Bug ID 782569: SWG limited session limits on SSLO deployments

Last Modified: Jul 12, 2023

Affected Product(s):
BIG-IP APM(all modules)

Known Affected Versions:
14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 15.0.0, 15.0.1

Fixed In:
15.1.0, 15.0.1.1, 14.1.2.1

Opened: May 16, 2019

Severity: 3-Major

Symptoms

SWG limited session limits are enforced on SSLO deployments that enable Explicit proxy authentication.

Impact

SSLO fails to connect when the SWG limited session limit is reached.

Conditions

-- SSLO with Explicit proxy authentication is deployed. -- Many concurrent SSLO connections that use custom category lookup (beyond the SWG limited session limit).

Workaround

None.

Fix Information

If there is an SSLO profile paired with either an APM or SSLO per-request policy on a virtual server, and the operation has done a custom category only lookup, an SWG limited license is no longer consumed. This answers the case where there is auth (APM) on one virtual server, and the transparent virtual server is SSLO with custom category lookup only.

Behavior Change

Guides & references

K10134038: F5 Bug Tracker Filter Names and Tips