EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.

EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463

This thread has been locked for further replies. You can start a new thread to share your ideas or ask questions.
23 Reply
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-01-29 21:38:37 - last edited 2020-01-29 21:45:43

@RoRo7, I'm not from TP-Link, I'm just a user of this forum as any other user is. You can see that from the badge which TP-Link employees have beneath their username.

 

I only wrote that our VLANs deployed at several dozen customer sites still work. If you correctly set up a VLAN, it will still work with EAP225 firmware v2.6.1 as well.

 

If your VLAN does require untagged traffic sent to all Multi-SSIDs, the bug is in your VLAN setup, not in the EAP225 firmware.

 

There are only two setups I can imagine failing with Multi-SSID VLANs, namely asymmetric VLANs or VLANs over the same broadcast domain. Both types of VLANs are common in home user networks which use VLAN-unaware routers. Those types of VLANs do not isolate clients reliably.

 

So, again: if you request help from users here in this forum, post your setup.

༺ 0100 1101 0010 10ཏ1 0010 0110 1010 1110 ༻
  0  
  0  
#16
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-01-29 21:55:09

@RoRo7 @R1D2 No asymmetrical here, either, and all traffic is tagged.  Further, all intermediate devices are VLAN-aware, and there are no home-oriented switches or routers in play. 

 

Yes, I am sure that we could troubleshoot our configurations and figure out a VLAN setup that bypasses whatever change was make in 2.6.0, but the point remains that something was changed.  It would be helpful if TP-Link could provide guidance on that. 

  0  
  0  
#17
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-01-29 22:02:16 - last edited 2020-01-29 22:03:39

@TFTCM, yes, there was something changed, you can read in post #2:

 

Fixed the bug that untag packets can be transferred to SSIDs with different VLANs.

 

If you use VLANs from your router (and DHCP server!) as well as separate broadcast domains (i.e. separate networks) through all devices up to the EAP225's SSIDs, it will work perfectly.

 

See my post #6 for a working setup.

 

༺ 0100 1101 0010 10ཏ1 0010 0110 1010 1110 ༻
  0  
  0  
#18
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-01-29 22:03:12

@RoRo7 What I have found today is that the issue is for the default VLAN1. The guest VLAN lets say 20 is working. So if the AP is not using the VLAN1 this could work without a problem?

  0  
  0  
#19
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-01-29 22:12:41

@R1D2 Sorry - I don't like the idea. Since 2.6.1 update and nothing wrong with the other AP-s, my network setup is wrong. Could be, but then the rest of the EAP line need a bugfix too?

  0  
  0  
#20
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-01-29 22:14:00 - last edited 2020-01-29 22:44:53

 

RoRo7 wrote

What I have found today is that the issue is for the default VLAN1. The guest VLAN lets say 20 is working. So if the AP is not using the VLAN1 this could work without a problem?

 

Yes. The most mis-understood concept in VLANs is the so-called Default VLAN, which most people think »it carries untagged traffic«. That's wrong. VLAN 1 is just a VLAN as any other, inside a VLAN-aware network there is no untagged traffic. Even traffic in the Default VLAN gets tagged with a VLAN ID (often ID 1, but you could also assign VLAN ID 100 or 77 or whatever ID you define to be the »Default VLAN«).

It's just terminology.

 

Every switch in a network processing VLANs always uses VLAN tags, even if you use a managed switch set up as an unmanaged switch (i.e. only one common network).

 

But: you can indeed terminate the Default VLAN at any switch's port and send untagged traffic to the EAP (even over a trunk), which then should only reach the EAP itself, but not any SSID assigned to a VLAN – except if it has the same VLAN ID as your Default VLAN.

 

Tagged traffic on the trunk port from the switch to the EAP (say, VLAN 20-tagged) can be directed to the SSID only, no matter whether you send untagged or tagged traffic to the EAP itself.

 

The bug in earlier EAP225 firmwares was a leakage from untagged traffic to VLAN-aware SSIDs. This has been fixed in firmware v2.6.0.

 

Yes, you are right, other EAP's firmwares should be fixed, too.

 

BTW: the reason why my setup isn't affected by the bug-fix is that I never use a Default VLAN (except for assigning it unused ports) nor untagged traffic to an EAP or other VLAN-aware device, but rather use a designated Management VLAN (200 in the topology in post #6) for communication with the EAP itself. This allows to isolate the EAP itself in a subnetwork »on the other side« of a router – the company's network –, while wireless clients in a guest network are in an isolated LAN »behind« the router, so they can't even connect to the EAP itself. Trusted employess of the company can use a SSID assigned to the company network. This is a reliable, correct isolation of the networks assigned to SSIDs.

༺ 0100 1101 0010 10ཏ1 0010 0110 1010 1110 ༻
  2  
  2  
#21
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-02-01 14:01:00

@R1D2 You were correct.  The switch closest to the EAPs was not tagging outbound traffic to the EAPs on one of my VLANs.  Tagging that traffic resolved the issue.  Thanks for your help.  

  0  
  0  
#22
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-02-01 14:07:59

@TFTCM, you're welcome anytime. Thanks for your feedback.

༺ 0100 1101 0010 10ཏ1 0010 0110 1010 1110 ༻
  0  
  0  
#23
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-02-04 05:24:08

TFTCM wrote

@RoRo7 @R1D2   I am seeing the same behavior when upgrading to 2.6.1.  I run two EAP225v3 broadcasting two SSIDs and rely upon the EAP225v3 to tag the traffic for two VLANs.  All prior firmware versions up to 2.5.0 worked flawlessly.  Both versions 2.6.0 and 2.6.1 immediately caused all traffic to no longer pass upon upgrade.  

@TFTCM @RoRo7

As R1D2 @R1D2 said, we have fixed a bug about the VLAN, and I think your issue is related to the change, now let me explain it to you. Please refer to the following photo, it is the release note of firmware of EAP225v3.0.

 

In order to explain this clearly, let me introduce it based on the following network topology. 

After we change the mechanism, we should note these 

(1) When we set VLAN on the port of the switch which is connected to the EAP, or the VLAN is untagged, all packets cannot be transferred to the clients if the SSID is not set Wireless VLAN.  For example, when we set port 4 as VLAN 10 and the SSID is not set VLAN, then the client devices cannot get IP address. 

(2) When we don't set VLAN on the port of the switch which is connected to the EAP, all packets cannot be transferred to the clients if the SSID is set VLAN. For example,when we set VLAN 10 on the SSID but we don't set VLASN on the port 4, then the client devices cannot get IP address. 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

  0  
  0  
#24
Options
Re:EAP225 Bug in Version 2.6.1 Build 20191022 Rel. 42463
2020-02-06 15:12:49

@forrest @TFTCM @RoRo7 @R1D2 

 

Any idea on why TP-Link support is telling people to roll back to Build 20190404? 

From an email they sent me: "Please make sure that the firmware of your EAP is Build 20190404 because we change the mechanism of the VLAN in later firmware." 

 

Seems like they think they are making things worse with their firmware updates. 

 

 

OC200, 2x SG-TL3428, T1500G-10MPS, 3x EAP225, Firewalla Gold (replaced ER-605)
  0  
  0  
#25
Options