Last Modified: Oct 07, 2023
Affected Product(s):
BIG-IP TMOS
Known Affected Versions:
11.6.0, 11.6.1, 11.6.2, 11.6.3, 11.6.3.1, 11.6.3.2, 11.6.3.3, 11.6.3.4, 11.6.4, 11.6.5, 11.6.5.1, 11.6.5.2, 11.6.5.3, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 12.1.4.1, 12.1.5, 12.1.5.1, 12.1.5.2, 12.1.5.3, 12.1.6
Fixed In:
13.0.0
Opened: Mar 08, 2016 Severity: 4-Minor Related Article:
K13115436
The GUI strips out 0.0.0.0 masks from the SNMP Client Allow List.
The GUI strips the 0.0.0.0 masks.
Using the GUI to specific SNMP Client Allow List containing 0.0.0.0 masks.
Use tmsh to modify the SNMP Access if using 0.0.0.0 net masks.
GUI no longer strips out 0.0.0.0 masks from the SNMP Client Allow Lists.