Last Modified: Sep 13, 2023
Affected Product(s):
BIG-IP AAM, APM, ASM, LTM, WAM
Known Affected Versions:
11.5.1 HF1, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.1 HF10, 11.5.1 HF11, 11.5.2 HF1, 11.5.3 HF1, 11.5.3 HF2, 11.5.4 HF1, 11.1.0, 11.2.0, 11.2.1, 11.4.0, 11.4.1, 11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.1.0 HF1, 12.1.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2
Fixed In:
12.0.0, 11.6.1 HF1, 11.5.4 HF2
Opened: May 28, 2013 Severity: 3-Major Related Article:
K14669
Renewing an existing certificate fails using the GUI if a user provides Subject Alternative Name (SAN) as input.
Cannot renew certificate using the GUI.
Using the GUI, provide SAN while renewing certificate.
Do not provide SAN information while renewing certificates. As an alternative, you can create a new certificate with a SAN. Impact of workaround: Performing the suggested workaround should not have a negative impact on your system.
Renewing an existing certificate now succeeds if a user provides Subject Alternative Name (SAN) as input in the GUI.