Bug ID 782569: SWG limited session limits on SSLO deployments

Last Modified: Nov 07, 2022

Bug Tracker

Affected Product:  See more info
BIG-IP APM(all modules)

Known Affected Versions:
14.1.0,,,,,, 14.1.2, 15.0.0, 15.0.1

Fixed In:

Opened: May 16, 2019
Severity: 3-Major


SWG limited session limits are enforced on SSLO deployments that enable Explicit proxy authentication.


SSLO fails to connect when the SWG limited session limit is reached.


-- SSLO with Explicit proxy authentication is deployed. -- Many concurrent SSLO connections that use custom category lookup (beyond the SWG limited session limit).



Fix Information

If there is an SSLO profile paired with either an APM or SSLO per-request policy on a virtual server, and the operation has done a custom category only lookup, an SWG limited license is no longer consumed. This answers the case where there is auth (APM) on one virtual server, and the transparent virtual server is SSLO with custom category lookup only.

Behavior Change