Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    New at this - Subnets, CIDR and Segmenting My Network

    Scheduled Pinned Locked Moved General pfSense Questions
    29 Posts 8 Posters 3.8k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • johnpozJ
      johnpoz LAYER 8 Global Moderator
      last edited by

      Most soho devices default to 192.168.0/24 or some 192.168.1/24 so yeah those are quite common.. So your at a buddies house and on his wifi and you want to vpn to your house.. And your using 192.168.0 as well - then you have issues..

      That is why Derelict suggest just using some random other network and not the first network in a range.. 10.0.0/24 is common as well.  And its easy to type ;)  172.16.0 also again its the first network - its normally what people use..  So don't use those..

      I use 192.168.9/24 as my lan for example..

      An intelligent man is sometimes forced to be drunk to spend time with his fools
      If you get confused: Listen to the Music Play
      Please don't Chat/PM me for help, unless mod related
      SG-4860 24.11 | Lab VMs 2.8, 24.11

      1 Reply Last reply Reply Quote 0
      • DerelictD
        Derelict LAYER 8 Netgate
        last edited by

        I generally stay away from 10.0.0.0/anything because too many people out there use 10.0.0.0/8.

        Chattanooga, Tennessee, USA
        A comprehensive network diagram is worth 10,000 words and 15 conference calls.
        DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
        Do Not Chat For Help! NO_WAN_EGRESS(TM)

        1 Reply Last reply Reply Quote 0
        • johnpozJ
          johnpoz LAYER 8 Global Moderator
          last edited by

          ^ valid point.. And just blows my freaking mind.. ;)  To me the only valid use of such a mask is a summary route or in a firewall rule, etc.. I really can not think of a reason when such a large network on an interface would make any sense.

          Even in the recent thread where they were using a LARGE mask for their wifi network so allow movement between AP, etc.  /8 would just be borked!!

          An intelligent man is sometimes forced to be drunk to spend time with his fools
          If you get confused: Listen to the Music Play
          Please don't Chat/PM me for help, unless mod related
          SG-4860 24.11 | Lab VMs 2.8, 24.11

          1 Reply Last reply Reply Quote 0
          • A
            Atreides
            last edited by

            @kpa:

            All of the RFC1918 subnets are technically speaking equal, no preference over one or the other in performance, security or any other purely technical point of view.  Where the selection does matter is when you're using VPN tunnels from RFC1918 subnets to other RFC1918 subnets. It's all too common that people use 192.168.0.0/24 without giving it a single thought if it's a good choice and it comes to bite them when they suddenly have to build a VPN tunnel over to another place that also uses the same 192.168.0.0/24 subnet because the other end didn't think anything of it either.

            I tend to use the 10.0.0.0/8 range as 10.x.y.0/24s where x and y are some random numbers of my choice, they are obscure enough with high probability that they will never conflict with other subnets if they ever have to communicate over a VPN connection to a network I haven't set up myself.

            I realize all that. In his first post Derelict mentioned using 172.26, I was wondering if you meant to refer to 172.16 or if there was actually a reason to start at 172.26 that is all.

            I see now that that the reason he said to start at 172.26 instead of 172.16 was so that it was not in a regularly used space.

            I have just recently gotten interested in networking and so it's a learning process and I'm trying to understand it all. At the beginning of the post I hadn't done enough research on how subnets work and I realize now that a /16 mask has no real use in my private Network as it is way too large.

            1 Reply Last reply Reply Quote 0
            • DerelictD
              Derelict LAYER 8 Netgate
              last edited by

              $ perl randomlan.pl
              10.106.197.0
              172.17.245.0
              192.168.179.0

              It's just what happened to come out of this at the time. Then I just used the /19 that covered it (172.17.224.0/19 in this run's example).

              Chattanooga, Tennessee, USA
              A comprehensive network diagram is worth 10,000 words and 15 conference calls.
              DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
              Do Not Chat For Help! NO_WAN_EGRESS(TM)

              1 Reply Last reply Reply Quote 0
              • A
                Atreides
                last edited by

                So I mapped out a trial network of /19. I've made the subnets a bit over-sized to allow for unanticipated hosts. Any thoughts?

                1 Reply Last reply Reply Quote 0
                • JailerJ
                  Jailer
                  last edited by

                  @Atreides:

                  Any thoughts?

                  Thoughts? If this is being done for an actual place of employment I hope you have a good resume.

                  1 Reply Last reply Reply Quote 0
                  • A
                    Atreides
                    last edited by

                    @Jailer:

                    @Atreides:

                    Any thoughts?

                    Thoughts? If this is being done for an actual place of employment I hope you have a good resume.

                    Nope, just experimenting at home.

                    So what would you alter? I've attempted to follow advice given in this thread.

                    1 Reply Last reply Reply Quote 0
                    • DerelictD
                      Derelict LAYER 8 Netgate
                      last edited by

                      Just make them all /24. The only reason to subnet like that is to stretch a small allocation across multiple interfaces. Unless you know you are going to need to make that /19 stretch across hundreds of interfaces.

                      But if you're doing some sort of simulation of an IP address shortage/scarcity it looks ok.

                      Chattanooga, Tennessee, USA
                      A comprehensive network diagram is worth 10,000 words and 15 conference calls.
                      DO NOT set a source address/port in a port forward or firewall rule unless you KNOW you need it!
                      Do Not Chat For Help! NO_WAN_EGRESS(TM)

                      1 Reply Last reply Reply Quote 0
                      • A
                        Atreides
                        last edited by

                        So you'd go with something like:

                        | Management | 172.20.0.0/24 |
                        | General | 172.20.1.0/24 |
                        | JLAN | 172.20.2.0/24 |
                        | Servers | 172.20.3.0/24 |
                        | Guest | 172.20.4.0/24 |
                        | DMZ | 172.20.5.0/24 |

                        Just for simplicity and ease of use?

                        1 Reply Last reply Reply Quote 0
                        • KOMK
                          KOM
                          last edited by

                          Yes.

                          1 Reply Last reply Reply Quote 0
                          • A
                            Atreides
                            last edited by

                            Roger that.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.