Web Interface: http://192.168.0.250
http://www.zyxel.com/us/en/products_services/xgs1910_gs1910_series.shtml?t=p
Support Notes: ftp://ftp2.zyxel.com/GS1910-24HP/support_note/GS1910-24HP_V1.00.zip
CLI Reference: ftp://ftp.zyxel.com/XS3900-48F/cli_reference_guide/XS3900-48F_1.pdf
You must, apparently, install firmware updates in order.
IP Address | http://192.168.1.1 |
User Name | admin |
Password | 1234 |
Serial Console | 115200,N,8,1,No flow control |
Serial Cable | 9-pin straight through, USB serial adapter + USB extension only |
Reset to factory defaults, at boot up:
ctrl-c default reset
Access ports:
Trunk ports:
http://www.manualslib.com/manual/200632/Zyxel-Communications-Es-2024-Series.html?page=85#manual
http://www.bogus.net/~torh/files/zyxel-vlan.txt
ftp://ftp.eyenetworks.no/ZyXEL/GS-2200-8/UserGuide/final/4-2_VLAN-port-based-4%200.pdf
Display current VLAN information:
Set the CLI to configuration mode and define VLAN:
The Zyxel GS1910 has seven priority queues.
Higher numbered queues are higher priority.
The default priority queue is zero (0).
Web Interface → Monitor → QoS Statistics
See the Zyxel QoS support note for VLAN and port-based QoS.
Web Interface → Configure → QoS → DSCP-Based QoS
Select the DSCP classifications you want to support and set the priority queues they are to be mapped to.
Here are some common selections:
DSCP Classification | Priority Queue |
---|---|
24 (CS3) | 3 |
34 (AF41) | 4 |
40 (CS5) | 5 |
46 (EF) | 5 |
Web Interface → Configure → QoS → DSCP Classification
Set the reverse mapping of priority queues to DSCP classifications.
Something like:
Priority Queue | DSCP Classification |
---|---|
3 | 24 (CS3) |
4 | 34 (AF41) |
5 | 46 (EF) |
Web Interface → Configure → QoS → QoS Control List
Create QoS Control List Entries (QCEs) to actuate the QoS classifications:
Here we create a policy that consists of two Access Control Entries (ACEs) and we apply the ACL policy to the port connected to the server's IPMI interface.
The order of the ACEs is important.
Configuration → Security → Network → ACL → Access Control List → Add
We apply the ACL policy to the port with the IPMI device.
We deny all other traffic on that port using an ACE (above), not by changing the 'Action' on the Ports page. That doesn't seem to work as desired.
Configuration → Security → Network → ACL → Ports