Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

What is difference in ip scheme of /32 and /24 in router settings

Posted on 2014-11-09
7
Medium Priority
?
185 Views
Last Modified: 2014-11-09
Hi,
was recently trying to set up a new ip mapping on a netscreen 5gt and noticed that in the ip address box you could either use /24 or /32 after the entry for instance of the static ip supplied by the isp.  Didnt want to put incorrect entry so would appreciated an explanation of when to use which number either /24 or /32.  thanks
0
Comment
Question by:dankyle67
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
7 Comments
 
LVL 50

Expert Comment

by:Don Johnston
ID: 40431302
If you mean the untrust interface, you would use whatever IP address/mask that your ISP has assigned you to use.
0
 
LVL 98

Expert Comment

by:John Hurst
ID: 40431384
you could either use /24 or /32 after the entry for instance of the static ip supplied by the isp



/32 is a subnet mask of 255.255.255.255 and so is one IP address which is all you want for the external IP field in a Juniper 5GT (at least we just use one external IP address in our several client 5GT setups.
0
 

Author Comment

by:dankyle67
ID: 40431436
We have 4 static ip addresses which we have to map to 3 internal servers.  The other static ip we would use for the netscreen itself.  So if i put /29 is that better since we have the 4 addresses or will /32 still work as long as i create the 3 separate ip mappings?  What about /24 is that for the internal client ips?  We only have 22 machines at the office.
0
Survive A High-Traffic Event with Percona

Your application or website rely on your database to deliver information about products and services to your customers. You can’t afford to have your database lose performance, lose availability or become unresponsive – even for just a few minutes.

 
LVL 98

Expert Comment

by:John Hurst
ID: 40431441
You would have to check your 5GT to see if it can map 3 separate external IP addresses internally. I use internal addresses for multiple servers in my environment.
0
 
LVL 98

Accepted Solution

by:
John Hurst earned 1200 total points
ID: 40431446
I use /24 to set up the internal range multiple devices (servers or workstations)
0
 
LVL 71

Assisted Solution

by:Qlemo
Qlemo earned 800 total points
ID: 40431481
The netmask needs to be as provided by the ISP, as said already. Otherwise you might not be able to reach some other sites, or not allow routing to your additional public IPs.
So, if you have 4 usuable addresses your IP block spans 8 addressses, corresponding to /29. The first and last one are reserved, one is used by the provider as the next hop for your router.
0
 
LVL 98

Expert Comment

by:John Hurst
ID: 40431762
@dankyle67  - Thank you and I was happy to help.
0

Featured Post

Flexible connectivity for any environment

The KE6900 series can extend and deploy computers with high definition displays across multiple stations in a variety of applications that suit any environment. Expand computer use to stations across multiple rooms with dynamic access.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

This article will show how Aten was able to supply easy management and control for Artear's video walls and wide range display configurations of their newsroom.
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Monitoring a network: why having a policy is the best policy? Michael Kulchisky, MCSE, MCSA, MCP, VTSP, VSP, CCSP outlines the enormous benefits of having a policy-based approach when monitoring medium and large networks. Software utilized in this v…

715 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question