NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Forum Discussion
XDRich
Feb 15, 2017Guide
STP Leak using Broadcast packet 01:80:c2:00:00:1c
Netgear Support, Please take note that the community and several customers have discovered a possible flaw in your STP implementation that causes CPU panic and circular broadcasts that disable sw...
- Jun 07, 2017
LarryV and to others,
Since a firmware fix is not yet available, the MAC ACL workaround can be used as described on the article below:
Regards,
DaneA
NETGEAR Communtiy Team
XDRich
Feb 23, 2017Guide
Thanks for the consideration and looking into it.
I currently have the MAC acl on and that prevents the packets. But that is not a long term fix.
I have two GS716Tv3 and one GS110TP all running the latest firmware.
The three switches run 5 vlans and STP (MSTP) is running.
All interconncected.
Hope that helps diagnose it.
LaurentMa
Feb 24, 2017NETGEAR Expert
Thank you XDRich, yes it helps.
We can reproduce the issue now. The offending packet is a multicast packet with MAC destination address of “01:80:c2:00:00:01c” that was generated by Ubiquiti’s new wifi AP software 3.7.37 release. The switch would react negatively as you’d reported when it received such packet, but there is no long term impact to the switch.
We’ll test all Netgear switches to ensure if any other models might be affected to this same issue and for affected series, we will provide permanent fix without requiring filtering out these packets using MAC ACL.
We will regularly update the team here on our progress.
Regards,
Laurent Masia
NETGEAR Senior Product Line Manager, Smart Switches & Managed Switches
Related Content
NETGEAR Academy
Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology!
Join Us!