Bug ID 1628321: SSL bypass action leads to HTTP invalid action and server-side reset in TMM logs

Last Modified: Oct 19, 2025

Affected Product(s):
BIG_IP_NEXT(CM) TMOS(all modules)

Known Affected Versions:
20.3.0

Opened: Aug 15, 2024

Severity: 2-Critical

Symptoms

In the inbound application mode, if the server-side TLS is not enabled on BIG-IP/SSL Orchestrator and the backend application doesn’t support TLS, the SSL bypass action in the policy will work. But the connection will be rejected because the backend application doesn’t understand TLS messages.

Impact

The server will send a reset to the client as response

Conditions

-- SSL Orchestrator enabled -- Inbound application mode -- Server-side TLS is not enabled -- The back-end application does not support TLS

Workaround

None

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips