Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    LARGE IP SUBNETS.

    Scheduled Pinned Locked Moved Off-Topic & Non-Support Discussion
    15 Posts 3 Posters 1.7k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • NogBadTheBadN
      NogBadTheBad
      last edited by

      @johnpoz said in LARGE IP SUBNETS.:

      Almost always you will see vlans broken at the /24 mark when you have plenty of space to work with, even if only a handful of machines in that vlan.. The /24 being the 3rd octet allows for humans to easy see when the IP is a different vlan. Having all of rfc1918 space to play with means you have no restrictions.. So yeah /24 is logical vlan break.

      Do you have Wi-Fi on the 10.10.0.0 /16 ?

      If you do maybe consider moving the Wi-Fi to another subnet or maybe create a guest vlan and firewall it off and if your looking at switches maybe pick a POE one.

      Andy

      1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

      1 Reply Last reply Reply Quote 0
      • johnpozJ
        johnpoz LAYER 8 Global Moderator
        last edited by johnpoz

        Oh btw.. your use of 10.0.0.1/24 is not a network address.. That is a host address. When you express an address or network if the expressed value is not the actual network, then its a host address.

        So for example 10.0.0.0/24 is the first /24 subnet in the 10 space, while 10.0.0.1/24 would be the first host address in that space.

        10.0.0.128/25 would be 2nd subnet with /25, while 10.0.0.129/25 would be the first host address in that subnet.

        Maybe you meant 10.0.1.0/24?

        Also you might want to stay away from the typical common address ranges, 192.168.0/24 or 192.168.1/24 or 10.0.0/24 etc.. since these are very common used everywhere else.. So say you have someone vpn in you could run into problems if they are on the that network say at their house or starbucks, etc.

        So for example my normal lan at home is 192.168.9/24, then I use 192.168.2, .3, .4 etc .. no 192.168.0 or 192.168.1 on my home network less likely to overlap when I am remote..

        @NogBadTheBad pretty sure he is going to be segmenting up the place? But yeah wifi should be isolated to their own vlans - guest, normal users, etc.. should be different than your normal user network and servers network, etc. etc.

        An intelligent man is sometimes forced to be drunk to spend time with his fools
        If you get confused: Listen to the Music Play
        Please don't Chat/PM me for help, unless mod related
        SG-4860 24.11 | Lab VMs 2.8, 24.11

        1 Reply Last reply Reply Quote 0
        • M
          Mitch_Sullo
          last edited by

          @johnpoz said in LARGE IP SUBNETS.:

          dress.
          So for example 10.0.0.0/24 is the first /24 subnet in the 10 space, while 10.0.0.1/24 would be the first host address in that space.
          10.0.0.128/25 would be 2nd subnet with /25, while 10.0.0.129/25 would be the first host address in that subnet.
          Maybe you meant 10.0.1.0/24?
          Also you might want to stay away from the typical common address ranges, 192.168.0/24 or 192.168.1/24 or 10.0.0/24 etc.. since these are very common used everywhere else.. So say you have someone vpn in you could run into problems if they are on the that network say at their house or starbucks, etc.

          Thanks guys!. I should have written a network address :D (I Understand).

          OpenVPN services are already provisioned on the PFSense. It has its own separate tunnel network (10.11.0.0/16) and that network can access the existing Office LAN.

          We have Wifi provisioned via UniFi. The unifi AP's talk to a container running within the LAN. That will need to be optimised / hardened as well.

          NogBadTheBadN 1 Reply Last reply Reply Quote 0
          • NogBadTheBadN
            NogBadTheBad @Mitch_Sullo
            last edited by

            @mitch_sullo

            Re the Unifi, get switches that handle VLANS and your sorted.

            I'd also allocate a VLAN for device management.

            Andy

            1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

            1 Reply Last reply Reply Quote 0
            • M
              Mitch_Sullo
              last edited by

              I've got 2 a bunch of Juniper EX Switches, and an extra PF-Sense appliance.

              I want to setup CARP/VRRP Redundancy. Should all the routing take place at the PF-Sense or should there be IRBs configured at the switch level???

              NogBadTheBadN 1 Reply Last reply Reply Quote 0
              • NogBadTheBadN
                NogBadTheBad @Mitch_Sullo
                last edited by

                @mitch_sullo

                Depends on how chatty the network would be between the servers and clients.

                pfSense is easier to manage in regards to firewall rules.

                Andy

                1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                1 Reply Last reply Reply Quote 0
                • johnpozJ
                  johnpoz LAYER 8 Global Moderator
                  last edited by johnpoz

                  The need for downstream routers will for sure complex up your setup. And unless there is going to be large amount of intervlan traffic. Say maybe between the users PCs and the Servers that the router can not handle.. There is little reason to route it downstream from pfsense.

                  Filtering traffic at the switch is going to be way more complex than the easy to use gui and interface for firewall rules than what is available on pfsense.

                  You would really need to evaluate the amount of traffic between users and servers if your going to split those into their own segments to determine which is the better option.. And how best to skin that cat.

                  What sort of traffic flows between the users and the servers? Are you more worried about firewall or bandwidth between the users and the servers, etc. etc.. You could for sure create a bottleneck if not done correctly..

                  Also what kind of uplink(s) can you do from your switch environment.. For example if your uplinks to the firewall are 10ge, and your clients are at 1ge.. And you use physical interfaces for both vlans uplinks, and firewall is actually capable of routing at 10ge you would really need to be pushing some data between users and servers to cause a problem.

                  But for example say if you have 60 different users spread across your 20 servers all moving large files, and you only have 1ge uplinks from your switch to router, and you now need to shove all that traffic through 1ge yeah you could run into some complaints from users that file transfers are slower, etc.

                  Easy solution if lots of traffic between users and servers is to just put them all on the same vlan - depends on if your more concerned with firewalling than performance, etc. etc..

                  An intelligent man is sometimes forced to be drunk to spend time with his fools
                  If you get confused: Listen to the Music Play
                  Please don't Chat/PM me for help, unless mod related
                  SG-4860 24.11 | Lab VMs 2.8, 24.11

                  1 Reply Last reply Reply Quote 0
                  • M
                    Mitch_Sullo
                    last edited by

                    @johnpoz said in LARGE IP SUBNETS.:

                    You would really need to evaluate the amount of traffic between users and servers if your going to split those into their own segments to determine which is the better option.. And how best to skin that cat.

                    It is mostly SSH and NFS. Even then, this traffic is only required by 50-65% company at best. NFS is to 2 x NAS Devices, file transfers and data streams.

                    1 Reply Last reply Reply Quote 0
                    • johnpozJ
                      johnpoz LAYER 8 Global Moderator
                      last edited by johnpoz

                      Well comes down to how much data your moving... I highly doubt ssh would ever be an issue.. But if your wanting to move a lot of files back and forth from user to nas..

                      Then sure forcing all the traffic that used to be switched through a router, be it at the edge or downstream that has a single 1ge uplink could be a problem.

                      Comes down to the size of the files your moving, the speed of the NAS, the number of users moving stuff concurrently, etc.. You might want to look into the NAS and see how much data its moving.. And then see if routing that through a 1 gig uplink is going to cause you any sort of concerns for your users performance..

                      I would GUESS that your NAS are attached to the network at 1 gig, so prob not a problem? But think about it if you have 2 nases each at 1gig, and then you force both of them through 1gig uplink to your router when you move them to their own vlan. Then yeah you could create a possible bottleneck that users might notice.

                      An intelligent man is sometimes forced to be drunk to spend time with his fools
                      If you get confused: Listen to the Music Play
                      Please don't Chat/PM me for help, unless mod related
                      SG-4860 24.11 | Lab VMs 2.8, 24.11

                      1 Reply Last reply Reply Quote 0
                      • NogBadTheBadN
                        NogBadTheBad
                        last edited by

                        Maybe LAGG your LAN ports if you have spare ones.

                        Andy

                        1 x Netgate SG-4860 - 3 x Linksys LGS308P - 1 x Aruba InstantOn AP22

                        1 Reply Last reply Reply Quote 0
                        • johnpozJ
                          johnpoz LAYER 8 Global Moderator
                          last edited by

                          Yeah lagg is an option to get more total bandwidth available between users and servers.. But when 1 side of that is limited to a couple of boxes and a handful of users might not solve the problem.. There is nothing saying that the sessions are going to be split even between the uplinks, etc.

                          Sure in general a lagg brings a bigger pipe to the uplink.. 1+1 does not =2, just mean you have 1 and 1.. How data gets split between those 1's depends on multiple other factors.

                          Optimal design of the lan is quiet often overlooked ;)

                          See it all the time.. But everything is connected at gig why I am I not getting gig.. The NAS is X*SSD in a raid 0, etc.

                          Well - lets see you have 100 users talking to all kinds of stuff intervlan with your 10 different vlans all on the same physical 1 gig interface... Yeah your router is a freaking BEAST and can see its not breaking a sweat... Your road between is just overused... Suppose to be able to go 55 on the highway as well, but when its crowded and over used.. Can you go 55 ;)

                          An intelligent man is sometimes forced to be drunk to spend time with his fools
                          If you get confused: Listen to the Music Play
                          Please don't Chat/PM me for help, unless mod related
                          SG-4860 24.11 | Lab VMs 2.8, 24.11

                          1 Reply Last reply Reply Quote 0
                          • M
                            Mitch_Sullo
                            last edited by

                            @johnpoz said in LARGE IP SUBNETS.:

                            Optimal design of the lan is quiet often overlooked ;)
                            See it all the time.. But everything is connected at gig why I am I not getting gig.. The NAS is X*SSD in a raid 0, etc.
                            Well - lets see you have 100 users talking to all kinds of stuff intervlan with your 10 different vlans all on the same physical 1 gig interface... Yeah your router is a freaking BEAST and can see its not breaking a sweat... Your road between is just overused... Suppose to be able to go 55 on the highway as well, but when its crowded and over used.. Can you go 55 ;)

                            I have 10gb Uplink Modules for each of the switches, so no problem in that regard. I'm also having fiber run between 2 floors of the building. I might set up LAG teams for NAS however.

                            1 Reply Last reply Reply Quote 0
                            • First post
                              Last post
                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.