Last Modified: Apr 28, 2025
                                            Affected Product(s):
                                            BIG-IP ASM
                                        
                                            Known Affected Versions:
                                            13.1.0, 13.1.0.1, 13.1.0.2, 13.1.0.3, 13.1.0.4, 13.1.0.5, 13.1.0.6, 13.1.0.7, 13.1.0.8, 13.1.1, 13.1.1.2, 13.1.1.3, 13.1.1.4, 13.1.1.5, 13.1.3, 13.1.3.1, 14.0.0, 14.0.0.1, 14.0.0.2, 14.0.0.3, 14.0.0.4, 14.0.0.5, 14.0.1, 14.0.1.1, 14.1.0, 14.1.0.1, 14.1.0.2, 14.1.0.3, 14.1.0.5, 14.1.0.6, 14.1.2, 14.1.2.1, 14.1.2.2, 15.0.0, 15.0.1, 15.0.1.1, 15.0.1.2
                                        
                                            Fixed In:
                                            15.1.0, 15.0.1.3, 14.1.2.3, 13.1.3.2
                                        
                                Opened: Jun 30, 2019 Severity: 3-Major Related Article: 
K72252057                                        
                                
                                    
False positive ASM virus violations.
ASM reports a virus when the antivirus reply is timed out. False positive blocking or violation reporting.
Specific connection characteristics between ASM and the antivirus server may cause replies from the antivirus server to be missed by the ASM.
Configure the EnableASMByPass internal parameter setting to allow the antivirus server to not reply, so it does not issue a violation when it occurs: /usr/share/ts/bin/add_del_internal add EnableASMByPass 1 bigstart restart asm Note: When the internal parameter is enabled, ASM also bypasses huge HTTP requests (when they come on multiple connections) instead of resetting them.
False positive ASM virus violations no longer occur under these conditions.