Files
lcbp3/specs/04-Infrastructure-OPS/switch-configuration-guide.md
T
admin 83b6620093
CI / CD Pipeline / build (push) Successful in 5m51s
CI / CD Pipeline / deploy (push) Successful in 2m47s
260427:1659 update Infras #02
2026-04-27 16:59:38 +07:00

23 KiB
Raw Blame History

Switch Configuration Guide — Omada SDN V6

Version: 3.0 Last Updated: 2026-04-24 Status: Production Author: Infrastructure Team Maintainer: NAP-DMS DevOps Scope: LCBP3 Network Infrastructure (SG3210X-M2 + SG2428P)


Table of Contents

  1. Overview
  2. VLAN Definitions
  3. Port Profiles
  4. VLAN Mapping
  5. Network Diagram
  6. Configuration Procedure
  7. Change Log
  8. Quick Reference
  9. Pre-Deployment Checklist
  10. Testing Guide
  11. Security & Optimization
  12. Related Documents

Overview

เอกสารนี้กำหนด Port Profile templates และ VLAN mapping configuration สำหรับ LCBP3 network infrastructure โดยใช้ TP-Link Omada SDN V6 Controller (OC200)

Audience: Network Administrator, DevOps Engineer Prerequisites: Omada SDN Controller v6.x, สิทธิ์ Admin บน OC200 Related ADRs: ADR-016 (Security), ADR-009 (Database Strategy — ถ้ามี Network DB)

Network Equipment

Device Model Role
Core Switch SG3210X-M2 10G Core Switch
Access Switch SG2428P PoE Access Switch
NAS Storage QNAP / ASUSTOR Network Attached Storage
Unmanaged Switch 1 TL-SG1210P IP Phone + PC
Unmanaged Switch 2 TL-SL1226P CCTV
Wireless AP EAP610 Wi-Fi Access Points
Router ER7206 Edge Router

Configuration Concepts

Port Profile — Template defining port-level settings (STP Security, Loopback Control, Multicast Fast Leave, Flow Control, EEE, LLDP-MED, PoE). Port Profiles do NOT contain VLAN configuration.

Edit Port — VLAN assignment step where Native Network (Untagged), Tagged Network, and Voice Network are configured, and a Port Profile is applied.


🧠 Key Concepts (Before Using This Config)

  • ใช้ STP เท่านั้น (เลิก Loop Detection) — Spanning Tree Protocol สำหรับ loop prevention
  • Harden Access Port ด้วย BPDU Guard — ป้องกันการเสียบ switch โดยไม่ได้รับอนุญาต
  • กัน Rogue Switch ด้วย Root Guard — ป้องกัน switch เถื่อนยึด root bridge
  • ทำ Trunk ให้ clean + predictable — Native VLAN 999 สำหรับทุก trunk port
  • เผื่อ future VLAN expansion — รองรับ VLAN เพิ่มเติมในอนาคต
  • VLAN 999 (was 99) — เปลี่ยนจาก VLAN 99 เป็น 999 เพื่อความปลอดภัย

VLAN Definitions

VLAN ID Name Purpose Subnet Gateway DHCP Range
10 NAS-ADMIN NAS Storage & Admin Desktop 192.168.10.0/24 192.168.10.1 192.168.10.50199
20 MGMT Network Management (OC200) 192.168.20.0/24 192.168.20.1 192.168.20.50199
30 USERS User PCs, Printers, Staff WiFi 192.168.30.0/24 192.168.30.1 192.168.30.50199
40 CCTV CCTV Cameras, IoT Devices 192.168.40.0/24 192.168.40.1 192.168.40.50199
50 VOICE IP Phones 192.168.50.0/24 192.168.50.1 192.168.50.50199
70 GUEST Guest WiFi 192.168.70.0/24 192.168.70.1 192.168.70.50199
999 NATIVE Trunk Native VLAN (No DHCP) — Hardened
60 UNUSED Reserved for future use

Port Profiles

Profile 1 — 001-CORE-TRUNK-LACP 🔷

Purpose: LACP trunk links between Core and Access switches / Router

Applied To:

  • SG3210X-M2 Port 12 (to SG2428P Port 2122)
  • SG3210X-M2 Port 9 (to ER7206)
  • SG2428P Port 2122 (to SG3210X-M2 Port 12)

Configuration:

Loopback Control: Spanning Tree

STP:
- Loop Protect: ENABLE
- Root Protect: DISABLE
- TC Guard: DISABLE
- BPDU Guard: DISABLE
- BPDU Filter: DISABLE

General:
- Flow Control: ON
- EEE: OFF
- Port Isolation: OFF

📌 ใช้กับ: Core ↔ Access, Core ↔ Router


Profile 2 — 002-NAS-LACP 🔷

Purpose: LACP links to NAS storage devices (QNAP / ASUSTOR)

Applied To:

  • SG3210X-M2 Port 34 (to QNAP)
  • SG3210X-M2 Port 56 (to ASUSTOR)

Configuration:

Loopback Control: Spanning Tree

STP:
- Loop Protect: ENABLE
- Root Protect: DISABLE
- BPDU Guard: DISABLE

General:
- Flow Control: ON
- EEE: OFF

⚠️ เหตุผล: NAS บางรุ่นส่ง BPDU แปลก ๆ → ห้ามเปิด BPDU Guard


Profile 3 — 003-UNMANAGED-SWITCH 🔷 (สำคัญมาก)

Purpose: Downstream links to unmanaged switches — ป้องกัน Rogue Switch

Applied To:

  • SG2428P Port 25 (to TL-SL1226P — CCTV)
  • SG2428P Port 26 (to TL-SG1210P — IP Phone + PC)

Configuration:

Loopback Control: Spanning Tree

STP:
- Root Protect: ENABLE 🔥
- Loop Protect: ENABLE
- BPDU Guard: DISABLE
- TC Guard: DISABLE

General:
- Flow Control: ON
- EEE: OFF

📌 ป้องกัน: เสียบ switch เถื่อน → ยึด root ไม่ได้


Profile 4 — 004-AP-TRUNK 🔷

Purpose: Trunk links to wireless access points (EAP610)

Applied To:

  • SG2428P Port 116 (to EAP610)

Configuration:

General:
- 802.1X Control: Auto
- Port Isolation: DISABLE
- Flow Control: ENABLE
- EEE: DISABLE
- Multicast Fast Leave: IGMP (IPv4)->DISABLE, MLD (IPv6)->DISABLE
- Loopback Control: Spanning Tree
  - Edge Port: ENABLE
  - Spanning Tree Config:
    - Loop Protect: DISABLE
    - Root Protect: DISABLE
    - TC Guard: DISABLE
    - BPDU Protect: ENABLE 🔥 (ใช้คู่กับพอร์ตประเภทขอบเครือข่าย (Edge Port) ที่เชื่อมต่อกับอุปกรณ์ปลายทางเท่านั้น เช่น เครื่อง PC, เครื่องพิมพ์ หรือ Access Point))
    - BPDU Filter: DISABLE
    - BPDU Forward: DISABLE
LLDP-MED: ENABLE
Bandwidth Control: Storming Control
  - Rate Mode: Ratio
    - Broadcast: 1%
    - Unknown Unicast: 2%
    - Multicast: 2%
    - Action: Drop

📌 **หมายเหตุ:** AP ไม่ควรส่ง BPDU → เปิด guard ได้

---

### Profile 5 — 005-VOICE-ONLY 🔷

**Purpose:** Direct connections to IP phones

**Applied To:**
- SG2428P Port 1718 (to IP Phone)

**Configuration:**

```bash
Loopback Control: Spanning Tree

STP:
- Edge Port: ENABLE
- BPDU Guard: ENABLE 🔥

General:
- LLDP-MED: ENABLE
- Flow Control: ON

Profile 6 — 006-ACCESS-PC 🔷

Purpose: Direct connections to PCs and printers — Hardened Access Port

Applied To:

  • SG2428P Port 23 (to Printer)
  • SG3210X-M2 Port 8 (to Admin Desktop)
  • General PC connections

Configuration:

Loopback Control: Spanning Tree

STP:
- Edge Port: ENABLE
- BPDU Guard: ENABLE 🔥🔥🔥 (สำคัญสุด)

General:
- Flow Control: ON
- EEE: OFF

📌 ถ้ามีคนเสียบ switch: → Port จะ shutdown ทันที


Profile 7 — 007-DEFAULT-MGMT 🔷

Purpose: Default configuration for management ports

Applied To:

  • Management ports
  • Ports requiring no special configuration

Configuration:

Loopback Control: Spanning Tree

STP:
- Edge Port: ENABLE
- BPDU Guard: ENABLE

General:
- Default

VLAN Mapping 🔶

SG3210X-M2 (Core) Port Configuration

Port Destination Profile Native (Untagged) Tagged Voice
1-2 SG2428P (LACP) 001-CORE-TRUNK-LACP 999 10,20,30,40,50,70 Off
3-4 QNAP (LACP) 002-NAS-LACP 10 20 🔥 Off
5-6 ASUSTOR (LACP) 002-NAS-LACP 10 20 🔥 Off
7 Reserved (future expansion) 007-DEFAULT-MGMT 999 None Off
8 Admin Desktop 006-ACCESS-PC 10 None Off
9 ER7206 001-CORE-TRUNK-LACP 999 10,20,30,40,50,70 Off
10 Reserved (future expansion) 007-DEFAULT-MGMT 999 None Off

📌 NAS (Port 3-6) ปรับใหม่: เพิ่ม Tagged VLAN 20 สำหรับ MGMT redundancy


SG2428P (Access) Port Configuration

Port Destination Profile Native (Untagged) Tagged Voice
1-16 EAP610 004-AP-TRUNK 999 10,20,30,40,50,70 🔥 allow all Off
17-18 IP Phone 005-VOICE-ONLY 50 None Enable (VLAN 50)
19-20 Reserved (future expansion) 007-DEFAULT-MGMT 999 None Off
21-22 SG3210X-M2 (LACP) 001-CORE-TRUNK-LACP 999 10,20,30,40,50,70 Off
23 Printer 006-ACCESS-PC 30 None Off
24 OC200 007-DEFAULT-MGMT 20 None Off
25 TL-SL1226P (CCTV) 003-UNMANAGED-SWITCH 40 None Off
26 TL-SG1210P (IP Phone + PC) 003-UNMANAGED-SWITCH 30 50 Enable (VLAN 50)
27-28 Reserved (future expansion) 007-DEFAULT-MGMT 999 None Off

📌 AP Ports (1-16) ปรับใหม่: Allow all VLANs สำหรับ future expansion


Network Diagram

                           ┌──────────────┐
                           │   ER7206     │
                           │ (Trunk 999)  │
                           └──────┬───────┘
                                  │
                                  ▼
                     ┌──────────────────────────┐
                     │     SG3210X-M2 (Core)    │
                     │    [Root Bridge 4096]    │
                     └──────────────────────────┘
        LACP 1-2  /   |      |       |       |   \  Reserved
                   /   |      |       |       |    \
                  ▼    ▼      ▼       ▼       ▼     ▼
         SG2428P (Access)   QNAP   ASUSTOR   Admin   Reserved
         [Priority 8192]   (VLAN10+20) (VLAN10+20) (VLAN10)
         (AP 116 Trunk)

Uplink SG3210XM2 (12) ↔ SG2428P (2122)

WiFi Staff → VLAN 30
WiFi Guest → VLAN 70
CCTV → VLAN 40
IP Phone → VLAN 50
Printer → VLAN 30
Admin Desktop → VLAN 10
NAS → VLAN 10 (+20 MGMT)
OC200 → VLAN 20

Configuration Procedure

Step 1 — Create Port Profiles

  1. Navigate to Omada SDN Controller → Port Profiles
  2. Create each profile listed in the Port Profiles section
  3. Configure all settings as specified
  4. Do not configure VLANs in Port Profiles (VLANs are configured in Edit Port)

Step 2 — Configure Port VLANs

  1. Navigate to Omada SDN Controller → Switches → Edit Port
  2. For each port, configure:
    • Native Network (Untagged) — The access VLAN for untagged traffic
    • Tagged Network — VLANs allowed on the trunk (comma-separated)
    • Voice Network — Voice VLAN (if applicable)
    • Profile — Select the appropriate Port Profile from Step 1
  3. Apply configuration per the VLAN Mapping tables

Change Log

Version Date Changes
3.0 2026-04-24 FINAL VERSION — STP-only (no Loop Detection), BPDU Guard on access ports, Root Guard on unmanaged switch ports, VLAN 99→999, NAS with MGMT redundancy (VLAN 20 tagged), AP allow-all VLANs, Security Hardening section
2.0 2026-04-24 Updated port mappings (LACP 21-22), new VLAN scheme (30/40/50/70), consolidated CCTV/IoT to VLAN 40, added DHCP table, renamed PC-ONLY to ACCESS-PC
1.0 2026-04-23 Initial version with basic port profiles and VLAN mapping

Quick Reference — Edit Port Values

SG3210X-M2

Port Native Tagged Profile Voice
1-2 999 10,20,30,40,50,70 001-CORE-TRUNK-LACP Off
3-4 10 20 002-NAS-LACP Off
5-6 10 20 002-NAS-LACP Off
7 999 007-DEFAULT-MGMT Off
8 10 006-ACCESS-PC Off
9 999 10,20,30,40,50,70 001-CORE-TRUNK-LACP Off
10 999 007-DEFAULT-MGMT Off

SG2428P

Port Native Tagged Profile Voice
1-16 999 10,20,30,40,50,70 004-AP-TRUNK Off
17-18 50 005-VOICE-ONLY 50
19-20 999 007-DEFAULT-MGMT Off
21-22 999 10,20,30,40,50,70 001-CORE-TRUNK-LACP Off
23 30 006-ACCESS-PC Off
24 20 007-DEFAULT-MGMT Off
25 40 003-UNMANAGED-SWITCH Off
26 30 50 003-UNMANAGED-SWITCH 50
27-28 999 007-DEFAULT-MGMT Off

Pre-Deployment Checklist

ก่อน Apply ค่า Configuration:

  • สร้าง VLANs 10, 20, 30, 40, 50, 70, 999 ใน Omada Controller (VLAN 999 = Hardened Native)
  • สร้าง Port Profiles 001007 ครบถ้วน (STP Mode — ไม่ใช้ Loop Detection)
  • ตรวจสอบ LACP Group Configuration (Port 1-2 ↔ Port 21-22)
  • ตั้งค่า DHCP Server ตามตาราง VLAN Definitions
  • ตรวจสอบว่า OC200 อยู่บน VLAN 20 และมี IP 192.168.20.x
  • ตรวจสอบ Voice VLAN Enable บน Port 17-18 และ 26
  • กำหนด STP Priority: Core=4096, Access=8192
  • สำรอง Configuration ปัจจุบันก่อน Apply

Testing Guide — VLAN + LACP + STP

การทดสอบทีละ Layer โดยไม่ต้องใช้เครื่องมือพิเศษ — ใช้แค่ PC + ping + OC200 UI


PART 1 — Testing VLAN (Step-by-Step)

Goal

  • ตรวจสอบว่าแต่ละพอร์ตอยู่ VLAN ถูกต้อง
  • ตรวจสอบว่า Tagged/Untagged ทำงาน
  • ตรวจสอบว่า DHCP แจก IP ถูก subnet
  • ตรวจสอบว่า WiFi → VLAN ถูกต้อง

STEP 1 — Test VLAN 10 (NAS-ADMIN)

Test Equipment:

  • Admin Desktop (Port 8 SG3210X-M2)
  • QNAP / ASUSTOR

Procedure:

  1. Connect Admin Desktop → Port 8
  2. Open Command Prompt
  3. Type:
    ipconfig
    
  4. Expected IP range:
    192.168.10.x
    

Ping Tests:

ping 192.168.10.1   ← Gateway
ping <QNAP-IP>
ping <ASUSTOR-IP>

Expected Result:

  • All pings successful
  • Should NOT ping to VLAN 30/40/50/70 (if ACL configured)

STEP 2 — Test VLAN 30 (USERS)

Test Equipment:

  • General PC
  • Printer
  • Staff WiFi (SSID: Staff)

Procedure:

  1. Connect PC → Port 23 or Port 26 (via TL-SG1210P)
  2. Type:
    ipconfig
    
  3. Expected IP:
    192.168.30.x
    

Ping Tests:

ping 192.168.30.1
ping <Printer-IP>

WiFi Staff Test:

  1. Connect to SSID Staff
  2. Type:
    ipconfig
    
  3. Expected IP: 192.168.30.x

STEP 3 — Test VLAN 40 (CCTV/IoT)

Test Equipment:

  • CCTV Camera (via TL-SL1226P Port 25)

Procedure:

  1. Open OC200 → Clients
  2. Camera must show as VLAN 40
  3. Test ping from Admin Desktop:
    ping <CCTV-IP>
    

Expected Result:

  • Ping successful
  • DHCP must assign IP 192.168.40.x

STEP 4 — Test VLAN 50 (VOICE)

Test Equipment:

  • IP Phone (Port 1718 SG2428P)

Procedure:

  1. IP Phone boots up
  2. Expected IP:
    192.168.50.x
    
  3. In OC200 → Clients, must see Voice VLAN 50

LLDP-MED Test: In OC200 → Switch → Port 1718, must see:

LLDP-MED: Active
Voice VLAN: 50

STEP 5 — Test VLAN 70 (Guest WiFi)

Procedure:

  1. Connect to SSID Guest
  2. Type:
    ipconfig
    
  3. Expected IP:
    192.168.70.x
    

Isolation Test:

ping 192.168.30.1   ← Must NOT pass
ping 192.168.10.1   ← Must NOT pass

PART 2 — Testing LACP (Step-by-Step)

Goal

  • ตรวจสอบว่า LACP ระหว่าง SG3210X-M2 ↔ SG2428P ทำงาน
  • ตรวจสอบว่า QNAP/ASUSTOR LACP ทำงาน
  • ตรวจสอบว่าไม่มี Mis-config

STEP 1 — Check LACP Status in OC200

Path: Insight → Switch → LAG Status

Expected status:

SG3210X-M2:

  • LAG1 (Port 12) → Up
  • LAG2 (Port 34) → Up
  • LAG3 (Port 56) → Up

SG2428P:

  • LAG1 (Port 2122) → Up

STEP 2 — Test Load Balancing

Procedure:

  1. Open QNAP → File Station
  2. Copy large file (1020GB) to Admin Desktop
  3. Open Task Manager → Performance → Ethernet
  4. Must see traffic on both links (Port 34 or 56)

Uplink Test:

  1. Run Speedtest between PC VLAN 30 → NAS VLAN 10
  2. Must achieve > 1Gbps (if 2Gbps LACP)

STEP 3 — Test Failover

Procedure:

  1. Disconnect cable from Port 1 of SG3210X-M2
  2. LACP must remain Up (using Port 2)
  3. Disconnect Port 2 → LACP must go Down

Repeat test with QNAP/ASUSTOR


PART 3 — Testing STP (Step-by-Step)

Goal

  • ตรวจสอบว่าไม่มี Loop
  • ตรวจสอบว่า Root Bridge ถูกต้อง
  • ตรวจสอบว่า STP Security ทำงาน

STEP 1 — Check Root Bridge

Path: Devices → SG3210X-M2 → Ports → STP

Expected:

SG3210X-M2 = Root Bridge

If not, adjust Priority:

SG3210X-M2 Priority = 4096
SG2428P Priority = 8192

STEP 2 — Test Loop Detection

Safe Test Method:

  1. Go to TL-SG1210P (Port 26 SG2428P)
  2. Create loop with LAN cable (Port 1 ↔ Port 2)
  3. Check OC200 → Alerts

Expected alert:

Loop Detected on Port 26
Port Shutdown (BPDU Protect)

Port must auto-shutdown


STEP 3 — Test STP Blocking

Procedure:

  1. Connect cable from SG2428P Port 19 → SG2428P Port 20
  2. Check OC200 → Switch → Ports

Expected:

STP State: Blocking

STEP 4 — Test Topology Change (TC Guard)

Procedure:

  1. Power cycle AP (Port 116)
  2. Check OC200 → Logs

Expected: NO message:

Topology Change Detected

Because TC Guard is enabled


PART 4 — Testing Checklist (SOP)

VLAN Tests

  • VLAN 10 gets IP 192.168.10.x
  • VLAN 30 gets IP 192.168.30.x
  • VLAN 40 gets IP 192.168.40.x
  • VLAN 50 gets IP 192.168.50.x
  • VLAN 70 gets IP 192.168.70.x

WiFi Tests

  • Staff WiFi → VLAN 30
  • Guest WiFi → VLAN 70

Device Tests

  • CCTV → VLAN 40
  • IP Phone → VLAN 50
  • Printer → VLAN 30
  • Admin Desktop → VLAN 10
  • NAS → VLAN 10
  • OC200 → VLAN 20

LACP Tests

  • LACP SG3210X-M2 ↔ SG2428P = Up
  • LACP QNAP = Up
  • LACP ASUSTOR = Up
  • Load balancing works (2Gbps)
  • Failover works (single link failure)

STP Tests

  • Root Bridge = SG3210X-M2 (Priority 4096)
  • BPDU Guard shutdown test (เสียบ switch ที่ port PC → port ต้อง shutdown)
  • Root Guard works (003-UNMANAGED-SWITCH)
  • STP Blocking works
  • TC Guard works (no topology change on AP reboot)

🔐 Security Hardening (ต้องทำเพิ่ม)

Required security configurations for Enterprise-grade network protection.


DHCP Snooping 🔥

Global: ENABLE

Trusted Ports:
- Uplink ไป Router (ER7206)
- Core Trunk (Port 1-2, 9)

Path: Settings → Wired Networks → Switch → DHCP Snooping

  1. Enable DHCP Snooping globally
  2. Mark Trusted Ports:
    • SG3210X-M2 Port 9 (to ER7206)
    • SG3210X-M2 Port 1-2 (Core Trunk)
    • SG2428P Port 21-22 (Uplink to Core)
  3. Untrusted: ทุก access port (จะถูก block ถ้าส่ง DHCP Offer)

Storm Control (AP Ports) 🔥

Broadcast: 1%
Multicast: 2%
Unknown: 2%

Path: Settings → Wired Networks → Switch → Port Profile → 004-AP-TRUNK

  1. Navigate to Bandwidth Control / Storm Control
  2. Configure:
    • Broadcast: 1% (หรือ 1000 pps)
    • Multicast: 2% (หรือ 2000 pps)
    • Unknown Unicast: 2% (หรือ 2000 pps)
  3. Save

📌 หมายเหตุ: ใช้ percentage หรือ pps ตามความเหมาะสมกับ traffic


STP Priority (Root Bridge Election) 🔥

SG3210X-M2 (Core): 4096
SG2428P (Access): 8192

Path: Devices → Switch → Config → STP → Priority

  1. SG3210X-M2: Set Priority = 4096 (Root Bridge)
  2. SG2428P: Set Priority = 8192 (Backup Root)
  3. Save and verify:
    OC200 → Topology → Root Bridge = SG3210X-M2
    

📌 สำคัญ: Core ต้องเป็น Root Bridge เสมอ


Jumbo Frame 🔥

MTU: 9000
(ต้องตั้งทุก device ให้เท่ากัน)

SG3210X-M2

Path: Devices → SG3210X-M2 → Config → Switch Settings

Jumbo Frame: Enable
MTU: 9000

QNAP

Path: Control Panel → Network & Virtual Switch → Interfaces

MTU: 9000

ASUSTOR

Path: Settings → Network → Interface → Advanced

Jumbo Frame: 9000

⚠️ คำเตือน: ถ้าตั้งไม่เท่ากันทุก device → จะมีปัญหา fragmentation หรือ packet drop


💥 Final Validation Checklist

Connectivity Tests

  • LACP = UP ทุกเส้น (Core↔Access, NAS)
  • Root Bridge = Core Switch (SG3210X-M2 Priority 4096)
  • เสียบ switch ที่ port PC → port ต้อง shutdown (BPDU Guard)
  • WiFi ได้ VLAN ถูกต้อง (Staff=30, Guest=70)
  • NAS เข้าถึงได้ทั้ง VLAN 10 และ 20
  • Guest VLAN เข้า LAN ไม่ได้ (isolation)

Security Tests

  • DHCP Snooping blocks rogue DHCP
  • Storm Control limits broadcast
  • BPDU Guard shuts down unauthorized switches
  • Root Guard prevents rogue root bridge

Performance Tests

  • Jumbo Frame works (MTU 9000 end-to-end)
  • LACP load balancing (2Gbps aggregate)
  • Failover works (single link failure)

  • Network Architecture Design — specs/02-architecture/02-03-network-design.md
  • VLAN Scheme — See VLAN Definitions section
  • IP Addressing Scheme — See DHCP table in VLAN Definitions section
  • Security Guidelines — specs/06-Decision-Records/ADR-016-security-authentication.md
  • Release Policy — specs/04-Infrastructure-OPS/04-08-release-management-policy.md (สำหรับ network changes)

Document Metadata

Property Value
Type Infrastructure Specification
Language Thai (explanations), English (technical terms)
Standards AGENTS.md v1.8.9
Review Cycle Per release or on equipment change
Approval Required Yes — Infrastructure Lead + Security Review