User Manual

Table Of Contents
Insight Managed 8-Port Gigabit (Hi-Power) PoE+ Smart Cloud Switch with NETGEAR FlexPoE Power
Manage Switch Security User Manual322
The System Information page displays.
6. Select Security > Traffic Control > Private VLAN > Private VLAN Promiscuous
Interface Configuration.
The Private VLAN Promiscuous Interface Configuration page displays.
7. Select whether to display physical interfaces, LAGs, or both by clicking one of the following
links above the table header:
•1 (the unit ID of the switch). Only physical interfaces are displayed. This is the default
setting.
LAG. Only LAGs are displayed.
All. Both physical interfaces and LAGs are displayed.
8. Select one or more interfaces by taking one of the following actions:
To configure a single interface, select the check box associated with the port, or type
the port number in the Go To Interface field and click the Go button.
To configure multiple interfaces with the same settings, select the check box
associated with each interface.
To configure all interfaces with the same settings, select the check box in the table
header.
9. In the Promiscuous Primary VLAN field, enter the primary VLAN ID for the promiscuous
association mode.
The range of the VLAN ID is 2–4093.
10. In the Promiscuous Secondary VLANs field, enter the secondary VLAN ID for
promiscuous association mode.
This field can accept single a VLAN ID, a range of VLAN IDs, or a combination of both in
sequence separated by a comma. You can specify an individual VLAN ID, such as 10.
You can specify the VLAN range values separated by a hyphen, for example, 10-13. You
can specify the combination of both separated by commas, for example,
12,15,40-43,1000-1005, 2000. The range of VLAN IDs is 2–4093.
Note: The VLAN ID list that you specify replaces the configured secondary
VLAN list in the association.
11. Click the Apply button.
Your settings are saved.
The Operational VLANs field displays the operational VLANs.
Configure access control lists
Access control lists (ACLs) ensure that only authorized users can access specific resources
while blocking off any unwarranted attempts to reach network resources. ACLs are used to
provide traffic flow control, restrict contents of routing updates, decide which types of traffic