====== Zyxel GS1910 Ethernet Switch ======
**Web Interface**: http://192.168.0.250
FIXME
http://www.zyxel.com/us/en/products_services/xgs1910_gs1910_series.shtml?t=p
**Support Notes**: ftp://ftp2.zyxel.com/GS1910-24HP/support_note/GS1910-24HP_V1.00.zip
**CLI Reference**: ftp://ftp.zyxel.com/XS3900-48F/cli_reference_guide/XS3900-48F_1.pdf
===== Firmware Updates =====
:!: You must, apparently, install firmware updates in order.
===== Initial Configuration =====
==== Default Login Details ====
|IP Address |http://192.168.1.1 |
|User Name |admin |
|Password |1234 |
|Serial Console |115200,N,8,1,No flow control |
|Serial Cable |9-pin straight through, USB serial adapter + USB extension only |
==== CLI Basics ====
Reset to factory defaults, at boot up:
ctrl-c
default
reset
==== Out-of-Band (OOB) Management Interface ====
===== Enable Jumbo Frames =====
Access ports:
Trunk ports:
===== Create VLANs =====
FIXME
http://www.manualslib.com/manual/200632/Zyxel-Communications-Es-2024-Series.html?page=85#manual
http://www.bogus.net/~torh/files/zyxel-vlan.txt
ftp://ftp.eyenetworks.no/ZyXEL/GS-2200-8/UserGuide/final/4-2_VLAN-port-based-4%200.pdf
Display current VLAN information:
Set the CLI to configuration mode and define VLAN:
===== Quality of Service =====
:!: The Zyxel GS1910 has seven priority queues.
:!: Higher numbered queues are higher priority.
:!: The default priority queue is zero (0).
==== Show Current QoS Classifications ====
**Web Interface -> Monitor -> QoS Statistics**
==== Port-Based ====
:!: See the Zyxel QoS support note for VLAN and port-based QoS.
==== DSCP ====
**Web Interface -> Configure -> QoS -> DSCP-Based QoS**
Select the DSCP classifications you want to support and set the priority queues they are to be mapped to.
Here are some common selections:
^DSCP Classification ^Priority Queue ^
|24 (CS3) |3 |
|34 (AF41) |4 |
|40 (CS5) |5 |
|46 (EF) |5 |
**Web Interface -> Configure -> QoS -> DSCP Classification**
Set the reverse mapping of priority queues to DSCP classifications.
Something like:
^Priority Queue ^DSCP Classification ^
|3 |24 (CS3) |
|4 |34 (AF41) |
|5 |46 (EF) |
**Web Interface -> Configure -> QoS -> QoS Control List**
Create QoS Control List Entries (QCEs) to actuate the QoS classifications:
{{ :networking:switch:zyxel_qce.png |Zyxel QoS Control List Entry}}
{{ :networking:switch:qos_control_list_entries.png |QoS Control List Entries}}
===== Access Control Lists =====
==== Example Application ====
- We have created a port-based VLAN on switch ports 1-6 to use a section of the switch as a DMZ.
- We have a primary Internet connection via cable modem connected to port 1.
- We have a server's IPMI interface configured with a static public address connected to port 2.
- We have a router's WAN interface configured with a static public address connected to port 3.
- For security reasons, we need to limit access to the server's IPMI (remote management) interface to the support provider's public Internet interface.
==== Create an ACL Policy ====
:!: Here we create a policy that consists of two Access Control Entries (ACEs) and we apply the ACL policy to the port connected to the server's IPMI interface.
:!: The order of the ACEs is important.
- The first ACE permits traffic from the IPMI device to the support providers external Internet address/subnet.
- Set the 'Policy Filter' to 'Specific'
- Use a 'Policy Value' of 1 or another unused ID number (just not '0' zero).
- Set the 'Frame Type' to 'IPv4'
- Set the destination IP address or subnet as the IPMI support provider's external IP address.
- Set the 'Action' to 'Permit'.
- The second ACE denies all other traffic from the IPMI device.
- Set the 'Policy Filter' to 'Specific'
- Use the same 'Policy Value' as in ACE #1.
- Set the 'Frame Type' to 'IPv4'
- Change the 'Action' to 'Deny'.
**Configuration -> Security -> Network -> ACL -> Access Control List -> Add**
{{ :networking:switch:zyxel_create_ace.png?direct&650 |}}
{{ :networking:switch:zyxel_create_ace_2.png?direct&650 |}}
==== Apply the ACE ====
:!: We apply the ACL policy to the port with the IPMI device.
:!: We deny all other traffic on that port using an ACE (above), not by changing the 'Action' on the Ports page. That doesn't seem to work as desired.
**Configuration -> Security -> Network -> ACL -> Ports**
- Enter the ID of the ACL policy you just created in the Policy ID field of the port with the IPMI device.
- Leave the 'Action' as 'Permit'.
{{ :networking:switch:zyxel_apply_ace.png?direct&700 |}}