× NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Orbi WiFi 7 RBE973
Reply

Re: GS308E Access Management Site

sascha_52
Aspirant

GS308E Access Management Site

Hello,

 

I currently used two GS305e at different locations at home. Between the switches I used a trunc-connection with VLAN 101 (192.168.2.0/24) and VLAN 200 (192.168.10.0/24) on Port 5. Port 5 is set as VLAN-Member 101 (tagged) and 200 (tagged), to prevent untagged traffic on this Ports I also set VLAN 2 only to this Ports (tagged) and PVID also to VLAN 2. All other Ports are untagged on VLAN 101 or VLAN 200.

At this config I can manage both switchs from devices they are connectet to any other port (untagged VLAN 101) at any switch. Now I swaped one of the GS305e to a GS308e, I setting up the same VLAN/Port configuration, but I can manage the GS308e only from local connected devices now.

Some tests later it seems that incomming management traffic on tagged Port, from GS308e respond as untagged traffic. If I set the PVID on correspondending Port at GS305e from 2 to 101, its allows manage the GS308e over devices they connected to GS305e.

This behavior cannot be correct.

The switchs are config with static IP (192.168.2.132 ; .133).

 

Sascha

Model: GS308E|8 Port Gigabit Ethernet Smart Managed Plus Switch
Message 1 of 17
schumaku
Guru

Re: GS308E Access Management Site

It's not the first time reading about this suspect button the GS308E and probably the similar EP and EPP variants, while the GS305E work as expected.

For completeness, please add the exact model and the current firmware installed on the two switch models.

Will try to create some awareness with Netgear again. In case the switches are newer, also create a support ticket please, too.
Message 2 of 17
sascha_52
Aspirant

Re: GS308E Access Management Site

used firmware:

GS305e     V1.0.0.5

GS308e     V1.00.11GR ; V1.00.03GR testet also

Message 3 of 17
schumaku
Guru

Re: GS308E Access Management Site

@YeZ can you please make switch engineering investigate again please?
Message 4 of 17
waxar
Tutor

Re: GS308E Access Management Site

I have encountered the same problem with the GS308E switch. There are two major issues with the web management interface's traffic:

 

  1. Outgoing web management traffic is broadcast on all ports regardless of the incoming port (wow!).
  2. Outgoing web management traffic is always untagged.

Having outgoing web management traffic on all ports is a major security breach and must be addressed asap!

 

The following is the traffic captured by mirroring one tagged port (a trunk) to another tagged port (a monitor) while the web management console is being accessed. 192.168.1.1 is the router, 192.168.1.11 is the GS308E switch. Note how all outgoing traffic (from the GS308E's perspective) is untagged while incoming traffic from VLAN 1 is tagged. Currently, I am forced to use PVID=1 on the trunk port on the router in order to be able to access the management interface.

 

Model: GS308E|8 Port Gigabit Ethernet Smart Managed Plus Switch
Message 5 of 17
waxar
Tutor

Re: GS308E Access Management Site

The traffic dump mentioned above:

 

20:20:49.713902 30:23:03:e0:69:08 > 6c:cd:d6:b3:39:67, ethertype 802.1Q (0x8100), length 78: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 53624, offset 0, flags [DF], proto TCP (6), length 60)
    192.168.1.1.34482 > 192.168.1.11.80: Flags [S], cksum 0x7b36 (correct), seq 3970534656, win 64240, options [mss 1460,sackOK,TS val 1909316610 ecr 0,nop,wscale 6], length 0
20:20:49.715590 6c:cd:d6:b3:39:67 > 30:23:03:e0:69:08, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 64, id 1604, offset 0, flags [none], proto TCP (6), length 44)
    192.168.1.11.80 > 192.168.1.1.34482: Flags [S.], cksum 0xf6b0 (correct), seq 1064097850, ack 3970534657, win 1460, options [mss 1460], length 0
20:20:49.715751 30:23:03:e0:69:08 > 6c:cd:d6:b3:39:67, ethertype 802.1Q (0x8100), length 60: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 53625, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.1.34482 > 192.168.1.11.80: Flags [.], cksum 0x1931 (correct), ack 1, win 64240, length 0
20:20:49.715837 30:23:03:e0:69:08 > 6c:cd:d6:b3:39:67, ethertype 802.1Q (0x8100), length 94: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 53626, offset 0, flags [DF], proto TCP (6), length 76)
    192.168.1.1.34482 > 192.168.1.11.80: Flags [P.], cksum 0x1535 (correct), seq 1:37, ack 1, win 64240, length 36: HTTP, length: 36
	GET / HTTP/1.1
	Host: 192.168.1.11
20:20:49.721632 6c:cd:d6:b3:39:67 > 30:23:03:e0:69:08, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 64, id 1605, offset 0, flags [none], proto TCP (6), length 40)
    192.168.1.11.80 > 192.168.1.1.34482: Flags [.], cksum 0x0e4a (correct), ack 37, win 1460, length 0
20:20:49.721778 30:23:03:e0:69:08 > 6c:cd:d6:b3:39:67, ethertype 802.1Q (0x8100), length 87: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 53627, offset 0, flags [DF], proto TCP (6), length 69)
    192.168.1.1.34482 > 192.168.1.11.80: Flags [P.], cksum 0x0e7b (correct), seq 37:66, ack 1, win 64240, length 29: HTTP
20:20:49.733810 6c:cd:d6:b3:39:67 > 30:23:03:e0:69:08, ethertype IPv4 (0x0800), length 1454: (tos 0x0, ttl 64, id 1606, offset 0, flags [none], proto TCP (6), length 1440)
    192.168.1.11.80 > 192.168.1.1.34482: Flags [P.], cksum 0xf359 (correct), seq 1:1401, ack 66, win 1460, length 1400: HTTP, length: 1400
	HTTP/1.1 200 OK
	Connection: close
	X-Frame-Options: SAMEORIGIN
	X-XSS-Protection: 1; mode=block
	X-Content-Type-Options: nosniff
	Content-Type: text/html
	Cache-Control: no-cache
	Expires: -1
	...[SKIPPED]...
20:20:49.733958 30:23:03:e0:69:08 > 6c:cd:d6:b3:39:67, ethertype 802.1Q (0x8100), length 60: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 53628, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.1.34482 > 192.168.1.11.80: Flags [.], cksum 0x1850 (correct), ack 1401, win 63000, length 0
20:20:49.740727 6c:cd:d6:b3:39:67 > 30:23:03:e0:69:08, ethertype IPv4 (0x0800), length 1454: (tos 0x0, ttl 64, id 1607, offset 0, flags [none], proto TCP (6), length 1440)
    192.168.1.11.80 > 192.168.1.1.34482: Flags [P.], cksum 0x51f1 (correct), seq 1401:2801, ack 66, win 1460, length 1400: HTTP
20:20:49.740866 30:23:03:e0:69:08 > 6c:cd:d6:b3:39:67, ethertype 802.1Q (0x8100), length 60: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 53629, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.1.34482 > 192.168.1.11.80: Flags [.], cksum 0x12d8 (correct), ack 2801, win 63000, length 0
20:20:49.746038 6c:cd:d6:b3:39:67 > 30:23:03:e0:69:08, ethertype IPv4 (0x0800), length 668: (tos 0x0, ttl 64, id 1608, offset 0, flags [none], proto TCP (6), length 654)
    192.168.1.11.80 > 192.168.1.1.34482: Flags [P.], cksum 0x5084 (correct), seq 2801:3415, ack 66, win 1460, length 614: HTTP
20:20:49.746175 30:23:03:e0:69:08 > 6c:cd:d6:b3:39:67, ethertype 802.1Q (0x8100), length 60: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 53630, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.1.34482 > 192.168.1.11.80: Flags [.], cksum 0x1072 (correct), ack 3415, win 63000, length 0
20:20:49.748383 6c:cd:d6:b3:39:67 > 30:23:03:e0:69:08, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 64, id 1609, offset 0, flags [none], proto TCP (6), length 40)
    192.168.1.11.80 > 192.168.1.1.34482: Flags [F.], cksum 0x00d6 (correct), seq 3415, ack 66, win 1460, length 0
20:20:49.748628 30:23:03:e0:69:08 > 6c:cd:d6:b3:39:67, ethertype 802.1Q (0x8100), length 60: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 53631, offset 0, flags [DF], proto TCP (6), length 40)
    192.168.1.1.34482 > 192.168.1.11.80: Flags [F.], cksum 0x1070 (correct), seq 66, ack 3416, win 63000, length 0
20:20:49.750373 6c:cd:d6:b3:39:67 > 30:23:03:e0:69:08, ethertype IPv4 (0x0800), length 60: (tos 0x0, ttl 64, id 1610, offset 0, flags [none], proto TCP (6), length 40)
    192.168.1.11.80 > 192.168.1.1.34482: Flags [.], cksum 0x00d5 (correct), ack 67, win 1460, length 0

 

The GS308's firmware version - V1.00.11EN

 

Message 6 of 17
waxar
Tutor

Re: GS308E Access Management Site

@schumaku Is there a chance to get any updates on this from the team? Thanks!

Message 7 of 17
schumaku
Guru

Re: GS308E Access Management Site

@YeZ please
Message 8 of 17
sascha_52
Aspirant

Betreff: GS308E Access Management Site

Hello,

 

short update:

My case in processing since 4 weeks. A lot of posts later the supporter has not yet managed to configure the switches as I specified to reproduce the problem. 🙄

I do not give up 🙂

 

Sascha

Message 9 of 17
sascha_52
Aspirant

Betreff: GS308E Access Management Site

Final State:

from Support ...

"We have received an update from the Engineering team, who could reproduce the issue and find the root cause.
The root cause is GS308E chip can't reply to ARP with the tag however, GS305E can send the reply to ARP with the tag."

"It is a Hardware limitation. It cannot be fixed by software updates." ☹️

Workarround should be use PVID (@GS305E) to retagging packets from GS308E, but it's no solution for direct connections from other hardware with 802.1Q.

 

Ticket is closed.

Message 10 of 17
waxar
Tutor

Betreff: GS308E Access Management Site

That is beyond ridiculous... So they're saying that the chip supports tagging all other traffic, but is unable to tag its own? And what about the second issue when the replies are broadcast on all ports? Is it another "hardware limitation"? I think I'm done with Netgear...

Message 11 of 17
schumaku
Guru

Betreff: GS308E Access Management Site

 


@waxar wrote:

That is beyond ridiculous... So they're saying that the chip supports tagging all other traffic, but is unable to tag its own? 


Reality is: These are making use of configurable switch chips.

 


@waxar wrote: I think I'm done with Netgear...

These re indeed chipset limitations, several vendors offer the almost exact same devices and the similar variance, some direct chipset related, some related to the earlier mentioned microcontroller implementation.

 

If you expect strict managed VLAN, buy switches supporting this.

Message 12 of 17
waxar
Tutor

Betreff: GS308E Access Management Site

@schumaku I guess this is what happens when millennials are in charge of writing firmware. And you once again avoided addressing the second issue - broadcasting management traffic on all ports - which is much more severe than the first one.

Message 13 of 17
schumaku
Guru

Betreff: GS308E Access Management Site

This could even be  microcode issue on that switch chip. The firmware people (which just set some bits to the behavior of the switch like on an embedded device don't have control over it. To what I can see, the switch code is not a loaded module, probably burned-in with the manufacturing.

 

Please understand I'm not Netgear, just yet another user, and are not very keen buying hardware (this GS3x series if for certain specific sales channels) just for reproducing each and every potential nicely reported issue.

Message 14 of 17
waxar
Tutor

Betreff: GS308E Access Management Site

I'm a network software engineer. I also write firmware for microcontrollers.

 


@schumaku wrote:

This could even be  microcode issue on that switch chip. The firmware people (which just set some bits to the behavior of the switch like on an embedded device don't have control over it. To what I can see, the switch code is not a loaded module, probably burned-in with the manufacturing.

It's hard to make any assumptions without knowing what exact switch chip is used in the GS308E, but according to this video https://youtu.be/HuQ3iv4iLbw?t=322 it's clearly seen that the GS108 (a simple unmanaged switch) uses Broadcom BCM53118. According to the chip's description (https://html.alldatasheet.com/html-pdf/1074559/BOARDCOM/BCM53118/448/1/BCM53118.html) this switch chip is highly versatile, supports VLAN tagging and has one GMII/RGMII interface along with 10/100/1000 MAC for connection with a CPU or a wireless/DLS/cable router chip. That interface is obviously not used in the GS108 due to its unmanaged nature. Thinking that the chip can't tag/untag traffic received/sent on that internal interface renders it absolutely useless for what it's designed for.

 

Simple logic leads me to a conclusion that something clearly more advanced like the GS308E  uses at least something similar as a switch controller partly because the GS108 does not even use managed capabilities of its own chip. It's hard to believe that the GS308E uses an inferior chip provided it needs a CPU for management tasks.

Message 15 of 17
schumaku
Guru

Betreff: GS308E Access Management Site


@waxar wrote:

Thinking that the chip can't tag/untag traffic received/sent on that internal interface renders it absolutely useless for what it's designed for.


This switch chipset class is implemented in almost any CPE, small router, and also on non-managed and configurable small standalone switches. 

 


@waxar wrote:

Simple logic leads me to a conclusion that something clearly more advanced like the GS308E  uses at least something similar as a switch controller partly because the GS108 does not even use managed capabilities of its own chip.


The GS108 is the typical design example for a design for non-managed switches. Newer unmanaged switches still have got the addition of a controller adapted to the GMII/RGMII to add some features desired, similar to the GS308E. It happened to more than one vendor that this added code was faulty, so complete series of unmanaged switches showed problems on operations.

 

Scratch the simple logic. These switches are a their heart unmanaged switches, built on non-managed switch cores.


Don't want to dispute if the add on is an additional microcontroller or a CPU, the boundary is unsharp nowadays,.  And the chip added does take care of various tasks the simple switch chip can't do on its own, and for several functions it requires the full access to the data stream. This processor does not just handle the tiny IP stack, the web server (on very early E models the NSDP protocol), it also takes care of IGMP snooping for example. And yes that chip is linked to the GMII/RGMII. And because there is no VLAN tagging support on the switch chip, and the tiny IP stack can't handle the VLAN tagging, can't handle tls, but it serves both the switch runtime and the management functions like http, sftp, nsdp.

 

Certain larger GSxxxE and XSxxxE type models are indeed built on managed cores - there Netgear has made the management VLAN capability available. Beyond, the admin feature set was kept intentionally in line to the configurable, but unmanaged functionality. 

 

This is all I can say, everything based on observations done while Beta testing some of these Plus switches over the years.

 

Message 16 of 17
schumaku
Guru

Betreff: GS308E Access Management Site

@waxar  When reading into the release notes, you might understand my non-reverse-engineering design info can't be to much off:

 

===

To support the device UI, all HTTP packets are forwarded to the embedded CPU. With Flow Control enabled, throughput can be affected if the rate is higher than the CPU can handle.
...

IGMP dynamic router port does not timeout exactly at 300 seconds. It could be anywhere from 300 to 600 seconds.
IGMP host timeout is not exactly 260 seconds. It could be anywhere from 260 to 520 seconds.

===

Message 17 of 17
Top Contributors
Discussion stats
  • 16 replies
  • 3394 views
  • 1 kudo
  • 3 in conversation
Announcements