From Idea to Iron: Building the Backbone of DFG
There comes a time when planning and dreaming give way to action — when whiteboards and to-do lists turn into cables, servers, and real movement. At some point, you’ve got to stop mapping and start building, swing for the fences, and trust that the blueprint in your head is worth betting on.
Today was that day for me. This was the moment where the vision for Digital Fortifications Group stopped living only in ClickUp and conversations — and started showing up in the real world. I made the leap, locked in the hardware, and committed to building the foundation of something I believe in: a fully self-hosted, high-security command center that reflects everything DFG stands for.
What We Accomplished Today
- ✅ Finalized the full server hardware list for DFG’s Command Center, including core, edge, and backup machines
- 🧠 Refined each system’s role and specs to align with performance, security, and redundancy goals
- 🛒 Sourced components across multiple vendors (Amazon, Newegg Business, CDW) to optimize cost, availability, and quality
- 🔍 Double- and triple-checked compatibility of CPUs, RAM, drive trays, power supplies, and rack gear
- 🧩 Mapped out deployment phases and rack layout, tying everything back to DFG’s high-security infrastructure blueprint
- 💸 Pulled the trigger and placed the orders — officially moving from theory to build mode
The Backbone of DFG: Hardware at a Glance
After weeks of planning, refining, and revisiting every detail, we landed on a three-server architecture designed for security, scalability, and total self-hosted control:
- Core Operations Server: Dell PowerEdge R720xd
Dual Xeon E5-2680v2 | 512GB RAM | 26-bay chassis
Primary internal compute and storage — the heart of DFG’s operations. - Edge Server: Lenovo ThinkSystem SR250
Intel Xeon E-2124 | 32GB RAM | 4-bay chassis
Handles public-facing services (email, calendar, web apps) and acts as the secure gateway. - Backup Server: Dell PowerEdge R720xd
Dual Xeon E5-2690v2 | 256GB RAM | 26-bay chassis
Dedicated backup and archival node to support disaster recovery and long-term retention.
Core Networking Hardware & Design
No fortress is complete without walls, gates, and checkpoints. The networking layer of DFG’s Command Center is built to enforce Zero Trust principles from the ground up, while still keeping things fast, clean, and manageable.
🧠 Network Design Highlights
- VLAN segmentation across internal, lab, DMZ, and VPN traffic zones
- Firewall at the edge to enforce strict ingress/egress rules and IDS/IPS inspection
- Smart managed switching for flexible port-based VLAN tagging and device isolation
- Single secure uplink from ISP drop to rack using shielded CAT6
🛠️ Core Networking Gear
- Perimeter Firewall: Hardware firewall — the front line of DFG’s perimeter defense
- Managed Gigabit Switch: Handles VLAN tagging, internal traffic, and future PoE devices
- Patch Panel + Cable Management Kit: Keeps the rack clean, accessible, and fully labeled
- Rackmount PDU: Power distribution with surge protection across all rack gear
- AC Infinity Rack Fans: Active cooling to keep the airflow optimized
- 1000VA Rackmount UPS: Battery backup to keep services running during power outages
Built on Zero Trust. Fueled by Security and Privacy.
From the server selection to the network topology, every piece of this build was chosen with one core principle in mind: trust nothing, verify everything. We're not just building for convenience or performance — we’re building for resilience, confidentiality, and control.
This infrastructure is designed to model the same extreme security posture we’ll recommend to clients. It follows Zero Trust architecture, minimizes attack surface, enforces strict access controls, and keeps critical data off the cloud — fully owned, fully hardened, and fully private.
This isn’t just a stack of gear. It’s the foundation of DFG’s mission to protect data, defend networks, and promote self-sovereignty in an era of overreach and compromise.

🐾 Merlin’s Corner
“I saw a lot of notepads being scribbled on today. Lots of writing. Lots of crumpled paper. Then more writing. Then lots of clicking of the mouse. Mark says we’re building something called a ‘Zero Trust infrastructure.’ I don't know what that means, but I like it. I’m very wary of new humans or doggies I come across.
He keeps saying things like ‘NSA-level security’ and ‘DMZ isolation’ while muttering to himself and measuring Ethernet cable runs with surgical precision. I just hope this thing has enough airflow… for naps.
Anyway, I’ll keep sniffing things and making sure nobody sneaks in uninvited. I may not have a CEH cert like my human, but I am an expert in threat detection (especially squirrels and armadillos).
Stay safe out there. And don’t click suspicious links. Unless they lead to treats.”
– Merlin 🐶🖤