This document describes the configuration of the active network components.
To provide building-to-building connectivity, we use the stacking features of the DGS-3130 series switches. Those switches have 10GBit ports that can be put into a special mode, where they function as a transparent bus between up to 9 switches of that series.
The set of switches connected in that way is referred to as a stack. From the administrators point of view, the switches participating in a stack can be configured as one entity, by connecting to the designated master switch only. The port addressing includes not only the port number, but also the stack ID of the switch they belong to. This ID is configured explicitly before adding a switch to the stack.
Stack ID | Location | Stack Priority | Linked Switches (Stack ID) |
---|---|---|---|
1 |
Local Elec C (Tines 5C) |
TBD |
4,2 |
2 |
TBD |
1,7 |
|
4 |
Local Elec A (Tines 3C) |
TBD |
1,5 |
5 |
TBD |
4,7 |
|
7 |
Local Elec B (Tines 1) |
TBD |
2,5 |
Virtual Local Area Networks (VLANs)
To isolate devices and allow only specific communication relations, while installing only a minimum of physical links (thus reducing costs), it is common practice to define so-called VLANs.
The simplest implementation of this concept is to assign specific switch ports to logical layer 2 local networks. Only ports assigned to the same logical network (VLAN) are visible to each other. To distinguish those VLANs, they are identified by numbers (VLAN IDs).
More advanced concepts exist, to simplify the configuration of typical application scenarios and network topologies. We use two of those, that are implemented by D-Link managed switches:
-
Asymmetric VLAN (DGS-1210 series)
-
Private VLAN (DGS-3130 series)
Both variants allow connectivity between two sets of ports but without implicitly connecting the ports within one of those sets. This is sometimes called the "hotel setup".
Packets are assigned to specific VLANs by 'tagging' them with a special layer 2 packet header, containing the VLAN ID. In most cases, this happens when untagged ("normal") packets enter a specific switch port that is configured as an "access" or "host" port. They carry that VLAN ID when passing though the switch fabric but loose them as soon as they exit the switch via another access port.
Switch ports can also be configured as "trunk" ports. Those ports only accept or output tagged packets, untouched. That way they can travel to another switch or router, where they are still identifiable with respect to the VLAN they belong to.
Derived from our physical network layout and the need to effectively separate most devices from each other, we define VLAN IDs as follows:
VLAN ID | Purpose |
---|---|
1 |
default: inter-switch protocols, administration (only) |
11 |
shared internet: Swisscom VLAN for Init7 traffic |
100 |
technical monitoring: uplink to modem with 13 static public IPs { IPP0 .. IPP12 }, also including masquerading NAT + DHCP router |
20n |
technical monitoring: devices configured for public static IPPn with n = { 1 .. 12 } |
4nn |
technical monitoring: devices in separate DHCP enabled IPv4 subnets behind masquerading NAT + DHCP router |
2000 |
shared internet: uplink to modem / router for community uplink with public dynamic IP / primary of private VLAN |
2100 |
shared internet: all rooms eligible for community access / isolated of private VLAN |
2200 |
public services (servers) |
2300 |
boisrond WiFi |
To isolate the DHCP-assigned monitoring devices, each gets its own address range in its own subnet. For simplicity and maximum compatibility, we use class-C subnets even though they only need a single address. The gateway (Edge Router X) has the .1
address in each subnet. The range reserved for DHCP starts from .128
.
Device | IP subnet | VLAN ID |
---|---|---|
Neovac MCR C |
192.168.10.0/24 |
410 |
Neovac MCR B |
192.168.11.0/24 |
411 |
Neovac MCR A1 |
192.168.12.0/24 |
412 |
Neovac MCR A3 |
192.168.13.0/24 |
413 |
Photovoltaique Local Elec C |
192.168.20.0/24 |
420 |
Photovoltaique Local Elec B |
192.168.21.0/24 |
421 |
Photovoltaique Local SIN B |
192.168.22.0/24 |
422 |
Photovoltaique Local Elec A |
192.168.23.0/24 |
423 |
Temporary / internal use |
192.168.30.0/24 |
430 |
Sprinkler |
192.168.40.0/24 |
440 |
e-mobility Local SIN B |
192.168.50.0/24 |
450 |
e-mobility WiFi charging bots |
192.168.51.0/24 |
451 |
e-mobility WiFi users |
192.168.52.0/24 |
452 |
parking WiFi users |
10.133.0.0/16 |
453 |
chaudières |
192.168.60.0/24 |
460 |
Scope | IP address/mask | VLAN ID |
---|---|---|
Management (routers, switches, management services) |
10.134.0.0/16 |
1 (default VLAN) |
Shared internet clients routed to Init7 connection and public services |
10.133.0.0/16 DHCP ⇒ 10.133.32.1 … 10.133.255.254 |
2000, 2100 |
Public services |
10.132.0.0/16 |
2200 |
boisrond WiFi |
10.136.0.0/16 |
2300 |
Device(s) | Location | IP address/mask | VLAN ID |
---|---|---|---|
NetPlus Modem |
Local Elec C (Tines 5C) |
bridge |
100 |
DGS-3130 Stack ID 1 |
10.134.0.1/24 |
1 |
|
DGS-3130 Stack ID 2 |
10.134.0.2/24 |
||
DGS-1210-16 |
10.134.0.151/24 |
||
Edge Router X |
10.134.0.152/24 |
||
192.168.x.y |
4nn |
||
NetPlus static |
100 |
||
Nokia XS-010X-Q |
Local Elec A (Tines 3C) |
bridge |
11 |
Mikrotik CCR2004 router |
10.133.0.1/16 |
2000 |
|
10.132.0.1/16 |
2200 |
||
10.136.0./16 |
2300 |
||
Init7 DHCP |
- |
||
DGS-3130 Stack ID 4 |
10.134.0.4/24 |
1 |
|
DGS-3130 Stack ID 5 |
10.134.0.5/24 |
||
DGS-1210-16 |
10.134.0.131/24 |
||
Auth (Banana PI M1, server) |
10.134.0.132/24 |
||
10.132.0.132/16 |
2200 |
||
Services (Raspberry Pi 4, server) |
10.134.0.133/16 |
1 |
|
10.132.0.133/16 |
2200 |
||
Archer C80 (WiFi router, boisrond) |
10.136.x.y/16 DHCP |
2300 |
|
DGS-3130 Stack ID 7 |
Local Elec B (Tines 1) |
10.134.0.7/24 |
1 |
DGS-1210-16 |
10.134.0.111/24 |
||
RB260GSP |
Local SIN B |
DHCP / check on Edge Router X |
|
bridge |
450 |
||
DAP-2610 |
Parking |
10.134.0.112/24 |
1 |
bridge |
451 |
||
452 |
|||
453 |
A server "auth" is envisioned to manage VPN users and 802.1X authentication. This server will be available in the management VLAN (to authenticate VPN users) and in the primary VLAN of the shared internet private VLAN (for WPA2-Enterprise access). It has multiple logical interfaces for its single physical connector.
This device will also provide backup storage for the "services" server.