NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.

Forum Discussion

burgler2112's avatar
burgler2112
Aspirant
Apr 24, 2025

Re: Unable to sign into GS308E

I'm having some issues with this product.  I recently purchased it and set it up last week.  But as soon as I set it up via the admin page and enable Advance 802.1Q VLANs, then I'm no longer able to access the admin page.  

I have the correct IP address as I have it assigned a static address via my PFSense box.  I can see it active via PFSense, but I cannot reach the admin page.

The switch does not appear when I use the NETGEAR Discovery Tool either.  I have a GS305E further along in my network and that appears in the Discovery Tool and is reachable via the assigned IP address.  

 

I know the switch is working, as I the IP cameras I have hooked into the port for my camera network are working, as are other segregated networks.  I just cannot reach the switch to do any modifications to my setup.

 

If I do a factory reset, I'm able to reach the switch and redo the setup, but once I do, I can no longer reach the admin page.

 

Any ideas?

10 Replies

  • schumaku's avatar
    schumaku
    Guru - Experienced User

    burgler2112 wrote:

    I know the switch is working, as I the IP cameras I have hooked into the port for my camera network are working, as are other segregated networks.  I just cannot reach the switch to do any modifications to my setup.

     

    If I do a factory reset, I'm able to reach the switch and redo the setup, but once I do, I can no longer reach the admin page.


    A little bit thin details to help. Could be a VLAN config issue, or a problem with a an IP address in use more than once on your network, or tricky error on the switch static IP config....

     

    Hope you have not missed that these switches need to bo operated on a flat IP network, since a tagged management subnet can't be configured and used.

     

    Some screenshots of your pfsense and the switches (working and non-working), and some network design plans available? 

    • burgler2112's avatar
      burgler2112
      Aspirant

      Hi, thanks so much for getting back to me!

      I'm a bit of a novice on this, so I'm not quite sure what the "Flat IP Network" is referencing, but I will try and look into that after I post this response.

       

      I'm attaching a few screenshots, and please let me know what else you would like to see on the PFsense side (or anything else).

      2 of the shots are examples of me being able to access the web interface of 2 existing switches on my network.

      The PFSense screenshot is of my "trunk line" DHCP leases showing that the IP address that I can't reach (10.27.99.204) is not being used by another device on my network.

      As an aside, while troubleshooting this I discovered that my original netgear smart switch (the GS108Ev3 at 10.27.99.200) is also not reachable via the web interface, but that is the very first switch in my network and has been running for a few years as I expect it to.

      Both these switches are showing as "Idle/Offline" via the PFsense screenshot, but again, I know they are online and working, as my network is up and running.

      I'm also attaching 2 more screenshots of my VLAN setup via PFsense.

       

       

       

       

       

      • burgler2112's avatar
        burgler2112
        Aspirant

        Just a couple more details.  I connected my laptop directly to the switch on 2 different ports.  One that is setup for my VLAN 40 and one that is my "trunk line" 99.

         

        The VLAN 40 connection found 2 of my other switches via the Netgear Discovery Tool, but the 99 connection only found 1 of them.  Seems odd, but figured I'd share.

         

         

         

  • schumaku's avatar
    schumaku
    Guru - Experienced User

    Now where we can start to understand your network a little bit more (I think) ...

     


    burgler2112 wrote:

    If I do a factory reset, I'm able to reach the switch and redo the setup, but once I do, I can no longer reach the admin page.


    A good point to continue might be-which- devices will be connected to the GS308E, -what- and -how- you are going to re-configure your switch(es) repeatedly in 802.1q.

     

    ---

     

    One point I don't yet understand: These two ports on your security appliance for connecting the VLAN 10, 20, 30, and 40 - are these [T]agged or [U]ntagged?

     

    This looks to me (on the first view) like four ports [U]ntagged, so access ports for each of the four VLANs.

    ---

    Start with the default config om the GS308E, and set it to 802.1q mode.

    Add VLAN 10, 20, 30, and 40.

    Go the VLAN Membership, and select the respective VLAN, start with 10.

    User Group Operation: [Tag All], then [Apply].

    Repeat for VLAN 20, 30, and 40.

     

     

     

     

     

     

     

    • schumaku's avatar
      schumaku
      Guru - Experienced User

      While talking: The reason you are able to discover the two GS305E and GS308E from the VLAN 40 (from an IP address in the ,40.x range) is that somehow any other switch and/or what is defined as VLAN 40 on your security appliance is somehow misconfigured (or completely unconfigured, or simply cross connected).

       

      The discovery utility won't show any GS305E or GS308E(PP) model (in my testing) if connected to a different VLAN -and- IP subnet - so no NSDP is used anymore, it's pure SSDP. Some older GS1xxE(xx) might be discovered, because these are sill supporting NSDP and have never been updated. 

    • burgler2112's avatar
      burgler2112
      Aspirant

      One point I don't yet understand: These two ports on your security appliance for connecting the VLAN 10, 20, 30, and 40 - are these [T]agged or [U]ntagged?

      I will use VLAN10 as an example, but all the VLANs are set up in the same basic fashion.

      On one of my switches I have VLAN10 assigned to Port 1.  I have VLAN10 as “Untagged” on Port 1, but tagged on port’s 3, 7 and 8.  The thought process here was that on port 1, the only thing that would be going through that port would be items that should be on VLAN 10.  

      Port's 3, 7, and 8 would be carrying all data via 99 that would need to be segregated elsewhere.

      Here are some screenshots of the setup on one of my other switches:

       

       

       

       

       

    • burgler2112's avatar
      burgler2112
      Aspirant

      A good point to continue might be-which- devices will be connected to the GS308E, -what- and -how- you are going to re-configure your switch(es) repeatedly in 802.1q.

      One other thing in regards to this, I don't want to have to reconfigure the switch repeatedly.  I really wanted to just set it up and forget about it, as I did with my original switches.  I just happened to check the new switch after I had done the setup and realized I could no longer access the web interface.  And that led me down the rabbit hole of factory resets and troubleshooting and this forum.  LOL.

      Had I not tried to access the web interface to double check my setup last week, we wouldn't be here right now!

      • schumaku's avatar
        schumaku
        Guru - Experienced User

        Pert of the rabbit hole? Since (most of) these Plus switches don't support any kind of management VLAN, you can't have multiple VLANs with DHCP active, untagged frames using the switch DHCP client can (and will!) receive a device config for a random IP subnet - in an unintended way.

         

        Foer example, in case four of the ports on your GS308E are configured for PVID 10, 20, 30, and 40 (to associate incoming frames to the appropriate VLAN) and each as [U]ntagged fro VLAN 10, and so on - all- traffic is visible to the Plus switch uC. While assuming a correct config is in place eg. the DHCP request will go to the intended VLAN, the uC with it's IP stack, DCHP client, as well as the ICMP snooping, which is aloso handled by that very same uC. I -assume- you have these four security device Ethernet ports connected to the same GS308E (permitting the VLAN config is correct), for example the DCHP server for the relevant VLAN (eg, 10, 20, 30, or 40) will receive all DHCP request traffic. So the DHCP server for these subnets will apparently "leak",

NETGEAR Academy

Boost your skills with the Netgear Academy - Get trained, certified and stay ahead with the latest Netgear technology! 

Join Us!

ProSupport for Business

Comprehensive support plans for maximum network uptime and business peace of mind.

 

Learn More