14 KiB
description, argument-hint
| description | argument-hint |
|---|---|
| Design network architecture and topology | Optional network requirements |
You are orchestrating a comprehensive network design workflow using a structured approach to create detailed network architecture plans.
Workflow Steps
1. Gather Requirements
If the user provides specific requirements in their message, use those directly. Otherwise, ask the user for:
Network Type and Purpose:
- Network environment (data center, campus, branch office, cloud, hybrid)
- Primary use case (server connectivity, user access, WAN, internet edge)
- Criticality level (production, development, testing)
Scale Requirements:
- Number of devices to support (servers, users, IoT devices)
- Expected throughput (1G, 10G, 25G, 100G, 400G)
- Number of sites/locations
- Growth projections (1 year, 3 years, 5 years)
Redundancy and High Availability:
- Uptime requirements (99.9%, 99.99%, 99.999%)
- Acceptable downtime window
- Failure tolerance (single link, single device, entire site)
- Disaster recovery requirements
- Geographic redundancy needs
Routing and Connectivity:
- Routing protocol preferences (BGP, OSPF, IS-IS, static)
- Layer 2 vs Layer 3 architecture
- Network segmentation requirements
- Internet connectivity (single/dual provider, bandwidth)
- WAN connectivity requirements
Security Requirements:
- Compliance requirements (PCI-DSS, HIPAA, SOC 2, NIST)
- Network segmentation needs (DMZ, internal zones, guest)
- Firewall requirements
- IDS/IPS requirements
- Access control requirements
Technical Constraints:
- Existing infrastructure to integrate with
- Vendor preferences or restrictions
- Budget constraints
- Physical space constraints
- Power and cooling constraints
Performance Requirements:
- Latency requirements
- Packet loss tolerance
- QoS requirements
- Bandwidth guarantees
2. Launch network-orchestrator Agent
Use the Task tool to launch the network-orchestrator agent with a comprehensive design prompt:
Design a network architecture for the following requirements:
[Insert all gathered requirements here]
Please provide a comprehensive network design including:
1. Network Architecture Overview
- Architecture type (spine-leaf, three-tier, collapsed core, etc.)
- Design rationale and trade-offs
- Scalability analysis
2. Topology Design
- Physical topology diagram description
- Logical topology diagram description
- Device placement and roles
- Link design and redundancy
3. IP Addressing Scheme
- Subnet allocation plan
- IP address management strategy
- VLAN design and numbering
- Loopback addressing scheme
4. Routing Design
- Routing protocol selection and justification
- IGP design (areas, levels, metrics)
- BGP design (AS numbering, peering strategy)
- Route summarization strategy
- Failure scenario analysis
5. High Availability Design
- Redundancy architecture
- Failover mechanisms
- Link aggregation design
- Gateway redundancy (VRRP, HSRP, anycast)
- Fast convergence mechanisms (BFD, tuned timers)
6. Security Architecture
- Network segmentation design
- Trust zones and boundaries
- Firewall placement
- ACL strategy
- Management network design
7. Device Requirements
- Switch/router specifications
- Port count and speed requirements
- Buffer and table size requirements
- Feature requirements
8. Implementation Phases
- Phase 1: Core infrastructure
- Phase 2: Distribution/access layers
- Phase 3: Services and optimization
- Migration strategy (if applicable)
9. Validation and Testing Plan
- Design validation steps
- Testing scenarios
- Acceptance criteria
10. Documentation Deliverables
- Network diagrams
- IP address inventory
- Configuration templates
- Runbooks
3. Review Design Output
When the agent returns the design, review it for:
- Completeness of all required sections
- Alignment with requirements
- Realistic scalability projections
- Appropriate technology selections
- Clear migration/implementation path
- Comprehensive failure scenario analysis
4. Create Design Documentation
Ensure the design includes comprehensive documentation:
Network Diagrams:
- Physical topology (rack elevations, cable paths)
- Logical topology (L2 and L3)
- IP addressing diagram
- Security zones diagram
- Failure scenario diagrams
Design Specifications:
- Bill of Materials (BOM)
- Cable schedule
- IP address allocation table
- VLAN table
- Routing protocol configuration summary
Implementation Guide:
- Pre-implementation checklist
- Step-by-step implementation procedure
- Configuration snippets
- Testing procedures
- Rollback procedures
5. Validate Design Against Requirements
Conduct a requirements validation check:
Requirements Validation Checklist:
□ Meets capacity requirements (current and future)
□ Meets redundancy/HA requirements
□ Meets performance requirements (latency, throughput)
□ Meets security requirements
□ Scalable to projected growth
□ Within budget constraints
□ Compatible with existing infrastructure
□ Follows industry best practices
□ Has documented failure scenarios
□ Includes clear implementation plan
6. Conduct Design Review Sessions
Organize design review with stakeholders:
Pre-Review Preparation:
- Distribute design documentation 1 week before review
- Prepare presentation slides
- Identify key decision points
- Prepare answers to anticipated questions
Review Agenda:
-
Executive Summary (15 min)
- Business requirements recap
- Proposed architecture overview
- Key benefits and trade-offs
-
Technical Deep Dive (45 min)
- Topology and architecture
- IP addressing and routing
- High availability design
- Security architecture
-
Implementation Plan (30 min)
- Phased approach
- Timeline and milestones
- Resource requirements
- Risk mitigation
-
Q&A and Feedback (30 min)
- Stakeholder questions
- Feedback collection
- Action items
7. Iterate Based on Feedback
After design review:
- Document all feedback and concerns
- Update design based on valid concerns
- Re-evaluate technology choices if needed
- Update cost estimates
- Revise implementation timeline
- Schedule follow-up review if major changes
8. Create Final Design Package
Assemble comprehensive design deliverables:
Design Documents:
-
Executive Summary (2-3 pages)
- Business requirements
- Proposed solution overview
- Cost and timeline summary
- Key benefits
-
Architecture Design Document (20-50 pages)
- Detailed architecture description
- Technology selection rationale
- All network diagrams
- IP addressing tables
- Device specifications
- Security design
-
Implementation Plan (10-20 pages)
- Phased implementation approach
- Detailed task list with owners
- Timeline/Gantt chart
- Testing plan
- Risk assessment and mitigation
-
Configuration Templates
- Base configuration templates
- Security hardening templates
- Monitoring configuration
-
Operations Runbook
- Day 1 operations procedures
- Troubleshooting guides
- Escalation procedures
- Maintenance procedures
Best Practices for Network Design
Architecture Selection
Spine-Leaf (Clos) Architecture:
- Use for: Data centers, high-performance computing
- Benefits: Predictable latency, easy scaling, high bandwidth
- Considerations: Requires L3 everywhere, more complex routing
Three-Tier (Core-Distribution-Access):
- Use for: Campus networks, traditional enterprise
- Benefits: Well understood, hierarchical, scalable
- Considerations: Can have bottlenecks at aggregation layer
Collapsed Core (Two-Tier):
- Use for: Small to medium enterprises, branch offices
- Benefits: Simplified, lower cost, easier management
- Considerations: Less scalable, potential bottlenecks
IP Addressing Best Practices
-
Use RFC1918 Private Address Space Efficiently
- 10.0.0.0/8 for large enterprises
- 172.16.0.0/12 for medium enterprises
- 192.168.0.0/16 for small offices
-
Allocate Contiguous Blocks
- Allow for route summarization
- Simplify routing tables
- Enable easier growth
-
Reserve Ranges
- Management network: /24 per location
- Loopbacks: /32 from dedicated range
- Point-to-point links: /30 or /31
- Future growth: 30-50% headroom
-
Document Everything
- IPAM (IP Address Management) system
- Spreadsheet with allocations
- DNS and DHCP integration
Routing Protocol Selection
BGP:
- Use for: Data center fabrics, internet edge, multi-tenant
- Pros: Scalable, flexible policy control, industry standard
- Cons: More complex, requires careful design
OSPF:
- Use for: Campus networks, enterprise core
- Pros: Fast convergence, well understood, feature-rich
- Cons: Flat area design doesn't scale, CPU intensive
IS-IS:
- Use for: Service provider networks, very large enterprises
- Pros: Scales well, stable, low overhead
- Cons: Less common, fewer engineers familiar with it
Static Routes:
- Use for: Small networks, specific use cases, backup paths
- Pros: Simple, predictable, no protocol overhead
- Cons: Not scalable, manual updates, no automatic failover
High Availability Design Principles
-
Eliminate Single Points of Failure
- Redundant power supplies
- Dual network paths
- Multiple uplinks
- Redundant services (DNS, DHCP, etc.)
-
Use Redundancy Protocols
- VRRP/HSRP for gateway redundancy
- LACP for link aggregation
- BFD for fast failure detection
- Route redundancy with equal-cost multipath
-
Design for Fast Convergence
- Tune protocol timers appropriately
- Use BFD (sub-second detection)
- Pre-provision backup paths
- Minimize spanning-tree domains
-
Consider Failure Scenarios
- Single link failure
- Single device failure
- Power failure
- Site failure (for multi-site)
- Human error
Security Design Principles
-
Defense in Depth
- Multiple layers of security controls
- Network segmentation
- Least privilege access
- Monitoring and logging
-
Network Segmentation
- Separate trust zones (internet, DMZ, internal, management)
- VLANs for logical separation
- Firewalls between zones
- Micro-segmentation for critical assets
-
Access Control
- Management network isolation
- SSH key authentication
- TACACS+ or RADIUS
- Role-based access control
-
Monitoring and Logging
- Centralized syslog
- SNMP monitoring
- NetFlow/sFlow for traffic analysis
- Security event correlation
Common Design Patterns
Data Center Leaf-Spine
Architecture:
- Spine layer: High-capacity switches (100G/400G)
- Leaf layer: ToR switches connecting servers
- Every leaf connects to every spine
- L3 routing to the leaf switches
Routing:
- BGP for underlay (eBGP with unique ASN per leaf)
- EVPN for overlay
- BFD for fast convergence
Benefits:
- Linear scaling
- Predictable latency
- High bandwidth
- Easy to automate
Campus Three-Tier
Architecture:
- Core: High-speed backbone (collapsed to 2+ switches)
- Distribution: Aggregates access switches, L3 boundary
- Access: User/device connectivity, L2 usually
Routing:
- OSPF for campus routing
- Default gateway at distribution
- Static routes to core (optional)
Benefits:
- Well understood design
- Clear hierarchy
- Scalable for medium to large campuses
Branch Office Hub-and-Spoke
Architecture:
- Central hub (data center or headquarters)
- Branch sites connect to hub
- Optional branch-to-branch (full mesh) for critical sites
Connectivity:
- MPLS WAN or SD-WAN
- Internet VPN backup
- Dual-homed branches for critical sites
Routing:
- BGP for WAN (with MPLS provider)
- OSPF or EIGRP internally
- Default route to hub
Design Validation Checklist
Before finalizing design:
Capacity Planning:
- Port density meets current needs + 30% growth
- Link bandwidth supports peak traffic + 50% headroom
- Routing table size within device limits
- MAC table size sufficient for L2 domains
Redundancy:
- No single points of failure in critical paths
- All uplinks are redundant
- Power is redundant
- Management access is redundant
Performance:
- Latency meets requirements
- Bandwidth meets requirements
- QoS design supports critical applications
- Convergence time is acceptable
Security:
- Network segmentation implemented
- Firewalls properly placed
- ACLs defined for critical segments
- Management network isolated
- Monitoring and logging configured
Scalability:
- Design supports 3-5 year growth
- IP addressing allows for expansion
- Routing design scales appropriately
- Physical space for additional devices
Operational:
- Monitoring and management tools identified
- Automation approach defined
- Documentation complete
- Training plan for operations team
- Runbooks created
Notes
- Network design is iterative - expect multiple revision cycles
- Involve all stakeholders early (network, security, operations, business)
- Consider operational complexity vs. technical perfection
- Document design decisions and trade-offs
- Plan for day 2 operations from the start
- Always have a rollback plan
- Test designs in lab before production deployment
Example Task Invocation
design-network I need to design a data center network for 500 servers across 10 racks, requiring 25G server connectivity and 100G spine uplinks, with full redundancy and BGP routing for a multi-tenant cloud environment