private lan recommended ip addressing

Dear Experts

to setup new office what IP addressing is recommended as it is common to use but I would like to go for something different and this network will have to be get connected over the VPN from other location and they may be using,  this new network yet to be setup will have internal dns and dhcp and leased line and mpls connectivity. the total users or end devices within this network will not be more than 75, I prefer other than is there a recommend/best  practice in selecting a particular ip addressing for private lan network please suggest,  is it good to go with or something like or any other ip addressing recommended please suggest.
Who is Participating?
I wear a lot of hats...

"The solutions and answers provided on Experts Exchange have been extremely helpful to me over the last few years. I wear a lot of hats - Developer, Database Administrator, Help Desk, etc., so I know a lot of things but not a lot about one thing. Experts Exchange gives me answers from people who do know a lot about one thing, in a easy to use platform." -Todd S.

Dr. KlahnPrincipal Software EngineerCommented:
You can use either of the following CIDR blocks:,  If you stay within 192.168, you still have around 250 /24 blocks available.
JohnBusiness Consultant (Owner)Commented:
Do not use .1 - too common . Use .109 or .87 or something that is little used. Why? You may want to implement VPN and will need a different subnet. Do it now while you have a good opportunity
D_wathiAuthor Commented:
thanks , if going for , then the start ip to to can be used and netmask please correct me is this okay.
Price Your IT Services for Profit

Managed service contracts are great - when they're making you money. Yes, you’re getting paid monthly, but is it actually profitable? Learn to calculate your hourly overhead burden so you can master your IT services pricing strategy.

Andy MIT Systems ManagerCommented:
thanks , if going for , then the start ip to to can be used and netmask please correct me is this okay.

That is correct.
D_wathiAuthor Commented:
thank you very much and the main office will have 700 end devices please let me know non common ip addressing there also VPN connection will happen with start ip, and last ip and netmask please
JohnBusiness Consultant (Owner)Commented:
VPN needs a Gateway (single IP) and then a "subnet" for access to all the devices. You need a large subnet.

But your overall thinking is correct.
nociSoftware EngineerCommented:
For 700 end devices (and some network equipment you will need 1024 address-block.   (also check if you need room for future growth.

1024 addresses means you would need a /22 block of addresses if in one block,
You may want to separate in multiple subranges f.e.   so   central is split  from periferal,   Phones from Workstations, WiFi even separated from that, possibly in a few flavors (Guest, Personnel, Management WiFi lans f.e.).
I would recommend against putting 700 devices in one broadcast domain/subnet. Otherwise broadcasts start taking too much resources and it gets more challenging from a security perspective.

Better to split the network into logical VLANs such as servers, "voice VLAN", wired workstations, wifi, .... This way you can e.g. isolate the Wifi VLAN from the rest.

Each smaller VLAN can probably suffice with a /24 IP range.
D_wathiAuthor Commented:
thanks for the reply, can you please explain me on multiple subranges on how to for peripheral, phones, workstations , wifi. if we go for VLAN should each VLAN to be same IP addressing or different i,e one vlan and another vlan if done so then how does routing happen should we have to go for L3 switch which can do this for us, please suggest.
nociSoftware EngineerCommented:
Each VLAN needs to have their own address range, otherwise they are relatively unreachable...
and only one will be reachable from the outside.
You will need a router to forward messages between the various VLAN's .
An L3 switch basically is a L2 siwtch with router built in.  You will at least need manageable switches with VLAN support.
Also you may need a firewall to shield access between VLAN's, that might be more filtering than an L3-switch can provide conveniently.

Experts Exchange Solution brought to you by

Your issues matter to us.

Facing a tech roadblock? Get the help and guidance you need from experienced professionals who care. Ask your question anytime, anywhere, with no hassle.

Start your 7-day free trial
As noci writes, you do need a L3 switch (a good one with sufficient power) for routing between the VLANs. Each VLAN having a different address range.

A firewall is especially useful for added security for the Wifi and voice VLANs. The devices on these kind of VLANs are often more insecure and you probably want to limit access to the rest of your network. If you have a guest Wifi, I would even see this as an absolute requirement.
D_wathiAuthor Commented:
each VLAN having different/own address range does it mean vlan1 with the addressing of and VLAN2 as both are different i,e 109.0/24 and other one 108.0/24 please suggest me.
Yes both need to be different as in your example.
nociSoftware EngineerCommented:
Yes ANY (V)LAN you need to connent to / communicate with needs to have a separate address that is distingishable.
==> different.  Take also VPN connections to other Private address subnets into account in distributing addresranges.
Natty GregIn Theory (IT)Commented:
my two cents
subnets easier to manage

you can set up your vlans like this  (servers)  (voicelans)  (corporate)  (guess)  (BYOD) (testing lab)

there is you 1000 ips

all you need after that is rules for who is allowed to talk to who
It's more than this solution.Get answers and train to solve all your tech problems - anytime, anywhere.Try it for free Edge Out The Competitionfor your dream job with proven skills and certifications.Get started today Stand Outas the employee with proven skills.Start learning today for free Move Your Career Forwardwith certification training in the latest technologies.Start your trial today
Networking Protocols

From novice to tech pro — start learning today.