Solved

Reserved IP blocks and subnets...

Posted on 2002-07-15
3
243 Views
Last Modified: 2007-02-12
I am implimenting VPN on a client network with LAN subnet on the reserved IP block  10.xxx.xxx.xxx

Since this is a Class A IP block..I would assume the subnet to be 255.0.0.0. But they are using 255.255.255.0


Is this a right thing to do ? Though their network is functioning properly as of now, will it create issues later on for Internetworking or VPN connectivity with other networks?

Pls refer if you a link to any authentic docs on this (Like RFC)

Rgds,
Ferose    
0
Comment
Question by:ferose
3 Comments
 
LVL 1

Expert Comment

by:swapsthegreat
ID: 7154227
ip address classes are not decided on the basis of subnet masks, but on the first few reserved bits

for class A - first bit always zero
for class B - first 2 bits 10
and so on...

also the range 10.xx.xx.xx may be split up into many subnetworks, hence the extended subnet mask
0
 
LVL 2

Accepted Solution

by:
edmonds_robert earned 50 total points
ID: 7154245
This will not cause any problems at all.  Take for example the IP block you got from your ISP for your outside addresses.  Depending on the size of the organization, you probably got a class C IP address but didn't use the default class C subnet mask of 255.255.255.0.  The default is just that, default.  It can be changed to match your organization's structure.  If you don't need to have more that 254 hosts on a subnet, why use a shorter subnet mask?  For example, we use 172.16.x.x in our organization, but use the subnet mask 255.255.255.0 also.  

As another example, conisder leased line configuration.  Most people will use the subnet mask 255.255.255.252 as the subnet mask on a leased line to conserve IP address space.  As long as your network equipment supports VLSM (Variable Lengt Subnet Masking), you can use any combination of subnet masks on your network that you please.  
http://www.cisco.com/warp/public/701/3.html
http://www.cisco.com/warp/public/701/3.html
0
 

Author Comment

by:ferose
ID: 7156240
Thanx edmonds:  That settles it without question..

Rgds,
Ferose
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Lets look at the default installation and configuration of FreeProxy 4.10 REQUIREMENTS 1. FreeProxy 4.10 Application - Can be downloaded here (http://www.handcraftedsoftware.org/index.php?page=download) 2. Ensure that you disable the windows fi…
Meet the world's only “Transparent Cloud™” from Superb Internet Corporation. Now, you can experience firsthand a cloud platform that consistently outperforms Amazon Web Services (AWS), IBM’s Softlayer, and Microsoft’s Azure when it comes to CPU and …
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
This video gives you a great overview about bandwidth monitoring with SNMP and WMI with our network monitoring solution PRTG Network Monitor (https://www.paessler.com/prtg). If you're looking for how to monitor bandwidth using netflow or packet s…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

11 Experts available now in Live!

Get 1:1 Help Now