User Tools

Site Tools


networking:switch:zyxel_gs1910

Zyxel GS1910 Ethernet Switch

Firmware Updates

:!: You must, apparently, install firmware updates in order.

Initial Configuration

Default Login Details

IP Address http://192.168.1.1
User Name admin
Password 1234
Serial Console 115200,N,8,1,No flow control
Serial Cable 9-pin straight through, USB serial adapter + USB extension only

CLI Basics

Reset to factory defaults, at boot up:

ctrl-c
default
reset

Out-of-Band (OOB) Management Interface



Enable Jumbo Frames

Access ports:



Trunk ports:



Create VLANs

Quality of Service

:!: The Zyxel GS1910 has seven priority queues.

:!: Higher numbered queues are higher priority.

:!: The default priority queue is zero (0).

Show Current QoS Classifications

Web Interface → Monitor → QoS Statistics

Port-Based

:!: See the Zyxel QoS support note for VLAN and port-based QoS.

DSCP

Web Interface → Configure → QoS → DSCP-Based QoS

Select the DSCP classifications you want to support and set the priority queues they are to be mapped to.

Here are some common selections:

DSCP Classification Priority Queue
24 (CS3) 3
34 (AF41) 4
40 (CS5) 5
46 (EF) 5

Web Interface → Configure → QoS → DSCP Classification

Set the reverse mapping of priority queues to DSCP classifications.

Something like:

Priority Queue DSCP Classification
3 24 (CS3)
4 34 (AF41)
5 46 (EF)

Web Interface → Configure → QoS → QoS Control List

Create QoS Control List Entries (QCEs) to actuate the QoS classifications:

Zyxel QoS Control List Entry

QoS Control List Entries

Access Control Lists

Example Application

  1. We have created a port-based VLAN on switch ports 1-6 to use a section of the switch as a DMZ.
  2. We have a primary Internet connection via cable modem connected to port 1.
  3. We have a server's IPMI interface configured with a static public address connected to port 2.
  4. We have a router's WAN interface configured with a static public address connected to port 3.
  5. For security reasons, we need to limit access to the server's IPMI (remote management) interface to the support provider's public Internet interface.

Create an ACL Policy

:!: Here we create a policy that consists of two Access Control Entries (ACEs) and we apply the ACL policy to the port connected to the server's IPMI interface.

:!: The order of the ACEs is important.

  1. The first ACE permits traffic from the IPMI device to the support providers external Internet address/subnet.
    1. Set the 'Policy Filter' to 'Specific'
    2. Use a 'Policy Value' of 1 or another unused ID number (just not '0' zero).
    3. Set the 'Frame Type' to 'IPv4'
    4. Set the destination IP address or subnet as the IPMI support provider's external IP address.
    5. Set the 'Action' to 'Permit'.
  2. The second ACE denies all other traffic from the IPMI device.
    1. Set the 'Policy Filter' to 'Specific'
    2. Use the same 'Policy Value' as in ACE #1.
    3. Set the 'Frame Type' to 'IPv4'
    4. Change the 'Action' to 'Deny'.

Configuration → Security → Network → ACL → Access Control List → Add

Apply the ACE

:!: We apply the ACL policy to the port with the IPMI device.

:!: We deny all other traffic on that port using an ACE (above), not by changing the 'Action' on the Ports page. That doesn't seem to work as desired.

Configuration → Security → Network → ACL → Ports

  1. Enter the ID of the ACL policy you just created in the Policy ID field of the port with the IPMI device.
  2. Leave the 'Action' as 'Permit'.

networking/switch/zyxel_gs1910.txt · Last modified: 2015/08/12 09:20 by gcooper