This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
networking:switch:zyxel_gs1910 [2014/06/30 10:37] gcooper |
networking:switch:zyxel_gs1910 [2015/08/12 09:20] (current) gcooper |
||
---|---|---|---|
Line 7: | Line 7: | ||
http:// | http:// | ||
- | Support Notes: ftp:// | + | **Support Notes**: ftp:// |
+ | |||
+ | **CLI Reference**: | ||
===== Firmware Updates ===== | ===== Firmware Updates ===== | ||
Line 17: | Line 19: | ||
==== Default Login Details ==== | ==== Default Login Details ==== | ||
- | |IP Address | + | |IP Address |
- | |User Name |admin | + | |User Name |admin |
- | |Password | + | |Password |
- | |Serial Console |115200, | + | |Serial Console |115200, |
+ | |Serial Cable | ||
==== CLI Basics ==== | ==== CLI Basics ==== | ||
- | < | + | Reset to factory defaults, at boot up: |
+ | < | ||
+ | ctrl-c | ||
+ | default | ||
+ | reset | ||
</ | </ | ||
Line 69: | Line 76: | ||
:!: The default priority queue is zero (0). | :!: The default priority queue is zero (0). | ||
+ | |||
+ | ==== Show Current QoS Classifications ==== | ||
+ | |||
+ | **Web Interface -> Monitor -> QoS Statistics** | ||
==== Port-Based ==== | ==== Port-Based ==== | ||
- | :!: See the Zyxel QoS support note. | + | :!: See the Zyxel QoS support note for VLAN and port-based QoS. |
==== DSCP ==== | ==== DSCP ==== | ||
Line 101: | Line 112: | ||
**Web Interface -> Configure -> QoS -> QoS Control List** | **Web Interface -> Configure -> QoS -> QoS Control List** | ||
- | Create QoS Control List Entries to actuate the QoS classifications: | + | Create QoS Control List Entries |
+ | |||
+ | {{ : | ||
{{ : | {{ : | ||
+ | ===== Access Control Lists ===== | ||
+ | |||
+ | ==== Example Application ==== | ||
+ | |||
+ | - We have created a port-based VLAN on switch ports 1-6 to use a section of the switch as a DMZ. | ||
+ | - We have a primary Internet connection via cable modem connected to port 1. | ||
+ | - We have a server' | ||
+ | - We have a router' | ||
+ | - For security reasons, we need to limit access to the server' | ||
+ | |||
+ | ==== Create an ACL Policy ==== | ||
+ | |||
+ | :!: Here we create a policy that consists of two Access Control Entries (ACEs) and we apply the ACL policy to the port connected to the server' | ||
+ | |||
+ | :!: The order of the ACEs is important. | ||
+ | |||
+ | - The first ACE permits traffic from the IPMI device to the support providers external Internet address/ | ||
+ | - Set the ' | ||
+ | - Use a ' | ||
+ | - Set the 'Frame Type' to ' | ||
+ | - Set the destination IP address or subnet as the IPMI support provider' | ||
+ | - Set the ' | ||
+ | - The second ACE denies all other traffic from the IPMI device. | ||
+ | - Set the ' | ||
+ | - Use the same ' | ||
+ | - Set the 'Frame Type' to ' | ||
+ | - Change the ' | ||
+ | |||
+ | **Configuration -> Security -> Network -> ACL -> Access Control List -> Add** | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | {{ : | ||
+ | |||
+ | ==== Apply the ACE ==== | ||
+ | |||
+ | :!: We apply the ACL policy to the port with the IPMI device. | ||
+ | |||
+ | :!: We deny all other traffic on that port using an ACE (above), not by changing the ' | ||
+ | |||
+ | **Configuration -> Security -> Network -> ACL -> Ports** | ||
+ | |||
+ | - Enter the ID of the ACL policy you just created in the Policy ID field of the port with the IPMI device. | ||
+ | - Leave the ' | ||
+ | |||
+ | {{ : |