Bug ID 513953: RADIUS Auth/Acct might fail if server response size is more than 2K

Last Modified: Apr 28, 2025

Affected Product(s):
BIG-IP APM(all modules)

Known Affected Versions:
11.4.0, 11.4.1, 11.5.0, 11.5.1, 11.5.1 HF1, 11.5.1 HF2, 11.5.1 HF3, 11.5.1 HF4, 11.5.1 HF5, 11.5.1 HF6, 11.5.1 HF7, 11.5.1 HF8, 11.5.1 HF9, 11.5.1 HF10, 11.5.1 HF11, 11.5.2, 11.5.2 HF1, 11.5.3, 11.5.3 HF1, 11.6.0, 11.6.0 HF1, 11.6.0 HF2, 11.6.0 HF3, 11.6.0 HF4, 11.6.0 HF5

Fixed In:
12.0.0, 11.6.0 HF6, 11.5.3 HF2, 11.4.1 HF9

Opened: Mar 23, 2015

Severity: 3-Major

Related Article: K17122

Symptoms

RADIUS authentication or accounting fails when a response from the backend server is bigger than 2048 bytes

Impact

RADIUS Auth/Acct agent failed.

Conditions

Response from backend server is bigger than 2048 bytes

Workaround

None

Fix Information

Now RADIUS Auth and RADIUS Acct agents can successfully parse packets of sizes up to 4K, which is the maximum allowed RADIUS packet size. At the moment the BIG-IP system does not support RADIUS packet fragmentation.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips