User Manual
Table Of Contents
- 24-Port and 48-Port Gigabit Ethernet PoE+ Smart Switches with 4 SFP Ports
- Contents
- 1 Get Started
- Available publications
- Switch management options and default management mode
- Manage the switch by using the device UI
- About on-network and off-network access
- Access the switch on-network and connected to the Internet
- Use se a Windows-based computer to access the switch on-network and connected to the Internet
- Use the NETGEAR Insight mobile app to discover the IP address of the switch
- Use the NETGEAR Switch Discovery Tool to discover the switch when it is connected to the Internet
- Discover the switch in a network with a DHCP server using the Smart Control Center
- Use other options to discover the switch IP address
- Access the switch on-network when you know the switch IP address
- Access the switch off-network and not connected to the Internet
- Credentials for the device UI
- Register the switch
- Change the language of the device UI
- Change the management mode of the switch
- Use the Device View of the device UI
- Configure interface settings
- Access the NETGEAR support website
- Access the user manual online
- 2 Configure System Information
- View or define system information
- Configure the IP network settings for management access
- Configure the time settings
- Configure denial of service settings
- Configure DNS settings
- Configure green Ethernet settings
- Use the Device View
- Configure Power over Ethernet
- Configure SNMP
- Configure Link Layer Discovery Protocol
- Configure a DHCP L2 relay
- Configure DHCP snooping
- Configure Dynamic ARP Inspection
- Set up PoE timer schedules
- 3 Configure Switching
- Configure the port settings and maximum frame size
- Configure link aggregation groups
- Configure VLANs
- Configure a voice VLAN
- Configure Auto-VoIP
- Configure Spanning Tree Protocol
- Configure multicast
- Manage IGMP snooping
- Configure IGMP snooping
- Configure IGMP snooping for interfaces
- View, search, or clear the IGMP snooping table
- Configure IGMP snooping for VLANs
- Modify IGMP snooping settings for a VLAN
- Disable IGMP snooping on a VLAN and remove it from the table
- Configure one or more IGMP multicast router interfaces
- Configure an IGMP multicast router VLAN
- IGMP snooping querier overview
- Configure an IGMP snooping querier
- Configure an IGMP snooping querier for VLANs
- Display the status of the IGMP snooping querier for VLANs
- Manage MLD snooping
- Enable MLD snooping
- Configure MLD snooping for interfaces
- Configure the MLD VLAN settings
- Modify the MLD snooping settings for a VLAN
- Remove MLD snooping from a VLAN
- Configure one or more MLD multicast router interfaces
- Configure an MLD multicast router VLAN
- Configure an MLD snooping querier
- Configure the MLD snooping querier VLAN settings
- Configure multicast VLAN registration
- View, search, and manage the MAC address table
- Configure Layer 2 loop protection
- 4 Configure Routing
- 5 Configure Quality of Service
- 6 Manage Device Security
- Change the device admin password for the device UI
- Manage the RADIUS settings
- Configure the TACACS+ settings
- Configure authentication lists
- Manage the Smart Control Center
- Configure management access
- Control access with profiles and rules
- Configure port authentication
- Set up traffic control
- Configure access control lists
- Use the ACL Wizard to create a simple ACL
- Configure a MAC ACL
- Configure MAC ACL rules
- Configure MAC bindings
- View or delete MAC ACL bindings in the MAC binding table
- Configure a basic or extended IPv4 ACL
- Configure rules for a basic IPv4 ACL
- Configure rules for an extended IPv4 ACL
- Configure an IPv6 ACL
- Configure rules for an IPv6 ACL
- Configure IP ACL interface bindings
- View or delete IP ACL bindings in the IP ACL binding table
- Configure VLAN ACL bindings
- 7 Monitor the Switch and the Traffic
- 8 Maintain or Troubleshoot the switch
- A Configuration Examples
- B Specifications and Default Settings
24-Port and 48-Port Gigabit Ethernet PoE+ Smart Switches with 4 SFP Ports
Manage Device Security User Manual430
- If you select the Port radio button, you can either enter the port number yourself
or select one of the following protocols from the menu:
• The source IP
TCP port protocols are domain, echo, ftp, ftpdata, www-http,
smtp, telnet, pop2, pop3, and bgp.
• The source IP UDP port protocols are domain, echo, snmp, ntp, rip, time,
who, and tftp.
Each of these values translates into its equivalent port number, which is used as
both the start and end of the port range.
Select Other from the menu to enter a port number
. If you select Other from the
menu but leave the field blank, it means any.
The relevant matching conditions for L4 port numbers is equal. That is, the IP ACL
rule matches only if the Layer 4 source port number is equal to the specified port
number or port protocol.
- If you select the Range radio button, the IP
ACL rule matches only if the Layer 4
source port number is within the specified port range. The starting port, ending
port, and all ports in between are a part of the Layer 4 port range.
The Start Port and End Port fields identify the first and last ports that are part of
the port range.
The values can range from 0 to 65535.
You can either enter the port range yourself or select one of the following
protocols from the menu:
• The destination IP TCP port protocols are domain, echo, ftp, ftpdata,
www-http, smtp, telnet, pop2, pop3, and bgp.
• The destination IP UDP port protocols are domain, echo, snmp, ntp, rip,
time, who, and tftp.
Each of these values translates into its equivalent port number, which is used as
both the start and end of the port range.
Select Other from the menu to enter a port number
. If you select Other from the
menu but leave the field blank, it means any.
The wildcard mask determines which bits are used and which bits are ignored. A
wildcard mask of 0.0.0.0 indicates that none of the bits are important. A wildcard
of 255.255.255.255 indicates that all of the bits are important.
• Dst. In the Dst field, enter a destination IP address, using dotted-decimal notation, to
be compared to a packet’
s destination IP address as a match criterion for the selected
IP ACL rule:
- If you select the IP Address radio button, enter an IP address with a relevant
wildcard mask to apply this criteria. If this field is left empty
, it means any.
- If you select the Host radio button, the wildcard mask is configured as 0.0.0.0. If
this field is left empty
, it means any.