Skip to content

Cyber Neural Network: Architectural Overview

🌱 创建: 2026/03/21 ⏱️ 更新: 2026/03/25

“In the seven-layer network model, the hardest layer to troubleshoot is always the eighth: my own clumsy configuration that I haven’t noticed yet.”

This page documents the overall network wiring and logical planning of this “Cyber-Unfinished Building.” To defend against advanced hackers who don’t actually exist on the internet, I used OPNsense, VLANs, and complex static routing rules to build myself a literal labyrinth.

Judging by the results, my network security construction has been extremely successful: Hackers definitely can’t get in, because even I often can’t access my own intranet.

Current Network Health Assessment: Status: Schrödinger's Connectivity   Architecture: Hybrid Cloud Frankenstein   Protection: Self-Defense (Against Myself)


Displayed here is the crystallization of countless late-night hair-loss sessions (v4.2). Please note that due to over-engineering, the connections in the diagram may currently be in a state of “superposition collapse” in reality.

“Behind every string of IP addresses hides a tearful history of network unreachability.” > This is the current addressing manifest for all core laboratory equipment. The router is the gatekeeper, PVE is the foundation, and the rest are the “Cyber Slaves” under my command.

admin@core-switch:~# show ip arp table
NodeAddressLayer (VLAN/Port)StatusRole
🖲️ Main Router R6S192.168.100.1WAN/LAN🟡 Sporadic OutagesTraffic egress, home-wide proxy. Schrödinger’s connectivity.
🍎 Mac Mini192.168.100.42.5G Eth🟢 Peaceful & QuietProductivity office, service development. The most expensive SSH launcher in the house.
🖥️ PVE Host192.168.100.502.5G Eth🔴 Howling at Full LoadN100 Virtualization Management. Unplugging results in total family collapse.
🎛️ Core Switch192.168.100.220MGMT💤 Gathering DustLayer 2 Cloud Management. Configured once and never opened again.
🛡️ Virtual Gateway OPNsense192.168.100.247vBridge🟢 Interception FreakLab entrance. Successfully defended against the whole world, including myself.
💾 TrueNAS Storage10.20.10.xVLAN 10🟢 Data Black HoleNFS / iSCSI storage sharing. The sound of my wallet crying in the dead of night.
☸️ K3s Master10.20.10.10VLAN 10🟡 Crazy SwappingKubernetes Control Plane. Cannon Swatting Mosquitoes HQ.
☸️ K3s Node 0110.20.10.11VLAN 10🚷 Node OfflineCore workload container node. Often deserts the post due to poor “rations.”
🐳 Docker Core Engine10.20.30.10VLAN 30🟢 Independent & SanePure Docker environment. The ultimate practice ground for “Everything can be Dockerized.” Specifically used to run all sorts of weird containerized apps, ready to be spun up or deleted at will.
🪟 Cyber Desktop Pool (VDI)10.20.50.xVLAN 50💥 Lag-induced Hallucinations(New) Runs Linux/Win11 desktops. Specifically designed to torture the N100 to death.

  • 🟢 Peaceful & Quiet / Independent & Sane: Excess performance, zero pressure, or simply the only reliable node actually doing work in the server room.
  • 🟡 Sporadic Outages / Crazy Swapping: Barely usable, but hovering on the edge of a health-related collapse.
  • 💥 Lag-induced Hallucinations: Mouse lag trails of up to two seconds. A computational disaster caused by extreme misuse of the N100.
  • 🔴 Howling at Full Load: CPU fan spinning faster than my heart rate.
  • 🚷 Node Offline: Don’t know why, but it just won’t Ping anymore.
  • 💤 Gathering Dust: Lights are on, but nobody’s home.

Design Note (Regarding the Independent Docker Engine): Since “Everything can be Dockerized”, I had to set up an exclusive VIP playground for it. While K3s is cool, it’s just too heavy for running lightweight personal services. I specifically established this independent Docker Core Engine in VLAN 30. It breaks away from the complex orchestration of K3s and returns to the most raw and reliable docker-compose. This is the Foreman’s express lane for “day shift building, night shift demolishing”—fast to deploy, fast to destroy, fully embracing the freedom to tinker!