Forum Discussion
It does solve your issue (which perhaps isn't solvable with this version) but see this article: https://devcentral.f5.com/articles/cve-2014-3566-removing-sslv3-from-big-ip
Quote:
Outbound connections Many outbound connections are made by BIG-IP, including monitors. These may use SSLv3, but are not full fledged browsers and make single connections rather than the multiple transactions required for the attack. We believe these connections are not vulnerable.
Based on information here: https://support.f5.com/kb/en-us/solutions/public/11000/400/sol11444.html there are only two ciphers that are exclusively non SSLv3. Perhaps try the NATIVE cipher string and see if that helps, although it looks to me like the two stated are included in your current cipher string.
I wonder if your server implementation actually has the necessary support?