Last Modified: May 14, 2019
See more info
Known Affected Versions:
13.1.0, 126.96.36.199, 188.8.131.52, 184.108.40.206, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199
Opened: Jan 24, 2018
In ID 517347, checking was added to attempt to detect infinite loops caused by improper use of the DNS::return iRule command. This is occasionally catching false positive loops resulting in connections being dropped incorrectly.
If a loop is erroneously detected, the connection will be dropped.
A virtual with a DNS profile that is using the udp profile instead of the udp_gtm_dns profile. An iRule that uses the DNS::return command.
Where possible use the udp_gtm_dns profile instead of udp on virtuals with a DNS profile. Where possible, use a "return" command immediately after the "DNS::return" command to prevent accidentally calling DNS::return multiple times.
The loop detection logic has been removed.