Bug ID 578843: GUI strips out 0.0.0.0 masks from the SNMP Client Allow Lists.

Last Modified: Oct 07, 2023

Affected Product(s):
BIG-IP TMOS(all modules)

Known Affected Versions:
11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6

Fixed In:
13.0.0

Opened: Mar 08, 2016

Severity: 4-Minor

Related Article: K13115436

Symptoms

The GUI strips out 0.0.0.0 masks from the SNMP Client Allow List.

Impact

The GUI strips the 0.0.0.0 masks.

Conditions

Using the GUI to specific SNMP Client Allow List containing 0.0.0.0 masks.

Workaround

Use tmsh to modify the SNMP Access if using 0.0.0.0 net masks.

Fix Information

GUI no longer strips out 0.0.0.0 masks from the SNMP Client Allow Lists.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips