NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
XDRich
Feb 15, 2017Guide
STP Leak using Broadcast packet 01:80:c2:00:00:1c
Netgear Support, Please take note that the community and several customers have discovered a possible flaw in your STP implementation that causes CPU panic and circular broadcasts that disable sw...
- Jun 07, 2017
LarryV and to others,
Since a firmware fix is not yet available, the MAC ACL workaround can be used as described on the article below:
Regards,
DaneA
NETGEAR Communtiy Team
melkesr
Feb 23, 2017Aspirant
LaurentMa
Feb 23, 2017NETGEAR Expert
Hi
Thank you for your messages. Please understand that the Community would really need, at very least, the Model Number of the switch presenting the issue. I'm sure this would trigger faster response rate.
But yes, to answer your questions, several key people in NETGEAR Community as well as several NETGEAR employees at Tech Support, Engineering Q&A and PLM heard about this new issue.
I am not sure which switches you have, but in case these are Smart Managed Switches (GS1xxTxx, GS5xxTxx, GS7xxTxx, XS7xxTxx) or above, please use the solution provided in this thread. Please enable Storm Control first. If not sufficient, you can use a MAC Access Control List (ACL) to drop packets with a target hardware address of 01:80:c2:00:00:1c. You can attach this ACL to your ports and your LAGs between your switches.
Please let us know how it goes, while we are investigating on our side.
Regards,
- XDRichFeb 23, 2017Guide
Thanks for the consideration and looking into it.
I currently have the MAC acl on and that prevents the packets. But that is not a long term fix.
I have two GS716Tv3 and one GS110TP all running the latest firmware.
The three switches run 5 vlans and STP (MSTP) is running.
All interconncected.
Hope that helps diagnose it.
- LaurentMaFeb 24, 2017NETGEAR Expert
Thank you XDRich, yes it helps.
We can reproduce the issue now. The offending packet is a multicast packet with MAC destination address of “01:80:c2:00:00:01c” that was generated by Ubiquiti’s new wifi AP software 3.7.37 release. The switch would react negatively as you’d reported when it received such packet, but there is no long term impact to the switch.
We’ll test all Netgear switches to ensure if any other models might be affected to this same issue and for affected series, we will provide permanent fix without requiring filtering out these packets using MAC ACL.
We will regularly update the team here on our progress.
Regards,
Laurent Masia
NETGEAR Senior Product Line Manager, Smart Switches & Managed Switches- elderoneMar 03, 2017Aspirant
Having same issue with Unifi AC-Pro access points with fw 3.7 and Netgeat switches in spanning tree (rstp).
Netgear switches in spaning tree: GS728TXS, GS752TXS, M7100-24x, GSM7248V2
Related Content
NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!