NETGEAR is aware of a growing number of phone and online scams. To learn how to stay safe click here.
Security
82 TopicsRequest: List of Products That Perform Cryptographic Key Provisioning
We are reviewing your networking products for internal compliance purposes. Could you please confirm which of your hardware-based products (e.g., switches, routers, relays, gateways) include any of the following cryptographic functions: Provisioning or distribution of encryption keys to other devices Acting as a MACsec Key Server (e.g., providing CAKs/SAKs to peers via MKA) Providing IPsec/IKEv2 key exchange for other systems Embedded EAP/PKI certificate provisioning or CA functions Managing network-wide encryption policies or certificate trust for other devices We are not asking about encryption used only for login/authentication (e.g., HTTPS, SNMPv3, 802.1X), or encryption used solely for the unit’s own interfaces. This request is limited to cases where the product provides or manages encryption on behalf of other devices. If possible, please provide a list or matrix identifying which models include any of the above features. Any documentation that describes these capabilities would also be appreciated. Thank you for your support.15Views0likes0CommentsShare internet between two Vlans on a netgear GS724TV4
Hi So I been trying for altmost 2 days to set up my netgear GS724TV4, which is a managed layer3 switch, but does not have capability to create a DHCP server. I am running a webserver and email server, and would like to seperate this from my private network, in case of hacking. So I though I would make two Vlan, lets say vlan1 for private and vlan100 for the server. ISP fiber to my house -> deco X10 setup (internet Vlan id 101 - 802.1q tag) -> unmanaged layer3 switch that provides my netgear with 2 patch cabels in port12 and 13 I have attached a screenshot of my setup and here is some info: port 2 and 3 my private network. port 12 and 13 - Conntect to an unmanaged switch, where my internet patch-cable is connected. port 24 - my server Since I dont understand inter-routing my idea was to have 2 vlans, where vlan1 had port 1-12 untagged and vlan2 had 13-24 untagged, and both vlans would get internet via port 12 or 13. Could somebody tell me if and how to set this up? Help is greatly appriciated186Views0likes1CommentConfigure SSL/HTTPS for GS724TPV2 and GS752TPv3
Hi All, I am looking to enable HTTPS for all my Netgear Switches (GS724TPV2 and GS752TPV3). But I cannot import the self-signed certificate that I have already got available. I feel like I'm missing a vital step, and was wondering if someone is able to help me on this? Looking forward to hearing some advice. Cheers!1KViews0likes5CommentsManaged switch - prohibit the connection of certain IP addresses to other IP addresses
Hi all ! I was wondering, with managed switches, if we are able to specify which IP adress should be allowed to connect to another. For example : 192.168.1.xxx is only allowed to be reached by *192.168.1.yyy* If I can do this using MAC adresses, it would be even more interesting. Thanks !Solved1.4KViews0likes3CommentsChanging Management VLAN on GS724TPv.2 and accessing it from local computer on LAN
I am needing some help with changing the default management VLAN on our switches and being able to access them from my desktop on our LAN. I've followed the solution for the topic here titled Howto change management vlanid on gs724T to no avail. Once I make the suggested changes, I loss any connectivity to the switch from my desktop and am forced to factory reset it. Can anyone help me with the complete required steps to make this a reality? I have a test environment setup in which to practice and learn on. I am also very familiar with setting up VLANs on these Netgear switches. Looking forward to any and all assistance I can get. Thank you.1.5KViews0likes3CommentsGSM7224v2h2 Vulnerabilities
We've had a vulnerability scan done and our GSM7224v2h2 (M4100-26G) switches are reporting the following vulnerabilities: ICMP Timestamp Reply Information Disclosure TCP timestamps Weak Host Key Algorithm(s) (SSH) Weak Key Exchange (KEX) Algorithm(s) Supported (SSH) Weak MAC Algorithm(s) Supported (SSH) jQuery < 1.6.3 XSS Vulnerability jQuery < 1.9.0 XSS Vulnerability We're on the latest advertised firmware (10.0.2.35), but this doesn't seem to address any of these issues. For TCP Timestamps, these need to be disabled, we can't just create overrides for compliance. I can't locate anywhere to disable these within either SSH or the web interface. For the SSH keys, I've tried deleting and generating nex keys, but they are still weak algorithms For jQuery, I can't find any way to update past the version of this firmware. Does anyone have any recommendation to remediate these vulnerabilities?541Views0likes0CommentsGS305EP and 802.1X access control
Hello, I'm trying to configure 802.1X access control on a GS305EP switch. According to this page it should be available. But the configuration page looks completely different than the screenshots in the explanation page. I tried looking for it, but can't seem to find the 802.1X access control settings. Firmware version V1.0.0.10.Solved1.9KViews0likes5Comments