EasyManua.ls Logo

NETGEAR GS308T User Manual

NETGEAR GS308T
351 pages
To Next Page IconTo Next Page
To Next Page IconTo Next Page
To Previous Page IconTo Previous Page
To Previous Page IconTo Previous Page
Page #327 background imageLoading...
Page #327 background image
Configuration Examples
327
S350 Series 8-Port Gigabit Ethernet Smart Managed Pro Switch Models GS308T and GS310TP
Access Control Lists (ACLs)
ACLs ensure that only authorized users can access specific resources while blocking off any
unwarranted attempts to reach network resources.
ACLs are used to provide traffic flow control, restrict contents of routing updates, decide
which types of traffic are forwarded or blocked, and provide security for the network. ACLs
are normally used in firewall routers that are positioned between the internal network and an
external network, such as the Internet. They can also be used on a router positioned between
two parts of the network to control the traffic entering or exiting a specific part of the internal
network. The added packet processing required by the ACL feature does not affect switch
performance. That is, ACL processing occurs at wire speed.
Access lists are sequential collections of permit and deny conditions. This collection of
conditions, known as the filtering criteria, is applied to each packet that is processed by the
switch or the router. The forwarding or dropping of a packet is based on whether or not the
packet matches the specified criteria.
Traffic filtering requires the following two basic steps:
1. Create an access list definition.
The access list definition includes rules that specify whether traffic matching the criteria is
forwarded normally or discarded. Additionally, you can assign traffic that matches the
criteria to a particular queue or redirect the traffic to a particular port. A default deny all
rule is the last rule of every list.
2. Apply the access list to an interface in the inbound direction.
The switch allow ACLs to be bound to physical ports and LAGs. The switch software
supports MAC ACLs and IP ACLs.
MAC ACL Sample Configuration
The following example shows how to create a MAC-based ACL that permits Ethernet traffic
from the Sales department on specified ports and denies all other traffic on those ports.
1. On the MAC ACL page, create an ACL with the name Sales_ACL for the Sales
department of your network (see
Configure a Basic MAC ACL on page 250).
By default, this ACL is bound on the inbound direction, which means that the switch
examines traffic as it enters the port.
2. On the MAC Rules page, create a rule for the Sales_ACL with the following settings:
• Sequence Number. 1
• Action. Permit
• Assign Queue ID. 0
• Match Every. False
• CoS. 0
• Destination MAC. 01:02:1A:BC:DE:EF

Table of Contents

Other manuals for NETGEAR GS308T

Question and Answer IconNeed help?

Do you have a question about the NETGEAR GS308T and is the answer not in the manual?

NETGEAR GS308T Specifications

General IconGeneral
Switch typeManaged
Switch layerL2
Quality of Service (QoS) supportYes
Master (outer) case width214 mm
Master (outer) case height312 mm
Master (outer) case length474 mm
Master (outer) case weight6110 g
Harmonized System (HS) code85176990
Quantity per master (outer) case6 pc(s)
Package typeBox
Package depth270 mm
Package width226 mm
Package height64 mm
Package weight750 g
Cables includedAC
Power connectorDC-in jack
Installed SFP modules quantity0
Basic switching RJ-45 Ethernet ports typeGigabit Ethernet (10/100/1000)
Basic switching RJ-45 Ethernet ports quantity8
StackableNo
Product colorBlack
LED indicatorsActivity, Link, Power
Country of originChina
10G support-
Multicast protocolsIGMP
Input current1 A
DC input voltage12 V
MAC address table- entries

Summary

Get Started

Switch Management Interface Overview

Overview of administrative management options for configuring, monitoring, and controlling the network.

Change the Default IP Address of the Switch

Steps to change the switch's default IP address for remote management.

Configure the Network Settings on Your Computer

Steps to configure a computer's network settings to access the switch.

Access the Local Browser Interface

Steps to access the switch's web-based management interface using a browser.

Configure Interface Settings

How to apply interface settings to single or multiple ports and LAGs.

Configure System Information

View and Configure the Switch Management Settings

Displaying switch status and configuring basic information like IP, clock, and DNS.

Configure the IP Network and VLAN Settings for the Local Browser Interface

Configuring network information for the switch's management interface.

Configure Denial of Service Settings

Configuring settings to classify and block specific types of Denial of Service attacks.

Configure PoE

Configuring global Power over Ethernet (PoE) settings and port-specific PoE configurations.

Configure the Global PoE Settings

Setting global PoE configuration parameters for the switch.

Configure the PoE Port Settings

Configuring PoE settings for individual ports, including power modes and priorities.

Configure SNMP

Configure the SNMPv1/v2 Community

Defining communities that can access the switch using SNMP V1 and V2 protocols.

Configure SNMP V3 Users

Configuring authentication and encryption settings for SNMPv3 users.

Configure LLDP

Configure LLDP Global Settings

Specifying global LLDP and LLDP-MED settings applied to the switch.

Configure LLDP Port Settings

Specifying per-interface LLDP settings for transmitting and receiving LLDP packets.

Configure DHCP Snooping

Configure the Global DHCP Snooping Settings

Viewing and configuring global settings for DHCP snooping to filter untrusted DHCP messages.

Configure DHCP Snooping Interface Settings

Viewing and configuring each port as a trusted or untrusted port for DHCP snooping.

Set Up PoE Timer Schedules

Create a PoE Timer Schedule

Defining multiple timer schedules with unique names for PoE power delivery.

Configure Switching

Configure the Port Settings and Maximum Frame Size

Viewing, configuring, and monitoring physical port information and maximum frame size.

Configure Link Aggregation Groups

Combining multiple Ethernet links into a single logical link for fault tolerance and load sharing.

Configure LAG Settings

Grouping Ethernet links to form a link aggregation group (LAG) or port channel.

Configure LAG Membership

Selecting ports and LAGs to be aggregated together into a link aggregation group.

Configure VLANs

Adding virtual LAN support to partition the network into logical segments.

Configure VLAN Settings

Configuring various VLAN settings, including adding and deleting VLANs.

Configure VLAN Membership

Configuring which ports and LAGs belong to specific VLANs.

Configure a MAC-Based VLAN

Assigning untagged packets to a VLAN based on the source MAC address.

Configure a Voice VLAN

Configuring settings for voice VLAN to prioritize voice traffic.

Configure Spanning Tree Protocol

Understanding and configuring STP, MSTP, and RSTP for loop elimination.

Configure STP Settings

Enabling STP operation on the switch and configuring global STP settings.

Configure CST Settings

Configuring Common Spanning Tree (CST) and Internal Spanning Tree settings.

Configure CST Port Settings

Configuring CST and internal spanning tree settings on specific ports.

Configure an MST Instance

Creating and configuring MST instances with specific IDs, priorities, and VLAN assignments.

Configure MST Port Settings

Configuring MST settings on specific ports, including priority and path cost.

Configure IGMP Snooping

Configuring IGMP snooping to build forwarding lists for multicast traffic.

Configure IGMP Snooping for Interfaces

Configuring IGMP snooping settings for individual interfaces on the switch.

Configure IGMP Snooping for VLANs

Configuring IGMP snooping settings for specific VLANs on the network.

Configure Layer 2 Loop Protection

Enabling loop protection per port or globally to prevent network loops.

Configure Global Layer 2 Loop Protection

Configuring global settings for Layer 2 loop protection on the switch.

View and Configure Layer 2 Loop Protection on a Port

Viewing and configuring Layer 2 loop protection settings for individual ports.

Configure Quality of Service

Manage Class of Service

Directly configuring switch queueing aspects for desired QoS behavior.

Configure Global CoS Settings

Configuring the same CoS trust mode settings for all CoS-configurable interfaces.

Configure CoS Interface Settings for an Interface

Configuring trust mode and shaping rates for one or more interfaces.

Manage Differentiated Services

Configuring DiffServ support to classify traffic and provide QoS treatment.

Configure and Display Global DiffServ Settings

Displaying DiffServ general status information and configuring administrative mode.

Configure a DiffServ Class

Adding, renaming, or deleting DiffServ classes and defining their match criteria.

Add and Configure a DiffServ Class

Creating a new DiffServ class and defining its associated match criteria.

Configure a DiffServ Policy

Associating classes with policies and defining QoS policy statements.

Create and Configure a DiffServ Policy

Creating a new DiffServ policy and defining its attributes and associated classes.

Manage Device Security

Configure the Management Security Settings

Configuring login password, RADIUS, TACACS+, and authentication lists.

Change the Password for the Local Browser Interface

Changing the login password for the default admin user of the switch.

Manage the RADIUS Settings

Configuring RADIUS server settings for centralized network authentication.

Configure the Global RADIUS Server Settings

Adding information about one or more RADIUS servers for network authentication.

Configure a RADIUS Authentication Server on the Switch

Configuring settings for a RADIUS authentication server on the switch.

Configure TACACS+

Configuring TACACS+ for centralized user management and network security.

Configure the Global TACACS+ Settings

Setting up TACACS+ for communication between the switch and the server.

Configure a TACACS+ Server on the Switch

Configuring TACACS+ servers for switch communication and authentication.

Configure Port Authentication

Configuring port-based authentication using 802.1X for network access control.

Configure Global 802.1X Settings

Configuring global port access control settings for 802.1X features on the switch.

Configure 802.1X Settings for a Port

Configuring 802.1X settings for a specific port, including control mode and VLAN assignment.

Set Up Traffic Control

Configure Storm Control Settings

Configuring settings to mitigate network storms caused by excessive broadcast messages.

Manage Port Security

Locking ports to allow only specific MAC addresses for enhanced security.

Configure a Port Security Interface

Configuring port security settings for individual interfaces using dynamic or static MAC addresses.

Configure Access Control Lists

Creating and applying access lists (ACLs) to control network resource access.

Configure a Basic MAC ACL

Creating a MAC ACL with a set of rules for sequential packet matching.

Configure MAC ACL Rules

Defining rules for MAC-based ACLs to specify traffic forwarding or discarding criteria.

Configure a Basic or Extended IP ACL

Defining rules for IP-based ACLs to specify traffic forwarding or discarding criteria.

Configure Rules for a Basic IP ACL

Defining rules for basic IP ACLs to specify traffic forwarding or discarding criteria.

Configure Rules for an Extended IP ACL

Defining rules for extended IP ACLs to specify traffic forwarding or discarding criteria.

Monitor the System

Monitor the Switch and the Ports

Viewing information about traffic transmitted and received on the switch and its ports.

Maintenance

Reboot the Switch

Rebooting the switch from the local browser interface.

Reset the Switch to Its Factory Default Settings

Resetting the system configuration to factory default values, losing all changes.

Download a File to the Switch or Update the Firmware

Downloading system files or updating firmware using TFTP or HTTP.

Perform Diagnostics and Troubleshooting

Troubleshooting the switch and network using ping, traceroute, and memory dumps.

Configuration Examples

802.1X Access Control

Restricting LAN access to authorized users and devices using port-based authentication.

802.1X Example Configuration

Example configuration for 802.1X-based authentication using a RADIUS server.

Multiple Spanning Tree Protocol

Eliminating network loops and efficiently channeling VLAN traffic using MSTP.

Related product manuals