Last Modified: Sep 29, 2022
See more info
Known Affected Versions:
15.1.0, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199, 15.1.1, 15.1.2, 188.8.131.52, 15.1.3, 184.108.40.206, 15.1.4, 220.127.116.11, 15.1.5, 18.104.22.168, 15.1.6, 22.214.171.124, 15.1.7, 16.0.0, 126.96.36.199, 16.0.1, 188.8.131.52, 184.108.40.206, 16.1.0, 16.1.1, 16.1.2, 220.127.116.11, 18.104.22.168, 16.1.3, 22.214.171.124, 126.96.36.199, 17.0.0, 188.8.131.52
Opened: Oct 24, 2021
After an HTTPS monitor completes successfully, the TLS version is cached and used for subsequent monitor probes. If the back end server TLS version changes between monitor polls and no longer allows the cached TLS version, the back end server correctly sends a fatal alert to the BIG-IP in response to the no longer allowed TLS version. The BIG-IP will continue to use the cached, now prohibited, version in all subsequent probes resulting in a false down resource until the cached information is cleared on the BIG-IP.
BIG-IP continues to send prohibited TLS version and reports the member as down.
ClientSSL profile is changed on backend BIG-IP device's virtual server,
-- Delete and re-add pool member. -- Change HTTPS monitor to any other monitor (including another HTTPS monitor) and then back. -- Restart bigd with "bigstart restart bigd" - Note that this impacts all monitoring on the BIG-IP. -- Restart BIG-IP - Note that this impacts all traffic on the BIG-IP.