Last Modified: Jul 07, 2020
See more info
Known Affected Versions:
15.1.0, 220.127.116.11, 18.104.22.168, 22.214.171.124, 126.96.36.199
Opened: May 18, 2020
When whitelisting traffic from an external IP address that is targeting a virtual IP address on an internal VLAN, if you specify the source IP address from the external VLAN, once the traffic has been processed on the internal VLAN, the whitelist no longer applies.
Hardware offload on the TCP Push Flood vector causes goodput to drop.
This occurs when configuring whitelists.
To have the traffic from that external VLAN processed, all traffic on the internal VLAN must either be added as a second whitelist or the external VLAN must be wildcarded to not specify the external VLAN.