Applies To:
Show VersionsF5 SSL Orchestrator
- 15.1.0
Summary:
This release note documents the version 7.0 release of F5 SSL Orchestrator.
Contents:
- Platform support
- Guided Configuration browser support
- User documentation for this release
- Features in SSL Orchestrator
- Fixes
- Known issues
- Install and upgrade SSL Orchestrator
- Contacting F5
- Legal notices
Platform support
SSL Orchestrator standalone base license is supported on the following platforms:
Platform name | Platform ID |
---|---|
i2800 | C120 |
i4800 | C115 |
i5800 | C121 |
i7800 | C118 |
i10800 | C122 |
i11800 Discovery Extreme | C123 |
i15800 Endeavour | D116 |
High Performance F5 SSL Orchestrator Virtual Edition (VE) options:
|
Z100 |
Chassis name |
Platform ID |
---|---|
VPR-22XX, VPR-24XX, VPR-4480, VPR-4800 | --- |
C2100 | --- |
C2200 | D114 |
C4400 | J100 |
If SSL Orchestrator is the standalone base license installed on your system, you can add the following modules:
- URLF Filtering (subscription)
- IPI (subscription)
- Network HSM
- Access Policy Manager (APM)
- Secure Web Gateway (SWG)
- Advanced Routing
F5 BIG-IP Local Traffic Manager (LTM) base license with SSL Orchestrator as an add-on is supported on any available iSeries, Bourne, and VIPRION platforms:
Platform name |
---|
2000, i2000 |
4000, i4000 |
5000, i5000 |
7000, i7000 |
10000, i10000 |
11000, i11000 |
12000 (Bourne) |
i15000 |
Chassis name: VPR-22XX, VPR-24XX, VPR-4480, VPR-4800 |
Guided Configuration browser support
The Guided Configuration acts as the template for SSL Orchestrator. This release supports the following browsers and versions for use with Guided Configuration for SSL Orchestrator:
- Microsoft Internet Explorer 11.x - Only 32-bit browsers are supported.
- Mozilla Firefox 55.x
- Google Chrome 61.x
User documentation for this release
For a comprehensive list of documentation that is relevant to this release, refer to the SSL Orchestrator Documentation page.
Features in SSL Orchestrator
F5 recommends you review the entire SSL Orchestrator release notes and setup guide before upgrading and configuring a deployment.
In this release, BIG-IP 15.1.0 and SSL Orchestrator 15.1.0-7.0.0 focuses on performance, quality, and security. It includes improvements to many existing features, provides performance boosts, as well as new management and advanced security capabilities, such as:
- New compliance capabilities
- Support for the latest encryption standards in TLS 1.3 and PFS
- More advanced QUIC protocol capabilities
The release also improves the performance of BIG-IP hardware platforms with a new L7 TurboFlex profile and new DPDK driver support.
The SSL Orchestrator 15.1.0-7.0.0 security features include:
- Creation of separate inbound and outbound Security Policy types.
- Improvements for operational efficiency (including strict update and modification support)
- TLS 1.3 Forward Proxy (SSL Orchestrator outbound)
- HA status UI improvements providing a graphical view of HA state applicable to SSL Orchestrator (including Gossip and Echo state).
- Introduction of new SSL Orchestrator standalone platforms i4800 and i7800
The BIG-IP 15.1.0 security features include:
- Improved support for zero trust-based architectures
- Risk-based access control
- Enhanced authentication support with ephemeral authentications
Additionally, to help boost application security, the release includes:
- Expanded API protection
- Increased threat detection accuracy
- SSRF mitigation enhancements
- Updated PCI DSS 3.2 compliance
- Significant performance and security updates for service providers: improved DNS caching traffic steering capabilities, carrier-grade network address translation (CGNAT) updates, service provider specific protocol protections
Guided Configuration for SSL Orchestrator
Guided configuration is meant to guide you through setting up a particular use case on the SSL Orchestrator system. Each template requests minimal input and provides contextual help to assist users during setup. The current version of the Guided Configuration is displayed on the landing page. When a later upgrade becomes available, you can use the available link next to the version number to download it from downloads.f5.com then upload and install Guided Configuration for SSL Orchestrator on BIG-IP. Before installing and upgrading to the latest version of SSL Orchestrator, ensure that you read the release notes and setup guide for any prerequisites, task details, or troubleshooting and recovery steps during installation or upgrade.
Guided Configuration for SSL Orchestrator TLS 1.3 support
TLS 1.3 support is provided in Guided Configuration for SSL Orchestrator for inbound cases, both clientssl and serverssl, for enhanced performance and security.
SSL Orchestrator Topologies
SSL Orchestrator configuration topologies define the type of traffic (transparent or explicit) and the direction of traffic flow (inbound or outbound) you wish to inspect. These deployment settings, which can be modified as needed without undeploying a configuration, are complimented by SSL management settings that assist you in defining inbound decryption and outbound decryption, setting your service types (such as HTTP, ICAP, Layer 2/Layer 3 inline, and receive-only/TAP services) and creating your service policies by defining per-request and per-session policy settings that can be managed through a virtual policy editor.
- Outbound transparent proxy
- Outbound explicit proxy
- Inbound reverse proxy
- Outbound layer 2
- Inbound layer 2
The Existing Application topology is an inbound topology that allows you to create services, service chains, and security policies and attach them to an existing reverse proxy BIG-IP application.
Licensing and Provisioning for SSL Orchestrator Access Integration
Updated SSL Orchestrator Setup Utility with resource provisioning capabilities for licensed and unlicensed modules.
Multi-Layered Security
To solve specific security challenges, security administrators are accustomed to manually chaining together multiple point products, creating a bare-bones “security chain” consisting of multiple services. A typical chain may include components like Data Leak Prevention (DLP) scanners, Web Application Firewalls (WAF), Intrusion Prevention and Detection Systems (IPS and IDS), Malware Analysis tools, Secure Web Gateways (SWG), and more. In this model, all user sessions are provided the same level of security, as this “daisy chain” of services is hard-wired.
Virtual Clustered Multiprocessing (vCMP)
SSL Orchestrator supports Virtual Clustered Multiprocessing (vCMP) to provision and manage multiple hosted instances of the BIG-IP software on a single hardware platform.
Classification Engine
Classification Engine provides a rich set of methods based on context to dynamically determine how best to optimize the flow through the security stack. Context can minimally come from the following:
- Source IP/subnet
- Destination IP/subnet
- IP intelligence category - Subscription
- IP geolocation
- Host and domain name
- URL filtering category - Subscription
- Destination port
- Protocol
Other classifiers with greater flexibility are also available in the SSL Orchestrator VPE and with iRules to optimize and evaluate additional information.
Deployment Modes
- Single device mode
- High availability (HA) active/standby mode
In addition, the system can detect and transparently handle an explicit proxy between SSL Orchestrator and the internet.
SSL Orchestrator Analytics
SSL Orchestrator analytics provides a customizable view into your SSL Orchestrator statistics and enables you to flexibly choose the information you want to view based on specified ranges of time that you can select and adjust.
Statistics generated:
- Hit Count
- Client Bytes Out Per Second
- Duration
- Server Bytes In
- Server Bytes In Per Second
- Hit Count Per Second
- Server Bytes Out Per Second
- Client Bytes In
- Client Bytes In Per Second
- Client Bytes Out
- Server Bytes Out
Statistics are generated for the following dimensions:
- Client Cipher Names
- Client Cipher Versions
- Server Cipher Names
- Server Cipher Versions
- Virtual Servers
- Site IP Addresses
- Traffic Types
- Decryption Status
- Policy Actions
- Service Paths
- URL Categories
- Applications
- Application Families
- IP Reputation
- Destination Countries
L7 Application Protocol Settings
SSL Orchestrator supports L7 application protocol settings allowing you to select a protocol to listen for specific traffic (IMAP, SMTPS, POP3, FTP, HTTP) to be processed.
Fixes
ID number | Description |
---|---|
749749 | After saving the Service configuration when creating a new L3 topology, the Network Settings field does not appear. Fix: After saving the Service configuration when creating a new L3 topology, the Network Settings field appears. |
754939 | The SSL Orchestrator security policy builder only supports the good/bad option for IP Reputation, while in previous 3.x SSL Orchestrator versions it supports specific IP Intelligence Category groups. In result, you cannot restore the older 3.x security policy within SSL Orchestrator. Fix: A category option was added to the security policy IP reputation condition to allow you to select a specific IP Intelligence category. |
758407 | The Source and Destination Address fields are missing for the default Interception Rules during its topology creation and the fields should display the 0.0.0.0%0/0 format (which means it should also have Route Domain validation). In result, the user had to create a default Interception Rule without the Source and Destination Address information and then had to edit the Interception Rule from the landing page Interception Rule list view. Fix: Enter the Source and Destination Address field information while creating Topology only for the default Interception Rule. Optionally, you may also enter a Route Domain using the noted format (0.0.0.0%0/0) in the Source and Destination Address fields. |
761124 | When using SSL Orchestrator versions 5.2 and 3.x in Firefox, you cannot add a Security Policy Rule when using these Rule Conditions: a. Client IP Subnet Match; b. Client Port Match. Workaround: Use a different browser to add a Security Policy Rule. Fix: Firefox works in SSL Orchestrator versions 6.x and higher. |
761137 | Misleading SSL Orchestrator logs related to unused storage worker are present. For example, from resetnoded.log: [AppsCleanupWorker] Cleanup failed: Error: Public URI path not registered: /shared/iapp/f5-iappslx-ssl-orchestrator/localstore/. In this instance, the worker is not being used. Fix: The unused local storage worker related codes have been deleted so to eliminate misleading logs. |
761343 | An unexpected "Unsaved Changes" message appears in the Security Policy configuration screen after switching from an existing policy to a new policy (or from a new to an existing policy) in topology workflow. Fix: The "Unsaved Changes" message is now only displayed if changes are made and not when just switching policy types. |
770645 | The Security Policy used in an inbound topology has a pinner rule and category lookup condition in the policy-rule when it should not. This occurs when using a Security Policy with pinner rule or category lookup conditions for inbound traffic. In result, the built-in Pinners_Rule breaks the inbound traffic. Fix: Upgrade to the newest version of SSL Orchestrator. After the upgrade the security policies created in previous versions will contain policyConsumer: {type: 'Outbound', subType: 'Both'} security policy. These policies will be visible in both Inbound/Outbound flows with category lookup conditions and pinner rules. |
773397 | When using any MCP Objects created by SSL Orchestrator in another MCP Object which is not managed by SSL Orchestrator, then “Delete All” will fail to delete those MCP objects which are created by SSL Orchestrator due to dependency. This issue only occurs when there is dependency of a non-SSL Orchestrator object on objects managed by SSL Orchestrator. Next SSL Orchestrator deployment may fail due to the presence of uncleaned MCP objects. Fix: F5 recommends not using objects created by SSL Orchestrator while configuring any object which is not managed by SSL Orchestrator. If “Delete All” is unable to delete some objects, do the following: 1. Remove the dependency of the SSL Orchestrator object. 2. Login to the BIG-IP box using ssh and go to tmsh. 3. Execute the following command to list the application services: list sys application service <tab>. 4. Identify the App services which is created through SSL Orchestrator and execute the following command: delete sys application service <<SSL Orchestrator App service name>>. |
775753 | SSL Orchestrator's Access Profile value is not displayed in the Interception Rule topology after moving back and forth between Interception Rule and Topology steps. For example, if you create a new topology and navigate to Interception Rule, the Access Profile list is selected/retains a value. If you navigate back to the Topology step while still configuring the same topology, add a description and click Save & Next, when you navigate back to Interception Rule step, the Access Profile selection is no longer displayed in the list. This causes confusion while creating a deployment and may go unnoticed. Fix: The Access Profile value is now retained in the Interception Rule topology after moving back and forth between Interception Rule and Topology steps to make changes. |
776169 | SSL Forward Proxy Action is getting reset while moving rules during policy creation. If you select Reject from the Action dropdown and click OK after adding any condition to a new rule in Security Policy, the SSL Forward Proxy Action value of the newly added rule appears as expected. But after dragging this rule, using the move handle on the left side, the SSL Forward Proxy Action value of the new rule changes to Bypass. Fix: The SSL Forward Proxy Action value of the newly added rule is no longer changed after dragging the rule to the top of the list. |
778461 | When multiple services (HA) are part of a service chain, modifications made to the service chain may fail. This occurs on a HA system due to a REST database update. Because the REST framework distributes the task across BIG-IP systems in HA, it causes an issue when its synchronization mechanism finds objects with the same generation number. Fix: The state of the deployment from a single device was updated so to prevent this issue. |
778525 | SSL Orchestrator's Access Profile value is not displayed in the Interception Rule topology after moving back and forth between Interception Rule and Topology steps. For example, if you create a new topology and navigate to Interception Rule, the Access Profile list is selected/retains a value. If you navigate back to the Topology step while still configuring the same topology, add a description and click Save & Next, when you navigate back to Interception Rule step, the Access Profile selection is no longer displayed in the list. This causes confusion while creating a deployment and may go unnoticed. Fix: The Access Profile value is now retained in the Interception Rule topology after moving back and forth between Interception Rule and Topology steps to make changes. |
778741 | SSL Orchestrator Explicit Proxy with L3 Inline service throughput shows a degradation of up to 18%. Fix: The SSL Orchestrator iAppLX no longer makes any changes to TCP profile attributes which are not managed by it and changes were made to the default parent profile to f5-tcp-lan and f5-tcp-wan respectively for client side and server side. |
780821 | Consecutive SSL Orchestrator version upgrades (such as from 5.x to 6.0 to 6.1) may result in a timeout error. Fix: Consecutive SSL Orchestrator version upgrades no longer results in a timeout error. |
786133 | Gossip device information may not be updated when modifying the management IP. When configsync IP is set after management IPs at managementIp from https://[management-ip]/mgmt/tm/cm/device will be inconsistent with the managementAddress from https://[management-ip]/mgmt/shared/resolver/device-groups/tm-shared-all-big-ips/devices. This results in the SSL Orchestrator landing page to not appear and other potential issues that rely on the information from the resolver tm-shared-all-big-ips. The issue does not occur if the management IP settings are modified after a new installation of the BIG-IP ISO. Fix: Run the following commands at the BIG-IP shell to address the issue: 1. Delete gossip devices by typing restcurl -X DELETE shared/resolver/device-groups/tm-shared-all-big-ips/devices. 2. Force gossip to update device information by typing restcurl -X POST -d '{}' tm/shared/bigip-failover-state. | for one device is modified, the
786141 | While creating a Network in HTTP/L3 Services, identical self-IP addresses can be entered and saved for non-floating devices on a local self-IP for HA devices without triggering a warning that the self-IP addresses need to be different. Fix: If you enter identical self-IP addresses for non-floating devices on a local self-IP for HA devices, a warning is triggered to ensure different local self-IPs are entered and saved. |
786553 | SSL Orchestrator deployment fails due to a requested TCP profile that is not found. When frequently switching topology types while creating an app in the topology workflow, the deployment fails due to the requested TCP profile not being found and you have to cancel the workflow and start over. Fix: Switching topology types while creating an app in the topology workflow will no longer cause an error when deploying. |
787449 | Deploying a topology for an Existing topology results in a warning message. Fix: A warning message is no longer displayed when deploying an Existing topology. |
787797 | An SSL Orchestrator iRule uses the wrong method for category lookup while URLDB and SWG is not provisioned. Currently, the iRule in topology will use the wrong method to fetch category lookup for HTTP traffic, resulting in the traffic being reset. Fix: The lookup type in iRule, based on URLDB and SWG provisioning status, is fixed. |
788477 | When using a smaller platform to deploy SSL Orchestrator, the deployment may fail with the following error: "Operation to the configProcessor timed out after waiting 30 seconds. Please increase the timeout or contact the iApp writer for further instructions". With default management provisioning of management modules on small end platforms (for example a 2600, 2800, 4800), administrators cannot make changes to configurations or deploy new configurations. Fix: Manually change the provisioning of the system to 3G by typing the following command: tmsh > modify sys db provision.extramb value 3000. |
788481 | SSL Orchestrator does not load balance between inline pool members when the port remap is enabled and the load balancing method is ratio. Fix: SSL Orchestrator now load balances to all pool members when the port remap is enabled. |
799037 | The SSL Orchestrator iRule performs the wrong lookup for custom categories. The Category Lookup iRule exclusively looks up https:// traffic. For a custom lookup, there are two scenarios: 1. Custom Category set up to include http://www.host.com/*. 2. The iRule is looking up https://www.host.com. It will not match the lookup for Custom Category because the iRule is searching for the wrong scheme. The current iRule implementation ignores whether it finds a result or not. If it results in nothing, it returns an empty string. Fix: The iRule was changed so it checks whether it should match HTTP or HTTPS traffic. The iRule returns 153 if it does not find a match (153 means "Uncategorised"). |
802741 | OSPF single cast packets cannot pass Fast Forward virtual server for L2 topologies due to the -ot virtual created. For example, when deploying L2 topologies with an old version of SSL Orchestrator, OSPF single cast packets cannot pass Fast Forward virtual server. Fix: The creation of "-ot" virtual at L2 topologies, which were blocking OSPF traffic, is now prevented. |
805989 | The SSL Orchestrator service status monitor freezes the UI when too many services have been configured and you can no longer monitor the service status from SSL Orchestrator Services tab. This issue occurs if the number of services are more than 10 and MGMT provisioning is small. Fix: There is now no limitation to the number of services you can configure and you can monitor service status from the Services tab. |
822993 | HTTP traffic passing through an L3 explicit proxy SSL Orchestrator deployment may fail under certain conditions when the deployment object name contains the '-' character (a dash). HTTP requests moving through an explicit proxy may suffer from a connection reset. Fix: SSL Orchestrator deployment names with the '-' character (a dash) now continue to pass HTTP traffic through an L3 explicit proxy deployment and will not result in a connection reset. |
832725 | SSL Orchestrator L2 Outbound topology VLANs are not filtering correctly when editing an Interception Rule mini workflow, resulting in a list of all VLANs in place of a filtered list of VLANs. Fix: All SSL Orchestrator L2 Outbound topology VLANs filter as requested. |
Known issues
ID number | Description |
---|---|
759592 | HTTP traffic is unable to pass when SSL Orchestrator is configured in Inbound mode. If you configure a virtual with 0.0.0.0:0/0 any policy, the HTTPS traffic successfully passes but the HTTP traffic fails. On the server side, the BIG-IP sends a client "Hello" on port 80 to the server. It should instead be a plain text GET request. This results in causing a failure. |
830781 | When downgrading one device after an upgrade was performed, the High Availability (HA) status page may show the wrong BIG-IP version for that device. For example, after two HA devices upgrade to BIG-IP 15.1.0 and SSL Orchestrator 7.0, if the user downgrades one of the devices back to 14.x.x and SSLO 5.x, the other device's HA status page (introduced in 7.0) may show the wrong BIG-IP version for the downgraded device. For the 15.1.0-7.0 device, the framework gives SSL Orchestrator the wrong BIG-IP version for its peer. Workaround: Re-establish HA from scratch. In addition, upgrade the downgraded device to the same version as its peer. |
852921 | Certain Viprion chassis, combined with certain blade models that have a minimal MAC address pool, do not support inline L2 devices. These particular chassis and blade combinations may result in duplicate source and destination MAC addresses and no traffic flowing to the configured inline L2 services. For example, the following chassis and blade combinations are impacted by this issue: B2250 blade on a 2400 chassis; B4300 blade on a 4800 chassis; B4450 blade on a 4480 chassis. For further information, review the details provided in the MAC address assignment for interfaces, trunks, and VLANs (11.x and later) article. |
Install and upgrade SSL Orchestrator
If you currently have a version of SSL Orchestrator prior to 5.0, or are installing SSL Orchestrator for the first time, refer to the complete installation and upgrade instructions for F5 SSL Orchestrator in the SSL Orchestrator: Setup version 15.1.0-7.0 guide.
If you currently have SSL Orchestrator 5.x or 6.x version installed, click
and follow the SSL Orchestrator RPM upgrade instructions to import the newest 7.0 version.To install the F5 SSL Orchestrator 7.0 and you do not have an existing SSL Orchestrator add-on license, or a previous version of SSL Orchestrator installed, download the image from downloads.f5.com. For complete step-by-step installation instructions, see the BIG-IP Systems: Upgrading Software guide. The Guided Configuration for SSL Orchestrator 7.0 image is packaged with the F5 BIG-IP 15.1.0 image.
To upgrade to the newest version of SSL Orchestrator from a previous version prior to 5.0, or you have an existing add-on license, follow the recommended upgrade steps found in the SSL Orchestrator recommended upgrade procedure section in the SSL Orchestrator: Setup guide. This procedure walks you through the uninstallation and deletion of existing SSL Orchestrator applications and RPM before installing the new ISO image.
If you do not follow the recommended upgrade procedure to undeploy your previous SSL Orchestrator deployments, as well as uninstall your previous version of the application, further manual steps are required to reset your environment and undeploy the previous version. See the Upgrade from previous SSL Orchestrator versions using the recovery procedure task steps in the SSL Orchestrator: Setup guide based on the previous version of SSL Orchestrator you are upgrading from and your access to the BIG-IP Applications LX menu.
These upgrade steps are required since previously deployed SSL Orchestrator configurations cannot be rolled forward or imported into the new version of SSL Orchestrator. Following one of the recommended upgrade procedures will assist you in preparing your system for a clean installation.
Contacting F5
North America | 1-888-882-7535 or (206) 272-6500 |
Outside North America, Universal Toll-Free | +800 11 ASK 4 F5 or (800 11275 435) |
Additional phone numbers | Regional Offices |
Web | http://www.f5.com |
support@f5.com |
Additional resources
You can find additional support resources and technical documentation through a variety of sources.
F5 Support | Free self-service tools give you 24x7 access to a wealth of knowledge and technical support. Whether it is providing quick answers to questions, training your staff, or handling entire implementations from design to deployment, F5 services teams are ready to ensure that you get the most from your F5 technology. |
AskF5 Knowledge Base | The storehouse for thousands of knowledgebase articles that help you manage your F5 products more effectively. Whether you want to browse periodically to research a solution, or you need the most recent news about your F5 products, AskF5 is your source. |
BIG-IP iHealth Diagnostics and BIG-IP iHealth Viewer | BIG-IP iHealth Diagnostics identifies issues, including common configuration problems and known software issues. It also provides solutions and links to more information. With BIG-IP iHealth Viewer, you can see the status of your system at-a-glance, drill down for details, and view your network configuration. |
F5 DevCentral | Collaborate and share innovations including code samples, new techniques, and other tips, with more than 300,000 F5 users worldwide. DevCentral is the place to ask questions, find solutions, learn to harness the power of F5’s powerful scripting language, iRules, and much more. |
Communications Preference Center | Here, you can subscribe to a number of communications from F5. For information about the types of notifications F5 provides, see K9970: Subscribing to email notifications regarding F5 products. |