User Manual
Table Of Contents
- 24-Port Gigabit Smart Managed Pro Switch with PoE+ and 2 SFP Ports Model GS724TPv2
- Contents
- 1. Get Started
- Switch Management Interface Overview
- Change the Default IP Address of the Switch
- Discover a Switch in a Network With a DHCP Server
- Discover a Switch in a Network Without a DHCP Server
- Configure the Network Settings on Your Computer
- Access the Web Browser–Based Management Interface
- About the User Interfaces
- Use a Web Browser to Access the Switch and Log In
- Web Browser–Based Management Interface Device View
- Interface Naming Conventions
- Configure Interface Settings
- Context-Sensitive Help and Access to the Support WebSite
- Register Your Product
- 2. Configure System Information
- 3. Configure Switching
- Configure Port Settings
- Configure Link Aggregation Groups
- Configure VLANs
- Configure a Voice VLAN
- Configure Auto-VoIP
- Configure Spanning Tree Protocol
- Configure Multicast
- View the MFDB Table
- View the MFDB Statistics
- IGMP Snooping Overview
- Configure IGMP Snooping
- Configure IGMP Snooping for Interfaces
- View the IGMP Snooping Table
- Configure IGMP Snooping for VLANs
- Modify IGMP Snooping Settings for a VLAN
- IGMP Snooping Querier Overview
- Configure IGMP Snooping Querier
- Configure IGMP Snooping Querier for VLANs
- Display IGMP Snooping Querier for VLAN Status
- Configure a Static Multicast Group
- Remove a Static Multicast Group
- Configure Multicast Group Membership
- Configure the Multicast Forward All Option
- View and Configure the MAC Address Table
- 4. Configure Quality of Service
- 5. Manage Device Security
- Configure the Management Security Settings
- Configure Management Access
- Configure Port Authentication
- Configure Traffic Control
- Configure Access Control Lists
- Use the ACL Wizard to Create a Simple ACL
- Configure a MAC ACL
- Configure MAC ACL Rules
- Configure MAC Bindings
- View or Delete MAC ACL Bindings in the MAC Binding Table
- Configure an IP ACL
- Configure Rules for a Basic IP ACL
- Configure Rules for an Extended IP ACL
- Configure IP ACL Interface Bindings
- View or Delete IP ACL Bindings in the IP ACL Binding Table
- 6. Monitor the System
- 7. Maintenance
- A. Configuration Examples
- B. Specifications and Default Settings

Configure Quality of Service
160
NETGEAR 24-Port Gigabit Smart Managed Pro Switch with PoE+ and 2 SFP Ports Model GS724TPv2
6. For each DSCP value, select from the corresponding Queue menu which internal traffic
class must be mapped to the DSCP value.
The traffic class is the hardware queue for a port. Higher traffic class values indicate a
higher queue position. Before traffic in a lower queue is sent, it must wait for traffic in
higher queues to be sent.
The allowed Per Hop Behavior (PHBs) values, apart from other DSCP experimental
values, are as follows:
• Class Selector (CS) PHB. These values are based on IP precedence.
• Assured Forwarding (AF) PHB. These values define four main levels to sort and
manipulate some flows within the network.
• Expedited Forwarding (EF) PHB. These values are used to prioritize traffic for
real-time applications. In many situations, if the network exceeded traffic and you
need some bandwidth guaranteed for an application, the EF traffic must receive this
rate independently of the intensity of any other traffic attempting to transit the node.
7. Click the Apply button.
The updated configuration is sent to the switch. Configuration changes take effect
immediately.
Manage Differentiated Services
The QoS feature contains Differentiated Services (DiffServ) support that allows traffic to be
classified into streams and given certain QoS treatment in accordance with defined per-hop
behaviors.
Standard IP-based networks are designed to provide best effort data delivery service. Best
effort service implies that the network delivers the data in a timely fashion, although there is
no guarantee. During times of congestion, packets might be delayed, sent sporadically, or
dropped. For typical Internet applications, such as email and file transfer, a slight degradation
in service is acceptable and in many cases unnoticeable. Conversely, any degradation of
service can negatively affect applications with strict timing requirements, such as voice or
multimedia.










