Last Modified: May 29, 2024
Affected Product(s):
BIG-IP AFM
Known Affected Versions:
15.1.4
Fixed In:
15.1.4.1
Opened: Nov 30, 2020 Severity: 2-Critical
When a PUSH flood vector is programmed to hardware after a flood is detected, rate limiting is performed on all the PUSH packets even when "Only Count Suspicious Events" is enabled.
The packets with PUSH flag for the good connections also get dropped even though "Only Count Suspicious Events" is enabled.
-- Push flood vector is triggered. -- Rate limiting is enabled for the push flood vector. -- The issue is observed only on the hardware platform.
None
Fixed an issue with rate limiting on PUSH packets.