Bug ID 592699: IPv6 data pulled from the BIG-IP system via HTTPS, SCP, SSH, DNS or SMTP performance

Last Modified: Oct 16, 2023

Affected Product(s):
BIG-IP All(all modules)

Known Affected Versions:
12.0.0, 12.0.0 HF1, 12.0.0 HF2, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0

Fixed In:
13.0.0, 12.1.1, 12.1.0 HF1, 12.0.0 HF3

Opened: May 12, 2016

Severity: 2-Critical

Symptoms

IPv6 data pulled from the BIG-IP system via HTTPS, SCP, SSH, DNS or SMTP might encounter significant performance impacts when initiated over a BIG-IP data port using IPv6.

Impact

Performance impact pulling data over affected ports from the BIG-IP over IPv6. BIG-IQ performance is impacted trying to manage BIG-IP devices over IPv6.

Conditions

-- Protocols: HTTPS, SCP, SSH, DNS, SMTP. -- IPv6. Note: Management port is not impacted.

Workaround

Disable TSO for IPv6 at the command line by running the following command: ethtool -K tmm tso off. Note: This command must be run each time after reboot.

Fix Information

The issue has been corrected, so that there is no performance impact pulling data over affected ports using HTTPS, SCP, SSH, DNS or SMTP from the BIG-IP over IPv6, and there is no BIG-IQ performance issue managing BIG-IP devices over IPv6.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips