Last Modified: Apr 28, 2025
Affected Product(s):
BIG-IP AFM
Known Affected Versions:
14.0.1, 14.0.0, 13.1.0
Fixed In:
13.1.0.7
Opened: Mar 28, 2018 Severity: 1-Blocking
BIG-IP systems configured with L4 DoS Protection might not provide sufficiently granular DDoS detection and mitigation to ensure that legitimate traffic is not impacted.
Legitimate traffic might be impacted.
Configured for DDoS detection and mitigation.
None.
The following DoS vectors no longer count serverside packets. -- Single-Endpoint Flood -- Global-Device level aggregate vectors -- Bad-actor/attacked-dst for all vectors Additionally, hardware-accelerated, device-level (global) aggregate DoS vectors are now programmed dynamically when traffic is detected, rather than at configuration time. These behavior changes provide greater granularity in DDoS detection and mitigation to ensure that legitimate traffic is not impacted.
The following DoS vectors no longer count serverside packets. -- Single-Endpoint Flood -- Global-Device level aggregate vectors -- Bad-actor/attacked-dst for all vectors Additionally, hardware-accelerated, device-level (global) aggregate DoS vectors are now programmed dynamically when traffic is detected, rather than at configuration time. These behavior changes provide greater granularity in DDoS detection and mitigation to ensure that legitimate traffic is not impacted.