NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

XDRich's avatar
XDRich
Guide
Feb 15, 2017
Solved

STP Leak using Broadcast packet 01:80:c2:00:00:1c

Netgear Support,

 

Please take note that the community and several customers have discovered a possible flaw in your STP implementation that causes CPU panic and circular broadcasts that disable switches and some other vendor gear.

 

The  effect happens when the packet 01:80:c2:00:00:1c is broadcast from a Ubiquity AP.  The scenario is as follows.

If you have two or more switches connected with lags and redundant links in a circular fashion, with STP and MSTP on.  the redundant links.

The redundant links show that they are disgarding packets as normal.

However this packet is 01:80:c2:00:00:1c is getting past the stp disgard and continues to circulate around the links in perpetuity and is being constistently reflected by the switches.

The only respit is to remove the redundant link or put a MAC ACL on the lags to prevent the panic.

 

Please look into this issue.

I am runing the latest FW 6.3.1.16

 

The issue is well documented on the UBNT forums here, and we are asking both Netgear and UBNT to figure out what is going on and how to repair this ...

 

https://community.ubnt.com/t5/UniFi-Wireless/Firmware-3-7-x-and-NetGear-Switches-is-completely-broken/m-p/1835894/highlight/false#M211131

 

Thanks

Rich

38 Replies

      • LaurentMa's avatar
        LaurentMa
        NETGEAR Expert

        Hi

         

        Thank you for your messages. Please understand that the Community would really need, at very least, the Model Number of the switch presenting the issue. I'm sure this would trigger faster response rate.

         

        But yes, to answer your questions, several key people in NETGEAR Community as well as several NETGEAR employees at Tech Support, Engineering Q&A and PLM heard about this new issue.

         

        I am not sure which switches you have, but in case these are Smart Managed Switches (GS1xxTxx, GS5xxTxx, GS7xxTxx, XS7xxTxx) or above, please use the solution provided in this thread. Please enable Storm Control first. If not sufficient, you can use a MAC Access Control List (ACL) to drop packets with a target hardware address of 01:80:c2:00:00:1c. You can attach this ACL to your ports and your LAGs between your switches.

        original.png

         

        Please let us know how it goes, while we are investigating on our side.

         

        Regards,

  • LaurentMa's avatar
    LaurentMa
    NETGEAR Expert
    Please be sure Engineering team is working on this issue across our portfolio. So MAC ACL is temporary workaround only. But very efficient.

    Yes please apply the MAC ACL discarding these packets, on all ports which are connecting the Access Points. It is not necessary to bind the ACL with other ports.

    Regards,
  • XDRich Could you further explain "Pick one of the lags that create your circular network and add it there.  That prevents the reflection in the network while allowing the packet to get out and be used."? I just recently bought a second UAP-AC-HD and would like to take advantage of the quick roaming (802.11r) feature but not have my network melt at the same time :) (See attached image for switch topology) What link should I enable the ACL on? Just one of the Stack links, multiple? what about the LACP trunks?

     

    Switch Topology.png

     

     

    LaurentMa Any update on the pending firmware fix from engineering? 

     

     

    Thanks!

NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology! 

Join Us!

ProSupport for Business

Comprehensive support plans for maximum network uptime and business peace of mind.

 

Learn More