Bug ID 717160: iAppLX SSLO3.0: SSL bypass traffic is intercepted on the egress device in two-unit deployment

Last Modified: Nov 07, 2022

Bug Tracker

Affected Product:  See more info
BIG-IP LTM(all modules)

Known Affected Versions:
13.0.0, 13.0.0 HF1, 13.0.0 HF2, 13.0.0 HF3, 13.0.1, 13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 13.1.3.2, 13.1.3.3, 13.1.3.4, 13.1.3.5, 13.1.3.6, 13.1.4, 13.1.4.1, 13.1.5, 13.1.5.1

Opened: Apr 26, 2018
Severity: 3-Major

Symptoms

In two-unit SSLO deployment, the bypassed SSL traffic on the ingress SSLO device is always intercepted on the egress device.

Impact

SSL bypass traffic is intercepted on the egress device, which is incorrect behavior in this case.

Conditions

-- Using iAppLX SSLO3.0. -- Two-unit SSLO deployment. -- SSL bypass configured.

Workaround

None.

Fix Information

None

Behavior Change