?
Solved

How do I subnet 131 subnets and 300 workstations?

Posted on 2005-03-23
2
Medium Priority
?
556 Views
Last Modified: 2010-03-18
Currently we have 30 workstations within our company. We use a Class C address with 192.168.x.x / 24 thus giving us 65,534 subnets with 256 hosts in each. Now I don't think it was setup correctly for future growth. We are moving to bring 130 branch offices with 260 + pc's into our LAN thus creating a WAN environment. 260 + because some offices have 3 or 4 pc's.

1) Do I need to change to a Class B, 22 or 23 bit network or is there something else I can do to make my situation work?

2) How do I keep the branch offices from browsing our network?

3) Each branch office will have a Symantec 320 firewall. I assume that I can use the secure tunnel of the branch office that I want to connect to to use Remote Desktop Connection to troubleshoot user issues etc. Is this correct?

We are implementing a gateway-to-gateway solution using IPSec tunnels. I have never done something of this magnitude. Please offer tips, suggestions, and pitfalls to avoid.
0
Comment
Question by:jcd1214
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 3

Accepted Solution

by:
snedelchev earned 2000 total points
ID: 13743871
I think that you have about 256 subnets with 256 IP in each one
it's about a 65,534 IP's

the simpple and clear wya is to put every branch in different subnet
i mean First Branc 192.168.2.0/24 - 256 IP's
Second Brach 192.168.3.0/24 also 256 IP's
and you can make VPN bettween branches that you want

if you have any special quetions ask
0
 

Author Comment

by:jcd1214
ID: 13777565
Yup, that is the answer I was looking for!!!
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

FIPS stands for the Federal Information Processing Standardisation and FIPS 140-2 is a collection of standards that are generically associated with hardware and software cryptography. In most cases, people can refer to this as the method of encrypti…
A common practice in small networks is making file sharing easy which works extremely well when intra-network security is not an issue. In essence, everyone, that is "Everyone", is given access to all of the shared files - often the entire C: drive …
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

752 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question