Solved

What would be a 'best practices" design for an ISP DHCP Router config - Cisco

Posted on 2006-11-21
4
257 Views
Last Modified: 2013-12-14
I have a small ISP startup as client of mine, and they are trying to isolate their residential clients.  Currently they are all on a class C, and they were hoping the orivacy filter on their wireless devices would isolate the customers.  

We have discussed the thought that the ISP router's DHCP should probably be parsing out 255.255.255.255 or .254 addresses to each customer, but I would like to know the correct, professional way to set this up.

I can't imaging having to create a subnet for each customer manually...

Any help would be greatly appreciated!

-KRM
0
Comment
Question by:mossmak
4 Comments
 
LVL 12

Accepted Solution

by:
pjtemplin earned 500 total points
ID: 18003823
If you want subnets, you need to separate them by router(s).  Even then, the other devices are still reachable.  You'd need a separate DHCP pool per subnet.

Your best bet is a firewall on the customer side of each wireless link.  Writing an ACL per customer isn't a perfect alternative, since there could be corner cases where they'd actually want/need to communicate with each other.
0
 

Author Comment

by:mossmak
ID: 18031691
thanks
0

Featured Post

Microsoft Certification Exam 74-409

Veeam® is happy to provide the Microsoft community with a study guide prepared by MVP and MCT, Orin Thomas. This guide will take you through each of the exam objectives, helping you to prepare for and pass the examination.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This solves the problem of diagnosing why an internet connection is no longer working. It also helps identify the likely cause of the lost connection if the procedure fails to re-establish your internet connection. It helps to pinpoint the likely co…
Cable Modem Provisioning from DPoE compliant server  This Article is to support CMTS administrators to provide an overview of DOCSIS compliance configuration file, and to provision a cable modem located at customer place from a Back office serve…
Microsoft Active Directory, the widely used IT infrastructure, is known for its high risk of credential theft. The best way to test your Active Directory’s vulnerabilities to pass-the-ticket, pass-the-hash, privilege escalation, and malware attacks …
Two types of users will appreciate AOMEI Backupper Pro: 1 - Those with PCIe drives (and haven't found cloning software that works on them). 2 - Those who want a fast clone of their boot drive (no re-boots needed) and it can clone your drive wh…

820 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question