User Manual
Table Of Contents
- 24-Port Gigabit (Hi-Power) PoE+ Ethernet Smart Managed Pro Switch with 2 SFP Ports and Cloud Management
- Contents
- 1 Get Started
- Available publications
- Switch management options and default management mode
- Manage the switch by using the device UI
- About on-network and off-network access
- Access the switch on-network and connected to the Internet
- Use a Windows-based computer to access the switch on-network and connected to the Internet
- Use the NETGEAR Insight mobile app to discover the IP address of the switch
- Use the NETGEAR Switch Discovery Tool to discover the switch when it is connected to the Internet
- Discover the switch in a network with a DHCP server using the Smart Control Center
- Use other options to discover the switch IP address
- Access the switch on-network and connected to the Internet when you know the switch IP address
- Access the switch off-network and not connected to the Internet
- Credentials for the device UI
- Register the switch
- Change the language of the device UI
- Change the management mode of the switch
- Use the Device View of the device UI
- Configure interface settings
- Access the NETGEAR support website
- Access the user manual online
- 2 Configure System Information
- View or define switch system information
- Configure the switch IP address settings
- Configure the IPv6 network interface
- Configure the time settings
- Configure Denial of Service settings
- Configure the DNS settings
- Configure Green Ethernet settings
- Manage switch discovery with UPnP and SSDP
- Use the Device View
- Configure Power over Ethernet
- Configure SNMP
- Configure LLDP
- Configure DHCP snooping
- Set up PoE timer schedules
- 3 Configure Switching
- Configure the port settings and maximum frame size
- Configure link aggregation groups
- Configure VLANs
- Configure a voice VLAN
- Configure Auto-VoIP
- Configure Spanning Tree Protocol
- Configure multicast
- Manage IGMP snooping
- Configure IGMP snooping
- Configure IGMP snooping for interfaces
- View, search, or clear the IGMP snooping table
- Configure IGMP snooping for VLANs
- Modify IGMP snooping settings for a VLAN
- Disable IGMP snooping on a VLAN
- Configure one or more IGMP multicast router interfaces
- Configure an IGMP multicast router VLAN
- IGMP snooping querier overview
- Configure an IGMP snooping querier
- Configure an IGMP snooping querier for a VLAN
- Display the status of the IGMP snooping querier for VLANs
- View, search, and manage the MAC address table
- Configure Layer 2 loop protection
- 4 Configure Quality of Service
- 5 Manage Device Security
- Change the device admin password for the device UI
- Manage the RADIUS settings
- Configure the TACACS+ settings
- Manage the Smart Control Center
- Configure management access
- Control access with profiles and rules
- Configure port authentication
- Set up traffic control
- Configure access control lists
- Use the ACL Wizard to create a simple ACL
- Configure a MAC ACL
- Configure MAC ACL rules
- Configure MAC bindings
- View or delete MAC ACL bindings in the MAC binding table
- Configure a basic or extended IPv4 ACL
- Configure rules for a basic IPv4 ACL
- Configure rules for an extended IPv4 ACL
- Configure an IPv6 ACL
- Configure rules for an IPv6 ACL
- Configure IP ACL interface bindings
- View or delete IP ACL bindings in the IP ACL binding table
- Configure VLAN ACL bindings
- 6 Monitor the System
- 7 Maintain or Troubleshoot the Switch
- A Configuration Examples
- B Specifications and Default Settings
24-Port Gigabit (Hi-Power) PoE+ Ethernet Smart Managed Pro Switch with 2 SFP Ports
Manage Device Security User Manual271
7. From the Rule Type menu, select Permit or Deny to permit or deny access when the
selected rules are matched.
A Permit rule allows access from a device that matches the rule criteria. A Deny rule
blocks a device that matches the rule criteria.
8. From the Service T
ype menu, select the access method to which the rule is applied.
The policy is restricted by the selected access method. Possible access methods are
TFTP, HTTP,
Secure HTTP (SSL), and SNMP.
9. In the Source IP Address field, enter the source IP address from which the management
traffic originates.
10. In the Mask
field, specify the subnet mask from which the management traffic originates.
11. In the Priority
field, assign a priority to the rule.
The rules are validated against the incoming management request in ascending order of
their priorities. If
a rule matches, the action is performed and subsequent rules below that
rule are ignored. For example, if a source IP address 10.10.10.10 is configured with
priority 1 to permit, and the same source IP address 10.10.10.10 is also configured with
priority 2 to deny, then access is permitted if the profile is active, and the second rule is
ignored.
12. Click
the Add
button.
The access rule is added.
Activate the access profile
After you add rules to the access profile, you can activate the access profile.
CAUTION:
If you configure a security access profile incorrectly and you activate the
access profile, you might no longer be able to access the switch’s device
UI. If that situation occurs, you must reset the switch to factory default
settings (see
Reset the switch to its factory default settings on page 377).
To activate the access profile:
1. Connect
your computer
to the same network as the switch.
You can use a WiFi or wired connection to connect your computer to the network, or
connect directly to a switch that is off-network using an Ethernet cable.