User Tools

Site Tools


networking:switch:zyxel_gs1910

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
networking:switch:zyxel_gs1910 [2014/09/22 17:29]
gcooper
networking:switch:zyxel_gs1910 [2015/08/12 09:20] (current)
gcooper
Line 7: Line 7:
 http://www.zyxel.com/us/en/products_services/xgs1910_gs1910_series.shtml?t=p http://www.zyxel.com/us/en/products_services/xgs1910_gs1910_series.shtml?t=p
  
-Support Notes: ftp://ftp2.zyxel.com/GS1910-24HP/support_note/GS1910-24HP_V1.00.zip+**Support Notes**: ftp://ftp2.zyxel.com/GS1910-24HP/support_note/GS1910-24HP_V1.00.zip 
 + 
 +**CLI Reference**: ftp://ftp.zyxel.com/XS3900-48F/cli_reference_guide/XS3900-48F_1.pdf
  
 ===== Firmware Updates ===== ===== Firmware Updates =====
Line 17: Line 19:
 ==== Default Login Details ==== ==== Default Login Details ====
  
-|IP Address     |http://192.168.1.1           +|IP Address     |http://192.168.1.1                                              
-|User Name      |admin                        +|User Name      |admin                                                           
-|Password       |1234                         +|Password       |1234                                                            
-|Serial Console |115200,N,8,1,No flow control |+|Serial Console |115200,N,8,1,No flow control                                    | 
 +|Serial Cable   |9-pin straight through, USB serial adapter + USB extension only |
  
 ==== CLI Basics ==== ==== CLI Basics ====
  
-<file>+Reset to factory defaults, at boot up:
  
 +<file>
 +ctrl-c
 +default
 +reset
 </file> </file>
  
Line 124: Line 131:
  
 :!: Here we create a policy that consists of two Access Control Entries (ACEs) and we apply the ACL policy to the port connected to the server's IPMI interface. :!: Here we create a policy that consists of two Access Control Entries (ACEs) and we apply the ACL policy to the port connected to the server's IPMI interface.
 +
 +:!: The order of the ACEs is important.
  
   - The first ACE permits traffic from the IPMI device to the support providers external Internet address/subnet.   - The first ACE permits traffic from the IPMI device to the support providers external Internet address/subnet.
     - Set the 'Policy Filter' to 'Specific'     - Set the 'Policy Filter' to 'Specific'
     - Use a 'Policy Value' of 1 or another unused ID number (just not '0' zero).     - Use a 'Policy Value' of 1 or another unused ID number (just not '0' zero).
-    - Set the 'Frame Type' to 'IPV4+    - Set the 'Frame Type' to 'IPv4' 
-    - Set the 'Action' to 'permit'.+    - Set the destination IP address or subnet as the IPMI support provider's external IP address. 
 +    - Set the 'Action' to 'Permit'.
   - The second ACE denies all other traffic from the IPMI device.   - The second ACE denies all other traffic from the IPMI device.
     - Set the 'Policy Filter' to 'Specific'     - Set the 'Policy Filter' to 'Specific'
     - Use the same 'Policy Value' as in ACE #1.     - Use the same 'Policy Value' as in ACE #1.
-    - Set the 'Frame Type' to 'IPV4+    - Set the 'Frame Type' to 'IPv4
-    - Change the 'Action' to 'deny'.+    - Change the 'Action' to 'Deny'.
  
 **Configuration -> Security -> Network -> ACL -> Access Control List -> Add** **Configuration -> Security -> Network -> ACL -> Access Control List -> Add**
  
-{{ :networking:switch:zyxel_create_ace.png?direct&750 |}}+{{ :networking:switch:zyxel_create_ace.png?direct&650 |}}
  
-{{ :networking:switch:zyxel_create_ace_2.png?direct&750 |}}+{{ :networking:switch:zyxel_create_ace_2.png?direct&650 |}}
  
 ==== Apply the ACE ==== ==== Apply the ACE ====
  
-  - We apply the ACE to the port with the IPMI device.+:!: We apply the ACL policy to the port with the IPMI device.
  
 :!: We deny all other traffic on that port using an ACE (above), not by changing the 'Action' on the Ports page.  That doesn't seem to work as desired. :!: We deny all other traffic on that port using an ACE (above), not by changing the 'Action' on the Ports page.  That doesn't seem to work as desired.
Line 153: Line 163:
   - Leave the 'Action' as 'Permit'.   - Leave the 'Action' as 'Permit'.
  
-{{ :networking:switch:zyxel_apply_ace.png?direct&750 |}}+{{ :networking:switch:zyxel_apply_ace.png?direct&700 |}}
networking/switch/zyxel_gs1910.1411428591.txt.gz · Last modified: 2014/09/22 17:29 by gcooper