Bug ID 704804: The NAS-IP-Address in RADIUS remote authentication is unexpectedly set to the loopback address

Last Modified: Feb 15, 2019

Bug Tracker

Affected Product:  See more info
BIG-IP TMOS(all modules)

Known Affected Versions:
12.1.0, 12.1.0 HF1, 12.1.0 HF2, 12.1.1, 12.1.1 HF1, 12.1.1 HF2, 12.1.2, 12.1.2 HF1, 12.1.2 HF2, 12.1.3, 12.1.3.1, 12.1.3.2, 13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 14.0.0, 14.0.0.1, 14.0.0.2

Fixed In:
14.1.0, 14.0.0.3, 13.1.0.8, 12.1.3.3

Opened: Feb 02, 2018
Severity: 3-Major

Symptoms

The NAS-IP-Address in RADIUS remote authentication requests is set to the loopback address, not the management IP.

Impact

Login may be impacted.

Conditions

This applies to remote authentication for the control plane, not APM.

Workaround

There is no workaround at this time.

Fix Information

NAS-IP-Address Attribute is now set correctly when the the BIG-IP system is configured to use RADIUS authentication.

Behavior Change