Multi lan subnet on same physical interface
-
1and1 gives out /32, multacom used to earlier i guess and there r many data centers that give out /32 ips using dhcp
-
the part about VLAN, the reason i said that is coz i wanted to know if pfsense is capable of doing such a thing without a VLAN switch coz i dont have that as of now but would have to get one if it wasnt able to do the thing i wanted
-
Some large super low rent hosting providers will hand out /32s but very few. In that case it's a matter of doing things to scale a network extremely cheaply, it's still questionable, but it's one method you may see if you have a $5/month web hosting account. Most of us aren't thinking a $5/month web hosting account when you say "datacenter", no reputable colocation facility hands out IPs via DHCP. That's a technique to provide cheap crappy web hosting at large scale.
There are OSes including BSDs and others that will not function with a /32 IP because they will not ARP their gateway because ARPing something off a locally connected subnet is technically wrong.
What you're trying to do is a bad idea and to some degree impossible (serving multiple scopes off the same interface without statically defining everything in all but one scope isn't doable with anything). Handing out /32 DHCP IPs also doesn't do anything to prevent hosts from talking to each other where the person controls the host.
-
ok got it.
now can some1 tell me which is the cheapest VLAN switch i can find for home networks.
i wonder y switch firmware cant be hacked to enable VLAN tagging, most small switches use a realtek or broadcom chip -
Netgear GS108T is my personal favorite for a cheap managed fanless gigabit switch.
What features a switch supports depends on what its hardware supports, it's not like a typical firewall or router box where you can run basically everything on a CPU, the hardware itself has to support such things. In an unmanaged switch, that hardware support isn't there and you can't hack the hardware short of completely replacing it.
-
well true and not true, most SOHO switches use a realtek chip which by default doesnt support managing it but its fairly easy to supply a signal to one of its pin and make it manageable using an external ic and i have seen many guys do it after which it starts supporting VLAN. most modern chips r a stripped down cpu and to make better use of it, most is done at the software level but in this case the chip firmware, if the chip were a dumb hardware without software it would do very limited number of tasks but would perform it much quicker thats y the need for a software is there. hardwrae might not support new technology but it definitely can if its just a software feature
-
there is 2 different versions of the Netgear GS108 switch. the Unmanaged one and the Managed version..
i have Never liked the Managed version myself as there GUI is Horrible but for the price its a Good switch.
(im spoiled by Enterprise grade gear for switches)we have Servers in DataCenters all over the globe and I have never encountered one that does DHCP
for us NOR would I want one. and Yes all of ours are on there OWN Vlan provided to the TOR (Top
Of Rack) switch of ours that Feeds the PFsense box and then 60U worth of Gear..also there would be no way to seperate the subnets on the same Nic without Vlans let alone getting
it to work.2 minutes with wireshark and you could be around any block unless you Vlan off stuff…
i have personally seen the damn 255.255.255.255 netmask done in the enterprise and spent damn
near a month undoing all the static configs. it was causing more nightmares for the IT staff than anything
else. -
could u explain what specific issues can 255.255.255.255 netmask cause so i know if those issues r a great deal on a SOHO network?
-
when i got to my current job , thats how over 4000 machines were. DHCP was handing out that damn netmask
some of our machines needed access to other server / etc and the 255.255.255.255 netmask was a nightmare
until i figured it out and then started adding Vlans to the core switches and then working down from there. took well
over a month of me working on it to get things correct. now all machines can see whatever servers its suppose
to and not others it NOT suppose to see.we also had well over 40 IPSEC tunnels to our servers in colo's and some of them had issues which came down
to the Netmask.at home im using Vlans. when my kid comes home. tries to raid my pictures. NOW he cant cause his
machine in a different vlan that goes directly to the interenet and cant see my 2 FreeNAS boxes.:-)
-
well in my case i dont want my clients to get access to other servers or devices that y i was looking for such a netmask