Jump to content
Search In
  • More options...
Find results that contain...
Find results in...

Network layout showoff

29 minutes ago, eece_ret said:

Day job

-snip-

I'm assuming Standalone VxLAN and not ACI since I didn't see any APIC listed. Why not some 9336C-FX2 instead of the 93240-FX2 boxes? The 9336 can be downsped to 10G if needed but gives you that 40/100G headroom to not need to rip/replace later if you don't need tons of 10G port density. If it's not ACI, are you doing standalone management via the CLI? API and a third party tool? DCNM?

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to post
Share on other sites

Yup.  Stand alone NXOS, no ACI.  BGP EVPN Ingress replication.  EVPN Edge routers (93240 FX2) underlay single OSPF domain peered across L2 Backbone.  Good Q on the 9336's.  They are slated as my upgrade path for local site expansion.  For cost reasons we are utilizing the 93180's I for that purpose as the 93180s are simple l2 boxes for VSAN traffic (Basically a FC design using Ethernet/IP instead of FC).  The backplane capacity is large enough that with our current deployment, the added 100G intrasite interconnects with VSAN full tilt (16port at full 25G Bi Directional), we still have more than enough headroom.  Once our Edge Router population exceeds the available ports, the migration path to 9336's is very straighforward.  As im using dual OSPF uplinks off routed interfaces, I can down an entire side of an EVPN edge router migrate it to another L2 infrastructure (9336) without loss of traffic (BFD utilized here)  Easy peesy.

 

Management via Ansible :)

Except for VRF Formation and BGP peering.  Thats by hand (uncommon workflow, less time to just do it than work through all the playbooks)

Link to post
Share on other sites

DCNM looked very interesting, but we felt the cost of which could be put to more pressing needs.

Link to post
Share on other sites
Just now, eece_ret said:

DCNM looked very interesting, but we felt the cost of which could be put to more pressing needs.

Yah, the people I deal with use DCNM now for their fabrics after a long battle. I remember ~2 years ago when we/they started looking at DCNM 10.4 and comparing it to now (11.4) the difference is night and day with the added features/functionality. It's definitely come a long way and the automation via API is nice but if you're not doing large (2000-4000+ port) fabrics it doesn't really make sense though since you could easily manage a few small fabrics without it and the added cost just isn't worth it.

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to post
Share on other sites

"automation via API is nice but if you're not doing large (2000-4000+ port) fabrics it doesn't really make sense though since you could easily manage a few small fabrics without it and the added cost just isn't worth it."

 

We came to teh same conclusions :) 

Link to post
Share on other sites
On 8/17/2014 at 7:24 AM, Ssoele said:

Some rules

<snip>

  • It must be your own network; Don't try to impress by showing off a corporate network, we are looking for consumer networks :D

 

Looking to buy GTX690, other multi-GPU cards, or single-slot graphics cards: 

 

Link to post
Share on other sites
5 hours ago, eece_ret said:

<image removed>

I bet the Topology map in the Unifi Controller is all messed up, with having one Unifi switch, and it isn't even connected to the gateway. But otherwise looks fine.

Looking to buy GTX690, other multi-GPU cards, or single-slot graphics cards: 

 

Link to post
Share on other sites
  • 3 weeks later...

This is mine. Hopefully the diagram is done OK, the days of high school where we were building networks in Packet Tracer are long gone :D 

Network_setup2.thumb.png.c7721fbf59fb47c96456e00143bf2c44.png

 

 

If anyone is interested I've just posted a topic about setting up a new network for our house. I could sure use some help from you guys. 

 

CPU: 2x Xeon E5 2670 Motherboard: ASRock EP2C602-4L/D16,  RAM: 64GB of 1333 MHz mermory from Samsung (ECC),  GPU: Gigabyte GTX 1070,  Case: NZXT Switch 810, Storage: Samsug EVO 250GB and 500GB, 3x3 TB and 1x1TB  HDD  PSU: Corsair RM 850,  Mouse: Logitech MX Master 2s,  Headset: Beyerdynamic DT 770 PRO black edition (80 ohm), OS: UnRaid with two VMs and Plex 
Link to post
Share on other sites

I did a small upgrade to my home network (again)

 

1036511123_NetworkPlanB.thumb.png.97e4209445b74d2258f3d5154ac778e0.png

 

 

Edited by Grumpy Old Man

Grumpy Old Man

    Since 1899

Link to post
Share on other sites
  • 1 month later...
1 hour ago, sapage said:

Do this count as part of my home setup?

 

That's a nice device for lab use! But I'm not sure it counts as your home setup if it isn't part of the network that has to be working for your significant other, offspring, etc. to have internet access. There has to be stakes involved!

Looking to buy GTX690, other multi-GPU cards, or single-slot graphics cards: 

 

Link to post
Share on other sites
On 11/2/2020 at 12:09 AM, sapage said:

Do this count as part of my home setup?

 

You can start a datacenter with that! :D

 

CPU: i7 4790K |CPU Cooler: CM Hyper 212 Evo | Motherboard: Z97-A | RAM: 4x4GB Kingston Memory 1600mhz | GPU: Nvidia GTX 1060 6GB Zotac Mini | Case: K280 Case | PSU: Cooler Master B600 Power supply | SSD: 120GB Kingston V300 SSD | HDDs: 1x 250GB & 1x 1TB WD Blue | Monitors: 24" Acer S240HLBID + 24" Samsung  | OS: Win 10 Pro

 

Audio: Behringer 302USB Xenyx 5 Input Mixer |  U-PHORIA UMC204HD | Neweer NW-700 Mic | Sound Blaster Audigy Fx PCI-E card

 

Networking gear:  Lenovo ThinkCenter M82 ESXi 6.7 | Lenovo M93 Tiny Exchange 2019 | TP-LINK TL-SG1024D 24-Port Gigabit | Cisco ASA 5506 firewall  | Cisco Catalyst 3750 Gigabit Switch | HP MicroServer G7 NAS |

Link to post
Share on other sites
On 11/2/2020 at 1:09 AM, sapage said:

Do this count as part of my home setup?

I see your 6500 Chassis and I raise you with 3 more :)


IMG_20201108_124839.jpg.092fe115fee4c41590ab7b1bce609306.jpg

 

Okay okay, lets call it 2.5 more 😜

Respect the Code of Conduct!

>> Feel free to join the unofficial LTT teamspeak 3 server TS3.schnitzel.team <<

>>LTT 10TB+ Topic<< | >>FlexRAID Tutorial<<>>LTT Speed wave<< | >>LTT Communies and Servers<<

Link to post
Share on other sites

Redid a lot of cabling recently.

 

Spoiler

20201030_161245.thumb.jpg.a10edde1aba18e34486c65801336bd54.jpg20201030_161302.thumb.jpg.707695c8d341b72daed34f4707e02cb9.jpg

 

Updated Diagram:

Spoiler

1096421493_HomeNetwork-Nov2020.thumb.jpg.2c91dfa9aa65ef0373df878b35161a44.jpg

 

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to post
Share on other sites
43 minutes ago, Lurick said:

Redid a lot of cabling recently.

 

  Hide contents

20201030_161245.thumb.jpg.a10edde1aba18e34486c65801336bd54.jpg20201030_161302.thumb.jpg.707695c8d341b72daed34f4707e02cb9.jpg

 

Updated Diagram:

  Hide contents

1096421493_HomeNetwork-Nov2020.thumb.jpg.2c91dfa9aa65ef0373df878b35161a44.jpg

 

Why is one MR56 only linked at 2.5Gb? I haven’t used any Meraki switches or APs with more than 1Gb copper ports, but based on the datasheets I don’t see why.

Looking to buy GTX690, other multi-GPU cards, or single-slot graphics cards: 

 

Link to post
Share on other sites
1 minute ago, brwainer said:

Why is one MR56 only linked at 2.5Gb? I haven’t used any Meraki switches or APs with more than 1Gb copper ports, but based on the datasheets I don’t see why.

Ah, it's able to do 5Gbps BUT the wiring has issues where it will only stay stable at 2.5Gbps for the one so I hard coded it to 2.5 instead of letting it randomly reset when on auto and it would do 5Gbps.

Current Network Layout:

Current Build Log/PC:

Prior Build Log/PC:

Link to post
Share on other sites
  • 2 weeks later...

I did a small upgrade to my home network (again)
No more Game Consoles and two new NAS.....BlaBlaBlaah 🤓

 

1654561382_NetworkPlanB.thumb.png.8eb2a75c720d956934813274f77b47ca.png

Grumpy Old Man

    Since 1899

Link to post
Share on other sites

A better question is how do you guys protecc your network

Link to post
Share on other sites

Just basic stuff:

  • good firewall (pfsense in my case)
  • use VLAN's to segregate devices that need it(security cameras, windows machines etc)
  • forget vnc and rdp
  • use a password manager with 2fa instead of reusing passwords
  • ssh set to key auth only
  • dont use admin accounts for accessing shares
  • enable auto updates (except windows, it mostly does more harm than good)
  • isolate publicly exposed services onto their own VLAN, all of them is virtualized and backed up regurarly.
  • made sure i have at least 2 copies of important files locally and one remote backup (encrypted client side so the remote location has no idea whats inside my backups)
Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now


×