The following issues from previous LMOS releases have been addressed in this release.

PD-15228 HTTPS Ciphers: Previously, assigning a cipher set that contains all available ciphers to an HTTPS Virtual Service (VS) will causes the VS to become unresponsive. This bug has been fixed so that it's now possible to assign a cipher set that contains all available ciphers to a VS
PD-15206 ESP / SSO: When using ESP on a Virtual Service and Use for Session Timeout is enabled, a user is not completely logged out when an OWA session is terminated. This issue has been fixed.
PD-15202 RESTful API: Changing the remote syslog port using the API doesn't result in the new port being enabled. This bug has been fixed.
PD-15179 IPv6: IPv6 routing changes for standards conformance in the previous release caused IPv6 static routes to no longer be honored. This issue has been addressed by introducing a new option on the Debug Options page, Enable Layer 4 IPv6 Forwarding. This option is enabled by default to support pre-7.2.50 LoadMaster behavior and should be disabled if IPv6-standard-conformant behavior is required.
PD-15185 Logging: Modified the logging of SSL messages so that handshake failures and other errors (e.g., Unsupported Protocol, No Shared Cipher, Wrong Version Number) currently seen at the Fatal errors only setting are only reported when All Errors is selected.
PD-15184 RESTful API: Fixed an issue that intermittently caused the ssodomain/queryall API to return an error.
PD-15133 ESP SSO Logoff: In LMOS 7.2.50, an issue was introduced where Single Sign On sessions on LoadMaster were not being properly removed upon logoff, causing subsequent login attempts to fail. This issue has been fixed.
PD-15054 Manage Services UI: Fixed an issue where the indicator for the SubVS with the highest numerical weight (a green star) did not move to the appropriate SubVS if another SubVS's weight changed so that it was higher than the SubVS with the indicator.
PD-15021 VMware Deployment: VMware images have been modified so that the CLI will no longer return the message "init ID S0 respawning too fast: disabled for 5 minutes".
PD-14985 ESP Single Sign On: Fixed an issue that caused a refresh of a login page to display an access denied page, even if the allowed virtual host and virtual directories were set to wildcards.
PD-14857 Single Sign On: Fixed an issue that caused a segmentation fault during an LDAP domain health check when the second bind attempt succeeds.
PD-14853 UI on Nutanix Platform: In previous releases, under the Real Time Statistics, the speed shown for interfaces on the Nutanix cloud platform was displayed as "-1". Now, the speed displayed will be dependent on the amount of load placed on the interfaces
PD-14825 Single Sign On Logging: Fixed an issue that caused Single Sign On related log messages to be duplicated in more than one log file.
PD-14754 Server Side Re-encryption: Fixed a bug that caused server-side re-encryption to close connections with a TCP FIN/ACK sequence instead of the required TCP RST (reset) packet, when the Enable Reset on Close option is enabled.
PD-14748 Virtual Service SNAT: In previous releases, if you disable a Real Server in a VS that is using SNAT and then re-enabled the Real Server, SNAT is silently disabled for that Virtual Service. This bug has been fixed.
PD-14746 RADIUS Two-Factor Authentication: Fixed an issue that caused a segmentation fault when a challenge response from an OTP (one-time password) server does not contain PW_STATE AVP.
PD-14644, PD-14550 HTTP/2 & Compression: In previous releases, if errors occur in HTTP/2 processing and compression is enabled, the system may reboot because the cache has not been properly released. This issue has been fixed.
PD-14434 PowerShell API Certificate Limit: The PowerShell API is limited to about 1K characters for the list of certificate names, while the limit in the UI is a little under 8K. This issue in the API has been addressed.
PD-14426 Content Rules: Content rule names can now use a numeric character as the first character in the name.
PD-14415 Stability and Reliability: Fixed an issue seen in 7.2.48.1 and 7.2.49.1 that caused a kernel panic when running a mix of UDP, HTTP, HTTPS, SMTP, and RDP services.
PD-14353 UI: Statistics displays have been modified to use the correct abbreviations for bit and byte statistics (e.g., Mb for Megabits and MB for Megabytes).
PD-14349 Virtual Service Templates: In previous releases, if a VS was exported as a template and had the Strict Transport Security Header field set to Add the Strict Transport Security Header - no subdomains or Add the Strict Transport Security Header - include subdomains, then the template would fail with a syntax error on import to any other LoadMaster. This issue has been fixed.
PD-14345, PD-14009 Single Sign On: Fixed an issue where extending the SSO Session Timeout and the Idle Timeout does not result in the extension of the expiry of the LoadMaster session cookie.As part of this fix, the upper limit for these timeouts was extended to 7 days (or 604800 seconds in the API).
PD-14374 HyperV Platform Boot Error: In previous releases, a fill_rand error was seen on the console during boot of a VLM on HyperV 2019. This issue has been fixed.
PD-14346, PD-14039 LDAP Remote User Groups: Starting with LMOS 7.2.48.0, a user could under certain circumstances be granted the permissions specified for a group to which they didn’t belong. This issue has been fixed.
PD-14258 SSO: An issue was introduced in LMOS 7.2.48.1 that caused the login form to be redisplayed even though correct credentials had been given, under specific circumstances. This issue has been fixed.
PD-14247 UI Login: Fixed issues that caused username/password prompts to be displayed for a local user configured for certificate-based login only.
PD-14100, PD-14050 Exchange 2016 Outlook Web Access and Authentication Proxy Virtual Services: Starting with LMOS 7.2.48, clients can be logged out immediately after supplying correct credentials. This issue has been fixed.