Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Is 10.0.0.x/24 bad for VPN?

    Scheduled Pinned Locked Moved OpenVPN
    7 Posts 5 Posters 596 Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • E
      ecorva
      last edited by

      Hi!

      I've been using pfSense to power a basic network that uses 10.0.0.x/24 for its subnet. I recently attempted to configure OpenVPN with no luck. I configured the tunnel network to run on 10.1.0.0/24. After a great deal of searching online, I've come to the consensus that maybe I should change my subnet so that I'm no longer using the 10.0.0.x scheme. I was under the impression that 10.0.0.x and 10.1.0.x were different subnets. Is that correct? Can anyone confirm if using 10.0.0.x is problematic, and why that might be?

      Thanks!

      J johnpozJ JKnottJ 3 Replies Last reply Reply Quote 0
      • J
        Jarhead @ecorva
        last edited by

        @ecorva Not problematic at all and different networks depend on the subnet mask. If you're using /24's for both, they're different. Even 10.0.1.x/24 would be different and good to use.

        1 Reply Last reply Reply Quote 1
        • johnpozJ
          johnpoz LAYER 8 Global Moderator @ecorva
          last edited by

          @ecorva yeah those are different networks.. But all depends on what networks are going to be connecting... There can be problems with any rfc1918 network when users don't correctly configure them, I have seen many locations uses 10/8 which yeah messes with using anything in the 10 range.. And using stuff in low end like 10.0.0 can be problematic sometimes because everyone uses the first few network in the range..

          You can't fix 10/8 but saying away from like 10.0.0/24 or 10.0.1/24 or 10.1.1/.24 might be less problematic.. 192.168 and 10 seem to be the most popular.. Maybe use something in the 172.16/12 range - this seems to be less used from just casual observation.

          Something like 172.29.42/24 is prob not a common used network.. But you still can have problems if someone ends up using the 172.16/12 network, etc.. same goes for 192.168, 192.168.0/24 and 192.168.1/24 are very common.. My lowest network is 192.168.2/24 - but again if your at some location and they are using 192.168/16 your kind of hosed no matter what your using in that range..

          I have seen some sdwan deployments that leverage 192.0.2 for some of their tunnel networks.. because its not a network that would route on the public internet and nobody should be using that.. Its meant as a documentation network ;)

          Other networks like 198.51.100.0/24 and 203.0.113.0/24 are also network that shouldn't conflict because they are documentation networks.. Not suggesting you use those.. But have seen some weird use of networks to try and make sure you don't step on other networks when you need a unique network that shouldn't cause problems.

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          E 1 Reply Last reply Reply Quote 1
          • E
            ecorva @johnpoz
            last edited by

            @johnpoz thanks very much for the detailed response. I think I better understand some of the comments I read elsewhere now. I'm going to close this post and try a different approach to my VPN debugging. Cheers!

            1 Reply Last reply Reply Quote 0
            • PippinP
              Pippin
              last edited by

              Just to add some more info:
              https://community.openvpn.net/openvpn/wiki/AvoidRoutingConflicts

              I gloomily came to the ironic conclusion that if you take a highly intelligent person and give them the best possible, elite education, then you will most likely wind up with an academic who is completely impervious to reality.
              Halton Arp

              E 1 Reply Last reply Reply Quote 1
              • JKnottJ
                JKnott @ecorva
                last edited by

                @ecorva said in Is 10.0.0.x/24 bad for VPN?:

                Hi!

                I've been using pfSense to power a basic network that uses 10.0.0.x/24 for its subnet. I recently attempted to configure OpenVPN with no luck. I configured the tunnel network to run on 10.1.0.0/24. After a great deal of searching online, I've come to the consensus that maybe I should change my subnet so that I'm no longer using the 10.0.0.x scheme. I was under the impression that 10.0.0.x and 10.1.0.x were different subnets. Is that correct? Can anyone confirm if using 10.0.0.x is problematic, and why that might be?

                Thanks!

                Those should be OK, but what you have to watch for is the subnet used at the remote site. For example, 10.0.0.0 /24 is common and will conflict with one of your choices. I used to run into that problem, when I was doing a lot of travel with my work To avoid it, I made my home network 172.16.0.0 /24, as the 172.16 block is rarely used elsewhere.

                Better option is to move to IPv6 if you can. I have configured my VPN to use IPv6, if available, otherwise IPv4.

                PfSense running on Qotom mini PC
                i5 CPU, 4 GB memory, 32 GB SSD & 4 Intel Gb Ethernet ports.
                UniFi AC-Lite access point

                I haven't lost my mind. It's around here...somewhere...

                1 Reply Last reply Reply Quote 1
                • E
                  ecorva @Pippin
                  last edited by

                  @Pippin that common subnet list is excellent!

                  1 Reply Last reply Reply Quote 0
                  • First post
                    Last post
                  Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.