Bug ID 640565: Incorrect packet size sent to clone pool member

Last Modified: May 29, 2024

Affected Product(s):
BIG-IP TMOS(all modules)

Known Affected Versions:
11.5.4, 11.5.5, 11.5.6, 11.5.7, 11.5.8, 11.5.9, 11.5.10, 11.6.1, 11.6.2, 12.0.0, 12.0.0 HF1, 12.1.0 HF1, 12.0.0 HF2, 12.1.0 HF2, 12.0.0 HF3, 12.0.0 HF4, 12.1.1 HF1, 12.1.1 HF2, 12.1.2 HF1, 12.1.2 HF2, 12.1.0, 12.1.1, 12.1.2, 12.1.3, 12.1.3.1, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1

Fixed In:
13.1.0, 12.1.3.2, 11.6.3

Opened: Jan 20, 2017

Severity: 3-Major

Related Article: K11564859

Symptoms

Cloned packets do not obey the egress interface MTU, and clone pool members may get traffic exceeding the link MTU.

Impact

Clone pool members may get traffic exceeding the link MTU.

Conditions

Clone pool is configured on a virtual server.

Workaround

Disable TSO using the following tmsh command: tmsh modify sys db tm.tcpsegmentationoffload value disable.

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips