Bug ID 854129: SSL monitor continues to send previously configured server SSL configuration after changes (removal/modification)

Last Modified: Jun 10, 2021

Bug Tracker

Affected Product:  See more info
BIG-IP LTM(all modules)

Known Affected Versions:
13.1.0,,,,,,,,, 13.1.1,,,,, 13.1.3,,,,,,, 13.1.4,, 14.0.0,,,,,, 14.0.1,, 14.1.0,,,,,, 14.1.2,,,,,,,,, 14.1.3,, 14.1.4,,,, 15.0.0, 15.0.1,,,,, 15.1.0,,,,,, 15.1.1, 15.1.2,, 15.1.3, 16.0.0,, 16.0.1,

Opened: Nov 28, 2019
Severity: 3-Major


Monitor continues to send previously configured settings from the server SSL profile such as client certificate or cipher list after the SSL profile has been removed/modified from the monitor.


The previously configured settings, such as certificate or cipher, may continue to be transmitted to the server, resulting in node continuing to be marked up or down (respectively).


-- In-TMM monitor configured. -- SSL monitor configured with a server SSL profile. -- Modification of the server SSL profile on the monitor.


You can use either of the following workarounds: -- Disable and then re-enable the pool member. -- Restart tmm. Note: Using this option interrupts traffic. Traffic disrupted while tmm restarts.

Fix Information


Behavior Change