WakeOnLAN icon indicating copy to clipboard operation
WakeOnLAN copied to clipboard

HPE Managed Switch Security Filters Out WOL

Open jpdonato opened this issue 7 years ago • 2 comments

We noticed that enabling our HPE OfficeConnect's managed switch AutoDoS function prevents WOL's magic packet from reaching the destination computer (using Broadcast IP). Further testing revealed that this is because in AutoDoS mode, HPE has the feature "Prevent UDP Blat Attack" enabled (one of many such DoS-related capabilities it has). This is defined by HPE as: "When enabled, the switch drops packets that have a UDP source port equal to the UDP destination port. " Although WOL has a "UDP Port" field which can be changed, there are apparently no source / destination parameters. The immediate obvious workaround was to toggle the HPE switch to manual DoS and disable only its "Prevent UDP Blat Attack" feature. This way, WOL works again. Since I don't know if this is just the way it is, or whether WOL 2.11.22 can eventually be improved for this purpose - or if there is actually a workaround in the WOL GUI - I thought I would report this issue. Thank you.

jpdonato avatar Aug 22 '18 11:08 jpdonato

Thanks for the information. I would say that HPE needs to be the one to improve, since WOL isn't doing anything wrong or unusual. HPE is misinterpreting simple WOL messages as an attack which is plainly wrong. Do they have a contact or support mechanism? There is nothing that I know of that we could change on this end. The message is already as simple as possible and is using documented and universally recognized protocols. If you manage to contact HP support I would be happy to join the conversation and supply any information they need to look at.

basildane avatar Aug 22 '18 16:08 basildane

I agree with you - I know WOL isn't launching a DoS attack on our LAN and especially not when trying to wake ONE computer 😊

We do have free technical support from HPE for this device, however I wonder if they will be 'interested' in updating their firmware to fix this, since the simple (but unfortunate) workaround is to uncheck the corresponding box. If we do open a ticket, I'll be happy to include you in the conversation/thread. Thanks!


From: Basildane [email protected] Sent: August 22, 2018 12:22 PM To: basildane/WakeOnLAN Cc: jpdonato; Author Subject: Re: [basildane/WakeOnLAN] HPE Managed Switch Security Filters Out WOL (#119)

Thanks for the information. I would say that HPE needs to be the one to improve, since WOL isn't doing anything wrong or unusual. HPE is misinterpreting simple WOL messages as an attack which is plainly wrong. Do they have a contact or support mechanism? There is nothing that I know of that we could change on this end. The message is already as simple as possible and is using documented and universally recognized protocols. If you manage to contact HP support I would be happy to join the conversation and supply any information they need to look at.

— You are receiving this because you authored the thread. Reply to this email directly, view it on GitHubhttps://nam01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fbasildane%2FWakeOnLAN%2Fissues%2F119%23issuecomment-415092302&data=02%7C01%7C%7C1971e6154c6a473718f208d6084b6ebb%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636705517397022323&sdata=y17cLBwAZHZtjirNTbfI2agnz%2FNrksq0oVXq8xrrZd8%3D&reserved=0, or mute the threadhttps://nam01.safelinks.protection.outlook.com/?url=https%3A%2F%2Fgithub.com%2Fnotifications%2Funsubscribe-auth%2FATVUUF26es2rcXqLyA02UB21XTiWh-vmks5uTYU6gaJpZM4WHgBQ&data=02%7C01%7C%7C1971e6154c6a473718f208d6084b6ebb%7C84df9e7fe9f640afb435aaaaaaaaaaaa%7C1%7C0%7C636705517397022323&sdata=vrPwX5KWNSGEGyHhZHBfAgoEjfLm9G2pRmMgiTQxUSU%3D&reserved=0.

jpdonato avatar Aug 22 '18 21:08 jpdonato