Do you have a question about the NETGEAR GS308T and is the answer not in the manual?
Switch type | Managed |
---|---|
Switch layer | L2 |
Quality of Service (QoS) support | Yes |
Master (outer) case width | 214 mm |
Master (outer) case height | 312 mm |
Master (outer) case length | 474 mm |
Master (outer) case weight | 6110 g |
Harmonized System (HS) code | 85176990 |
Quantity per master (outer) case | 6 pc(s) |
Package type | Box |
Package depth | 270 mm |
Package width | 226 mm |
Package height | 64 mm |
Package weight | 750 g |
Cables included | AC |
Power connector | DC-in jack |
Installed SFP modules quantity | 0 |
Basic switching RJ-45 Ethernet ports type | Gigabit Ethernet (10/100/1000) |
Basic switching RJ-45 Ethernet ports quantity | 8 |
Stackable | No |
Product color | Black |
LED indicators | Activity, Link, Power |
Country of origin | China |
10G support | - |
Multicast protocols | IGMP |
Input current | 1 A |
DC input voltage | 12 V |
MAC address table | - entries |
Overview of administrative management options for configuring, monitoring, and controlling the network.
Steps to change the switch's default IP address for remote management.
Steps to configure a computer's network settings to access the switch.
Steps to access the switch's web-based management interface using a browser.
How to apply interface settings to single or multiple ports and LAGs.
Displaying switch status and configuring basic information like IP, clock, and DNS.
Configuring network information for the switch's management interface.
Configuring settings to classify and block specific types of Denial of Service attacks.
Configuring global Power over Ethernet (PoE) settings and port-specific PoE configurations.
Setting global PoE configuration parameters for the switch.
Configuring PoE settings for individual ports, including power modes and priorities.
Defining communities that can access the switch using SNMP V1 and V2 protocols.
Configuring authentication and encryption settings for SNMPv3 users.
Specifying global LLDP and LLDP-MED settings applied to the switch.
Specifying per-interface LLDP settings for transmitting and receiving LLDP packets.
Viewing and configuring global settings for DHCP snooping to filter untrusted DHCP messages.
Viewing and configuring each port as a trusted or untrusted port for DHCP snooping.
Defining multiple timer schedules with unique names for PoE power delivery.
Viewing, configuring, and monitoring physical port information and maximum frame size.
Combining multiple Ethernet links into a single logical link for fault tolerance and load sharing.
Grouping Ethernet links to form a link aggregation group (LAG) or port channel.
Selecting ports and LAGs to be aggregated together into a link aggregation group.
Adding virtual LAN support to partition the network into logical segments.
Configuring various VLAN settings, including adding and deleting VLANs.
Configuring which ports and LAGs belong to specific VLANs.
Assigning untagged packets to a VLAN based on the source MAC address.
Configuring settings for voice VLAN to prioritize voice traffic.
Understanding and configuring STP, MSTP, and RSTP for loop elimination.
Enabling STP operation on the switch and configuring global STP settings.
Configuring Common Spanning Tree (CST) and Internal Spanning Tree settings.
Configuring CST and internal spanning tree settings on specific ports.
Creating and configuring MST instances with specific IDs, priorities, and VLAN assignments.
Configuring MST settings on specific ports, including priority and path cost.
Configuring IGMP snooping to build forwarding lists for multicast traffic.
Configuring IGMP snooping settings for individual interfaces on the switch.
Configuring IGMP snooping settings for specific VLANs on the network.
Enabling loop protection per port or globally to prevent network loops.
Configuring global settings for Layer 2 loop protection on the switch.
Viewing and configuring Layer 2 loop protection settings for individual ports.
Directly configuring switch queueing aspects for desired QoS behavior.
Configuring the same CoS trust mode settings for all CoS-configurable interfaces.
Configuring trust mode and shaping rates for one or more interfaces.
Configuring DiffServ support to classify traffic and provide QoS treatment.
Displaying DiffServ general status information and configuring administrative mode.
Adding, renaming, or deleting DiffServ classes and defining their match criteria.
Creating a new DiffServ class and defining its associated match criteria.
Associating classes with policies and defining QoS policy statements.
Creating a new DiffServ policy and defining its attributes and associated classes.
Configuring login password, RADIUS, TACACS+, and authentication lists.
Changing the login password for the default admin user of the switch.
Configuring RADIUS server settings for centralized network authentication.
Adding information about one or more RADIUS servers for network authentication.
Configuring settings for a RADIUS authentication server on the switch.
Configuring TACACS+ for centralized user management and network security.
Setting up TACACS+ for communication between the switch and the server.
Configuring TACACS+ servers for switch communication and authentication.
Configuring port-based authentication using 802.1X for network access control.
Configuring global port access control settings for 802.1X features on the switch.
Configuring 802.1X settings for a specific port, including control mode and VLAN assignment.
Configuring settings to mitigate network storms caused by excessive broadcast messages.
Locking ports to allow only specific MAC addresses for enhanced security.
Configuring port security settings for individual interfaces using dynamic or static MAC addresses.
Creating and applying access lists (ACLs) to control network resource access.
Creating a MAC ACL with a set of rules for sequential packet matching.
Defining rules for MAC-based ACLs to specify traffic forwarding or discarding criteria.
Defining rules for IP-based ACLs to specify traffic forwarding or discarding criteria.
Defining rules for basic IP ACLs to specify traffic forwarding or discarding criteria.
Defining rules for extended IP ACLs to specify traffic forwarding or discarding criteria.
Viewing information about traffic transmitted and received on the switch and its ports.
Rebooting the switch from the local browser interface.
Resetting the system configuration to factory default values, losing all changes.
Downloading system files or updating firmware using TFTP or HTTP.
Troubleshooting the switch and network using ping, traceroute, and memory dumps.
Restricting LAN access to authorized users and devices using port-based authentication.
Example configuration for 802.1X-based authentication using a RADIUS server.
Eliminating network loops and efficiently channeling VLAN traffic using MSTP.