Bug ID 700992: FTP security in PASV mode resets

Last Modified: Jan 29, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP ASM(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3, 12.1.3.1, 12.1.3.2, 12.1.3.3, 12.1.3.4, 12.1.3.5, 12.1.3.6, 12.1.3.7, 12.1.4, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4

Opened: Jan 07, 2018
Severity: 4-Minor

Symptoms

In FTP transaction, an unexpected RST arrives

Impact

Unexpected RST.

Conditions

An unknown command is sent after changing to PASV mode. The FTP profile is set to inherit it's parent settings.

Workaround

The issue seems to reproduce only when the FTP profile inherits it's parent settings: ltm profile ftp /Common/another_ftp_sec_prof { app-service none defaults-from /Common/ftp inherit-parent-profile enabled security enabled } when the "inherit-parent-profile" is disabled, the issue is not happening.

Fix Information

None

Behavior Change