2143101-3 : SNMP Malfunctioning for IPI BL: Incorrect Statistics Reported
Links to More Info: BT2143101
Component: Advanced Firewall Manager
Symptoms:
The statistics counters retrieved via SNMP and tmctl do not reflect any increments for the corresponding blacklist category, despite packets being dropped and logged as expected.
Conditions:
Blacklist categories populated dynamically via feed lists or automatic updates.
Impact:
Inaccurate stats due to missing statistics.
Workaround:
None.
Fix:
When an IP address is dynamically blacklisted by IP Intelligence (IPI), packets from that source are dropped and logged as expected. The statistics counters for the relevant blacklist category viewed via SNMP or tmctl are also incremented.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2141305-2 : SSH Proxy Profile Properties page does not render
Links to More Info: BT2141305
Component: TMOS
Symptoms:
The 'Properties' button of a ssh proxy security profile does not correctly render the profile's page
Conditions:
- AFM provisioned
- Security ›› Protocol Security : Security Profiles : SSH Proxy : SSH
- Right-click on 'Properties' and open in new tab.
Impact:
You are unable to view the SSH Proxy security profile properties.
Workaround:
None
Fix:
SSH Proxy Profile Properties Page Rendering issue is fixed
Fixed Versions:
21.0.0.1
2141245-3 : Undisclosed traffic to TMM can lead to resource exhaustion
Component: Global Traffic Manager (DNS)
Symptoms:
Certain traffic sent to TMM is leading to resource exhaustion.
Conditions:
Undisclosed conditions
Impact:
TMM Resource exhaustion
Fix:
DNS LDNS API correction.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2141233-2 : Client authentication profile as "Request" in FIPS-CC mode causes connection termination without certificate★
Links to More Info: BT2141233
Component: Local Traffic Manager
Symptoms:
SSL handshakes timeout instead of finishing.
Conditions:
1. Clientssl profile configured with Client Authentication enabled with "Request" option
2. BIG-IP is in FIPS-CC mode
3. Client does not provide a certificate
or
1. Clientssl profile configured with Client Authentication enabled with "Ignore" option
2. BIG-IP is in FIPS-CC mode
3. Access Policy applied to the Virtual Server contains an OnDemand Cert Auth agent.
4. Client does not provide a certificate
Impact:
SSL handshakes do not finish but instead timeout.
Workaround:
Workaround 1:
Disable Client authentication.
Workaround 2:
Configure CRL on the Client SSL profile
Workaround 3:
Enable Client Certificate Constrained Delegation (c3d) feature on the SSL profiles(requires Server-SSL profile and this feature forges client cert to server upon cert request from app-server).
Fixed Versions:
21.0.0.1, 17.5.1.4
2141205-1 : Tpm-status returns: "System Integrity: Invalid" on BIG-IP versions released since October 2025
Links to More Info: BT2141205
Component: TMOS
Symptoms:
The 'tmsh run sys integrity status-check -a -v' or 'tpm-status' commands incorrectly report system integrity status as 'Invalid' even when the system software has not been modified.
Detailed output of the "tpm-status -v 3 -q" command includes the following messages:
A SIRR database is invalid.
/shared/lib/sirr/v1.0/SIRR validity: 1
/usr/lib/sirr/SIRR validity: 0
Conditions:
This occurs if all of the following conditions are true:
-- You are using one of the following BIG-IP software versions:
-- v17.5.1.4 or v17.1.3.1, or later v17.x releases.
-- Engineering Hotfixes built on or after October 15, 2025, based on BIG-IP software v17.5.1.3, v17.1.3, v16.1.6.1, v15.1.10.8 or later version, which contains an updated 'sirr-tmos' package in the Engineering Hotfix ISO.
-- You have installed one of the above software releases on one of the following TPM-supported BIG-IP platforms:
-- iSeries appliances
-- VIPRION B44xx blades (B4450, B4460)
Impact:
The integrity of the system boot components validated by the Trusted Platform Module (TPM) may not be correctly reported. The system integrity status shows Invalid, when the actual status may be Valid.
Workaround:
None.
Fix:
Trusted Platform Module (TPM) status now shows the correct system integrity status for supported releases and platforms.
Fixed Versions:
21.0.0.2
2141125-4 : Multicast traffic is dropped with incorrect VLAN tagging
Links to More Info: BT2141125
Component: Local Traffic Manager
Symptoms:
F5OS hardware platforms utilizing multicast routing and PIM across multiple VLAN interfaces may forward incoming multicast traffic to multiple outgoing VLAN interfaces with incorrect VLAN tagging. This behavior can lead to the successive addition of VLAN headers, resulting in a cascading accumulation of VLAN tags.
Conditions:
F5OS platforms configured with
- Multicast routing enabled.
- Configured with multicast protocols - PIM, OSPF etc.
- 2 or more VLAN interfaces present for outgoing multicast traffic path .i.e. minimum of 3 or more VLAN interfaces configured with multicast routing, so that if one interface has incoming multicast traffic, it goes through atleast 2 or more other VLAN interfaces.
Impact:
Multicast traffic dropped on VLAN interfaces receiving more than 1 VLAN tagging in the packet.
Workaround:
None.
Fixed Versions:
21.0.0.2
2141061-1 : iControl REST API Endpoints enhancements
Component: Local Traffic Manager
Symptoms:
iControl REST API endpoints were not following best practices
Conditions:
NA
Impact:
Can lead to arbitrary behaviour
Fix:
iControl REST API endpoints are now following best practices
Fixed Versions:
21.0.0.2
2140905-3 : System Integrity Test on VE is halting the whole system in FIPS mode
Links to More Info: BT2140905
Component: TMOS
Symptoms:
System Integrity Test on VE halts the whole system in FIPS mode
Conditions:
-- BIG-IP Virtual Edition
-- FIPS Mode enabled
-- Falcon sensor installed
Impact:
System integrity test fails and the system will not boot.
Workaround:
None
Fix:
System Integrity Test on VE will stop tmm in FIPS mode now and user can bigstart tmm start.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2140621-4 : CVE-2025-8677: Resource exhaustion via malformed DNSKEY handling
Links to More Info: K000157317, BT2140621
2140213-3 : Xnet-netvsc driver crash
Links to More Info: BT2140213
Component: TMOS
Symptoms:
TMM crashes due to lack of memory to configure subchannels needed for queues in DPDK which ultimately results in a NULL pointer exception.
The lack of memory occurs when the product of (number of TMMS)*(number of NICs) becomes very large due to memory footprint each TMM needs to operate so many NICs.
In /var/log/tmm:
notice hn_nvs_alloc_subchans(): nvs subch alloc failed: 0x2
notice hn_dev_configure(): subchannel configuration failed
notice Port5 dev_configure = -5
Conditions:
1) xnet-netvsc driver (HyperV or Azure)
2) (number of TMMs)*(number of NICs) is big; confirmed with 8 TMMs and 4 NICs on Azure F8s v2 instance.
Impact:
TMM goes into restart loop and never becomes Active, disrupting traffic.
Workaround:
A) Reduce the number of NICs in the environment
B) Reduce the number of TMMs by running the following and then restarting with 'bigstart restart tmm'
tmsh modify sys db provision.tmmcount value <tmm_count>
Fix:
Added handling when DPDK subchannel configuration errors occur
Fixed Versions:
21.0.0.2, 17.5.1.4
2139921-3 : Invalid Length PCRE Expression Was Allowed Through REST API
Links to More Info: BT2139921
Component: Application Security Manager
Symptoms:
The regex validation string for parameters is intended to be limited to a maximum length of 254 characters, but this validation was not enforced correctly via the REST API.
Conditions:
A lengthy PRCE expression is set for a parameter using the REST API
Impact:
ASM goes into a restart loop.
Workaround:
None
Fix:
PCRE Expression with invalid length is no longer allowed through REST API
Fixed Versions:
21.0.0.2
2139901-6 : Server-ssl profile "do-not-remove-without-replacement" is recreated
Links to More Info: BT2139901
Component: Application Security Manager
Symptoms:
A required profile for a deprecated service is recreated on restart, but not saved to bigip.conf
Conditions:
The "do-not-remove-without-replacement" profile is deleted and the bewaf daemon is restarted
Impact:
The profile is recreated, but not saved to bigip.conf without another user action.
Workaround:
"tmsh save sys config" can be run to save the active config to bigip.conf
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2138077-3 : SAML redirect signature validation fails when RelayState is present with want-detached-signature=true in BIG-IP APM 17.1.x
Links to More Info: BT2138077
Component: Access Policy Manager
Symptoms:
SAML authentication fails with errors such as “Invalid signature” or “Signature verification failed”
Conditions:
SAML SP is configured with:
is-authn-request-signed = true
sso-binding = http-redirect
want-detached-signature = true
A RelayState parameter is included in the SAML AuthnRequest.
Occurs on BIG-IP APM versions 17.1.x and above.
Impact:
End users are unable to log in using SSO due to authentication errors
Workaround:
Remove the RelayState parameter from the SAML AuthnRequest configuration, if possible.
This restores successful signature validation.
Example: remove relay-state from the SP AAA SAML object configuration.
Alternatively, use HTTP-POST binding instead of HTTP-Redirect.
There is no configuration-based workaround if RelayState is required and Redirect binding must be used.
Fixed Versions:
21.0.0.1
2137977-3 : Clicking on a policy in a virtual server's resource page navigates to the full policy list, instead of the specific policy★
Links to More Info: BT2137977
Component: TMOS
Symptoms:
The hyperlink for the policy on virtual server's resource page navigates to the incorrect location.
Conditions:
Virtual server with an ltm policy attached.
Impact:
The hyperlink navigates to the full policy list, so the specific policy would still need to be found in the full list to navigate to it.
Workaround:
None
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2137805-3 : Jetty vulnerabilities CVE-2023-36478, CVE-2024-6763, CVE-2023-26049, CVE-2024-8184, and CVE-2023-41900
Links to More Info: K000157844
2135621-1 : Poor TCP performance on Hyper-V non-accelerated deployments with Cisco VIC interfaces
Links to More Info: BT2135621
Component: Local Traffic Manager
Symptoms:
TCP retransmits occur on Hyper-V deployments with Cisco VIC networks (SR-IOV disabled).
The problem is related to large segments processing (TSO packets)
Conditions:
- Hyper-V VM with Network adapter on top of Cisco VIC interface
- SR-IOV is not enabled
- Virtual server uses TCP profile
Impact:
Poor TCP performance for virtual servers with TCP profile
Workaround:
- Disable TSO feature:
tmsh modify sys db tm.tcpsegmentationoffload value disable
- Other workaround is to switch to sock driver:
https://my.f5.com/manage/s/article/K000153024
Fixed Versions:
21.0.0.2
2132213-2 : Hyper-V/Azure: Unable to pass traffic with tagged vlans when using the default dpdk driver.
Links to More Info: BT2132213
Component: TMOS
Symptoms:
On a BIG-IP VE deployed in a HyperV or Azure environment, traffic passing fails with tagged VLAN interfaces
Conditions:
-- BIG-IP VE is deployed in Azure or HyperV environment and has DPDK driver in use for the dataplane interfaces.
-- User can check the driver in use by running "tmctl -d blade tmm/xnet/device_probed" table that should show them "dpdk" in the "driver_selected" column for their dataplane interfaces.
-- User has tagged VLANs configured.
Impact:
BIG-IP is unable to pass any data-plane traffic.
Workaround:
-- Switch to the default "sock" driver by running:
tmsh modify sys db ve.ndal.driver.netvsc value sock
-- For BIG-IP versions where the above dbvar is not available, the user can directly modify the /config/tmm_init.tcl file and set "sock" as the default driver for netvsc devices by adding this command:
>> cat tmm_init.tcl
device driver vendor_dev f5f5:f550 sock
Fix:
Unable to pass traffic with vlan tagging when using the default dpdk driver in HyperV or Azure environments.
Fixed Versions:
21.0.0.2
2131225-1 : Unclear Actions Displayed with L7 Profiles in Rule Creation
Links to More Info: BT2131225
Component: TMOS
Symptoms:
When creating a simple L7 profile and adding rules with specific actions (e.g., "Enable" + select "decompression" at "client accepted"), the actions are displayed unclearly with placeholders such as {{vm.getCapitalizedLabel(vm.action.action)}} instead of the expected action names.
Conditions:
Occurs when creating an L7 profile, adding a rule with custom options (e.g., "Match all of the following conditions: Enable + select decompression at client accepted"), and saving the rule.
Impact:
This issue confuses administrators, as it displays unclear placeholders instead of specific actions, potentially leading to misconfigurations and delayed troubleshooting.
Workaround:
Monitor release notes and timelines for the fixed version. Plan updates as per the release schedule to resolve the issue effectively.
Fix:
The issue is resolved by updating the actionText.controller.js file. The placeholders displaying {{vm.getCapitalizedLabel(vm.action.action)}} were replaced with the actual action labels. The fix is available in the patched version. Follow-up with support for patch application.
Fixed Versions:
21.0.0.1
2130485-4 : Warning: the current license is not valid - Fault code: 51133
Links to More Info: BT2130485
Component: TMOS
Symptoms:
License activation may fail on specific platforms.
root@(localhost)(cfg-sync Standalone)(NO LICENSE)(/Common)(tmos)# install sys license registration-key D1234-12345-12345-12345-1234567
Warning: the current license is not valid
License server has returned an exception.
Fault code: 51133
Fault text: Error 51133, F5 registration key is not compatible with the detected platform - This platform, "", cannot be activated with this registration key "I123456-1234567".
Conditions:
- KVM on HP AMD server
- IBM Bare Metal
Impact:
Unable to license BIG-IP.
Workaround:
None
Fix:
License activation is successful.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2125953-5 : Insufficient access control to REST endpoint and TMSH for some CLI versions.
Component: TMOS
Symptoms:
Security best practices are not followed for some CLI versions.
Conditions:
Not specified.
Impact:
Unexpected behaviour
Fix:
Security best practices are being followed.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2106789-1 : BIGIP LTM Monitors Hardening
Component: Global Traffic Manager (DNS)
Symptoms:
BIG-IP LTM External Monitors are not following the best security practices
Conditions:
When external montiors is configured
Impact:
Unexpected behaviour
Fix:
Best security practices are now applied
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2099441-2 : Garbled character in warning message when HA peer is added
Links to More Info: BT2099441
Component: TMOS
Symptoms:
Garbled character in warning message
Conditions:
When adding HA peer
Impact:
Unexpected behavior
Workaround:
None
Fixed Versions:
21.0.0.1
2086097-4 : PEM iRules causing traffic disruption
Component: Policy Enforcement Manager
Symptoms:
In some scenario, there is improper termination of connection and it is leading to TMM core
Conditions:
PEM iRules configured.
Impact:
TMM core. Service disruption.
Fix:
Connection is properly terminating and TMM is not coring.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2083257-3 : 502 error from BIG-IP during large AFM rule deployment
Component: TMOS
Symptoms:
Pushing large AFM rule sets from BIG-IQ to BIG-IP greatly increases response processing time, exceeding the default Apache HTTPD timeout and causing a 502 error on BIG-IQ.
Conditions:
Occurs when,
- AFM is provisioned on the device.
- The device has a large AFM rule set.
- BIG-IQ encounters a 502 error when communicating with BIG-IP.
Impact:
BIG-IQ receives a 502 error from BIG-IP when deploying AFM rules.
Workaround:
1. Apply the required sys db parameters:
modify sys db provision.extramb value 8192
modify sys db icrd.timeout value 600
modify sys db restjavad.timeout value 600
modify sys db restnoded.timeout value 600
modify sys db provision.restjavad.extramb value 4096
modify sys db provision.tomcat.extramb value 1024
2. Update and verify HTTPD timeout:
grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf
sed -i 's/^Timeout <timeoutValue>$/Timeout 900/' /etc/httpd/conf/httpd.conf
Example:
# grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf Timeout
300
# sed -i 's/^Timeout 300$/Timeout 900/' /etc/httpd/conf/httpd.conf
# grep -E '^Timeout[[:space:]]+[0-9]+' /etc/httpd/conf/httpd.conf Timeout
900
3. Restart HTTPD
bigstart restart httpd
Fix:
Added support for configuring the HTTPD request timeout via tmsh:
tmsh modify sys httpd request-timeout 900
Fixed Versions:
21.0.0.2
2078297-4 : Unexpected PVA traffic spike
Component: TMOS
Symptoms:
In rare circumstances, traffic may spike on the graphs inside the tenant without corresponding graphs on the external interfaces.
Conditions:
F5OS tenant
ePVA traffic
Impact:
Loss of connectivity,
extremely high PVA traffic spike
tcpdump on the appliance ceases to function
Workaround:
Disabling PVA acceleration on affected virtual servers
Fix:
PVA traffic not spiking.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2078277-2 : BD crash with an inappropriate configuration for request_max_chunks_number
Links to More Info: BT2078277
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
BD internal variable request_max_chunks_number has been configured with inappropriate value (above 200,000)
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
Revert request_max_chunks_number to the default value, 1000
Fixed Versions:
21.0.0.2
2077525-4 : Incomplete or missing IP Intelligence databases result in connection reset, high TMM CPU usage and/or TMM crash
Links to More Info: BT2077525
Component: Advanced Firewall Manager
Symptoms:
Both of the following messages are frequently (several times per second) logged to /var/log/tmm*:
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat
Heavy log file writing can result in a possible tmm SIGABRT due to a heartbeat failure.
Conditions:
ip-intelligence is configured, and both the IPv4 and IPv6 intelligence databases are missing. IP intelligence is a optional subscription feature that can be configured in various BIG-IP modules, such as AFM, ASM, and APM, and irules.
Impact:
A frequent log message might slow TMM.
This might result in TMM missing a heartbeat, which will trigger a tmm SIGABRT and resulting core. Traffic disrupted while tmm restarts.
Workaround:
Unconfigure ip-intelligence and remove any configuration that refers to IP reputation, or ensure that the ip-intelligence databases are available.
Fixed Versions:
21.0.0.1
2063265-6 : Improvements in HTTP headers
Component: TMOS
Symptoms:
Certain flags were missing from HTTP headers.
Conditions:
NA
Impact:
Can lead to unexpected behaviour
Fix:
Headers now have proper flags.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2053309-5 : Changes to README - mention of duojs.org URL
Links to More Info: BT2053309
Component: TMOS
Symptoms:
https://my.f5.com/s/article/K000156036
Conditions:
https://my.f5.com/s/article/K000156036
Impact:
https://my.f5.com/s/article/K000156036
Fix:
https://my.f5.com/s/article/K000156036
Fixed Versions:
21.0.0.2, 21.0.0, 17.5.1.2, 17.1.3, 16.1.6.1, 15.1.10.8
2047429-4 : PostgreSQL should dump a corefile when not exiting
Links to More Info: BT2047429
Component: TMOS
Symptoms:
When PostgreSQL does not exit gracefully, it does not create a core file.
Conditions:
PostgreSQL crashes.
Impact:
Diagnostic data missing.
Workaround:
None
Fixed Versions:
21.0.0.1
2046941-6 : Distributed Cloud-facing BIG-IP instance with bot-defense profile might block XC health monitor
Links to More Info: BT2046941
Component: Application Security Manager
Symptoms:
Bot-defense profile detects a Distributed Cloud health monitor as a bot, and might block it (depends on configuration).
Conditions:
-- Bot-defense profile is attached to a virtual server.
-- BIG-IP is configured in front of Distributed Cloud.
Impact:
Distributed Cloud health monitors are blocked, false-positive bots are detected and logs.
Workaround:
None
Fix:
Signature Category 'F5 Health Monitor' description added. New signature of category 'F5 Health Monitor' is included in latest Bot Signatures Live Update. While configuring BIG-IP device to work, user should make sure DNS resolvers are properly configured and reachable via data path
Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1
2038277-3 : Double memory release in the enforcer
Links to More Info: BT2038277
Component: Application Security Manager
Symptoms:
Possible bd cores due to ignore positional parameter configurations
Conditions:
Positional parameters configured with ignore value flag enabled.
Impact:
Error in logs, and possible crash and core. Traffic disrupted while bd restarts.
Workaround:
None
Fix:
No core and no errors.
Fixed Versions:
21.0.0.2
2035641-5 : APMd resource exhaustion
Component: TMOS
Symptoms:
Under certain conditions, APMd is exhausting resources leading to core.
Conditions:
Access sessions create, and sessions are processed
Impact:
APMd core may cause temporary traffic disruption.
Fix:
APMd not coring.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2034753-3 : Domain name validation does not align with the error message on GUI
Links to More Info: BT2034753
Component: Access Policy Manager
Symptoms:
Domain names which include hyphens are not accepted, an error message is shown on GUI.
Conditions:
Domain names with hyphens or forward slashes will cause this issue.
Impact:
BIG-IP administrator will not be able to update DNS Exclude/Include Fields in Network Access settings if they include hyphens/dashes.
Workaround:
None
Fix:
Update the mcp validation regex to allow hyphens and forward slashes.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
2017137-5 : Pkcs11d Crash Risk Due to Unbounded Label/Password Length from MCPd
Links to More Info: BT2017137
Component: Local Traffic Manager
Symptoms:
Unexpected behaviour or even a crash of pkcs11d
Conditions:
Configure the label/password values more than or equal to 32 characters.
Impact:
Configuring the label or password exceeding the allowed length, it could lead to memory corruption, unexpected behavior, or even a crash of the pkcs11d daemon.
Workaround:
Configure the values with 31 or fewer characters.
Fix:
The daemon now gracefully rejects inputs that exceed the length limit, logs an appropriate error, and exits the operation safely.
Fixed Versions:
21.0.0.1, 17.5.1.2, 17.1.3
2016465-2 : Policy auto merge does not work for Base64 Decoding
Links to More Info: BT2016465
Component: Application Security Manager
Symptoms:
If an entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.
Conditions:
An entity (Parameters, Cookies, Headers) in two policies have differing values for how to handle Base64 values (enabled, disabled, required), policy diff does not merge the values correctly.
Impact:
Expected changes may not be made to the merged policy resulting in unexpected Base64 value handling.
Workaround:
The values can be changed manually through GUI or REST.
Fix:
Policy Diff/Merge functions correctly for differing Base64 Decoding values.
Fixed Versions:
21.0.0.2
2008409-4 : MAC masquerade does not work on an F5OS tenant if there are no floating self-ips configured on the VLAN
Links to More Info: BT2008409
Component: F5OS Messaging Agent
Symptoms:
Network traffic fails on a VLAN that is shared by multiple tenants.
Conditions:
-- F5OS tenants sharing a VLAN
-- MAC masquerade enabled on both tenants
-- No floating self-ips configured
Impact:
MAC masquerade may not work properly causing traffic failures such as packets not arriving on the tenant. Or excessive DLFs on the network.
Workaround:
Add floating self-ips to all traffic VLANs that are using MAC masquerade.
Fixed Versions:
21.0.0.1
1991297-3 : [APD][SAML-SSO]high memory due to SAML SSO leak
Links to More Info: BT1991297
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic
Conditions:
SAML SSO configured with saml artifact sign.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
Fixed Versions:
21.0.0.1
1988993-4 : CVE-2024-42516 Apache HTTP Server vulnerability
Links to More Info: K000153074, BT1988993
1987309-4 : Bigd may get stuck in legacy mode
Links to More Info: BT1987309
Component: Local Traffic Manager
Symptoms:
Https monitors may spuriously mark a pool member as down and it will fail to mark the pool member back up.
The monitor remains in legacy mode, and probes are sent using TLS 1.0.
Conditions:
-- Server supports version TLSv1.2 and above.
-- bigd is configured to monitor the server with SSL.
-- The monitor flips into legacy mode.
Impact:
Bigd is stuck in legacy mode.
Workaround:
Bigd can be brought out of legacy mode by detaching and re-attaching monitor to the pool.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1983349-4 : CVE-2023-2454, CVE-2023-39417, CVE-2023-39418, CVE-2023-5868, CVE-2023-5869, CVE-2023-5870 PostgreSQL vulnerabilities
Links to More Info: K000152931, BT1983349
1983145-2 : Memory Corruption due to xnet-DPDK★
Links to More Info: K000153024, BT1983145
Component: TMOS
Symptoms:
TMM crashes due to data corruption caused by xnet-DPDK. This can occur after upgrading from version 17.5.0 to version 17.5.1.
Conditions:
1) Using xnet-DPDK driver
2) DPDK v20.11 is being used (BIG-IP v17.5.x or higher)
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Two possible workarounds here:
1. Disable TSO globally:
tmsh modify sys db tm.tcpsegmentationoffload value disable
2. Switch to the sock driver:
https://my.f5.com/manage/s/article/K000153024
Fixed Versions:
21.0.0.2
1975297-1 : TMM may fail to start up with max number of interfaces for Azure instances <= 16 vCPUs
Links to More Info: BT1975297
Component: TMOS
Symptoms:
There are "vmbus_open subchannel failed: -12" kernel errors for uio module, uio_hv_generic. These errors prevent the TMM module from finishing initialization.
Conditions:
-- Using VE Azure
-- Using Azure instances with <= 16 vCPUs
Impact:
Azure VM is unable to reach Active state.
Workaround:
Use an Azure instance with more RAM. For example, F8s_v2 has 16 GiB of RAM and has a total limit of 4 interfaces. Instance size, E8ds_v5, has 64 GiB of RAM and can reach Active state with 4 interfaces.
Fix:
N/A
Fixed Versions:
21.0.0.2
1974701-3 : PVA stats may be double incremented when pva mode is dedicated
Links to More Info: BT1974701
Component: TMOS
Symptoms:
Offloaded connections may be double counted for dedicated PVA flows.
Conditions:
PVA mode is set to dedicated in fastl4 profile.
Impact:
Incorrect stats.
Workaround:
None
Fix:
Offloaded dedicated PVA flows are counted once.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1967485-2 : Old Logs in /var/log Not Deleted When Storage Exceeds Threshold
Component: TMOS
Symptoms:
Logs for various modules are stored in the /var/log directory, with older files compressed into tar files over time. When the storage in /var/log exceeds the warning threshold, a cleanup mechanism is triggered to delete tar files and free up space for incoming logs. However, the cleanup process deletes newer tar files first, leaving the oldest tar files untouched.
Conditions:
This issue occurs when BIG-IP accumulates logs to the point where the /var/log directory surpasses the storage threshold.
Impact:
When the storage threshold is exceeded, BIG-IP initiates cleanup of tar files. However, tar files containing the oldest module logs are not deleted.
Workaround:
Use the command below to delete the old tar files available in /var/log/ directory
rm <tarFileName>
Fix:
A fix has been implemented to ensure that when the /var/log directory exceeds its storage threshold, all tar files, including those containing the oldest logs, are deleted during the cleanup process.
Fixed Versions:
21.0.0.2
1966633-3 : Non-eth0 management interface unbound after tmm restart on 17.5.0 in AWS★
Links to More Info: BT1966633
Component: TMOS
Symptoms:
Management connectivity is lost after licensing BIG-IP 17.5.0 on AWS. The parameter provision.managementeth was changed to non-eth0 interface during deployment with cloud-init. When the issue occurs, the mgmt bridge loses the associated interface ethX.
Conditions:
1. Deploy an instance on AWS.
2. Change provision.managementeth to non-eth0 device and reboot.
3. After boot up, any operation that restart tmm (i.e. licensing BIG-IP) will cause the issue.
Impact:
Management connectivity is lost to BIG-IP instance.
Workaround:
Reboot the device twice after licensing the device. One reboot will not resolve the issue.
Fixed Versions:
21.0.0.1, 17.5.1.4
1966405-1 : Changes to DNS cache resolver may cause service disruption on BIG-IP DNS v17.1.2.1★
Links to More Info: BT1966405
Component: Global Traffic Manager (DNS)
Symptoms:
All DNS PTR queries are forwarded to the configured forward zone. If any change is made to the local zones, such as adding a new local zone; the system begins responding to PTR queries with NXDOMAIN.
Conditions:
Occurs on BIG-IP DNS version 17.1.2 and above
Triggered when changes are made to local zones
Impact:
Queries respond with NXDOMAIN.
Workaround:
Restart tmm:
bigstart restart tmm
Fixed Versions:
21.0.0.1
1959549-2 : Upgrade to 17.5.0 or later overwrites #TMSH-VERSION in bigip_base.conf when source UCS is pre-17.5.0★
Links to More Info: BT1959549
Component: TMOS
Symptoms:
When upgrading from versions below 17.5.0 to 17.5.0 or later, the #TMSH-VERSION marker in bigip_base.conf is rewritten to the target system version instead of preserving the source UCS version. This prevents MCPD schema migration code from executing, potentially causing configuration mismatches and missing schema-based workarounds.
Conditions:
- roll-forward upgrade from v14.x/v15.x/v16.x/v17.1.x to v17.5.1 and later releases. upgrade from v17.5.x to v21.x and later versions is not affected.
Impact:
Overwriting TMSH-VERSION in bigip_base.conf file, uses the wrong schema when loading the configuration and miss applying MCP schema based workarounds.
Workaround:
None
Fixed Versions:
21.0.0.2, 17.5.1.4
1959361-2 : When running a tenant with more than 72 VCPUs / cores, adminstall crashes
Links to More Info: BT1959361
Component: Anomaly Detection Services
Symptoms:
When running a tenant with more than 72 VCPUs / cores, adminstall crashes.
Conditions:
When ASM provisioned and running a Tenant with more than 72 VCPUs / cores per blade.
Impact:
DOSL7 (BADOS) is not functioning. Core created.
Workaround:
None
Fix:
Now adminstall donot crash, when ASM provisioned and Tenant with more than 72 VCPUs / cores per blade.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1943269-1 : GTM Server can be deleted while referenced by GTM Pools
Links to More Info: BT1943269
Component: Global Traffic Manager (DNS)
Symptoms:
A GTM server object can be deleted even when it was referenced by GTM pools. Deleting the server will also remove it from the associated pool members without any warning.
Conditions:
Occurs when a GTM virtual server is referenced in one or more GTM pools.
Impact:
This may cause unexpected behavior or service disruption if the server is deleted while still in use.
Workaround:
None.
Fix:
A validation check has been added to prevent deletion of a GTM server that is referenced by GTM pools, and a warning is now displayed to the user. This behavior is controlled by the DB variable gtm.gtmserverdeletevalidation, which is disabled by default and must be enabled to enforce the deletion restriction.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1938101-5 : Performance issue on specific parameters extractions
Links to More Info: BT1938101
Component: Application Security Manager
Symptoms:
Performance degradation on specific pages
Conditions:
When there are dynamic parameters extractions using HTML and also AJAX response page enabled.
Impact:
Slowdown of the extraction page load time
Workaround:
None
Fixed Versions:
21.0.0.2
1934073-5 : PEM policy rule incorrectly matching when using a flow condition
Links to More Info: BT1934073
Component: Policy Enforcement Manager
Symptoms:
When a PEM policy rule is configured to match the destination IP address and port, the message might match the source IP and port instead.
Conditions:
PEM policy rule is using flow conditions to match IP address and port
Impact:
An incorrect policy rule might be matched
Workaround:
None
Fix:
The PEM policy rule now correctly matches the source and destination IP addresses and ports when the flow condition is used.
Fixed Versions:
21.0.0.1, 17.5.1.3, 17.1.3, 16.1.6.1
1933373-4 : Newly added Threat Campaigns are missing REST ID
Links to More Info: BT1933373
Component: Application Security Manager
Symptoms:
Newly created UTF-8 policies have an empty value for the REST ID (rest_uuid) in some or all Policy Threat Campaigns.
Conditions:
- Create a new UTF-8 policy using BIG-IP with no Threat Campaign license.
- License the Threat Campaign functionality.
- Create a second UTF-8 policy with the Threat Campaign enabled.
Impact:
Newly added Threat Campaigns are missing the REST ID.
Workaround:
- After license Threat Campaigns, the cached binary policy templates must be cleared to ensure newly created policies use updated templates reflecting the licensed Threat Campaign functionality.
Remove cached binary policy templates by running:
rm /var/ts/install/policy_templates/*.bin
- Threat Campaigns in new UTF-8 policy should have REST IDs.
Fix:
Fix newly created UTF-8 policies have value for REST ID (rest_uuid) in all Policy Threat Campaigns.
Fixed Versions:
21.0.0.2, 17.1.3.1
1933357-3 : DNS64 stats between cache resolver and TMM non-cache have inconsistent behavior.
Links to More Info: BT1933357
Component: Global Traffic Manager (DNS)
Symptoms:
DNS64 stats (tmstat table profile_dns_stat) in the TMM behave as follows:
dns64reqs - A queries to the server after the AAAA queries fail. Does not include the AAAA queries.
dns64fails - Failed AAAA queries to the server. Does not include the subsequent A queries.
DNS64 stats (tmstat table dns_cache_resolver_stat) in the cache behave as follows:
mesh.dns64reqs - Includes both A and AAAA queries to the server. Includes both successful and failed AAAA queries.
mesh.dns64nodata - Includes both A and AAAA query nodata responses (rcode=0 and no records).
mesh.dns64error - Includes both A and AAAA query error rcode responses.
mesh.dns64timeout - Includes both A and AAAA query timed-out responses.
Conditions:
-- A DNS resolver cache is enabled on a DNS profile.
-- The DNS profile has DNS64 configured.
Impact:
The current cache resolver stats makes it difficult to diagnose backend DNS64 performance.
Workaround:
None
Fix:
Mesh.dns64reqs behaves like the TMM's dns64reqs (counts only DNS64 A queries to the server.) Additionally, a new stat mesh.dns64fails sums all failures (mesh.dns64nodata, mesh.dns64error, mesh.dns64timeout) and, like the TMM, only counts DNS64 AAAA failures to the server.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1927521-2 : DPDK has dependency on SSSE3
Links to More Info: BT1927521
Component: TMOS
Symptoms:
TMM goes into restart loop with following error in /var/log/tmm regarding SSSE3 not being available
notice ERROR: This system does not support "SSSE3".
notice Please check that RTE_MACHINE is set correctly.
notice EAL: FATAL: unsupported cpu type.
notice EAL: unsupported cpu type.
notice dpdk: Error: rte_eal_init() failed, err=-1
notice xnet_lib [pci:0000:02:00.0]: Error: Failed to initialize driver
notice xnet[02:00.0]: Error: Unable to attach to xnet dev
notice xnet(1.1)[02:00.0]: Error: Unable to initialize device
notice xnet(1.1)[02:00.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
notice Initiating TMM shutdown.
notice tap(tap)[00:00.0]: Waiting for tmm1 to reach state 4...
notice ---------------------------------------------
Conditions:
1) xnet-DPDK is being used
2) BIG-IP running in an environment where SSSE3 is not available either because CPU is so old that it does not support SSSE3 or SSSE3 has been disabled in VM's config.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Modify guest VM's config on hypervisor and enable SSSE3 feature in CPU settings. Most CPUs should support SSSE3, but hypervisor may be masking off feature from virtual CPU for guest. For best performance in this and other areas such as crypto it may be best to not mask the real CPU feature set from the virtual CPU.
For Azure/Hyper-V see https://my.f5.com/manage/s/article/K000159028 and note link for processor compatibility mode.
Or:
Switch to 'sock' driver by adding the following line into /config/tmm_init.tcl, replacing <VENDOR_ID:DEVICE_ID> with the corresponding interfaces' Vendor and Device IDs shown via 'lspci -nn'.
For environments in HyperV or Azure, f5f5:f550 should be used for Vendor and Device.
[root@BIGIP:Active:Standalone] log # cat /config/tmm_init.tcl
device driver vendor_dev <VENDOR_ID:DEVICE_ID> sock
[root@BIGIP:Active:Standalone] log #
Fix:
Fallback from DPDK to sock driver if CPU feature 'SSSE3' is not exposed in virtual CPU.
Fixed Versions:
21.0.0.2
1925485 : CVE-2020-12655 kernel: sync of excessive duration via an XFS v5 image with crafted metadata
Component: TMOS
Symptoms:
An issue was discovered in xfs_agf_verify in fs/xfs/libxfs/xfs_alloc.c in the Linux kernel through 5.6.10. Attackers may trigger a sync of excessive duration via an XFS v5 image with crafted metadata, aka CID-d0c7feaf8767.
Conditions:
NA
Impact:
It can cause a kernel crash or hang, resulting in a denial of service.
Workaround:
NA
Fix:
Denial of Service issue in the kernel has been resolved.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1925369 : CVE-2018-10322 kernel: Invalid pointer dereference in xfs_ilock_attr_map_shared() when mounting crafted xfs image allowing denial of service
Component: TMOS
Symptoms:
The xfs_dinode_verify function in fs/xfs/libxfs/xfs_inode_buf.c in the Linux kernel through 4.16.3 allows local users to cause a denial of service (xfs_ilock_attr_map_shared invalid pointer dereference) via a crafted xfs image.
Conditions:
NA
Impact:
It can trigger a kernel panic, resulting in a denial of service.
Workaround:
NA
Fix:
The Denial of Service issue has been resolved in the kernel.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1925045 : CVE-2024-35849 - Linux Kernel Btrfs Information Leak Vulnerability
Component: TMOS
Symptoms:
In the Linux kernel, the following vulnerability has been resolved: btrfs: fix information leak in btrfs_ioctl_logical_to_ino() Syzbot reported the following information leak for in btrfs_ioctl_logical_to_ino(): BUG: KMSAN: kernel-infoleak in instrument_copy_to_user include/linux/instrumented.h:114 [inline] BUG: KMSAN: kernel-infoleak in _copy_to_user+0xbc/0x110 lib/usercopy.c:40 instrument_copy_to_user include/linux/instrumented.h:114 [inline] _copy_to_user+0xbc/0x110 lib/usercopy.c:40 copy_to_user include/linux/uaccess.h:191 [inline] btrfs_ioctl_logical_to_ino+0x440/0x750 fs/btrfs/ioctl.c:3499 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Uninit was created at: __kmalloc_large_node+0x231/0x370 mm/slub.c:3921 __do_kmalloc_node mm/slub.c:3954 [inline] __kmalloc_node+0xb07/0x1060 mm/slub.c:3973 kmalloc_node include/linux/slab.h:648 [inline] kvmalloc_node+0xc0/0x2d0 mm/util.c:634 kvmalloc include/linux/slab.h:766 [inline] init_data_container+0x49/0x1e0 fs/btrfs/backref.c:2779 btrfs_ioctl_logical_to_ino+0x17c/0x750 fs/btrfs/ioctl.c:3480 btrfs_ioctl+0x714/0x1260 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:904 [inline] __se_sys_ioctl+0x261/0x450 fs/ioctl.c:890 __x64_sys_ioctl+0x96/0xe0 fs/ioctl.c:890 x64_sys_call+0x1883/0x3b50 arch/x86/include/generated/asm/syscalls_64.h:17 do_syscall_x64 arch/x86/entry/common.c:52 [inline] do_syscall_64+0xcf/0x1e0 arch/x86/entry/common.c:83 entry_SYSCALL_64_after_hwframe+0x77/0x7f Bytes 40-65535 of 65536 are uninitialized Memory access of size 65536 starts at ffff888045a40000 This happens, because we're copying a 'struct btrfs_data_container' back to user-space. This btrfs_data_container is allocated in 'init_data_container()' via kvmalloc(), which does not zero-fill the memory. Fix this by using kvzalloc() which zeroes out the memory on allocation.
Conditions:
NA
Impact:
It can leak uninitialized kernel memory to user space, potentially exposing sensitive information.
Workaround:
NA
Fix:
The information leak issue has been resolved in the kernel.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1925029 : CVE-2023-1611 - Linux Kernel btrfs Use-After-Free Vulnerability Leading to System Crash and Information Leak
Component: TMOS
Symptoms:
A use-after-free flaw was found in btrfs_search_slot in fs/btrfs/ctree.c in btrfs in the Linux Kernel.This flaw allows an attacker to crash the system and possibly cause a kernel information leak
Conditions:
NA
Impact:
It can cause a kernel crash (denial of service) and may lead to a kernel information leak.
Fix:
The system crash and information leak issue has been resolved in the kernel.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1924693 : CVE-2020-26939 bouncycastle: Address OAEP decoding side-channel leaking RSA private exponent
Component: TMOS
Symptoms:
Attackers can obtain sensitive information about a private exponent because of Observable Differences in Behavior to Error Inputs. This occurs in org.bouncycastle.crypto.encodings.OAEPEncoding. Sending invalid ciphertext that decrypts to a short payload in the OAEP Decoder could result in the throwing of an early exception, potentially leaking some information about the private exponent of the RSA private key performing the encryption.
Conditions:
Bouncy Castle BC versions before 1.61 are vulnerable
Impact:
The vulnerability leaks side-channel information about the RSA private exponent
Workaround:
N/A
Fix:
bouncycastle has been upgraded to 1.61 to address this vulnerability.
Fixed Versions:
21.0.0.2
1923997 : CVE-2023-1668-openvswitch: ip proto 0 triggers incorrect handling
Component: TMOS
Symptoms:
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
Conditions:
NA
Impact:
It can cause incorrect handling or misrouting of other IP packets, potentially leading to traffic disruption or denial of service.
Workaround:
NA
Fix:
The denial of service issue has been resolved in the package.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1923817 : CVE-2017-11499: Constant Hashtable Seeds vulnerability (NodeJS v6.9.1)
Component: Local Traffic Manager
Symptoms:
Node.js v4.0 through v4.8.3, all versions of v5.x, v6.0 through v6.11.0, v7.0 through v7.10.0, and v8.0 through v8.1.3 was susceptible to hash flooding remote DoS attacks as the HashTable seed was constant across a given released version of Node.js. This was a result of building with V8 snapshots enabled by default which caused the initially randomized seed to be overwritten on startup.
Conditions:
NA
Impact:
It can cause high CPU usage and event loop blocking, leading to a remote denial of service.
Workaround:
NA
Fix:
Hash flooding remote DoS issue has been resolved in the package.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1923793-10 : CVE-2019-5739: DoS with keep-alive HTTP connection
Component: Local Traffic Manager
Symptoms:
Keep-alive HTTP and HTTPS connections can remain open and inactive for up to 2 minutes in Node.js 6.16.0 and earlier. Node.js 8.0.0 introduced a dedicated server.keepAliveTimeout which defaults to 5 seconds. The behavior in Node.js 6.16.0 and earlier is a potential Denial of Service (DoS) attack vector. Node.js 6.17.0 introduces server.keepAliveTimeout and the 5-second default.
Conditions:
NA
Impact:
It can exhaust server connections and resources, leading to a denial of service.
Fix:
The Denial of Service issue has been resolved in the package.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1922661-4 : JSON profile settings not displayed in REST API after attaching schema files
Links to More Info: BT1922661
Component: Application Security Manager
Symptoms:
When a JSON content profile has validation files attached, the following settings are not visible through the REST API:
"sensitiveData"
"attackSignaturesCheck"
"metacharElementCheck"
Conditions:
JSON content profile has schema validation files attached.
Impact:
JSON profile settings not visible in REST API.
Workaround:
None
Fix:
The REST API now correctly returns the JSON profile settings when schema files are attached.
Fixed Versions:
21.0.0.2, 17.1.3.1
1893905-3 : Python vulnerability CVE-2023-40217
Links to More Info: K000139685, BT1893905
1893369-3 : CVE-2021-33033 kernel: use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c
Component: TMOS
Symptoms:
The Linux kernel before 5.11.14 has a use-after-free in cipso_v4_genopt in net/ipv4/cipso_ipv4.c because the CIPSO and CALIPSO refcounting for the DOI definitions is mishandled, aka CID-ad5d07f4a9cd. This leads to writing an arbitrary value.
Conditions:
NA
Impact:
It can either lead to a DOS or cause arbitrary write on the system.
Workaround:
NA
Fix:
The DOS and arbitrary write issue has been resolved in the kernel.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1893309-5 : CVE-2021-23337 on HostOS: Command Injection via template function.\n' 'Link:https://sn
Links to More Info: K12492858
1889845-3 : Improvements in Radius Monitor
Component: Local Traffic Manager
Symptoms:
Certain headers were missing from radius monitor packet.
Conditions:
When radius monitors is configured
Impact:
Can lead to unexpected behaviour
Fix:
Missing headers are now included in the packets.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1849029-5 : Debug TMM crashes in FIPS/CC mode
Links to More Info: BT1849029
Component: Local Traffic Manager
Symptoms:
A TMM in debug mode crash occurs in FIPS/CC mode when using ClientSSL or ServerSSL profile.
Conditions:
-- Debug tmm is running
-- FIPS/CC mode enabled
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Switch to non debug tmm.
Fix:
Fix memory issue.
Fixed Versions:
21.0.0.1, 17.1.3, 16.1.6.1
1826345-6 : Security improvements in ca-bundle.crt
Component: TMOS
Symptoms:
Security best practices were not being followed for CA bundles.
Conditions:
When SSL profile is configured.
Impact:
Can lead to unexpected behaviour
Workaround:
Manually updating the default CA bundle or using CA bundle Manager.
Fix:
Security best practices are now being followed.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1825357-3 : Possible tmm crash or traffic loss after making vlan interface changes with an empty trunk
Links to More Info: BT1825357
Component: Local Traffic Manager
Symptoms:
Tmm crashes and generates a core file.
or
Network traffic via a trunk does not work.
Conditions:
Platform i2600, i2800, i4600, i4800, r2800, r4800 or VADC
All trunk members are removed from a trunk attached to a vlan.
Then, the trunk is removed from one or more vlans.
Then, the trunk is deleted.
This could result in a tmm crash.
or
A trunk with no members is added to a vlan.
Then, one or more members are added to the trunk.
This will result in traffic on that vlan not being being sent over that trunk.
Impact:
Traffic disrupted while tmm restarts
or
Traffic is not sent out via the trunk
Workaround:
Do not remove and a trunk with no members from a vlan.
It will be necessary to restart tmm to correct this situation.
Do not add a trunk with no members to a vlan.
If a trunk with no members was added to the vlan, the issue can be corrected by removing the trunk from the vlan, ensuring that there are members in the trunk and adding it back to the vlan.
Fix:
FIX is not yet available.
Fixed Versions:
21.0.0.2, 17.5.1.4
1825057-3 : 'vs_name' field truncated at 64 characters with ASM's remote logging
Links to More Info: BT1825057
Component: Application Security Manager
Symptoms:
The virtual server name field (vs_name) is truncated at 64 bytes with ASM's remote logging handled by BD process.
The 'vs_name' field comprises of the partition name as well as virtual server name and the 64 character limit is inclusive of both these names.
Conditions:
ASM/Advanced WAF device running one of the versions listed under Known Affected Versions.
Impact:
Virtual server name gets truncated in remote logging events
Workaround:
None.
Fixed Versions:
21.0.0.2
1824985-4 : In rare cases the Nitrox hardware compression queue may stop servicing requests.
Links to More Info: BT1824985
Component: Local Traffic Manager
Symptoms:
In rare cases, the Nitrox hardware may stop servicing requests.
When this issue occurs the tmctl compress table shows a high number of cur_enqueued entries and the number of requests handled in software (zlib) will be growing.
Conditions:
-- Nitrox compression hardware.
-- HTTP compression in use.
Impact:
Some connections may fail, and higher than expected CPU usage will be observed since requests will be handled in software.
Workaround:
Remove traffic from the device, or disable compression until the queues are completely drained.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1818949-3 : [APM] BIG-IP as OAuth AS sending invalid grant error when refresh token expired.
Links to More Info: BT1818949
Component: Access Policy Manager
Symptoms:
As per RFC states that, the provided authorization grant (e.g., authorization code, resource owner credentials) or refresh token is invalid, expired, revoked, does not match the redirection URI used in the authorization request, or was issued to another client then should send a 400 Bad Request status code and a error json response
{"error": "invalid_grant", ...}
currently BIG-IP sending as {"error": "access_denied", ...}
with 400 status code.
Conditions:
OAuth configured.
using the refresh token to get the access token, when refresh token is expired. (ex: using postman)
Impact:
Returns Invalid error
Workaround:
None
Fix:
Corrected the logging as per Rfc.
Fixed Versions:
21.0.0.1
1818137-3 : Tmm IPv4 fragmentation handling distribution
Links to More Info: BT1818137
Component: Local Traffic Manager
Symptoms:
BIG-IP VE handles fragmented IPv4 traffic on the first tmm thread/tmm0. With this change the ability to spread the fragmented IPv4 traffic is introduced.
Conditions:
Handling of fragmented IPv4 traffic.
Impact:
Handling of fragmented IPv4 traffics distribution.
Workaround:
None
Fix:
With this fix the Handling of fragmented IPv4 traffic can be distributed.
Fixed Versions:
21.0.0.1
1814413-2 : Dynamic parameters are not extracted and cookies are not generated
Links to More Info: BT1814413
Component: Application Security Manager
Symptoms:
Dynamic parameters are not extracted and cookies are missed.
Conditions:
Create a parameter in extraction and in the Extracted Items configuration.
Impact:
Unable to extract dynamic parameters due to which false positives are generated.
Workaround:
Include the file type in the Extracted Items configuration.
Fixed Versions:
21.0.0.2
1788105-3 : TLS1.3 connections between BIG-IP and server hangs with an APM policy that is invoked after the server's SSL handshake finishes★
Links to More Info: BT1788105
Component: Local Traffic Manager
Symptoms:
A TLS1.3 connection between the BIG-IP system and the server hangs.
Other reported symptoms:
-- SSL decryption fails
-- SSL handshake failure
-- SSL Orchestrator explicit proxy stops responding
This can be encountered after an upgrade to an affected version.
Conditions:
A virtual server that uses
1. TLS1.3 in the serverSSL profile
2. An APM policy that uses events that trigger after the SSL handshake on the server has completed
In an SSL Orchestrator setting, inline HTTP and ICAP services make use of APM policies that use L7 protocol lookup. Server Certificate and L7 protocol lookup conditions also make use of events that trigger the APM policy after the SSL handshake has completed.
Impact:
The connection hangs and the client is unable to connect to the server.
Workaround:
Apply either of these workarounds
1. Disable TLS1.3 on the serverSSL profile
2. Avoid using events that trigger the policy after the SSL handshake on the server has completed (for example avoid Event Wait and L7 protocol Lookup)
Fix:
The TLS1.3 connection between the BIG-IP and server no longer hangs if the APM policy is invoked after the SSL handshake.
Fixed Versions:
21.0.0.1, 17.1.3
1772317-4 : [APM][SAML SP] sp fails authentication with error "SAML assertion is invalid, error: NameID is missing"
Links to More Info: BT1772317
Component: Access Policy Manager
Symptoms:
SAML authentication fails and following log is seen on BIG-IP as sp: "SAML Agent: /Common/web_auth_act_saml_auth_subsession_ag SAML assertion is invalid, error: NameID is missing, but idp-connector's identity location is set to subject"
Conditions:
-- SAML auth is configured as SP on BIG-IP as part of per-request policy
-- assertion has an encrypted subject "<saml2:Subject><saml2:EncryptedID><xenc:EncryptedData xmlns:xenc="http://www.w3.org/2001/04/xmlenc#"...."
Impact:
Authentication fails
Workaround:
Disable "encrypt-subject " in idp config
Fixed Versions:
21.0.0.1
1752873-3 : [APM][SAML SP] Order of SAML attribute values saml.last.attr.name is reversed★
Links to More Info: BT1752873
Component: Access Policy Manager
Symptoms:
After upgrading, the order of SAML attribute values parsed from assertion are stored in reverse order.
Conditions:
-- BIG-IP as SAML SP,
-- Upgrade to 17.1.0
Impact:
The SAML assertion values are parsed in reverse order, which can cause iRules or policies to fail if they expect the values to arrive in a certain order.
Workaround:
None
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1632385-5 : Non-ASCII UTF-8 characters are mangled in JSON policy export
Links to More Info: BT1632385
Component: Application Security Manager
Symptoms:
Non-ASCII UTF-8 characters in a JSON policy are mangled when exported in JSON policy.
Conditions:
Values contains Non-ASCII UTF-8 characters and the policy is exported and imported back
Impact:
After re-importing the exported policy, the values change
Workaround:
None
Fix:
After exporting the policy with the Non-ASCII UTF-8 characters, the imported policy has the same identical values as before.
Fixed Versions:
21.0.0.2
1624701-5 : Security improvement in BIGIP GUI
Component: TMOS
Symptoms:
BIGIP GUI was not following best security practices.
Conditions:
NA
Impact:
Unexpected behaviour
Fix:
Security best practices are now being followed.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1623669-3 : False “Illegal dynamic parameter value” violations when extracting parameters from links (HREF)
Links to More Info: BT1623669
Component: Application Security Manager
Symptoms:
Requests may be blocked with the violation “Illegal dynamic parameter value” even though the parameter values were correctly extracted from application responses using “Search in Links” and should be treated as valid.
Conditions:
- A parameter is configured with Dynamic content value
- “Check – Search in Links” is enabled for the parameter
- The parameter value is extracted from response links (HREF)
- The extracted value is later used in a client request while the policy is enforced
Impact:
Legitimate application traffic may be blocked because values extracted from links are not recognized as valid dynamic parameter values.
Workaround:
None
Fix:
Values extracted from response links are properly learned and recognized, and requests using those values are no longer incorrectly blocked with “Illegal dynamic parameter value.”
Fixed Versions:
21.0.0.2, 17.1.3.1
1621417-3 : WALinuxAgent Updated to Version 2.14.0.1
Component: TMOS
Symptoms:
Unexpected Behavior When Using Deprecated Waagent Configurations: Stricter Validation May Cause VM Extensions to Fail
Conditions:
Applicable to All Previous Versions of BIG-IP Azure Distributions
Impact:
The Azure Linux Agent (waLinuxAgent) has been upgraded from version 2.2.48.1 to 2.14.0.1, bringing enhanced security, stability, and compatibility with newer Azure features and Linux distributions. This major version update includes stricter extension handling.
Fix:
The bundled WALinuxAgent for Azure images has been updated to version 2.14.0.1.
Fixed Versions:
21.0.0.2
1600617-5 : Few virtio driver configurations may result in excessive memory usage
Links to More Info: BT1600617
Component: TMOS
Symptoms:
Certain virtio driver configurations may result in excessive memory usage, which in some cases, leads to issues with forwarding traffic.
'tmctl page_stats' output can be examined on a newly launched system to verify if any of the TMMs except for TMM0 have their memory exhausted.
Conditions:
Virtio driver memory usage scales up with:
- Number of queues.
- Number of TMMs.
- Number of interfaces.
- Queue size.
Increasing these numbers might cause a problem trigger.
Impact:
Excessive memory usage, in some cases, leads to problems with traffic forwarding.
Workaround:
Scale down on the number of queues and their size. Reduce the number of interfaces.
Fixed Versions:
21.0.0.2
1583381-4 : "Insert Secure Attribute" must be enabled and "Insert SameSite Attribute" must be set to "Lax" for pure wildcard cookie in all templates by default
Links to More Info: BT1583381
Component: Application Security Manager
Symptoms:
The pure wildcard cookie configuration "Insert Secure Attribute" is disabled and "Insert SameSite Attribute" is not set to "Lax".
Conditions:
Creating the policy using the policy templates.
Impact:
The configuration is incorrect.
Workaround:
Configure it manually: Enable "Insert Secure Attribute" and set "Insert SameSite Attribute" to "Lax".
Fix:
Fixed the templates and now BIG-IP has the correct configuration for the pure wildcard cookie.
Fixed Versions:
21.0.0.2
1562733-5 : Bd can crash using JSON schema
Component: Application Security Manager
Symptoms:
Bd crashes while passing traffic.
Conditions:
Using JSON schema
Impact:
Traffic disrupted while bd restarts.
Workaround:
Remove JSON schema from JSON content profile, and enforce JSON payload via "parse parameter" feature available in JSON content profile.
Fixed Versions:
21.0.0.2
1552341-7 : Excessive tmm memory during bot signature updates
Links to More Info: BT1552341
Component: Application Security Manager
Symptoms:
During bot signature updates, memory usage may become unusually high. In some cases, updates can fail and leave the system in an inconsistent state.
Conditions:
This issue may occur when multiple bot signature overrides are configured in Bot Defense profiles. Updates that involve multiple signature overrides are more likely to trigger higher memory usage.
Impact:
Bot signature updates may fail due to insufficient memory, which can temporarily prevent new signatures from being applied.
Workaround:
Increase available TMM memory by provisioning the LTM module.
Reduce the number of multiple overrides (either individual signature overrides or signature category overrides) in Bot Defense profiles, as multiple overrides significantly increase memory usage during updates.
Fix:
The fix will optimize the bot signature update mechanism to reduce memory consumption, improve failure handling.
Fixed Versions:
21.0.0.1
1505813-7 : CVE-2018-16487 lodash: Prototype pollution in utilities
Component: iApp Technology
Symptoms:
A prototype pollution vulnerability was found in lodash <4.17.11 where the functions merge, mergeWith, and defaultsDeep can be tricked into adding or modifying properties of Object.prototype.
Conditions:
NA
Impact:
An attacker can use Function inside of vulnerable versions of lodash to execute malicious code using the Traffic Management User Interface (TMUI) or iControl REST API .it can impact confidentiality,integrity and availability of application.
Workaround:
NA
Fix:
Updated lodash version to 4.17.21
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1505297-5 : CVE-2020-8203 nodejs-lodash: prototype pollution in zipObjectDeep function
Component: iApp Technology
Symptoms:
A flaw was found in nodejs-lodash in versions 4.17.15 and earlier. A prototype pollution attack is possible which can lead to arbitrary code execution. The primary threat from this vulnerability is to data integrity and system availability.
Conditions:
The vulnerability can be exploited when a vulnerable lodash version (≤ 4.17.15) processes attacker-controlled input using prototype-modifying functions (e.g., merge, defaultsDeep) with malicious keys like __proto__ or constructor.
Impact:
It can allow prototype pollution, leading to data integrity issues, application crashes (DoS), or potentially arbitrary code execution.
Workaround:
Upgrade lodash to a fixed version (≥ 4.17.16), avoid using prototype-modifying functions on untrusted input, and validate or sanitize user-controlled data.
Fix:
Update nodejs-lodash to version 4.17.16 or later
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1505257-3 : False positive with "illegal base64 value" for Authorization header
Links to More Info: BT1505257
Component: Application Security Manager
Symptoms:
False positive "illegal base64 value" is detected
Conditions:
The given base64 encoded value is legal base64 but the decoded auth-param is unparsable. Such request triggers "HTTP Protocol Compliance" violation when configured to do so and it is indeed triggering, but such request should not trigger "illegal base64 value".
Impact:
A false positive is detected.
Workaround:
None
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1498949-1 : CVE-2023-2283 libssh: authorization bypass in pki_verify_data_signature
Links to More Info: K000138682, BT1498949
1473189-1 : Offending IP is not logged when rate limiting is triggered
Links to More Info: BT1473189
Component: Global Traffic Manager (DNS)
Symptoms:
The log only contains the rate limit message without the offending IP address.
Conditions:
The number of requests exceeds the server's configured maximum rate limit.
Impact:
You are unable to determine which IP address exceeded the threshold.
Workaround:
None
Fix:
The system now logs the offending IP address when the rate limit is triggered.
Fixed Versions:
21.0.0.1
1450481-6 : TMSH hardening
Component: TMOS
Symptoms:
TMSH is not following security best practices.
Conditions:
NA
Impact:
Unexpected behaviour
Workaround:
NA
Fix:
TMSH is now following security best practices.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1429861-9 : CVE-2019-5737: HTTP or HTTPS Denial of Service in keep-alive mode (NodeJS v6)
Component: Local Traffic Manager
Symptoms:
It was found that the original fix for Slowloris, CVE-2018-12122, was insufficient. It is possible to bypass the server's headersTimeout by sending two specially crafted HTTP requests in the same connection. An attacker could use this flaw to bypass Slowloris protection, resulting in a denial of service.
Conditions:
The server runs a vulnerable Node.js HTTP implementation and accepts persistent connections where an attacker can send two specially crafted HTTP requests on the same connection to bypass headersTimeout.
Impact:
An attacker can bypass Slowloris protections and cause a denial of service by exhausting server connections.
Workaround:
Upgrade to a Node.js version that includes the corrected Slowloris fix and enforce strict request timeouts and connection limits.
Fix:
Upgrade to a Node.js version with the updated Slowloris fix and enforce strict request timeout and connection limits.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1401569-5 : Engineering Hotfix readme file refers to non-applicable "full_box_reboot" command★
Component: TMOS
Symptoms:
The readme file automatically produced for BIG-IP Engineering Hotfixes contains the following instructions:
This hotfix may not be operational without a FULL
system restart. To accomplish this, use the command:
/usr/bin/full_box_reboot
However, the full_box_reboot command is not part of the documented or recommended workflows for current BIG-IP versions.
Conditions:
These instructions are contained in the .readme file that may accompany a BIG-IP Engineering Hotfix provided by F5 to resolve critical issues, under the terms and conditions of the F5 critical issue hotfix policy as described at:
https://my.f5.com/manage/s/article/K4918
Impact:
The instructions in the Engineering Hotfix readme file may be confusing due to inconsistency with documented workflows for installing BIG-IP Engineering Hotfixes.
Workaround:
After the software installs and boots to the volume with installed software no further reboot is required.
Fix:
None
Fixed Versions:
21.0.0.2
1379649-6 : GTM iRule not verifying WideIP type while getting pool from TCL command
Links to More Info: BT1379649
Component: Global Traffic Manager (DNS)
Symptoms:
When the pool name is same for different pool types, the GTM iRule cannot segregate the pool types thus giving a wrong DNS response.
Conditions:
-- Both A/AAAA same name WideIP and pools.
-- GTM iRule with pool command pointing to common pool name in different WideIP types.
Impact:
Traffic impact as a non-existent pool member address in DNS response.
Workaround:
None
Fixed Versions:
21.0.0.1, 17.1.3.1
1359817-4 : The setting of DB variable tm.macmasqaddr_per_vlan does not function correctly
Links to More Info: BT1359817
Component: F5OS Messaging Agent
Symptoms:
TMM is not configuring L2 listener entry for a new MASQUEREDE MAC created from a base MAC and VLAN ID when the DB variable tm.macmasqaddr_per_vlan is true.
Conditions:
- F5OS Tenant
- MAC MASQUEREDE is configured
- DB variable tm.macmasqaddr_per_vlan is true
Impact:
Connectivity issues may occur, pinging a self-IP will fail.
Workaround:
None
Fixed Versions:
21.0.0.1, 21.0.0, 17.5.1.4, 17.1.3.1
1352213-1 : Handshake fails with FFDHE key share extension
Links to More Info: BT1352213
Component: Local Traffic Manager
Symptoms:
SSL handshake fails to complete and various errors show in the LTM logs
01010025:2: Device error: crypto codec Couldn't create an OpenSSL EC group object OpenSSL error:00000000:lib(0):func(0):reason(0)
01010282:3: Crypto codec error: sw_crypto-1 Couldn't initialize the elliptic curve parameters.
01010025:2: Device error: crypto codec No codec available to initialize request context.
Conditions:
An SSL profile uses TLS1.3, and a TLS Client Hello attempts to use FFDHE as part of the key share extension.
Impact:
SSL handshake fails and results in connection failure.
Workaround:
Set the SSL profile to disallow using FFDHE groups.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3
1341517-1 : With longer vlan names qkview generates invalid proc_module.xml file and ihealth parsing fails.
Links to More Info: BT1341517
Component: TMOS
Symptoms:
With longer vlan names, invalid proc_module.xml file are generated by qkview and iHealth parsing fails intermittently.
Conditions:
VLAN names longer than 13 characters are used.
Impact:
iHealth may fail to process the qkview file.
Workaround:
Use shorter VLAN names.
Fixed Versions:
21.0.0.1
1271453-2 : DNS requests with NSEC or NSEC3 RR type Responding with no NSEC3 and no authority section from BIG-IP authoritative server.
Links to More Info: BT1271453
Component: Global Traffic Manager (DNS)
Symptoms:
DNS requests with NSEC or NSEC3 RR type Responding with no NSEC/NSEC3 and no authority section from BIG-IP authoritative server.
Conditions:
-- Create a Zone in BIND.
-- Create DNSSEC zone on BIG-IP.
-- Send dig -t nsec3 ZONENAME @BIG_IP_listener +dnssec
-- Observe the lack of AUTHORITY SECTION, NSEC3 and RRSIG records in the reply
Impact:
DNSSEC Validation failure at resolver.
Workaround:
None
Fix:
None
Fixed Versions:
21.0.0.2
1271341-6 : Unable to use DTLS without TMM crashing
Component: Local Traffic Manager
Symptoms:
The TMM crashes when DTLS is used.
Conditions:
- Using DTLS.
Impact:
TMM core is observed, traffic is disrupted while TMM restarts.
Workaround:
Disable 'allow-dynamic-record-sizing' in the client-ssl profile.
Following is an example:
ltm profile client-ssl /Common/otters-ssl {
allow-dynamic-record-sizing disabled
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1178225-7 : Scalability issues with F5-VE deployments
Component: TMOS
Symptoms:
Two TMM threads can end up running on the same physical core on hypervisors where any 2 consecutive virtual cores are hyperthreaded siblings running on the same physical core.
Seen on any platform which assigns virtual CPUs in the order given in the example below, where numerically adjacent logical CPU numbers represent cores on the same physical CPU:
cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 0
cpu2 - assigned to physical core 1
cpu3 - assigned to physical core 1
cpu4 - assigned to physical core 2
cpu5 - assigned to physical core 2
etc.
BIG-IP expects the order of the logical CPUs to iterate through the physical cores, so that hyperthreaded siblings are never numberically adjacent, for example:
cpu0 - assigned to physical core 0
cpu1 - assigned to physical core 1
cpu2 - assigned to physical core 2
cpu3 - assigned to physical core 3
cpu4 - assigned to physical core 0
cpu5 - assigned to physical core 1
cpu6 - assigned to physical core 2
cpu7 - assigned to physical core 3
The order that logical CPUs are assigned to the virtual machine can be determined with the 'lscpu --extended' command.
Conditions:
Virtual Edition (VE) BIG-IP as it does not support split planes
Impact:
Scalability issues with F5-VE deployments which run on infrastructures/hypervisors which provide virtual CPU resources in the order given above.
Workaround:
None
An EHF is available that adds a db variable that alter the the order that tmm allocates CPU cores to threads.
Fixed Versions:
21.0.0.2, 17.5.1.4, 17.1.3.1
1148185-8 : getdb insufficient sanitisation
Links to More Info: K05403841
Component: TMOS
Symptoms:
https://support.f5.com/csp/article/K05403841
Conditions:
https://support.f5.com/csp/article/K05403841
Impact:
https://support.f5.com/csp/article/K05403841
Fix:
https://support.f5.com/csp/article/K05403841
Fixed Versions:
21.0.0.1
1137269-8 : MCPD fails to reply if a request is proxied to another daemon and the connection to that daemon closes
Links to More Info: BT1137269
Component: TMOS
Symptoms:
MCPD does not reply to the request if the publisher's connection closes or fails. In this case, when bcm56xxd
is restarted, the perceivable signs of failure are:
- The snmpwalk failing with a timeout and
- The "MCPD query response exceeding" log messages.
Conditions:
1) Configure SNMP on the BIG-IP to run snmpwalk locally on the BIG-IP.
2) From the first session on the BIG-IP, run a snmpwalk in the while loop.
while true;do date; snmpwalk -v2c -c public 127.0.0.1 sysDot1dbaseStat;sleep 2;done
Sample output:
Sat Aug 21 00:57:23 PDT 2021
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatResetStats.0 = INTEGER: 0
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatMacAddr.0 = STRING: 0:23:e9:e3:8b:41
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatNumPorts.0 = INTEGER: 12
F5-BIGIP-SYSTEM-MIB::sysDot1dbaseStatType.0 = INTEGER: transparentonly(2)
3) From a second session on the BIG-IP restart bcm56xxd
bigstart restart bcm56xxd
4) The snmpwalk will continually report the following:
Timeout: No Response from 127.0.0.1
And snmpd will continually log "MCPD query response exceeding" every 30 seconds in /var/log/ltm.
Impact:
SNMP stopped responding to queries after upgrade.
Workaround:
Restart SNMP.
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1106489-6 : GRO/LRO is disabled in environments using the TMM raw socket "sock" driver.
Links to More Info: BT1106489
Component: TMOS
Symptoms:
GRO/LRO packets are not received: "tmctl -d blade tmm/ndal_rx_stats" shows "0" in "lro". The linux host has GRO disabled: "ethtool -k eth1 | grep generic-receive-offload" shows "off".
Conditions:
-- BIG-IP is deployed in a Hyper-V environment.
-- Any environment such that "tmctl -d blade tmm/device_probed" displays "sock" in "driver_in_use".
Impact:
Performance is degraded.
Workaround:
Manually enable GRO on the device: ethtool -K eth1 gro on
Check that it's enabled with: ethtool -k eth1 | grep generic-receive-offload
Fix:
When sending large payload, "tmctl -d blade tmm/ndal_rx_stats" shows "1" in "lro". "tmctl -d blade tmm/ndal_dev_status" shows "y:y" (available:enabled) in "lro". The linux host indicates the device has GRO enabled: "ethtool -k eth1 | grep generic-receive-offload" shows "on".
Fixed Versions:
21.0.0.2, 17.1.3, 16.1.4, 15.1.10
1057557-7 : Exported policy has greater-than sign '>' not escaped to '>' with response_html_code tag.
Links to More Info: BT1057557
Component: Application Security Manager
Symptoms:
The greater-than sign '>' is not escaped/converted to '>' with response_html_code tag.
Having an un-escaped greater-than sign can cause issues when re-importing the policy, if the greater-than sign appears in a specific sequence, ']]>'. In other words, if the greater-than sign does not appear in the specific sequence, you can successfully re-import the policy without problem.
The specific sequence can be possible with a custom response page configuration. If you modify the custom response page in the way it has a sequence of characters ']]>', as the greater-than sign is not converted due this issue, the exported policy has the sequence of characters ']]>'. The expected characters are ']]>'
The characters ']]>' in XML is CDATA End delimiter and not allowed. The exported policy causes parser error and can not be re-imported.
Conditions:
This issue occurs if you modify the default custom response page where this specific character sequence is observed ']]>'.
Impact:
The exported policy cannot be re-imported.
Workaround:
This workaround forces the greater-than sign to be escaped to '>' so that that policy can be re-imported without problem.
- make /usr writable
# mount -o remount,rw /usr
- backup
# cp /usr/local/share/perl5/F5/ExportPolicy/XML.pm /usr/local/share/perl5/F5/ExportPolicy/XML.pm.orig
- see this line exists
# grep "gt;" /usr/local/share/perl5/F5/ExportPolicy/XML.pm
$xml =~ s/>/>/g;
- delete the line and verify
# sed -i '/$xml =~ s\/>.*/d' /usr/local/share/perl5/F5/ExportPolicy/XML.pm
- should not see the line
# grep "gt;" /usr/local/share/perl5/F5/ExportPolicy/XML.pm
- move /usr read-only
mount -o remount,ro /usr
- make the change in effect
# pkill -f asm_config_server
Fixed Versions:
21.0.0.2
1057305-5 : On deployments that use DPDK, "-c" may be logged as the TMM process/thread name.
Links to More Info: BT1057305
Component: TMOS
Symptoms:
"-c" may be logged as the process/thread name on deployments that use DPDK:
notice -c[17847]: 01010044:5: Gx feature is not licensed
notice -c[17847]: 01010044:5: LTM Transparent feature is licensed
notice -c[17847]: 01010044:5: NAT feature is licensed
Conditions:
- BIG-IP Virtual Edition using XNET with DPDK. This can be AWS, Mellanox, or Cisco eNIC.
Impact:
Confusing logging.
Workaround:
N/A
Fix:
N/A
Fixed Versions:
21.0.0.2
1052477 : CVE-2020-10751 kernel: SELinux netlink permission check bypass
Component: TMOS
Symptoms:
A flaw was found in the Linux kernel SELinux LSM hook implementation before version 5.7, where it incorrectly assumed that an skb would only contain a single netlink message. The hook would incorrectly only validate the first netlink message in the skb and allow or deny the rest of the messages within the skb with the granted permission without further processing.
Conditions:
NA
Impact:
A local attacker could bypass SELinux restrictions, potentially leading to unauthorized access, privilege escalation, or, in some scenarios, a system crash (denial of service).
Workaround:
NA
Fix:
Applied patch to fix the CVE
Fixed Versions:
21.0.0.1, 17.5.1.4, 17.1.3.1
1036221-4 : "Illegal parameter value length" is reported with parsing product length.
Links to More Info: BT1036221
Component: Application Security Manager
Symptoms:
"Illegal parameter value length" violation is reported with wrong parameter length.
Conditions:
A JSON parameter is encoded.
Impact:
The decoded value length of the parameter in the JSON payload will be reported instead of its original length.
Workaround:
None
Fix:
The original parameters value length is reported with "Illegal parameter value length" violation.
Fixed Versions:
21.0.0.1, 17.5.1.4
1001429-10 : HTTP header Sanitization
Component: Device Management
Symptoms:
Some HTTP headers were improperly sanitised.
Conditions:
NA
Impact:
It could lead to unexpected behaviour
Fix:
Headers are now properly sanitised.
Fixed Versions:
21.0.0.1
Known Issues in BIG-IP v21.0.x
TMOS Issues
| ID Number | Severity | Links to More Info | Description |
| 1991485-2 | 1-Blocking | BT1991485 | Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped. |
| 967769-5 | 2-Critical | BT967769 | During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks |
| 780437-11 | 2-Critical | BT780437 | Upon rebooting a VIPRION chassis provisioned as a vCMP host, some vCMP guests can return online with no configuration. |
| 777389-10 | 2-Critical | BT777389 | In rare occurrences related to PostgreSQL monitor, the mcpd process restarts |
| 721591-6 | 2-Critical | K000141369, BT721591 | Java crashes with core during with high load on REST API |
| 701341-6 | 2-Critical | K52941103, BT701341 | If /config/BigDB.dat is empty or the file is corrupt, mcpd continuously restarts |
| 2263721-2 | 2-Critical | BT2263721 | TMM crashes on Azure VE when virtual function is removed during runtime |
| 2229273-1 | 2-Critical | BT2229273 | LDAP authentication fails when multiple LDAP servers are configured |
| 2221585-3 | 2-Critical | BT2221585 | When tenant renews DHCP lease on eth2, the interface IP address on mgmt also gets modified |
| 2189993 | 2-Critical | BT2189993 | Upgrade from 17.5.1.3 to 21.0.0 and the config failed to load with error:01071197:3: Metacharacter '*' must be at end of the session variable name★ |
| 2154089-2 | 2-Critical | "Test" button for monitor object is missing. | |
| 2154057-5 | 2-Critical | BT2154057 | MCPD validations not throwing error when snmpv3 password contains more than 77 characters★ |
| 2139893-3 | 2-Critical | BT2139893 | vCMP guest may become unresponsive for several minutes due to kernel soft lockup |
| 2132125-8 | 2-Critical | K000157248, BT2132125 | Unable to upload QKView to iHealth |
| 1812349-4 | 2-Critical | BT1812349 | IPsec phase 2 (IKEv1 Quick Mode) will not start after upgrade★ |
| 1571817-5 | 2-Critical | BT1571817 | FQDN ephemeral pool member user-down state is not synced to the peer device |
| 1395349-3 | 2-Critical | BT1395349 | The httpd service shows inactive/dead after "bigstart restart httpd" |
| 1327649-5 | 2-Critical | BT1327649 | Invalid certificate order within cert-chain associated to JWK configuration |
| 1093717-7 | 2-Critical | BT1093717 | BGP4 SNMP traps are not working. |
| 1077789-8 | 2-Critical | BT1077789 | System might become unresponsive after upgrading.★ |
| 1027961-5 | 2-Critical | BT1027961 | Changes to an admin user's account properties may result in MCPD crash and failover |
| 1006449-6 | 2-Critical | BT1006449 | High CPU utilization and slow SNMP response after upgrade★ |
| 977953-8 | 3-Major | BT977953 | Show running config interface CLI could not fetch the interface info and crashes the imi |
| 941961-9 | 3-Major | BT941961 | Upgrading system using WAM TCP profiles may prevent the configuration from loading |
| 923745-8 | 3-Major | BT923745 | Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition |
| 921069-7 | 3-Major | BT921069 | Neurond cores while adding or deleting rules |
| 891333-7 | 3-Major | K32545132, BT891333 | The HSB on BIG-IP platforms can get into a bad state resulting in packet corruption. |
| 883149-10 | 3-Major | BT883149 | The fix for ID 439539 can cause mcpd to core. |
| 870349-6 | 3-Major | BT870349 | Continuous restart of ntlmconnpool after the license reinstallation★ |
| 851837-7 | 3-Major | BT851837 | Mcpd fails to start for single NIC VE devices configured in a trust domain |
| 809089-8 | 3-Major | BT809089 | TMM crash after sessiondb ref_cnt overflow |
| 791365-8 | 3-Major | BT791365 | Bad encryption password error on UCS save |
| 783077-5 | 3-Major | BT783077 | IPv6 host defined via static route unreachable after BIG-IP reboot |
| 775845-10 | 3-Major | BT775845 | Httpd fails to start after restarting the service using the iControl REST API |
| 759258-10 | 3-Major | BT759258 | Instances shows incorrect pools if the same members are used in other pools |
| 741621-6 | 3-Major | BT741621 | CLI preference 'suppress-warnings' setting may show incorrectly |
| 739904-7 | 3-Major | BT739904 | /var/log/ecm log is not rotated |
| 675742-4 | 3-Major | BT675742 | Hardware-to-VE-platform-migrate of a UCS may fail with an error on db variable license.maxcores |
| 637827-5 | 3-Major | BT637827 | VADC: after re-deploying a single-nic VM with multiple nics, a load can fail due to stp member 1.0 |
| 566995-7 | 3-Major | BT566995 | bgpd might crash in rare circumstances. |
| 554506-6 | 3-Major | K47835034, BT554506 | PMTU discovery from the management interface does not work |
| 469724-7 | 3-Major | BT469724 | When evaluation/demonstration features expire, features enabled by both evaluation and perpetual licenses also expire |
| 2277461-1 | 3-Major | Current tzdata version of BIG-IP is outdated and may cause discrepancies | |
| 2261337-2 | 3-Major | BT2261337 | TMUI displays Local Traffic menu on rSeries Best Bundle tenant without LTM provisioned |
| 2240889-1 | 3-Major | BT2240889 | TMM route can unexpectedly overwrite MGMT kernel route |
| 2230137-3 | 3-Major | BT2230137 | Multicast forwarding entry might not be created during a traffic burst. |
| 2228421-1 | 3-Major | BT2228421 | GUI: Help contents missing for "System >> Crypto Offloading : Acceleration Strategy" (404 error) |
| 2217677-1 | 3-Major | BT2217677 | BIG-IP v21.0: Tunnel object exists in MCPD but missing Linux tunnel tap device, causing ioctl failure and config deployment failure |
| 2202005 | 3-Major | BT2202005 | IPsec can send packets across tunnels on standby node. |
| 2197289-1 | 3-Major | BT2197289 | Enabling SSH access via the GUI blocks MCPD for 90 seconds |
| 2183241-2 | 3-Major | BT2183241 | Trunk egress traffic is not balanced on some platforms. |
| 2182061-3 | 3-Major | BT2182061 | Management routes not installed on reboots when interface route is recursively required. |
| 2162997-3 | 3-Major | BT2162997 | AS3 becomes unresponsive after upgrade from 17.1.2.1 to 17.1.2.2 Build 0.311.1★ |
| 2153421-3 | 3-Major | BT2153421 | iControl REST /mgmt/toc endpoint and object browser pages are not functioning on BIG-IP v17.x |
| 2152257-3 | 3-Major | BT2152257 | [BGP] remove-private-AS does not work with extended ASN numbers |
| 2150489-5 | 3-Major | BT2150489 | Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed. |
| 2143109-3 | 3-Major | BT2143109 | BIG-IP VE with more CPU cores than licensed enters TMM restart loop (TMM PU (<num_cores>) >= number of PUs (<num_licensed_cores>)) after mcpd restart |
| 2131833-5 | 3-Major | BT2131833 | F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable |
| 2058541-4 | 3-Major | BT2058541 | [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer. |
| 2053489-4 | 3-Major | BT2053489 | Config Sync events may not be recorded in audit log |
| 2038429-2 | 3-Major | BT2038429 | Issue with ike_ctx causes memory corruption |
| 2038425-2 | 3-Major | BT2038425 | Issue with ike_ctx causes memory corruption |
| 2038421-2 | 3-Major | BT2038421 | Issue with ike_ctx causes memory corruption |
| 2038417-2 | 3-Major | BT2038417 | Issue with ike_ctx causes memory corruption |
| 2014597-4 | 3-Major | BT2014597 | Async session db ops are missing flow control |
| 1937545-3 | 3-Major | BT1937545 | Disabling ipsec.if.checkpolicy lead to premature connection termination for a tunneled traffic |
| 1933105-4 | 3-Major | BT1933105 | TMM does not fragment the output before encapsulating the payload |
| 1854353-4 | 3-Major | BT1854353 | Users with Resource admin role are not able to save the UCS. |
| 1826505-3 | 3-Major | BT1826505 | Restjavad API usage statistics memory leak |
| 1707921-4 | 3-Major | BT1707921 | Tenant upgrade fails with disk full error on BIG-IP 17.x created with T2 image★ |
| 1644497-5 | 3-Major | BT1644497 | TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed |
| 1603869-3 | 3-Major | BT1603869 | Wrong Fallback to local for TACACS authentication with empty password when source fallback is set to true |
| 1602629-5 | 3-Major | BT1602629 | Tmm_mcpmsg_print can trigger SOD |
| 1596313-3 | 3-Major | BT1596313 | F5OS LAG fails MCPD validation, tenant trunk has no interfaces. |
| 1586745-3 | 3-Major | BT1586745 | LACP trunk status became DOWN due to bcm56xxd failure |
| 1455805-3 | 3-Major | BT1455805 | MCPD unstable/inoperative after copying SNMP configuration from another BIG-IP |
| 1347861-5 | 3-Major | BT1347861 | Monitor status update logs unclear for FQDN template pool member |
| 1322413-6 | 3-Major | BT1322413 | After config sync, FQDN node status changes to Unknown/Unchecked on peer device |
| 1312225-5 | 3-Major | BT1312225 | System Integrity Status: Invalid with some Engineering Hotfixes |
| 1302101-5 | 3-Major | BT1302101 | Sflow receiver flows are not established at TMM startup on sDAG platforms due to sDAG delay |
| 1296925-5 | 3-Major | BT1296925 | Unable to create two boot locations using the 'ALL' F5OS tenant image at default storage size |
| 1283721-5 | 3-Major | BT1283721 | Vmtoolsd memory leak |
| 1281929-5 | 3-Major | BT1281929 | The BIG-IP system's time zone database does not reflect recent changes implemented by Mexico in regard to DST |
| 1271941-5 | 3-Major | BT1271941 | Tomcat CPU utilization increased after upgrading to 15.1.6 and higher versions.★ |
| 1256757-4 | 3-Major | BT1256757 | Suspect keymgmtd memory leak while using dynamic CRL. |
| 1183529-4 | 3-Major | BT1183529 | OCSP request burst when cert-ldap authentication is enabled |
| 1168245-4 | 3-Major | BT1168245 | Browser is intermittently unable to contact the BIG-IP device |
| 1126505-4 | 3-Major | BT1126505 | HSB and switch pause frames impact data traffic |
| 1120345-10 | 3-Major | Running tmsh load sys config verify can trigger high availability (HA) failover | |
| 1090313-7 | 3-Major | BT1090313 | Virtual server may remain in hardware SYN cookie mode longer than expected |
| 1062901-7 | 3-Major | BT1062901 | The 'trap-source' and 'network' SNMP properties are ineffective, and SNMP traps may be sent from an unintended interface. |
| 1052057-3 | 3-Major | BT1052057 | FCS errors on switch/HSB interface impacts networking traffic |
| 1044281-7 | 3-Major | BT1044281 | In some cases, cpcfg does not trigger selinux relabel, leaving files unlabeled |
| 1043141-1 | 3-Major | K36822000, BT1043141 | Misleading error 'Symmetric Unit Key decrypt failure - decrypt failure' when loading UCS from another BIG-IP |
| 1036217-5 | 3-Major | BT1036217 | Secondary blade restarts as a result of csyncd failing to sync files for a device group |
| 1022997-7 | 3-Major | BT1022997 | TCP segments with an incorrect checksum are transmitted when the sock driver is used in AWS deployments (e.g., 1NIC) |
| 1016273-3 | 3-Major | BT1016273 | Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled★ |
| 1013793-3 | 3-Major | BT1013793 | Pool members may flap on BIG-IP VE with provision.1nic set to forced_enable |
| 1009337-8 | 3-Major | BT1009337 | LACP trunk down due to bcm56xxd send failure |
| 929173-9 | 4-Minor | BT929173 | Watchdog reset due to CPU stall detected by rcu_sched |
| 928665-8 | 4-Minor | BT928665 | Kernel nf_conntrack table might get full with large configurations. |
| 824953-1 | 4-Minor | BT824953 | The sFlow sample collection for VLAN does not work with VLAN groups |
| 745125-5 | 4-Minor | BT745125 | Network Map page Virtual Servers with associated Address/Port List have a blank address. |
| 694765-10 | 4-Minor | BT694765 | Changing the system's admin user causes vCMP host guest health info to be unavailable |
| 2277421-3 | 4-Minor | BT2277421 | TCP profile Help tab displays incorrect default values for Memory Management fields |
| 2262641-3 | 4-Minor | BT2262641 | [BGP] Peering deadlock when modifying supported capabilities |
| 2260837-2 | 4-Minor | BT2260837 | IPsec GUI sets encryption to null on auth update |
| 2259001-3 | 4-Minor | BT2259001 | /Common VLANs can be assigned to non-Common partition route domains via VLAN-groups |
| 2251921-1 | 4-Minor | BT2251921 | GUI audit logs inside the /var/log/audit files have a different format from all other daemons' audit logs |
| 2251549-4 | 4-Minor | BT2251549 | Uneditable fields for Guest, Auditor, and Operator roles may appear to be editable in the GUI |
| 2151505-1 | 4-Minor | BT2151505 | Cmp_dest_velos is automatically installed on system startup. |
| 2150869-1 | 4-Minor | BT2150869 | Incorrect information for count of failed login for a user |
| 2131597-3 | 4-Minor | BT2131597 | BGP graceful restart might not accept a new connection immediately after neighbor failover. |
| 2064209-4 | 4-Minor | BT2064209 | FQDN node created from pool member via tmsh does not inherit "autopopulate" value |
| 1967293-4 | 4-Minor | BT1967293 | Re-configuring BFD multihop for a BGP peer does not work reliably. |
| 1813625-3 | 4-Minor | BT1813625 | "tmsh show net ipsec-stat" command is not showing statistics - all values are zero. |
| 1635013-5 | 4-Minor | BT1635013 | The "show sys service" command works only for users with Administrator role |
| 1575805-2 | 4-Minor | bcm56xxd Process Killed by SOD After Failing to Send a Heartbeat During Firewall Rule Statistics Query | |
| 1462337-6 | 4-Minor | BT1462337 | Intermittent false PSU status (not present) through SNMP |
| 1331037-6 | 4-Minor | BT1331037 | The message MCP message handling failed logs in TMM with FQDN nodes/pool members |
| 1301317-5 | 4-Minor | BT1301317 | Update Check request using a proxy will fail if the proxy inserts a custom header |
| 1361021-5 | 5-Cosmetic | BT1361021 | The management interface media on a BIG-IP Tenant on F5OS systems does not match the chassis |
Local Traffic Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 886045-9 | 2-Critical | BT886045 | Multi-NIC instances fail to come up when trying to use memory-mapped virtio device |
| 824437-11 | 2-Critical | BT824437 | Chaining a standard virtual server and an ipother virtual server together can crash TMM. |
| 758491-8 | 2-Critical | BT758491 | When using NetHSM integration, after upgrade to 14.1.0 or later (or creating keys using fipskey.nethsm), BIG-IP cannot use the keys |
| 632553-9 | 2-Critical | K14947100, BT632553 | DHCP: OFFER packets from server are intermittently dropped |
| 2246933-3 | 2-Critical | BT2246933 | Memory leak in QUIC under rare sequence of packets/events |
| 2225173-1 | 2-Critical | BT2225173 | HA Failover does not happen when a tenant's Active controller is pulled out and one or more blades goes offline |
| 2220397-1 | 2-Critical | BT2220397 | Modifying iRule proc while iRule in use may cause connection to reset |
| 2220285-1 | 2-Critical | BT2220285 | Modifying iRule proc with ILX::call may result in tmm crash |
| 2208821-3 | 2-Critical | BT2208821 | VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade★ |
| 2131085-2 | 2-Critical | BT2131085 | Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state |
| 1481889-5 | 2-Critical | BT1481889 | High CPU utilization or crash when CACHE_REQUEST iRule parks. |
| 1091021-8 | 2-Critical | BT1091021 | The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive. |
| 978953-6 | 3-Major | BT978953 | The value of the sys db variable vlan.backplane.mtu intermittently out-of-sync with the value of the MTU of the kernel interface tmm_bp during the initial boot up |
| 976853-3 | 3-Major | BT976853 | SNAT pool traffic-group setting may override non-floating self IP's traffic-group |
| 967353-10 | 3-Major | BT967353 | HTTP proxy should trim spaces between a header field-name and colon in its downstream responses. |
| 950665-3 | 3-Major | BT950665 | Pool and pool members created for dynamic ECMP routes are not freed |
| 928445-11 | 3-Major | BT928445 | HTTPS monitor is down when server_ssl profile cipher string is configured to TLSv1_2 |
| 912293-9 | 3-Major | BT912293 | Persistence might not work properly on virtual servers that utilize address lists★ |
| 905477-9 | 3-Major | BT905477 | The sdmd daemon cores during config sync when multiple devices configured for iRules LX |
| 898389-9 | 3-Major | BT898389 | Traffic is not classified when adding port-list to virtual server from GUI |
| 881937-7 | 3-Major | BT881937 | TMM and the kernel choose different VLANs as source IPs when using IPv6. |
| 867985-9 | 3-Major | BT867985 | LTM policy with a 'shutdown' action incorrectly allows iRule execution |
| 857769-6 | 3-Major | BT857769 | FastL4+HTTP or FastL4+Hash-Persistence virtual servers do not work correctly in DSR mode. |
| 842137-9 | 3-Major | BT842137 | Keys cannot be created on module protected partitions when strict FIPS mode is set |
| 812693-8 | 3-Major | BT812693 | Connection in FIN_WAIT_2 state may fail to be removed |
| 779137-10 | 3-Major | BT779137 | Using a source address list for a virtual server does not preserve the destination address prefix |
| 751451-7 | 3-Major | BT751451 | When upgrading to v14.0.0 or later, the 'no-tlsv1.3' option is missing from HTTPS monitors automatically created server SSL profiles |
| 739475-10 | 3-Major | BT739475 | Site-Local IPv6 Unicast Addresses support. |
| 687044-9 | 3-Major | BT687044 | Tcp-half-open monitors might mark a node up or down in error |
| 683706-9 | 3-Major | BT683706 | Monitor status may show 'checking' after a pool member has been manually forced down |
| 637613-10 | 3-Major | K24133500, BT637613 | Cluster blade status immediately returns to enabled/green after it is disabled. |
| 2288173-3 | 3-Major | BT2288173 | Some TMMs not ready and failed to bring up full cluster due to failed cmp dag transition |
| 2287865-2 | 3-Major | BT2287865 | Dynamic CRL always fails connections that use self-signed certificates |
| 2279009-1 | 3-Major | BT2279009 | With large configured receive-window-size, BIG-IP advertises non-zero SYN/SYN-ACK window, but zero window in final 3WHS ACK and all subsequent packets |
| 2269969-3 | 3-Major | BT2269969 | Using TCP congestion BBR might lead to TMM core |
| 2264037-2 | 3-Major | BT2264037 | TMM may generate a core file after an SSL cipher group is deleted |
| 2262981-4 | 3-Major | BT2262981 | TMM may corrupt stack during class lookup |
| 2251517-3 | 3-Major | BT2251517 | Stream profile is not supported on HTTP/2 Full proxy (HTTP MRF Router enabled) |
| 2244393-3 | 3-Major | BT2244393 | TLS 1.3 sessions are unnecessarily cached |
| 2230709-2 | 3-Major | BT2230709 | iRule class match fails after modifying IP data group entries with route-domains |
| 2230705-3 | 3-Major | BT2230705 | SSL handshake failure with Session Ticket that is rejected by backend server |
| 2230597-3 | 3-Major | BT2230597 | Under syncookie mode, temporary listeners may fail to complete connections |
| 2227513-3 | 3-Major | BT2227513 | Tmm crash in Google Cloud during a live migration |
| 2224537-3 | 3-Major | BT2224537 | Tmm crash in Google Cloud during a live migration |
| 2223645-3 | 3-Major | BT2223645 | BIG-IP does not implement traffic forwarding as per RFC 3927 |
| 2222141 | 3-Major | BT2222141 | JSON parser does not reject certain invalid JSON patterns that violate RFC 8259 |
| 2221017-3 | 3-Major | BT2221017 | The BIG-IP virtio driver may core during startup |
| 2220009-1 | 3-Major | BT2220009 | OCSP monitoring of traffic certificates using a proxy server sends malformed HTTP host header |
| 2217093-3 | 3-Major | BT2217093 | L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used |
| 2211133-3 | 3-Major | BT2211133 | ICMP error length does not follow RFC 812 guidance |
| 2209157-3 | 3-Major | BT2209157 | FastL4 late binding does not proxy MSS when establishing server-side connection. |
| 2199469-3 | 3-Major | BT2199469 | Serverssl-use-sni not working in HTTP2 to HTTP gateway setups. |
| 2197321-1 | 3-Major | BT2197321 | BIG-IP does not select FFDHE key share provided by the client on session resumption. |
| 2197305-1 | 3-Major | BT2197305 | BIG-IP generates invalid SSL key share |
| 2186933-4 | 3-Major | ILX Plugin may not work after use of npm install command on workspace. | |
| 2183917-3 | 3-Major | BT2183917 | BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled |
| 2181929-3 | 3-Major | BT2181929 | Cipher suite order changes in cipher group after upgrading from v17.1.1.1 to v17.1.3★ |
| 2151885-3 | 3-Major | BT2151885 | When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash. |
| 2144309-3 | 3-Major | BT2144309 | TMM might experience a crash when using a fix for Bug783077 |
| 2141297-3 | 3-Major | BT2141297 | In TLSv1.3, BIG-IP enforces the use of FFDHE key share if it is preferred over other DH groups★ |
| 2139637-3 | 3-Major | BT2139637 | TMM crash because of invalid context |
| 2132209-3 | 3-Major | BT2132209 | TMM crash while sending ACKs in invalid context |
| 2033781-4 | 3-Major | BT2033781 | Memory allocation failed: can't allocate memory to extend db size |
| 1989033-4 | 3-Major | BT1989033 | IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT |
| 1987405-4 | 3-Major | BT1987405 | Virtual address ICMP and ARP setting might be inconsistent when traffic-matching-criteria is in use. |
| 1977037-2 | 3-Major | K000153024, BT1977037 | TMM Virtual Edition on Azure goes into crash loop due to missing kernel driver★ |
| 1935713-3 | 3-Major | BT1935713 | TMM crash when handling traffic over vlangroup with autolasthop disabled |
| 1930897-5 | 3-Major | BT1930897 | Tmm core due to overflow of ifc ref counts with flow forwarding |
| 1889741-3 | 3-Major | BT1889741 | Need for the SYS DB variable to toggle ssl_crypto::queue_max |
| 1778793-4 | 3-Major | BT1778793 | Database health monitors may use the wrong connection when attempting to connect to database |
| 1758193-2 | 3-Major | BT1758193 | Trunk with LACP and virtual-wire flaps after an upgrade.★ |
| 1708309-4 | 3-Major | BT1708309 | Dynconfd crash with invalid ephemeral pool member |
| 1589629-5 | 3-Major | BT1589629 | An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address |
| 1505753-4 | 3-Major | BT1505753 | Maximum Fragment Length extension is not visible in ServerHello even though it is present in ClientHello |
| 1474877-5 | 3-Major | BT1474877 | Unable to download large files through VIP due RST Compression error. |
| 1463089-2 | 3-Major | BT1463089 | TMM crash because of corrupted MQTT queue |
| 1440409-8 | 3-Major | BT1440409 | TMM might crash or leak memory with certain logging configurations |
| 1407949-6 | 3-Major | BT1407949 | iRules using regexp or regsub command with large expression can lead to SIGABRT. |
| 1380009-4 | 3-Major | BT1380009 | TLS 1.3 server-side resumption resulting in TMM crash due to NULL session |
| 1341093-6 | 3-Major | BT1341093 | MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile |
| 1325649-4 | 3-Major | BT1325649 | POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member |
| 1231889-6 | 3-Major | BT1231889 | Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances |
| 1196505-3 | 3-Major | BT1196505 | BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use. |
| 1148053-2 | 3-Major | BT1148053 | When client SSL profile has "cache-size 0" or "authenticate always", BIG-IP is unable to decrypt client-side traffic when using tcpdump with "--f5 ssl" method |
| 1137521-3 | 3-Major | BT1137521 | TLSv1.3 connections dropped when SSL Persistence is enabled |
| 1128033-6 | 3-Major | BT1128033 | Neuron client constantly logs errors when TCAM database is full |
| 1087569-8 | 3-Major | BT1087569 | Changing max header table size according HTTP2 profile value may cause stream/connection to terminate |
| 1086473-8 | 3-Major | BT1086473 | BIG-IP resumes a TLS session on the client-side but then proceeds to do a full handshake |
| 1075045-7 | 3-Major | BT1075045 | Proxy initialization failed, Defaulting to DENY, after applying additional profile to a virtual server |
| 1064725-6 | 3-Major | BT1064725 | CHMAN request for tag:19 as failed. |
| 1060541-6 | 3-Major | BT1060541 | Increase in bigd CPU utilization from 13.x when SSL/TLS session resumption is not utilized by HTTPS pool members due to Open SSL upgrade |
| 1043985-7 | 3-Major | BT1043985 | After editing an iRule, the execution order might change. |
| 1026781-7 | 3-Major | BT1026781 | Standard HTTP monitor send strings have double CRLF appended |
| 1019641-7 | 3-Major | BT1019641 | SCTP INIT_ACK not forwarded |
| 1002969-8 | 3-Major | BT1002969 | Csyncd can consume excessive CPU time★ |
| 932553-10 | 4-Minor | BT932553 | An HTTP request is not served when a remote logging server is down |
| 804089-5 | 4-Minor | BT804089 | iRules LX Streaming Extension dies with Uncaught, unspecified error event |
| 2151601-1 | 4-Minor | BT2151601 | No tmsh command to remove the stateless directive from a virtual server |
| 2144029-1 | 4-Minor | BT2144029 | DB monitor does not use the correct timezone present in the system |
| 2077357-3 | 4-Minor | BT2077357 | Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC. |
| 1100421-3 | 4-Minor | BT1100421 | HTTP/2 full-proxy virtual server uses wrong source MAC address and incorrect SNAT address selection |
| 1004953-8 | 4-Minor | BT1004953 | HTTP does not fall back to HTTP/1.1★ |
Performance Issues
| ID Number | Severity | Links to More Info | Description |
| 1574521-3 | 5-Cosmetic | BT1574521 | Intermittent high packet latency on R4000 and R2000 tenants |
Global Traffic Manager (DNS) Issues
| ID Number | Severity | Links to More Info | Description |
| 2228869 | 2-Critical | BT2228869 | Continuous tmm cores in domain_table_search with null dereferencing |
| 2224853 | 2-Critical | BT2224853 | BIG-IP DNS may not respond to RRSIG type queries correctly with DNSSEC zones |
| 1962713 | 2-Critical | BT1962713 | Limit on BIND maximum records per type★ |
| 1083405-8 | 2-Critical | BT1083405 | "Error connecting to named socket" from zrd |
| 1031945-7 | 2-Critical | BT1031945 | DNS cache configured and TMM is unresponsive in 'not ready' state indefinitely after TMM restart or reboot★ |
| 936777-10 | 3-Major | BT936777 | Old local config is synced to other devices in the sync group. |
| 821589-7 | 3-Major | BT821589 | DNSSEC does not insert NSEC3 records for NXDOMAIN responses |
| 751540-8 | 3-Major | BT751540 | GTM Sync group not syncing properly with multiple self IP addresses configured on one VLAN but not all configured for GTM server |
| 705869-8 | 3-Major | BT705869 | TMM crashes as a result of repeated loads of the GeoIP database |
| 2264845-3 | 3-Major | BT2264845 | TMM may crash when enabling DNS Express |
| 2263101-1 | 3-Major | TMSH rrset commands do not list DNS cache serve-expired records | |
| 2261137-1 | 3-Major | BT2261137 | TMM may crash if DNS cache resolver concurrency settings are changed during live traffic |
| 2252201-1 | 3-Major | BT2252201 | Monitor to GTM link is skipped if there are no devices are associated with the link |
| 222220-12 | 3-Major | K11931 | Distributed application statistics are not passed correctly. |
| 2217181 | 3-Major | When "Publish CDS/CDNSKEY" is enabled for a DNSSEC zone on BIG-IP DNS, the system signs CDS and CDNSKEY records with both the Key Signing Key (KSK) and Zone Signing Key (ZSK) | |
| 2200389-1 | 3-Major | BT2200389 | CDS and CDNSKEY not included in DNSX zone transfer data |
| 2200217-1 | 3-Major | BT2200217 | DNSSEC validation failures due to missing DS records in zone transfers |
| 2199701 | 3-Major | BT2199701 | big3d was stuck in high CPU after network disruption |
| 2187141-3 | 3-Major | BT2187141 | DNS generic server stuck offline after monitor removal |
| 2172069-1 | 3-Major | BT2172069 | GTM topology regions updates do not take effect within tmm |
| 2172041-2 | 3-Major | BT2172041 | Zone transfer fails for dnsx when the zone file contains TLSA records |
| 2161209 | 3-Major | A GTM link can become unmonitored when adding a second link to a datacenter | |
| 2150493 | 3-Major | BT2150493 | BIG-IP DNS (GTM) may associate LTM virtual server names with the wrong GTM virtual-servers |
| 2137661-2 | 3-Major | BT2137661 | GTM link object is deleted automatically after being added |
| 1988953 | 3-Major | BT1988953 | A DNS profile with edns0-client-subnet-insert enabled does not handle EDNS version greater than zero |
| 1970969-4 | 3-Major | BT1970969 | Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache |
| 1965149 | 3-Major | A local zone with "." as its prefix is allowed through tmsh and webui | |
| 1953273-5 | 3-Major | BT1953273 | Big3d high CPU with thousands of https monitors with SNI |
| 1936049 | 3-Major | BT1936049 | A configuration of wideips with same FQDNs but different paths may not be prevented by the control plane |
| 1927993 | 3-Major | BT1927993 | Following knowledge-based article K7032 through steps 1-8 to freeze zone files may lead to a zone loaded before being able to run named-checkzone |
| 1894113 | 3-Major | BT1894113 | GTM pool with min-members-up-value configured causes synchronisation problems after deleting virtual servers on LTM |
| 1857473 | 3-Major | BT1857473 | A BIG-IP monitor may not get removed when changing product type from BIG-IP to Generic Host |
| 1824113 | 3-Major | BT1824113 | GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent. |
| 1754325 | 3-Major | BT1754325 | Disabled status from manual resume on a BIG-IP DNS pool can sync to other BIG-IP DNS devices in synchronization-group |
| 1603605 | 3-Major | BT1603605 | DNS response is malformed when the response message size reaches 2017 bytes |
| 1073673-6 | 3-Major | BT1073673 | Prevent possible early exit from persist sync |
| 464708-7 | 4-Minor | BT464708 | DNS logging does not support Splunk format log |
| 2186625-1 | 4-Minor | BT2186625 | Zone transfer from dns express with dnssec enabled includes extra RRSIG |
| 2130329 | 4-Minor | BT2130329 | [GTM] Deletion of topology records makes MCPD memory ramp up |
| 2047585 | 4-Minor | BT2047585 | Modifying GTM monitor type from https to tcp to back https could set "compatibility" field to "none" |
| 1826485 | 4-Minor | BT1826485 | Creating a GTM pool in a custom partition with a custom route domain via GUI can fail |
| 1642301-5 | 4-Minor | BT1642301 | Loading single large Pulse GeoIP RPM can cause TMM core |
| 1636273 | 4-Minor | In BIND 9.18.28, a new configurable parameter (max-records-per-type) has been introduced with a default limit of 100 to address a security issue. | |
| 1014761-7 | 4-Minor | BT1014761 | [DNS][GUI] Not able to enable/disable pool member from pool member property page |
| 1225941-5 | 5-Cosmetic | BT1225941 | OLH Default Values on Notification and Early Retransmit Settings |
Application Security Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 1934373-3 | 2-Critical | BT1934373 | DoS attack is blocking while transparent |
| 1824745-3 | 2-Critical | BT1824745 | Bd crash and generate core |
| 1787645-4 | 2-Critical | BT1787645 | BD process fail to startup on specific XML configuration |
| 1755113-5 | 2-Critical | BT1755113 | BD crash with specific JSON schema |
| 902445-6 | 3-Major | BT902445 | ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation |
| 2289885-2 | 3-Major | BT2289885 | Malformed protobuf file synced from secondary blades cause asmlogs coredump |
| 2260293-3 | 3-Major | LiveUpdate status stuck on Pending after successful installation | |
| 2256725-1 | 3-Major | Unable to trigger "Disallowed file upload content detected" violation in some cases | |
| 2252129-1 | 3-Major | The database (BD) fails to start up (restart loops) | |
| 2225313-3 | 3-Major | ASM CAPTCHA refresh and audio icons are missing after policy import | |
| 2200537-2 | 3-Major | BT2200537 | Audio captcha script error |
| 2200405-3 | 3-Major | BT2200405 | Live Update proxy.host value requires brackets around IPv6 Addresses |
| 2185537-3 | 3-Major | BT2185537 | Application Security Administrator role cannot edit the General Settings of parent policies from the GUI |
| 2185109-3 | 3-Major | High memory usage in REST query for ASM policies and virtualServers with huge L7 policy | |
| 2053893-4 | 3-Major | BT2053893 | Incompletely-synced ASM configuration can be synced back to the original device or group |
| 1920637-4 | 3-Major | BT1920637 | Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade★ |
| 1848541-1 | 3-Major | BT1848541 | Invalid regular expression causing bd restart loop |
| 1827821-3 | 3-Major | BT1827821 | isBase64 params and headers not blocking Attack Signatures |
| 1772353-3 | 3-Major | BT1772353 | Defaults for Associated Violations are re-added to a policy |
| 1586877-3 | 3-Major | BT1586877 | Behavior difference in auto-full sync virtual server and manual-incremental config sync |
| 1429813-6 | 3-Major | BT1429813 | ASM introduce huge delay from time to time |
| 1280813-5 | 3-Major | BT1280813 | 'Illegal URL' violation may trigger after upgrade |
| 1021201-3 | 3-Major | BT1021201 | JSON parser is not fully UTF-8 compliant |
| 638863-4 | 4-Minor | BT638863 | Attack Signature Detected Keyword is not masked in the logs |
| 2230613-3 | 4-Minor | Bot defense stateful anomalies and microservices not fully enforced on blade setups | |
| 2228753-1 | 4-Minor | BT2228753 | Violation_details may contain unexpected line break |
| 2162873-3 | 4-Minor | Pipe and backslash characters are not escaped in ArcSight CEF remote logging | |
| 2149333-1 | 4-Minor | BT2149333 | BD_XML logs memory usage at TS_DEBUG level |
| 1782057-4 | 4-Minor | BT1782057 | BD crash related to dns lookup |
| 1572045-3 | 4-Minor | BT1572045 | Login page config parameters are still case-sensitive with a case insensitive policy |
| 1036289-4 | 4-Minor | BT1036289 | Signature ID not displayed in Attack Signature details |
Application Visibility and Reporting Issues
| ID Number | Severity | Links to More Info | Description |
| 1848577-3 | 2-Critical | BT1848577 | VCMP guest stats are not visible on vCMP host GUI nor CLI |
| 1294141-8 | 3-Major | BT1294141 | ASM Resources Reporting graph displays over 1000% CPU usage |
| 868801-6 | 4-Minor | BT868801 | BIG-IP still sends STARTTLS if the 'No encryption' SNMP option is enabled |
| 1298225-4 | 4-Minor | BT1298225 | Avrd generates core when dcd becomes unavailable due to some reason |
Access Policy Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2219209-1 | 2-Critical | BT2219209 | Resetting profile statistics may lead to memory corruption |
| 2211137-3 | 2-Critical | BT2211137 | EPSEC upgrade fails when default package is pre-uploaded★ |
| 2186185-1 | 2-Critical | BT2186185 | Apmd occasionally fails to process a request if SecurID agent is present |
| 2171921-2 | 2-Critical | BIG-IP APN and VPN - ACCESS can leak HUDEVT_REQUEST_DONE after responding | |
| 2162861-3 | 2-Critical | BT2162861 | 'Connectors' creation screen does not appear |
| 995877-3 | 3-Major | BT995877 | Edge Client 'Save Password'' checkbox not visible when 'Allow Password Caching' method is 'memory' |
| 527119-12 | 3-Major | BT527119 | An iframe document body might be null after iframe creation in rewritten document. |
| 2285101 | 3-Major | APM policy export (ng_export) resulting in import failure for default oauth-request objects | |
| 2258853-2 | 3-Major | BT2258853 | [APM][SAML] SP automation fails to update, when bound to an IdP with a SAML Resource |
| 2256681-1 | 3-Major | BT2256681 | [APM] ECA random rumber fetch is stuck after forced TMM Core |
| 2198721-1 | 3-Major | BT2198721 | SAML apmd memory leak |
| 2198589-3 | 3-Major | BT2198589 | BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client |
| 2183233-3 | 3-Major | BT2183233 | TMM crash due to extra trailing CR/LF in iSession reconnects |
| 2152545-2 | 3-Major | BT2152545 | [APM][SAML] High TMM memory sso_saml leak |
| 2137909-2 | 3-Major | BT2137909 | Portal Access: unwanted decoding html entities in attribute values of HTML tags★ |
| 2047137-3 | 3-Major | BT2047137 | TMM core may occur while using APM VDI with Blast UDP |
| 1621977-1 | 3-Major | BT1621977 | Rewrite memoryleak with "REWRITE::disable" irule |
| 1586405-4 | 3-Major | BT1586405 | "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page |
| 1290937-4 | 3-Major | 'contentWindow' of a dynamically genereated iframe becomes null | |
| 1074285-5 | 3-Major | BT1074285 | Apmd crashes while handling JWT tokens. |
| 1071021-5 | 3-Major | BT1071021 | Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM |
| 1022361-3 | 3-Major | BT1022361 | Edge Client shows HTML encoding for non-English endpoint inspection message |
| 893161-3 | 4-Minor | BT893161 | Internal request to volatile.html used for cookie transport in Portal Access is sometime rewritten |
| 869541-6 | 4-Minor | BT869541 | Series of unexpected <aborted> requests to same URL |
| 869121-6 | 4-Minor | BT869121 | Logon Page configured after OAuth client in access policy VPE, get error message Access policy evaluation is already in progress for your current session |
| 745645-5 | 4-Minor | BT745645 | Portal Access does not rewrite the script element with textNode children |
| 349706-7 | 4-Minor | NetworkAccess assigns 1.1.1.1 address to remote ppp endpoint APM VPN |
Service Provider Issues
| ID Number | Severity | Links to More Info | Description |
| 2187429-3 | 2-Critical | BT2187429 | TMM might crash when using MRF framework. |
| 1268373-9 | 2-Critical | BT1268373 | MRF flow tear down can fill up the hudq causing leaks |
| 2230889-3 | 3-Major | BT2230889 | SIP parser mishandles RFC 3261 folded headers, causing 200 OK forwarding failure with iRule routing |
| 1156149-7 | 3-Major | BT1156149 | Early responses on standby may cause TMM to crash |
| 836205-4 | 4-Minor | [SIP-MRF] Transport-config source port behavior changed needs after upgrading to version with new source-port-mode attribute | |
| 2153897-1 | 4-Minor | BT2153897 | BIG-IP closes the transport connection immediately after sending a DPA to a peer |
Advanced Firewall Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 680804-6 | 2-Critical | BT680804 | TMM restart due to delayed keep alives |
| 2144397-3 | 2-Critical | BT2144397 | Problems compiling firewall policies when they contain rules using huge address lists |
| 1974869-3 | 2-Critical | BT1974869 | Unable to load config after upgrading to v17.1.3/v17.5.x with the Syntax Error: "state" may not be specified more than once.★ |
| 1671149-5 | 2-Critical | BT1671149 | Timestamp cookies may cause issue for PVA-accelerated connections |
| 2218157-3 | 3-Major | BT2218157 | IP Intelligence database load log displayed periodically |
| 2217793-3 | 3-Major | BT2217793 | I5800 AFM 17.5.1.3 - After upgrade to 17.5.1.3, unable to reorder rules under AFM policy.★ |
| 2196597-1 | 3-Major | BT2196597 | TMM generates core when large firewall policy is attached to multiple virtual servers due to SOD watchdog timeout |
| 2138181-1 | 3-Major | BT2138181 | Low thresholds for tcp-ack-ts vector caused outage after BIG-IP upgrade to 17.1.3★ |
| 1991717-1 | 3-Major | BT1991717 | Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN's★ |
| 1934865-3 | 3-Major | BT1934865 | Remove multiple redundant entries for port-list objects in configuration file |
| 1818861-4 | 3-Major | BT1818861 | Timestamp cookies are not compatible with fastl4 mirroring. |
| 1282029-2 | 3-Major | BT1282029 | Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0★ |
| 760355-8 | 4-Minor | BT760355 | Firewall rule to block ICMP/DHCP from 'required' to 'default'★ |
| 1366269-6 | 4-Minor | BT1366269 | NAT connections might not work properly when subscriber-id is confiured. |
Policy Enforcement Manager Issues
| ID Number | Severity | Links to More Info | Description |
| 2262537-1 | 2-Critical | BT2262537 | pem_sessiondump crashes when listing subscriber sessions with custom attributes |
| 2195709-1 | 4-Minor | BT2195709 | TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system. |
Carrier-Grade NAT Issues
| ID Number | Severity | Links to More Info | Description |
| 2229185-1 | 4-Minor | BT2229185 | Virtual server stops responding to ICMP requests |
| 1128429-9 | 4-Minor | BT1128429 | Rebooting one or more blades at different times may cause traffic imbalance results High CPU |
Anomaly Detection Services Issues
| ID Number | Severity | Links to More Info | Description |
| 2263657-3 | 3-Major | BT2263657 | Crash in Bados Signature Management operations results in a memory leak |
Traffic Classification Engine Issues
| ID Number | Severity | Links to More Info | Description |
| 2141109-2 | 1-Blocking | BT2141109 | The URL categorisation daemon's DNS cache is never refreshed |
| 2229525-3 | 2-Critical | BT2229525 | TMM crash due to stale shared memory mapping after wr_urldbd restart |
| 1824965-5 | 3-Major | Implement iRule support to fetch SNI from SSL, HTTP and QUIC traffic |
Device Management Issues
| ID Number | Severity | Links to More Info | Description |
| 942521-10 | 3-Major | BT942521 | Certificate Managers are unable to move certificates to BIG-IP via REST |
| 717174-8 | 3-Major | BT717174 | WebUI shows error: Error getting auth token from login provider★ |
Protocol Inspection Issues
| ID Number | Severity | Links to More Info | Description |
| 760740-6 | 3-Major | BT760740 | Mysql error is displayed when saving UCS configuration on BIG-IP system when MySQL is not running |
| 2217273-2 | 3-Major | BT2217273 | TMM crashes with a SIGFPE when it receives IPS traffic. |
| 2144053-1 | 3-Major | BT2144053 | IPS hitless upgrade results in TMM clock advance★ |
| 1069977-4 | 3-Major | BT1069977 | Repeated TMM SIGABRT during ips_flow_process_data |
In-tmm monitors Issues
| ID Number | Severity | Links to More Info | Description |
| 1019261-7 | 3-Major | BT1019261 | In-TMM HTTPS monitor with SSL Profile set to None does not use serverssl profile. |
| 1002345-7 | 3-Major | BT1002345 | Transparent monitor does not work after upgrade★ |
SSL Orchestrator Issues
| ID Number | Severity | Links to More Info | Description |
| 2181633-1 | 3-Major | BT2181633 | Large BIG-IP SSL Orchestrator deployments can cause tmm crash |
| 2138273-3 | 3-Major | BT2138273 | Named service fails to start after an upgrade due to unsupported attributes in the named.conf file★ |
| 1589269-4 | 3-Major | BT1589269 | The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★ |
Client-Side Defense Issues
| ID Number | Severity | Links to More Info | Description |
| 2229625-1 | 3-Major | BT2229625 | Client Side Defense silently fails with an empty 200 response when there is no route to the XC server |
F5OS Messaging Agent Issues
| ID Number | Severity | Links to More Info | Description |
| 2240945-1 | 1-Blocking | platform_agent crash when deleting a virtual_server. | |
| 1690005-3 | 3-Major | BT1690005 | Unable to ping the floating self addresses from the Standby tenant |
Known Issue details for BIG-IP v21.0.x
995877-3 : Edge Client 'Save Password'' checkbox not visible when 'Allow Password Caching' method is 'memory'
Links to More Info: BT995877
Component: Access Policy Manager
Symptoms:
The 'Save Password' checkbox is not displayed.
Conditions:
-- 'Allow Password Caching' is selected in the connectivity profile.
-- The 'Allow Password Caching' method is 'memory'.
-- From the Edge Client, access the virtual server.
Impact:
The 'Save Password' option does not exist on the logon page.
Workaround:
Use the 'disk' option in 'Allow Password Caching' instead of 'memory'.
978953-6 : The value of the sys db variable vlan.backplane.mtu intermittently out-of-sync with the value of the MTU of the kernel interface tmm_bp during the initial boot up
Links to More Info: BT978953
Component: Local Traffic Manager
Symptoms:
During the initial boot of the device the MTU of the tmm_bp kernel interface is out-of-sync with the value of sys db vlan.backplane.mtu as well as out-of-sync with the MTU displayed by the following command:
tmsh show /net vlan all-properties -hidden.
tmsh list net vlan tmm_bp all-properties -hidden.
Additionally, running the following command:
modify sys db vlan.backplane.mtu value <some value> (within the range accepted), and saving the configuration change does not last through a reboot.
Conditions:
This issue occurs on the first boot intermittently.
Impact:
When the values are seen at non-sync, after the modification of the backplane vlan mtu and saving the config, changing the mtu config value does not last through a reboot.
Workaround:
Rebooting the device resolves the issue
977953-8 : Show running config interface CLI could not fetch the interface info and crashes the imi
Links to More Info: BT977953
Component: TMOS
Symptoms:
The confd command 'show running-config' does not display interface information if nsm and bgpd are the only processes running.
If you run 'show running-config interface', imi crashes.
Conditions:
1. nsm and bgpd are the daemons running.
2. Run the "show running-config" command
Impact:
Imish cannot retrieve interface information from the show running-config command.
Workaround:
* Enable OSPF. For example,
# tmsh modify /net route-domain 0 routing-protocol add { BGP OSPFv3 }
# ps -ef | egrep -i ospf
root 11954 4654 0 11:25 ? S 0:00 ospf6d%0
976853-3 : SNAT pool traffic-group setting may override non-floating self IP's traffic-group
Links to More Info: BT976853
Component: Local Traffic Manager
Symptoms:
A non-floating self IP fails to respond to ARP on the standby system.
Conditions:
An LTM SNAT translation address has been created which matches a non-floating self IP on the system, and the SNAT is configured in a floating traffic group.
Impact:
A standby device does not respond to ARP requests for floating IP addresses. If a SNAT is configured on the same IP as a non-floating self-ip on the standby, ARP responses will be disabled for that self-ip.
Even after deleting the snat, or configuring it for another IP, ARP response for that self-ip will remain disabled.
The effect of this will be that other IP devices will be unable to communicate with the self-ip after the ARP entry times out.
For example:
-- BIG-IP does not respond to ARP requests for the non-floating self-ip
-- ConfigSync no longer working (if the affected self IP is the ConfigSync address)
-- Health check traffic fails
Note that simply deleting the SNAT translation will not restore service to the self-ip.
Workaround:
Delete the SNAT address, and then move the self-ip back to the non-floating traffic group, and disable and re-enable the arp setting by creating a virtual-address with the same IP in the non-floating traffic-group, and then deleting it.
tmsh create ltm virtual-address <self-ip> arp enabled traffic-group traffic-group-local-only
tmsh modify ltm virtual-address <self-ip> arp disabled
tmsh delete ltm virtual-address <self-ip>
Alternatively, after deleting the SNAT translation, reboot the device (or at least restart tmm). When using this approach on multi-blade chassis devices, all blades need to be restarted.
967769-5 : During reset of high-speed interfaces, TMMs may mistakenly continue hardware watchdog checks
Links to More Info: BT967769
Component: TMOS
Symptoms:
Tmm crashes and restarts. The following panic message is found in /var/log/tmm:
notice panic: ../dev/hsb/if_hsb.c:6129: Assertion "HSB lockup, see ltm and tmm log files" failed.
Conditions:
-- Some error or glitch is detected on the high-speed bus (HSB).
-- Software commands a reset of the HSB and interface hardware.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
967353-10 : HTTP proxy should trim spaces between a header field-name and colon in its downstream responses.
Links to More Info: BT967353
Component: Local Traffic Manager
Symptoms:
Client receives no response along with a connection reset by the BIG-IP system.
Conditions:
-- HTTP profile is enabled on the BIG-IP system.
-- Server sends HTTP response with one or more header field names separated with the trailing colon by a space.
Impact:
HTTP responses that should be delivered to the client by the proxy are not being sent out.
Workaround:
None
950665-3 : Pool and pool members created for dynamic ECMP routes are not freed
Links to More Info: BT950665
Component: Local Traffic Manager
Symptoms:
-- Dynamic ECMP routes.
-- High usage of TMM memory may be reported.
-- The ltm log may record the following errors:
err merged[9436]: 011b0900:3: TMSTAT error tmstat_remerge: Cannot allocate memory.
Conditions:
Dynamic routing is used and routes with more then one nexthop are repeatedly added and removed by the router(s)
Impact:
- tmm memory leak
- tmstat segments for tmm could grow very large.
Workaround:
Use a default gateway pool instead of dynamic routing for routes with more then one nexthop - https://support.f5.com/csp/article/K15582
942521-10 : Certificate Managers are unable to move certificates to BIG-IP via REST
Links to More Info: BT942521
Component: Device Management
Symptoms:
You cannot upload a cert/key via the REST API if you are using a certificate manager account
Conditions:
-- Using the REST API to upload a certificate and/or key
-- User is logged in as a Certificate Manager
Impact:
Unable to upload certificates as Certificate Manager
Workaround:
Use admin account instead of using Certificate Manager account to upload certs and keys
941961-9 : Upgrading system using WAM TCP profiles may prevent the configuration from loading
Links to More Info: BT941961
Component: TMOS
Symptoms:
If a BIG-IP is on version 13.1.0 through 15.1.x and has profiles in use that use wam-tcp-wan-optimized and/or wam-tcp-lan-optimized as parent profiles, then when the configuration is upgraded to 16.0.0, the configuration fails to load, with an error similar to:
err mcpd[10087]: 01020036:3: The requested parent profile (/Common/wam-tcp-wan-optimized) was not found.
On devices that are provisioned with not just the LTM module this may lead to an out of memory condition as the config load failure prevents memory provisioning completing leaving too little 4KB page (host) memory and too much huge page memory.
If suffering memory pressure then management access to device will be sluggish or not possible.
Conditions:
-- Upgrading from version 13.1.0 through 15.1.x.
-- Using profiles derived from wam-tcp-wan-optimized and/or wam-tcp-lan-optimized.
Impact:
Configuration does not load.
Workaround:
Remove these profiles and adjust the configuration elements that use them accordingly. If it is difficult to work on the device it may be necessary to rollback to earlier version and make changes there. Usually it would be better then to delete newer software volume and reinstall it at which point the modified config will be copied across and installed on newer volume.
Here are two examples:
-- Copy the definition of 'wam-tcp-wan-optimized' from /defaults/wam_base.conf into /config/bigip.conf, and then reload the configuration.
-- Change the references to wam-tcp-wan-optimized to something else in your config file (e.g., tcp-wan-optimized), and then reload the configuration.
936777-10 : Old local config is synced to other devices in the sync group.
Links to More Info: BT936777
Component: Global Traffic Manager (DNS)
Symptoms:
Newly added DNS/GTM device may sync old local config to other devices in the sync group.
Conditions:
Newly added DNS/GTM device has a more recent change than other devices in the sync group.
Impact:
Config on other DNS/GTM devices in the sync group are lost.
Workaround:
You can use either of the following workarounds:
-- Make a small DNS/GTM configuration change before adding new devices to the sync group.
-- Make a small DNS/GTM configuration change on the newly added device to re-sync the correct config to other DNS/GTM devices.
932553-10 : An HTTP request is not served when a remote logging server is down
Links to More Info: BT932553
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide an option to sanitize HTTP traffic via the http_security profile. When the profile is configured to alarm on a violation, it is possible that a connection to the violating client is reset if a remote logging server is marked down.
Conditions:
-- A BIG-IP system has an HTTP profile and and an http_security profile with the alarm option set.
-- A remote logging server is configured via a BIG-IP pool.
-- The pool has a monitor that marks all the pool members down.
-- A request with an HTTP violation is processed and triggers an alarm configured in the http_security profile.
Impact:
-- A TCP connection to a client is reset by the BIG-IP system.
-- The web page may not render, or may not render as expected.
-- Data are not delivered to a server with a POST request.
Workaround:
None.
929173-9 : Watchdog reset due to CPU stall detected by rcu_sched
Links to More Info: BT929173
Component: TMOS
Symptoms:
Rcu_sched detected CPU stall, which can cause vCMP host reboot. The device reboots without core and records "Host Watchdog timeout."
Typically there will logs in kern.log similar to:
err kernel: : [526684.876928] INFO: rcu_sched detected stalls on CPUs/tasks: ...
Conditions:
Host undergoing a watchdog reset in a vCMP environment.
Impact:
CPU RCU stalls and host watchdog reboots
928665-8 : Kernel nf_conntrack table might get full with large configurations.
Links to More Info: BT928665
Component: TMOS
Symptoms:
Linux host connections are unreliable, and you see warning messages in /var/log/kern.log:
warning kernel: : [182365.380925] nf_conntrack: table full, dropping packet.
Conditions:
This can occur during normal operation for configurations with a large number of monitors, for example, 15,000 or more active entries.
Impact:
Monitors are unstable/not working at all.
Workaround:
1. Modify /etc/modprobe.d/f5-platform-el7-conntrack-default.conf
increasing the hashsize value:
options nf_conntrack hashsize=262144
2. Save the file.
3. Reboot the system.
928445-11 : HTTPS monitor is down when server_ssl profile cipher string is configured to TLSv1_2
Links to More Info: BT928445
Component: Local Traffic Manager
Symptoms:
HTTPS monitor is down when the Server SSL profile associated with the monitor utilises a cipher string containing a keyword such as '!TLSv1_1' or '!TLSv1_2' to disable TLS protocol version.
A configured cipher string, such as TLSv1_2 or TLSv1_1 is rejected by OpenSSL.
Conditions:
-- Pool member is attached to the HTTPS monitor.
-- HTTPS monitor is configured with a Server SSL profile.
-- Server SSL profile is configured with cipher string containing a keyword such as '!TLSv1_2' and/or '!TLSv1_1' to disable TLS protocol version.
Impact:
Pool status is down.
Workaround:
-- Enable 'in-tmm' monitoring.
-- Use the 'Options List' setting available in the Server SSL profile to disable TLS protocol version instead of cipher string.
-- Use the same cipher string with cipher group / cipher rule that is attached to the SSL profile.
923745-8 : Ctrl-Alt-Delete in virtual console reboots BIG-IP Virtual Edition
Links to More Info: BT923745
Component: TMOS
Symptoms:
A device reboot occurs upon sending a Ctrl-Alt-Del signal to the console of a BIG-IP Virtual Edition (VE) virtual machine.
Conditions:
This occurs when pressing Ctrl-Alt-Del or sending the command to a BIG-IP Virtual Edition (VE) virtual console.
This signal may be sent in different ways according to the interface used to connect to the console of the BIG-IP virtual machine.
Impact:
Accidental reboots of the BIG-IP VE instance are possible. You should not reboot a BIG-IP VE instance using Ctrl-Alt-Del.
Workaround:
To disallow the effect of this key chord, run the following command from the advanced shell (bash):
systemctl mask ctrl-alt-del.target
921069-7 : Neurond cores while adding or deleting rules
Links to More Info: BT921069
Component: TMOS
Symptoms:
Neurond cores if it receives error while adding or deleting rules in neuron hardware.
Conditions:
Adding or deleting rules in neuron hardware
Impact:
Neurond cores
Workaround:
None
912293-9 : Persistence might not work properly on virtual servers that utilize address lists★
Links to More Info: BT912293
Component: Local Traffic Manager
Symptoms:
-- Connections to the virtual server might hang.
-- Increased tmm CPU utilization. This can occur after upgrading.
Conditions:
-- A virtual server is configured with a traffic-matching-criteria that utilizes a source-address-list and/or destination-address-list.
-- The virtual server utilizes certain persistence one of the following persistence types:
+ Source Address (but not hash-algorithm carp)
+ Destination Address (but not hash-algorithm carp)
+ Universal
+ Cookie (only cookie hash)
+ Host
+ SSL session
+ SIP
+ Hash (but not hash-algorithm carp)
Impact:
-- High tmm CPU utilization.
-- Stalled connections.
Workaround:
Enable match-across-virtuals in the persistence profile.
Note: Enabling match-across-virtuals might affect the behaviour of other virtual servers in the configuration that utilise persistence.
905477-9 : The sdmd daemon cores during config sync when multiple devices configured for iRules LX
Links to More Info: BT905477
Component: Local Traffic Manager
Symptoms:
The iRules LX workspaces belong on only one device in a Device Service Cluster (DSC) (config sync device-group). If you have the same iRules LX workspace configured on multiple devices and then perform a config sync operation, the sdmd daemon cores.
Conditions:
-- Multiple devices configured with the same iRules LX workspace in a DSC.
-- Change one of the devices such that the configuration requires a config sync.
-- Perform the config sync.
Impact:
The sdmd daemon cores. Although having multiple devices configured with the same iRules LX workspace is an incorrect configuration, sdmd should not core.
Workaround:
When the iRules LX workspace is correctly configured, i.e., on only one device in a DSC, there is no need to config sync, so this issues does not occur.
902445-6 : ASM Policy Event Logging stops working after 'No space in shmem' error disconnection mitigation
Links to More Info: BT902445
Component: Application Security Manager
Symptoms:
ASM event logging stops working.
Conditions:
This can occur during normal ASM operation. It occurs after ASM executes 'No space in shmem' error disconnection mitigation, and this error is logged.
Impact:
ASM Policy Event Logging stop working; new event is not saved.
Workaround:
Restart asmlogd and pabnagd:
pkill asmlogd
pkill pabnagd
898389-9 : Traffic is not classified when adding port-list to virtual server from GUI
Links to More Info: BT898389
Component: Local Traffic Manager
Symptoms:
Traffic is not matching to the virtual server.
Conditions:
Using the GUI to configure traffic-matching-criteria by adding port-list to the virtual server.
Impact:
Traffic loss.
Workaround:
Creating traffic-matching-criteria from the command line
root@(localhost)(cfg-sync Standalone)(Active)(/Common)(tmos)# create ltm traffic-matching-criteria tmc_name_here destination-address-inline <IP ADDR>%10 route-domain <Route domain name>
893161-3 : Internal request to volatile.html used for cookie transport in Portal Access is sometime rewritten
Links to More Info: BT893161
Component: Access Policy Manager
Symptoms:
Request to volatile.html gets rewritten which reaches the backend server causing error responses from backend server.
Conditions:
Re-definition of XMLHttpREquest.prototype.open in the web application.
Impact:
Error response from the back end server since volatile.html is internal to Portal Access
Workaround:
Custom iRule, there is no generic irule but it can be implemented depending on the web application requirement.
Sample iRule:
XXXXX is web application path
#
# workaround for rewritten request for /volatile.html
# (remove link to opener if opener is full webtop)
#
when REWRITE_REQUEST_DONE {
if {
[HTTP::path] ends_with "XXXXX"
} {
# log "URI=([HTTP::path])"
# Found the file to modify
REWRITE::post_process 1
set do_fix 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists do_fix]} {
unset do_fix
set str {if(typeof(F5_flush)!=='function')}
set strt [string first $str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace 0 $strlen {
if (window.opener && window.opener.name === 'F5_Opener') window.opener=null;
}
}
}
891333-7 : The HSB on BIG-IP platforms can get into a bad state resulting in packet corruption.
Links to More Info: K32545132, BT891333
Component: TMOS
Symptoms:
Networking connectivity issues, such as ARP resolution issues, high availability (HA) failures, health monitor instability, etc.
Packet captures with Wireshark or tshark can be used to show bit-errors/corruption in the network packet for traffic passing through the HSB. This corruption can occur in various parts of the packet such as the MAC address, EtherType, packet checksums, etc.
Conditions:
This can occur on BIG-IP hardware platforms containing a high-speed bridge (HSB).
Impact:
Network connectivity problems on some traffic passing through the affected HSB. Could be reflected in the status of Config Sync or more health monitors down on one member of HA pair.
Workaround:
Reboot the affected device.
If a reboot does not resolve the issue, then its most likely a hardware issue. Please work with Support on a RMA.
F5 has introduced a detection mechanism in newer versions of code. Please refer to the following document for more details: https://cdn.f5.com/product/bugtracker/ID1211513.html
886045-9 : Multi-NIC instances fail to come up when trying to use memory-mapped virtio device
Links to More Info: BT886045
Component: Local Traffic Manager
Symptoms:
Multi-NIC instances fail to come up while using memory-mapped virtio device.
Running the command 'lspci -s <pci-id> -vv' results in the 'region' field reporting 'Memory at xxxxx'.
Conditions:
TMM crashes as soon as the BIG-IP system tries to come up.
Impact:
The BIG-IP system fails to attach to the underlying virtio devices.
Workaround:
Switch to the sock driver by overriding tmm_init.tcl.
For instructions on how to enable the sock driver, see the workaround in K74921042: BIG-IP VE may fail to process traffic after upgrading the VMware ESXi 6.7 host to Update 2 (or later), available at https://support.f5.com/csp/article/K74921042.
883149-10 : The fix for ID 439539 can cause mcpd to core.
Links to More Info: BT883149
Component: TMOS
Symptoms:
Mcpd cores during config sync.
Conditions:
This occurs on rare occasions when the device transitions from standby to active, and the connection between the BIG-IP peers stalls out.
Impact:
Mcpd cores. Traffic disrupted while mcpd restarts.
Workaround:
None
881937-7 : TMM and the kernel choose different VLANs as source IPs when using IPv6.
Links to More Info: BT881937
Component: Local Traffic Manager
Symptoms:
IPv6 traffic generated from the host, either from a host daemon, monitors, or from the command line, can use a MAC and IPv6 source address from different VLANs.
Conditions:
-- Multiple VLANs configured with IPv6 addresses.
-- Multiple routes to the same destination, either the same or more specific, default routes, etc., that cover the traffic destination.
-- Changes are made to routes that cause the traffic to the destination to shift from one VLAN and gateway to another. This can be typically observed with dynamic routing updates.
- The db key snat.hosttraffic is set to disable.
Impact:
Traffic to the destination may fail because the incorrect source IPv6/MAC address is used, which might cause monitor traffic to fail.
Workaround:
Tmsh list sys db snat.hosttraffic
tmsh modify sys db snat.hosttraffic value enable
tmsh save sys config
870349-6 : Continuous restart of ntlmconnpool after the license reinstallation★
Links to More Info: BT870349
Component: TMOS
Symptoms:
The ntlmconnpool process continuously restarts after reinstalling the license. The system reports a message in the BIG-IP console:
Re-starting ntlmconnpool.
The BIG-IP may show as 'Disconnected', and 'TMM outbound listener not yet created' messages may be present in /var/log/ltm.
Conditions:
This occurs when you upgrade your license such that the new license changes the number of available TMMs.
Impact:
The system requires a reboot and reports a ‘Re-starting ntlmconnpool’ message continuously in the BIG-IP console.
Workaround:
To resolve the issue, it is necessary to reboot. Once the system restarts, it operates as expected.
869541-6 : Series of unexpected <aborted> requests to same URL
Links to More Info: BT869541
Component: Access Policy Manager
Symptoms:
Series of unexpected <aborted> requests to same URL
Conditions:
Web-app using special code pattern in JavaScript.
For example:
loc = window.location;
obj = {}
for (i in loc) {
obj[i] = loc[i];
}
Impact:
Page load is aborted
Workaround:
Following iRule can be used with customized SPECIFIC PAGE_URL value:
when REWRITE_REQUEST_DONE {
if {
[HTTP::path] ends_with "SPECIFIC_PAGE_URL"
} {
# log "URI=([HTTP::path])"
# Found the file we wanted to modify
REWRITE::post_process 1
set do_fix 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists do_fix]} {
unset do_fix
set strt [string first {<script>try} [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt 0 {
<script>
(function () {
var dl = F5_Deflate_location;
F5_Deflate_location = function (o) {
if (o.F5_Location) Object.preventExtensions(o.F5_Location)
return dl(o);
}
})()
</script>
}
}
}
}
869121-6 : Logon Page configured after OAuth client in access policy VPE, get error message Access policy evaluation is already in progress for your current session
Links to More Info: BT869121
Component: Access Policy Manager
Symptoms:
When 'Logon Page' agent is configured after 'OAuth client' in access policy VPE, you see an error message that says 'Access policy evaluation is already in progress for your current session'
Conditions:
In access VPE, Logon page after OAuth client agent in standard customization type.
Impact:
Cannot process further to reach resources.
Workaround:
Try to configure the access policy in Modern customization if it's not already configured that way.
When message box configured after OAuth client and observing the same above Access policy evaluation error message
Workaround:
Use a 'Logon Page' agent instead of the 'Message Box' agent and configure it such as:
all fields Type will be set to 'none'
message for the users will be mentioned in the 'Form Header text' field
Logon Button value will be changed from 'Logon' to 'Continue'
This should simulate exactly the look and feel of a message box but will prevent the issue from happening.
868801-6 : BIG-IP still sends STARTTLS if the 'No encryption' SNMP option is enabled
Links to More Info: BT868801
Component: Application Visibility and Reporting
Symptoms:
The SMTP 'No Encryption' configuration option is not honored by the BIG-IP device.
Conditions:
The 'No Encryption' option is selected under the SMTP configuration object.
Impact:
BIG-IP disregards its SMTP configuration and attempts to initiate TLS.
Workaround:
None
867985-9 : LTM policy with a 'shutdown' action incorrectly allows iRule execution
Links to More Info: BT867985
Component: Local Traffic Manager
Symptoms:
BIG-IP systems provide manipulation tools over a connection with an LTM policy and/or iRule. LTM policy takes precedence over iRules and has an option to shutdown a connection based on satisfied conditions. When a connection is closing, an iRule should not be executed under the same conditions.
Conditions:
-- The BIG-IP system has a virtual server with an LTM policy and an iRule.
-- The LTM policy has action 'shutdown connection' under certain conditions.
-- The iRule has an event which is triggered under the same conditions.
Impact:
The iRule is executed before the connection is being reset.
Workaround:
None.
857769-6 : FastL4+HTTP or FastL4+Hash-Persistence virtual servers do not work correctly in DSR mode.
Links to More Info: BT857769
Component: Local Traffic Manager
Symptoms:
Given a long-lived TCP connection that can carry multiple client requests (for example, but not limited to, HTTP requests), the BIG-IP system fails to forward requests after the forty-eighth one.
The client will try re-transmitting the answered request, but the BIG-IP system will persist in dropping it.
Conditions:
This issue occurs when all of the following conditions are met:
1) The virtual server uses the FastL4 profile.
2) The virtual server also uses the HTTP or Hash-Persistence profiles.
3) The virtual server operates in DSR (Direct Server Return) mode (also known as N-Path).
Impact:
The BIG-IP system fails to forward traffic.
Workaround:
Do not use the HTTP or Hash-Persistence profiles with a FastL4 virtual server operating in DSR mode.
Note: It is fine to use an iRule that calls hash persistence commands (for example, "persist carp [...]") as long as the Hash-Persistence profile is not associated to the virtual server. This technique will allow you to persist on a hash based on L4 information that you can extract at CLIENT_ACCEPTED time. For example, the following iRule correctly persists a specific client socket to a pool member in a FastL4 DSR configuration:
when CLIENT_ACCEPTED {
persist carp [IP::client_addr]:[TCP::client_port]
}
851837-7 : Mcpd fails to start for single NIC VE devices configured in a trust domain
Links to More Info: BT851837
Component: TMOS
Symptoms:
Single NIC BIG-IP Virtual Edition (VE) devices configured in a trust domain (e.g., in high availability (HA)) cannot reload a running configuration when restarted and/or when mcpd fails to load the config, and reports a validation error:
err mcpd[25194]: 0107146f:3: Self-device config sync address cannot reference the non-existent Self IP ([IP ADDR]); Create it in the /Common folder first.
Conditions:
Single NIC VE devices configured in a trust domain (e.g., HA)
Impact:
The mcpd process fails to start, and the configuration does not load.
Workaround:
Manually copy and paste the self IP configuration snippet into the /config/bigip_base.conf file:
1. Connect to the CLI.
2. Edit bigip_base.conf, and add the following:
net self self_1nic {
address 10.0.0.1/24
allow-service {
default
}
traffic-group traffic-group-local-only
vlan internal
}
Note: replace 10.0.0.1 with the IP indicated in the error message
3. Save the changes and exit.
4. Load the configuration using the command:
tmsh load sys config
5. If APM or ASM is provisioned/configured, then also restart services with this command:
bigstart restart
842137-9 : Keys cannot be created on module protected partitions when strict FIPS mode is set
Links to More Info: BT842137
Component: Local Traffic Manager
Symptoms:
When the Hardware Security Module (HSM) FIPS mode is set to FIPS 140-2 Level 3 protection, new keys cannot be created in the module's protected partition.
Note: Although FIPS grade Internal HSM (PCI card) is validated by the Marvell company at FIPS 140-2 Level 3, the BIG-IP system is not 140-2 Level 3 validated.
Conditions:
-- FIPS 140-2 Level 3 protection is configured on a NetHSM partition.
-- You attempt to create a FIPS key using that partition.
Impact:
New Keys cannot be create.
Workaround:
Follow these steps to generate a new NetHSM key called 'workaround' and install it into the BIG-IP config:
1. Generate the key:
[root@bigip1::Active:Standalone] config # fipskey.nethsm --genkey -o workaround -c module
WARNING: fipskey.nethsm will soon be deprecated for use with Thales. Please switch to using tmsh commands instead.
tmsh commands...
Generate Key:
tmsh create sys crypto key <key_name> security-type nethsm [gen-certificate|gen-csr] ...
For an exhaustive list of options, please consult F5's tmsh documentation.
Generate CSR for existing key:
tmsh create sys crypto csr <csr_name> key <key name> ...
For an exhaustive list of options, please consult F5's tmsh documentation.
Generate Self-Signed Certificate for existing key:
tmsh create sys crypto cert <cert_name> key <key name> ...
For an exhaustive list of options, please consult F5's tmsh documentation.
Delete Key:
tmsh delete sys crypto key <keyname>
str[cd /shared/tmp && /opt/nfast/bin/generatekey -b pkcs11 certreq=yes selfcert=yes protect=module size=2048 embedsavefile="workaround" plainname="workaround" digest=sha256]
key generation parameters:
operation Operation to perform generate
application Application pkcs11
protect Protected by module
verify Verify security of key yes
type Key type RSA
size Key size 2048
pubexp Public exponent for RSA key (hex)
embedsavefile Filename to write key to workaround
plainname Key name workaround
x509country Country code
x509province State or province
x509locality City or locality
x509org Organisation
x509orgunit Organisation unit
x509dnscommon Domain name
x509email Email address
nvram Blob in NVRAM (needs ACS) no
digest Digest to sign cert req with sha256
Key successfully generated.
Path to key: /opt/nfast/kmdata/local/key_pkcs11_ua882aa9fadee7e440772cb6686358f4b283922622
Starting synchronisation, task ID 5de83486.6e9e32d7f367eaf4
Directory listing failed: No such file or directory
2. Confirm the presence of the key with the label 'workaround':
[root@bigip1::Active:Standalone] config # nfkminfo -l
Keys with module protection:
key_pkcs11_ua882aa9fadee7e440772cb6686358f4b283922622 `workaround'
Keys protected by cardsets:
...
3. Install the key:
[root@bigip1::Active:Standalone] config # tmsh install sys crypto key workaround from-nethsm
4. Install the public certificate:
[root@bigip1::Active:Standalone] config # tmsh install sys crypto cert workaround from-local-file /config/ssl/ssl.crt/workaround
836205-4 : [SIP-MRF] Transport-config source port behavior changed needs after upgrading to version with new source-port-mode attribute
Component: Service Provider
Symptoms:
A new parameter "source-port-mode" was added in MRF transport-config in V16.0.0; its default setting is "Change".
Users who upgrade from an older configuration version and have a value set in source-port will experience a change in behavior after updating. To achieve equivalent behavior when upgrading to the new config, the source-port should retain its value, but IF it is non-zero, the source-port-mode should be set to preserve-strict.
Conditions:
When BIG-IP is upgraded from a version without the Transport-Config:source-port-mode setting to a version (v16.0.0 or later) that includes it.
Transport-Config with non-zero source-port configured.
Impact:
After BIG-IP upgrading, with the same transport-config, BIG-IP changed the source-port when connecting to a pool member, and caused SIP responses to be unable to be sent back to the client.
Workaround:
Manually change "source-port-mode" to "preserve-strict" after upgrade.
824953-1 : The sFlow sample collection for VLAN does not work with VLAN groups
Links to More Info: BT824953
Component: TMOS
Symptoms:
The sFlow FLOW packets containing traffic samples for a VLAN are not generated and not sent to the receiver, although CNTR telemetry packets are sent.
Conditions:
-- The VLAN is a member of a VLAN group.
-- The VLAN has sFlow packet sampling configured and enabled.
Impact:
No traffic samples are available from the VLANs that are part of VLAN groups.
Workaround:
Although there is no workaround for VLANs that are part of VLAN groups, the sFlow traffic samples work with VLANs that are not part of VLAN groups.
824437-11 : Chaining a standard virtual server and an ipother virtual server together can crash TMM.
Links to More Info: BT824437
Component: Local Traffic Manager
Symptoms:
TMM crashes with a SIGFPE and restarts. The TMM logs contain the following panic message:
Assertion "xbuf_delete_until successful" failed.
Conditions:
This issue occurs when the following conditions are met:
-- The system has been configured with a standard virtual server and an Any IP (ipother) virtual server chained together. This can be done explicitly using an iRule that features the 'virtual' command to connect the two virtual servers, or implicitly with certain APM configurations.
-- The pool member on the server-side asks this specific virtual server configuration on the BIG-IP system to retransmit data.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Ensure the target virtual server in the chain configuration does not use the ipother profile.
821589-7 : DNSSEC does not insert NSEC3 records for NXDOMAIN responses
Links to More Info: BT821589
Component: Global Traffic Manager (DNS)
Symptoms:
DNSSEC does not insert NSEC3 records for NXDOMAIN responses.
Conditions:
-- "process-xfr yes" is set for the dns profile associated with the listener;
And
-- There is no "Zone Transfer Clients" nameserver configured for that zone.
And
-- There is no wideip configured.
Impact:
DNSSEC does not respond NSEC3 for non-existent domain.
Workaround:
1. Change this setting for dns profile from "process-xfr yes" to "process-xfr no";
Or
2. Add a nameserver for "Zone Transfer Clients" of that zone.
Or
3. Add a wideip.
812693-8 : Connection in FIN_WAIT_2 state may fail to be removed
Links to More Info: BT812693
Component: Local Traffic Manager
Symptoms:
If a connection that has a fully closed client-side, but a server-side still in FIN_WAIT_2, receives a SYN matching the same connflow, the idle time is reset. This can result in the fin-wait-2-timeout never being reached. The SYN will be responded to with a RST - 'TCP Closed'
Conditions:
- Client side connection has been fully closed. This may occur if a client SSL profile is in use and an 'Encrypted Alert' has been received.
- Server side has sent a FIN which has been ACK'd, but no FIN has been received from the server.
- SYN received matching the existing connflow before the FIN-WAIT-2-timeout has been reached (300 default).
Impact:
Connection may fail to be removed in a timely manner. New connection attempts are RST with 'TCP Closed'
Workaround:
You can use either of the following:
-- Ensure servers are sending FIN's so as not to leave the connection in a FIN_WAIT_2 state.
-- Mitigate the issue by lowering the FIN-WAIT-2-timeout to a smaller value, e.g., FIN-WAIT-2-timeout 10.
809089-8 : TMM crash after sessiondb ref_cnt overflow
Links to More Info: BT809089
Component: TMOS
Symptoms:
Log message that indicates this issue may happen:
session_reply_multi: ERROR: unable to send session reply: ERR_BOUNDS
[...] valid s_entry->ref_cnt
Conditions:
-- Specific MRF configuration where a single router is configured and shared by ~500 virtual servers
-- also the traffic is routed by iRules similar to the following iRule: MR::message route peer "peer-[IP::local_addr]-[TCP::local_port]" that sends traffic to the same destination IP, 500 destination ports that could lead to a huge number of session entries owned by a single tmm.
-- High rate of session lookups with a lot of entries returned.
Note: This issue does not affect HTTP/2 MRF configurations.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
- Create unique MRF routers and assign a different MRF router to each virtual server
- Use different destination IP address
Note: while this issue seems to be a generic sessionDB issue, above provided workaround is when it is only evident that MRF config seems to be causing the issue.
804089-5 : iRules LX Streaming Extension dies with Uncaught, unspecified error event
Links to More Info: BT804089
Component: Local Traffic Manager
Symptoms:
You are using a virtual with an ilx profile generated from an iRules LX Streaming extension and observed the following error or similar.
Sep 05 09:16:52 pid[5850] Error: Uncaught, unspecified "error" event. (ETIMEDOUT)
Sep 05 09:16:52 pid[5850] at ILXFlow.emit (events.js:163:17)
Sep 05 09:16:52 pid[5850] at ILXFlowWrap.ilxFlowErrorCb [as onIlxError] (/var/sdm/plugin_store/plugins/<pluginName>/extensions/<workspaceName>/node_modules/f5-nodejs/lib/ilx_flow.js:108:10)
Conditions:
Virtual server with an ilx profile generated from an iRules LX Streaming extension. The problem is aggravated if a web-acceleration profile is configured.
Impact:
Traffic may be disrupted until the sdmd daemon has respawned another node.js process.
791365-8 : Bad encryption password error on UCS save
Links to More Info: BT791365
Component: TMOS
Symptoms:
When a user with the admin role attempts to save a UCS with a passphrase, the following error is encountered:
[resource-admin@inetgtm1dev:Active:Standalone] ucs # tmsh save sys ucs /var/local/ucs/test-ucs passphrase password
Saving active configuration...
Error: Bad encryption password. <=========
Operation aborted.
/var/tmp/configsync.spec: Error creating package
WARNING:There are error(s) during saving.
Not everything was saved.
Be very careful when using this saved file!
Error creating package
Error during config save.
Unexpected Error: UCS saving process failed.
Conditions:
1) Log into the BIG-IP system as a user with admin role that has Advanced Shell access.
2) Attempt to create a UCS with a passphrase.
Impact:
Unable to save UCS with a passphrase.
Workaround:
This affects users logged in with the Admin role; you will be able to create a UCS with a passphrase while logged in firstly as root user and then use 'resource-admin' user to save a ucs with passphrase.
783077-5 : IPv6 host defined via static route unreachable after BIG-IP reboot
Links to More Info: BT783077
Component: TMOS
Symptoms:
Static route unreachable after BIG-IP system reboot.
Conditions:
-- Add a static route.
-- Issue a ping (works fine).
-- Reboot the BIG-IP system.
-- Issue a ping (cannot pint the route).
Impact:
Static route exists in both kernel and LTM routing table but unable to ping the route after rebooting the BIG-IP system.
Workaround:
Workaround-1:
Delete the IPv6 route entry and recreate the route by issuing the following commands in sequence:
tmsh delete net route IPv6
tmsh create net route IPv6 network 2a05:d01c:959:8408::b/128 gw fe80::250:56ff:fe86:2065 interface internal
Workaround-2:
net route /Common/IPv6 {
gw fe80::456:54ff:fea1:ee02 <-- Change this address to unicast address from 2a05:d01c:959:8409::/64 network
interface /Common/Internal
mtu 1500
network 2a05:d01c:959:8408::b/128
}
780437-11 : Upon rebooting a VIPRION chassis provisioned as a vCMP host, some vCMP guests can return online with no configuration.
Links to More Info: BT780437
Component: TMOS
Symptoms:
It is possible for a vCMP host to scan the /shared/vmdisks directory for virtual disk files while the directory is unmounted.
As such, virtual disk files that existed before the reboot will not be detected, and the vCMP host will proceed to create them again.
The virtual disks get created again, delaying the guests from booting. Once the guests finally boot, they have no configuration.
Additionally, the new virtual disk files are created on the wrong disk device, as /shared/vmdisks is still unmounted.
Symptoms for this issue include:
-- Running the 'mount' command on affected host blades and noticing that /shared/vmdisks is not mounted.
-- Running the 'tmsh show vcmp guest' command on affected host blades (early on after the reboot) and noticing some guests have status 'installing-vdisk'.
-- Running the 'lsof' command on affected and unaffected host blades shows different device numbers for the filesystem hosting the virtual disks, as shown in the following example (note 253,16 and 253,1):
qemu-kvm 19386 qemu 15u REG 253,16 161061273600 8622659 /shared/vmdisks/s1g2.img
qemu-kvm 38655 qemu 15u REG 253,1 161061273600 2678798 /shared/vmdisks/s2g1.img
-- The /var/log/ltm file includes entries similar to the following example, indicating new virtual disks are being created for one of more vCMP guests:
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Adding.
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:0]
notice vcmpd[x]: 01510006:5: Guest (s2g1): Creating VDisk (/shared/vmdisks/s2g1.img)
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:1]
info vcmpd[x]: 01510007:6: Guest (s2g1): VS_ACQUIRING_VDISK->VS_WAITING_INSTALL
info vcmpd[x]: 01510007:6: Guest (s2g1): VS_WAITING_INSTALL->VS_INSTALLING_VDISK
notice vcmpd[x]: 01510006:5: Guest (s2g1): Installing image (/shared/images/BIGIP-12.1.2.0.0.249.iso) to VDisk (/shared/vmdisks/s2g1.img).
info vcmpd[x]: 01510007:6: VDisk (s2g1.img/2): Syncing with MCP - [filename:s2g1.img slot:2 installed_os:0 state:2]
Conditions:
-- VIPRION chassis provisioned in vCMP mode with more than one blade in it.
-- Large configuration with many guests.
-- The VIPRION chassis is rebooted.
-- A different issue, of type 'Configuration from primary failed validation' occurs during startup on one or more Secondary blades. By design, MCPD restarts once on affected Secondary blades, which is the trigger for this issue. An example of such a trigger issue is ID 563905: Upon rebooting a multi-blade VIPRION or vCMP guest, MCPD can restart once on Secondary blades.
Impact:
-- Loss of entire configuration on previously working vCMP guests.
-- The /shared/vmdisks directory, in its unmounted state, may not have sufficient disk space to accommodate all the virtual disks for the vCMP guests designated to run on that blade. As such, some guests may fail to start.
-- If you continue using the affected guests by re-deploying configuration to them, further configuration loss may occur after a new chassis reboot during which this issue does not happen. This occurs because the guests would then be using the original virtual disk files; however, their configuration may have changed since then, and so some recently created objects may be missing.
Workaround:
There is no workaround to prevent this issue. However, you can minimize the risk of hitting this issue by ensuring you are running a software version (on the host system) where all known 'Configuration from primary failed validation' issues have been resolved.
If you believe you are currently affected by this issue, please contact F5 Networks Technical Support for assistance in recovering the original virtual disk files.
779137-10 : Using a source address list for a virtual server does not preserve the destination address prefix
Links to More Info: BT779137
Component: Local Traffic Manager
Symptoms:
Configuring a network virtual server with a source address list causes the system to treat the virtual server as a host.
Conditions:
-- Configure a source address list on the virtual server.
-- Configure a network address for the destination of the virtual server (not an address list).
Impact:
Traffic does not flow to the virtual server as expected.
Workaround:
See K58807232
777389-10 : In rare occurrences related to PostgreSQL monitor, the mcpd process restarts
Links to More Info: BT777389
Component: TMOS
Symptoms:
Possible indications include the following:
-- Errors such as the following may appear in ltm/log:
- notice postgres[10872]: [466-1] WARNING: pgstat wait timeout.
- notice sod[27693]: 01140041:5: Killing /usr/bin/mcpd pid 7144.
- BD_CONF|ERR| ...failed to connect to mcpd after 5 retries, giving up...
- BD_CONF|ERR| ...can't read message from mcp conn, status:16908291.
- BD_MISC|CRIT| ...Received SIGABRT - terminating.
-- Errors such as the following may appear in the dwbld/log:
- Couldn't send BLOB notification - MCP err 16908291.
- Got a terminate/abort signal - terminating ...
- Terminating mcp_bridge thread.
-- Processes may restart unexpectedly, including mcpd, bd, and postgresql.
Conditions:
-- The 'mcpd' process attempts to read monitoring data from the PostgreSQL server, but no data is available.
-- A contributing factor might be that the AFM module is licensed but not configured.
Impact:
Failing to receive a monitoring response from the SQL server, MCPD goes into an infinite loop and skips the heartbeat report, resulting in its restart. While MCPD is restarting, the system is offline and does not process traffic. After restart, system operation returns to normal.
Workaround:
The chance of occurrence can be minimized by making sure that control-plane processes have sufficient memory to run efficiently.
775845-10 : Httpd fails to start after restarting the service using the iControl REST API
Links to More Info: BT775845
Component: TMOS
Symptoms:
After restarting httpd using the iControl REST API, httpd fails to start, even with a subsequent restart of httpd at the command line.
Similar to the following example:
config # restcurl -u admin:admin /tm/sys/service -X POST -d '{"name":"httpd", "command":"restart"}'
{
"kind": "tm:sys:service:restartstate",
"name": "httpd",
"command": "restart",
"commandResult": "Stopping httpd: [ OK ]\r\nStarting httpd: [FAILED]\r\n(98)Address already in use: AH00072: make_sock: could not bind to address n.n.n.n:n\nno listening sockets available, shutting down\nAH00015: Unable to open logs\n"
}
config # tmsh restart sys service httpd
Stopping httpd: [ OK ]
Starting httpd: [FAILED]
Conditions:
Restarting httpd service using iControl REST API.
Impact:
Httpd fails to start.
Workaround:
To recover from the failed httpd state, you can kill all instances of the httpd daemon and start httpd:
killall -9 httpd
tmsh start sys service httpd
760740-6 : Mysql error is displayed when saving UCS configuration on BIG-IP system when MySQL is not running
Links to More Info: BT760740
Component: Protocol Inspection
Symptoms:
When saving the configuration to a UCS file, the process tries save the IPS learning information stored in the MySQL database.
MySQL runs only when particular modules are provisioned. If MySQL was previously running as a result of different provisioning, but is not currently running, saving the configuration to a UCS file succeeds, but the system reports a spurious message during the operation:
Can't connect to local MySQL server through socket '/var/lib/mysql/mysql.sock.
Conditions:
-- Saving the configuration to a UCS file.
-- BIG-IP system provisioning only includes modules that do not require MySQL. These modules may include:
+ LTM
+ FPS
+ GTM (DNS)
+ LC
+ SWG
+ iLX
+ SSLo
-- BIG-IP system was previously provisioned with a module that starts MySQL, which results in the creation of the file /var/db/mysqlpw. These modules may include:
+ APM
+ ASM
+ AVR
+ PEM
+ AFM
+ vCMP
Impact:
The error message is cosmetic and has no impact on the UCS save process.
Workaround:
None.
760355-8 : Firewall rule to block ICMP/DHCP from 'required' to 'default'★
Links to More Info: BT760355
Component: Advanced Firewall Manager
Symptoms:
If a firewall is configured on the management port with an ICMP rule, after upgrading to v14.1.x or later, the ICMP rule does not work.
Conditions:
- Firewall is configured on the management port.
- Firewall is configured with an ICMP rule to block.
- Firewall is configured with an ICMP rule to allow.
Impact:
ICMP packets cannot be blocked with a firewall rule to drop on the management port. ICMP packets are allowed from the management port and will not increase the counter even if explicitly allowed by a rule.
Workaround:
Run the following commands after upgrading to v14.1.x or later from earlier versions.
# /sbin/iptables -N id760355
# /sbin/iptables -I INPUT 1 -j id760355
# /sbin/iptables -A id760355 -i mgmt -p icmp --icmp-type 8 -s 172.28.4.32 -j DROP
759258-10 : Instances shows incorrect pools if the same members are used in other pools
Links to More Info: BT759258
Component: TMOS
Symptoms:
Monitor 'Instances' tab shows incorrect pools if the same members are used in other pools.
Conditions:
Steps to Reproduce:
1. Create custom monitor or use system default.
2. Assign that monitor to a test pool.
3. Navigate to Local Traffic :: Monitors, click the test monitor, then select the Instances tab.
Impact:
The test pool is displayed, as well any other pools that use the same member or members (but with other monitors assigned).
Workaround:
Use tmsh to list monitor instances
For example:
tmsh show ltm monitor gateway-icmp /Common/gateway_icmp
758491-8 : When using NetHSM integration, after upgrade to 14.1.0 or later (or creating keys using fipskey.nethsm), BIG-IP cannot use the keys
Links to More Info: BT758491
Component: Local Traffic Manager
Symptoms:
For Thales:
The ltm/log shows SSL handshake failures with similar lines (this is for Diffie-Hellman Key Exchange):
-- warning bigip1 tmm1[28813] 01260013 SSL Handshake failed for TCP 192.0.2.1:5106 -> 192.0.2.200:5607
-- warning bigip1 tmm1[28813] 01260009 Connection error: ssl_hs_vfy_sign_srvkeyxchg:13583: sign_srvkeyxchg (80)
-- debug bigip1 tmm1[28813] 01260036 FIPS acceleration device error: fips_poll_completed_reqs: req: 4 status: 0x1 : Cancel
-- err bigip1 pkcs11d[26259] 01680002 Key table lookup failed. error.
After enabling pkcs11d debug, the pkcs11d.debug log shows:
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute class CKO_PRIVATE_KEY attribute CKA_CLASS
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute type CKA_CLASS matches
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute class CKO_PRIVATE_KEY attribute CKA_ID
-- 2019-10-03 11:21:50 [6399] t00075a9a462b0000: pkcs11: 000008D9 D obj_match_attribute type CKA_ID does not match <===
For Safenet:
-- warning tmm1[17495]: 01260009:4: Connection error: ssl_hs_vfy_sign_srvkeyxchg:13544: sign_srvkeyxchg (80)
-- warning tmm1[17495]: 01260013:4: SSL Handshake failed for TCP 10.1.1.11:6009 -> 10.1.1.201:443
-- err pkcs11d[5856]: 01680002:3: Key table lookup failed. error.
Conditions:
1. Keys were created on earlier versions of BIG-IP software, no matter if using tmsh (Safenet) or using fipskey.nethsm (Thales, Safenet) and the device was upgraded to 14.1.0 or later.
2. Keys were created on BIG-IP v14.1.0 or later directly, using fipskey.nethsm (Thales). For Safenet, fipskey.nethsm was deprecated in 14.0.0.
Impact:
SSL handshake failures.
Workaround:
There are two workarounds:
-- Re-create the keys using tmsh command.
IMPORTANT: This workaround is suitable for deployments that are new and not in production.
-- Re-import the keys from nethsm using:
tmsh install sys crypto key <key_label> from-nethsm
You can find the key_label here:
-- The rightmost string in the output of the Thales command:
nfkminfo -l
-- The string after label= in the 'cmu list' command for Safenet.
751540-8 : GTM Sync group not syncing properly with multiple self IP addresses configured on one VLAN but not all configured for GTM server
Links to More Info: BT751540
Component: Global Traffic Manager (DNS)
Symptoms:
GTM changes in some devices are not synced to other GTM-configured devices in the same syncgroup.
Conditions:
-- There are multiple self IP addresses configured on one VLAN.
-- Some, but not all, self IP addresses are configured for GTM server.
Impact:
GTM Sync group not syncing properly.
Workaround:
Configure all self IP addresses in the syncgroup for GTM server.
751451-7 : When upgrading to v14.0.0 or later, the 'no-tlsv1.3' option is missing from HTTPS monitors automatically created server SSL profiles
Links to More Info: BT751451
Component: Local Traffic Manager
Symptoms:
If there are HTTPS monitor objects that were created using BIG-IP software v12.x, when the BIG-IP is upgraded directly to v14.0.0 or later, the operation automatically creates server SSL profiles for the HTTPS monitors as needed. Those server SSL profile objects do not have 'no-tlsv1.3' included in their 'options' configuration.
Conditions:
-- Having HTTPS monitors configured in v12.x before upgrading.
-- Directly upgrading from v12.x to v14.0.0 or later
Impact:
TLSv1.3 gets enabled on the server SSL profiles.
Workaround:
-- To avoid this issue, upgrade from v12.x to v13.x, and then upgrade to v14.0.0 or later
-- To mitigate this issue, modify the affected profile to disable TLSv1.3.
745645-5 : Portal Access does not rewrite the script element with textNode children
Links to More Info: BT745645
Component: Access Policy Manager
Symptoms:
Web-application defining script element with textNode children are not rewritten by Portal Access. This can cause the web application to fail to load.
Conditions:
Web-application defining script element with textNode children which requires client-side dynamic script rewriting
Impact:
- Web application may fail to load.
- Non-rewritten HTTP request
Workaround:
Custom iRule to rewrite the content of textNode. There is no generic iRule but it can be implemented depending on the web application requirement.
745125-5 : Network Map page Virtual Servers with associated Address/Port List have a blank address.
Links to More Info: BT745125
Component: TMOS
Symptoms:
On the Local Traffic > Network Map page, some virtual servers have a blank address.
Conditions:
An address list or port list is associated with the virtual server
Impact:
The Network Map will display a blank address field.
741621-6 : CLI preference 'suppress-warnings' setting may show incorrectly
Links to More Info: BT741621
Component: TMOS
Symptoms:
At times when the 'suppress-warnings' setting is at its default value ('none'), it may be listed like this instead:
suppress-warnings { }
After loading the configuration, the 'suppress-warnings' setting may return to the default value, in which case it is no longer visible when listing out the CLI preferences (without specifying 'all-properties').
Conditions:
-- Using the default value for 'suppress-warnings' in the CLI preferences.
-- Listing out the CLI preferences.
Impact:
Possibly confusing listing for this value. The 'suppress-warnings' setting auto-populates with an incorrect default of empty { } (instead of 'none') on config load, causing it to be displayed when listing CLI preference in tmsh.
Workaround:
None
739904-7 : /var/log/ecm log is not rotated
Links to More Info: BT739904
Component: TMOS
Symptoms:
/var/log/ecm log is not rotated.
Conditions:
Log file /var/log/ecm exists in the /var/log directory.
Impact:
Log rotate does not work. May fill disk with logs over time.
Workaround:
Use tmsh sys log-rotate command to modify the logrotate settings to add /var/log.ecm.
The syntax is:
tmsh modify sys log-rotate common-include '"
/var/log/ecm {
compress
missingok
notifempty
}"'
739475-10 : Site-Local IPv6 Unicast Addresses support.
Links to More Info: BT739475
Component: Local Traffic Manager
Symptoms:
No reply to Neighbor Advertisement packets.
Conditions:
Using FE80::/10 addresses in network.
Impact:
Cannot use FE80::/10 addressees in network.
Workaround:
None
721591-6 : Java crashes with core during with high load on REST API
Links to More Info: K000141369, BT721591
Component: TMOS
Symptoms:
Java crashes with core.
Conditions:
This is a random crash and there are no known conditions for reproducing it.
Impact:
This crash occurs randomly during normal operation and has following impact:
-- Stats are not available.
Workaround:
-- Restart the Java service with "bigstart restart restjavad" or "tmsh restart sys service restjavad".
-- Restart the BIG-IP system.
717174-8 : WebUI shows error: Error getting auth token from login provider★
Links to More Info: BT717174
Component: Device Management
Symptoms:
Occasionally, the BIG-IP Admin Utility TMUI fails to function correctly and produces the following error:
Error getting auth token from login provider.
This occurs when the BIG-IP REST Daemon restjavad fails to start up properly.
Conditions:
This error most often occurs on the first or second boot after upgrade, and more often on Virtual Edition BIG-IP platforms running on oversubscribed or slow hypervisors.
Impact:
TMUI and any other BIG-IP system components that rely on REST Workers such as: OpenID Connect key rotation discovery, portions of the TMOS Web Configuration Utility, and Guided Configuration (AGC and WGC) fail to function properly.
Workaround:
Restarting the BIG-IP REST daemons restjavad and restnoded will usually correct the problem. To do so, connect to the SSH console and issue the following two commands:
bigstart restart restjavad
bigstart restart restnoded
705869-8 : TMM crashes as a result of repeated loads of the GeoIP database
Links to More Info: BT705869
Component: Global Traffic Manager (DNS)
Symptoms:
TMM crash due to the repeated loading of the GeoIP database.
Conditions:
Repeatedly loading the GeoIP database in rapid succession.
Impact:
Traffic is disrupted while TMM restarts.
Workaround:
Avoid repeated loading of the GeoIP Database.
701341-6 : If /config/BigDB.dat is empty or the file is corrupt, mcpd continuously restarts
Links to More Info: K52941103, BT701341
Component: TMOS
Symptoms:
If an issue causes /config/BigDB.dat to be empty or its contents become corrupted, mcpd fails to start up.
System commands report errors about being unable to read DB keys. 'bigstart' outputs errors:
--dbval: Unable to find variable: [security.commoncriteria]
Conditions:
The event causing BigDB.dat to be truncated is unknown at this time.
Impact:
The system fails to start up, and mcpd continually restarts. The BIG-IP system fails to process traffic while the mcpd process is restarting.
Workaround:
To work around this issue, you can remove the empty or corrupted BigDB.dat file. To do so, perform the following procedure:
Impact of workaround: Performing the following procedure should not have a negative impact on your system.
1. Log in to bash.
2. To remove the zero-byte or corrupted BigDB.dat file, type the following command:
rm /config/BigDB.dat
694765-10 : Changing the system's admin user causes vCMP host guest health info to be unavailable
Links to More Info: BT694765
Component: TMOS
Symptoms:
On the host, 'tmsh show vcmp health' does not display guest info.
The iControl REST log at /var/log/icrd contains entries similar to the following:
notice icrd_child[32206]: 01420003:5: Cannot load user credentials for user "admin" Current session has been terminated.
Conditions:
The default admin user "admin" has been changed.
Note: You changed the default admin user by following the steps in the Article K15632: Disabling the admin and root accounts using the BIG-IP Configuration utility or the Traffic Management Shell: https://my.f5.com/manage/s/article/K15632.
Impact:
Many REST APIs do not function, and functionality such as vCMP guest health that depend on REST fails.
Workaround:
Rename the default system admin back to 'admin':
tmsh modify /sys db systemauth.primaryadminuser value admin
Note: If you are using the default 'admin' account, make sure you change the password as well.
687044-9 : Tcp-half-open monitors might mark a node up or down in error
Links to More Info: BT687044
Component: Local Traffic Manager
Symptoms:
The tcp-half-open monitor might mark a node or pool member up when it is actually down, or down when it is actually up, when multiple transparent monitors within multiple 'bigd' processes probe the same IP-address/port.
Conditions:
All of the following are true:
-- There are multiple bigd processes running on the BIG-IP system.
-- There are multiple tcp-half-open monitors configured to monitor the same IP address.
-- One or more of the monitored objects are up and one or more of the monitored objects are down.
Impact:
The BIG-IP system might occasionally have an incorrect node or pool-member status, where future probes may fix an incorrect status.
Workaround:
You can use any of the following workarounds:
-- Configure bigd to run in single process mode by running the following command:
tmsh modify sys db bigd.numprocs value 1
-- Use a tcp monitor in place of the tcp-half-open monitor.
-- Configure each transparent monitor for different polling cycles to reduce the probability that an 'up' response from the IP address/port is mistakenly viewed as a response to another monitor that is currently 'down' (or vice-versa).
683706-9 : Monitor status may show 'checking' after a pool member has been manually forced down
Links to More Info: BT683706
Component: Local Traffic Manager
Symptoms:
Following certain sequences of actions, a pool member that is forced offline (e.g., '{session user-disabled state user-down}'), may have an associated monitor status (status of the associated monitor instance) that is shown as 'checking'.
Conditions:
This result may occur as the result of one of the following sequences of actions:
1. A pool member is created with an associated monitor, and that pool member is simultaneously forced offline.
Example:
tmsh create ltm pool test1 members add { 10.1.108.2:80 { session user-disabled state user-down } } monitor http
2. A pool member is disabled or forced offline, the configuration is saved, and the BIG-IP system is restarted (for example, by 'bigstart restart' or 'reboot' commands).
Example:
tmsh modify ltm pool test1 members modify 10.1.108.2:80 { session user-disabled state user-down } }
tmsh save sys config
bigstart restart
Impact:
The pool member remains offline as directed, but the associated monitor status (monitor instance status) indicates 'checking', which does not appear to match the pool member status.
If the pool member is subsequently re-enabled, the associated monitor status (status of the associated monitor instance) will be updated to show the result of current monitor pings.
Workaround:
The 'checking' status of the monitor instance may be unexpected, in this context, but:
- The monitor status (monitor instance status) does not affect the status of a disabled pool member.
- This monitor status indicates that no monitor pings have been performed to update the initial state of the monitored object from 'checking' to a result determined by a monitor ping. The BIG-IP monitoring subsystem does not ping disabled pool members to update this status.
680804-6 : TMM restart due to delayed keep alives
Links to More Info: BT680804
Component: Advanced Firewall Manager
Symptoms:
TMM killed with SIGABRT by the SOD process that monitors all process's health. TMM misses the keep alive, hence the restart.
The stack trace shows that tmm was killed when it was waiting on a memory map (sys_mmap_obj) call.
Conditions:
The memory map call is known to take a long time to complete when the disk IO sub-system is very slow.
High IO can also be a result of memory starvation accompanied by intensive paging
Impact:
Traffic disrupted while TMM restarts.
Workaround:
This problem is not likely to persist after a TMM service restart. So no user intervention is required.
If this problem happens repeatedly, it would be required to take a look at IO Resources in use at time of the database load or reload, and see if a way to lower IO can be found.
675742-4 : Hardware-to-VE-platform-migrate of a UCS may fail with an error on db variable license.maxcores
Links to More Info: BT675742
Component: TMOS
Symptoms:
Using the platform-migrate option to load a UCS from a different platform may show this error from loaddb:
01080023:3: Error return while getting reply from mcpd: 0x107178a, 0107178a:3: Modifying license.maxcores to a value other than 8 is not allowed.
The UCS loads successfully, other than the DB variable, but this error message is printed and the DB variables are not loaded.
Conditions:
-- Migrating a UCS from physical platform hardware to a Virtual Edition (VE) configuration.
-- License has an attribute limiting the maximum number of cores, and the incoming UCS has a value of the DB variable 'license.maxcores' that contradicts this.
Impact:
The DB variable file fails to load, generating the error message, but that does not stop the loading of the regular configuration files in BIG-IP*.conf.
Workaround:
The 'license.maxcores' value is ignored on hardware devices, so set it to 8 before saving the UCS.
638863-4 : Attack Signature Detected Keyword is not masked in the logs
Links to More Info: BT638863
Component: Application Security Manager
Symptoms:
Attack Signature Detected Keyword is not masked in the logs
Conditions:
When the signature is matching a full request, and there is a sensitive keyword around the signature location, in some cases the signature appears in the logs and is not masked.
Impact:
Sensitive data may appear in the logs
Workaround:
None
637827-5 : VADC: after re-deploying a single-nic VM with multiple nics, a load can fail due to stp member 1.0
Links to More Info: BT637827
Component: TMOS
Symptoms:
The configuration fails to load with the following message:
01070523:3: No Vlan association for STP Interface Member 1.0
Unexpected Error: Loading configuration process failed.
Conditions:
In single-nic mode, the interface 1.0 exists and can be saved as a VLAN member. Upon re-deploying the virtual-machine from single nic mode to multi-nic, the 1.0 interface becomes pending and should no longer impact any configuration. However, a condition exists after a VLAN delete, where the associated (automatically created) stp member is not removed from the running config and can cause a load error.
Impact:
Load fails and requires manual intervention. Otherwise, the STP member is benign because vADC does not support STP.
Workaround:
Remove the STP interface member 1.0 and reload.
637613-10 : Cluster blade status immediately returns to enabled/green after it is disabled.
Links to More Info: K24133500, BT637613
Component: Local Traffic Manager
Symptoms:
In some scenarios, disabling a blade will result in the blade immediately returning to online.
Conditions:
This can occur intermittently under these conditions:
- 2 chassis in an HA pair configured with min-up-members (for example, 2 chassis, 2 blades each, and min-up-members=2)
- You disable a primary blade on the active unit, causing the cluster to failover due to insufficient min-up-members.
Impact:
Disabling the primary blade fails and it remains the primary blade with a status of online.
Workaround:
This is an intermittent issue, and re-trying may work. If it does not, you can configure min-up-members to a lower value or disable it completely while you are disabling the primary blade. The issue is triggered when the act of disabling the primary blade would cause the number of members to drop below min-up-members.
632553-9 : DHCP: OFFER packets from server are intermittently dropped
Links to More Info: K14947100, BT632553
Component: Local Traffic Manager
Symptoms:
With a DHCP relay virtual server, OFFER packets from DHCP server are intermittently not forwarded to the client and dropped on BIG-IP system.
Conditions:
It is not known exactly what triggers this condition, but it occurs intermittently when the DHCP relay virtual server is in use.
Impact:
Client machines joining the network do not receive DHCP OFFER messages.
Workaround:
Manually delete the serverside to force it to be recreated by the next DHCP request.
For example, if the flow to the DHCP server 10.0.66.222 is broken, issue the following tmsh command:
tmsh delete sys connection ss-server-addr 10.0.66.222 cs-server-port 67
566995-7 : bgpd might crash in rare circumstances.
Links to More Info: BT566995
Component: TMOS
Symptoms:
Under unspecified conditions and in rare cases, bgpd might crash. Although bgpd restarts right away, routing table might be impacted.
Conditions:
The conditions under which this occurs are not known.
Impact:
This might impact routing table and reachability.
Workaround:
None known.
554506-6 : PMTU discovery from the management interface does not work
Links to More Info: K47835034, BT554506
Component: TMOS
Symptoms:
Network connectivity issues to the BIG-IP management interface.
The management interface 'auto lasthop' feature (not to be confused with the auto lasthop setting on a virtual server) allows the BIG-IP to route responses to packets received on the management interface back to the MAC address of the layer-3 device that sent them, removing the need for static management-routes to be configured on the BIG-IP for communication beyond the management subnet.
The operation of the lasthop module interferes with the management interface's ability to dynamically learn Path MTU (PTMU) through ICMP unreachable messages.
Conditions:
The MTU on one section of the network path between a client device and BIG-IP management interface is lower than the BIG-IP management interface's configured MTU (for example, part of the path passes through a tunnel), and an intermediary router is sending 'ICMP unreachable, fragmentation required' packets back to the BIG-IP to instruct it to send smaller datagrams.
Impact:
Unable to complete a TLS handshake to the management interface IP, or other similar operations that require large frames.
Workaround:
BIG-IP management interface auto lasthop functionality can be disabled to allow the interface to function normally.
For more information see K52592992: Overview of the Auto Last Hop feature on the management interface, available at
https://support.f5.com/csp/article/K52592992.
527119-12 : An iframe document body might be null after iframe creation in rewritten document.
Links to More Info: BT527119
Component: Access Policy Manager
Symptoms:
Cannot use certain page elements (such as the Portal Access menu) in Google Chrome, and it appears that JavaScript has not properly initialized, and results in JavaScript errors on the following kinds of code:
iframe.contentDocument.write(html)
iframe.contentDocument.close()
<any operation with iframe.contentDocument.body>
Conditions:
-- The body of a dynamically created iframe document might be initialized asynchronously after APM rewriting.
-- Using the Chrome browser.
Impact:
Some JavaScript applications might not work correctly when accessed through Portal Access. For example, one of applications known to contain such code and fail after APM rewriting is TinyMCE editor.
Workaround:
Revert rewriting of the document.write call with a post-processing iRule.
The workaround iRule will be unique for each affected application.
469724-7 : When evaluation/demonstration features expire, features enabled by both evaluation and perpetual licenses also expire
Links to More Info: BT469724
Component: TMOS
Symptoms:
Evaluation features cause perpetual features to expire when the evaluation license expires.
Conditions:
-- Perpetual license with an evaluation/demonstration add-on feature.
-- The add-on license expires or is expired.
Impact:
When an evaluation/demonstration add-on license expires, features included in both the evaluation add-on as well as the regular, perpetual license stop working.
This behavior is covered in F5 article K4679: BIG-IP evaluation and demonstration licenses do expire :: https://support.f5.com/csp/article/K4679.
Workaround:
To work around this issue, activate the license from the command line:
When reactivating an existing license, and deactivating an expired evaluation license key, specify the base registration key and add-on (if any), and use the -i option for the expired evaluation license key in the get_dossier command.
For example, if the expired evaluation license key is ABCDEFG-ZZZZZZZ, use the following command:
get_dossier -b ABCDE-ABCDE-ABCDE-ABCDE-ABCDEFG -a ABCDEFG-ABCDEFG -i ABCDEFG-ZZZZZZZ
You can find these steps detailed in K2595: Activating and installing a license file from the command line :: https://support.f5.com/csp/article/K2595. This part in particular is required to work around this issue
464708-7 : DNS logging does not support Splunk format log
Links to More Info: BT464708
Component: Global Traffic Manager (DNS)
Symptoms:
DNS logging does not support Splunk format logging. It fails to log the events, instead logging err messages:
hostname="XXXXXXXXXXXXX.XX",errdefs_msgno="01230140:3:
Conditions:
DNS logging configured for Splunk format.
Impact:
DNS logging does not log Splunk format to HSL.
Workaround:
Use an iRule to send Splunk-formatted messages to the Splunk server.
For example:
ltm rule dns_logging_to_splunk {
when DNS_REQUEST {
set ldns [IP::client_addr]
set vs_name [virtual name]
set q_name [DNS::question name]
set q_type [DNS::question type]
set hsl [HSL::open -proto UDP -pool splunk-servers]
HSL::send $hsl "<190>,f5-dns-event=DNS_REQUEST,ldns=$ldns,virtual=$vs_name,query_name=$q_name,query_type=$q_type"
}
when DNS_RESPONSE {
set ldns [IP::client_addr]
set vs_name [virtual name]
set q_name [DNS::question name]
set q_type [DNS::question type]
set answer [DNS::answer]
set hsl [HSL::open -proto UDP -pool splunk-servers]
HSL::send $hsl "<190>,f5-dns-event=DNS_RESPONSE,ldns=$ldns,virtual=$vs_name,query_name=$q_name,query_type=$q_type,answer=\"$answer\""
}
}
349706-7 : NetworkAccess assigns 1.1.1.1 address to remote ppp endpoint APM VPN
Component: Access Policy Manager
Symptoms:
Network access sends 1.1.1.1 as X-VPN-serer-IP and Edge client reserves this IP for PPP communication with APM server.
Conditions:
-- VPN is configured on BIG-IP.
-- Edge Client/webtop is used to connect to VPN.
Impact:
If VPN is connected:
1. The user may not access the 1.1.1.1 address from the client machine.
2. if 1.1.1.1 is used as a dns server ip in Network Access configuration, DNS resolution may fail on the client machine.
Workaround:
NA
2289885-2 : Malformed protobuf file synced from secondary blades cause asmlogs coredump
Links to More Info: BT2289885
Component: Application Security Manager
Symptoms:
asmlogd spontaneously coredump on the tenant (SIGSEGV)
asmlogd log shows "Secondary file /var/asmdata1/cluster/request_log/transfer/request_log__20260331_230212__slot_2 does not match integrity check", right before the crash.
Conditions:
ASM provisioned
multi-blade platform with at least 2 blades
Impact:
asmlogd spontaneously crashed on the primary blade and then restarted automatically in about 30seconds
Workaround:
none
2288173-3 : Some TMMs not ready and failed to bring up full cluster due to failed cmp dag transition
Links to More Info: BT2288173
Component: Local Traffic Manager
Symptoms:
On VELOS chassis platforms, when you reboot or restart the tenant, the cluster fails to come up fully with some TMMs indicating tmm-not-ready state, and performance is degraded as it fails to bring up the full cluster.
Conditions:
VELOS chassis platforms, with scenarios leading to reboot or restart of the tenant, possibly triggered by
- some software upgrade
- some power reset or
- configuration change causes occasional problems in tmm cluster bring-up and reduces the capacity handled by the tenant.
When the problem happens, it is observed that
- tmctl tmm/cmp shows queue_drops
- tmctl tmm/mpi_mem shows tx-full
Due to a lot of internal background traffic in the cluster
and tmctl tmm/ready_for_world_stat indicates "not read" state for "dag_transition".
Impact:
Performance degraded due to reduced cluster size.
Workaround:
No Workaround
As it is an intermittent problem, reboot/restart the problematic blade may help to recover.
2287865-2 : Dynamic CRL always fails connections that use self-signed certificates
Links to More Info: BT2287865
Component: Local Traffic Manager
Symptoms:
Connections fail with alert(46) unknown certificate error
The following is logged in /var/log/ltm
"unable to build certificate trust chain for profile"
Conditions:
Serverssl profile that uses Dynamic CRL, and the backend servers are configured with self-signed certificates.
Impact:
Dynamic CRLs cannot be used if backend servers are configured with self-signed certificates.
Workaround:
Add any self-signed certificates to the trusted CA of the ssl profile.
2285101 : APM policy export (ng_export) resulting in import failure for default oauth-request objects
Component: Access Policy Manager
Symptoms:
When exporting an APM access policy containing OAuth Client agents that reference default built-in oauth-request objects.
Conditions:
Policy contains OAuth Client agent referencing the default built-in apm aaa oauth-request objects
Policy exported using ng_export and imported using ng_import
Impact:
Policy import fails, preventing migration or restoration of APM access policies containing default oauth-request references.
Workaround:
Manually extract ng-export.conf from the exported .tar.gz file, add the leading slash ('/') to the affected oauth-request references, repackage the archive, and re-import the policy. This allows ng_import to complete successfully.
2279009-1 : With large configured receive-window-size, BIG-IP advertises non-zero SYN/SYN-ACK window, but zero window in final 3WHS ACK and all subsequent packets
Links to More Info: BT2279009
Component: Local Traffic Manager
Symptoms:
BIG-IP advertises non-zero window in SYN/SYN-ACK (as expected), but zero window in the final 3WHS ACK and in all subsequent packets, stalling the tcp connection forever.
Conditions:
Virtual server configured with a tcp profile having a Receive Window value ('receive-window-size' in tmsh) between 536862721 and 1073725440
Impact:
All tcp connections get stalled, both on the client-side and on the server-side.
Workaround:
Two possible workarounds.
- Configure a Receive Window value ('receive-window-size' in tmsh) to any value lower than 536862721.
- On the tcp profile, set the Initial Receive Window Size ('init-rwnd' in tmsh) to 64
2277461-1 : Current tzdata version of BIG-IP is outdated and may cause discrepancies
Component: TMOS
Symptoms:
Discrepancies may show up if a timezone has been updated since 2018.
For example, America/Sao_Paulo does not observe DST, but the current tzdata does not represent that.
Conditions:
BIG-IP's timezone is changed to a timezone that has been changed since 2018
Impact:
The time of the system is incorrect from the actual time
2277421-3 : TCP profile Help tab displays incorrect default values for Memory Management fields
Links to More Info: BT2277421
Component: TMOS
Symptoms:
The Help tab for TCP profiles shows incorrect default values for Proxy Buffer High (131072) and Proxy Buffer Low (98304) in the Memory Management section.
Conditions:
Viewing the Help tab for any built-in TCP profile in the GUI or tmsh help for TCP profile proxy-buffer-high/proxy-buffer-low.
Impact:
Help text displays incorrect default values, which may cause confusion when configuring TCP profiles. No functional impact - actual profile behavior is correct.
Workaround:
Refer to the actual profile values shown in the configuration instead of the Help tab text.
2269969-3 : Using TCP congestion BBR might lead to TMM core
Links to More Info: BT2269969
Component: Local Traffic Manager
Symptoms:
Using TCP congestion BBR might lead to TMM core
Conditions:
TCP congestion BBR is in use.
Impact:
TMM crash/core.
Workaround:
N/A
2264845-3 : TMM may crash when enabling DNS Express
Links to More Info: BT2264845
Component: Global Traffic Manager (DNS)
Symptoms:
TMM may crash when enabling DNS Express.
Conditions:
Occurs when enabling DNS express feature with traffic actively hitting the modified virtual-server.
Impact:
TMM core crashes.
Workaround:
N/A
2264037-2 : TMM may generate a core file after an SSL cipher group is deleted
Links to More Info: BT2264037
Component: Local Traffic Manager
Symptoms:
TMM crashes and generates a core file
Conditions:
- An SSL cipher group previously referenced by an SSL profile is removed from the configuration.
- Connections established while the profile referenced that cipher group remain active.
- At least one of those connections initiates a TLS renegotiation.
Impact:
Traffic interruption while TMM generates a core file and restarts.
Workaround:
Do not remove a cipher group if any active connections may still reference an older SSL profile that used it.
2263721-2 : TMM crashes on Azure VE when virtual function is removed during runtime
Links to More Info: BT2263721
Component: TMOS
Symptoms:
TMM crashes unexpectedly on BIG-IP VE running on Microsoft Azure when an accelerated networking virtual function (VF) is removed at runtime.
Conditions:
- BIG-IP VE deployed on Microsoft Azure with Accelerated Networking enabled.
- Azure platform performs host maintenance, live migration, or other operation that removes and restores accelerated networking virtual functions.
Impact:
Traffic disruption. TMM crashes and must be restarted. If running in an HA pair, failover occurs.
Workaround:
There is no workaround. Deploy BIG-IP VE in an HA (Active/Standby) configuration to minimize traffic disruption during a crash.
2263657-3 : Crash in Bados Signature Management operations results in a memory leak
Links to More Info: BT2263657
Component: Anomaly Detection Services
Symptoms:
The ADMD does not manage response control messages related to the creation or modification of signatures.
Conditions:
When using heavy configuration file with bados signatures, where signatures are saved or modified.
Impact:
Either MCPD or ADMD may encounter a crash.
Workaround:
NA
2263101-1 : TMSH rrset commands do not list DNS cache serve-expired records
Component: Global Traffic Manager (DNS)
Symptoms:
With serve-expired enabled on a DNS cache resolver, records at TTL=0 no longer appear in the rrset cache via tmsh show and cannot be deleted via tmsh delete, yet they may still be served to clients as stale responses.
Conditions:
Serve-expired is enabled for a DNS cache resolver
Impact:
Records could still be served to clients as stale responses via the serve-expired mechanism.
Workaround:
N/A
2262981-4 : TMM may corrupt stack during class lookup
Links to More Info: BT2262981
Component: Local Traffic Manager
Symptoms:
TMM core
Log may contain
can'tt read "domain": no such variable while executing "class match -value percentage contains ${path}/${domain}-cluster
Conditions:
The iRule uses a class match (class match -value percentage contains ${path}/${domain}-cluster) and fails if the path/domain doesn’t exist or the class name exceeds 265 characters.
Impact:
Tmm does not operate during reboot
Workaround:
Update the iRule to avoid using a class or path longer than 265 characters, or ensure the class exists.
2262641-3 : [BGP] Peering deadlock when modifying supported capabilities
Links to More Info: BT2262641
Component: TMOS
Symptoms:
When modifying capabilities BGP peering might enter a deadlock with local peer ignoring incoming and not creating outbound connections.
Conditions:
Modifying BGP capabilities when local peer tries to connect.
Impact:
BGP peering enters a deadlock.
Workaround:
Remove peer (neighbor) configuration and reapply it.
2262537-1 : pem_sessiondump crashes when listing subscriber sessions with custom attributes
Links to More Info: BT2262537
Component: Policy Enforcement Manager
Symptoms:
On BIG-IP, running pem_sessiondump --list when PEM subscriber sessions have custom attributes may crash with a segmentation fault and generate a core in /var/core.
Conditions:
This happens when PEM is provisioned with RADIUS subscriber sessions that have custom attributes and a transient memcached connection interruption occurs while pem_sessiondump is iterating sessions.
Impact:
The pem_sessiondump diagnostic utility crashes. No impact to data-plane traffic or TMM. Administrators are unable to use pem_sessiondump to list subscriber sessions until the utility is re-run.
Workaround:
Re-run pem_sessiondump --list. The crash occurs only when a transient memcached connection interruption coincides with the session iteration. Retrying typically succeeds.
2261337-2 : TMUI displays Local Traffic menu on rSeries Best Bundle tenant without LTM provisioned
Links to More Info: BT2261337
Component: TMOS
Symptoms:
In rSeries BIG-IP tenants with a Best Bundle license, TMUI shows the Local Traffic menu even when LTM is not provisioned (GTM dedicated, LTM none), which does not occur on DNS-only tenants with the same provisioning.
Conditions:
This issue occurs when,
- Platform is rSeries (eg: R5900, R10900)
- Deployment is a BIG-IP tenant
- License is Best Bundle
- GTM is set to dedicated and LTM is set to none
Impact:
This reveals LTM configuration options (virtual servers, pools, nodes, etc.) on a DNS‑dedicated tenant, increasing the risk of accidental object creation.
Workaround:
None
2261137-1 : TMM may crash if DNS cache resolver concurrency settings are changed during live traffic
Links to More Info: BT2261137
Component: Global Traffic Manager (DNS)
Symptoms:
TMM crashes with a SIGSEGV and then restarts.
Conditions:
- The DNS cache resolver is configured and processing queries.
- A DNS cache-resolver object is changed, specifically a setting that alters max-concurrent-queries or max-concurrent-tcp.
- Live DNS traffic is in progress when the change is applied.
Impact:
Traffic is disrupted during a TMM restart, and the redundant unit fails over.
2260837-2 : IPsec GUI sets encryption to null on auth update
Links to More Info: BT2260837
Component: TMOS
Symptoms:
- Discrepancy exists between BIG-IP Configuration Utility (GUI) and TMOS Shell (CLI) in how IPsec policy changes are handled
- In the GUI, editing an existing IPsec policy and changing the authentication algorithm to any SHA variant (e.g., SHA-1 to SHA-256) causes the encryption algorithm to be reset to NULL
Conditions:
- Create a IPsec policy with authentication algorithm from sha1/sha256/sha384/sha512 and encryption algorithm from aes-128/aes-192/aes-256
- Save the above policy
- Edit the policy. While modifying authentication algorithm to other sha algorithms, the encryption algorithm gets updated to NULL.
Impact:
The GUI provides no warning that the encryption algorithm has been removed. This silent change causes unexpected IPsec tunnel failures in production.
2260293-3 : LiveUpdate status stuck on Pending after successful installation
Component: Application Security Manager
Symptoms:
The update installs successfully as scheduled, but its status remains "Pending."
Conditions:
Race condition occurs during automatic installation
Impact:
The incorrect status is fixed at the next scheduled time.
2259001-3 : /Common VLANs can be assigned to non-Common partition route domains via VLAN-groups
Links to More Info: BT2259001
Component: TMOS
Symptoms:
/Common VLANs present in non-Common partition route domain
Conditions:
1. A non-Common partition route domain is present
2. A non-Common partition VLAN group containing /Common VLANs is present
3. The non-Common partition VLAN group is assigned to the route domain
Impact:
/Common VLANs are now present in a non-Common route domain
Workaround:
1. Remove the VLAN-group from the Route Domain using CLI
2. Remove each /Common VLAN from the Route Domain individually using either WebUI or CLI
2258853-2 : [APM][SAML] SP automation fails to update, when bound to an IdP with a SAML Resource
Links to More Info: BT2258853
Component: Access Policy Manager
Symptoms:
SAML SP connector automation fails whenever the metadata changes, i.e., a change in certificate.
In IDP initiated SAML, SAML service is configured in SAML resource which prevents the certificate update in the filestore.
Conditions:
SAML connector automation to create SP connectors.
Impact:
Unable to create SP connectors through connector automation.
2256725-1 : Unable to trigger "Disallowed file upload content detected" violation in some cases
Component: Application Security Manager
Symptoms:
The "Disallowed file upload content detected" violation is not triggered in some cases.
Conditions:
Under a specific traffic scenario, the violation is not triggered.
Impact:
Traffic with violation passes through.
Workaround:
N/A
2256681-1 : [APM] ECA random rumber fetch is stuck after forced TMM Core
Links to More Info: BT2256681
Component: Access Policy Manager
Symptoms:
After a forced TMM core, the ECA process may use abnormally high CPU indefinitely.
Conditions:
This issue occurs when:
1. TMM core is forcibly generated.
2. ECA attempts to fetch random numbers from TMM while TMM is unavailable or restarting.
Impact:
- The ECA process sustains high CPU usage.
- APM services may degrade.
- The issue persists until the ECA process is restarted.
Workaround:
Restart the ECA process to restore normal CPU utilization
2252201-1 : Monitor to GTM link is skipped if there are no devices are associated with the link
Links to More Info: BT2252201
Component: Global Traffic Manager (DNS)
Symptoms:
GTM link is reported as DOWN even though it is up.
Conditions:
No devices are associated with the link.
Impact:
GTM link is marked down, traffic will be interrupted.
Workaround:
None
2252129-1 : The database (BD) fails to start up (restart loops)
Component: Application Security Manager
Symptoms:
The DB fails to start up - the kernel oom killer kills it while starting up due to excessive memory usage.
Conditions:
A configuration consisting of large number of large JSON schemas
Impact:
The DB daemon goes up and down all without stopping. The system is generally down.
Workaround:
Reduce the number or size of JSON schemas by uniting profiles that share the same schemas in the same policies, unless the policy comes from a Swagger file.
2251921-1 : GUI audit logs inside the /var/log/audit files have a different format from all other daemons' audit logs
Links to More Info: BT2251921
Component: TMOS
Symptoms:
The GUI audit logs in the /var/log/audit files have a different format from all other daemons audit logs.
This is an example of a GUI audit log:
Mar 18 04:50:39 localhost.localdomain info GUI[10683@bigip-2.f5.internal]: 00000001:20000: AUDIT - user admin - RAW: GUI: host=192.168.1.1 user=admin partition=Common action=list object=[All] type=Certificate and Key result=OK
that is different from most of the other audit log formats.
This is an example of a tmsh audit log:
Mar 18 04:46:06 bigip-2.f5.internal notice tmsh[1454]: 01420002:5: AUDIT - pid=1454 user=root folder=/Common module=(tmos)# status=[Command OK] cmd_data=save / sys config partitions all
Conditions:
GUI audit logs are enabled.
From the GUI selecting:
"System ›› Logs : Configuration : Options".
Then, under 'Audit Logging', set 'GUI' to 'Enable'.
or from TMSH with:
"tmsh modify sys global-settings gui-audit enabled"
Impact:
The different format can be confusing because log elements are in different positions.
The different format could also be problematic when audit logs are ingested into a log repository or SIEM, because different entries require a separate parsing logic.
Workaround:
None
2251549-4 : Uneditable fields for Guest, Auditor, and Operator roles may appear to be editable in the GUI
Links to More Info: BT2251549
Component: TMOS
Symptoms:
Protocol profile GUI fields for a virtual server appear to be editable for a Guest, Operator, or Auditor role although they are actually not accessible for these roles
Conditions:
1. A virtual server is present
2. This virtual server has selected at least one Client SSL Profile
3. On the virtual server's properties page, a guest/auditor/operator user clicks on the name of a profile in the Selected column of Client SSL Profile field
Impact:
GUI fields appear to be editable as if the user had admin access.
The save/update of any edits does not occur; the fields only appear to be editable in the GUI
Workaround:
None
2251517-3 : Stream profile is not supported on HTTP/2 Full proxy (HTTP MRF Router enabled)
Links to More Info: BT2251517
Component: Local Traffic Manager
Symptoms:
Trying to add a stream profile to a virtual server gets rejected
tmsh modify ltm virtual vs_http2_stream profiles add { stream_simonSIMON }
01070734:3: Configuration error: Profile(s) found on /Common/vs_http2_stream that are not allowed: Only (TCP Profile, UDP Profile, QUIC Profile, ClientSSL Profile, ServerSSL Profile, HTTP Profile, HTTP2 Profile, HTTP3 Profile, HTTP Compression Profile, Application Visibility and Reporting Profile, DNS Profile, DOH Proxy Profile, profile statistics, Protection Profile, Bot Defense Profile, Bot Defense ASM Profile, Web Security Profile, HTTP Router Profile, Web Accelerator Profile, Request Logging Profile, TDR Profile, ATI Profile, BD Profile, CSD Profile, AP and AI Profile)
Conditions:
The virtual server contains a profile with http/http2 and httprouter
/Common/http { }
/Common/http2 { }
/Common/httprouter { }
Same issue if an http2/httprouter profile is attempted to be added to virtual server with a stream profile in it
Impact:
Not able to add a stream profile
Workaround:
None
2246933-3 : Memory leak in QUIC under rare sequence of packets/events
Links to More Info: BT2246933
Component: Local Traffic Manager
Symptoms:
QUIC experiences a slow/small memory leak.
Conditions:
On a system with heavy load on crypto operations, QUIC will leak some data on specific rare sequence of packets/events which can exhaust the memory slowly and eventually could lead to a crash due to OOM.
Impact:
TMM crashes due to OOM.
Workaround:
N/A
2244393-3 : TLS 1.3 sessions are unnecessarily cached
Links to More Info: BT2244393
Component: Local Traffic Manager
Symptoms:
More sessions than necessary are getting cached which can cause an increase in memory usage.
Conditions:
TLS 1.3 is enabled and used.
Impact:
Memory usage increases.
Workaround:
Disable the Retain Certificate setting in the SSL profile (https://my.f5.com/manage/s/article/K19802202).
2240945-1 : platform_agent crash when deleting a virtual_server.
Component: F5OS Messaging Agent
Symptoms:
platform_agent may crash when deleting a virtual server.
Conditions:
- The system has the fix for ID2008409;
- A Mac masquerade is configured on a traffic group;
- A tunnel terminating at a BIG-IP or a vlan-group is used;
- A virtual server is deleted.
Impact:
platform_agent will restart, dumping a core.
This should have no impact on passing traffic.
Workaround:
NA
2240889-1 : TMM route can unexpectedly overwrite MGMT kernel route
Links to More Info: BT2240889
Component: TMOS
Symptoms:
MGMT kernel route gets overwritten by a TMM route with the same destination and netmask as the MGMT kernel route.
Conditions:
1. VELOS tenant
2. mgmt route exists with a dest and netmask (ex. 192.0.2.0/24 dev mgmt proto kernel scope link src 192.0.2.24)
3. A TMM route is created with the same dest and netmask as the mgmt route: tmsh create net route test network 192.0.2.0/24 gw 198.51.100.1
Impact:
Mgmt route is no longer present in 'ip route' and gets overwritten by the TMM route created
Workaround:
Do not create a tmm route with the same destination and netmask as the mgmt route.
Filter out the mgmt route from the receiving dynamic route
2230889-3 : SIP parser mishandles RFC 3261 folded headers, causing 200 OK forwarding failure with iRule routing
Links to More Info: BT2230889
Component: Service Provider
Symptoms:
With a SIP profile and iRule routing by string match, a valid 200 OK with a folded (multi-line) Accept header is not forwarded, but it forwards correctly if the Accept header is on a single line.
Conditions:
Virtual Server: UDP port 5060 (SIP)
Profiles: SIP profile, UDP profile (default settings)
Pool: At least one pool member
iRule: Attached to the virtual server
Send a SIP 200 OK response to the BIG-IP with a folded Accept header.
Impact:
When a SIP profile is applied and Content-Length is present, SIP messages with folded (multi-line) headers are silently dropped, causing call setup failures, missed responses, or other signaling disruptions.
Workaround:
Use the flattened Accept Header in payload:
Accept: application/sdp, application/isup, multipart/mixed, application/dtmf
2230709-2 : iRule class match fails after modifying IP data group entries with route-domains
Links to More Info: BT2230709
Component: Local Traffic Manager
Symptoms:
After adding and then removing an IP data group entry that includes a route-domain (for example, 10.0.0.0%10/8), iRule class match commands against the data group stop matching entries that were previously working. All traffic may be treated as if it does not match the data group.
Conditions:
- An IP data group is in use by an iRule with a class match command.
- An entry with a route-domain qualifier (for example, %10) is added to the data group and then removed.
Impact:
iRule class match lookups against the affected data group return no match, causing traffic to be classified incorrectly. For example, traffic that should match an internal users data group may be treated as external.
Workaround:
Restart TMM (bigstart restart tmm — causes a traffic disruption), reboot the BIG-IP system, or create a new data group with the same entries and update the iRule to reference the new data group.
2230705-3 : SSL handshake failure with Session Ticket that is rejected by backend server
Links to More Info: BT2230705
Component: Local Traffic Manager
Symptoms:
SSL handshake failure occurs with "Connection error: ssl_hs_rx:5756: alert(10) unexpected msg" found in /var/log/ltm
Conditions:
- Server SSL profile is enabled with the Session Ticket feature
- Backend server also supports Session Ticket
- Backend server rejects the Session Ticket sent by the BIG-IP
Impact:
- Service is disrupted because of a handshake failure.
Workaround:
Disable the Session Ticket feature on the Server SSL Profile or the backend server.
2230613-3 : Bot defense stateful anomalies and microservices not fully enforced on blade setups
Component: Application Security Manager
Symptoms:
Bot-Defense is failing to sync statefull anomalies (including microservices) between blades, causing partial enforcement.
Conditions:
Bot Defense is attached to VS, and includes a statefull anomalies enables, and/or microservices.
Instance contains blades (VELOS etc)
Impact:
Statefull anomalies and Microservices enforcement works on primary blade only.
Workaround:
N/A
2230597-3 : Under syncookie mode, temporary listeners may fail to complete connections
Links to More Info: BT2230597
Component: Local Traffic Manager
Symptoms:
Temporary listeners might not complete a connection under a syncookie mode.
Conditions:
Occurs when,
- Temporary listener is used for handling traffic (for example FTP).
- Device under syncookie mode.
Impact:
BIG-IP may fail to establish a proxied TCP connection if it doesn’t complete the TCP three-way handshake with the pool member.
Workaround:
1. Disable syncookies.
2. Disable inheritance when possible. For example, FTP ephemeral listeners inherit syncookie behavior from the FTP virtual server; disabling inherit-parent-profile prevents the ephemeral listener from inheriting syncookies.
2230137-3 : Multicast forwarding entry might not be created during a traffic burst.
Links to More Info: BT2230137
Component: TMOS
Symptoms:
When handling a traffic burst of multicast traffic going to different multicast destinations, some multicast forwarding cache entries might not be created in TMM.
Conditions:
BIG-IP configured with multicast routing.
Impact:
Some multicast routes might not be created. Some streams might not be forwarded.
Workaround:
None
2229625-1 : Client Side Defense silently fails with an empty 200 response when there is no route to the XC server
Links to More Info: BT2229625
Component: Client-Side Defense
Symptoms:
If a Client Side Defense profile is configured with an API Domain Pool but there is no route to the pool, it will silently fail and just sent an empty 200 response.
Conditions:
Client Side Defense profile configured with an API Domain Pool and there is no route to the pool.
Impact:
Connections work but it is difficult to determine why the Client Side Defense Profile is failing.
Workaround:
None
2229525-3 : TMM crash due to stale shared memory mapping after wr_urldbd restart
Links to More Info: BT2229525
Component: Traffic Classification Engine
Symptoms:
When the webroot database (wr_urldbd) is restarted, tmm can crash.
Conditions:
wr_urldbd is restarted
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2229273-1 : LDAP authentication fails when multiple LDAP servers are configured
Links to More Info: BT2229273
Component: TMOS
Symptoms:
When 2 or more ldap servers are configured for ldap authentication, auth fails due to timer expired (PAM timeout).
Conditions:
-- Multiple ldap servers are configured for Remote-LDAP authentication
-- The bind-timeout and search-timeout values are set to 30 seconds (this is the default)
Impact:
LDAP authentication fails due to PAM timeout- even when one of the servers responds with success.
Workaround:
Set the bind-timeout and search-timeout to lower values i.e 5 seconds
2229185-1 : Virtual server stops responding to ICMP requests
Links to More Info: BT2229185
Component: Carrier-Grade NAT
Symptoms:
ICMP is enabled by default on virtual server destination addresses.
"icmp-echo' is disabled by default on security nat source-translation objects.
"proxy-arp" is disabled by default on security nat source-translation objects.
When a security nat source-translation object shares one of its addresses with a virtual server destination address:
- If the security nat source-translation was created *before* the virtual server, enabling "proxy-arp" on the security nat source-translation object disables ICMP on the virtual server address. Even if "proxy-arp" shouldn't have anything to do with the ICMP behaviour of the virtual address.
- If the security nat source-translation was created *after* the virtual server, enabling "proxy-arp" on the security nat source-translation does not have any effect on the ICMP behaviour of the virtual server address. This is the expected behaviour.
Conditions:
- A security nat source-translation object shares one of its addresses with a virtual server destination address.
- The security nat source-translation object was created before the virtual server
- The "proxy-arp" setting of the security nat source-translation object is set to "enabled"
Impact:
ICMP is disabled on the virtual server address.
Workaround:
Two possible workarounds:
(1)
- Delete the virtual server and the security nat source-translation object sharing the address.
- Recreate the virtual server, and then recreate the security nat source-translation object.
Or:
(2)
Set "proxy-arp" on the security nat source-translation object to "disabled".
2228869 : Continuous tmm cores in domain_table_search with null dereferencing
Links to More Info: BT2228869
Component: Global Traffic Manager (DNS)
Symptoms:
Tmm cores
Conditions:
Corrupt zone express database
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2228753-1 : Violation_details may contain unexpected line break
Links to More Info: BT2228753
Component: Application Security Manager
Symptoms:
Violation_details field may contain an unexpected line break, such as 0x0d or 0x0a.
Conditions:
- Using remote logging
- Sending violation_details
- Using "Maximum Request Size" with a specified length, not Any
Impact:
Remote logging server may be confused by the line break.
Workaround:
Do not send violation_details or use "Maximum Request Size: Any".
2228421-1 : GUI: Help contents missing for "System >> Crypto Offloading : Acceleration Strategy" (404 error)
Links to More Info: BT2228421
Component: TMOS
Symptoms:
The GUI Help frame for 'Acceleration Strategy' page under 'System >> Crypto Offloading' shows a 404 error:
===========================
Object Not Found - 404 Error
The object (https://10.10.0.1/tmui/help/en/tmui/system/crypto/acceleration_strategy/properties.jsp) you were trying to reach does not exist.
The URL or bookmark you clicked is old or misspelled.
Check your URL and try again, or go back to the home page.
===========================
Conditions:
On the GUI, select "System >> Crypto Offloading : Acceleration Strategy" and click the "Help" tab on left side menu panel.
Impact:
No GUI help available for 'Acceleration Strategy'.
Workaround:
Inline help is available using tmsh.
From the command-line:
# tmsh help sys crypto acceleration-strategy
2227513-3 : Tmm crash in Google Cloud during a live migration
Links to More Info: BT2227513
Component: Local Traffic Manager
Symptoms:
When running in Google Cloud and a live migration occurs tmm may crash.
Conditions:
- BIG-IP is running in Google Cloud
- tmm is utilizing the virtio driver
- A live migration is occurring
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable live migration in GCP.
or
Use the sock driver.
2225313-3 : ASM CAPTCHA refresh and audio icons are missing after policy import
Component: Application Security Manager
Symptoms:
ASM CAPTCHA refresh, and audio icons may be missing when a policy is imported and applied directly.
Conditions:
A policy is imported and applied directly.
Impact:
ASM CAPTCHA refresh and audio icons may be missing.
Workaround:
Make a spurious change to any Blocking Response Page and apply policy.
2225173-1 : HA Failover does not happen when a tenant's Active controller is pulled out and one or more blades goes offline
Links to More Info: BT2225173
Component: Local Traffic Manager
Symptoms:
In an extremely rare scenario where one or more blade goes offline when the active system controller of the tenant is pulled out, there is no corresponding drop in HA score on the tenant and failover does not occur.
Conditions:
1) Active controller on the tenant is pulled out
2) One or more blades go offline erroneously after this
3) HA group on the tenant is configured with F5OS_INTERNAL trunk component with an appropriate weight
Impact:
1) No tenant failover happens though the number of working trunk members went down
Workaround:
In this condition, restart sod by using the below command
bigstart restart sod
2224853 : BIG-IP DNS may not respond to RRSIG type queries correctly with DNSSEC zones
Links to More Info: BT2224853
Component: Global Traffic Manager (DNS)
Symptoms:
BIG-IP DNS may not return RRSIG records when queried directly via RRSIG type queries on DNSSEC-enabled zones.
Conditions:
A DNSSEC zone is created on BIG-IP-DNS and a DNS query with type RRSIG is sent.
Impact:
BIG-IP-DNS may not respond to RRSIG type queries correctly.
The response may differ for under apex records. If they exist, the response is NODATA; if they do not exist, the response is NXDOMAIN.
BIG-IP should respond as this is a valid request with RRSIG for all types.
Workaround:
NA
2224537-3 : Tmm crash in Google Cloud during a live migration
Links to More Info: BT2224537
Component: Local Traffic Manager
Symptoms:
When running in Google Cloud and a live migration occurs tmm may crash.
Conditions:
- BIG-IP is running in Google Cloud
- tmm is utilizing the virtio driver
- A live migration is occurring
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable live migration in GCP.
or
Use the sock driver.
2223645-3 : BIG-IP does not implement traffic forwarding as per RFC 3927
Links to More Info: BT2223645
Component: Local Traffic Manager
Symptoms:
BIG-IP does not implement traffic forwarding as per RFC 3927#section-7
Routers must not forward packets with an IPv4 link-local source or destination address, regardless of routing configuration.
Conditions:
BIG-IP acting as a proxy for Ipv4 traffic.
Impact:
Incorrect traffic forwarding.
Workaround:
Create an iRule to drop traffic to or from specific addresses.
222220-12 : Distributed application statistics are not passed correctly.
Links to More Info: K11931
Component: Global Traffic Manager (DNS)
Symptoms:
Distributed application statistics include only requests passed to its first wide IP.
For BIG-IP versions 12.0.0 and later, distributed application statistics are always zero.
Conditions:
Viewing distributed application statistics on configurations with multiple wide-IP members.
Impact:
The system does not pass statistics for requests to all wide-IP members in the distributed application.
Note: For BIG-IP versions 12.0.0 and later, the system does not pass statistics for requests to any wide-IP-members in the distributed application.
Workaround:
None
2222141 : JSON parser does not reject certain invalid JSON patterns that violate RFC 8259
Links to More Info: BT2222141
Component: Local Traffic Manager
Symptoms:
The JSON_REQUEST_ERROR event is not triggered for certain invalid JSON payloads that should be rejected according to RFC 8259.
Invalid JSON patterns that are NOT caught include:
Trailing commas in objects: {"mystring": "addcomma",}
Nested objects with missing values: {"nested": {"missing": }}
Leading zeros in numbers: {"number": 01234}
Duplicate keys: {"duplicate": 1, "duplicate": 2}
Trailing commas in arrays: {"tools": [{"name": "value"},]}
Valid JSON patterns that ARE correctly rejected:
Single quotes instead of double quotes: {"single": 'quotes'}
Unquoted keys: {invalid: "no quotes on key"}
Undefined values: {"bad_value": undefined}
Incomplete JSON: {"incomplete": "missing closing brace"
Conditions:
1) BIG-IP version 21.0.0 with JSON profile configured
2) Using new LTM iRule events (JSON_REQUEST_ERROR, JSON_REQUEST_MISSING) introduced in v21.0.0
3) Processing HTTP or HTTP/2 requests with JSON content
Impact:
1) The BIG-IP JSON profile parser is less strict than other JSON validation tools (e.g., jq, standard JSON parsers)
2) Applications relying on JSON_REQUEST_ERROR event to reject malformed JSON may allow invalid JSON payloads to pass through
Security policies depending on strict JSON validation may be bypassed
3) Inconsistent behavior compared to industry-standard JSON validators
2221585-3 : When tenant renews DHCP lease on eth2, the interface IP address on mgmt also gets modified
Links to More Info: BT2221585
Component: TMOS
Symptoms:
When eth2 DHCP lease renews on rSeries tenant, management interface IP is incorrectly changed to eth2 IP (100.69.1.1/24) causing loss of remote management access.
This can occur when eth2 renews the lease after 999 days or when executing manual command to renew eth2's DHCP lease (dhclient -r).
Logs similar to the following can be seen from the tenant's /var/log/boot.log:
info dhcp_config[20430]: management_ip = 100.69.1.1
info dhcp_config[20430]: F5::COAPI::TransactionalSave Succeeded.
info dhcp_config[20430]: domain_search = <default.svc.cluster.local. svc.cluster.local. cluster.local. chassis.local.>
info dhcp_config[20430]: domain_name = <default.svc.cluster.local>
info dhcp_config[20430]: In update_ltcfg_field().
info dhcp_config[20430]: LTCFG Field => ('dns', 'search', 'dns')
info dhcp_config[20430]: New value => 'default.svc.cluster.local.,svc.cluster.local.,cluster.local.,chassis.local.'
info dhcp_config[20430]: Existing value => 'localhost'
info dhcp_config[20430]: dns_servers = <10.10.1.10>
info dhcp_config[20430]: In update_ltcfg_field().
info dhcp_config[20430]: LTCFG Field => ('dns', 'nameservers', 'dns')
info dhcp_config[20430]: New value => '10.10.1.10'
info dhcp_config[20430]: Existing value => '10.10.1.241,10.10.1.242,10.10.1.243'
info dhcp_config[20430]: In update_ltcfg_config_source() for 'dns'.
info dhcp_config[20430]: New 'config_source' value => '0'
info dhcp_config[20430]: Existing value => '0'
info dhcp_config[20430]: No change in 'config_source' for 'dns'. Skip update.
info dhcp_config[20430]: In update_ltcfg_field().
info dhcp_config[20430]: LTCFG Field => ('dns', 'description', 'dns')
info dhcp_config[20430]: New value => 'configured-by-dhcp'
info dhcp_config[20430]: Existing value => ''
info dhcp_config[20430]: F5::COAPI::TransactionalSave Succeeded.
info dhcp_config[20430]: hostname = 'bigip1.default.svc.cluster.local'
info dhcp_config[20430]: In update_ltcfg_field().
info dhcp_config[20430]: LTCFG Field => ('system', 'hostname', 'system')
info dhcp_config[20430]: New value => 'bigip1.default.svc.cluster.local'
info dhcp_config[20430]: Existing value => 'bigip1.default.svc.cluster.local'
info dhcp_config[20430]: No change in ltcfg field 'hostname'. Skip update.
info dhcp_config[20430]: Successfully finished the execution of /usr/libexec/dhcp-config.
Notice that in addition to changing the management IP address it also changes the DNS and hostname.
Conditions:
- rSeries tenant running for 999 days and its DHCP-enabled eth2 interface renews the lease.
- This may also occur if an administrator manually executes a command that forces eth2 to renew its lease.
Impact:
Loss of remote connectivity to management interface.
Workaround:
Reboot the affected BIG-IP tenant or
change tenant state from "deployed" to "configured" and back to "deployed" via F5OS host.
DNS and hostname settings may also need to be changed back to their previous value.
2221017-3 : The BIG-IP virtio driver may core during startup
Links to More Info: BT2221017
Component: Local Traffic Manager
Symptoms:
If a failure occurs in the BIG-IP's virtio driver during startup, it may core when attempting to modify statistics that have not yet been initialized.
Conditions:
-- Virtio driver in use.
-- BIG-IP is starting up.
-- An error occurs that is tracked by a statistic.
Impact:
TMM cores and restarts.
2220397-1 : Modifying iRule proc while iRule in use may cause connection to reset
Links to More Info: BT2220397
Component: Local Traffic Manager
Symptoms:
Connection gets aborted with logs similar to the following on ltm logs :
TCL error: /Common/[irule-name] <EVENT_NAME> - proc [Proc name] not found
Conditions:
1. iRule is using proc command
2. iRule proc is renamed or deleted while the iRule is in use.
Impact:
Incoming client connections may get aborted.
Workaround:
None
2220285-1 : Modifying iRule proc with ILX::call may result in tmm crash
Links to More Info: BT2220285
Component: Local Traffic Manager
Symptoms:
TMM may crash if the iRule Proc with ILX::call is renamed or deleted while the iRule is in use.
Conditions:
1. ILX::call is within irule proc
2. iRule proc is either renamed or deleted while the iRule is in use.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2220009-1 : OCSP monitoring of traffic certificates using a proxy server sends malformed HTTP host header
Links to More Info: BT2220009
Component: Local Traffic Manager
Symptoms:
The HTTP/1.1 request is malformed as the HOST header contains the host plus the path after it
Conditions:
OCSP responder configured that
1. Enables "Use Proxy Server"
2. The responder URL has a path after the host
Impact:
The HTTP/1.1 OCSP request is malformed as the HOST header contains the host plus the path after it
Workaround:
None
2219209-1 : Resetting profile statistics may lead to memory corruption
Links to More Info: BT2219209
Component: Access Policy Manager
Symptoms:
TMM may crash or generate wrong behavior
Conditions:
API Protection profile statistics have been reset, an issue internally might overwrite memory in other area.
Impact:
Can cause unexpected behavior or even a crash
Workaround:
N/A
2218157-3 : IP Intelligence database load log displayed periodically
Links to More Info: BT2218157
Component: Advanced Firewall Manager
Symptoms:
IP Intelligence database load log is displayed periodically in TMM log files.
Conditions:
- Configuration refers to IP intelligence feature.
- No active subscription for IP intelligence.
- IP intelligence database load fails periodically.
Impact:
- TMM log files contain messages similar to:
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpRep.dat
<13> Sep 24 09:55:01 bigip1 notice Failed to open /var/IpRep/F5IpV6Rep.dat
- LTM log files contain messages similar to this one, logged by each tmm into the every 5 minutes:
Sep 24 10:00:05 f5test.localhost err tmm2[1492]: 01010377:3: Failed to open IpRep database file /var/IpRep/F5IpV6Rep.dat
Workaround:
- Update the license to include an IP Intelligence subscription
or
- Remove the ip-intelligence objects from the configuration
2217793-3 : I5800 AFM 17.5.1.3 - After upgrade to 17.5.1.3, unable to reorder rules under AFM policy.★
Links to More Info: BT2217793
Component: Advanced Firewall Manager
Symptoms:
AFM firewall rule reorder functionality fails in webUI when "Inline Rule Editor" is disabled (afm.inlineruleeditor=false) after upgrading to version v17.5.1.3.
Conditions:
BIG-IP AFM versions 17.5.1.3, or 21.0.0 with sys db key afm.inlineruleeditor set to false.
Impact:
AFM firewall rules cannot be reordered via the webUI drag-and-drop interface.
Workaround:
Configure using TMSH or enable Inline Rule Editor.
2217677-1 : BIG-IP v21.0: Tunnel object exists in MCPD but missing Linux tunnel tap device, causing ioctl failure and config deployment failure
Links to More Info: BT2217677
Component: TMOS
Symptoms:
- Configuration reapplication fails with the error:
01070712:3: Cannot get device index for <tunnel_name> in <route_domain_name> - ioctl failed: No such device
- IPsec tunnel configuration deployment fails in BIG-IP v21.0.
- Tunnel object is present in MCPD, but the corresponding Linux tunnel tap device is missing.
- HA configuration synchronization fails or remains out of sync.
- This may affect other config objects like that need to setup tuntap devices on the linux host, but the problem has only been observed for IPsec.
Conditions:
- BIG-IP version 21.0.x.
- IPsec tunnel configured within a non-default route domain (e.g., RD 31).
- Associated objects (self IPs, route domains, IPsec policies, traffic selectors, tunnels) are present in MCPD.
- HA environment with configuration synchronization enabled between peers.
- Repeated configurations add/delete operations or automation-driven deployments.
Impact:
Application and IPsec tunnel configuration deployment fails.
HA synchronization cannot complete successfully, leaving devices out of sync.
Workaround:
It is possible to create the missing tuntap device on the linux host.
# rdexec <route_domain_id> ip tuntap add <tunnel_name> mode tap
It is unsafe to let this placeholder interface stay in place, so delete the config object via tmsh, web UI, etc. Then deploy the desired config again to create the tunnel object.
2217273-2 : TMM crashes with a SIGFPE when it receives IPS traffic.
Links to More Info: BT2217273
Component: Protocol Inspection
Symptoms:
TMM crashes with a SIGFPE when it receives IPS traffic.
Conditions:
It occurs when traffic reaches a virtual server or firewall policy with an IPS profile while IPS signature blobs are still being created and the IPS engines are not yet ready.
Impact:
TMM crash (service disruption/crash loop possible).
2217181 : When "Publish CDS/CDNSKEY" is enabled for a DNSSEC zone on BIG-IP DNS, the system signs CDS and CDNSKEY records with both the Key Signing Key (KSK) and Zone Signing Key (ZSK)
Component: Global Traffic Manager (DNS)
Symptoms:
When "Publish CDS/CDNSKEY" is enabled for a DNSSEC zone on BIG-IP DNS, the system signs CDS and CDNSKEY records with both the Key Signing Key (KSK) and Zone Signing Key (ZSK). This behavior follows older DNSSEC practices from RFC 6781, when BIND also signed these records with both keys.
BIG-IP's current behavior is non-compliant with RFC 7344.
Conditions:
Using DNSSEC
"Publish CDS/CDNSKEY" is enabled
Impact:
When querying for CDS/CDNSKEY, the response will show two RRSIG records signed: one with KSK and one with ZSK.
Workaround:
NA
2217093-3 : L2 traffic to masquarade MAC on Standby might be flooded when multiple interfaces are used
Links to More Info: BT2217093
Component: Local Traffic Manager
Symptoms:
On platforms without the switch (i2000/i4000) configured with multiple interfaces under a single VLAN, traffic to masquerade MAC address will be flooded to all available interfaces and will not follow FDB entries.
Conditions:
- Switchless platform (like i2000/i4000).
- Multiple interfaces configured under a single VLAN. For example:
net vlan vlan2 {
interfaces {
2.0 {
tagged
}
trunk1 {
tagged
}
}
}
- traffic to masquarade MAC is misdirected to Standby unit.
Impact:
Unnecessary flooding occurs.
Workaround:
None.
2211137-3 : EPSEC upgrade fails when default package is pre-uploaded★
Links to More Info: BT2211137
Component: Access Policy Manager
Symptoms:
After upgrading BIG-IP APM from version 17.1.2 to 17.1.3, the APM directories /var/apm/lib and /var/apm/www are missing. The system shows an empty EPSEC version (apm.epsec.version = ""), and APM functionality is impacted. This issue occurs on both units in an HA pair.
Conditions:
This issue occurs when all of the following conditions are met:
1. BIG-IP APM is running version 17.1.2 (default EPSEC package version 1749)
2. EPSEC package version 1915 was uploaded via GUI but not installed on the 17.1.2 system
3. System is upgraded to version 17.1.3 (which has EPSEC 1915 as the default package)
4. The upgrade creates an upload marker for EPSEC 1915 in the configuration filestore
Impact:
Endpoint security checks cannot be performed, APM policies and access profiles may fail to function properly, and end users may be unable to access APM-protected resources.
Workaround:
Upload and install a newer EPSEC package (version 1941 or later) via the GUI:
1. Navigate to Access > System > File Management > Endpoint Software Management
2. Upload a newer EPSEC package (e.g., epsec-1.0.0-1941.0.iso or later)
3. Install the uploaded package
4. Verify the directories are created: ls -l /var/apm/
5. Confirm EPSEC version: tmsh list sys db apm.epsec.version
2211133-3 : ICMP error length does not follow RFC 812 guidance
Links to More Info: BT2211133
Component: Local Traffic Manager
Symptoms:
Only 8 bytes of original payload is included in ICMP error message sent from BIG-IP. RFC 1812 section 4.3.2.3 indicates systems should include as much as possible, up to 576 bytes total.
Conditions:
ICMP error message sent from BIG-IP.
Impact:
With only 8 bytes included in the ICMP error message, provides limited context for debugging. The TCP and UDP headers are truncated mid-header.
Workaround:
None.
2209157-3 : FastL4 late binding does not proxy MSS when establishing server-side connection.
Links to More Info: BT2209157
Component: Local Traffic Manager
Symptoms:
FastL4 late binding does not proxy MSS when establishing server-side connection.
Conditions:
FastL4 profile with late-binding option enabled.
Impact:
Sub-optimal connection performance.
Workaround:
MSS-overwrite option can be used to manually adjust server-side MSS.
2208821-3 : VIPRION cluster becomes INOPERATIVE and fails to load configuration after software upgrade★
Links to More Info: BT2208821
Component: Local Traffic Manager
Symptoms:
After upgrading BIG-IP software on a VIPRION system, the device may fail to load the configuration and enter an INOPERATIVE state. The system remains stuck during the configuration load phase, preventing normal operation.
Conditions:
1. VIPRION platform with clustered configuration.
2. Performing a BIG-IP software upgrade.
3. System attempts to load post-upgrade configuration during boot or blade role transition
Impact:
The VIPRION cluster becomes INOPERATIVE and is unable to load the configuration. Traffic is impacted as the system cannot process or pass traffic until the issue is resolved.
Workaround:
Restarting the system with a different blade set as primary, or reverting to the previously working software version, allows the configuration to load successfully. In some cases, re-attempting the upgrade after correcting the blade role transition also resolves the issue.
2202005 : IPsec can send packets across tunnels on standby node.
Links to More Info: BT2202005
Component: TMOS
Symptoms:
IPsec is sending packets over the tunnel from the standby node, which should not occur.
Conditions:
In an HA setup with IPsec configured, once the tunnel is established, there is a possibility that the standby node may send packets.
Impact:
IPsec functionality may be impacted if both the active and standby nodes send ESP packets to the peer.
Workaround:
Added an HA check that first verifies the device status, if it is in standby, the packet is dropped accordingly.
2200537-2 : Audio captcha script error
Links to More Info: BT2200537
Component: Application Security Manager
Symptoms:
A script error in audio captcha on specific browsers
Conditions:
-- Audio captcha is required.
-- The user is using Internet Explorer on Windows 11
Impact:
Error in the captcha page. Unable to use captcha causing client side enforcement to fail.
Workaround:
None
2200405-3 : Live Update proxy.host value requires brackets around IPv6 Addresses
Links to More Info: BT2200405
Component: Application Security Manager
Symptoms:
Curl calls used to download Live Update files will fail if using a proxy.host with an IPv6 address that does not include brackets.
Conditions:
Live Update is configured through a proxy.host that is using IPv6 and does not include brackets around the IPv6 value.
E.g. "[IPv6]"
Impact:
Live Update necessitates an IPv6 proxy.host have brackets, while IP Reputation necessitates that it does not have brackets. This discrepancy results in one or the other continually failing when attempting to use an IPv6 proxy.host.
Workaround:
If possible, utilize a proxy.host value that is not an IPv6 Address.
2200389-1 : CDS and CDNSKEY not included in DNSX zone transfer data
Links to More Info: BT2200389
Component: Global Traffic Manager (DNS)
Symptoms:
CDS and CDNSKEY not included in DNSX zone transfer data
Conditions:
Dnssec zone with "Publish CDS/CDNSKEY" option is enabled
Impact:
Missing CDS/CDNSKEY in zone transfer
Workaround:
None
2200217-1 : DNSSEC validation failures due to missing DS records in zone transfers
Links to More Info: BT2200217
Component: Global Traffic Manager (DNS)
Symptoms:
DNSSEC validation failures occur when querying child zones despite proper DNSSEC configuration, caused by missing DS records in parent zone transfers. The issue affects child zone delegations that use nameservers located outside the child zone itself, such as external nameservers or nameservers under the parent zone. Only delegations where nameservers are within the child zone's own domain hierarchy work correctly. This breaks the DNSSEC chain of trust between parent and child zones, preventing secure DNS resolution for affected delegations.
Conditions:
- DNSSEC is enabled on both parent and child zones.
- Child zones have DS records configured in the system.
- Child zone delegations use nameservers that are either external or located under the parent zone.
-Zone transfers are being performed for the parent zone.
Impact:
DNSSEC chain of trust broken.
Workaround:
None
2199701 : big3d was stuck in high CPU after network disruption
Links to More Info: BT2199701
Component: Global Traffic Manager (DNS)
Symptoms:
big3d consuming high CPU
Conditions:
Network disruption
Impact:
big3d overloaded with high CPU usage
2199469-3 : Serverssl-use-sni not working in HTTP2 to HTTP gateway setups.
Links to More Info: BT2199469
Component: Local Traffic Manager
Symptoms:
Virtual server's 'serverssl-use-sni' setting does not work when virtual server has HTTP2 profile attached on the client-side and HTTP profile on the server-side.
Conditions:
HTTP2 to HTTP gateway config with 'serverssl-use-sni' option enabled.
Impact:
Incorrect serverssl profile might be selected when establishing server-side connection.
Workaround:
iRule can be used to select the profile based on presented SNI, for example:
when CLIENTSSL_CLIENTHELLO {
binary scan [SSL::extensions -type 0] @9a* sni
log local0. "SNI: $sni"
}
when SERVER_CONNECTED {
switch -glob [string tolower $sni] {
"foo.com" {
SSL::profile foo-serverssl
}
"bar.com" {
SSL::profile bar-serverssl
}
}
}
2198721-1 : SAML apmd memory leak
Links to More Info: BT2198721
Component: Access Policy Manager
Symptoms:
Apmd process will leak memory when configured with SAML authentication.
Conditions:
APM configured with SAML
Any BIG-IP version >= 17.1.0
Impact:
BIG-IP can run out of memory and some services killed to release memory.
Workaround:
None
2198589-3 : BIG-IP allows enabling deprecated Network Access compression, causing intermittent tunnel traffic drops with Edge Client
Links to More Info: BT2198589
Component: Access Policy Manager
Symptoms:
Intermittent tunnel traffic drops when Network Access compression is enabled
Tunnel stability is restored when Compression is disabled
No client-side errors clearly indicating unsupported configuration
Admins can still enable compression via BIG-IP UI/CLI despite deprecation
Conditions:
-- BIG-IP APM with Network Access resource configured
-- Compression enabled on Network Access resource
-- Edge Client version 7.2.6 or later
-- VPN tunnel established
-- Intermittent traffic flow over the tunnel
Impact:
-- Intermittent VPN tunnel instability
-- Hard-to-diagnose issues, potentially leading to unknowingly enabling unsupported configurations
Workaround:
Disable compression in the BIG-IP Network Access config and connectivity profile config
2197321-1 : BIG-IP does not select FFDHE key share provided by the client on session resumption.
Links to More Info: BT2197321
Component: Local Traffic Manager
Symptoms:
Connection terminates if the client does not allow secure renegotiation, otherwise renegotiation occurs.
Conditions:
ClientSSL that uses FFDHEgroups and has session tickets enabled.
The client tries to resume an SSL session with an FFDHE key share that used FFDHE previously.
Impact:
Connection terminates if the client does not allow secure renegotiation, otherwise renegotiation occurs.
Workaround:
None
2197305-1 : BIG-IP generates invalid SSL key share
Links to More Info: BT2197305
Component: Local Traffic Manager
Symptoms:
SSL handshakes fail on the client due to an Illegal Parameter alert.
Conditions:
ClientSSL that mixes both FFDHE and Non-FFDHE groups and has session tickets enabled.
The client tries to resume an SSL session with a Non-FFDHE key share that used FFDHE previously.
Impact:
SSL handshake fails and the connection terminates
Workaround:
None
2197289-1 : Enabling SSH access via the GUI blocks MCPD for 90 seconds
Links to More Info: BT2197289
Component: TMOS
Symptoms:
- Disconnections from the GUI occur (no responses to color advisory probe)
- SNMP query timeouts
- iQuery interruptions
Conditions:
-- SSH access is disabled via the GUI
-- SSH access is then enabled via the GUI
Impact:
-- MCPD is blocked for 90 seconds
-- sshd service does not come up for the first 90 seconds after enabling SSH access
Workaround:
None
2196597-1 : TMM generates core when large firewall policy is attached to multiple virtual servers due to SOD watchdog timeout
Links to More Info: BT2196597
Component: Advanced Firewall Manager
Symptoms:
-- TMM processes generate core dumps (SIGABRT) when activating firewall policies with high rule counts (20,000+ rules) across multiple virtual servers (20+)
--- SOD (System Oversight Daemon) sends SIGABRT signal to TMM processes
--- Observe the ltm log "sod[10802]: 01140041:5: Killing tmm.0 pid 23754."
Conditions:
1, Deploy couple of tenants with 8 slots on each Chasis
2, Set up an HA pair (Active/Standby).
3, Provision the system with LTM, AFM, and AVR modules.
4, Create a Network Firewall policy containing approximately 20,000 rules.
5, Attach the firewall policy to a virtual server.
6, Create 20 or more virtual servers, attaching the same firewall policy to each.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Disable SOD Heartbeat Monitoring for all TMMs
--- tmsh modify sys daemon-ha tmm heartbeat disabled.
2195709-1 : TCP fingerprint tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.
Links to More Info: BT2195709
Component: Policy Enforcement Manager
Symptoms:
TCP fingerprinting tethering detection does not work when a subscriber's traffic comes from a tethering Mac OS system.
Conditions:
- PEM tethering detection, is configured in a PEM policy rule like this one:
pem policy policy-01 {
rules {
detect-01 {
dtos-tethering {
dtos-detect enabled
report {
dest {
hsl {
publisher default-ipsec-log-publisher
}
}
}
tethering-detect enabled
}
precedence 1000
}
}
transactional enabled
}
- The subscriber connects through a Windows, Android or IoS phone, and the phone OS is recognised in the PEM "Device OS" PEM session field, for example:
Device Name Nokia_Corporation-Nokia_Lumia_710
Device OS Windows_Mobile_8
- An iRule to detect tethering is configured in the relevant virtual server, for example:
ltm rule tethering-detection {
when CLIENT_ACCEPTED {
set ip [IP::client_addr]
set tether [PEM::session info tethering detected $ip]
if {$tether eq "1"} {
log local0. "Tethering detected !"
} else {
log local0. "no tethering detected"
}
}
}
- The subscriber is tethering through the phone using a MacOS operating system.
Impact:
Tethering from a MacOS operating system is never detected.
Workaround:
None
2189993 : Upgrade from 17.5.1.3 to 21.0.0 and the config failed to load with error:01071197:3: Metacharacter '*' must be at end of the session variable name★
Links to More Info: BT2189993
Component: TMOS
Symptoms:
When upgrading BIG-IP Virtual Edition from 17.5.1.3 to 21.0.0, a configuration load error occurs:
01071197:3: Metacharacter '*' must be at end of the session variable name.
Unexpected Error: Loading configuration process failed.
Conditions:
-- APM provisioned and configured
Impact:
You are unable to complete the upgrade from v17.5.1.3 to v21.0.0
Workaround:
None
2187429-3 : TMM might crash when using MRF framework.
Links to More Info: BT2187429
Component: Service Provider
Symptoms:
TMM might crash when using MRF framework.
Conditions:
Configurations that include message routing framework.
Impact:
Traffic disrupted while tmm restarts.
2187141-3 : DNS generic server stuck offline after monitor removal
Links to More Info: BT2187141
Component: Global Traffic Manager (DNS)
Symptoms:
Removing the monitor from the virtual server can leave the DNS generic server stuck in “Offline (Enabled) – No enabled virtual server available.”
Conditions:
Removes a monitor from the Virtual Server and uses a Generic Server type.
Impact:
The generic server shows the same status as the Virtual Server.
Workaround:
NA
2186933-4 : ILX Plugin may not work after use of npm install command on workspace.
Component: Local Traffic Manager
Symptoms:
After using the 'npm install' command on the workspace.
The below message will be logged in ltm logs after plugin reload:
err sdmd[21349]: 018e0018:3: pid[17783] plugin[<plugin-name>.<extension-name>] Error: Cannot find module 'f5-nodejs'
err sdmd[21349]: 018e0010:3: Extension <plugin-name>.<extension-name> exceeded the maximum number of restarts (5) over the last 60 seconds and has been disabled
Conditions:
1. The ILX plugin is in use with node version 6.
2. ILX workspace has been modified with npm install command.
3. Plugin has been reloaded after 'npm install'
Impact:
Traffic processing on virtual server with plugin attached will fail with the following logs:
Could not find ILX extension <extension-name> in path <workspace-name>
Workaround:
To prevent the issue:
1. Use NPM install command with '--no-package-lock' flag.
- npm install --no-package-lock <package-name>
If already Encountered the issue:
1. Restore package.json from /usr/share/packages
- tar -xzf /usr/share/packages/nodejs/f5-nodejs-6.tgz -C /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/node_modules
2. Update package.json at path /var/ilx/workspaces/Common/<workspace-name>/extensions/<extension-name>/
- Set the "f5-nodejs" version to "1.0.0" instead of "0.0.3".
3. Reload the plugin.
2186625-1 : Zone transfer from dns express with dnssec enabled includes extra RRSIG
Links to More Info: BT2186625
Component: Global Traffic Manager (DNS)
Symptoms:
AXFR zone transfer includes extra RRSIG for A/AAAA records.
Conditions:
When delegated NS record includes multiple name servers.
Impact:
Extra RRSIGs added to records that do not need RRSIG.
Workaround:
None
2186185-1 : Apmd occasionally fails to process a request if SecurID agent is present
Links to More Info: BT2186185
Component: Access Policy Manager
Symptoms:
Apm logs reports errors similar to following:
apmd[32302]: 01490000:3: ApmD.cpp func: "process_apd_request()" line: 2101 Msg: Error 3 reading/parsing response from socket 1023. strerror: Too many open files, queue size 0, time since accept 0 apm 2025-11-10 09:12:49.000 -07:00 Error
apmd[32302]: 01490000:3: HTTPParser.cpp func: "readFromSocket()" line: 117 Msg: epoll_create() failed [Too many open files].
Conditions:
SecuridAuth agent is enabled
Impact:
APMD stops processing further traffic and users are denied access
Workaround:
Restart APMD using the following command:
bigstart restart aced
bigstart restart apmd
2185537-3 : Application Security Administrator role cannot edit the General Settings of parent policies from the GUI
Links to More Info: BT2185537
Component: Application Security Manager
Symptoms:
When attempting to edit a parent ASM policy through the GUI, options under the General Settings tab will be greyed out or disabled.
Conditions:
A user with the Application Security Administrator role is logged in and attempting to edit the General Settings of a parent ASM policy through the GUI.
Impact:
Accounts with the Application Security Administrator role will be unable to edit the General Settings of a parent ASM policy through the GUI
Workaround:
By using REST calls instead of the GUI, Application Security Administrators can still make the necessary edits.
2185109-3 : High memory usage in REST query for ASM policies and virtualServers with huge L7 policy
Component: Application Security Manager
Symptoms:
A REST query for ASM policies with associated Virtual Servers fails and causes the ASM-config daemon process to consume massive amounts of memory. This only occurs if there is a large LTM policy on the system with many ASM policy associations.
Conditions:
There is a large LTM policy on the system with many ASM policy associations, and a REST query for ASM policies with associated Virtual Servers is issued.
Impact:
The REST query fails and causes the ASM-config daemon process to consume massive amounts of memory.
2183917-3 : BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection is enabled
Links to More Info: BT2183917
Component: Local Traffic Manager
Symptoms:
BIG-IP might fail to update received TCP window when tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424).
Conditions:
The tm.tcpstopblindinjection db variable is enabled (CVE-2025-58424 ).
This does not always occur.
Impact:
TCP transfer might stall.
Workaround:
None
2183241-2 : Trunk egress traffic is not balanced on some platforms.
Links to More Info: BT2183241
Component: TMOS
Symptoms:
Trunk egress traffic (out) distribution might not be balanced on the following platforms:
- C117 iSeries i2000
- C117 iSeries i850 (Japan)
- C115 iSeries i4000
Conditions:
- Trunk configured.
- Platform on the affected list:
C117 iSeries i2000
C117 iSeries i850 (Japan)
C115 iSeries i4000
Impact:
Trunk egress (out) traffic is not balanced.
Workaround:
None
2183233-3 : TMM crash due to extra trailing CR/LF in iSession reconnects
Links to More Info: BT2183233
Component: Access Policy Manager
Symptoms:
On BIG-IP APM systems, a Traffic Management Microkernel (TMM) crash may occur when a client device sends an extra trailing carriage return/line feed (CR/LF) during an iSession tunnel reconnect. This issue was observed to be triggered by a specific client device and user scenario, where the Edge Client installation was a hybrid of multiple versions, resulting in the transmission of unexpected CR/LF characters after the iSession request.
Conditions:
iSession tunnels in use.
Client device sends an extra CR/LF after the iSession request, often due to a hybrid or corrupted Edge Client installation.
Impact:
Traffic disrupted while tmm restarts.
Disruption of user sessions.
The issue is highly specific to certain client configurations and is not expected to be widespread.
Workaround:
None.
2182061-3 : Management routes not installed on reboots when interface route is recursively required.
Links to More Info: BT2182061
Component: TMOS
Symptoms:
Management routes might not be installed on reboots or config loads when interface route is recursively required.
Conditions:
Have an interface mgmt route, similar to:
sys management-route /Common/mgmt_gw {
network 10.10.10.10/32
type interface
}
And a mgmt route that uses a hop defined by an interface route:
sys management-route r1{
gateway 10.10.10.10
network 10.10.20.1/32
}
Impact:
Some management routes are not installed properly post reboot or config load.
Workaround:
None
2181929-3 : Cipher suite order changes in cipher group after upgrading from v17.1.1.1 to v17.1.3★
Links to More Info: BT2181929
Component: Local Traffic Manager
Symptoms:
After upgrading from v17.1.1.1 to v17.1.3, client connections begin negotiating with unexpected lower-priority cipher suites.
Applications sensitive to cipher strength (e.g., credit card payment systems) experience transaction failures or service disruption.
Conditions:
BIG-IP system running v17.1.1.1 is upgraded to v17.1.3
or
When MCPD reload
After the upgrade or MCPD reload, the internal ordering of cipher rules within the cipher group is modified.
Impact:
Failed service due to wrong Ciphers being used by the LTM VS/ Client Profile
Workaround:
Change the group order from Default to Strength in Local Traffic ›› Ciphers : Groups
2181633-1 : Large BIG-IP SSL Orchestrator deployments can cause tmm crash
Links to More Info: BT2181633
Component: SSL Orchestrator
Symptoms:
When a large number of virtual servers are configured on a BIG-IP and traffic is processed by SSL Orchestrator inspection service, TMM can crash if traffic hits the main virtual server before the service virtual server is loaded by TMM.
Conditions:
- BIG-IP SSL Orchestrator deployment has deployed a large number of virtual servers and inspection services.
- BIG-IP loads the entire config simultaneously or TMM is restarted when connections are being continuously sent to the BIG-IP.
- Client connection hits the main SSL Orchestrator virtual server before service virtual server has finished loading the config in TMM.
Impact:
TMM crash occurs intermittently. Traffic disrupted while tmm restarts.
Workaround:
Before reloading a large SSL Orchestrator BIG-IP config or restarting TMM, mark the public virtual servers as disabled.
Enable the public virtual servers individually after reload or TMM restart is successful.
2172069-1 : GTM topology regions updates do not take effect within tmm
Links to More Info: BT2172069
Component: Global Traffic Manager (DNS)
Symptoms:
GTM topology regions updates do not take effect within tmm
Conditions:
Modifications made to gtm topology regions do not take effect when only one client is sending queries. Note that this issue is tmm-thread specific, meaning one or more tmm threads can get into this state, as long as DNS queries keep hitting the same tmm thread(s), coming from the same source IP address(es)
This is a very unlikely scenario in most production environments, and is likely to only be seen during lab testing with client traffic from one or few IP addresses.
Impact:
GTM not answering with latest GTM topology region updates.
Workaround:
Restart tmm, or perform the DNS lookup from a different client IP address (not the same address that the affected tmm thread previously processed a topology-based DNS query from)
2172041-2 : Zone transfer fails for dnsx when the zone file contains TLSA records
Links to More Info: BT2172041
Component: Global Traffic Manager (DNS)
Symptoms:
Dns express zone transfer fails.
Conditions:
Zone containing TLSA records.
Impact:
Zone not able to be transferred to dns express.
Workaround:
None
2171921-2 : BIG-IP APN and VPN - ACCESS can leak HUDEVT_REQUEST_DONE after responding
Component: Access Policy Manager
Symptoms:
When the new DNS record is added to the BIG-IP APM, the Access is crashed in the BIG-IP which results in traffic disruption.
Conditions:
Issue is observed when the New DNS record added/updated to the BIG-IP.
Impact:
TMM crashes thereby impacting traffic.
Workaround:
None.
2162997-3 : AS3 becomes unresponsive after upgrade from 17.1.2.1 to 17.1.2.2 Build 0.311.1★
Links to More Info: BT2162997
Component: TMOS
Symptoms:
After upgrading, AS3 queries are not accepted
AS3 responds with:
{
"code": 404,
"message": "",
"referer": "172.18.23.178",
"errorStack": []
}
Conditions:
Upgraded from 17.1.2.1 to 17.1.2.2 Build 0.311.12
Impact:
After the upgrade, AS3 services become unavailable and attempts to access them return a 404 error
Workaround:
Uninstall the existing AS3 package and Reinstall the AS3 package
2162873-3 : Pipe and backslash characters are not escaped in ArcSight CEF remote logging
Component: Application Security Manager
Symptoms:
Pipe and backslash characters are not escaped in ArcSight CEF remote logging.
Conditions:
A logging profile is configured with ArcSight CEF remote logging format. A log field contains a pipe in the CEF header (such as an Attack Signature name), or a backslash in any log field.
Impact:
Logging records may not be correctly read by ArcSight or other log collector.
Workaround:
None
2162861-3 : 'Connectors' creation screen does not appear
Links to More Info: BT2162861
Component: Access Policy Manager
Symptoms:
When you click Access > Authentication from the WebUI, select AAA Server By Type > Connectors & Configurations from the pull-down menu, and click the Create button, the creation screen does not appear.
Conditions:
Connectors & Configurations from AAA Server by Type
Impact:
Creation screen does not appear.
Workaround:
None
2161209 : A GTM link can become unmonitored when adding a second link to a datacenter
Component: Global Traffic Manager (DNS)
Symptoms:
When a second link is added to a datacenter in BIG-IP DNS GTM, the first link becomes unmonitored if both use gateway_icmp monitors with explicit destination IPs.
Conditions:
Using two links in a GTM Datacenter, and both use gateway ICMP monitors with explicit destination IPs.
Impact:
Only one link may work when both/All links should be monitored independently and remain healthy if reachable.
Workaround:
Use the command "tmsh modify gtm global-settings general monitor-disabled-objects yes."
2154089-2 : "Test" button for monitor object is missing.
Component: TMOS
Symptoms:
Local Traffic >> Monitors >> select monitor >> fill in IP and port >> "Test" button is missing.
Conditions:
Need to test BIG-IP monitors via GUI.
Impact:
Impossible to test monitor from GUI.
Workaround:
Use tmsh instead of GUI for testing the monitor:
K60677941: Verifying monitor configurations using the tmsh utility
2154057-5 : MCPD validations not throwing error when snmpv3 password contains more than 77 characters★
Links to More Info: BT2154057
Component: TMOS
Symptoms:
After upgrading, mcpd goes into a restart loop. /var/log/ltm contains the following:
err mcpd[13691]: 0107102b:3: Master Key decrypt failure - decrypt failure - final
notice mcpd[13691]: 01071029:5: Master decrypt final
notice mcpd[13691]: 01071027:5: Master key OpenSSL error: 4006860532:error:0606506D:digital envelope routines:EVP_DecryptFinal_ex:wrong final block length:evp_enc.c:653:
notice mcpd[13691]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
err mcpd[13691]: 01071684:3: Unable to encrypt application variable (/Common/snmpv3user auth_password usmuser /Common/snmpd).
Conditions:
-- SNMPv3 configuration that uses a password containing more than 77 characters
-- An upgrade is performed
This also occurs within a release by saving the config and then forcing a load from text files (`touch /service/mcpd/forceload && pkill mcpd`)
This may also occur with auth-password or privacy-password values that are 78 characters in length or longer
Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.
Workaround:
If a device is currently in an inoperative state and affected by this issue:
- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.
2153897-1 : BIG-IP closes the transport connection immediately after sending a DPA to a peer
Links to More Info: BT2153897
Component: Service Provider
Symptoms:
With Diameter MRF setup, when the BIG-IP receives a diameter DPR message (Disconnect-Peer-Request), it sends a DPA to the peer (Disconnect-Peer-Answer) and then immediately closes the transport connection.
According to RFC6733, ("Diameter Base Protocol") the transport connection should be closed by the remote peer instead.
Conditions:
- BIG-IP configured with a MRF Diameter setup
- BIG-IP receives a Diameter DPR message
Impact:
The BIG-IP system closes the transport connection instead of waiting for the remote peer to close it.
Workaround:
None
2153421-3 : iControl REST /mgmt/toc endpoint and object browser pages are not functioning on BIG-IP v17.x
Links to More Info: BT2153421
Component: TMOS
Symptoms:
When accessing https://<BIG-IP IP address>/mgmt/toc the browser returns the below error
{"code":400,"message":"URI path /mgmt/logmein.html not registered. Please verify URI is supported and wait for /available suffix to be responsive.","referer":"https://10.1.255.175/mgmt/toc","restOperationId":45299775,"kind":":resterrorresponse"}
Conditions:
Access https://<BIG-IP IP address>/mgmt/toc
Impact:
In v17.x returns a blank page instead of object data.
Workaround:
None
2152545-2 : [APM][SAML] High TMM memory sso_saml leak
Links to More Info: BT2152545
Component: Access Policy Manager
Symptoms:
Tmm crashes due to out of memory while passing SAML-SSO traffic
Conditions:
-- Configure a BIG-IP as SAML-SP with ACS binding.
-- Configure SSO for IDP.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2152257-3 : [BGP] remove-private-AS does not work with extended ASN numbers
Links to More Info: BT2152257
Component: TMOS
Symptoms:
Remove-private-AS does not work with extended (4-byte) ASN numbers
Conditions:
Remove-private-AS used in peer configuration.
Impact:
Private AS numbers are not removed.
Workaround:
None
2151885-3 : When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
Links to More Info: BT2151885
Component: Local Traffic Manager
Symptoms:
When using service-down-action reset/drop on a pool attached to a DHCP virtual TMM might experience a crash.
Conditions:
DCHP virtual-server with a pool member using service-down-action feature set to 'reject' or 'drop'.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Re-configure service-down-action on a pool member to 'none'.
2151601-1 : No tmsh command to remove the stateless directive from a virtual server
Links to More Info: BT2151601
Component: Local Traffic Manager
Symptoms:
Cannot remove the stateless directive from a virtual server using tmsh, would need to delete and create the virtual again to achieve the same.
Conditions:
1) A stateless virtual server is present
2) Try making it not stateless using tmsh
Impact:
Virtual server remains stateless
Workaround:
Modify the virtual using GUI
2151505-1 : Cmp_dest_velos is automatically installed on system startup.
Links to More Info: BT2151505
Component: TMOS
Symptoms:
/var/run/cmp_dest_velos is automatically installed on tenant startup.
You no longer need to download it from the host containers.
Conditions:
A need to use the VELOS version of the cmp_dest utility.
Impact:
Previously, the cmp_dest utility had to be manually downloaded from the host containers.
Workaround:
Manually download cmp_dest from the host containers.
2150869-1 : Incorrect information for count of failed login for a user
Links to More Info: BT2150869
Component: TMOS
Symptoms:
/var/log/secure and /var/log/audit show incorrect information for the count of failed logins for a user
Conditions:
A user fails to login either through CLI or GUI
Impact:
Incorrect information in logs can be misleading
Workaround:
None
2150493 : BIG-IP DNS (GTM) may associate LTM virtual server names with the wrong GTM virtual-servers
Links to More Info: BT2150493
Component: Global Traffic Manager (DNS)
Symptoms:
Gtmd may display incorrectly associated the name of a virtual server, as known to the LTM device, with more than one virtual-server defined in the GTM configuration
This can lead to inconsistent probe results and misleading service availability information in GTM, where a gtm virtual server may reflect the status of a different LTM virtual server.
Conditions:
This issue occurs when multiple gtm server ... virtual-servers { ... } objects are configured with the same external address but distinct internal (translation) addresses. For this configuration to be effective, there must be logic in the network's NAT function that performs address translation based on the content of the incoming request, for example by using the SNI value of a TLS handshake, so that multiple internal virtual servers can share the same external IP address.
In such cases, the ltm_name learned from a big3d probe reply for one virtual server may be incorrectly associated with all virtual servers sharing that external IP.
As a result, subsequent <vip> probes may use the wrong ltm_name and reflect the status of an incorrect LTM virtual server.
Impact:
Incorrect virtual server state from gtmd's point of view, which may show services up that are actually down or down which are actually up.
Workaround:
Specify the ltm-name on each virtual server, so that the learned ltm_name from the big3d reply is never used:
tmsh modify gtm server gtmserver1 virtual-servers modify { gtm_name_vs1 { ltm-name ltm_name_vs1 } gtm_name_vs2 { ltm-name ltm_name_vs2 } gtm_name_vs3 { ltm-name ltm_name_vs3 } }
Note that the "ltm name" field can only be set using tmsh or API calls - it is not exposed in the BIG-IP GUI configuration utility.
2150489-5 : Most DB keys encrypted by SecureVault master key are not persisted to BigDB.dat when the system master key is changed.
Links to More Info: BT2150489
Component: TMOS
Symptoms:
After restarting mcpd, mcpd is stuck in a restart loop.
Conditions:
-- You set a DB variable that's encrypted ( proxy.password, configsync.password)
-- Change the SecureVault master key and save the configuration
Impact:
BIG-IP is in inoperative state , MCPD in a restart loop
Workaround:
If a system is affected by this issue, set the DB key back to its default value. Once the configuration is loaded, set the DB key back to the correct value:
- tmsh modify /sys db config.auditing.forward.sharedsecret value '<null>'
After changing the SecureValue master key but before encountering the issue, run the following command to update the value of the DB key on-disk:
setdb config.auditing.forward.sharedsecret "$(getdb config.auditing.forward.sharedsecret)"
2149333-1 : BD_XML logs memory usage at TS_DEBUG level
Links to More Info: BT2149333
Component: Application Security Manager
Symptoms:
There are two messages in BD_XML logs that the system reports at the TS_DEBUG log level, but they should be logged as TS_INFO.
BD_XML|DEBUG |Sep 10 14:51:19.335|1456|xml_validation.cpp:1687|after create of profile 754. (xml memory 5111702493 bytes)
BD_XML|DEBUG |Sep 10 14:51:19.335|1456|xml_validation.cpp:1586|add profile 755. name: /ws/replanifierIntervention_V1-0 is soap? 1 (xml memory before add 5111702493 bytes)
Conditions:
These messages can occur when XML/JSON profiles are configured.
Impact:
Messages that should be logged at the TS_INFO level are logged at the TS_DEBUG level. These are informational log messages.
Workaround:
None
2144397-3 : Problems compiling firewall policies when they contain rules using huge address lists
Links to More Info: BT2144397
Component: Advanced Firewall Manager
Symptoms:
Firewall rule compilation hangs indefinitely with high CPU usage, when large address lists (~100k entries) are used. With significant number of duplicate firewall policies.
Conditions:
Occurs on BIG-IP AFM (17.1.2) when firewall policies reference very large address lists as rule sources.
Impact:
Prevents deployment or updates of firewall policies, blocking operations.
Workaround:
None
2144309-3 : TMM might experience a crash when using a fix for Bug783077
Links to More Info: BT2144309
Component: Local Traffic Manager
Symptoms:
TMM might experience a crash when using a fix for Bug783077.
Conditions:
- Running a fix Bug783077.
- Performing operations on IPv6 routes that use nexthop over link-local address.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2144053-1 : IPS hitless upgrade results in TMM clock advance★
Links to More Info: BT2144053
Component: Protocol Inspection
Symptoms:
IPS hitless upgrade results in TMM clock advance.
Conditions:
New IPS package is deployed in AFM.
Impact:
In some cases some degree of packet loss has been reported during a second.
Workaround:
None
2144029-1 : DB monitor does not use the correct timezone present in the system
Links to More Info: BT2144029
Component: Local Traffic Manager
Symptoms:
JDBC uses an incorrect timezone rather than the one configured on the system through 'sys ntp timezone'.
In a PostgreSQL-based health monitor, an error similar to the following may occur, for example when 'sys ntp timezone' is set as America/Los_Angeles' (default):
org.postgresql.util.PSQLException: FATAL: invalid value for parameter "TimeZone": "US/Pacific-New"
In an Oracle health monitor, an error similar to the following may occur, for example when 'sys ntp timezone' is set as 'UTC' when the client presents a timezone of 'Zulu':
java.sql.SQLException: ORA-00604: error occurred at recursive SQL level 1
ORA-01882: timezone region not found
Conditions:
1. A DB monitor is in use (eg. PostgreSQL, Oracle).
2. The current timezone of the system is set with a timezone that has multiple equivalent and possibly deprecated aliases, for example:
- America/Los_Angeles [US/Pacific-New, posix/US/Pacific-New ]
- UTC [ Zulu, posix/Zulu ]
3. System has /etc/localtime as a normal file instead of a symbolic link.
4. The remote database does not support the presented time zone parameter.
Impact:
Monitor incorrectly marks the pool member down when the remote database server does not recognize the time zone presented by the DB monitor.
Workaround:
Delete the file /etc/localtime:
rm /etc/localtime
Create a symbolic link for the file pointing to the desired timezone as listed in /usr/share/zoneinfo:
For example, if you have 'sys ntp timezone UTC', the command would be:
ln -sf /usr/share/zoneinfo/UTC /etc/localtime
If you have 'sys ntp timezone America/Los_Angeles', the command would be:
ln -sf /usr/share/zoneinfo/America/Los_Angeles /etc/localtime
2143109-3 : BIG-IP VE with more CPU cores than licensed enters TMM restart loop (TMM PU (<num_cores>) >= number of PUs (<num_licensed_cores>)) after mcpd restart
Links to More Info: BT2143109
Component: TMOS
Symptoms:
Mcpd crash or restart causes TMM to enter a restart loop.
Log - notice TMM PU (7) >= number of PUs (4)
Device becomes unreachable in the data plane.
Conditions:
BIG-IP VE with more vCPUs than licensed cores.
Example: 8-core Azure instance with a 4-core VE license.
Modules: AFM (nominal) and AVR (minimum) provisioned.
Occurs after mcpd restart or crash.
Impact:
System enters a TMM restart loop and remains offline.
Traffic processing and configuration access are unavailable until manual correction.
Workaround:
Manually set the provision.tmmcount DB variable to match the licensed core count, then restart services or reboot.
For example on an 8-core instance which is licensed for only 4-cores:
tmsh modify sys db provision.tmmcount value 4
2141297-3 : In TLSv1.3, BIG-IP enforces the use of FFDHE key share if it is preferred over other DH groups★
Links to More Info: BT2141297
Component: Local Traffic Manager
Symptoms:
The BIG-IP system sends back an FFDHE key share that forces the client to also use FFDHE, even if the client sent a key share that is still acceptable to the BIG-IP.
Conditions:
The BIG-IP system is configured to prefer an FFDHE DH group and the client sends the same FFDHE DH group as supported but sends a key share for a different DH group.
Impact:
Clients are forced to use the FFDHE group for its key share even if the client sent a key share that is still acceptable to the BIG-IP
Workaround:
Either remove the FFDHE groups, or reorder DH group preferences so that FFDHE groups are not preferred over other groups.
2141109-2 : The URL categorisation daemon's DNS cache is never refreshed
Links to More Info: BT2141109
Component: Traffic Classification Engine
Symptoms:
When the URL categorisation daemon (wr_urldbd) starts or restarts, it queries the DNS resolver for the Brightcloud online service domains that are used for some of the real-time URL queries, and populates the DNS Cache with the results.
After populating the cache, it never refreshes or updates it.
When Brightcloud change the DNS records of their service domains, all the new SSL handshakes from the URL categorisation daemon, needed for the real-time URL categorisation queries, fail with these errors in wr_urldbd.out:
WR_URLDBD: Sep 30 12:01:08.836:Tid(41843):async_lookupCallback:702 Error processing URL:*.example.com and Status Code:S_ErrArg
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1
BC_SDK: 2025-09-30 12:01:08 ERROR: SSL error: error:14090086:SSL routines:ssl3_get_server_certificate:certificate verify failed
BC_SDK: 2025-09-30 12:01:08 ERROR: SslIO::StartSSLHandshake::SSL_connect() failed::SSL error: 1
Conditions:
- URL categorisation license installed on the system, and URL categorisation configured and in use.
Impact:
Some time after the URL categorisation daemon starts or restarts, all URL categorisation real-time queries for URLs not already in the local database fail.
Workaround:
When the real-time queries start failing with the error described above, restart the wr_urldbd daemon with:
"bigstart restart wr_urlrdbd"
2139893-3 : vCMP guest may become unresponsive for several minutes due to kernel soft lockup
Links to More Info: BT2139893
Component: TMOS
Symptoms:
A vCMP guest may become unresponsive for approximately 600 seconds, during which time:
- Odd-numbered CPUs assigned to the guest (for example, CPUs 1, 3, 5, 7, 9, 11) show 100% utilization.
- No logs, statistics, or management-plane responses are generated.
- Kernel logs report NMI watchdog soft lockup messages indicating a kernel deadlock.
- The issue triggers a failover event and a restart of all services on the affected guest.
Kernel logs indicate the lockup occurs on control-plane CPUs and is associated with memory management and TLB flush operations.
Conditions:
This issue may occur under the following conditions:
-- vCMP guest running on a BIG-IP system.
-- Guest operating under a Linux 3.10-based kernel.
-- High control-plane activity involving memory operations (for example, process creation, termination, or memory unmapping).
-- Issue observed in virtualized environments (for example, KVM-based platforms).
-- Exact steps to reproduce are currently unknown.
Impact:
-- Temporary loss of management and control-plane responsiveness for the vCMP guest.
-- Automatic failover to a standby unit may occur.
-- Restart of BIG-IP services on the affected guest.
-- Potential disruption to traffic handling during failover, depending on deployment architecture.
Workaround:
None.
2139637-3 : TMM crash because of invalid context
Links to More Info: BT2139637
Component: Local Traffic Manager
Symptoms:
Tmm crashes during QUIC packet loss handling due to invalid context.
Conditions:
LTM configured with UDP and QUIC.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2138273-3 : Named service fails to start after an upgrade due to unsupported attributes in the named.conf file★
Links to More Info: BT2138273
Component: SSL Orchestrator
Symptoms:
Named fails to start with the following error after upgrading from older versions to 17.0 or newer releases due to the dnssec-lookaside and dnssec-enable options in the named.conf configuration file, which have been deprecated and are no longer supported in the latest BIND versions.
Logs in /var/log/daemon.log :
Oct 22 14:08:00 localhost.localdomain err named[16313]: /config/named.conf:35: option 'dnssec-lookaside' no longer exists
Oct 22 14:08:00 localhost.localdomain crit named[16313]: loading configuration: failure
Oct 22 14:08:00 localhost.localdomain crit named[16313]: exiting (due to fatal error)
Oct 22 14:08:00 localhost.localdomain notice systemd[1]: named.service: main process exited, code=exited, status=1/FAILURE
Oct 22 14:08:00 localhost.localdomain notice systemd[1]: Unit named.service entered failed state.
Oct 22 14:08:00 localhost.localdomain warning systemd[1]: named.service failed.
Conditions:
-- SSL Orchestrator System Settings >> DNS settings have been specified.
-- SSL Orchestrator L3 Explicit Topology Configured using the default SSL Orchestrator DNS resolver.
-- Check the BIND Version: Use the following command:
Example:
For example :
# named -v
BIND 9.11.36 (Extended Support Version) <id:68dbd5b>
Notes:
-- Starting with BIND 9.9, the dnssec-lookaside validation (DLV) feature was deprecated. By BIND 9.11, this feature was removed entirely.
-- Beginning with BIND 9.16, the dnssec-enable option was deprecated and subsequently removed.
Impact:
SSL Orchestrator will fail to resolve hostnames for the L3 Explicit topology causing end-to-end traffic to fail.
Workaround:
- Redeploy the affected L3 Explicit topology - this will use the native DNS resolver implementation and will no longer rely on BIND or named service, ensuring that end-to-end SSL Orchestrator traffic functions properly.
To fix the named service:
-- Remove the deprecated directives dnssec-lookaside and dnssec-enable from the BIND configuration file located at:
/var/named/config/named.conf.
-- After making these changes, restart the named service to apply the updated configuration by running the following command: bigstart restart named
2138181-1 : Low thresholds for tcp-ack-ts vector caused outage after BIG-IP upgrade to 17.1.3★
Links to More Info: BT2138181
Component: Advanced Firewall Manager
Symptoms:
A number of DoS vectors were added in version 17.1.0 and are set to Mitigate by default. The list of vectors that were added is described in K41305885: BIG-IP AFM DoS vectors
https://my.f5.com/manage/s/article/K41305885
These include
- TCP ACK (TS)
- TCP ACK Flood
- TCP Flags Uncommon
Additionally, a DoS vector behavior has changed:
- Bad TCP Flags Malformed
Conditions:
Old threshold values (Detection EPS Threshold: 200, Mitigation EPS Threshold: 100) are still being used, which are too low compared to the new defaults.
Impact:
These low thresholds trigger frequent DoS attack detections, leading to disruptions in service.
Workaround:
Change the threshold to the new defaults or any reasonable values accordingly.
For example:
#tmsh modify security dos device-config dos-device-config dos-device-vector { tcp-ack-ts {default-internal-rate-limit 300000 detection-threshold-pps 200000}}
2137909-2 : Portal Access: unwanted decoding html entities in attribute values of HTML tags★
Links to More Info: BT2137909
Component: Access Policy Manager
Symptoms:
HTML Entities in Attribute values in HTML tags are decoded when they shouldn't be.
Conditions:
Portal Access is enabled
Impact:
Unwanted Application errors
Workaround:
None
2137661-2 : GTM link object is deleted automatically after being added
Links to More Info: BT2137661
Component: Global Traffic Manager (DNS)
Symptoms:
GTM link is deleted.
Conditions:
Link auto discovery is enabled on GTM server object.
Impact:
GTM link is falsely deleted by the system.
Workaround:
Disable link auto discovery on GTM server object.
2132209-3 : TMM crash while sending ACKs in invalid context
Links to More Info: BT2132209
Component: Local Traffic Manager
Symptoms:
Tmm crashes while QUIC is trying to send an ACK in invalid context.
Conditions:
LTM configured with UDP and QUIC.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2132125-8 : Unable to upload QKView to iHealth
Links to More Info: K000157248, BT2132125
Component: TMOS
Symptoms:
Message displayed after attempting to upload a QKview:
Failed to upload the QKView file to iHealth
Conditions:
Unable to upload QKView.
Impact:
Can't upload.
Workaround:
You can download the qkview file from the BIG-IP and then upload it through the iHealth webui.
2131833-5 : F5OS/rSeries r2xxx/r4xxx BIG-IP Tenant management interface not reachable
Links to More Info: BT2131833
Component: TMOS
Symptoms:
On F5OS/rSeriers r2xxx/r4xxx , in rare conditions the management interface is not reachable due to a timing and ordering issue probing network interfaces
In the BIG-IP Tenant, the network interfaces eth0 or mgmt are missing
Conditions:
This condition is rare and when it does its usually seen on tenant first boot.
Impact:
Unable to reach BIG-IP Tenant management address.
Workaround:
Reboot tenant
2131597-3 : BGP graceful restart might not accept a new connection immediately after neighbor failover.
Links to More Info: BT2131597
Component: TMOS
Symptoms:
When a remote peer restarts and BGP graceful restart mechanism is advertised and received, BIG-IP might not immediately accept a new connection from a restarting peer.
Conditions:
- BIG-IP system is licensed for Routing Bundle.
- BGP graceful restart mechanism is advertised and received.
- Remote peer is still restarting.
Impact:
New connection might take longer to establish.
Workaround:
Make sure the BIG-IP local router-ID is lower than the re-connecting peer ID.
2131085-2 : Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest causes it to get stuck in unhealthy state
Links to More Info: BT2131085
Component: Local Traffic Manager
Symptoms:
Running 'tmsh reboot slot all' on multi-slot tenant or vCMP guest or VIPRION causes BIG-IP to get stuck in unhealthy state.
MCPD is failing to load with the error '01070710:3: Could not find master-key object':
slot3/tenant1.example.com notice clusterd[7956]: 013a0024:5: Blade 3: Changing primary from 0 (none) to 2
slot3/tenant1.example.com err clusterd[7956]: 013a0018:3: Blade 3 turned RED: Quorum: stepping slow clock forward by 747.133704 ms, HA TABLE offline
slot3/tenant1.example.com notice clusterd[7956]: 013a0006:5: Blade status: 0 GREEN 1 YELLOW 1 Not Ready
slot1/tenant1.example.com notice mcpd[4785]: 01070419:5: Platform initialization phase triggered.
slot2/tenant1.example.com emerg load_config_files[9951]: "/usr/bin/tmsh -n -g -a load sys config partitions all base " - failed. -- 01070710:3: Could not find master-key object - sys/validation/MasterKey.cpp, line 3070
All slots will have an Availability of "offline" as reported in tmsh show sys cluster:
[root@rdt2:/S1-red-P::INOPERATIVE:Standalone] config # tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address 10.0.0.2/16
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26
-----------------------------------------------------------------------------------------------------
| Sys::Cluster Members
| ID Address Alt-Address Availability State Licensed HA Clusterd Reason
-----------------------------------------------------------------------------------------------------
| 1 :: :: offline enabled true offline running Run, HA TABLE offline
| 2 :: :: offline enabled false offline running Run, HA TABLE offline
Conditions:
1. Multi-slot F5OS tenant or Multi-slot vCMP guest or multi-bladed VIPRION.
2. Rebooting all the slots of the guest or tenant (e.g. 'tmsh reboot slot all' or 'clsh reboot')
Impact:
All tenant or VCMP guest slots remain offline, and are inoperable from a traffic standpoint.
Multiple blades might hold the cluster mgmt addr.
Workaround:
For both tenants and guests, re-deploying them has a high probability of resolving the issue.
That is changing the tenant's or guest's state from "deployed" to "provisioned" or "configured", and then back to "deployed".
or
Restarting mcpd on the primary slot also has a high probability of resolving the issue.
Tmsh show sys cluster will report the "Primary Slot ID"
# tmsh show sys cluster
-----------------------------------------
Sys::Cluster: default
-----------------------------------------
Address address
Alt-Address ::
Availability available
State enabled
Reason Cluster Enabled
Primary Slot ID 1
Primary Selection Time 11/01/25 18:06:26
Both workarounds are highly likely to restore the tenant or guest to full functionality.
Note: the issue might return if all tenant or guest slots are rebooted.
2130329 : [GTM] Deletion of topology records makes MCPD memory ramp up
Links to More Info: BT2130329
Component: Global Traffic Manager (DNS)
Symptoms:
The MCPD memory ramp-up might result in being killed by sod or out of memory.
Conditions:
Delete thousands of GTM topology records in a short period of time, and the full GTM sync is triggered.
Impact:
The MCDP memory is stuck or being killed by sod.
Workaround:
Do not delete a large number of GTM topology records in a short period of time.
2077357-3 : Virtual-wire with proxy listener may generate packets with 00:00:00:00:00:00 source MAC.
Links to More Info: BT2077357
Component: Local Traffic Manager
Symptoms:
In a case where a proxy listener intercepts traffic going over a virtual-wire and there is no server-side traffic (TCP re-transmit timeout), a RST generated towards the server might have 00:00:00:00:00:00 source MAC.
Conditions:
Proxy listener intercepts traffic going over a virtual-wire.
There is no server-side traffic for the flow.
Impact:
RST might not be delivered to the server.
Workaround:
None
2064209-4 : FQDN node created from pool member via tmsh does not inherit "autopopulate" value
Links to More Info: BT2064209
Component: TMOS
Symptoms:
When using the tmsh command-line interface (CLI) to create an FQDN pool member, an FQDN node is created implicitly using values specified for the FQDN pool member.
However, if the "autopopulate" value is specified as "enabled" (instead of the default "disabled"), the FQDN node is created with the "autopopulate" value set to "disabled" (default).
Conditions:
This occurs when:
-- Creating an FQDN node implicitly by explicitly creating an FQDN pool member
-- Using the tmsh interface to perform this action.
-- Specifying a non-default value of "enabled" for the "autopopulate" option
Impact:
The FQDN node will be created with an "autopopulate" value of "disabled", which means that only a single ephemeral node will be created based on DNS resolution of the FQDN name.
Since only a single ephemeral node is created, only a single ephemeral pool member will be created, and the "autopopulate" option will not exhibit the "enabled" behavior.
Workaround:
To work around this issue using tmsh command-line interface (CLI):
-- First create the FQDN node with the desired configuration values.
-- Then create the FQDN pool member, referencing the previously-created FQDN node.
To correct the configuration of the FQDN node, the FQDN node and pool member must be deleted and re-created:
1. Delete FQDN pool member
2. Delete FQDN node
3. Create FQDN node with desired configuration
4. Create FQDN pool member with desired configuration
2058541-4 : [BGP] BIG-IP does not follow updated section of rfc4724.html#section-4.2 when handling a new connection from peer.
Links to More Info: BT2058541
Component: TMOS
Symptoms:
BIG-IP does not follow the updated section (https://www.rfc-editor.org/rfc/rfc4724.html#section-4.2) when handling a new connection from a peer. Instead, section https://datatracker.ietf.org/doc/html/rfc4271#section-6.8 is followed.
This leads to a new connection from a peer being dropped when Graceful Restart happens.
Conditions:
BGP is configured with graceful restart.
Peer restarts.
Impact:
BIG-IP will drop a new connection request and try to open a new connection right away.
Workaround:
None
2053893-4 : Incompletely-synced ASM configuration can be synced back to the original device or group
Links to More Info: BT2053893
Component: Application Security Manager
Symptoms:
The incomplete ASM configuration on the new device may be synced to the device group, overwriting the original and complete ASM configuration when an ASM configuration is in the process of being synced from an existing device or group to a new device joined to the group, and there is a request to sync the new device to the group.
Conditions:
This may occur when,
-- Multiple device groups are configured, including:
-- a (non-ASM) Sync Failover device group
-- an ASM Sync-Only device group
-- Both device groups are configured for Manual Full Sync.
-- The ASM configuration is large enough to require several minutes to apply the complete configuration.
-- A new device has joined the cluster and device groups, which has no existing ASM configuration (or, a much smaller subset of the cluster's existing ASM configuration.
-- The configuration is synced from an existing device to the non-ASM device group (and thus to the new device).
-- After the ASM configuration is synced from an existing device to the ASM device group (and thus to the new device).
-- After the ASM configuration is synced from the new device to the ASM device group (and thus to the existing devices).
Impact:
Depending on the size of the ASM configuration, system performance and network throughput, the ASM configuration may take a long time to sync to the new device, and may appear to be only partially synced in the meantime.
Depending on timing and other non-deterministic conditions, this partially-synced ASM configuration may be synced back to the device group.
When this occurs, the existing ASM configuration may be overwritten by the partial ASM configuration on the new device, resulting in a loss of ASM functionality.
Workaround:
To avoid this issue when multiple device groups are configured, which include both an ASM and non ASM device group, and both groups are configured for Manual Full Sync:
-- Sync the ASM device group first.
-- Wait to confirm that the full ASM configuration has been synced to the new device before initiating any further sync operations.
-- Be careful not to inadvertently select the new device (with incomplete ASM configuration) as the device to sync to the device group.
2053489-4 : Config Sync events may not be recorded in audit log
Links to More Info: BT2053489
Component: TMOS
Symptoms:
When a command is issued on a BIG-IP system to sync configuration to a Device Group from a given Device in the Device Group, the config sync command may not be recorded in the audit log on the device where the command was issued.
The audit log may not record this command, even though subsequent log messages in other log files may indicate successful completion of the config sync action.
Conditions:
This may occur when:
-- Issuing the command to sync configuration from a Device to a Device Group in which it is a member.
-- Issuing such a command from either the command-line interface (tmsh) or from the BIG-IP GUI (tmui).
-- Accepting the default/offered suggestion for the Device whose configuration is to be synced to the Device Group.
For example:
-- In the GUI, accepting the default selection indicated by the active radio button for which Device to sync to the Device Group, and clicking Sync.
-- In the CLI, issuing the "tmsh run cm config-sync" command with the "to-group" option from the Device which is suggested by the "tmsh show cm sync-status" command.
Impact:
When attempting to diagnose issues that occur in the context of syncing configuration across Devices in a Device Group, it may not be clear where, when, and by whom the command to initiate the config sync was issued.
2047585 : Modifying GTM monitor type from https to tcp to back https could set "compatibility" field to "none"
Links to More Info: BT2047585
Component: Global Traffic Manager (DNS)
Symptoms:
When creating a GTM HTTPS monitor, then changing it to TCP monitor type and back to HTTPS, the compatibility field is set to "none."
Conditions:
Using GTM and an HTTPS monitor.
Changing the monitor type to TCP and then back to HTTPS
Impact:
The compatibility field can be set back to "none."
Workaround:
After changing an HTTPS monitor type to TCP and then back to HTTPS, make sure that the compatibility is set appropriately.
2047137-3 : TMM core may occur while using APM VDI with Blast UDP
Links to More Info: BT2047137
Component: Access Policy Manager
Symptoms:
User may fail to access the remote desktop using APM vmware VDI, if a TMM core occurs due to the unavailability of one of the internal database variable.
Conditions:
The user attempts to connect to the desktop or app using VMware Client or a browser via the Blast protocol over UDP, and the session variable is deleted due to a timeout.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
2038429-2 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038429
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038425-2 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038425
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038421-2 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038421
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2038417-2 : Issue with ike_ctx causes memory corruption
Links to More Info: BT2038417
Component: TMOS
Symptoms:
1. Instead of crashing, TMM logs repeated Oops messages (ike_ctx tag invalid, ike_ctx_addr near NULL, traffic_selector_cfg sp_out required).
2. Can cause core, under low memory conditions, when multiple TMM threads run out of memory
3. Tunnel connections fail with thousands of logs.
4. BIG-IP does not crash, but repeatedly skips processing tunnel connections.
Conditions:
Occurs on systems with long uptimes and when IPsec is configured.
Impact:
Tunnel connections fail repeatedly and can cause core, under low memory conditions, when multiple TMM threads run out of memory. Traffic disrupted while tmm restarts.
Workaround:
None
2033781-4 : Memory allocation failed: can't allocate memory to extend db size
Links to More Info: BT2033781
Component: Local Traffic Manager
Symptoms:
When tmm cannot expand the eXtremeDB database, it logs an error in /var/log/tmm:
err tmm1[21087]: 01010004:3: Memory allocation failed: can't allocate memory to extend db size
Conditions:
-- BIG-IP in operation
-- A configuration change is made that causes tmm to allocate more memory to eXtremeDB. Examples include:
- Adding a clientssl or serverssl profile
- Modifying a datagroup
- A bot defense sync occurs
Impact:
Tmm does not crash but the eXtremeDB state is inconsistent with other tmms and could lead to unpredictable behavior such as virtual servers not working, iRules failing to work, bot defense failing to work
Workaround:
None
2014597-4 : Async session db ops are missing flow control
Links to More Info: BT2014597
Component: TMOS
Symptoms:
Tmm crash while hanling SSL traffic
Conditions:
-- SSL traffic
-- Heavy load
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1991717-1 : Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN's★
Links to More Info: BT1991717
Component: Advanced Firewall Manager
Symptoms:
- Upgrade fails from 17.5.0 to 17.5.1 if a shared object list is configured with Geo or FQDN addresses.
Conditions:
- AFM Provisioned on v17.5.0
- Configure a dns-resolver under global-fqdn-policy.
- Configure a shared object list with a Geo or FQDN address.
- Install 17.5.1 on a boot location.
- Upgrade to 17.5.1
Impact:
Upgrade fails from 17.5.0 to 17.5.1 with the following error:
Syntax Error:(/config/bigip_base.conf at line: 649) "geo" unknown property
Workaround:
- Identify the rules and the lists and comment them out of the bigip_base file that are involved in the firewall rules.
- Upgrade to 17.5.1 or load the config again.
or
1. Remove the shared objects address list from the AFM rules and then the shared objects address lists with Geo or FQDN addresses.
2. Once after an upgrade, add address list again to AFM rules and Geo or FQDN
1991485-2 : Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.
Links to More Info: BT1991485
Component: TMOS
Symptoms:
Re-adding a tunnel with the exact same name might result in tunnel ingress traffic getting dropped.
Conditions:
Deleting and re-adding a tunnel with exactly same name as the tunnel that was just deleted.
Impact:
Tunnel might no longer pass traffic indicating 'Incoming Discard' drops.
Workaround:
Use a different name for the tunnel.
1989033-4 : IPsec IKEv2 tunnel may fail to initiate or respond due to ERR_PORT
Links to More Info: BT1989033
Component: Local Traffic Manager
Symptoms:
In very rare circumstances the BIG-IP may fail to initiate or respond to an IKEv2 tunnel.
When debug2 is enabled, the following log messages in the tmm log indicates a potential match for this bug. ERR_PORT is a critical indicator of the failure condition.
<13> <date> <hostname> notice ike_connect/3154: @F: ike flow created 172.16.61.100:172.16.61.200 rd: 0 owner=0.2 me=0.2
<13> <date> <hostname> notice ike_connect/3218: @F: ISAKMP_CONN local=172.16.61.100:500 remote=172.16.61.200:500
<13> <date> <hostname> notice ike_proxy_connect/1510: @E: flow_connect() ERR ERR_PORT
<13> <date> <hostname> notice ike_connect/3241: @E: ERR ERR_PORT
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5231: @E: can't create isakmp flow to 172.16.61.100:500 172.16.61.200:500 %0, err ERR_PORT.
<13> <date> <hostname> notice pfkey_isakmp_reconnect/5241: @E: ERR ERR_PORT
The ipsec.log will contain different messages.
ipsec.log - BIG-IP attempts to start the connection, the INTERNAL_ERR is a critical indicator:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:deepcopy:MAKE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INTERNAL_ERR]: ikev2_allocate_sa: ERR Invalid BIG-IP flow context for <local IP>[500]-><remote IP>[500] peer='/Common/<ike peer name>'
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_allocate_sa: @A: Insert ike_sa 0x4000c7aa2c88, SPI 1c96e4465b82fc39 0000000000000000 in list (peer='/Common/<ike peer name>')
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state IDLING -> DH_REQ
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_dh_generate_callback] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_REQ -> DH_DONE
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_next_request_id: @A: send message (id 0) sa=0x4000c7aa2c88 (loc=<local IP>[500] rem=<remote IP>[500])
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DH_DONE -> INI_IKE_SA_INIT_SENT
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:PUSH:ikev2_send_request' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (payloads dir=SEND at=ikev2_send_request payl=0x4000c442ca88 len=432 crc=0x47699687
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (v2_head i_spi=0x1c96e4465b82fc39 r_spi=0x0000000000000000 next=33:PAYLOAD_SA
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . . . ver=0x20 exch=34:IKE_SA_INIT flags=0x8:I-Q id=0 len=432 crc=0x47699687)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] @ . (hd type=33:PAYLOAD_SA next=34:PAYLOAD_KE byte=0 len=48 off=0x1c)
...
ipsec.log - BIG-IP retransmits a few more times:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 1
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 2
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_retransmit: @M: retransmit 0x4000c7d77b78 pkt 0x4000c7ec9558 msg_id=0 req 0x4000c7d77b08 SPI 1c96e4465b82fc39 0000000000000000 count 3
ipsec.log - BIG-IP cancels the negotiation after a timeout:
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback1 ike_sa rmconf : 3335236104
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback2 rmconf ikev2 : 3343372872
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: ikev2_negotiation_timeout_callback3 ikev2 plog : 0
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_negotiation_timeout_callback: negotiation timeout: ike_sa (ick=0x1c96e4465b82fc39, rck=0x0000000000000000)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [PROTO_ERR]: __ikev2_abort: ike_sa=0x4000c7aa2c88 ABORT, ERR errno='110', SPI 1c96e4465b82fc39 0000000000000000
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state INI_IKE_SA_INIT_SENT -> DYING
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] (req at='@M:POP:ikev2_cancel_retransmit_req' SPI='1c96e4465b82fc39 0000000000000000' gen=0x1 MID=0 pkt=0x4000c7ec9558)
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: ikev2_state_transition: [ikev2_set_state] @I:ike_sa 0x4000c7aa2c88 SPI=1c96e4465b82fc39 0000000000000000 state DYING -> DEAD
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [DEBUG]: ikev2_ha_send_sa_delete: high availability (HA) SA is already deleted from Session DB
<date> <hostname> info tmm[1501]: 017c0000 [0.2] [IKE] [INFO]: rcf_remote_cite: (remote why='@B:clean:FREE' me=0x4000c6cbaa08#4035 pa=2643 name='/Common/<ike peer name>' ip='<remote IP>[500]')
Conditions:
-- IPsec IKEv2
-- Tunnel may be newly configured
-- BIG-IP does not transmit or respond to any packets related to the configured tunnel.
Impact:
When this occurs, the tunnel will be down permanently.
Workaround:
If this is a High Availability (HA) peer and the config is sync'd with the Standby, failing over to the Standby may bring the tunnel up.
However, a second failover (fail back to the original high availability (HA) device) will lead to the tunnel down again. The original device once Active again, is still in the same failure mode.
One workaround is to failover, check the tunnel is up and then reboot or 'bigstart restart' the failing Standby device.
After that, the IKE SA should appear correctly mirrored on the Standby, use 'tmsh show net ipsec ike-sa' and check there is an SA with the peer's IP.
The second workaround is to delete all IPsec config objects, self IP and route-domain associated with the tunnel. In the case where the IPsec config, self IPs and routes exist entirely in route-domain 0 this is not a reasonable solution and rebooting is the most sensible recovery step.
1988953 : A DNS profile with edns0-client-subnet-insert enabled does not handle EDNS version greater than zero
Links to More Info: BT1988953
Component: Global Traffic Manager (DNS)
Symptoms:
A DNS profile with edns0-client-subnet-insert enabled does not handle EDNS versions greater than zero
Conditions:
DNS profile setup with edns0-client-subnet-insert enabled
Impact:
The response will show RCODE NOERROR (0x0) when it should show RCODE BADVERS (0x10)
Workaround:
NA
1987405-4 : Virtual address ICMP and ARP setting might be inconsistent when traffic-matching-criteria is in use.
Links to More Info: BT1987405
Component: Local Traffic Manager
Symptoms:
Using traffic-matching-criteria [TMC] destination IP lists and defining virtual-addresses matching TMC destinations might lead to unpredictable behavior on ARP/ICMP virtual-address settings.
Conditions:
-- Using traffic-matching-criteria.
-- Destination specified in traffic-matching-criteria list is the same as defined virtual-address.
Impact:
ICMP/ARP settings might not apply properly to configured virtual-addresses.
Workaround:
None
1977037-2 : TMM Virtual Edition on Azure goes into crash loop due to missing kernel driver★
Links to More Info: K000153024, BT1977037
Component: Local Traffic Manager
Symptoms:
- TMM goes into crash loop
- Repeated logs similar to the following can be seen from /var/log/tmm*
notice dpdk[001dd800-2e3d-001d-d800-2e3d001dd800]: DPDK internal port_id 2
notice dpdk: Error: DMA mapping of application heap failed with rte_error Operation not supported
notice dpdk: Error: app_heap_dma_map: app heap DMA mapping failed with rte_errno Operation not supported
notice dpdk[001dd800-2e3d-001d-d800-2e3d001dd800]: Error: DMA mapping application heap
notice dpdk: Error: Removing heap memory (0x40016a600000, 67108864 bytes): Device or resource busy
notice xnet_lib [vmbus:eth2]: Error: Failed to initialize driver
notice xnet[00:e2.0]: Error: Unable to attach to xnet dev
notice xnet(1.2)[00:e2.0]: Error: Unable to initialize device
notice xnet(1.2)[00:e2.0]: Waiting for tmm1 to reach state 4...
notice ndal Error: Restarting TMM
Conditions:
- BIG-IP Virtual Edition is running on Microsoft HyperV on Azure Cloud
- Mellanox ConnectX-3 NIC is used
- XNET driver is being used
Impact:
TMM is unable to successfully start. Device is unable to process traffic.
Workaround:
Configure BIG-IP Virtual Edition to use the sock driver by entering the following command:
echo "device driver vendor_dev f5f5:f550 sock" >> /config/tmm_init.tcl
Reboot the BIG-IP VE instance by entering the following command:
reboot
1974869-3 : Unable to load config after upgrading to v17.1.3/v17.5.x with the Syntax Error: "state" may not be specified more than once.★
Links to More Info: BT1974869
Component: Advanced Firewall Manager
Symptoms:
After upgrading a BIG-IP AFM device from version 16.1.x to 17.1.3/17.5.x, the device fails to come online.
Affected vectors that might have duplicated state entries in bigip.conf:
-- bad-tcp-flags-malformed
-- tcp-ack-ts
-- tcp-flags-uncommon
Conditions:
Set the all network device-config vectors into detect-only state and then initiate upgrade from v16.1.x to v17.1.3/v17.5.x
Impact:
The BIG-IP device fails to load its configuration and does not come online after the upgrade.
Workaround:
-- Manually remove the duplicate state entry in bigip.conf.
-- Perform "tmsh load sys config verify" or reboot
1970969-4 : Stale Record Answers counter increments for SERVFAIL responses from DNS resolver cache
Links to More Info: BT1970969
Component: Global Traffic Manager (DNS)
Symptoms:
Stale Record Answers counter increments incorrectly when no stale record is served and a SERVFAIL is sent.
Conditions:
-- Configure DNS cache resolver with a forwarder.
-- Make sure forwarder does not respond to DNS queries.
-- Enable 'ltm dns cache global-settings serve-expired'
-- Send a few DNS requests to DNS cache for a record which is to be handled by not responding forwarder.
-- Observe 'Stale Record Answers' counter for DNS cache.
Impact:
Leads to incorrect Stale Record Answers stat, potentially misleading monitoring, troubleshooting, and operational decisions.
Workaround:
None
1967293-4 : Re-configuring BFD multihop for a BGP peer does not work reliably.
Links to More Info: BT1967293
Component: TMOS
Symptoms:
When changing the BFD multihop configuration of a BGP peer, the previously existing BFD session might not be cleared properly preventing a new session from getting established.
Conditions:
Change the BFD multihop configuration of a BGP peer.
Impact:
Unable to establish BFD session.
Workaround:
Remove the BFD completely, then apply a new config.
1965149 : A local zone with "." as its prefix is allowed through tmsh and webui
Component: Global Traffic Manager (DNS)
Symptoms:
Adding a local zone with "." as its prefix is allowed through tmsh and webui.
A leading dot implies an empty label before the dot, which violates DNS syntax rules.
Conditions:
Using Local zone
Impact:
zone name as "." prefixes are allowed when they should be blocked
Workaround:
Do not set up local zones with '.' as a prefix, as it violates DNS syntax rules.
1962713 : Limit on BIND maximum records per type★
Links to More Info: BT1962713
Component: Global Traffic Manager (DNS)
Symptoms:
Zones with over 100 records of the same type trigger an error during loading after upgrading to 17.1.2 or higher release, similar to the following:
error: dns_master_load: db.external.example.f5.com.:378: record1.example.f5.com.: too many records
zoneload: error: zone example.f5.com/IN/external: loading from master file db.example.f5.com. failed: too many records
zoneload: error: zone example.f5.com/IN/external: not loaded due to errors.
Conditions:
Occurs when "max-records-per-type" in a zone exceeds the default limit of 100.
Upgrading to 17.1.2 or higher release, given the BIND version upgrade that comes along with it, especially if configured for a single GTM pool with more than 100 members or cumulative pools exceeding 100 members.
Configuration changes to "max-records-per-type" won’t be accepted prior to the upgrade given that new BIND version (9.18.28) is not yet installed.
Impact:
BIND refuses to load zones, resulting in service disruption for affected zones.
Workaround:
After upgrading to v17.1.2 or higher, increase the max-records-per-type value as required. For instructions on how to do that, follow the steps documented in this article: https://my.f5.com/manage/s/article/K000150564
1953273-5 : Big3d high CPU with thousands of https monitors with SNI
Links to More Info: BT1953273
Component: Global Traffic Manager (DNS)
Symptoms:
Big3d high CPU utilization occurs
Conditions:
Large volume of https monitors and monitored resources with SNI configured.
Impact:
Big3d high CPU utilization
Workaround:
None
1937545-3 : Disabling ipsec.if.checkpolicy lead to premature connection termination for a tunneled traffic
Links to More Info: BT1937545
Component: TMOS
Symptoms:
Connections arriving at the BIG-IP over an IPsec tunnel may be unexpectedly closed when ipsec.if.checkpolicy is disabled and the Virtual Server uses SNAT.
Conditions:
- BIG-IP with more than 1 TMM.
- IPsec tunnel in Interface mode.
- FastL4 Virtual Server with SNAT.
- sys db ipsec.if.checkpolicy is disabled.
- Traffic is initiated from behind the remote peer and uses auto lasthop to return traffic, ie there is no routing for the protected traffic back towards the client.
Impact:
Connections arriving via IPsec are unexpectedly and prematurely closed.
Workaround:
The sys db ipsec.if.checkpolicy is enabled by default.
Do not disable ipsec.if.checkpolicy when SNAT is on the Virtual Server that handles traffic for an IPsec tunnel.
1936049 : A configuration of wideips with same FQDNs but different paths may not be prevented by the control plane
Links to More Info: BT1936049
Component: Global Traffic Manager (DNS)
Symptoms:
If a wideIP is created within a partition and folder that also includes an alias, and subsequently a new wideIP with the same FQDN, but a different type, is created in the same partition but without the folder, the new wideIP is not rejected.
Conditions:
A wideIP is created within a partition and folder that also includes an alias.
Subsequently, a new wideIP with the same FQDN, but a different type, is created in the same partition.
Impact:
The config is saved, and subsequently running 'tmsh load sys config gtm-only' may fail.
Workaround:
NA
1935713-3 : TMM crash when handling traffic over vlangroup with autolasthop disabled
Links to More Info: BT1935713
Component: Local Traffic Manager
Symptoms:
In certain circumstances, TMM may crash when handling traffic over a vlangroup with autolasthop disabled.
Conditions:
- Vlangroup.
- No self-IP addresses configured.
- Autolasthop is disabled.
Impact:
Traffic is disrupted while restarting TMM.
Workaround:
Enable autolasthop.
1934865-3 : Remove multiple redundant entries for port-list objects in configuration file
Links to More Info: BT1934865
Component: Advanced Firewall Manager
Symptoms:
When a port-list object is created using TMSH, REST or GUI under any context, redundant entries for the same object are generated in the configuration file under three contexts:
net port-list
security firewall port-list
security shared-objects port-list
For example, a port-list created using one CLI results in multiple entries referring to the same schema object, such as:
net port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
security shared-objects port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
security firewall port-list /Common/portListExample {
ports {
80 { }
443 { }
}
}
This behaviour causes unnecessary duplication in the configuration file.
Conditions:
Creating a port-list object in any context results in the same object being added as three separate entries in the configuration file.
Ex: Using TMSH CLI configuration.
Redundant entries occur in the configuration file when:
A port-list object is created using any one of the following TMSH CLIs:
1. tmsh create net port-list
2. tmsh create security firewall port-list
3. tmsh create security shared-objects port-list
All three CLI commands point to the same object and record three separate entries in the configuration file.
Impact:
Redundant entries in the configuration file lead to:
1. Increased configuration file size unnecessarily.
2. Risk of user confusion during manual editing or review of configuration files.
This issue does not impact runtime functionality or object behaviour, but it introduces maintenance overhead when users interact with their configurations.
Workaround:
None
1934373-3 : DoS attack is blocking while transparent
Links to More Info: BT1934373
Component: Application Security Manager
Symptoms:
A DoS attack is blocking while configured as transparent.
The blocking is only by resets
Conditions:
A transparent volumetric dosl7 and web acceleration profile are configured on the same virtual
Impact:
Blocking even though the configuration is transparent.
Workaround:
tmsh modify sys db dosl7d.static_uri_protection value disable
1933105-4 : TMM does not fragment the output before encapsulating the payload
Links to More Info: BT1933105
Component: TMOS
Symptoms:
Tmm does not fragment the traffic before it goes to encapsulation
Conditions:
- IPSec
-- Tmm receives fragmented payload
Impact:
Large packets are not fragmented on egress.
Workaround:
None
1930897-5 : Tmm core due to overflow of ifc ref counts with flow forwarding
Links to More Info: BT1930897
Component: Local Traffic Manager
Symptoms:
Tmm crashes when passing high amounts of traffic.
Conditions:
Flow forwarding rejected when accepting flows due to high volume of packets that exhausts connection limit and overflows the ifc ref count.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1927993 : Following knowledge-based article K7032 through steps 1-8 to freeze zone files may lead to a zone loaded before being able to run named-checkzone
Links to More Info: BT1927993
Component: Global Traffic Manager (DNS)
Symptoms:
When following the knowledge-based article K7032 to freeze zone files, the named will reload its configuration before step 8.
Conditions:
Following knowledge-based article K7032 through steps 1-8 to freeze zone files and allow manual update to ZoneRunner-managed zone files.
Impact:
The zone can be loaded before the ability to run named-checkzone per instruction 8.
Workaround:
NA
1920637-4 : Duplicate user-defined Signature Set based on Attack Type is created upon policy import during upgrade★
Links to More Info: BT1920637
Component: Application Security Manager
Symptoms:
After an upgrade or a re-import, duplicate signature sets denoted by a "_1" are created containing NULL values instead of empty strings.
Conditions:
A user-defined signature set has an empty string for the tagged signature filter.
Impact:
Additional "duplicate" sets are created every time a policy is re-imported. This does not affect any functionality, but does increase the total configuration size, and makes the configuration more difficult to manage.
Workaround:
You can repair the policy by navigating to “Security ›› Application Security : Policy Building : Learning and Blocking Settings”, clicking on “change”, and choosing the original created sets instead of the duplicated sets. Save, and then apply the policy. The duplicated sets can be deleted after that.
1894113 : GTM pool with min-members-up-value configured causes synchronisation problems after deleting virtual servers on LTM
Links to More Info: BT1894113
Component: Global Traffic Manager (DNS)
Symptoms:
GTM pool are not in sync, running list gtm pool does not show the same pool members.
Conditions:
This happens after deleting an ltm virtual that is listed in a gtm server configured with virtual-server-discovery enabled and in which a GTM Pool has min-members-up-value configured.
If the deletion of the ltm virtual server (example: tmsh delete ltm virtual vs1) brings the number of virtual server below the configured value with min-members-up-value, then a mismatch occurs with the other GTM on other BIG-IP.
Impact:
GTM devices are out of sync.
Workaround:
Avoid the deletion of ltm virtual if this would bring the number of members below the configured min-members-up-value.
1889741-3 : Need for the SYS DB variable to toggle ssl_crypto::queue_max
Links to More Info: BT1889741
Component: Local Traffic Manager
Symptoms:
While ssl_crypto::queue_max can be configured using TCL commands, a corresponding TMSH equivalent is required.
Conditions:
When the system handles a large number of concurrent SSL handshakes or cryptographic operations
Impact:
-- SSL handshake failures
-- Inability to configure the ssl_crypto::queue_max via tmsh
Workaround:
None
1857473 : A BIG-IP monitor may not get removed when changing product type from BIG-IP to Generic Host
Links to More Info: BT1857473
Component: Global Traffic Manager (DNS)
Symptoms:
A BIG-IP monitor may not get removed when changing product type from BIG-IP to Generic Host.
Conditions:
- A generic-host is added to the GTM config as type BIG-IP.
- The User then manually changes the product-type to generic-host
Impact:
The BIG-IP monitor is not removed. Running 'tmsh load sys config gtm-only' will then fail because validation will not permit a server of type generic-host with a monitor of type /Common/bigip
Workaround:
None
1854353-4 : Users with Resource admin role are not able to save the UCS.
Links to More Info: BT1854353
Component: TMOS
Symptoms:
When creating a UCS file, an error occurs:
Data Input Error: Invalid partition ID request, partition does not exist ([All])
Error during config save.
Unexpected Error: UCS saving process failed.
Conditions:
-- Creating a UCS file
-- The user role that initiated the UCS save is Resource Admin
Impact:
Users in a Resource Admin role are unable to save a UCS file.
Workaround:
Other admin type roles are able to save the UCS file.
1848577-3 : VCMP guest stats are not visible on vCMP host GUI nor CLI
Links to More Info: BT1848577
Component: Application Visibility and Reporting
Symptoms:
- Issuing the command 'tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }' returns 'No data available'
- Graphs on 'Statistics ›› Analytics : vCMP : CPU Usage' says "There is no data to display either due to the lack of relevant traffic or due to the settings of the filter." even after the vCMP guest has been running for more than 10 minutes.
Conditions:
- vCMP host running v17.1.x
- The following tables are missing when issuing the command tmctl -f /var/tmstat/blade/vcmp_union_tables' from the vCMP host:
vcmp_tmm_stat_union
vcmp_pva_stat_union
vcmp_proc_pid_stat_union
vcmp_host_info_stat_union
Impact:
No stats (eg. CPU, Network, Disk Usage) can be seen for the vCMP guests when looking from the vCMP host.
Workaround:
Run this Bash one-liner from the vCMP host:
bigstart restart merged ; sleep 600 ; bigstart restart avrd ; sleep 600 ; bigstart restart avrd merged ; sleep 600 ;
Thereafter, check the tables and analytics with these commands:
tmctl -w$COLUMNS -f /var/tmstat/blade/vcmp_union_tables
tmsh show analytics vcmp report view-by guest measures { average-guest-cpu-usage }
1848541-1 : Invalid regular expression causing bd restart loop
Links to More Info: BT1848541
Component: Application Security Manager
Symptoms:
ASM (BD) restart loop
/var/log/ts/bd.log contains events reporting PCRE compilation failure:
ECARD|ERR |Jan 23 10:16:59.036|14826|regexp_table_management.cpp:0057|key crc f77c3b66 PCRE compilation failed at offset 3: PCRE does not support \L, \l, \N{name}, \U, or \u
Conditions:
An invalid regular expression exists in a policy prior to upgrade.
Impact:
Bd restart loop. ASM traffic disrupted while bd restarts.
Workaround:
Clear out incorrect regular expressions from DCC.GLOBAL_PARAM_REG_EXPS
Restart ASM or allow the device to restart.
# tmsh restart sys service asm
1827821-3 : isBase64 params and headers not blocking Attack Signatures
Links to More Info: BT1827821
Component: Application Security Manager
Symptoms:
The parameter value in GET requests are considered as base64 even when the calculated score is below 'base64_max_score'
Params and headers configured as "Base64Decode=required" do not detect base64 encoded attack signatures.
Conditions:
-- Create a parameter named "param" configured as "Base64Decode=required".
-- Send Request to URL /?param=PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg==
Impact:
No Violations Detected, while the parameter included an attack signature (PHNjcmlwdD5hbGVydCgxKTwvc2NyaXB0Pg== is the base64 encoded value of <script>alert(1)</script>)
Workaround:
None
1826505-3 : Restjavad API usage statistics memory leak
Links to More Info: BT1826505
Component: TMOS
Symptoms:
A memory leak develops on the standby device but may persist on the active device.
Restjavad may fail and restart with a similar error to the following log snippet (in /var/log/restjavad.0.log if failure is recent):
'DieOnUncaughtErrorHandler Uncaught Error causing restjavad to exit.'
It may also trigger frequent CPU intensive garbage collection such as many invocations of 'Full GC'. These will not be able to clear the memory, and that may be observable in GC logs as only small drops in restjavad heap size when Full GC runs.
Restart of restjavad may not clear the issue fully or for long. Issue may persist after upgrade.
/var/log/restjavad-api-usage.json has a large file size. Typically it will be tens of Kilobytes before leak develops and eventually grow to Megabytes or tens of MB.
Conditions:
Restjavad that fails or exhibits issues will have had a long time as standby in a HA cluster, but may not be standby at time of failure.
Impact:
Restjavad exits and restarts, perhaps repeatedly.
High CPU use due to frequent intensive garbage collection may occur.
Workaround:
See K000153118: Procedure to clear restjavad API statistics memory leak, ID 1826505
https://my.f5.com/manage/s/article/K000153118
This procedure should have a low impact if your environment does not require constant availability of REST API. For systems that are more dependent on REST API availability such as SSL Orchestrator, you may want to restrict this to a maintenance window.
1826485 : Creating a GTM pool in a custom partition with a custom route domain via GUI can fail
Links to More Info: BT1826485
Component: Global Traffic Manager (DNS)
Symptoms:
Creating a GTM pool in a custom partition with a custom route domain via GUI can fail with the following error message:
"The specified IP address(es) specified by (0.0.0.0%1) cannot be a route domain address(es) (fallback "IP address)."
Conditions:
Using a custom partition and custom route domain
Impact:
A GTM pool will not be created via the GUI
Workaround:
The same pool can be created using the TMSH command "create gtm pool"
1824965-5 : Implement iRule support to fetch SNI from SSL, HTTP and QUIC traffic
Component: Traffic Classification Engine
Symptoms:
You can not use an iRule to look up the SNI/hostname from SSL, HTTP, and QUIC traffic.
Conditions:
You need to look up the SNI/hostname in an iRule
Impact:
You are unable to look up the SNI or hostname.
Workaround:
None
1824745-3 : Bd crash and generate core
Links to More Info: BT1824745
Component: Application Security Manager
Symptoms:
Bd crashes
Conditions:
Unknown
Impact:
Traffic disrupted while bd restarts.
Workaround:
None
1824113 : GTM iRule : [active_members <poolname>] command ignores any status effects applied by a parent.
Links to More Info: BT1824113
Component: Global Traffic Manager (DNS)
Symptoms:
Disabling a pool or virtual server that is referenced by a pool member affects how pool <poolname> selects a response, but [active_members <poolname>] still returns a value that ignores these status effects.
Conditions:
-- GTM pool
-- An iRule that checks the available_members of the pool is greater than zero before selecting the pool
-- Disable the pool
The pool is still selected for client queries to the wideIP
Logs show that the available_members is equal to the number of pool members, even though the pool is disabled.
Impact:
Unable to manage availability by disabling the pool.
Workaround:
None
1818861-4 : Timestamp cookies are not compatible with fastl4 mirroring.
Links to More Info: BT1818861
Component: Advanced Firewall Manager
Symptoms:
DOS tcp-ack-ts vector with tscookies option enabled is not compatible with fastl4 (L4) mirroring.
Conditions:
- DOS tcp-ack-ts vector with tscookies option enabled
- Mirroring configured on fastL4 TCP virtual.
- FastL4 profile with timestamp 'preserve' option configured.
Impact:
Existing connections hang due to tsval not being transformed properly on a newly active device.
Workaround:
Set fastl4 timestamp option to strip/rewrite.
1813625-3 : "tmsh show net ipsec-stat" command is not showing statistics - all values are zero.
Links to More Info: BT1813625
Component: TMOS
Symptoms:
Output of "tmsh show net ipsec-stat" shows all zeros for values of "Packets In", "Bytes In", "Packets Out" and "Bytes Out".
Conditions:
"tmctl ipsec_data_stat" displays separate statistics for encrypted and plain data but tmsh show zero values.
Impact:
Tmsh can't be used to display IPSec statistics
Workaround:
Data can be displayed with "tmctl ipsec_data_stat"
1812349-4 : IPsec phase 2 (IKEv1 Quick Mode) will not start after upgrade★
Links to More Info: BT1812349
Component: TMOS
Symptoms:
IPsec IKEv1 tunnels fail half way through tunnel negotiation. As a result the tunnel never comes up.
Conditions:
-- BIG-IP with IKEv1 IPsec tunnel
-- ISAKMP traffic to the remote peer is not in route-domain 0 (RD0)
-- Upgrade to version 16.x or 17.x
Impact:
IPsec tunnels are not able to connect remote peer networks.
Workaround:
There are two options:
-- Use IKEv2, this will require that the remote peer is also reconfigured to IKEv2.
-- Alternatively, move the IPsec peer's configuration to RD0.
1787645-4 : BD process fail to startup on specific XML configuration
Links to More Info: BT1787645
Component: Application Security Manager
Symptoms:
BD does not start up (restart loop).
Conditions:
An XML configuration with specific configuration in the profile.
Impact:
System does not start up.
Workaround:
Remove the specific configuration in the profile.
1782057-4 : BD crash related to dns lookup
Links to More Info: BT1782057
Component: Application Security Manager
Symptoms:
A bd daemon crash
Conditions:
Related to DNS lookup scenarios
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1778793-4 : Database health monitors may use the wrong connection when attempting to connect to database
Links to More Info: BT1778793
Component: Local Traffic Manager
Symptoms:
Database monitors fail periodically and mark a pool member down.
Periodically, the DB monitor will create user sessions on the DB server without closing them.
Conditions:
- Multiple database health monitor instances exist to probe a given node.
- The monitor instances share the same values for the following parameters:
- destination IP address
- destination port
- database name.
Impact:
Healthy pool members are not selected to receive traffic.
Workaround:
You can work around this issue by using a BIG-IP EAV external monitor to probe the health of your database. An example for MySQL is available on DevCentral at https://community.f5.com/kb/codeshare/mysql-monitor/273565.
Alternatively, you may also work around this issue by adding a unique connection property as a suffix to the database name. This ensures a unique JDBC connection string is constructed for each monitor in order to avoid this issue.
For example you can use the connection properties "ApplicationName=<monitor_name>" or "applicationName=<monitor_name>" in PostgreSQL or Microsoft SQL Server respectively to provide the name of the calling monitor to the database.
In Oracle a connection string similar to the following can be used:
database (DESCRIPTION=(ADDRESS=(PROTOCOL=tcp)(HOST=%node_ip%)(PORT=%node_port%))(CONNECT_DATA=(SERVICE_NAME=ORACLE1))(SERVER=dedicated)(customKey=1))
or
database "%node_ip%:%node_port%:ORCLDB1?customkey=1"
Note that the PostgreSQL monitor requires a "?" character as a separator between the database name and the connection property, while MS SQL Server requires a ";" as separator.
Example tmsh commands to disambiguate monitorA and monitorB which both probe database "samedb" on the same node:
- PostgreSQL monitors:
- tmsh modify ltm monitor postgresql monitorA database samedb?ApplicationName=monitorA
- tmsh modify ltm monitor postgresql monitorB database samedb?ApplicationName=monitorB
- MS SQL Server:
- tmsh modify ltm monitor mssql monitorA database '"samedb;applicationName=monitorA"'
- tmsh modify ltm monitor mssql monitorB database '"samedb;applicationName=monitorB"'
- Oracle Server:
- tmsh modify ltm monitor oracle myoracle database '%node_ip%:%node_port%:PTDB3CC1?customkey=1'
Note that the extra quoting in the example command for MS SQL Server is required to preserve the ";" separator in the database name.
1772353-3 : Defaults for Associated Violations are re-added to a policy
Links to More Info: BT1772353
Component: Application Security Manager
Symptoms:
When Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported, the default elements are re-added to the list.
Conditions:
Associated Violations is empty ("Selected" list is empty), and the policy is exported to XML or JSON format, and reimported
Impact:
The default Session Awareness Violations are set back to delay blocking unexpectedly.
Workaround:
Use binary format export and import.
1758193-2 : Trunk with LACP and virtual-wire flaps after an upgrade.★
Links to More Info: BT1758193
Component: Local Traffic Manager
Symptoms:
After performing an upgrade from a version lower than 16.0 to a version higher or equal to 16.0, BIG-IP will fail to establish LACP trunk when interfaces are configured in virtual-wire mode.
Version 16.0 introduced transparent LACP bridging of LACP allowing LAG to be established across BIG-IP. This feature is enabled by default in versions > 16.0.
Conditions:
- Trunk configured with LACP.
- Virtual-wire configured across the trunk.
- Upgrading from version lower than 16.0 to a version higher or equal to 16.0.
Impact:
Fail to establish LACP trunk.
Workaround:
Setting l2.virtualwire.multicast.bridging to disabled allows BIG-IP to establish LACP directly with other devices without bridging maintaining the behavior from versions < 16.
1755113-5 : BD crash with specific JSON schema
Links to More Info: BT1755113
Component: Application Security Manager
Symptoms:
BD crash
Conditions:
Using specific JSON schema in the JSON content profile applied on the ASM policy
Impact:
ASM traffic disrupted while bd restarts.
Workaround:
None
1754325 : Disabled status from manual resume on a BIG-IP DNS pool can sync to other BIG-IP DNS devices in synchronization-group
Links to More Info: BT1754325
Component: Global Traffic Manager (DNS)
Symptoms:
BIG-IP DNS pool with the manual resume feature enabled loses its iQuery connection and loses its network path to monitor the manual resume, the pool will mark pool members associated with that pool down and disabled.
When the BIG-IP DNS device that lost the iQuery connection re-establishes a connection, it will continue to leave pool members disabled on pools with manual resume configured and the disabled status may sync to other devices in the synchronization-group if their config timestamp is older then this disconnected/reconnected BIG-IP DNS device.
Conditions:
-- BIG-IP DNS pool with the manual resume feature enabled
-- The iQuery connection is lost
Impact:
Pool is disabled for all BIG-IP DNS devices in the synchronization-group
Workaround:
Manually re-enable disabled pool members on the BIG-IP DNS system and the re-enabled status will sync to the other BIG-IP DNS devices in the synchronization-group
1708309-4 : Dynconfd crash with invalid ephemeral pool member
Links to More Info: BT1708309
Component: Local Traffic Manager
Symptoms:
If the BIG-IP configuration becomes corrupted in such a way that an ephemeral pool member exists with no corresponding FQDN template pool member, ephemeral node or FQDN template node, the dynconfd daemon may crash repeatedly.
Conditions:
This issue has only been encountered when corruption of the MCP database resulted in an ephemeral pool member existing with no corresponding FQDN template pool member, ephemeral node or FQDN template node. This is an invalid configuration which cannot be created through user action, and can only occur due to corruption of the MCP database. Such corruption is extremely rare, and the cause is not known.
Impact:
The dynconfd daemon performs the action of resolving node FQDN names to IP addresses and creating ephemeral nodes and pool members with those addresses. When this issue occurs, dynconfd will be unable to resolve FQDN names in any existing FQDN template nodes (and FQDN template pool members) to their corresponding IP addresses. This can result in a lack of available pool members to process traffic.
Workaround:
To recover from the MCP database corruption, perform the actions described in the following F5 knowledge article:
K13030: Forcing the mcpd process to reload the BIG-IP configuration
1707921-4 : Tenant upgrade fails with disk full error on BIG-IP 17.x created with T2 image★
Links to More Info: BT1707921
Component: TMOS
Symptoms:
Upgrade failed with "disk full" error in 17.1.x version.
-----------------------------------------------------------------------------------------------------------
Sys::Software Status
Volume Product Version Build Active Status Allowed Version
-----------------------------------------------------------------------------------------------------------
HD1.1 BIG-IP 17.1.1.4 0.0.9 yes complete yes
HD1.2 BIG-IP 17.1.1.3 0.0.5 no failed (Disk full (volume group). See SOL#10636)
Conditions:
- Deployed BIG-IP tenant with v17.x.x T2 image
- Trying to create an additional boot location
Impact:
Creation of additional boot location fails with "disk full" error.
Workaround:
Expand the tenant's virtual disk (storage-size) from F5OS to accommodate an additional boot location in the tenant.
Values of 46G/47G have worked well in lab testing.
1690005-3 : Unable to ping the floating self addresses from the Standby tenant
Links to More Info: BT1690005
Component: F5OS Messaging Agent
Symptoms:
Masquerade Mac is not removed when F5OS is rebooted.
It can be observed using the 'show fdb' command in confd
This can cause the standby tenant to be unable to ping the floating SelfIP address on the active device, but the active device can ping the standby device.
Conditions:
- An HA pair of tenants is used
- Tenants running on a VELOS chassis, or on r5000-series, r10000-series, or r12000-series appliances
- A traffic group uses a masquerade mac
- The Active tenant is rebooted
Impact:
Active and Standby act as if they are the owners of Floating MAC and IP.
Workaround:
The masquerade mac's fdb can be manually deleted using the F5OS CLI.
From the standby F5OS system CLI:
config
no fdb mac-table entries entry <mac masquerade address>
commit
1671149-5 : Timestamp cookies may cause issue for PVA-accelerated connections
Links to More Info: BT1671149
Component: Advanced Firewall Manager
Symptoms:
Timestamp cookies may cause performance issues for PVA-accelerated connections on some older platforms and/or platforms without a performance license.
Conditions:
- PVA offload configured (any stage).
- DOS ACK (TS) vector has timestamp cookies option enabled.
- Platform supporting ePVA feature (Ref. https://my.f5.com/manage/s/article/K12837)
- Platform does not belong to the following subset:
B2250 (A112)
B4450N (A114)
B4460N (A121)
i10800 (C116)
i7800 (C118)
i5800 (C119)
i11800 (C123)
i11800-DS (C124)
i5820-DF (C125)
i7820-DF (C126)
i15800 (D116)
i15820-DF (D120)
VELOS BX110, BX520
r5800/5900, r10800/10900, r12800/12900 r-series platforms
Additionally, for platforms specified in the list above a license with support of turboflex 'Basic DoS vectors' capability is required. Note, this requires a 'Performance' license on some of platforms.
For more information about Turboflex please check article https://techdocs.f5.com/en-us/hw-platforms/f5-platform-turboflex-profiles/title-turboflex-overview.html
Impact:
Tmm resets the connection or causes slow performance.
Workaround:
Disable timestamp-cookie feature.
1644497-5 : TMM retains old Certificate Revocation List (CRL) data in memory until the existing connections are closed
Links to More Info: BT1644497
Component: TMOS
Symptoms:
In TMM memory, the old CRL data is available until the existing connections are closed. This may exhaust TMM memory.
Conditions:
- Connections last for a long time.
- Frequent updates on the CRL.
Impact:
TMM memory exhausts.
Workaround:
- Dynamic CRL or CRLDP on the Client-SSL profile can be configured to dynamically verify the SSL certificate revocation status.
or
- Online Certificate Status Protocol (OCSP) can be enabled on the Client-SSL profile to validate SSL certificate revocation status.
1642301-5 : Loading single large Pulse GeoIP RPM can cause TMM core
Links to More Info: BT1642301
Component: Global Traffic Manager (DNS)
Symptoms:
Creates a TMM core.
Conditions:
Loading large Pulse GeoIP RPM resources.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Use GEOIP Edge database.
1636273 : In BIND 9.18.28, a new configurable parameter (max-records-per-type) has been introduced with a default limit of 100 to address a security issue.
Component: Global Traffic Manager (DNS)
Symptoms:
No DNS response is received for more than 100 records.
Conditions:
Resolve a domain with more than 100 records of the same type.
Impact:
DNS resolution fails.
Workaround:
Adjust the max-records-per-type value in the BIND configuration as needed.
1635013-5 : The "show sys service" command works only for users with Administrator role
Links to More Info: BT1635013
Component: TMOS
Symptoms:
A guest or non-root user must be able to use the TMSH “show sys service” command, as there is no rule associated with a schema.
Conditions:
The issue occurs when the user is a non-root user.
Impact:
A non-root user will not be able to run the command even though they have permissions.
Workaround:
None
1621977-1 : Rewrite memoryleak with "REWRITE::disable" irule
Links to More Info: BT1621977
Component: Access Policy Manager
Symptoms:
Rewrite memory leak.
Conditions:
"REWRITE::disable" irule attached to virtual server.
Impact:
Rewrite memory usage is high.
Workaround:
Avoid using 'REWRITE::disable'
If only URL rewriting required (and not content rewriting), the below custom iRule which is designed exclusively for URL rewriting can be utilized,
===========
when HTTP_REQUEST {
if {[HTTP::host] equals "<JS file name>"}
{
HTTP::uri [string map {F5CH=J F5CH=I} [HTTP::uri]]
HTTP::uri [string map {F5CH=H F5CH=I} [HTTP::uri]]
}
}
===========
1603869-3 : Wrong Fallback to local for TACACS authentication with empty password when source fallback is set to true
Links to More Info: BT1603869
Component: TMOS
Symptoms:
When remote auth configured with fallback is set to true and if try to login to the BIG-IP with local user credentials by providing empty password first then authentication mechanism fall back to local and then if provided with correct local user password the access is granted which causes security issues.
Conditions:
-- configure auth source fallback true.
-- Configure the remote auth mechanism in this case, TACACS.
-- Configure a local user that is not present in the TACACS server.
auth source {
fallback true
type tacacs
}
Impact:
Unauthorized access is given to the BIG-IP with a local user, even though the authentication mechanism is configured as remote.
Workaround:
Configure the auth source fallback as false.
auth source {
fallback false
type tacacs
}
1603605 : DNS response is malformed when the response message size reaches 2017 bytes
Links to More Info: BT1603605
Component: Global Traffic Manager (DNS)
Symptoms:
DNS response is malformed.
Conditions:
When the response message size reaches 2017 bytes.
Impact:
The formatting of the DNS response is incorrect.
Workaround:
None
1602629-5 : Tmm_mcpmsg_print can trigger SOD
Links to More Info: BT1602629
Component: TMOS
Symptoms:
TMM is killed by SOD.
Conditions:
Conditions are unknown, it was encountered when ID 1047789 was encountered, see https://cdn.f5.com/product/bugtracker/ID1047789.html
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1596313-3 : F5OS LAG fails MCPD validation, tenant trunk has no interfaces.
Links to More Info: BT1596313
Component: TMOS
Symptoms:
After creating an HA group with a trunk in an LTM tenant, the first reboot triggers an error: "Invalid attempt to register an n-stage validator; the stage must be greater than the current stage and within 1–101 (current stage: 7, registered: 5). Unexpected."
Conditions:
Occurs when,
- BIG-IP tenant running on F5OS
- High availability system
- HA group with a trunk
- The tenant is rebooted for the first time
Impact:
No impact on TMM VLAN traffic
Workaround:
Rerun the tmsh create sys ha-group command.
1589629-5 : An ICMPv6 Neighbor Solicitation sent to the last address on an IPv6 subnet uses the wrong Destination MAC address
Links to More Info: BT1589629
Component: Local Traffic Manager
Symptoms:
The destination MAC address of the ICMPv6 Neighbor Solicitation message is incorrect.
Conditions:
An IPv6 SelfIP address is used, and tmm attempts to resolve the address of (for example) an IPv6 pool memeber which is using the last IPv6 address in the available subnet range.
Impact:
Nodes on the network do not respond to ICMPv6 Neighbor Solicitation messages.
In large environments with many affected addresses, this could potentially contribute to a broadcast storm or degrade overall network performance.
Workaround:
None (other than avoiding the use of the last address in the IPv6 subnet range)
1589269-4 : The maximum value of sys db provision.extramb was reduced from 8192 to 4096 MB★
Links to More Info: BT1589269
Component: SSL Orchestrator
Symptoms:
From version 16.1.0 the maximum value of sys db provision.extramb is 4096 MB, reduced from 8192 MB. It will be automatically set to 4096 during the upgrade if it has a higher setting.
Conditions:
Any BIG-IP device running software version 16.1.0 or higher.
Impact:
It is extremely rare to need values of provision.extramb above 4096 MB.
If the value of sys db provision.extramb is 4096 or less prior to upgrading, then there will be no impact post-upgrade. After the upgrade, it is not possible to increase the value above 4096.
If the value is greater than 4096, it will be reduced to 4096 when upgrading to version 16.1.0 or higher. This may leave devices with insufficient 4KB page memory (also known as host memory) which may lead to issues due to memory pressure, such as OOM killer killing processes, poor scheduling of processes leading to core dumps, and sluggish management access.
Workaround:
None
1586877-3 : Behavior difference in auto-full sync virtual server and manual-incremental config sync
Links to More Info: BT1586877
Component: Application Security Manager
Symptoms:
An ASM policy is assigned to a virtual server with the same name in a Sync-Only device group in Auto-Sync mode.
Conditions:
Devices with same virtual server name in a Sync-Only device group.
Impact:
The ASM policy is synced, which is unexpected behavior.
Workaround:
None
1586745-3 : LACP trunk status became DOWN due to bcm56xxd failure
Links to More Info: BT1586745
Component: TMOS
Symptoms:
Lacp, lldp reports trunk(s) down and you may observe the below logs.
err lldpd[7489]: 01570004:3: HAL send PDU failed
err lldpd[7489]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lldpd[7489]: 01570004:3: HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: ING_SERVICE_COUNTER_TABLE_X.ipipe0 interrupt timeout
err lacpd[10571]: 01290003:3: HalmsgTerminalImpl_::sendMessage() Unable to send to any BCM56XXD address
err lacpd[10571]: 01160005:3: HalMsgHandler.cpp:125 - HAL send PDU request failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: FP_COUNTER_TABLE_X.ipipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut: EFP_COUNTER_TABLE_X.epipe0 interrupt timeout
info bcm56xxd[10383]: 012c0016:6: TableDmaTimeOut:_soc_xgs3_mem_dma, Abort Failed
Conditions:
Not known at this time.
Impact:
An outage was observed
Workaround:
Restart bcm56xxd, lldpd, lacpd process.
1586405-4 : "/f5-h-$$/" repeatedly appened to URL's path every refresh of the page
Links to More Info: BT1586405
Component: Access Policy Manager
Symptoms:
Observe multiple "/f5-h-$$/" in URLs when accessing via Protected Access.
Conditions:
"<base href="xxxxx">" tag in the home page.
Impact:
URLs become lengthy upon every refresh and may lead to webapp misfunction.
Workaround:
Customized iRule
======================
when REWRITE_REQUEST_DONE {
if { [HTTP::path] ends_with "path_to_file1" } {
REWRITE::post_process 1
set rewrite_new 1
}
if { [HTTP::path] ends_with "path_to_file2" } {
REWRITE::post_process 1
set rewrite_new1 1
}
}
when REWRITE_RESPONSE_DONE {
if {[info exists rewrite_new]} {
unset rewrite_new
set rewrite_str {<base href=""f5-h-$$path_in_file1"">}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file1">}
}
}
if {[info exists rewrite_new1]} {
unset rewrite_new1
set rewrite_str {<base href="f5-h-$$/path_in_file2">}
set rewrite_str_len [string length $rewrite_str]
set strt [string first $rewrite_str [REWRITE::payload]]
if {$strt > 0} {
REWRITE::payload replace $strt $rewrite_str_len {<base href="/f5-w-6578616d706c652e636f6d//path_in_file2">}
}
}
}
======================
1575805-2 : bcm56xxd Process Killed by SOD After Failing to Send a Heartbeat During Firewall Rule Statistics Query
Component: TMOS
Symptoms:
When firewall rule statistics are requested using query_stats { fw_rule_stat { } }, the system may experience delays and bcm56xxd process is killed by sod, eventually impacting the traffic.
Conditions:
This issue may occur if a user/daemon sends a query_stats { l2_forward_stat {} } query where the mcp message header has validation_only set to 1
Impact:
Impact to Application traffic.
Workaround:
Limit validation‑only firewall rule statistics queries on systems with large or complex firewall rule configurations
1574521-3 : Intermittent high packet latency on R4000 and R2000 tenants
Links to More Info: BT1574521
Component: Performance
Symptoms:
When compared to previous platforms, BIG-IP tenants on R4000 and R2000 platforms may demonstrate higher jitter and packet latency / rtt. This affects pings, tcp, udp, and any other protocols processed by the software data plane (tmm).
This is because the r4000 and r2000 appliances have a slightly different hardware architecture than other appliances.
CPUs on this platform are not dedicated to the tenant and these platforms also run a different class of Intel processing, and do not utilize hyperthreading like the higher end platforms do.
See:
https://clouddocs.f5.com/training/community/rseries-training/html/rseries_performance_and_sizing.html#r4000-vcpu-sizing
Conditions:
BIG-IP tenants on R4000 and R2000 platforms
Impact:
Intermittent high latency and jitter.
Workaround:
None
1572045-3 : Login page config parameters are still case-sensitive with a case insensitive policy
Links to More Info: BT1572045
Component: Application Security Manager
Symptoms:
A login attempt is not detected.
Conditions:
- The policy is configured case-insensitive
- Upper case characters are used in the login page config parameters.
Impact:
Login attempt not detected.
Workaround:
Use only lower case for login page parameters configuration.
1571817-5 : FQDN ephemeral pool member user-down state is not synced to the peer device
Links to More Info: BT1571817
Component: TMOS
Symptoms:
One or more FQDN ephemeral pool members on a device group member is showing an incorrect state for the pool member.
Conditions:
1. Create the FQDN pool with an FQDN template pool member and ensure that the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
2. On one member of the device group, modify the state of the FQDN template pool member to 'user-down'.
3. Synchronize the configuration to the device group.
4. Check the status of the pool on the same member of the HA pair and verify that the state of any ephemeral pool member associated with the FQDN template pool member is 'user-down'.
5. On the other member of the device group, the state of any ephemeral pool member associated with the FQDN template pool member is 'up'.
Impact:
The state of the ephemeral pool members on one member of the device group is incorrect.
Workaround:
None
1505753-4 : Maximum Fragment Length extension is not visible in ServerHello even though it is present in ClientHello
Links to More Info: BT1505753
Component: Local Traffic Manager
Symptoms:
When the request from the client contains the Maximum Fragment Length header, BIG-IP is able to process it and honors the functionality, but this parameter is not added to the ServerHello.
Conditions:
Send a request from a client that contains the maximum fragment length extension.
Impact:
The ClientHello succeeds but the TLS Handshake fails when the Server Hello is received.
Workaround:
None
1481889-5 : High CPU utilization or crash when CACHE_REQUEST iRule parks.
Links to More Info: BT1481889
Component: Local Traffic Manager
Symptoms:
When CACHE_REQUEST iRule stops, the Ramcache filter stays in CACHE_INIT state when it restarts. This causes the request to be processed twice, which causes high CPU usage or a crash when an incorrect address is encountered.
Conditions:
- HTTP Virtual server
- CACHE_REQUEST iRule with ms delay
- Multiple attempts to request a compressed doc
Impact:
- High CPU on boxes with 4G of valid memory after the key is hashed - on smaller boxes, will crash when an invalid address is encountered.
Workaround:
- Removal of CACHE_REQUEST iRule if avoidable
1474877-5 : Unable to download large files through VIP due RST Compression error.
Links to More Info: BT1474877
Component: Local Traffic Manager
Symptoms:
- Download of files exceeding maximum tmm.deflate.memory.threshold fails at client.
- Client receives RSTs (Compression error)
Conditions:
- Virtual server with HTML profile or REWRITE profile.
- Size of decompressed http response from server exceeds max tmm.deflate.memory.threshold value i.e. 4718592 bytes.
Impact:
- Client may lose connection to the server.
Workaround:
- Based on URI matches in the HTTP request, decide which responses should NOT be rewritten (e.g. big downloads) and disable REWRITE profile for the selected responses.
- For example, URI starting with "/headsupp/api/data/compare/measures" :
when HTTP_REQUEST {
if { [HTTP::uri] starts_with "/headsupp/api/data/compare/measures" } {
set no_rewrite 1
}
}
when HTTP_RESPONSE {
if { $no_rewrite == 1 } {
REWRITE::disable
}
}
1463089-2 : TMM crash because of corrupted MQTT queue
Links to More Info: BT1463089
Component: Local Traffic Manager
Symptoms:
Tmm crashes while terminating an MQTT flow. Core file analysis indicates MQTT queue corruption.
Conditions:
LTM configured with TCP and MQTT.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1462337-6 : Intermittent false PSU status (not present) through SNMP
Links to More Info: BT1462337
Component: TMOS
Symptoms:
PSU status displays as (2) Not Present through SNMP.
or
sysChassisFanStatus status displays as (2) Not Present through SNMP.
Conditions:
Conditions are unknown. It occurs intermittently.
Impact:
Intermittent false alarm in SNMP monitoring.
Workaround:
None
1455805-3 : MCPD unstable/inoperative after copying SNMP configuration from another BIG-IP
Links to More Info: BT1455805
Component: TMOS
Symptoms:
If SNMP configuration that contains Secure Vault-protected attributes ("$M$...") is copied from a BIG-IP system to another and the devices do not have the same Secure Vault master key, the target device will appear to accept the configuration, but will be unable to decrypt the attributes.
If the system is subsequently rebooted, MCPD will remain inoperative or restart repeatedly during startup.
The LTM log files will contain error messages similar to the following:
bigip01 notice mcpd[30645]: 01071027:5: Master key OpenSSL error: 4008867572:error:06065064:digital envelope routines:EVP_DecryptFinal_ex:bad decrypt:evp_enc.c:664:
bigip01 notice mcpd[30645]: 01b00001:5: Processed value is empty: class name (usmuser) field name ()
bigip01 err mcpd[30645]: 01071684:3: Unable to encrypt application variable (/Common/ifoobar_1_1 auth_password usmuser /Common/snmpd).
Or
bigip01 notice mcpd[7011]: 01b00001:5: Processed value is empty: class name (trapsess) field name ()
bigip01 err mcpd[7011]: 01071684:3: Unable to encrypt application variable (/Common/i192_0_2_1 auth_password trapsess /Common/snmpd).
The LTM log file may contain this log message, indicating that MCPD exited and restarted while attempting to load the configuration:
bigip01 emerg load_config_files[25201]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed. -- Error: failed to reset strict operations; disconnecting from mcpd. Will reconnect on next command.
Conditions:
- SNMP configuration that contains Secure Vault-encrypted attributes ("$M$..."), present as SNMPv3 auth-password and/or privacy-password attributes
- SNMP configuration is copied from a BIG-IP system to another BIG-IP system, and the two devices do not share the same Secure Vault master key.
Impact:
- SNMP configuration does not function.
- If the device is rebooted or MCPD is restarted, the system will remain INOPERATIVE or MCPD will be in a restart loop.
Workaround:
Do not copy SNMP configuration with encrypted attributes between disparate devices.
If a device is currently in an inoperative state and affected by this issue:
- Create a backup copy of /config/bigip_base.conf
- Manually edit bigip_base.conf and remove the SNMPv3 users and traps
- If the system does not recover automatically, restart MCPD or reboot the device once.
1440409-8 : TMM might crash or leak memory with certain logging configurations
Links to More Info: BT1440409
Component: Local Traffic Manager
Symptoms:
TMM might crash or leak memory with certain logging configurations.
Conditions:
Virtual-to-virtual chaining is used for handling syslog messages.
Impact:
Memory leak or Crash.
Workaround:
None
1429813-6 : ASM introduce huge delay from time to time
Links to More Info: BT1429813
Component: Application Security Manager
Symptoms:
During high traffic, the response to some requests will be delayed for more than 1 second.
Conditions:
ASM Policy attached to the Virtual Server and during high traffic conditions.
Impact:
Some critical URLs like payment links, will timeout for the user.
Workaround:
None
1407949-6 : iRules using regexp or regsub command with large expression can lead to SIGABRT.
Links to More Info: BT1407949
Component: Local Traffic Manager
Symptoms:
When iRule is using badly crafted regexp or regsub command, sometimes large regex compilation may lead to TMM core.
- Multiple clock advances will be logged in tmm logs.
- A message similar to the one below will be logged in tmm logs:
notice sod[9938]: 01140041:5: Killing tmm.0 pid <pid of tmm>.
Conditions:
- iRules using regexp or regsub command with large expression
Impact:
Traffic disrupted while tmm restarts.
Workaround:
Update iRule to avoid using regex or regsub with large expressions.
either by
1. setting an upper-limit on the permitted size for regex expression or
2. rewrite the iRule to avoid the use of 'regsub'.
1395349-3 : The httpd service shows inactive/dead after "bigstart restart httpd"
Links to More Info: BT1395349
Component: TMOS
Symptoms:
The systemd service unit for httpd shows a status of inactive (dead) after you restart httpd using bigstart restart httpd. For example:
# systemctl status httpd
* httpd.service - LSB: start and stop Apache HTTP Server
Loaded: loaded (/etc/rc.d/init.d/httpd; enabled; vendor preset: enabled)
Active: inactive (dead) since Mon 2023-11-13 09:55:06 GMT; 5s ago
In versions v15.1.10.5 and above in v15.1.x, v16.1.5 and above in v16.1.x, and v17.1.1.4 and above, if a system is affected by this and then a user or process restarts httpd via systemd, the GUI will stop responding and return 403 Forbidden errors. This happens when attempting to renew or update the device certificate via the GUI.
Conditions:
Executing the command bigstart restart httpd. This will also happen behind-the-scenes when making HTTP configuration changes via tmsh/the GUI/iControl.
Impact:
httpd is running normally, but systemd is not aware of it.
Workaround:
To confirm httpd is running, you can use the following commands:
bigstart status httpd
OR
ps ax | grep '[h]ttpd'
If you would like to clear the stale state, restart httpd via its systemd service unit twice:
systemctl restart httpd && systemctl restart httpd
If the GUI is returning 403 Forbidden errors for everything, restart httpd ("systemctl restart httpd && systemctl restart httpd").
1380009-4 : TLS 1.3 server-side resumption resulting in TMM crash due to NULL session
Links to More Info: BT1380009
Component: Local Traffic Manager
Symptoms:
TMM core is observed when TLS 1.3 server-side resumes.
Conditions:
- TLS 1.3 handshake
Impact:
TMM cores, traffic is disrupted.
Workaround:
None
1366269-6 : NAT connections might not work properly when subscriber-id is confiured.
Links to More Info: BT1366269
Component: Advanced Firewall Manager
Symptoms:
When subscriber-aware NAT is configured or subscriber-id logging is enabled under NAT log profile some NAT connections might not work properly.
Conditions:
- Subscriber-aware NAT or NAT logging with subscriber-id enabled.
Impact:
Some NAT connections fail to complete.
Workaround:
Disable 'subscriber-id' under NAT logging profile.
1361021-5 : The management interface media on a BIG-IP Tenant on F5OS systems does not match the chassis
Links to More Info: BT1361021
Component: TMOS
Symptoms:
The management interface media on a BIG-IP tenant running on F5OS systems does not match the media/speed of the management interface on the system controllers.
Running 'tmsh show net interface' reports the media of the management interfaces (i.e. 'mgmt' or '1/mgmt') as "100TX-FD".
Conditions:
BIG-IP tenant running on F5OS systems (rSeries or VELOS).
Impact:
The media is reported as "100TX-FD".
Workaround:
Ignore the speed reported for the tenant's management interface(s), and instead, look at the speed of the management interfaces as reported in F5OS.
While running confd, run the following command to see the correct media settings:
VELOS: show interfaces interface 1/mgmt0
rSeries: show interfaces interface mgmt
1347861-5 : Monitor status update logs unclear for FQDN template pool member
Links to More Info: BT1347861
Component: TMOS
Symptoms:
When the state of an FQDN template node is changed (such as being forced offline by user action), one or more messages similar to the following may appear in the LTM log (/var/log/ltm):
notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status unchecked. [ ] [ was unknown for #hrs:##mins:##sec ]
Although such log messages indicate the current state of the FQDN template pool member, the prior status is indicated as "unknown" and does not accurately indicate the prior state of the FQDN template pool member.
Conditions:
This may occur when FQDN nodes and pool members are configured, and When the state of an FQDN template node is changed (such as being forced offline or re-enabled from an offline state by user action).
Impact:
Such messages may confuse users who are attempting to monitor changes in the BIG-IP system by not providing clear information.
Workaround:
The state of an FQDN template pool member is generally determined by the state of the referenced FQDN template node. The FQDN template node contains the configuration used to resolve the FQDN name to the corresponding IP addresses. FQDN template pool members are not involved in this process, and generally only reflect the status of the name resolution process centered on the FQDN template node.
Examining log messages related to to the associated FQDN template node can inform the interpretation of the FQDN template pool member state.
For example, if an FQDN template node is forced offline, messages similar to the following will be logged indicating the FQDN template node state change, which is subsequently reflected in FQDN template pool member state changes:
notice mcpd[####]: 01070641:5: Node /Common/nodename address :: session status forced disabled.
notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status forced down. [ ] [ was unknown for #hr:##min:##sec ]
notice mcpd[####]: 01070641:5: Node /Common/nodename address :: session status enabled.
notice mcpd[####]: 01070638:5: Pool /Common/poolname member /Common/nodename:## monitor status unchecked. [ ] [ was unknown for #hr:##min:##sec ]
1341093-6 : MCPD returns configuration error when attaching a client SSL profile containing TLS 1.3 to a virtual server with HTTP/2 profile
Links to More Info: BT1341093
Component: Local Traffic Manager
Symptoms:
A configuration error is seen on BIG-IP as below:
01070734:3: Configuration error: In Virtual Server (/Common/vsname) an http2 profile with enforce-tls-requirements enabled is incompatible with client ssl profile '/Common/PORTAL-3119-cssl-tls13'; cipher ECDHE-RSA-AES128-GCM-SHA256 must be available
Conditions:
- Virtual Server with cipher rule that uses tlsv1_3 ciphers only
- Cipher group
- Client-SSL profile and HTTP/2 profile with enforce-tls-requirements enabled
Impact:
HTTP/2 and Client-SSL Profiles with TLS 1.3 is not supported.
Workaround:
None
1331037-6 : The message MCP message handling failed logs in TMM with FQDN nodes/pool members
Links to More Info: BT1331037
Component: TMOS
Symptoms:
When an FQDN node or pool member is created, one or more messages of the following form may appear in the TMM logs (/var/log/tmm*):
notice MCP message handling failed in 0x<hex value>
Conditions:
This may occur when creating an FQDN node or pool member on affected versions of BIG-IP.
Impact:
There is no known impact of this issue, besides the appearance of "notice" level messages in the TMM logs.
Workaround:
None
1327649-5 : Invalid certificate order within cert-chain associated to JWK configuration
Links to More Info: BT1327649
Component: TMOS
Symptoms:
An error occurs while validating the certificate and certificate chain in JSON web key configuration:
General error: 01071ca4:3: Invalid certificate order within cert-chain (/Common/mycert.crt) associated to JWK config (/Common/myjwk). in statement [SET TRANSACTION END]
Conditions:
Issue occurs when the certificate chain contains three or more certificates.
The proper order in issuing:
endpointchild
|
endpoint
|
intermediate
|
ca
Impact:
You are unable to create a policy with key configuration for OAuth when the certificate chain contains more than two certificates.
Workaround:
Note that there is no impact when the certificate chain order is valid and contains only two certificates in the chain.
1325649-4 : POST request with "Expect: 100-Continue" and HTTP::collect + HTTP::release is not being passed to pool member
Links to More Info: BT1325649
Component: Local Traffic Manager
Symptoms:
After upgrading from a BIG-IP version prior to v16.1.0 to BIG-IP v16.1.0 or later, one specific virtual-server is not working as expected and unable to forward the POST request towards the pool member.
Conditions:
1) Upgrade to v16.1.0 or later
2) Send a POST request from client with "Expect: 100-Continue".
3) Attach an irule using http::collect plus http::release to the Virtual Server.
Impact:
Cannot send POST requests from client to server
Workaround:
If ASM is provisioned, a transparent ASM policy can be a workaround.
1. Create a transparent ASM policy
At GUI Security >> Application Security: Security Policies
Click Create
Fill in following
Policy name: <unique policy Name>
Policy Type: Security(Default)
Policy Template: Fundamental (Default)
Leaning and Blocking
Enforcement Mode: Transparent
Save
Click the policy name created above, and modify following
Policy Building Learning Mode: Disabled
Save and Apply Policy
2. Enable Application Security Policy with the ASM Policy created above at the LTM Virtul Server Security configuration.
1322413-6 : After config sync, FQDN node status changes to Unknown/Unchecked on peer device
Links to More Info: BT1322413
Component: TMOS
Symptoms:
If changes are made to the FQDN node configuration, which has a node monitor configured, and the configuration is synced to a device group, ephemeral nodes generated from the FQDN node may show Availability as “unknown” and Monitor Status as “unchecked”.
Conditions:
This may occur on versions of BIG-IP with fixes for ID724824 and ID1006157, under the following conditions:
- BIG-IP systems are configured in a device group
- The device group is configured for Manual Sync (Full or Incremental)
- One or more FQDN nodes are configured with a node monitor (which could be the Default Node Monitor)
- A change is made to the configuration of the FQDN node
- A Full configuration sync is performed (by a Manual sync with the device group configured for a Full sync, as an automatic fallback/recovery action from a failed Incremental sync, or by using the “force-full-load-push” keyword):
tmsh run cm config-sync to-group example-group force-full-load-push
Impact:
The affected nodes will be displayed with an Availability as “unknown” and Monitor Status as “unchecked”.
Workaround:
To resolve this condition, remove and add the node monitor:
- Remove the node monitor from the FQDN node configuration (or from default-node-monitor):
tmsh mod ltm node example monitor none
(tmsh mod ltm default-node-monitor rule none)
- Sync this change to the device group (Incremental sync)
- Add the node monitor again to the FQDN node configuration (or to default-node-monitor):
tmsh mod ltm node example monitor my_node_monitor
(tmsh mod ltm default-node-monitor rule my_node_monitor)
- Sync this change to the device group (Incremental sync)
1312225-5 : System Integrity Status: Invalid with some Engineering Hotfixes
Links to More Info: BT1312225
Component: TMOS
Symptoms:
After installing an Engineering Hotfix,
when to attempt to verify the TPM system integrity with either the "tpm-status" or "tmsh run sys integrity status-check" command, the following error massage may appear:
System Integrity Status: Invalid
Running the "tpm-status" command with a Verbosity of 1 (or greater) reveals the following detail:
Verifying system integrity...
...
The signature in 17 is valid
Output wrong commandline parameters
cmdline is *ro ima_hash=sha256 mce=ignore_ce *
The pcr value in 17 is invalid.
...
System Integrity Status: Invalid
Conditions:
This may occur if the Engineering Hotfix contains changes which cause the following packages to be included in the Engineering Hotfix ISO:
-- sirr-tmos
-- tboot
But the Engineering Hotfix ISO does not contain the following package:
-- nash-initrd
The contents of the Engineering Hotfix ISO can be checked using the 'isoinfo' utility:
isoinfo -Rf -i <path/to/Hotfix-*.iso> | grep -e sirr -e tboot -e nash
Impact:
The TPM System Integrity Status is shown as Invalid.
This may incorrectly suggest that system integrity has been compromised.
1302101-5 : Sflow receiver flows are not established at TMM startup on sDAG platforms due to sDAG delay
Links to More Info: BT1302101
Component: TMOS
Symptoms:
No sflow data is sent.
Conditions:
Either configure a valid sflow receiver and restart the tmm or, configure a valid sflow receiver reachable via dynamic route on non sDAG platforms and restart the tmm.
Impact:
Sflow data is dropped.
Workaround:
Modify the receiver configuration (any field, including description). This allows triggering an update which will get sflow working.
1301317-5 : Update Check request using a proxy will fail if the proxy inserts a custom header
Links to More Info: BT1301317
Component: TMOS
Symptoms:
Update check fails.
Conditions:
-- Update check is checking for updates
-- A proxy is configured
-- The proxy inserts a header in its response
Impact:
Update check will fail.
Workaround:
Do not add any header in the proxy response.
1298225-4 : Avrd generates core when dcd becomes unavailable due to some reason
Links to More Info: BT1298225
Component: Application Visibility and Reporting
Symptoms:
Avrd core file generates.
Conditions:
When avrd is writing to the external device and that device is unavailable temporarily.
Impact:
Potential system impact.
Workaround:
None
1296925-5 : Unable to create two boot locations using the 'ALL' F5OS tenant image at default storage size
Links to More Info: BT1296925
Component: TMOS
Symptoms:
Configuration fails to load in second boot location created in F5OS tenant deployed with "ALL" image:
01071008:3: Provisioning failed with error 1 - 'Disk limit exceeded. 16188 MB are required to provision these modules, but only 16028 MB are available.'
Conditions:
-- Tenant deployed using the "ALL" image, with default "storage size"
-- Multiple modules provisioned (e.g. AFM+APM+ASM+LTM), or AFM provisioned
-- Create a second boot location
Impact:
This issue causes a configuration load failure in the second boot location.
Workaround:
Set the tenant(s) in question to configured state, increase the "storage size", then deploy the tenant once more.
1294141-8 : ASM Resources Reporting graph displays over 1000% CPU usage
Links to More Info: BT1294141
Component: Application Visibility and Reporting
Symptoms:
The ASM resources graph which is present under Security > Reporting > ASM Resources > CPU Utilization displays over 100% CPU usage when ASM is under load. The unit is percentage so it shouldn't exceed 100.
Conditions:
ASM should be under load and utilizing most of CPU cycles.
Impact:
Reporting graph displays incorrect percent value.
Workaround:
1. Backup /etc/avr/monpd/monp_asm_cpu_info_measures.cfg file.
2. Run the following:
$ sed -i 's|distinct time_stamp))|distinct time_stamp)*100)|g' /etc/avr/monpd/monp_asm_cpu_info_measures.cfg
3. To make those changes take affect, run the following command:
$ bigstart restart monpd
1290937-4 : 'contentWindow' of a dynamically genereated iframe becomes null
Component: Access Policy Manager
Symptoms:
A web application using iframes may not work/render as expected using Portal Access.
Conditions:
A web application attempts to configure 'contentWindow' for an iframe while the Portal Access feature is in use.
Impact:
Web Application through Portal Access may fails to work/render as expected
Workaround:
Workaround: Using a customized irule/ifile to return un-patched 'contentWindow' from cache-fm*.js file. ifile has modern cache-fm file.
when CLIENT_ACCEPTED {
ACCESS::restrict_irule_events disable
}
when HTTP_REQUEST {
if {
[HTTP::path] ends_with "/cache-fm-Modern.js"
} {
HTTP::respond 200 content [ifile get cachefmUploadIssueWorkaround]
}
}
1283721-5 : Vmtoolsd memory leak
Links to More Info: BT1283721
Component: TMOS
Symptoms:
The Vmtoolsd service leaks memory on VMware BIG-IP VE guests when the Disk Type is IDE or any disk type other than SCSI.
Conditions:
VMware BIG-IP VE guest
Disk type of IDE or another type that is not SCSI.
Impact:
The VE will eventually run out of memory.
Workaround:
1. Create the file /etc/vmware-tools/tools.conf and add the following to the file:
[guestinfo]
# disable scan for disk device info
diskinfo-report-device=false
2. Restart the vmtoolsd service:
systemctl restart --ignore-dependencies vmtoolsd.service
NB "guestinfo" must be in lower case. The workaround will not work if any letter is not lower case including the following "guestInfo" which was the reported workaround in https://github.com/vmware/open-vm-tools/issues/452
1282029-2 : Logging suspicious vector feature is not supported for tcp-flags-uncommon vector on upgrade to BIG-IP 17.1.0★
Links to More Info: BT1282029
Component: Advanced Firewall Manager
Symptoms:
The following log is observed in the console or /var/log/ltm logs:
Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector.
If this is after an upgrade it's likely the configuration will fail to load, which in turn will cause memory provisioning not to complete leaving the system provisioned for LTM only. This may leave insufficient 4KB page memory for the actual provisioning, for example if ASM is provisioned. The unit may show low memory symptoms such as oom killer activity, unresponsive management, cores due to daemon heartbeat timeout.
Conditions:
1. The Only Count Suspicious Events option is enabled or the attribute suspicious is true on TCP Push Flood vector.
2. Upgrade to BIG-IP 17.1.0.
Impact:
The following log is observed in the console or /var/log/ltm logs:
Logging 01071d5e:3: DOS attack data (tcp-flags-uncommon): Suspicious vector feature is not supported for tcp-flags-uncommon vector. in the console or /var/log/ltm
Failure to load configuration may be shown a few lines later:
emerg load_config_files[13166]: "/usr/bin/tmsh -n -g -a load sys config partitions all " - failed.
Workaround:
1. Confirm config:
grep "suspicious true" /config/bigip.conf
2. Backup bigip.conf:
cp /config/bigip.conf /config/bigip.conf.bak_ID1282029
3. Change affected configuration values:
sed -i 's/suspicious true/suspicious false/g' /config/bigip.conf
4. Reload MCPD per K13030. AFM comes back up with config loaded fine.
1281929-5 : The BIG-IP system's time zone database does not reflect recent changes implemented by Mexico in regard to DST
Links to More Info: BT1281929
Component: TMOS
Symptoms:
In fall of 2023, Mexico is cancelling DST (Daylight Saving Time) and is now on standard time indefinitely. The BIG-IP time zone database need an updated to reflect this change.
Conditions:
- BIG-IPs operated in Mexico.
Impact:
BIG-IP systems configured to use "America/Mexico" (or other applicable Mexican localities) will still apply DST. Hence, time will spring forward and backward on previously designated dates.
This will have no impact to application traffic handled by the BIG-IP system. However, logs, alerts, reports, cron jobs, and other will use incorrect time.
Workaround:
As a workaround, you can set the BIG-IP time zone to that of a different country with the same UTC offset and already not observing DST.
1280813-5 : 'Illegal URL' violation may trigger after upgrade
Links to More Info: BT1280813
Component: Application Security Manager
Symptoms:
Illegal URL violation is triggered for Allowed URL(s).
Conditions:
The conditions that trigger this issue post-upgrade are unknown at this time and the occurrence is rare.
Impact:
Requests get blocked with an 'Illegal URL' violation despite the it being defined as an Allowed URL because the URL object's Content-Profile reference does not get inserted and is missing in the MySQL database post-upgrade.
Workaround:
- Delete the problematic URL within the 'Security ›› Application Security : URLs : Allowed URLs : Allowed HTTP URLs' section in Configuration Utility.
- Re-create the URL again.
- Save the changes with the 'Apply Policy' task.
1271941-5 : Tomcat CPU utilization increased after upgrading to 15.1.6 and higher versions.★
Links to More Info: BT1271941
Component: TMOS
Symptoms:
Tomcat CPU utilization is high after upgrading to BIG-IP 15.1.6, java garbage collector is running high. Tomcat needs more memory after upgrading OpenJDK.
Conditions:
- Upgrade to BIG-IP 15.1.6 and higher versions.
Impact:
Tomcat server runs in an unstable state as CPU utilization is abnormal.
Workaround:
Increase the value of the system DB variable provision.tomcat.extramb and restart tomcat. This value is an amount in MB to add to the default tomcat heap size. The default heap size varies depending on provisioning from about 130 MB for LTM only to about 270 MB for ASM systems.
provision.tomcat.extramb is 0 by default.
One approach would be to increment by 50MB a time so as not to waste memory, while monitoring CPU use of tomcat to see if it drops. Less tan 2% would be a typical CPU use assuming the web interface isn't being used. Usually the CPU drops a lot with 50 or 100, sometimes 200 or slightly more might be required.
# tmsh modify sys db provision.tomcat.extramb value 50
# bigstart restart tomcat
tomcat is a Java process with user tomcat. You can find out the pid by running this in bash, with an example output shown beneath :
# top -bn 1 | grep tomcat
18923 tomcat 20 0 731444 404080 ...
The first column is the PID, and can be used in a top command so only tomcat is monitored. Using the example above the PID was 18923, so this top command will allow monitoring that process:
# top -p 18923
(use q to quit).
Of course after each tomcat restart the pid will change.
There are other possible issues that are sometimes mitigated by very high values of provision.restjavad.extramb, for example 500 or more, even without large config size. One example is ID1856513, but it is better to workaround that directly as shown in:
https://cdn.f5.com/product/bugtracker/ID1856513.html
1268373-9 : MRF flow tear down can fill up the hudq causing leaks
Links to More Info: BT1268373
Component: Service Provider
Symptoms:
TMM Memory leaks are observed when MRF flows were torn down at once and the hud queue was full.
Conditions:
When the message queue becomes full.
Impact:
TMM memory leak
Workaround:
None
1256757-4 : Suspect keymgmtd memory leak while using dynamic CRL.
Links to More Info: BT1256757
Component: TMOS
Symptoms:
keymagmtd's memory size steadily increases. Specifically, in the emdeviced memory size.
Conditions:
CRL validation is enabled
Impact:
keymgmtd might crash due to out of memory conditions.
Workaround:
Need to reboot the machine to reset the memory usage.
1231889-6 : Mismatched VLAN names (or VLANs in non-Common partitions) do not work properly BIG-IP tenants running on r2000 / r4000-series appliances
Links to More Info: BT1231889
Component: Local Traffic Manager
Symptoms:
When a VLAN configured in the tenant does not have the same name as the VLAN on in F5OS or the VLAN in the tenant is created in a partition other than "Common", VLANs may not pass traffic properly without manual configuration.
If any such VLANs exist, newly-configured VLANs may also exhibit this issue, even if the VLAN is in Common and has a name that matches the name in F5OS.
The system will have log messages similar to the following; these errors will still occur even once the workaround has been applied.
Feb 15 15:39:49 r4000-1.example.com err mcpd[19522]: 01070094:3: Referenced vlan (/Common/external) is hidden, does not exist, or is already on another instance.
Feb 15 15:39:49 r4000-1.example.com err chmand[19520]: 012a0003:3: hal_mcp_process_error: result_code=0x1070094 for result_operation=eom result_type=eom
Tenants running on an r2000 or r4000-series appliance need to know the VLAN<>interface associations, but the system is not able to populate this information when the VLAN is not in the Common partition. VLANs may not have any 'interfaces' referenced, or will have 'interfaces' that are not in-sync with the configuration on the F5OS host. For example:
R2000# show running-config interfaces interface LAG; show running-config vlans vlan 47
interfaces interface LAG
config type ieee8023adLag
config description ""
aggregation config lag-type LACP
aggregation config distribution-hash src-dst-ipport
aggregation switched-vlan config trunk-vlans [ 42 47 ]
!
vlans vlan 47
config vlan-id 47
config name vlan_47
!
R2000#
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240 # <-- interfaces is not listed
partition ottersPart
[...]
tag 47
}
[root@tenant:Active:Standalone] config #
[root@tenant:Active:Standalone] config # tmsh list net vlan /ottersPart/vlan_47
net vlan /ottersPart/vlan_47 {
dag-adjustment none
if-index 240
partition ottersPart
interfaces { # <-- configuration with a workaround in place
LAG {
tagged
}
}
[...]
tag 47
}
Conditions:
- BIG-IP tenant running on r2000 and r4000-series platforms
- VLANs moved to partitions other than "Common", or renamed so that the name does not match between hypervisor and tenant.
Impact:
Partitions other than the Common partition cannot have VLANs. VLANs created in other partitions will not be operational in the data path.
If such VLANs exist in the tenant, newly added VLANs will also exhibit this issue.
Workaround:
In the BIG-IP tenant, modify all VLAN objects to have 'interfaces' that align with the configuration on the host.
For example, for the VLAN 47 described above, the VLAN should be listed as being 'tagged' on the 'LAG' trunk:
tmsh modify net vlan /ottersPart/vlan_47 interfaces replace-all-with { LAG { tagged } }
tmsh save sys config
1225941-5 : OLH Default Values on Notification and Early Retransmit Settings
Links to More Info: BT1225941
Component: Global Traffic Manager (DNS)
Symptoms:
Online Help description of the 2 settings, Explicit Congestion Notification and Early Retransmit, has incorrect default values.
Conditions:
Online Help description of the 2 settings, Explicit Congestion Notification and Early Retransmit setting is disabled by default.
Impact:
NO
Workaround:
None
1196505-3 : BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
Links to More Info: BT1196505
Component: Local Traffic Manager
Symptoms:
BIG-IP might RST HTTP2 connection with [F5RST:mrhttp_proxy bad transition] when ASM is in use.
Conditions:
- HTTP2
- ASM provisioned and passing traffic
Impact:
Unexpected connection reset.
Workaround:
None
1183529-4 : OCSP request burst when cert-ldap authentication is enabled
Links to More Info: BT1183529
Component: TMOS
Symptoms:
Issue observed : When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.
Cause: webUI update default value is 5 seconds - updates every 5 seconds triggering SSL handshake which results in OCSP request bursts on the OCSP responder which may be lead to responder becoming irresponsive . Each request triggers two OCSP responder messages, leading to unnecessary traffic and causing performance issues in customer environments.
Conditions:
When Remote client cert-ldap authentication is enabled in Big-IP and ocsp-responder is configured.
WebUI makes an OCSP check for every HTTP request. This generates a lot of OCSP requests and If the OCSP server doesn't respond consistently, then the system is immediately redirected to the login page to re-authenticate.
Impact:
The OCSP (Online Certificate Status Protocol) Responder may experience service degradation or complete failure when subjected to excessive request volumes within compressed time intervals, particularly in environments where multiple systems share a single OCSP endpoint.
Workaround:
1. In /etc/httpd/conf.d/ssl.conf ,replace the below lines
SSLVerifyClient none
<LocationMatch "^[/][^/]+[/]">
SSLVerifyClient require
</LocationMatch>
with
SSLVerifyClient require
2. restart the httpd service - bigstart restart httpd
Note:The workaround does not survive a device reboot, an upgrade, or modification of any of the authentication and/or HTTPD configurations.
1168245-4 : Browser is intermittently unable to contact the BIG-IP device
Links to More Info: BT1168245
Component: TMOS
Symptoms:
When the coloradvisory probes running in the GUI do not receive a response from the BIG-IP device within 30 seconds, the GUI generates a pop-up message "Unable to contact BIG-IP device".
Conditions:
- MCPD is busy serving requests.
- Multiple browser connections to the BIG-IP.
- HTTP GET request from browser JS for /xui/update/configuration/alert/statusmenu/coloradvisory does not get a response within 30 seconds (default timeout).
Impact:
Browser frequently sees the BIG-IP as unavailable, causing interruptions to management of the device via the GUI.
Workaround:
1. Increase memory allocated to tomcat and restjavad.
tmsh modify sys db provision.tomcat.extramb value 512
tmsh modify sys db provision.restjavad.extramb value 2227
Note: these are very large values, not suitable for most systems. Increase tomcat heap size by 50MB a time, and restjavad by 200MB a time (value 600, 800, etc).
To have provision.restjavad.extramb values will be capped in effect to 384 + value of provision.extramb.
Both tomcat and restjavad need to be restarted to have changes take effect. restjavad will log startup info in ltm log.
2. Adjust the browser-based Javascript status update interval and timeout.
2.1. Remount /usr partition as read-write using the command:
mount -o remount,rw /usr
2.2. Edit the file /usr/local/www/xui/framework/scripts/variables.js, and modify the variables: time_updateXui to 8, and timeout_status to 60.
Default values are:
var time_updateXui = 5; // Seconds
var timeout_status = 30; //Timeout value for XUI status update
Change these values to:
var time_updateXui = 8; // Seconds
var timeout_status = 60; //Timeout value for XUI status update
2.3. Remount /usr partition back to read-only.
mount -o remount,ro /usr
3. Restart associated daemons:
bigstart restart httpd
bigstart restart tomcat
bigstart restart restjavad
1156149-7 : Early responses on standby may cause TMM to crash
Links to More Info: BT1156149
Component: Service Provider
Symptoms:
TMM cores with an early response and retransmit mechanism and has also happened during a failover event.
The following log entry can be found in /var/log/ltm
err tmm1[20721]: 01220001:3: TCL error: /Common/irule_diameter_e2_3868_be <MR_INGRESS> - Illegal argument (line 1) invoked from within "DIAMETER::is_request"
Conditions:
If the response of the request message reaches before the request on standby box.
Impact:
Traffic disrupted while tmm restarts.
Workaround:
None
1148053-2 : When client SSL profile has "cache-size 0" or "authenticate always", BIG-IP is unable to decrypt client-side traffic when using tcpdump with "--f5 ssl" method
Links to More Info: BT1148053
Component: Local Traffic Manager
Symptoms:
When client SSL profile has "cache-size 0" and/or "authenticate always", the SSL functionality fails to include SSL secrets in the F5 Ethernet Trailers (f5ethtrailer), thus not being able to decrypt client-side traffic.
Conditions:
- Client SSL profile has "cache-size 0"
- Client SSL profile has "authenticate always"
Impact:
The "cache-size 0" and the "authenticate always" options indicate that BIG-IP does not memorize any session, TMM disables session reuse. No renegotiation is provided even it is enabled.
No "session ID" should be present during the SSL/TLS handshake.
Workaround:
- For "cache-size 0" scenario, use client SSL profile default cache size
- For "authenticate always" scenario, use default value of "authenticate once"
- if changing config is not desired, iRule decryption method (K12783074) should work normally
1137521-3 : TLSv1.3 connections dropped when SSL Persistence is enabled
Links to More Info: BT1137521
Component: Local Traffic Manager
Symptoms:
A virtual server with an SSL persistence profile processing TLSv1.3 traffic may see dropped connections.
Conditions:
-- TLSv1.3 is enabled on ClientSSL profile on a virtual server.
-- SSL Persistence Mode is enabled on the virtual server.
Impact:
Traffic may be impacted as the optimizations due to SSL Persistence may not work for TLSv1.3
Workaround:
Do not enable SSL Persistence with TLSv1.3 on the affected versions.
1128429-9 : Rebooting one or more blades at different times may cause traffic imbalance results High CPU
Links to More Info: BT1128429
Component: Carrier-Grade NAT
Symptoms:
One or more TMMs are consuming more CPU cycles than the other TMMs. The increased CPU usage is caused by a significant number of internal TMM traffic redirections.
Conditions:
- LSN pools enabled.
- The sp-dag configured on the client-side and server-side VLANs (cmp-hash src-ip and cmp-hash dst-ip respectively).
Impact:
Increased TMM CPU usage on one or more TMMs.
Workaround:
- Set up an High Availability (HA) pair of VIPRIONs and make an active VIPRION cluster standby before doing any operation that involves the rebooting, insertion, or removal of one or more blades.
Or if the VIPRION is a stand-alone cluster:
- Stop all external traffic to the VIPRION before rebooting, inserting, or removing one or more blades.
- Restart or reboot all the blades at the same time from the primary, using the following "clsh" command:
"clsh reboot volume <NEW_VOLUME>" or "clsh bigstart restart".
1128033-6 : Neuron client constantly logs errors when TCAM database is full
Links to More Info: BT1128033
Component: Local Traffic Manager
Symptoms:
A database held in hardware (TCAM), shared between tenants, has a limit that is exceeded by software in tenants that adds and manages entries in the database.
Symptomatic logs on tenant:
in /var/log/ltm, repeating logs are recorded, following is an example:
err tmm[635]: 01010331:3: Neuron client neuron_client_pva_hwl failed with rule request submit(client connection is busy (has outstanding requests))
in /var/log/tmm, cycles of following group of logs are recorded:
notice neuron_client_negotiate: Neuron client connection established
notice [DDOS Neuron]Neuron daemon started
notice hudproxy_neuron_client_closed_cb: Neuron client connection terminated
notice [DDOS Neuron]Neuron daemon stopped
For F5OS host, in partition /var/F5/partitionX/log/velos.log repeating logs are recorded, following is an example:
tcam-manager[41]: priority="Err" version=1.0 msgid=0x6b01000000000007 msg="ERROR" MSG="TCAM processing Error(-5) executing:TCAM_INSERT for ruleno:0x20000000937"
In the log message, the msgid and ruleno can vary, but the Error(-5) is an indication of this issue.
Conditions:
The BIG-IP system with a rSeries r5xxx, r10xxx, r12xxx or has VELOS blades such as BX110.
The rSeries 2xxx, 4xxx and iSeries platforms are not affected.
Large configurations, on the order of high hundreds of virtual servers, are more likely to encounter issue.
Impact:
The neuron client software will restart and log repeatedly.
Inefficient use of TCAM database.
Workaround:
None
1126505-4 : HSB and switch pause frames impact data traffic
Links to More Info: BT1126505
Component: TMOS
Symptoms:
There are cases where the HSB and switch report pause frames on the HSB <-> switch interfaces. This can be seen in the switch interface stats:
name counters.rx_pause
---- -----------------
9.1 11522051
10.1 11392101
Conditions:
The iSeries platforms with an HSB and switch.
Impact:
There can be an impact on networking traffic.
Workaround:
There is no workaround for this issue. When this condition happens, the unit needs to be rebooted to clear the issue.
1120345-10 : Running tmsh load sys config verify can trigger high availability (HA) failover
Component: TMOS
Symptoms:
When running tmsh 'tmsh load sys config verify' on a config that contains both a high availability (HA) group and a traffic group referencing that high availability (HA) group, this will trigger a high availability (HA) fault and failover.
Conditions:
- Running 2 BIG-IP systems in a high availability (HA) pair
- Run tmsh 'load sys config verify' on a config with the following conditions:
- Config to be verified contains a high availability (HA) group
- Config to be verified also contains a traffic group referencing the high availability (HA) group
Impact:
HA fault and failover. The high availability (HA) pair will enter a degraded state.
Workaround:
No workaround currently known, but the failover fault can be cleared by running tmsh 'load sys config' on the system that had 'load sys config verify' run on it.
1100421-3 : HTTP/2 full-proxy virtual server uses wrong source MAC address and incorrect SNAT address selection
Links to More Info: BT1100421
Component: Local Traffic Manager
Symptoms:
When using an HTTP/2 full-proxy virtual server (with httprouter profile), server-side connections may exhibit the following issues:
- Egress packets use the system base MAC address instead of the configured masquerade MAC address.
- SNAT automap selects a non-floating self-IP instead of the expected floating self-IP.
- SNAT pool member selection does not prefer members matching the traffic-group of the virtual server.
This can cause MAC address flapping alerts on upstream network equipment and may disrupt traffic during HA failover events.
Conditions:
- Virtual server configured with the httprouter profile (HTTP/2 full-proxy).
- Masquerade MAC address configured on a traffic-group, and/or SNAT automap or SNAT pool in use with floating self-IPs.
Impact:
Server-side traffic uses incorrect source MAC address and may select non-floating SNAT addresses. Upstream network devices (such as switches or SDN controllers) may detect duplicate MAC/IP entries, causing traffic disruption. During HA failover, connections may not behave as expected because the correct traffic-group was not used.
Workaround:
None. Use a standard virtual server configuration without the httprouter profile as an alternative if HTTP/2 full-proxy is not required.
1093717-7 : BGP4 SNMP traps are not working.
Links to More Info: BT1093717
Component: TMOS
Symptoms:
BGP4 SNMP traps are not working.
Conditions:
--Perform any BGP related event and check for snmp traps.
Impact:
No BGP SNMP traps.
Workaround:
None
1091021-8 : The BIG-IP system may not take a fail-safe action when the bigd daemon becomes unresponsive.
Links to More Info: BT1091021
Component: Local Traffic Manager
Symptoms:
You may observe LTM monitors malfunctioning on your system.
For instance, you may notice some probes are not sent out on the network, and some monitored objects are showing the wrong status, and the fail-safe action is not triggered to restart the bigd process.
Conditions:
-- The bigd daemon consists of multiple processes (which you can determine by running "ps aux | grep bigd").
-- One or more of the processes (but not all of them) become disrupted for some reason and stop serving heartbeats to the sod daemon.
Under these conditions, sod will not take any fail-safe action and the affected bigd processes will continue running impaired, potentially indefinitely.
Impact:
If LTM monitoring (bigd process) encounters a problem and stop sending out monitors, the system may not detect this, and therefore will not restart the bigd process, leaving it in an impacted state.
Workaround:
If you suspect this issue is occurring in your system, you can resolve it by killing all bigd processes using the following command:
pgrep -f 'bigd\.[0-9]+' | xargs kill -9
However, this does not prevent the issue from manifesting again in the future if the cause for bigd's disruption occurs again.
Monitoring may become further disrupted as bigd restarts, and a failover may occur depending on your specific configuration.
Another work around is to set only one bigd if that is possible.
modify sys db bigd.numprocs value 1
If only a single bigd is available, sod will detect when it is down.
1090313-7 : Virtual server may remain in hardware SYN cookie mode longer than expected
Links to More Info: BT1090313
Component: TMOS
Symptoms:
A virtual server may remain in hardware SYN cookie mode longer than expected after the SYN flood attack has stopped. The TMSH 'show ltm virtual' command shows that the virtual has already exited SYN Cookie mode, but the SYN packets are still responded from hardware for a few minutes longer.
Conditions:
The problem is a result of a race condition in TMM, so the issue might show up intermittently.
Impact:
Discrepancy between the actual SYN Cookie mode and the reported SYN Cookie mode for a short period of time after a SYN flood attack.
Workaround:
Disable hardware SYN Cookie mode.
1087569-8 : Changing max header table size according HTTP2 profile value may cause stream/connection to terminate
Links to More Info: BT1087569
Component: Local Traffic Manager
Symptoms:
BIG-IP initializes HEADER_TABLE_SIZE to the profile value and thus when it exceeds 4K (RFC default), the receiver's header table size is still at the default value. Therefore, upon receiving header indexes which has been removed from its table, receiver sends GOAWAY (COMPRESSION_ERROR)
Conditions:
-- HTTP2 profile used in a virtual server
-- In the HTTP2 profile, 'Header Table Size' is set to a value greater than 4096
Impact:
Stream/connection is terminated with GOAWAY (COMPRESSION_ERROR)
Workaround:
Issue can be avoided by restoring the header-table-size value to the default of 4096
1086473-8 : BIG-IP resumes a TLS session on the client-side but then proceeds to do a full handshake
Links to More Info: BT1086473
Component: Local Traffic Manager
Symptoms:
When a client attempts to resume the TLS session using the Session-ID in its Client Hello from a previous session, the BIG-IP agrees by using the same Session-ID in its Server Hello, but then proceeds to perform a full handshake (Server Hello, Certificate, Server Key Exchange, Certificate Request, Server Hello Done) instead of an abbreviated handshake (Server Hello, Change Cipher Spec, Server Hello Done).
This is a violation of the TLS RFC.
Conditions:
- High availability (HA) pair of two BIG-IP units.
- LTM virtual server with a client-ssl profile.
- Mirroring enabled on the virtual server
Impact:
Client-side TLS session resumption not working.
Workaround:
Disable mirroring on the virtual server
1083405-8 : "Error connecting to named socket" from zrd
Links to More Info: BT1083405
Component: Global Traffic Manager (DNS)
Symptoms:
After an mcpd restart, zrd may not be able to re-establish a connection to named. This shows up in the /var/log/gtm file or in the GUI with a message similar to the following:
err zrd[27809]: 01150306:3: Error connecting to named socket 'Connection refused'.
(or)
err zrd[16198]: 01150306:3: Error connecting to named socket 'Connection timed out'.
Conditions:
After an mcpd restart
Impact:
Looking up or modifying zone records may fail.
Workaround:
Restart zrd and named
tmsh restart sys service zrd named
1077789-8 : System might become unresponsive after upgrading.★
Links to More Info: BT1077789
Component: TMOS
Symptoms:
After upgrading, the system encounters numerous issues:
-- Memory exhaustion (very low MemAvailable) with no particular process consuming excessive memory.
-- High CPU usage usually due to high kswapd or iowait activity
-- System is unresponsive, difficult to log in, slow to accept commands.
-- Provisioning is incomplete; there is a small amount of memory amount assigned to 'host' category.
Conditions:
The device is provisioned for more than LTM, typically with ASM or APM as well or instead, and needs more host memory than a pure LTM system.
-- The configuration loads in the previous release, but does not load successfully on the first boot into the release you are upgrading to.
-- Device is upgraded and the configuration is rolled forward.
-- There may be other conditions preventing the configuration from loading successfully after an upgrade.
Exact conditions that trigger this issue could be varied.
Failure to reactivate license, if needed, before upgrade could cause it, or an actual config issue. The config load error will be shown in the ltm log - search on 'emerg load'; the actual failure should be shown a few lines before the general warning about config load failure.
Impact:
-- System down, too little host (4KB page) memory to be stable.
-- Difficulty logging in over SSH might require serial console access.
Workaround:
Reboot to an unaffected, pre-upgrade volume.
-- If the system is responsive enough, use 'tmsh reboot volume <N>' or switchboot to select an unaffected volume.
-- If the system is completely unresponsive, physically powercycle a physical appliance or reboot a BIG-IP Virtual Edition (VE) from an applicable management panel, and then select an unaffected volume from the GRUB menu manually.
Note: This requires that you have console access, or even physical access to the BIG-IP device if you are unable to SSH in to the unit. On a physical device, a non-responsive system might require that you flip the power switch.
For more information, see:
-- K9296: Changing the default boot image location on VIPRION platforms :: https://support.f5.com/csp/article/K9296
-- K5658: Overview of the switchboot utility :: https://support.f5.com/csp/article/K5658
-- K10452: Overview of the GRUB 0.97 configuration file :: https://support.f5.com/csp/article/K10452.
1075045-7 : Proxy initialization failed, Defaulting to DENY, after applying additional profile to a virtual server
Links to More Info: BT1075045
Component: Local Traffic Manager
Symptoms:
Connections are reset when accessing a virtual server, with an F5 reset cause of "Port denied".
Messages in /var/log/ltm:
err tmm[<PID>]: 01010008:3: Proxy initialization failed for <virtual server>. Defaulting to DENY.
err tmm[<PID>]: 01010008:3: Listener config update failed for <virtual server>: ERR:ERR_MEM
Conditions:
-- A virtual server is configured with 23 hudchain elements, and an attempt is made to add one or more further elements, caused by a large number of attached profiles
-- The number of 'hudchain' elements does not directly correspond to the number of profiles, as some profiles add more than one hud chain element - particularly with APM, and some elements are enabled through other settings, such as compression with the http profile
-- To find the number of elements on a virtual server, set the db variable "tmm.verbose" to 'enable', add or remove a profile to/from the affected virtual server, then check the tmm log file for a line similar ot the following
-- A log line similar to the one below will be produced, which describes the hud chain elements ont the clientside flow, the proxy in the middle, and the elements on the serverside flow. The limitation of 24 includes all the elements in either the clientside or serverside flows, as well as the proxy in the middle (the proxy is counted on both the clientside and serverside flows)
<13> Oct 1 08:33:09 bigip1.local notice (L:/Common/test) hn :TCP -> SSL -> HTTP -> INFLATE -> DEFLATE -> SATELLITE -> <TCP> <- SATELLITE <- DEFLATE <- INFLATE <- HTTP <- SSL <- TCP:
In this case, the clientside flow has 6 elemnents plus the proxy, totalling 7, and the serverside flow also has 7. Either of those numbers can not exceed a fixed upper limit of 23.
Impact:
All connections to the virtual server are immediately reset.
Workaround:
Reduce the number of profiles applied to the virtual server.
1074285-5 : Apmd crashes while handling JWT tokens.
Links to More Info: BT1074285
Component: Access Policy Manager
Symptoms:
An apmd crash might occur while handling JWT tokens.
Conditions:
The payload has invalid JSON during authentication.
Impact:
BIG-IP authorization disrupted while apmd restarts.
Workaround:
None
1073673-6 : Prevent possible early exit from persist sync
Links to More Info: BT1073673
Component: Global Traffic Manager (DNS)
Symptoms:
When a new GTM is added to the Sync group, it takes a significant amount of time, and the newly added GTM won't become ready.
Conditions:
-- GTMs in a cluster with a large number of persist records
-- A new GTM device is added
Impact:
Clients of the BIG-IP GTM do not receive an answer, and application failures may occur.
Workaround:
None
1071021-5 : Some URLs such as *cdn.onenote.net configured in the Office 365 dynamic address space are not processed by APM
Links to More Info: BT1071021
Component: Access Policy Manager
Symptoms:
Dynamic address space parser not accepting few patterns(*cdn.example.net) which are added at the DNS address space field.
Conditions:
When the user configures Office 365 Dynamic Address Space with URLs formats like:
*-admin.sharepoint.com
*cdn.onenote.net
*-files.sharepoint.com
*-myfiles.sharepoint.com
Impact:
Due to the above pattern DNS relay proxy is not compatible with them.
Workaround:
None
1069977-4 : Repeated TMM SIGABRT during ips_flow_process_data
Links to More Info: BT1069977
Component: Protocol Inspection
Symptoms:
IPS consumes excessive CPU time processing GTP related context entries and this causes the tmm clock not to be updated, because of which SOD tries to restart the TMM.
Conditions:
-- Heavy GTP traffic, and request creation messages are sent without sending the response messages.
Impact:
Traffic disrupted while tmm restarts.
1064725-6 : CHMAN request for tag:19 as failed.
Links to More Info: BT1064725
Component: Local Traffic Manager
Symptoms:
The following log is seen in /var/log/ltm when a qkview is generated:
warning chmand[6307]: 012a0004:4: CHMAN request (from qkview) for tag:19 failed.
or when a tcpdump capture is started:
warning chmand[792]: 012a0004:4: CHMAN request (from bigpcapq33E5-24) for tag:19 failed
or when get a dossier from GUI/CLI:
warning chmand[4319]: 012a0004:4: CHMAN request (from get_dossier) for tag:19 failed
or when reboot:
warning chmand[8263]: 012a0004:4: CHMAN request (from mcpd) for tag:19 failed
warning chmand[8263]: 012a0004:4: CHMAN request (from DossierValidator) for tag:19 failed
warning chmand[8263]: 012a0004:4: CHMAN request (from LACPD_USER) for tag:19 failed
warning chmand[8263]: 012a0004:4: CHMAN request (from get_dossier) for tag:19 failed
Conditions:
Any one of the following:
-- Generate a qkview file from the GUI/CLI
-- Start a tcpdump command from the CLI
-- Get a dossier from GUI/CLI
-- Reboot
Impact:
No functional impact.
Workaround:
None
1062901-7 : The 'trap-source' and 'network' SNMP properties are ineffective, and SNMP traps may be sent from an unintended interface.
Links to More Info: BT1062901
Component: TMOS
Symptoms:
The BIG-IP system sends SNMP traps from an unintended interface (likely a TMM VLAN instead of the management port).
Conditions:
This issue occurs when the configuration:
- Includes a 'trap-source' property which matches the BIG-IP system's management IP address.
- Includes a SNMP trap destination which specifies 'mgmt' as the 'network' property.
- Includes routes to the aforementioned SNMP trap destination via both tmm and the management port (and the routes are such that the tmm one wins).
Impact:
Outgoing snmp traps fail to bind to the management IP address and to leave from the management port. Instead, they will bind to a self-ip matching TMM's route to the destination and leave from a TMM VLAN.
This can cause issues (or not work at all) depending on the configuration of the host system meant to receive the traps and/or of the surrounding network devices.
Workaround:
N/A
1060541-6 : Increase in bigd CPU utilization from 13.x when SSL/TLS session resumption is not utilized by HTTPS pool members due to Open SSL upgrade
Links to More Info: BT1060541
Component: Local Traffic Manager
Symptoms:
The bigd process uses more CPU than it did in previous versions when HTTPS monitors are used for pool members and the pool members do not resume the SSL/TLS session. This is due to upstream changes in the OpenSSL library.
Conditions:
-- HTTPS monitors.
-- Pool members that do not allow or are not using TLS/SSL session resumption.
Impact:
High CPU utilization.
Workaround:
Ensure the pool members have SSL/TLS session resumption enabled.
1052057-3 : FCS errors on switch/HSB interface impacts networking traffic
Links to More Info: BT1052057
Component: TMOS
Symptoms:
There are cases where the HSB and switch report FCS errors on the HSB <-> switch interfaces. This can be seen in the snmp_dot3_stat table:
name fcs_errors
---------- ----------
12.1 83233172
This can cause intermittent packet loss, leading to networking errors. This can be observed on the BIG-IP as pool monitor flapping, intermittent networking connectivity, etc.
Conditions:
All BIG‑IP platforms using HSB, including VIPRION B2250 .e.g., i‑Series and VIPRION blades.
Impact:
There is impact on networking traffic.
Workaround:
There is no workaround for this issue. When this condition occurs, the unit needs to be rebooted to clear the issue.
ID1239905 can be used to detect and mitigate this issue.
1044281-7 : In some cases, cpcfg does not trigger selinux relabel, leaving files unlabeled
Links to More Info: BT1044281
Component: TMOS
Symptoms:
Under certain circumstances, if a configuration is copied to a boot location that has has already been booted into, files restored by the UCS archive remain unlabeled. After booting to the target volume, the BIG-IP will not function and will have the status "INOPERATIVE".
Conditions:
-- APM is provisioned.
-- Performing a cpcfg copy to another volume.
Impact:
-- APM localdbmgr restarts, and fails to restore configuration from UCS archive
-- Spurious system permissions failures as a result of SELinux
Workaround:
After booting into the affected boot location, force an SELinux relabeling:
# touch /.autorelabel && reboot
1043985-7 : After editing an iRule, the execution order might change.
Links to More Info: BT1043985
Component: Local Traffic Manager
Symptoms:
After modification, the iRule execution order may change for events with the same priority.
Conditions:
Virtual server has an iRule that contains multiple events with the same priority.
Impact:
Unexpected behavior can cause virtual server malfunction.
Workaround:
Add desired priorities for iRules that contain the same event.
For example: when <event_name> priority nnn
1043141-1 : Misleading error 'Symmetric Unit Key decrypt failure - decrypt failure' when loading UCS from another BIG-IP
Links to More Info: K36822000, BT1043141
Component: TMOS
Symptoms:
Loading a UCS file from another BIG-IP results in an error message similar to:
"/usr/bin/tmsh -n -g -a load sys config partitions all platform-migrate" - failed. -- 010713d0:3: Symmetric Unit Key decrypt failure - decrypt failure
The error message is misleading as the issue is unrelated to master key decryption.
Conditions:
-- Loading a UCS archive from a different BIG-IP.
-- The UCS archive does not contain a ".unitkey" file.
-- The target system does have the correct master key value configured.
-- There is some other MCPD validation issue in the configuration.
Impact:
Platform migration fails with a misleading error message.
Workaround:
Once the issue has happened, you can either:
- Examine the LTM log file for other error messages from MCPD and then correct the configuration issue(s).
OR:
- Re-start MCPD.
For more information, refer K36822000.
1036289-4 : Signature ID not displayed in Attack Signature details
Links to More Info: BT1036289
Component: Application Security Manager
Symptoms:
Only signature name is displayed in the "Attack signature detected" violation details. The ID is not displayed in the details nor in the event log.
Conditions:
Reviewing attack signature details
Impact:
The attack signature ID is not displayed, which makes it more difficult to correlate which attack signature was encountered.
Workaround:
Click on Attack Signature Documentation to know the signature ID.
1036217-5 : Secondary blade restarts as a result of csyncd failing to sync files for a device group
Links to More Info: BT1036217
Component: TMOS
Symptoms:
Config sync fails on the secondary blade and mcpd restarts.
In /var/log/ltm:
remote transaction for device group /Common/<group> to commit id 45018 6946340995971480381 /Common/<dest> 0 failed with error 01070712:3: Caught configuration exception (0), Failed to sync files...
Configuration error: Configuration from primary failed validation: 01070712:3: Caught configuration exception (0), Failed to sync files..... failed validation with error 17237778.
Conditions:
-- A BIG-IP system with multiple blades configured for high availability
-- A device group with AFM objects in it
-- A config sync occurs
Other conditions necessary to trigger this issue are unknown.
Impact:
Config sync to the secondary blade fails and mcpd restarts on the secondary. The cluster primary blade has the correct configuration. This will impact incremental syncing to other peers in the device group.
Workaround:
None
1031945-7 : DNS cache configured and TMM is unresponsive in 'not ready' state indefinitely after TMM restart or reboot★
Links to More Info: BT1031945
Component: Global Traffic Manager (DNS)
Symptoms:
Clusterd reports "TMM not ready" right after "Active"
Following is an example:
Jun 23 18:21:14 slot2 notice sod[12345]: Active
Jun 23 18:21:14 slot2 notice clusterd[12345]:
Blade 2 turned Yellow: TMM not ready
All blades are showing 'unavailable'.
Conditions:
- Multiple DNS cache-resolver and/or net DNS resolver objects configured with names that are similar with only difference in letter case, for example, /Common/example-dns-cache and /Common/Example-DNS-cache
- Issue observed after rebooting or upgrading.
Impact:
The system remains inoperative.
Workaround:
- Remove one of the conflicting DNS cache-resolver and/or net DNS resolver objects.
or
- Rename one of the DNS cache-resolver and/or net DNS resolver objects to a name that does not result in a case-insensitive match to another DNS cache-resolver and/or net DNS resolver object name.
1027961-5 : Changes to an admin user's account properties may result in MCPD crash and failover
Links to More Info: BT1027961
Component: TMOS
Symptoms:
-- The mcpd process fails with a segmentation fault and restarts, leaving a core-dump file.
-- Active sessions in the Configuration Utility report "unable to contact BIG-IP device".
-- Various processes may record entries into the "ltm" log saying "Lost connection to mcpd."
Conditions:
-- Changes to properties of administrative user-login accounts are occurring.
-- A user account being changed has a current, active session in the Configuration Utility GUI.
Impact:
The failure and restart of mcpd will trigger a restart of many other processes, including the TMM daemons, thus interrupting network traffic handling. In high availability (HA) configurations, a failover will occur.
Workaround:
Before making changes to the account properties of an administrative user, where the changes affect the role, make certain that all GUI Configuration Utility sessions opened by that user are logged out.
1026781-7 : Standard HTTP monitor send strings have double CRLF appended
Links to More Info: BT1026781
Component: Local Traffic Manager
Symptoms:
Standard (bigd-based, not In-TMM) HTTP monitors have a double CRLF appended (\r\n\r\n) to the send string. This does not comply with RFC1945 section 5.1 which states requests must terminate with a single CRLF (\r\n). This non-compliant behavior can lead to unexpected results when probing servers.
Conditions:
Standard bigd (not In-TMM) HTTP monitors
Impact:
Servers probed by these non-RFC-compliant HTTP monitors may respond in an unexpected manner, resulting in false negative or false positive monitor results.
Workaround:
There are several workarounds:
1. If running 13.1.0 or later, switch monitoring from bigd-based to In-TMM. In-TMM monitors properly follow RFC1945 and will send only a single CRLF (\r\n)
2. Remain with bigd-based monitoring and configure probed servers to respond to double CRLF (\r\n\r\n) in a desired fashion
Depending on server configuration, a customized send string, even with the double CRLF, may still yield expected responses.
1022997-7 : TCP segments with an incorrect checksum are transmitted when the sock driver is used in AWS deployments (e.g., 1NIC)
Links to More Info: BT1022997
Component: TMOS
Symptoms:
Deployments on AWS that use the sock driver (1NIC, for example) transmit packets with bad checksums when TSO/GSO is required. This causes significant delays as TMM re-segments the packets with correct checksums for retransmission, and may cause some operations to time out (such as configsyncs of large configurations).
Conditions:
-- BIG-IP Virtual Edition (VE) using the sock driver on AWS (all 1NIC deployments use this)
-- TSO/GSO required due to MTU limitations on one or more VLANs
Impact:
-- Delayed packets.
-- Possible timeouts for some operations (configsyncs, for example).
Workaround:
Modify (or create, if not present) the file /config/tmm_init.tcl on the affected BIG-IP systems, and add the following line to it:
ndal force_sw_tcs off 1d0f:ec20
Then restart TMM:
bigstart restart tmm
Note: Restarting TMM will cause a failover (or an outage if there is no high availability (HA) peer available).
1022361-3 : Edge Client shows HTML encoding for non-English endpoint inspection message
Links to More Info: BT1022361
Component: Access Policy Manager
Symptoms:
HTML encoding characters are displayed in place of non-English characters, for example:
ó is displayed as ó
á is displayed as á
Conditions:
-- Modern access profile customization with Endpoint Inspection Message.
-- Using BIG-IP Edge Client on Microsoft Windows.
Impact:
HTML encoding displays instead of non-English characters in messages on Edge Client.
Workaround:
None
1021201-3 : JSON parser is not fully UTF-8 compliant
Links to More Info: BT1021201
Component: Application Security Manager
Symptoms:
JSON parser's character set does not include support for UTF-8 characters and that can result in 'Malformed JSON data' violation when processing requests containing those characters in JSON data.
Conditions:
Requests contain unsupported UTF-8 characters, such as emoji characters, in JSON payload.
Impact:
Requests are blocked.
Workaround:
The System Variable 'relax_unicode_in_json' can be utilized to ignore what JSON identifies as malformed characters when it encounters such unsupported characters.
(1) Enable 'relax_unicode_in_json' through CLI:
# /usr/share/ts/bin/add_del_internal add relax_unicode_in_json 1
(2) Restart ASM to ensure changes take effect:
# bigstart restart asm
1019641-7 : SCTP INIT_ACK not forwarded
Links to More Info: BT1019641
Component: Local Traffic Manager
Symptoms:
After SCTP link down/up (not physical IF link down up), SCTP session can't be established.
Conditions:
-- CMP forwarding enabled (source-port preserve-strict)
-- The BIG-IP system is encountering heavy traffic load
-- A connection is deleted from the connection table
Impact:
Flow state can become out of sync between TMMs
Workaround:
Once the problem occurs, execute "tmsh delete sys connection", and the SCTP session will be re-established.
1019261-7 : In-TMM HTTPS monitor with SSL Profile set to None does not use serverssl profile.
Links to More Info: BT1019261
Component: In-tmm monitors
Symptoms:
HTTPS monitors with SSL profile set to None (default) will not use the default ServerSSL profile of "serverssl" when In-TMM monitoring is enabled. Instead, another internal ServerSSL profile is used which has different values from "serverssl".
Conditions:
-- In-TMM monitoring is enabled
-- HTTPS monitor(s) with SSL profile field is set to the default of "None"
Impact:
The TLS settings for the HTTPS monitor monitor probes will not match those of the ServerSSL "serverssl" profile and may cause unexpected behavior such as utilizing TLS 1.3 (disabled by default in the "serverssl" profile) or random session IDs.
Workaround:
Specify a ServerSSL profile in every HTTPS monitor when using In-TMM monitoring.
Attaching the profile "serverssl" will result in the same behavior that SSL Profile "none" should provide, given that the "serverssl" profile should be the default.
1016273-3 : Standby TMM can core or cause incorrect mirroring during upgrade when session mirroring is enabled★
Links to More Info: BT1016273
Component: TMOS
Symptoms:
TMM crash occurs on the standby device which is on a lower version
Conditions:
1) Active and Standby are on different versions during upgrade
2) Session mirroring enabled
Impact:
Continuous TMM crash on standby.
Workaround:
Disable session mirroring during the upgrade process. This can be done by disabling sys db statemirror.mirrorsessions.
1014761-7 : [DNS][GUI] Not able to enable/disable pool member from pool member property page
Links to More Info: BT1014761
Component: Global Traffic Manager (DNS)
Symptoms:
You are unable to enable/disable DNS pool members from the pool member property page.
Conditions:
Making changes via the DNS pool member property page.
Impact:
You can submit the changes but the changes do not persist.
Workaround:
1. tmsh
or
2. enable/disable pool member from list of pool members instead of 'general properties' page
1013793-3 : Pool members may flap on BIG-IP VE with provision.1nic set to forced_enable
Links to More Info: BT1013793
Component: TMOS
Symptoms:
-- Pool members flap up and down
-- Network trace shows BIG-IP sending TCP SYN followed immediately by RST to pool members for traffic.
Conditions:
-- BIG-IP Virtual Edition (VE)
-- System using the 'sock' network driver, as can be determined by reviewing the output of the following command:
tmctl -d blade tmm/device_probed
-- The 'provision.1nic' DB key is set to 'forced_enable'. This is common in BIG-IP VE configurations running on Azure.
Impact:
-- Monitor statuses unreliable.
Workaround:
Use the following commands to work around this on a running system (the word 'command' is a required part of what should be typed in)
command iptables -t raw -I PREROUTING 1 -i eth+ -j DROP
command ip6tables -t raw -I PREROUTING 1 -i eth+ -j DROP
In addition to that, to ensure the workaround persists after TMM restarts or system reboots, add the following to /config/user_alert.conf:
alert tmm_id1013793_workaround "HA reports tmm ready" {
exec command="iptables -t raw -D PREROUTING -i eth+ -j DROP";
exec command="ip6tables -t raw -D PREROUTING -i eth+ -j DROP";
exec command="iptables -t raw -I PREROUTING 1 -i eth+ -j DROP";
exec command="ip6tables -t raw -I PREROUTING 1 -i eth+ -j DROP";
}
And then restart alertd by running:
tmsh restart sys service alertd
1009337-8 : LACP trunk down due to bcm56xxd send failure
Links to More Info: BT1009337
Component: TMOS
Symptoms:
Lacp reports trunk(s) down. lacpd reports having trouble writing to bcm56xxd over the unix domain socket /var/run/uds_bcm56xxd.
Conditions:
Not known at this time.
Impact:
An outage was observed.
Workaround:
Restart bcm56xxd, lacpd, and lldpd daemons.
1006449-6 : High CPU utilization and slow SNMP response after upgrade★
Links to More Info: BT1006449
Component: TMOS
Symptoms:
After upgrading BIG-IP to version 14.0.0 or later, CPU utilization increases and SNMP queries take an unusually long time to respond.
Conditions:
-- SNMP client repeatedly polls BIG-IP for OIDs in multiple tables over a short period of time.
-- Following an upgrade
Impact:
SNMP queries take an unusually long time to return data, and BIG-IP CPU utilization is higher.
Workaround:
To the file /config/snmp/bigipTrafficMgmt.conf, add one line with the following content:
cacheObj 16
This could be accomplished by executing the following command line from bash:
# echo "cacheObj 16" >> /config/snmp/bigipTrafficMgmt.conf
After the above config file has been modified and saved, the "snmpd" daemon must be restarted, using one of two command variants:
(on a BIG-IP appliance or VE system)
# bigstart restart snmpd
(on a a multi-slot VIPRION or vCMP guest)
# clsh bigstart restart snmpd
(However, this adjustment will be lost when the BIG-IP software is next upgraded.)
1004953-8 : HTTP does not fall back to HTTP/1.1★
Links to More Info: BT1004953
Component: Local Traffic Manager
Symptoms:
After upgrading, the BIG-IP system's HTTP profile no longer falls back to HTTP/1.1 if a client sends a corrupted URI.
Conditions:
-- Client sends a corrupted URI (for example a URI containing a space).
Impact:
The BIG-IP system treats the URI as an HTTP/0.9 request (as per RFC) and forwards only the first request line. In previous releases, the BIG-IP system treated the URI as a HTTP/1.1 request.
Workaround:
None.
1002969-8 : Csyncd can consume excessive CPU time★
Links to More Info: BT1002969
Component: Local Traffic Manager
Symptoms:
Following a configuration change or software upgrade, the "csyncd" process becomes always busy, consuming excessive CPU.
Conditions:
-- occurs on a multi-blade VIPRION chassis or VELOS tenant
-- may occur with or without vCMP
-- may occur after configuring F5 Telemetry Streaming, but may also occur in other circumstances
-- large numbers of files are contained in one or more of the directories being sync'ed between blades
Impact:
The overuse of CPU resources by "csyncd" may starve other control-plane processes. Handling of payload network traffic by the data plane is not directly affected.
Workaround:
To mitigate the processing load, identify which directory or directories contain excessive numbers of files being replicated between blades by "csyncd". If this replication is not absolutely needed (see below), such a directory can be removed from the set of directories being sync'ed.
For example: if there are too many files being generated in the "/run/pamcache" directory (same as "/var/run/pamcache"), remove this directory from the set being acted upon by "csyncd" by running the following commands to comment-out the associated lines in the configuration file.
[Note it is better to follow the more complete workaround from ID 1103369, https://cdn.f5.com/product/bugtracker/ID1103369.html ]
# clsh "cp /etc/csyncd.conf /etc/csyncd.conf.$(date +%Y%m%d_%H%M%S)"
# clsh "sed -i '/run\/pamcache/,+2s/^/#/' /etc/csyncd.conf"
# clsh "bigstart restart csyncd"
If the problem was observed soon after the installation of F5 Telemetry Streaming, the configuration can be adjusted to make csyncd ignore the related files in a subdirectory of "/var/config/rest/iapps". Run the following commands:
# clsh "cp /etc/csyncd.conf /etc/csyncd.conf.$(date +%Y%m%d_%H%M%S)"
# clsh "sed -i '/\/var\/config\/rest\/iapps/a \ \ \ \ \ \ \ \ ignore f5-telemetry' /etc/csyncd.conf"
# clsh "bigstart restart csyncd"
----
The impact of disabling replication for the pamcache folder is that in the event of a primary blade failover, the new primary blade would not be aware of the existing valid auth tokens, so the user (eg, a GUI user, or a REST script already in progress at the time of the failover) would need to authenticate again.
The impact of disabling replication for a folder under the /var/config/rest/iapps is that in the event of a primary blade failover, the new primary blade would not be aware of the iApps LX package, so the user would need to install the iApps LX package on the new primary blade.
1002345-7 : Transparent monitor does not work after upgrade★
Links to More Info: BT1002345
Component: In-tmm monitors
Symptoms:
Pool state changes from up to down following an upgrade.
Conditions:
A transparent monitor is configured to use the loopback address.
You are using BIG-IP Virtual Edition with a TAP interface handling linux host traffic.
Impact:
The pool is marked down.
Workaround:
None
★ This issue may cause the configuration to fail to load or may significantly impact system performance after upgrade
For additional support resources and technical documentation, see:
- The F5 Technical Support website: http://www.f5.com/support/
- The MyF5 website: https://my.f5.com/manage/s/
- The F5 DevCentral website: http://community.f5.com/