Network pics thread

lol, piles of 3750s but the desk is made of plywood... classic...

I'd ask them to spring for something that won't tear your clothes or give you splinters while you are working. :D

Its the typical Amazon.com door desk.

http://www.fastcompany.com/magazine/85/bezos_2.html

And all the desks are still modeled after the one Bezos built for himself in the early days (and still uses): a cheap wooden door as the top, connected by metal brackets to sawed-off two-by-fours as the legs. Bezos believes in "conserving money for things that matter," he explains. "If you look at this building, you can open the windows and get fresh air and natural light. Those things actually matter to people. Having a mahogany credenza does not."
 
"things that matter" being his eleventy-bajillion dollar home he now lives in... or one of his Manhattan penthouses I'm guessing...
 
Shoot I'd say keep one or both, that way when you stumble across a card for one you won't be kicking yourself for getting rid of it. That said, have a look at the following links for the 3600 and 2600 routers:
http://www.certificationkits.com/cisco-3600-router/
http://www.certificationkits.com/cisco-2600-router/
That site also has some good suggestions on how to setup a nice lab.

Also note that one of your 2600's is equipped with a very nice terminal server card. I believe it's capable of supporting 8 serial/terminal devices per port with the Cisco octopus connector for a total of 32. I love those things!! Not much use in a home environment, but if you have a lab or rack full of switches those things can really come in handy!:D:cool:

Sweet, I love the place I get these from. $20/each normally.
 
Well, after the new server build I found myself with some extra parts. I needed a PC for my 8 port serial card (for console access to all my Cisco gear), and since I had a giga mobo out of my old server, I threw my old duo core chip in there along with 4 gigs of memory and got a new terminal machine:

20110306145230386.jpg


This machine has direct console access to all of my gear, and might host two xp vms on it which will be my lab vms (with the vlan tagging I was speaking earlier about).

The machine is usually off, and I have WOL enabled so when ever I need it, its a click away.
 
Got my monoprice order. Tons of cat6 cables for this and future uses, a shelf, and random stuff, not all related. And I got a free candy! :D

I should have gone with 2 footers and not 1 footers, but managed to get them to reach. Won't be so much a problem once I get myself a 24 port managed switch then I can just plug them all in and go by port number and vlan / enable / disable as needed.

lrg-1117-dsc03676.JPG



Cable management not the best, but I do want to improve it, not sure on how yet, but I want a decent cable management system of some sort. I really like those panduit conduits that go on sides, might do something like that, or do something more custom. No more money yet so it's staying this way for now. I don't want to start tie wrapping like a mad man, knowing this is temporary.

lrg-1118-dsc03678.JPG



And full rack view, probably the last time for a while till I change stuff.

lrg-1119-dsc03681.JPG
 
These don't appear to be UL listed

I'm sure that's not really a big deal. UL listed items have gone through all sorts of tests to ensure safety. What is there to test in something that simple from a safety aspect? A power outlet on the other hand should be UL listed as it is directly carrier current and if there is a fault it could be a hazard.

I might go that route.
 
Heres todays work... got up at 6am... got to clients by 8am, stayed till about 6pm

190381_1646227310972_1095570040_31489687_1928435_n.jpg


183133_1646227750983_1095570040_31489689_7559800_n.jpg


199346_1646228471001_1095570040_31489691_6962600_n.jpg


188650_1646228751008_1095570040_31489692_7751161_n.jpg


198034_1646228871011_1095570040_31489693_4131211_n.jpg


189822_1646229311022_1095570040_31489694_1317318_n.jpg


198178_1646229911037_1095570040_31489698_8296271_n.jpg


189026_1646230431050_1095570040_31489699_468147_n.jpg


199411_1646230831060_1095570040_31489700_7391114_n.jpg


189381_1646231311072_1095570040_31489702_6823069_n.jpg


200811_1646231791084_1095570040_31489703_1354257_n.jpg


190150_1646232071091_1095570040_31489704_962154_n.jpg
 
Why Netgear again?

You mentioned why at some point, but I can't remember why.

yea, kinda seems odd that you'd go through the time and expense of wiring it like that, and then put in the cheapest switches you can find. Nice job on the rack install though.
 
They look un-managed at that too. Adam how do you take care of vlans and what not? Or do you just take take 1 vlan for everything.
 
I use Netgear because it carries a lifetime warranty. Its also inexpensive and for my clients purposes, they don't need expensive switches. They just go on the internet and connect to a file server. Only real benefit they could go to would be gigabit but i dont think they wanna spend a lot, especially since they paid a fortune for everything else we installed (like alarm/access control).

Ive never had issues with netgear really. Outta all the years ive used them, i had to replace maybe a few switches here and there, nothing bad.

The PoE switches are managed, not that i need to worry about managed, we just needed PoE.

We don't use VLANS currently, the clients not that big... i mean it MAY benefit now. They used to have two buildings seperated and used an MPLS setup for a while then just got rid of the T1's and did a VPN with the Cisco Small Business routers... did fine. Now they built a new place next to their existing place, so the two buildings will be on the same network. So I'd actually benefit now from a VLAN (1 for data, 1 for phones)... problem is.. i have to find out if i can do that on 1 wire... meaning two vlans on one wire.

Their old space share the phones/data lines on some stations. For example

90% of the phones go into a PoE switch and 90% of data go into the Netgear Switch.

The remaining share the same wire. The PoE spits out the line for the phone, then off the phone is an output data line that goes to the computer... we did this because a few offices split in half to add more stations, so rather then wire more lines up, we were able to use the 2nd data line off the phone... but that meant that the phone/computer had to be on same network (WHICH they were so it wasnt a problem).

Now in the new space, all phones are on PoE switches so i could definitly do a VLAN easily, as i can plug the PoE switches into the netgears 2nd lan port dedicated for a VLAN... but how could i manage the other side of the network, where its a mixture??? Can i just have all my devices connect to switches to switches to switches to switches.. and then setup TWO vlans, and just program the different ips into my devices?? Can that work? If so i DEFINITLY wanna do that.

I have no VLAN experience, and id like to get some under my belt. All my clients have been small networks, this one started small but we're increasing/growing everyday with it.
 
VLANs aren't too bad actually. Netgear makes a layer 3 switch.. Since you love your netgear... LULz

I don't know, but I would rather split out certain types of traffic instead of them all on one lan. We have vlans for Lan, IP Cameras, VOIP, Staff Wifi, Guest Wifi..
 
Would i be able to do that as everythings wired now, using the regular linksys switches? They arnt managed switches for the computers so anyway to do that with VLANS or do i need to use managed?
 
Would i be able to do that as everythings wired now, using the regular linksys switches? They arnt managed switches for the computers so anyway to do that with VLANS or do i need to use managed?

need managed switches to tag VLANs on the ports. switch needs ot support .1q VLAN tagging.
 
bleh boo... sooo no vlan playing this time i guess... well i can actually with the public wifi we're putting in this building

Shoulda went with these:

http://www.neweggbusiness.com/Product/Product.aspx?Item=N82E16833122344

Ehh no biggie

Looks like the PoE switches I use for the phones support it (IEEE 802.1Q Static VLAN (128 groups, Static)... but like I said, some of the phones also plug into computers... so thats not gonna help
 
Last edited:
why not? use the tagged vlan for voip traffic and the untagged vlan for workstation traffic, so long as your phones support it.
 
It means they're inappropriate for use in permanent installations. If you're going to put them in the wall, in an equipment closet, or a service installation, a UL rating is required. If they're bundling cables under your desk, they're fine.
 
why not? use the tagged vlan for voip traffic and the untagged vlan for workstation traffic, so long as your phones support it.

Part of the network (maybe 4-5 computers/phones is all actually) looks like this

Managed Switch ----> Phone ---> Computer

So if i tagged the port, the damn computer would be on the very end of it, and be part of that Phone VLAN rather then the main PC network.

Unless I was able to tag the port, and the phones are on the vlan, and then if the PC was programmed with a different IP (like say 192.168.1.210) it would be part of the main PC network... the only other option is to put in little 5 port switches in the rooms that have that, to seperate the computers from the phones network... seems like extra work for something thats not gonna hinder the network anyway.

We have maybe 40 computers, 10 printers and then maybe 40-50 phones in total between the two buildings.
 
It means they're inappropriate for use in permanent installations. If you're going to put them in the wall, in an equipment closet, or a service installation, a UL rating is required. If they're bundling cables under your desk, they're fine.

I normally use those velcro straps from monoprice also... just forgot to actually order them for this project, so zipties was all I had... i prefer the velcro straps as they are easier to add more wires later... zipties are faster but to cut them all if i have to add a line sucks.
 
I know on our managed switches the port can be configured to take both tagged and untagged traffic. So you should be able to TAG the phone traffic with a VLAN ID and then leave the PC untagged or assign it a VLAN based off it being untagged.

I'm getting ready to head down this same path, if our phones don't support VLAN tagging then I will just tag based off the MAC address on the switch side. Just more to maintain that way.
 
What if our phones support vlan tagging, do i need a managed switch then???
 
Don't you want to use POE if you're doing VOIP? I think you want a managed switch that has POE, too.
 
Yes and you would need to put your phone system on the same vlan or route between that vlan and the subnet where your phone system is, easier just to put it on the vlan with the phones.
 
Well right now the phone guys did this (we didnt do the phones, another company did)...

They have their main phone system. Its on its own public internet address. They then have it plugged into one of our switches. Then their phones all plug into a PoE switch (or some shared the same network line as a computer.. but all switches are connected)...

I just did some research on their site, and saw the following about VLANS:

QoS features present in the Allworx product line (6x, 10x, 24x, 9102 and 9112)
- VLAN (with priority) support in phones.
- DiffServ tagging of all voice traffic: value 2E.
- Call Admission Control on a per-proxy and overall PBX basis.
- priority handling of voice vs. data on LAN-to-WAN passage.


So with all that said (meaning most of the phones I know go into a PoE switch but SOME phones, like 4-5 of them, are plugged into a regular netgear switch) could I put them on a seperate VLAN if the phone itself supports it? Would i be able to have that phone plugged into a regular switch since the Phone itself supports VLANS? Or do i still need that phone to go into a switch that supports vlan tagging?

Anyway I can give my router a list of mac addresses designated to a seperate VLAN??? I have the IP/Mac list available easily for all those phones. They are just spread out is the problem. in the older suites that is (they've done like 3-4 renovations over last few years, the OLDEST reno is the one where some of the phones go into a regular switch, they get power locally)... everything else besides those few switches, the phones all hit a PoE switch and thats all thats on the PoE (managed) switch. but again, as i've said a FEW phones get local power and tap into the main computer network (since its right now all one BIG nework.. the phones are using a range of 192.168.1.150 - 192.168.1.199)
 
You need to do a bit of reading up on how VLANs work I think, pictures forum is a bad place to explain it all. But I think what hasn't clicked yet is that .1q allows you to tag multiple VLANs on a physical interface. packets tagged on a VLAN are ignored by devices that are not VLAN aware (most workstation), but your phones would see the tagged packets.

so, on a switch port, you would tag say, VLAN 2 and your voice VLAN, all traffic on VLAN 2 on that port would be tagged, and lets say VLAN1 is untagged on that port, packets would not have .1q VLAN tags, and be seem by your PC. So on one physical switchport you'd have the phone "talking" on VLAN2, and your workstation tlaking on VLAN1
 
yeah guys this is a pictures thread, start a thread on VLAN would probably help people.

Adam I think they say if you had a VLAN
VLAN1 - DATA
VLAN2 - PHONE

you would tag the phones for vlan2, but the ones that share hte desktop and phone would tag on both.
 
Figure I'll add my lame stuff to get us back on pictures, lol :p

My core router (middle firebox), and the not installed/probably never will be used CARP partner. Both are Firebox X Cores with 1.4GHz CPU, 512MB RAM, and 4GB Microdrive running pfSense 2.0. Rack ears just removed for easy access.
Under them is an Intel Atom 330 1u server running Server 2008 that handles NAS/Seedbox/VMs/Pandora timeshifting proxy
routers.JPG


Overview of the firehazard itself:

cab.JPG


I hope to get a 42U rack and put it in my "server room", but I don't really have much yet to justify it. I'll probably get it when I start building a Cisco lab. The crappy wiring will be redone when I move it. On a 35/35 Verizon line (Average 7TB up/down monthly), also a link to my grandparents house so I can manage their traffic and handle backups/steal their barely used FIOS :p
I have three wireless APs spread over the house for complete coverage, works pretty seamlessly with client roaming, can't complain. When family comes over than can be like 20+ devices all using the WiFi, never a hiccup so far.
 
Last edited:
Back
Top