Networking Implementation Runbook

This page contains a standardized runbook of how I performed network implementations. This can be used as an checklist and guide, reference or as to-do list to describe at a high level how I perform such migrations. The information in this implementation guide is based on experiences and mistakes made in the past, with the goal of ensuring future implementations run as smoothly as possible and to minimize outage.

When do you use this implementation guide?

With network implementations, I mean the implementation, migration, or replacement of one or more of the following components:

  • DHCP server, IP address ranges, and/or VLANs
  • Firewall
  • Modem / internet-facing router
  • Switch or switches (managed and unmanaged)

Implementation guide overview

To keep the process as simple as possible, this implementation guide consists of three phases:

The phases of a network migration are:

  1. Preparation and configuration
  2. Implementation
  3. Post-check and completion

jv-media-7100-2fb61033955a.png


Phase 1: Preparation and configuration

In the preparation and configuration phase, all equipment is configured and prepared for implementation. This means I mostly connect all new devices, configure the firmware, updating all firmware to the latest available versions and register the devices into your asset management solution (CMDB).

Before configuring any equipment, the current situation must first be inventoried because you need to know what hardware to order.

1.1 Inventory of the current network

Perform the steps below to gather all required information:

Networks and address spaces

  • Perform an IP scan on all networks
  • Identify static IP addresses and DHCP reservations

Other systems

  • Inventory any camera surveillance system
  • Inventory any alarm system

1.2 Configuration of new equipment

The configuration may consist of:

  • Replicating the current situation (from step 1.1), or
  • A completely new implementation

For a fully new implementation, the list below can be used as a guideline.

Configuration tasks

The following components must be configured on the new network equipment:

  • Update firmware and software to the latest available versions
  • Configure networks and VLANs
  • Configure the DHCP server and address pools
  • Configure DHCP reservations
  • Configure DNS servers
  • Configure required firewall rules
  • Open required TCP/UDP ports (DNAT)
  • Preconfigure required Site-to-Site VPN connections

Phase 2: Implementation

The implementation phase is the shortest phase. It consists solely of switching the network to use the new equipment and/or a new IP range, DHCP server, or VLAN.

Follow:

  • 2.1 when deploying new network equipment
  • 2.2 when implementing a new IP range, DHCP server, and/or VLAN

2.1 Deployment of new network equipment

At the start of Phase 2, we assume that the new equipment:

  • Is already installed in the customer’s network cabinet
  • Is ready for cutover

Preferably, perform these activities outside of the customer’s business hours to minimize outage.

Implementation steps

  1. Ensure it is clearly known which cables must be switched
  2. To avoid DHCP and ARP issues, power off all switches completely and save their configurations prior
  3. Switch the cable(s) identified in step 1
  4. Verify that the connection is working
  5. Power on all switches that were turned off
  6. Verify network connectivity
  7. Enable any VPN connections (Point-to-Site and Site-to-Site)

Before proceeding to Phase 3, verify whether the following scenario applies.

2.1.1 Firewall – ISP modem → Bridge mode or DMZ

ISPs often provide their own modem. This modem should not be removed, as doing so may result in no support from the provider during outages.

To prevent double NAT, one of the following 2 options must be configured:

Bridge mode (preferred)
  • The modem forwards all traffic 1:1
  • Effectively functions like an unmanaged switch
  • WAN configuration is applied to the deployed firewall:
    • IP address
    • Subnet mask
    • Gateway
    • DNS servers

Note: Bridge mode may sometimes only be enabled by the ISP themselves. Take this into account when performing implementations outside of office hours.

DMZ (Demilitarized Zone)
  • The modem forwards all traffic to the deployed firewall
  • The WAN IP address of the firewall must be known to the modem
  • DMZ / Exposed Host must be configured on the modem

With either option correctly configured:

  • Internet access should function
  • External access to TCP/UDP ports should work

Phase 3: Post-check and completion

The final phase focuses on verifying whether the network implementation was successful.
All implemented components must be tested before leaving the customer — including evenings, weekends, or other special periods.

Work through the checklist from top to the bottom.
If an issue arises it must be resolved before continuing, due to component dependencies.

This ensures the implementation does not cause issues in the (near) future.

3.1 Extended testing list

CheckAdditional information
Firewall functionalityVerify the firewall operates correctly and is externally reachable for management
Switch functionalityVerify inter-switch traffic and PoE functionality (if applicable)
DHCP serviceVerify that a connected device receives the correct DHCP lease
DNS serversVerify DNS settings via ipconfig /all
Network connectivityVerify connectivity to the firewall using ping and/or HTTPS
Internet accessVerify that endpoints have internet access
DHCP reservationsVerify that all reserved devices received the correct leases
Site-to-Site VPNsVerify all Site-to-Site VPN connections
PrintersVerify all printers function correctly
ScannersVerify network features such as scan-to-folder, SharePoint, or email
Camera surveillance systemVerify cameras and external access (4G/5G), if applicable
Alarm systemVerify operation and test with the security provider
Open ports / DNATVerify all inventoried open ports function correctly
Point-to-Site VPNsVerify all client VPN connections

3.2 Short test list

  • Firewall
  • Switches
  • DHCP
  • DNS
  • Network connectivity
  • Internet
  • DHCP reservations
  • VPN – Site-to-Site
  • Printers
  • Scanners
  • Camera surveillance system
  • Alarm system
  • Open ports / DNAT
  • VPN – Point-to-Site

Summary

This page describes how I have done network implementations in the past and use it as a checklist to perform future implementations. Sometimes in the heat of the moment you forget some things here and there. To address this problem, I created this checklist for myself.

 

End of the page 🎉

You have reached the end of the page. You can navigate through other blog posts as well, share this post on X, LinkedIn and Reddit or return to the blog posts collection page. Thank you for visiting this post.

If you think something is wrong with this post or you want to know more, you can send me a message to one of my social profiles at: https://justinverstijnen.nl/about/

Go back to Blog homepage

If you find this page and blog very useful and you want to leave a donation, you can use the button below to buy me a beer. Hosting and maintaining a website takes a lot of time and money. Thank you in advance and cheers :)

Buy me a beer

The terms and conditions apply to this post.

Last modified April 27, 2026: Updated post date (a994745)