Release Notes : F5 SSL Orchestrator Release Notes version 15.0.0-6.0

Applies To:

Show Versions Show Versions

F5 SSL Orchestrator

  • 15.0.0
Release Notes
Original Publication Date: 03/21/2019 Updated Date: 11/03/2021

Summary:

This release note documents the version 6.0 release of F5 SSL Orchestrator.

Contents:

Platform support

SSL Orchestrator standalone base license is supported on the following platforms:

Platform name Platform ID
i2800 C120
i5800 C121
i10800 C122
i11800 Discovery Extreme C123
i15800 Endeavour D116
High Performance F5 SSL Orchestrator Virtual Edition (VE) options:
  • 8 CPU
  • 16 CPU
  • 16 GB RAM or greater
Z100
Note: SSL Orchestrator 6.0 does not work with BIG-IP versions prior to 15.0.0. Refer to the Installing and Upgrading SSL Orchestrator section for complete installation and upgrade information.
Note: You must always set a large management provisioning.
Note: The supported platform information applies to the most recent release version.

If SSL Orchestrator is the standalone base license installed on your system, you can add the following modules:

  • URLF Filtering (subscription)
  • IPI (subscription)
  • Network HSM
  • Access Policy Manager (APM)
Note: For more information about purchasing other module licenses, contact your F5 Sales representative.

F5 BIG-IP Local Traffic Manager (LTM) base license with SSL Orchestrator as an add-on is supported on any available iSeries, Bourne, and VIPRION platforms:

Platform name
2000, i2000
4000, i4000
5000, i5000
7000, i7000
10000, i10000
11000, i11000
12000 (Bourne)
i15000
Chassis: VPR-24XX, VPR-4800
Note: SSL Orchestrator 6.0 does not work with BIG-IP versions prior to 15.0.0. Refer to the Installing and Upgrading SSL Orchestrator section for complete installation and upgrade information.
Note: The supported platform information applies to the most recent release version.

Guided Configuration browser support

The Guided Configuration acts as the template for SSL Orchestrator. This release supports the following browsers and versions for use with Guided Configuration for SSL Orchestrator:

  • Microsoft Internet Explorer 11.x - Only 32-bit browsers are supported.
  • Mozilla Firefox 55.x
  • Google Chrome 61.x

User documentation for this release

For a comprehensive list of documentation that is relevant to this release, refer to the SSL Orchestrator Documentation page.

Features in SSL Orchestrator

F5 recommends you review the entire SSL Orchestrator release notes and setup guide prior to upgrading and configuring a deployment.

Note: The SSL Orchestrator upgrade workflow has changed. Reviewing the release note section on Installing and Upgrading SSL Orchestrator provides you with the details necessary for fulling any prerequisites and required steps that streamline the process.

Guided Configuration for SSL Orchestrator

Guided configuration is meant to guide you through setting up a particular use case on the SSL Orchestrator system. Each template requests minimal input and provides contextual help to assist users during setup. The current version of the Guided Configuration is displayed on the landing page. When a later upgrade becomes available, you can use the available link next to the version number to download it from downloads.f5.com then upload and install Guided Configuration for SSL Orchestrator on BIG-IP. Prior to installing and upgrading to the latest version of SSL Orchestrator, ensure that you read the release notes and setup guide for any prerequisites, task details, or troubleshooting and recovery steps during installation or upgrade.

Guided Configuration for SSL Orchestrator TLS 1.3 support

TLS 1.3 support is provided in Guided Configuration for SSL Orchestrator for inbound cases, both clientssl and serverssl, for enhanced performance and security. 

SSL Orchestrator Topologies

SSL Orchestrator configuration topologies define the type of traffic (transparent or explicit) and the direction of traffic flow (inbound or outbound) you wish to inspect. These deployment settings, which can be modified as needed without undeploying a configuration, are complemented by SSL management settings that assist you in defining inbound decryption and outbound decryption, setting your service types (such as HTTP, ICAP, Layer 2/Layer 3 inline, and receive-only/TAP services) and creating your service policies by defining per-request and per-session policy settings that can be managed through a virtual policy editor.

  • Outbound transparent proxy
  • Outbound explicit proxy
  • Inbound reverse proxy
  • Outbound layer 2
  • Inbound layer 2

 

The Existing Application topology is an inbound topology that allows you to create services, service chains, and security policies and attach them to an existing reverse proxy BIG-IP application.

Licensing and Provisioning for SSL Orchestrator Access Integration

Updated SSL Orchestrator Setup Utility with resource provisioning capabilities for licensed and unlicensed modules.

Multi-Layered Security

In order to solve specific security challenges, security administrators are accustomed to manually chaining together multiple point products, creating a bare-bones “security chain” consisting of multiple services. A typical chain may include components like Data Leak Prevention (DLP) scanners, Web Application Firewalls (WAF), Intrusion Prevention and Detection Systems (IPS and IDS), Malware Analysis tools, Secure Web Gateways (SWG), and more. In this model, all user sessions are provided the same level of security, as this “daisy chain” of services is hard-wired.

Virtual Clustered Multiprocessing (vCMP)

SSL Orchestrator supports Virtual Clustered Multiprocessing (vCMP) to provision and manage multiple hosted instances of the BIG-IP software on a single hardware platform.

Classification Engine

Classification Engine provides a rich set of methods based on context to dynamically determine how best to optimize the flow through the security stack. Context can minimally come from the following:

  • Source IP/subnet
  • Destination IP/subnet
  • IP intelligence category - Subscription
  • IP geolocation
  • Host and domain name
  • URL filtering category - Subscription
  • Destination port
  • Protocol

Other classifiers with greater flexibility are also available in the SSL Orchestrator VPE and with iRules to optimize and evaluate additional information.

Deployment Modes

SSL Orchestrator provides multiple deployment modes to address a variety of user needs. It can be deployed in any of the following modes:
  • Single device mode
  • High availability (HA) cluster mode

In addition, the system can detect and transparently handle an explicit proxy between SSL Orchestrator and the internet.

SSL Orchestrator Analytics

SSL Orchestrator analytics provide a customizable view into your SSL Orchestrator statistics, and enable you to flexibly choose the information you want to view based on specified ranges of time that you can select and adjust.

Statistics generated:

  • Hit Count
  • Client Bytes Out Per Second
  • Duration
  • Server Bytes In
  • Server Bytes In Per Second
  • Hit Count Per Second
  • Server Bytes Out Per Second
  • Client Bytes In
  • Client Bytes In Per Second
  • Client Bytes Out
  • Server Bytes Out

Statistics are generated for the following dimensions:

  • Client Cipher Names
  • Client Cipher Versions
  • Server Cipher Names
  • Server Cipher Versions
  • Virtual Servers
  • Site IP Addresses
  • Traffic Types
  • Decryption Status
  • Policy Actions
  • Service Paths
  • URL Categories
  • Applications
  • Application Families
  • IP Reputation
  • Destination Countries

L7 Application Protocol Settings

SSL Orchestrator supports L7 application protocol settings allowing you to select a protocol to listen for specific traffic (IMAP, SMTPS, POP3, FTP, HTTP) to be processed.

Fixes

ID number Description
623441 The SSL Orchestrator auto-picking interface does not work after creating a VLAN with an interface and creating a receive-only service using the created VLAN. Impact: The UI does not automatically change the interface that corresponds with the VLAN. Workaround/Fix: Refresh the screen or navigate to the previous screen before returning so that the screen with the VLAN information refreshes.
633152 SSL Intercept v1.5.0 cannot bypass SSLv2 connections, never match any classifier rules, and are always rejected. Impact: SSLv2 connections are rejected. Workaround/Fix: Upgrade SSL Intercept solution to v1.5.8 or later.
643870 SSL Orchestrator iApp 2.1 is not able to sustain TPS with a two box explicit proxy. Fix: No longer applicable to SSL Orchestrator 6.0.
646382 SSL Orchestrator TPS output status may dip if you configure a BIG-IP for a single box eproxy in SSL Orchestrator iApp configuration policies for URLF bypass.
750615 SSL Orchestrator cannot be deployed if the default administrator account is disabled. If you create a new administrator account and disable the default "admin" account and then try to deploy the configuration from SSL Orchestrator, the deployment fails with authentication error. Default "admin" user needs to be disabled and a new admin user needs to be created. Impact: The SSL Orchestrator configuration cannot be deployed. Fix: The system now properly reads the current administrator and then gets a new token for the user. Make sure you restart restnoded after creating a new administrator or the fix may not work.
753844 When upgrading SSL Orchestra with the new RPM, iRules and Security Policy settings are not being upgraded. Impact: Old iRules and Security Policy settings remain after the upgrade. Workaround/Fix: Redeploy the application after the upgrade. Update the iRules and Security Policy settings during the RPM upgrade.
754640 When modifying a deployed explicit proxy topology, the interception rule in_t throws javascript error. After successfully deploying an explicit proxy topology, navigating to the Interception Rule tab to select the <topology_name>_in_t interception rule for modifications, and then deploying, results in a deployment error. Impact: The user is unable to customize or modify the deployed interception rule topology. Workaround/Fix: The tagging issue was fixed by making sure only the -xp interception rule was needed to be tagged with an explicit proxy flag.
754679 Editing individual interception rules can cause unintentional changes to your configurations. Impact: When you deploy an outbound or inbound topology and then modify that individual interception rule, the interception rule change may cause the traffic to not be intercepted. Workaround: Disable strictness for the topology and modify the interception rule/virtual from the LTM menu. Workaround/Fix: The mask is now correctly carried forward and the same mask is applied as was provided in the topology flow.
754908 The HTTP header exceeds the maximum allowed size of 32768 bytes. Impact: If the HTTP profile values are not maintained, the Response content that is sending a large number of HTTP Headers, or very long HTTP headers, will not be allowed through to the client. Workaround/Fix: Modify the default values of the HTTP header count and size in the parent HTTP profile: tmsh modify ltm profile http http enforcement { max-header-count 128 max-header-size. 65536 }. Modify the default values of the HTTP header count and size in the parent HTTP profile.
755037 When there is an intermittent static state for any iAppLX application, it takes two minutes for the REST storage to get replicated on a secondary blade. Impact: You must enter the modification again. Workaround/Fix: This functions as designed and replication properly occurs every two minutes.
755199 Occasionally the SSL Orchestrator configuration screen does not load after a SSL Orchestrator RPM or TMOS upgrade. Impact: You cannot properly manage your SSL Orchestrator configuration. Workaround: From TMSH, run the following commands:
  1. Run bigstart restart restjavad.
  2. Wait 60 seconds.
  3. Run bigstart restart restnoded.

Fix: The code has been updated to detect this issue and automatically restart restnoded and now the SSL Orchestrator configuration screen properly loads after an upgrade.

755583 When redeploying multiple SSL Orchestrator topologies at the same time, the redeployment may fail when some of your configuration settings are not properly saved. This may occur when certain Interception Rules are missing or the System Setting redeployment fails on chassis blade. Impact: You cannot properly modify System Settings or the Interception Rule list. Workaround/Fix: Allow the proper concurrent deployment of multiple topologies so the data processing is accurate.
756386 SSL Orchestrator traffic may not flow to services in the configured service chain when HTTP/ICAP is put in front of other service like Inline L2, TAP, and other services. Impact: You cannot properly configure the service chain in the order you want. Workaround: Unlock the Security Policy application strictness and remove the L7 protocol check in the Service macro. Fix: Replace the L7 protocol check with an IP protocol check so that traffic can flow properly.
756412 After upgrading from 5.1 to 5.2, if you modify a deployed interception rule associated with an explicit proxy, an error will occur and the modification fails. Impact: You cannot customize the deployed interception rules associated with the explicit proxy topology. Workaround: Undeploy the failed topologies and recreate them. Fix: Ensured the authentication profile is set in the interception rule.
756631 The Cisco FTD service icon needs to be updated with the new Cisco icon. Impact: User will see an outdated Cisco icon. Fix. The Cisco icon has been updated.
757804 The gateway pool configuration for egress is lost when editing Interception Rules after deploying your SSL Orchestrator topology. In addition, your pool settings will also be unintentionally lost after any other changes are made and deployed. Workaround: Before redeploying, note the pool settings and apply them again after deployment. Fix: Code was modified to preserve the pool information before you edit your Interception Rule settings.
758164 When you deploy an inbound topology with a pool, the traffic may not reach the server. Impact: Traffic may not reach the server. Workaround: Disable strictness on the topology and enable the address translation from either the UI or TMSH. Fix: SSL Orchestrator detects and creates an interception rule with the translated address enable when an inbound topology is deployed with a pool attached.
758406 SSL Orchestrator re-deployment fails with a netmask error after editing a previously deployed inbound topology’s interception rule port number. Impact: The re-deployment fails. Workaround: When modifying any property on the interception rule screen, make sure to re-enter the destination mask. Fix: SSL Orchestrator now carries the topology destination address and mask to the interception rule, avoiding the error.
758629 If you deploy a UDP based topology for interception while defining an access policy in the workflow, that interception rule, which gets created, does not have a per request access policy attached to it which enforces SSL Orchestrator inspection via a security service. Impact: The UDP traffic is not inspected. Workaround: Disable the strictness of the deployed topology and from the UI or TMSH, attach the access profile and per-request profile to the created interception rule/virtual. Fix: The SSL Orchestrator module now detects the issue and applies the access profile and per request profile to the virtual.
758654 After adding a new service chain, or editing a previously created service chain, in an existing configuration, the new/updated service chain may not appear in the security policy rules as expected. Impact: The user cannot complete the desired configuration additions/updates. Workaround: Refresh the list in the security policy topology. Fix: A newly added or edited service chain now appears in the service chain list.
759303 SSL Orchestrator applications do not get cleaned up if there is mismatch between the APP block and the MCP objects. Impact: SSL Orchestrator shows an error and re-deployment fails. Workaround: Cleanup the MCP Objects related to SSL Orchestrator through the UI and cleanup all blocks by selecting iApps > Application Services > Applications LX . Fix: All SSL Orchestrator cleanup tasks for MCP objects and blocks are fixed.
759420 When URL Categorization is performed In BIG-IP SSL Orchestrator v14.x with v5.x Guided Configuration RPM, invalid URL categories may be inserted in the Access Policy and cause traffic to be blocked. Impact: Your configuration will not operate properly, blocking traffic where URL categorization is performed. Workaround/Fix: Remove all categorization where the category indicates Internet Watch Foundation. After upgrading to 6.0, remove the use of all URL categories where the category indicates Internet Watch Foundation. A valid list of categories can be found in the UI by clicking Access > Secure Web Gateway > URL Categories .
759421 When editing an Interception Rules configuration after upgrading from SSL Orchestrator v5.0 to v6.0, the L7 Profile/L7 Profile Type field is set to None and the XP Interception Rules field does not show SWG Access Profile and is also set to None. Impact: Redeploying Interception Rules without manually correcting these issues may result in a redeployment failure. Workaround/Fix: Upgrade SSL Orchestrator v5.0 to v5.3. Redeploy your configuration in v5.3. Then upgrade from v5.3 to v6.0.
759591 When adding an IP address validation in the edit scenario in the Interception Rules topology screen for Source, Destination Address, and Mask field results in a deployment failure. Impact: A deployment failure occurs if an IPv4 address is used for the IPv6 topology in the edit scenario. This is also applicable if an IPv6 address is used for the IPv4 topology in the edit scenario. Workaround/Fix: Redeploy using the same IP family of the topology in the Source, Destination Address, and Mask fields. In addition, an update added IP address validation in the edit scenario of Interception Rules for "the Source, Destination Address, and Mask fields.
759773 SSL Orchestrator fails to resolve the hostname in explicit proxy requests for HTTP sites. The client browser returns a 404 error: “Cannot resolve hostname '<website>' in explicit-proxy request”. In the logs, a message similar to the following example in the /var/log/ltm file will appear: "Rule /Common/sslo_explicit_sslo.app/sslo_explicit_sslo-xp <HTTP_PROXY_REQUEST>: Cannot resolve hostname 'f5.com' in explicit-proxy request". In addition, a local DNS server for the Local Forwarding NameServer(s) option in the DNS Settings section in SSL Orchestrator is configured on the SSL Orchestrator > Configuration > System Settings screen and the client’s explicit proxy requests involve HTTP traffic. Impact: Clients cannot access HTTP sites via the explicit proxy deployed on SSL Orchestrator. The HTTP-related client requests are not processed by the SSL Orchestrator even though HTTPS traffic works as expected. Workaround/Fix: Restart the named process manually by logging into the TMSH utility and restart the named process by typing the following command: restart/sys service named.
760427 When the URLDB is not provisioned, the SSL Orchestrator Security Policy Category Lookup (All) uses the wrong lookup type. Impact: Traffic may not correctly flow when there is no URLDB provisioned with the SSL Orchestrator Security Policy. Workaround/Fix: Disable strictness and manually change the value each time you modify the SSL Orchestrator Security Policy. The lookup-type now changes into the "process custom category only" while URLDB is not provisioned (which is consist with other Category Lookup conditions inside the SSL Orchestrator Security Policy).
760529 The SSL Orchestrator High Availability (HA) unit configuration is no longer available once you redeploy SSL Orchestrator. This occurs when you are using FC version RPM f5-iappslx-ssl-orchestrator-13.1.0-3.0.1809.5.noarch.rpm on BIGIP (platform: BIG-IP vCMP Guest [Z101], version: 13.1.1 Final 0.0.4, build: 0.0.4, edition: Final) and HA on VCMP standalone is supported in 3.0, HA on Chassis platform is not supported in 3.0, and HA on Chassis platform is not supported in 3.0. Impact: You are not able to reproduce on FC and official (f5-iappslx-ssl-orchestrator-13.1.0-3.0.260.noarch.rpm) versions and are not able to reproduce on an official (f5-iappslx-ssl-orchestrator-15.0.0-6.0.770.noarch) version. The SSL Orchestrator HA unit wipes its configuration when you attempt to redeploy. Workaround/Fix:
  1. Recovery Steps: Export SSL Orchestrator configuration from the active unit (SSL Orchestrator configuration is still present and active on this system at this time):
    1. On the Main tab, click SSL Orchestrator > Configuration.
    2. Click Settings > Export Configs .
    3. Select the radio button to the left of the most recent configuration on the list (highest “Generation”).
    4. Click Export and then click OK to confirm.
    5. Type a name for the JSON file in the field provided and click OK to save the file to your computer.
  2. Undeploy the SSL Orchestrator configuration from the active unit (this will negatively impact traffic processing capabilities):
    1. On the Main tab, click SSL Orchestrator > Configuration.
    2. Click Undeploy.
  3. Synchronize by pushing the configuration from the active unit to the standby unit (force/overwrite if prompted).
  4. Clear the REST storage on both BIG-IPs.
    Note: This will remove the SSL Orchestrator configuration from both units. Make sure you have the backup from step 1 before proceeding with this step.
    1. From the bash shell of the BIG-IP, type the following command: clear-rest-storage -l (lowercase L).
  5. Restart the restnoded and restjavad daemons on both BIG-IPs:
    1. From the bash shell of the BIG-IP, type the following commands:
      1. bigstart restart restnoded
      2. bigstart restart restjavad
  6. Synchronize by pushing the configuration from the active unit to the standby unit (force/overwrite if prompted).
  7. Reinstall the SSLO 3.0.1803.2 RPM on the active unit.
    Note: Do not attempt to load the Configuration screen before this step completes.
    1. On the Main tab, click SSL Orchestrator > Updates.
    2. Click Upload RPM from the Install Method list.
    3. Click Choose File and select the RPM from your local computer you want to install.
    4. Click Install.
  8. Import the SSL Orchestrator configuration on the active unit:
    1. On the Main tab, click SSL Orchestrator > Configuration
    2. Click Settings > Import Configs .
    3. Select File from the Import Configurations From list.
    4. Click Choose File and select the JSON export from your local computer (the same file that was saved in step 1).
    5. Click Update and then click OK to confirm.
  9. Deploy the SSL Orchestrator configuration:
    1. On the Main tab, click SSL Orchestrator > Configuration.
    2. Click Deploy.
760584

SSL Orchestrator deployment fails when there is no System Settings topology in the system. Error: "Deployment error: Deployment failed for f5-ssl-orchestrator-gc Error: transaction failed:01020036:3: The requested profile (/Common/undefined.app/undefined-cssl-vhf) was not found." Impact: You cannot properly modify the System Settings. Workaround: First deploy a topology and then change the System Settings. Fix: The System Settings no longer rely on the existence of a topology.

760760 The Deploy button is greyed out after you attempt to rearrange the order of the Rules in the Security Policy topology. Impact: The user cannot redeploy edited Rules in the Security Policy topology because the Deploy button remains greyed out. Workaround/Fix: The form name is now set so deploy, and thus the button, immediately gets notified about editing by drag and drop (and thus can be clicked and the edited Rules in the Security Policy topology can be redeployed).

Known issues

ID number Description
754936 SSL Orchestrator redeployment fails after a previous deployment failure in HA pair with the following error message: "Deployment failed for sslo_ob_TOPOLOGY_CREATE_sslo_outbound Error: transaction failed:01020066:3: The requested iRule (/Common/ssloGS_global.app/ssloGS_global-settings) already exists in partition Common". Impact: The user cannot properly redeploy their configuration. Workaround: In SSL Orchestrator 6.0, the "/Common/ssloGS_global.app/ssloGS_global-settings" iRule no longer exists in the system.
756965 If the BIG-IP version number in the new RPM name does not match the installed BIG-IP version, you cannot install a new RPM from the landing page. This occurs for all BIG-IP point releases where the BIG-IP version name in the SSL Orchestrator RPM does not match the installed BIG-IP version. Impact: The user is unable to upgrade SSL Orchestrator. Workaround:
  1. On the Main tab, click Apps > Package Management LX and click Import.
  2. Choose the new RPM and click Upload.

A compatibility check compares the BIG-IP version number with the installed SSL Orchestrator RPM name.

761116 If you modify any global settings or attempt to redeploy your SSL Orchestrator (5.0, 5.1, 5.2, and 5.3) configuration, some information may not fully update and may lead to information missing from some configurations or result in redeployment failure. Impact: Modifications may fail and lead to missing configuration information. Workaround: Undeploy the offending topologies and recreate the configuration details.
778865 Services after upgrade may become un-editable. When upgrading from 14.x to 15.0, there is a defect that may cause some services to be unavailable for modification. This affects existing configurations that use certain services. Only a few services are affected. After you click on an existing service, the defect will cause the page that is displayed to be blank and you will not be able to edit the attributes for that configured service. This occurs when navigating to the Configuration screen, clicking on an existing Topology, and then clicking on the Service entry on the top progress bar, or when you click Configuration > Services (just above the list of existing topologies) and then you click on a Service entry. This occurs where there is an existing configuration with services in SSL Orchestrator Guided Configuration 5.x (running on BIG-IP 14.x) and you have upgraded to BIG-IP 15.0 (which is shipped with Guided Configuration 6.0). Impact: You will not be able to modify some existing services that were previously configured.

Install and upgrade SSL Orchestrator

If you currently have a version of SSL Orchestrator prior to 5.0, or are installing SSL Orchestrator for the first time, refer to the complete installation and upgrade instructions for F5 SSL Orchestrator version 6.0 in the SSL Orchestrator: Setup version 15.0.0-6.0 guide.

If you currently have SSL Orchestrator 5.0 to 5.4 installed, click SSL Orchestration > Configuration > Upgrade SSL Orchestrator and follow the SSL Orchestrator RPM upgrade instructions to import the newest 6.0 version.

To install the F5 SSL Orchestrator 6.0 and you do not have an existing SSL Orchestrator add-on license, or a previous version of SSL Orchestrator installed, download the image from downloads.f5.com. For complete step-by-step installation instructions, see the BIG-IP Systems: Upgrading Software guide. The Guided Configuration for SSL Orchestrator 6.0 image is packaged with the F5 BIG-IP 15.0.0 image.

To upgrade to the newest version of SSL Orchestrator from a previous version prior to 5.0, or you have an existing add-on license, follow the recommended upgrade steps found in the SSL Orchestrator recommended upgrade procedure section in the SSL Orchestrator: Setup guide. This procedure walks you through the uninstallation and deletion of existing SSL Orchestrator applications and RPM before installing the new ISO image.

If you do not follow the recommended upgrade procedure to undeploy your previous SSL Orchestrator deployments, as well as uninstall your previous version of the application, further manual steps are required to reset your environment and undeploy the previous version. See the Upgrade from previous SSL Orchestrator versions using the recovery procedure task steps in the SSL Orchestrator: Setup guide based on the previous version of SSL Orchestrator you are upgrading from and your access to the BIG-IP Applications LX menu.

These upgrade steps are required since previously deployed SSL Orchestrator configurations cannot be rolled forward or imported into the new version of SSL Orchestrator. Following one of the recommended upgrade procedures will assist you in preparing your system for a clean installation.

Note: If you are implementing a high availability environment for SSL Orchestrator, review the Setting up SSL Orchestrator in a High Availability Environment section in the SSL Orchestrator: Setup guide for more detailed information.

Contacting F5

North America 1-888-882-7535 or (206) 272-6500
Outside North America, Universal Toll-Free +800 11 ASK 4 F5 or (800 11275 435)
Additional phone numbers Regional Offices
Web http://www.f5.com
Email support@f5.com

Additional resources

You can find additional support resources and technical documentation through a variety of sources.

F5 Support

https://f5.com/support :: Self-solve Options

Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology.

AskF5 Knowledge Base

https://support.f5.com/csp/home

The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source.

BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer

https://f5.com/support/tools/ihealth

BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration.

F5 DevCentral

https://devcentral.f5.com/

Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more.

Communications Preference Center

https://interact.f5.com/F5-Preference-Center.html

Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products.