Bug ID 717160: iAppLX SSLO3.0: SSL bypass traffic is intercepted on the egress device in two-unit deployment

Last Modified: Jul 12, 2023

Affected Product(s):
BIG-IP LTM(all modules)

Known Affected Versions:
13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 13.1.3.6, 13.1.4, 13.1.4.1, 13.1.5, 13.1.5.1

Opened: Apr 26, 2018

Severity: 3-Major

Symptoms

In two-unit SSLO deployment, the bypassed SSL traffic on the ingress SSLO device is always intercepted on the egress device.

Impact

SSL bypass traffic is intercepted on the egress device, which is incorrect behavior in this case.

Conditions

-- Using iAppLX SSLO3.0. -- Two-unit SSLO deployment. -- SSL bypass configured.

Workaround

None.

Fix Information

None

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips