Solved

Multiple Scopes on One DHCP Server

Posted on 2004-03-22
3
510 Views
Last Modified: 2010-05-18
I have a DHCP server with the following infomation:

Range: 164.51.33.129 to 255
Subnet: 255.255.255.128
Router: 164.51.33.129

DHCP/WINS: 164.51.33.182

It is currently full and I have been given another range: 164.51.131.1 to 164.51.131.30 with subnet mask 255.255.255.224.  It has the same router address: 164.51.33.129.  The first one is currently full and I assumed that it would fall over to the second one which is not happening.  Someone please give me some advise to what i am doing wrong.
0
Comment
Question by:BigTSmooth
  • 2
3 Comments
 
LVL 79

Expert Comment

by:lrmoore
Comment Utility
You can't have the same router IP because it is on a different subnet than the address range.
.129 is within the first range of addresses only.
This is not going to be an easy task because without a router or something to route packets between the two subnets, you won't be able to work.
If you can get the rest of the full /24 block, you can then use all of the addresses between .1 and .254, mask 255.255.255.0, and keep the gateway the same 164.51.33.129


0
 
LVL 2

Author Comment

by:BigTSmooth
Comment Utility
Let's say that I did have the 1 to 254 range.  Once that runs out, what are my options got get more IPs?
0
 
LVL 79

Accepted Solution

by:
lrmoore earned 125 total points
Comment Utility
1. Stop using public IP's and use Network Address Translation at the firewall, and use private IP's that give you the ability to use all the addresses you want in the private address spaces of
10.0.0.0 /8
172.16.0.0 /16
192.168.0.0/24

2. Use multiple subnets with a "superscope" on the DHCP server

3. Use multiple subnets with some type of router between them

0

Featured Post

What Security Threats Are You Missing?

Enhance your security with threat intelligence from the web. Get trending threat insights on hackers, exploits, and suspicious IP addresses delivered to your inbox with our free Cyber Daily.

Join & Write a Comment

Even if you have implemented a Mobile Device Management solution company wide, it is a good idea to make sure you are taking into account all of the major risks to your electronic protected health information (ePHI).
When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…

743 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

13 Experts available now in Live!

Get 1:1 Help Now