Release Notes : F5 SSL Orchestrator Release Notes version 14.1.2-5.8

Applies To:

Show Versions Show Versions

F5 SSL Orchestrator

  • 14.1.2
Release Notes
Updated Date: 03/08/2021

Summary:

This release note documents the version 5.8 release of F5 SSL Orchestrator.

Note: If you are installing or upgrading to SSL Orchestrator 5.8, you must also install BIG-IP 14.1.2.6.

Contents:

Platform support

SSL Orchestrator standalone base license is supported on the following platforms:

Platform name Platform ID
i2800 C120
i4800 C115
i5800 C121
i7800 C118
i10800 C122
i11800 Discovery Extreme C123
i15800 Endeavour D116
High Performance F5 SSL Orchestrator Virtual Edition (VE) options:
  • 8 CPU
  • 16 CPU
Z100
Note: SSL Orchestrator 5.8 requires BIG-IP version 14.1.2.6. Refer to the Installing and Upgrading SSL Orchestrator section for complete installation and upgrade information.
Note: SSL Orchestrator standalone base license is not supported on VIPRION chassis.
Note: The supported platform information applies to the most recent release version.

If SSL Orchestrator is the standalone base license installed on your system, you can add the following modules:

  • URLF Filtering (subscription)
  • IPI (subscription)
  • Network HSM
  • Access Policy Manager (APM)
  • Secure Web Gateway (SWG)
  • Advanced Routing

 

F5 BIG-IP Local Traffic Manager (LTM) base license with SSL Orchestrator as an add-on is supported on any available iSeries and Bourne platforms (not including VIPRION):

Platform name
2000, i2000
4000, i4000
5000, i5000
7000, i7000
10000, i10000
11000, i11000
12000 (Bourne)
i15000
Note: SSL Orchestrator 5.8 requires BIG-IP version 14.1.2.6. Refer to the Installing and Upgrading SSL Orchestrator section for complete installation and upgrade information.
Note: The supported platform information applies to the most recent release version.

Guided Configuration browser support

The Guided Configuration acts as the template for SSL Orchestrator. This release supports the following browsers and versions for use with Guided Configuration for SSL Orchestrator:

  • Microsoft Internet Explorer 11.x - Only 32-bit browsers are supported.
  • Mozilla Firefox 55.x
  • Google Chrome 61.x

User documentation for this release

For a comprehensive list of documentation that is relevant to this release, refer to the SSL Orchestrator Documentation page.

Features in SSL Orchestrator

F5 recommends you review the entire SSL Orchestrator release notes and setup guide prior to upgrading and configuring a deployment.

Note: The SSL Orchestrator upgrade workflow has changed. Reviewing the release note section on Installing and Upgrading SSL Orchestrator provides you with the details necessary for fulling any prerequisites and required steps that streamline the process.

Guided Configuration for SSL Orchestrator

Guided configuration is meant to guide you through setting up a particular use case on the SSL Orchestrator system. Each template requests minimal input and provides contextual help to assist users during setup. The current version of the Guided Configuration is displayed on the landing page. When a later upgrade becomes available, you can use the available link next to the version number to download it from downloads.f5.com then upload and install Guided Configuration for SSL Orchestrator on BIG-IP. Prior to installing and upgrading to the latest version of SSL Orchestrator, ensure that you read the release notes and setup guide for any prerequisites, task details, or troubleshooting and recovery steps during installation or upgrade.

SSL Orchestrator Topologies

SSL Orchestrator configuration topologies define the type of traffic (transparent or explicit) and the direction of traffic flow (inbound or outbound) you wish to inspect. These deployment settings, which can be modified as needed without undeploying a configuration, are complemented by SSL management settings that assist you in defining inbound decryption and outbound decryption, setting your service types (such as HTTP, ICAP, Layer 2/Layer 3 inline, and receive-only/TAP services) and creating your service policies by defining per-request and per-session policy settings that can be managed through a virtual policy editor.

  • Outbound transparent proxy
  • Outbound explicit proxy
  • Inbound reverse proxy
  • Outbound layer 2
  • Inbound layer 2

Licensing and Provisioning for SSL Orchestrator Access Integration

Updated SSL Orchestrator Setup Utility with resource provisioning capabilities for licensed and unlicensed modules.

Multi-Layered Security

In order to solve specific security challenges, security administrators are accustomed to manually chaining together multiple point products, creating a bare-bones “security chain” consisting of multiple services. A typical chain may include components like Data Leak Prevention (DLP) scanners, Web Application Firewalls (WAF), Intrusion Prevention and Detection Systems (IPS and IDS), Malware Analysis tools, Secure Web Gateways (SWG), and more. In this model, all user sessions are provided the same level of security, as this “daisy chain” of services is hard-wired.

Virtual Clustered Multiprocessing (vCMP)

SSL Orchestrator supports Virtual Clustered Multiprocessing (vCMP) to provision and manage multiple hosted instances of the BIG-IP software on a single hardware platform.

Classification Engine

Classification Engine provides a rich set of methods based on context to dynamically determine how best to optimize the flow through the security stack. Context can minimally come from the following:

  • Source IP/subnet
  • Destination IP/subnet
  • IP intelligence category - Subscription
  • IP geolocation
  • Host and domain name
  • URL filtering category - Subscription
  • Destination port
  • Protocol

Other classifiers with greater flexibility are also available in the SSL Orchestrator VPE and with iRules to optimize and evaluate additional information.

Deployment Modes

SSL Orchestrator provides multiple deployment modes to address a variety of user needs. It can be deployed in any of the following modes:
  • Single device mode
  • High availability (HA) active/standby mode

In addition, the system can detect and transparently handle an explicit proxy between SSL Orchestrator and the internet.

SSL Orchestrator Analytics

SSL Orchestrator analytics provide a customizable view into your SSL Orchestrator statistics, and enable you to flexibly choose the information you want to view based on specified ranges of time that you can select and adjust.

Statistics generated:

  • Hit Count
  • Client Bytes Out Per Second
  • Duration
  • Server Bytes In
  • Server Bytes In Per Second
  • Hit Count Per Second
  • Server Bytes Out Per Second
  • Client Bytes In
  • Client Bytes In Per Second
  • Client Bytes Out
  • Server Bytes Out

Statistics are generated for the following dimensions:

  • Client Cipher Names
  • Client Cipher Versions
  • Server Cipher Names
  • Server Cipher Versions
  • Virtual Servers
  • Site IP Addresses
  • Traffic Types
  • Decryption Status
  • Policy Actions
  • Service Paths
  • URL Categories
  • Applications
  • Application Families
  • IP Reputation
  • Destination Countries

L7 Application Protocol Settings

SSL Orchestrator supports L7 application protocol settings allowing you to select a protocol to listen for specific traffic (IMAP, SMTPS, POP3, FTP, HTTP) to be processed.

Fixes

Note: The following bugs are applicable to the SSL Orchestrator iAppLX (UI and BIG-IP configuration automation) and not BIG-IP (SSL Orchestrator traffic processing). Refer to the corresponding BIG-IP release notes for further detail about your version.

ID number Description
750663 Changes made in SSL Orchestrator Interception Rules may be overwritten, without warning, after the redeployment of the topology. Fix: A warning message is now displayed on the topology list page indicating that changes made in Interception Rules may be overwritten after the redeployment of topology.
760427 When the URLDB is not provisioned, the SSL Orchestrator Security Policy Category Lookup (All) uses the wrong lookup type. Thus, traffic may not correctly flow when there is no URLDB provisioned with the SSL Orchestrator Security Policy. Workaround: Disable strictness and manually change the value each time you modify the SSL Orchestrator Security Policy. The lookup-type now changes into the "process custom category only" while URLDB is not provisioned (which is consistent with other Category Lookup conditions inside the SSL Orchestrator Security Policy). Fix: The SSL Orchestrator Security Policy Category Lookup (All) uses the correct lookup type.
778741 When you have an explicit proxy with a L3 inline service deployed for the first time it may result in a throughput reduction of up to 18%. The percentage of reduction may vary depending on your current platform. Workaround: Enter non-functional changes to your configuration (for example, modify a description and then redeploy your configuration). Fix: Change the default parent profile to f5-tcp-lan and f5-tcp-wan respectively for both the client-side and the server-side (do not make any changes to TCP profile attributes).
788481 When the load balancing method is Ratio and the "Port remap" feature is enabled, SSL Orchestrator does not load balance between the inline service pool members. Fix: The inline service pool naming is fixed and traffic is passing through both services when the port remap is enabled.
825065 Changes made in SSL Orchestrator Interception Rules may be overwritten after a redeployment of the topology. Fix: SSL Orchestrator now provides the ability to see configuration differences between created and non-strict modified changes.
835533 After upgrading the SSL Orchestrator RPM, the installed RPM version on the dashboard landing page is incorrect. This may occur after upgrading a high availability (HA) configuration and the gossip status shows "UNPAIRED" (documented in bug ID 835517) and you follow the recovery steps outlined in bug ID 835517. Fix: After upgrading the SSL Orchestrator RPM, the correct installed RPM version appears on the dashboard landing page after changes were made to read the RPM version from the rest database.
851437 In SSL Orchestrator, when a deployment is triggered while the high availability (HA) infrastructure replication mechanism is not in a good state, the configuration revisions may differ and the data may be out of sync in both HA devices causing the deployment to fail. Fix: The fix ensures to sync the configuration revisions and data when they are out of sync. The HA infrastructure replication mechanism should, however, be in a good state.
885369 In SSL Orchestrator, after Interception Rules are created for selected L7 protocols on topology deployment and then removed prior to redeployment of the topology, the Interception Rules for these L7 protocols are not removed. Fix: Interception Rules for L7 protocols will be removed after the topology redeployment.
888797 When modifying the SSL Orchestrator security policy rule with the 'Category Lookup (All)' condition, if that rule has the 'Categorization' macro injected, then the policy may be incorrectly generated after the modification. A potential traffic break, with the incorrect policy, may be generated. Fix: The policy now builds properly.
890645 Rebooting the BIG-IP system or restnoded leads to the “existing application” topology disappearing from the SSL Orchestrator topology list and there is nowhere to retrieve the configuration. Fix: Rebooting SSL Orchestrator no longer removes the topology.
897117 When editing an existing topology in SSL Orchestrator Interception Rule, no indication of what has been modified is provided and changes may be overwritten after the redeployment of the topology. Fix: A warning message is now displayed on the Interception Rule and summary page if changes made may be overwritten after the redeployment of topology.
905141 In SSL Orchestrator, deploying a custom inbound topology in Advanced Mode may not attach the Security Policy to the virtual server. This issue occurs when you toggle between 'None' and any other value in the Access Profiles dropdown in the Interception Rules step of the topology workflow. Fix: When toggling between values in the Access Profiles dropdown, the correct Security Policy is now attached to the virtual server.
906329 In SSL Orchestrator, the strict-update (strictness) option icon is shown for Existing Application topologies in the topology tab view. However, strict-update is not applicable for Existing Application topologies and should not be shown. The strictness icon should be available only in the Services and Security Policies tab view for services and security policies created as part of an Existing Application topology. Fix: The strictness icon is no longer shown for Existing Application topologies in the topology tab view.
906953 After upgrading SSL Orchestrator from 14.1, Rules are missing for all security policies. When upgrading with an Existing Application topology, the upgrade sequence fails and the configuration is not upgraded, causing additional issues and may result in a deployment failure. Fix: When upgrading with an Existing Application topology, the upgrade sequence now succeeds with the configuration properly upgraded.
909657 In SSL Orchestrator, after redeploying to remove protocols in Interception Rules (IR), a 'no associated app service found' message echos in restnoded.log Modifying the protocol-specific IR from the IR tab results in the following error messages: -- severe: [Auditor] no associated app service found sslo_ob_INTERCEPTION_RULE_MODIFY_sslo_outbound-smtp25-4device undefined. -- severe: [Auditor] no associated app service found sslo_ob_INTERCEPTION_RULE_MODIFY_sslo_outbound-ftp-4device undefined. This error occurs in the following scenario: 1. Deploy L3 outbound with all protocols (FTP, IMAP, POP3, SMTP) under IR. 2. In the IR mini-flow, modify the port for one of the protocols (such as -ftp or -imap), and deploy. 3. The 'no associated app service found' messages begin to appear in /var/log/restnoded/restnoded.log. 4. Redeploy to remove all protocols. 5. The messages continue to appear, even when the IR has been deleted. This message continues to loop, obscuring other important messages. The messages appear to be severe even though there is no impact to the system. Fix: This log message no longer appears in a continuous loop for Interception Rules.

Known issues

ID Number Description
881221

The SSL Orchestrator configuration redeployment in high availability (HA) environment fails when management ports are unplugged. Even though uncommon, when redeploying an SSL Orchestrator configuration when the HA environment is out of sync for a considerable amount of time, the redeployment fails. Workaround: The workaround is required if you want to make changes in the SSL Orchestrator configuration and redeploy them. Before redeploying an SSL Orchestrator configuration, perform the following workaround steps: (1) Run the following command to get the iApp block IDs for the SSL Orchestrator configuration you want to redeploy: restcurl /shared/iapp/blocks. (2) Run the following command to patch the block: restcurl -s -u admin -X PATCH "/shared/iapp/blocks/<>" -d '{ configProcessorAffinity: { processorPolicy: "LOCAL", affinityProcessorReference: { link: "https://localhost/mgmt/shared/iapp/processors/affinity/local" } } }'. (3) Verify if the HA configuration is in a good state. (4) Proceed with the redeployment.

903885

The SSL Orchestrator configuration does not appear on the high availability (HA) standby device when the configuration is pushed from the active device. In a HA group, when the Active peer is forced to standby, the alternate active HA peer will display an empty SSL Orchestrator configuration page. The SSL Orchestrator traffic is correctly processed by the new active device, but the related configuration is not available in the web user interface. With BIG-IP devices configured in an HA group, forcing one of the devices to standby mode, the new active device shows an empty SSL Orchestrator configuration page. The SSL Orchestrator configuration in the active device's web user interface becomes unusable (empty). Workaround: Run the following commands in the active device's terminal to address the issue: (1) Delete HA sync (gossip) group device references in the REST framework: restcurl -X DELETE shared/resolver/device-groups/tm-shared-all-big-ips/devices. (2) Force REST gossip/sync to update device references: restcurl -X POST -d '{}' tm/shared/bigip-failover-state.

Install and upgrade SSL Orchestrator

Note: Due to release scheduling and feature coordination, the following upgrade combinations are not supported after upgrading to SSL Orchestrator version 5.8:

SSL Orchestrator versions
6.0, 6.1, 6.2, 6.3, 6.4
7.0, 7.1, 7.2

Note: If you are installing or upgrading to SSL Orchestrator 5.8, you must also install BIG-IP 14.1.2.6. Likewise, if you are installing BIG-IP 14.1.2.6 and you plan to use SSL Orchestrator, you must also install or upgrade to SSL Orchestrator 5.8.

If you currently have a version of SSL Orchestrator prior to 5.0, or are installing SSL Orchestrator for the first time, refer to the complete installation and upgrade instructions for F5 SSL Orchestrator version 5.8 in the SSL Orchestrator: Setup version 14.1.0-5.0 guide.

If you currently have SSL Orchestrator 5.0 through 5.7 installed, click SSL Orchestration > Configuration > Upgrade SSL Orchestrator and follow the SSL Orchestrator RPM upgrade instructions to import the newest 5.8 version.

To install the F5 SSL Orchestrator 5.8 and you do not have an existing SSL Orchestrator add-on license, or a previous version of SSL Orchestrator installed, download the image from downloads.f5.com. For complete step-by-step installation instructions, see the BIG-IP Systems: Upgrading Software guide. 

To upgrade to the newest version of SSL Orchestrator from a previous version prior to 5.0, or you have an existing add-on license, follow the recommended upgrade steps found in the SSL Orchestrator recommended upgrade procedure section in the SSL Orchestrator: Setup guide. This procedure walks you through the uninstallation and deletion of existing SSL Orchestrator applications and RPM before installing the new ISO image.

If you do not follow the recommended upgrade procedure to undeploy your previous SSL Orchestrator deployments, as well as uninstall your previous version of the application, further manual steps are required to reset your environment and undeploy the previous version. See the Upgrade from previous SSL Orchestrator versions using the recovery procedure task steps in the SSL Orchestrator: Setup guide based on the previous version of SSL Orchestrator you are upgrading from and your access to the BIG-IP Applications LX menu.

These upgrade steps are required since previously deployed SSL Orchestrator configurations cannot be rolled forward or imported into the new version of SSL Orchestrator. Following one of the recommended upgrade procedures will assist you in preparing your system for a clean installation.

Note: If you are implementing a high availability environment for SSL Orchestrator, review the Setting up SSL Orchestrator in a High Availability Environment section in the SSL Orchestrator: Setup guide for more detailed information.

Contacting F5

North America 1-888-882-7535 or (206) 272-6500
Outside North America, Universal Toll-Free +800 11 ASK 4 F5 or (800 11275 435)
Additional phone numbers Regional Offices
Web http://www.f5.com
Email support@f5.com

Additional resources

You can find additional support resources and technical documentation through a variety of sources.

F5 Support

https://f5.com/support :: Self-solve Options

Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology.

AskF5 Knowledge Base

https://support.f5.com/csp/home

The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source.

BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer

https://f5.com/support/tools/ihealth

BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration.

F5 DevCentral

https://devcentral.f5.com/

Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more.

Communications Preference Center

https://interact.f5.com/F5-Preference-Center.html

Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products.