📜 ⬆️ ⬇️

Setting up Zyxel smart hardware in standalone and cloud modes



What is the article about?
1. Short review and unboxing of the Zyxel XGS1930-28HP smart switch and access points NWA1123-ACv2

2. Description of the configuration process:


3. solution of a number of minor problems arising during the setup process

For those who are too lazy to read:
1. Critical problems when setting up the equipment was found.

2. Using the Zyxel NCC greatly simplifies and speeds up the process of setting up the equipment (compared to standalone tuning)

3. The free NCC license is suitable for use in prod in the following cases:
3.1. A small amount of equipment
3.2. No requirements for long-term storage of historical monitoring data and logs

4. The functionality of the NCC is sufficient to configure the equipment for typical SOHO cases.

5. As of “now” - the NCC is not quite suitable for cases that require fine-tuning of the ACL directly on the switch - the “stand-alone” rule editor works better.

Content


1. What are we testing?
1.1. Zyxel XGS1930-28HP Switch
1.1.1. A photo
1.1.2. general information
1.1.3. Equipment

1.2. Zyxel NWA1123-ACv2 Access Point
1.2.1. A photo
1.2.2. general information
1.2.3. Equipment

2. Testing
2.1. Testbed Configuration

2.2. Offline setup
2.2.1. Switch
2.2.2. Access point

2.3. Reset

2.4. Setup using the Nebula Control Center
2.4.1. A few words about the service
2.4.2. NCC licensing

2.4.3. Switch configuration using NCC
2.4.3.1. Register a switch with the NCC
2.4.3.2. Setup process

2.4.4. Configure the access point
2.4.4.1. Register access point in NCC
2.4.4.2. Setup process

3. Opinion of the author

4. Thank you

What are we testing?


Zyxel XGS1930-28HP Switch


A photo









general information


Manufacturer
Zyxel
Model
XGS1930-28HP
Switch Type
L2 +
Qty 1G RJ45 ports with PoE 802.3at support
24
PoE budget
375 W (up to 15.4 W on all ports, 30 W / max port)
Qty 10G SFP + ports
four
The number of BP
one
Stacking support
not
Monitoring and management capabilities
- Web interface
- SNMP v1-3
- RMON
- limited CLI
- “cloud” management with SaaS from the manufacturer
Full specification
www.zyxel.com/products_services/24-48-port-GbE-Smart-Managed-Switch-with-4-SFP--Uplink-XGS1930-Series/specifications

Equipment


The switch comes in a standard carton box.
All parts are assembled in a separate box of a smaller size.

The package bundle looks like this:


1 - switch
2 - user manual
3 - “Safety Warnings”
4 - EU Declaration of Conformity (information on compliance with EU regulators)
5 - warranty card
6,7 - rack mounts (“ears”)
8 - set of rubber “legs” for desktop installation
9 - set of bolts for attaching the “ears” to the switch
10 - a set of bolts for mounting the switch in a 19 ”rack
11 - C13 / Schuko power cable

Tester Notes:
The sample provided is a typical modern L2 + PoE access level switch.
Suitable for connecting end devices in corporate networks (Small Business).

Despite the relatively high bandwidth and the availability of 10G ports, it is not suitable for use in data center conditions due to:
- relatively high switching delay
- no backup power supply

L2 + functionality is typical for Smart / Small Business lines of other vendors (static routing, L3-L4 ACL, DCHP Relay).
No DHCP snooping support.

Control methods are limited (which is typical of smart switches in general)
Not:
- full switch management via CLI
- settings via COM port


Zyxel NWA1123-ACv2 Access Point



A photo









general information


Manufacturer
Zyxel
Model
NWA1123-ACv2
Supported frequency ranges
2.4 GHz (IEEE802.11 b / g / n)
5 GHz: (IEEE 802.11 a / n / ac)
Number of radio modules
2
Antennas
2T2R MIMO
Number of Ethernet ports
1x1G RJ45
Nutrition
802.3af / at or local PSU
Monitoring and management capabilities
- Web interface
- SNMP v1-3
- RMON
- CLI
- “cloud” management with SaaS from the manufacturer
Full specification
www.zyxel.com/products_services/802-11ac-Dual-Radio-Ceiling-Mount-PoE-Access-Point-NWA1123-ACv2/specifications

Equipment



1 - Zyxel NWA1123-ACv2 access point
2 - external power supply with UK plug
3 - Schuko plug (EU Plug) for external power supply unit
4 - mounting bracket
5 - 2 sets of dowels
6 - 2 screws
7 - user manual
8 - warranty card
10 - Safety Warnings
11 - EU Declaration of Conformity (information on compliance with EU regulators)

Testing


Testbed Configuration


We emulate a fairly typical network of a small office (Small Business).

Network segmentation:



Switch port allocation:



Wireless network:



Tester Notes:
1. As a test bench router, we use MikroTik RB750UP.

It is used to:

- termination of VLANs and traffic routing between them
- termination of aplinka
- static routing of Internet traffic and SNAT on the external interface

Since Routing performance within this test is not critical - 100M ports on the router will be enough.

2. In the vlan.MGMT segment, we use DHCP (Zyxel recommendation for optimal initial configuration)

3. Access restrictions between internal network segments are implemented using a switch ACL (in order to become familiar with the ACL configuration process).

Stand assembled:



Offline setup


Switch


1. Download the manual, read.
2. We catch the switch and a point in DHCP
3. Go to the switch web interface by IP address.
4. Select the offline configuration mode, log in under the default account (admin / 1234)



5. We are trying to configure VLANs and ports using Wizard.



Tester Notes:

1. The possibilities of Wizard are very limited, it is better to immediately apply the default settings and switch to a full-fledged web interface.

What's wrong:

- you can configure no more than 5 VLANs at a time
- a trunk port can only be associated with the entire set of VLANs (but not a subset).
- You cannot change MGMT VLAN.
- there is no support for hybrid port operation mode.
The port can either untagged (access) or pass traffic of all tagged VLANs (trunk)

2. The ability to configure through the CLI, in fact, no (which, in general, is normal for this class of switches):




6. Create MGMT VIF via the web interface (“Basic setting”> “IP Setup”> “IP Configuration”)

7. Add access restrictions for the guest network.

The process is not entirely intuitive, but simple enough.

It is necessary:

- create: L2-L4 classification rules (“Classifier”)
- create access policies based on traffic classification rules (“Policy rule”)

7.1. We get acquainted with the classifier. Go to “Advanced Application”> “Classifier”> “Classifier configuration”





Create several classification rules for the guest network:



7.2. Go to “Advanced Application”> “Policy Rule” and create several policies based on the classification rules.





7.3. Checking the operation of the ACL:



Access point


1. Download the manual, read
2. Go to the web interface of the access point
3. Log in with default credentials (admin / 1234)
4. Change the password (mandatory step, without this, then it will not work)
5. Create an SSID. The settings are hidden pretty deep.

5.1. Add security profiles for guest and corporate networks
“Configuration”> “Object”> “AP Profile”> “SSID”> “Security list”





5.2.Add guest and corporate SSID
“Configuration”> “Object”> “AP Profile”> “SSID”> “SSID list”



6. Go to “AP Management” and choose which SSID of which band will broadcast.
Suppose a guest SSID should be broadcast at 2.4 + 5 GHz, and a corporate one - only at 5 GHz.



7. Optionally - change the settings of radio interfaces and broadcast channels.

Reconfigure the management interface.

“Configuration”> “Network”

For our case:

- we change VID Management-VLAN'a
- we change the IP address
- change the tagging mode

After this, the management session with the access point will be interrupted (due to the loss of L2-connectivity).

8. Change the mode of the access point port on the switch (trunk instead of access)



9. We check the availability of the access point using the management interface and the operation of both SSIDs.




Reset


At the access point:
On the switch:



Setup using the Nebula Control Center


A few words about the service


Nebula Control Center (NCC) is a SaaS solution for monitoring and controlling Zyxel network equipment.

Supported:

- switches
- access points
- Security Gateways

Detailed functionality is described here .

NCC licensing


There are 3 types of licenses:

1. free, limited in functionality
2. Paid with annual renewal
3. paid lifetime

Detailed license comparison

Only the number of devices is licensed, there is no difference in functionality between paid licenses.

Regarding the free version:

1. The number of managed devices is not limited.

2. functional restrictions apply to:

- security (authorization on 802.1X ports, auditing capabilities, etc.)
- bulk configuration management
- monitoring (the ability to customize triggers, reduced storage time of historical data)

Conclusion:
The free NCC license is usable in prod with:

- a small number of equipment (i.e., in the case where mass configuration management functionality is not required)
- there are no requirements for the long-term storage of historical monitoring data and logs

Switch


Register a switch with the NCC

1. The registration process is as follows:
2. Register an account on nebula.zyxel.com
3. Desirable - set up two-factor authentication
4. Create Organization and Site
5. We bind the device to the account by scanning the QR code or manually entering the MAC address and serial number in the Nebula
6. PROFIT!

A QR code can be found in the web interface ( “Basic”> “Cloud Management”> “Nebula Switch Registration” ) or on the device box.

Scan the QR code you need using the Nebula Mobile application ( Apple App Store , Google Play )

For the curious: an attempt was made to re-register the device under a different account.
Not a ride;)

After registering with the NCC:

- switch settings are reset to factory settings.
- the latest firmware and config are uploaded to the switchboard from the cloud.
- local authentication is blocked
- the switch appears in the NCC web interface

It looks like this:

Deschord:

< imgrht

Switch profile:



Logs:



Port Information:



Setup process

Let's go back to the original task and switch configuration

1. Configure VLANs and ports.

Access Point Port:



Router:



Terminal:



Tester note: when configured via the NCC, for some reason, only hybrid and access ports (but not trunk) modes are supported.

You cannot configure a port without specifying a native VLAN / PVID.

Alternatively, you can specify the unused prod VLAN as the PVID.



2. Change MGMT-VLAN (“Switch”> “Switch Configuration”> “VLAN Configuration”)

3. Configure ACL for the guest network.

This is done via “Switch”> “Switch Configuration”> “IP Filtering”.

The rule editor looks like this:



Note of the tester: for comparison, once again I will give screenshots of the local ACL editor.

Cloudy obviously loses in number of options.







Access point


Register access point in NCC

According to the documentation, for a new access point, the process should proceed as follows:

1. Authorization of the access point web interface
2. Change password by default
3. Scanning a QR code using a mobile application.
QR code appears in PopUp after authorization.

Tester Note:

If the QR code is not displayed - the most likely cause is an outdated firmware (as happened in my case).

It is updated as follows:

- download the firmware from the corresponding section of the manufacturer’s website
- unpack the archive with the firmware
- go to “Maintenance”> “File Manager”> “Firmware Package”
- fill in * .BIN file with firmware
- wait 3-5 minutes The process of flashing.

Thin moments:

- Progressbar “Uploading firmware” during the flashing will be filled indefinitely, this is normal .
- A sign that the process is in progress - fast flashing red LED on the spot.
- A sign that the process is over and the point is working normally - slow flashing of the LED-indicator in green.
- In the web interface, nothing is displayed, the progress bar will continue to fill.


At the end of the flashing we update the page.

We are met by the authorization window and the next Wizard.

Click “Cancel” and see the updated interface and QR code:



Scan the QR code in Nebula Mobile, wait 5-10 minutes.

During this time:

- point settings are reset to factory settings.
- current firmware and config are poured from the cloud.

Note of the tester: an interesting point - unlike the switch, local authorization on the point is not blocked.


After auto-configuration of the point, you can go to the web interface and see the status of connecting to the cloud:



Desbord for access points:



Access Point Profile:



Logs page:



There are fewer log filtering options than for switches.

Setup process

1. Go to the access point profile, change the MGMT VLAN.



2. Go to “AP”> “Configure”> “SSIDs”, create a guest and corporate SSID:



Do not forget to include the second SSID.


3. Go to “AP”> “Configure”> “Authentication”.

Create a security profile for a corporate and guest SSID.





3. Configure the radio part:



4. Connect to both networks, check the work.

Opinion tester


1. Critical problems when setting up the equipment was found.

2. Using the Zyxel NCC greatly simplifies and speeds up the process of setting up the equipment (compared to standalone tuning)

3. The free NCC license is suitable for use in prod in the following cases:
3.1. A small amount of equipment
3.2. No requirements for long-term storage of historical monitoring data and logs

4. The functionality of the NCC is sufficient to configure the equipment for typical SOHO cases.

5. As of “now” - the NCC is not quite suitable for cases that require fine-tuning of the ACL directly on the switch - the “stand-alone” rule editor works better.

thank


- to colleagues from MTI for prompt delivery of test equipment
- to colleagues from Zyxel for constructive answers to the questions arising in the process of writing this article
- to readers who have mastered this sheet to the end;)

Source: https://habr.com/ru/post/438008/