User Manual
Table Of Contents
- 24-Port and 48-Port Gigabit Ethernet PoE+ Smart Switches with 4 SFP Ports
- Contents
- 1 Get Started
- Available publications
- Switch management options and default management mode
- Manage the switch by using the device UI
- About on-network and off-network access
- Access the switch on-network and connected to the Internet
- Use se a Windows-based computer to access the switch on-network and connected to the Internet
- Use the NETGEAR Insight mobile app to discover the IP address of the switch
- Use the NETGEAR Switch Discovery Tool to discover the switch when it is connected to the Internet
- Discover the switch in a network with a DHCP server using the Smart Control Center
- Use other options to discover the switch IP address
- Access the switch on-network when you know the switch IP address
- Access the switch off-network and not connected to the Internet
- Credentials for the device UI
- Register the switch
- Change the language of the device UI
- Change the management mode of the switch
- Use the Device View of the device UI
- Configure interface settings
- Access the NETGEAR support website
- Access the user manual online
- 2 Configure System Information
- View or define system information
- Configure the IP network settings for management access
- Configure the time settings
- Configure denial of service settings
- Configure DNS settings
- Configure green Ethernet settings
- Use the Device View
- Configure Power over Ethernet
- Configure SNMP
- Configure Link Layer Discovery Protocol
- Configure a DHCP L2 relay
- Configure DHCP snooping
- Configure Dynamic ARP Inspection
- Set up PoE timer schedules
- 3 Configure Switching
- Configure the port settings and maximum frame size
- Configure link aggregation groups
- Configure VLANs
- Configure a voice VLAN
- Configure Auto-VoIP
- Configure Spanning Tree Protocol
- Configure multicast
- Manage IGMP snooping
- Configure IGMP snooping
- Configure IGMP snooping for interfaces
- View, search, or clear the IGMP snooping table
- Configure IGMP snooping for VLANs
- Modify IGMP snooping settings for a VLAN
- Disable IGMP snooping on a VLAN and remove it from the table
- Configure one or more IGMP multicast router interfaces
- Configure an IGMP multicast router VLAN
- IGMP snooping querier overview
- Configure an IGMP snooping querier
- Configure an IGMP snooping querier for VLANs
- Display the status of the IGMP snooping querier for VLANs
- Manage MLD snooping
- Enable MLD snooping
- Configure MLD snooping for interfaces
- Configure the MLD VLAN settings
- Modify the MLD snooping settings for a VLAN
- Remove MLD snooping from a VLAN
- Configure one or more MLD multicast router interfaces
- Configure an MLD multicast router VLAN
- Configure an MLD snooping querier
- Configure the MLD snooping querier VLAN settings
- Configure multicast VLAN registration
- View, search, and manage the MAC address table
- Configure Layer 2 loop protection
- 4 Configure Routing
- 5 Configure Quality of Service
- 6 Manage Device Security
- Change the device admin password for the device UI
- Manage the RADIUS settings
- Configure the TACACS+ settings
- Configure authentication lists
- Manage the Smart Control Center
- Configure management access
- Control access with profiles and rules
- Configure port authentication
- Set up traffic control
- Configure access control lists
- Use the ACL Wizard to create a simple ACL
- Configure a MAC ACL
- Configure MAC ACL rules
- Configure MAC bindings
- View or delete MAC ACL bindings in the MAC binding table
- Configure a basic or extended IPv4 ACL
- Configure rules for a basic IPv4 ACL
- Configure rules for an extended IPv4 ACL
- Configure an IPv6 ACL
- Configure rules for an IPv6 ACL
- Configure IP ACL interface bindings
- View or delete IP ACL bindings in the IP ACL binding table
- Configure VLAN ACL bindings
- 7 Monitor the Switch and the Traffic
- 8 Maintain or Troubleshoot the switch
- A Configuration Examples
- B Specifications and Default Settings
24-Port and 48-Port Gigabit Ethernet PoE+ Smart Switches with 4 SFP Ports
Configuration Examples User Manual525
9. On the Service Configuration page, select the check box next to interfaces g7 and g8 to
attach the policy to these interfaces, and then click the Apply button. (See
Configure the
DiffServ service interface on page 328.)
All UDP packet flows destined to the 192.12.2.0 network with an IP source address from the
192.12.1.0 network that include a Layer 4 Source port of 4567 and Destination port of 4568
from this switch on ports 7 and 8 are assigned to hardware queue 3.
On this network, traffic from streaming applications uses UDP port 4567 as the source and
4568 as the destination.
This real-time traffic is time sensitive, so it is assigned to a
high-priority hardware queue. By default, data traffic uses hardware queue 0, which is
designated as a best-effort queue.
Also the confirmed action on this flow is to send the packets with a committed rate of
1000000 Kbps. Packets that violate the committed rate are dropped.
802.1X access control
Local area networks (LANs) are often deployed in environments that permit unauthorized
devices to be physically attached to the LAN infrastructure, or permit unauthorized users to
attempt to access the LAN through equipment already attached. In such environments you
might want to restrict access to the services offered by the LAN to those users and devices
that are permitted to use those services.
Port-based network access control makes use of the physical characteristics of LAN
infrastructures to provide a means of authenticating and authorizing devices attached to a
LAN port with point-to-point connection characteristics. If the authentication and authorization
process fails, access control prevents access to that port. In this context, a port is a single
point of attachment to the LAN, such as a port of a MAC bridge and an association between
stations or access points in IEEE 802.1
1 wireless LANs.
The IEEE 802.11 standard describes an architectural framework within which authentication
and consequent actions take place. It also establishes the requirements for a protocol
between the authenticator (the system that passes an authentication request to the
authentication server) and the supplicant (the system that requests authentication), as well
as between the authenticator and the authentication server
.
The switch supports a guest VLAN, which allows unauthenticated users limited access to the
network resources.
Note: You can use QoS features to provide rate limiting on the guest VLAN
to limit the network resources that the guest VLAN provides.
Another 802.1X feature is the ability to configure a port to enable or disable EAPoL packet
forwarding support.
You can disable or enable the forwarding of EAPoL when 802.1X is
disabled on the device.