Solved

VLSM calcuation

Posted on 2016-10-31
5
36 Views
Last Modified: 2016-10-31
Need to subnet 172.16.0.0/16 across 4 regions and support the following nodes

A1 : 510
HQ: 300
A2 255
A3: 168

Any comment for the network ID used in each region, together with the WAN subnet used in each router ? HQ connect to each region in hub-and-spoke network.
0
Comment
Question by:AXISHK
  • 2
  • 2
5 Comments
 
LVL 11

Accepted Solution

by:
Miftaul earned 250 total points
ID: 41866739
Are we trying to subnet
Is it an exam question ?
or for production network

A1 - 172.16.0.0/23
HQ - 172.16.2.0/23
A2 - 172.16.4.0/23
A3 - 172.16.6.0/24
0
 
LVL 27

Assisted Solution

by:Predrag Jovic
Predrag Jovic earned 250 total points
ID: 41867133
Recommendation is to prepare locations to grow. Depending on grow projection you can assign more IP address space to some region then you need to, and then, assign as much IP address space to specific network as it is needed.
The reason for this is simple - easy summarization. You can have only one route for each region.

Example:
Region A1 172.16.0.0/18
Region HQ 172.16.64.0/18
Region  A2 172.16.128.0/18
Region A3 172.16.192.0/18

Then you can start assign IP address ranges for networks in specific region
A1 - network 1 - 172.16.0.0/23
     - network 2 - 172.16.2.0/26
     - network 3 - 172.16.y.m/z      <----  63 >=y>=0
HQ - network 1 - 172.16.64.0/23
       - network 2 - 172.16.66.0/25
       - network 3 - 172.16.x.n/z     <----- 127 >=x>=64
etc...

In the case that this was exam question Miftaul gave correct answer - those are smallest IP address ranges for each number of hosts.
0
 

Author Comment

by:AXISHK
ID: 41867147
This is not on production network.

How about the serial subnet, the network subnet between each region to HQ, should I use
172.16.7.224 / 30
172.16.7.228 / 30
172.16.7.232 / 30


Thx
0
 
LVL 27

Expert Comment

by:Predrag Jovic
ID: 41867169
172.16.7.x/30 is OK
0
 

Author Closing Comment

by:AXISHK
ID: 41867875
Thx
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

If you have an ASA5510 then this sort of thing would be better handled with a CSC Module, however on an ASA5505 thats not an option, and if you want to throw in a quick solution to stop your staff going to facebook during work time, then this is the…
This article will cover setting up redundant ISPs for outbound connectivity on an ASA 5510 (although the same should work on the 5520s and up as well).  It’s important to note that this covers outbound connectivity only.  The ASA does not have built…
Both in life and business – not all partnerships are created equal. As the demand for cloud services increases, so do the number of self-proclaimed cloud partners. Asking the right questions up front in the partnership, will enable both parties …
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

910 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

22 Experts available now in Live!

Get 1:1 Help Now