The purpose of this Critical Alert is to inform of a potential problem that has been recently identified with SSL Visibility with BCIS Host Categorization. Please read the information provided below and follow the instructions to avoid being impacted by this problem.
SSL Visibility software versions 126.96.36.199, 188.8.131.52 and 184.108.40.206 and up, running with Host Categorization are potentially impacted.
If your SSL Visibility is not categorizing flows using a Host Categorization subscription, it will not be impacted.
When SSLV is configured with Host Categorization subscription there is a small file descriptor leak which can cause following errors after 4-5 months. When the issue starts to impact you will see the following logging in the syslog file:
ssldata[xxx]: [E] RPC connection terminated:X_RPC [0x0000000180110001;code:1;sub:1] Internal error
ssldata[xxx]: [E] RPC connection terminated:X_RPC [0x0f00000e80110004;code:4;sub:251658254] Bad address
This logging and the file descriptor leak will eventually leading to a crash, which can cause a temporary outage depending on configuration.
If SSLV is running software versions mentioned above and is configured to utilize Host Categorization subscription and is approaching uptime of 4 months or above.
• Reboot SSLV during maintenance window.
• Upgrade to SSLV software 220.127.116.11 or 18.104.22.168 or 22.214.171.124
If you are upgrading to version 126.96.36.199 or 188.8.131.52 or 184.108.40.206 please check the article: Upgrade to SSL Visibility 220.127.116.11, 18.104.22.168 and 22.214.171.124 may result in Host Categorization updates failing.