Bug ID 1377737: SSL Orchestrator does not pass traffic when MAC masquerading is configured on R4k or R2k systems

Last Modified: Aug 26, 2024

Affected Product(s):
BIG-IP F5OS-A, SSLO, TMOS(all modules)

Opened: Oct 10, 2023

Severity: 3-Major

Symptoms

In BIG-IP tenants launched on R4x00/R2x00 systems, configuring a MAC Masquerade address on the SSL Orchestrator (SSL Orchestrator) egress port prevents traffic from passing.

Impact

Egress traffic on the SSL Orchestrator port will be dropped in the physical NIC card. Hence SSL Orchestrator egress traffic on the port wouldn't be received on L2 device.

Conditions

-- R4x00 or R2x00 systems -- BIG-IP Tenant -- High availability (HA) configured in BIG-IP -- MAC Masquerade address configured on SSL Orchestrator egress port

Workaround

None

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips