Avatar of Paul Wagner
Paul WagnerFlag for United States of America asked on

Network Addressing Plan

I am in the process of restructuring the company network from a 10.x.x.x network to a 172.16.x.x network. I found a number of addressing plans on the internet that talk about phases and how to plan, but it would be pretty legit to find an actual plan out there so I can read what someone else did in their planning.

Does anyone know where I can see an actual network addressing plan or template?
Also, should voice be on an entirely different subnet, be placed on static, QoS, etc.?

Thanks in advance!
Network ManagementNetworkingWindows Networking

Avatar of undefined
Last Comment
Craig Beck

8/22/2022 - Mon
Andres Perales

I am not sure what you mean exactly by Network Addressing Plan, but I would tell you from some experience is to separate your subnets!

Separating subnets makes management easier at the edge, as well from a visual monitoring perpective.

Not sure why you are moving or transitioning from your 10.x.x.x scheme to a 172.16.x.x scheme but okay...

voice = one or two subnets
servers = one or two subnets
management = one or two subnets
iSCSI - on it's own subnet
Clients on there own networks

so on and so forth...for my client networks I have broken it up by building or wing that also helps with management and troubleshooting...plus security boundaries.
ASKER
Paul Wagner

@peralsea

Sooo... this is what I have so far:

172.16.x.x
255.255.128.0 -for servers
255.255.192.0 -for users

172.16.0.1 - 0.254 - hosts, servers, AP's, printers, etc.
172.16.1.1 - 2.254 -PC's
172.16.3.1 - 3.254 -Voice
172.16.4.1 - 4.254 - VPN users

Does that jive with you?

.... we feel it is best to leave the 10.x.x.x network because we have two companies that merged and they both use the primary 10.x.x.x but then they have different subnets that overlap, combined with firewall rules, combined with IP conflicts, etc, we just feel it'd be easier to build a new network on the side and then bring everyone into the new plan/scheme.
ASKER CERTIFIED SOLUTION
Craig Beck

Log in or sign up to see answer
Become an EE member today7-DAY FREE TRIAL
Members can start a 7-Day Free trial then enjoy unlimited access to the platform
Sign up - Free for 7 days
or
Learn why we charge membership fees
We get it - no one likes a content blocker. Take one extra minute and find out why we block content.
See how we're fighting big data
Not exactly the question you had in mind?
Sign up for an EE membership and get your own personalized solution. With an EE membership, you can ask unlimited troubleshooting, research, or opinion questions.
ask a question
ASKER
Paul Wagner

@craigbeck

Sorry if I made my intentions confusing....

172.16.0.1 - 0.254 - "hosts" is meant to be the blades (physical server) that the VM's are housed on.... so my listing should have said: blades, VM servers, printers, etc.

Am I wrong in this thought?...
I want the core devices to be on a /17 subnet and the PC's on a /18 so there isn't a broadcast storm.

... or would just subnetting them out fix that? or just put servers and PC's in different VLANs?
I started with Experts Exchange in 2004 and it's been a mainstay of my professional computing life since. It helped me launch a career as a programmer / Oracle data analyst
William Peck
Craig Beck

No problem :-)

VLANs and subnets are different things.  You need VLANs to separate broadcast domains, and subnets to make best use of IP addressing within your IP scheme.  Each VLAN would usually have a unique subnet.  It's physically possible to put more than one subnet in a VLAN, but it's not advisable.

So, you would typically need separate VLANs for:

Servers
Phones
PCs
iSCSI
Management
...
...

I would put blade servers (the host machines for your VMs) in the management network for simplicity.

A /17 is a massive range.  That would give you 32766 hosts on that single subnet.

Look at my previous example.  Those subnet masks give you plenty of scope to adjust as required and are typical based upon some of the customers I've worked with in the past.
ASKER
Paul Wagner

@craigbeck


I would put blade servers (the host machines for your VMs) in the management network for simplicity.
Management network.... Do you mean like on a management vlan or the same subnet as the vm servers?


Ok, so tell me if this jives with you (took your suggestions and personalized):

Base IP: 172.16.0.0 / 255.255.0.0
Range: 172.16.0.0 - 172.16.255.255

172.16.0.0 / 255.255.255.0 - servers, blades, router, etc.

172.16.1.0 / 255.255.240.0 - PC's

172.16.50.0 / 255.255.255.0 - Phones

172.16.200.0 / 255.255.255.0 - VPN
Craig Beck

Not bad, but 172.16.1.0 / 255.255.240.0 overlaps with the servers as it actually covers 172.16.0.0 - 172.16.15.255

So you'd be able to use 172.16.0.0 / 255.255.255.0 for servers then 172.16.16.0 255.255.240.0 for PCs.
Get an unlimited membership to EE for less than $4 a week.
Unlimited question asking, solutions, articles and more.