Bug ID 1592485: 'tcp-psh-flood' attack vector is deleted after upgrade to v17.1.3 and failed to load the configuration

Last Modified: Sep 27, 2024

Affected Product(s):
BIG-IP AFM, Install/Upgrade(all modules)

Known Affected Versions:
17.1.1.3, 17.1.1.4

Opened: Jun 07, 2024

Severity: 3-Major

Symptoms

After an upgrade, the configuration fails to load on the following error: Syntax Error:(/config/bigip.conf at line: 39107) "tcp-psh-flood" identifier does not match to any of the following: ext-hdr-too-large or flood or hop-cnt-low or host-unreachable or icmp-frag or icmpv4-flood or icmpv6-flood or ip-frag-flood or ip-low-ttl or ip-opt-frames or ipv6-ext-hdr-frames or ipv6-frag-flood or non-tcp-connection or opt-present-with-illegal-len or sweep or tcp-ack-flood or tcp-bad-urg or tcp-flags-uncommon or tcp-half-open or tcp-opt-overruns-tcp-hdr or tcp-rst-flood or tcp-syn-flood or tcp-syn-oversize or tcp-synack-flood or tcp-window-size or tidcmp or too-many-ext-hdrs or udp-flood or unk-tcp-opt-type

Impact

On v17.1.1.3 config is not loaded successfully

Conditions

Enable tcp-psh-flood vector on profiles and upgrade to v17.1.1.3

Workaround

None

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips