Release Date:
February 12, 2026
This
firmware supports the GSM4230P, GSM4230PX, GSM4230UP, GSM4248P,
GSM4248PX, and GSM4248UX models.
Enhancements:
The AV UI provides the following enhancements:
- Support
for the Default profile with IGMP Plus enabled.
- Updated
the Data profile to disable IGMP.
- Updated
the Audio Basalte Multiroom profile to disable
IGMP and MLD snooping.
- Updated
the Audio Dante profile to remove storm-control for broadcast traffic.
- Updated
the Lighting profile to remove storm-control for broadcast traffic.
- Updated
the G&D KVM-over-IP profile and applied MAC filtering on trunk and LAG
interfaces.
- Removed
“cos queue strict” configuration from global QoS settings.
- Changed the default AV UI color placeholder to #00FF00
when you create a new profile.
Bug Fixes:
This firmware addresses the following bugs:
- Fixes
the issue where downloading a configuration file with a non-ASCII
character in port description to the switch fails. [CE-7073]
- Fixes
the issue where NET-BLOCK ACL allows IGMP query packets to receive on a
port and process. [CE-6990]
- Fixes
the issue where SNMP traps are not sent after switch is rebooted.
[CE-6943]
- Fixes the issue where switch is configured as the gPTP GM and advertise Clock Class capability as 255.
[MS-5169]
- Fixes
the issue where multicast entries are not learnt when MLD Plus is disabled
on a VLAN. [MS-5040]
- Fixes
the issue that the Rest API script is rejected if you use the Linux
platform. [CE-7454]
- Fixes
the issues that the Rest API token does not work after 24 hours. [CE-7418]
- Fixes
the issue that the Rest API is rejected with other admin users. [CE-7351]
- Fixes
the issue that flow control does not display in the API response.
[CE-7292]
Known Issues:
This firmware contains the following known issues:
- This
firmware includes a configuration migration process that transitions
default web browser protocol from HTTP to HTTPS. When you upgrade to this
firmware and import an older configuration with HTTPS disabled, HTTPS
becomes enabled.
Workaround:
Reconfigure the web browser protocol settings manually after you perform a
firmware upgrade or import an older configuration
- During
your initial log in, you must set up a password to access the switch.
However, if you access the main UI before you set up a password and
simultaneously set the password in the AV UI, the switch console might
lock for up to 15 minutes.
Workaround: Complete
the password setup in only one GUI interface to avoid this lock up issue.
- If you
upload only the private key or the certificate before you enable HTTPS,
the system enables the HTTPS service but it fails
to operate correctly because the configuration is incomplete. A factory
reset does not fix this issue.
Workaround:
Ensure both the private key and certificate are fully uploaded before you
enable HTTPS. If the issue still occurs, remove the incomplete HTTPS-related
private key or certificate, and disable HTTPS before reconfiguring.
Warnings:
Read and follow these warnings before updating your
firmware:
- SNTP is
deprecated from firmware version 13.0.5.10 onwards and NTP is introduced.
Configure an NTP server in your network. Remove SNTP related settings from
the configuration file on firmware version 13.0.4.x before you apply it to
the switch running firmware version 13.0.5.x.
- HTTPS is
set to the default web browser protocol from firmware version 13.0.5.20
and newer versions. The default certificate is self-signed, so you might
encounter a browser warning when you log in. To avoid this warning, you
can download your own certificate issued by a trusted Certificate
Authority (CA).
General Information:
- The boot
code remains at the existing version 1.0.0.11 in this switch firmware.
- The
process of upgrading the firmware and boot code takes about three minutes.
Apply the “update bootcode” command from the
command line interface. Do not switch off or restart the device during the
upgrade process.
- AppMgr is upgraded to version 1.0.5.32 in this switch
firmware.
- Insight
and Engage/AV UI are mutually exclusive. This
means you can only use one of these options to configure and manage the
switch, not both.
- If the
encrypted password in the configuration file does not adhere to the
NETGEAR password policy, when the configuration file is loaded on the
firmware version 13.0.5.16 or later, you must create a new password during
the initial login.
Download Link: https://www.downloads.netgear.com/files/GDC/M4250W2/GSM4230xx_GSM4248xx_V13.0.5.24.zip
Firmware Checksum Details
File Name: M4250H-v13.0.5.24.stk
MD5: AA2033DF3BC7A6B3B47E516DE89EABEB
SHA-256: 2728255d0dcc4ea1de74f56302ae8b067b352c70b5e97d79ccebbce0f6cb0737
Firmware Update Instructions:
To update
your product’s firmware, follow the instructions in your product’s user manual.
To find your user manual, visit https://www.netgear.com/support/,
enter your model number in the search box, and click the Documentation button
on the product page.