|
General software and network General OS-independent software and network questions, X11, MTA, routing, etc. |
|
Thread Tools | Display Modes |
|
||||
Get thee to a /30
Code:
Windows: I was the more deceiv'd. Hamlet: Get thee to a /30, why woulds't thou be a breeder of sinners? -- Hamlet Act 3, scene 1, 120–121, revised. Quote:
I anticipate a somewhat complicated dhcpd configuration, but I wonder if there are any ARP issues that might arise from mapping multiple IP subnets onto a single Ethernet segment. |
|
||||
Well, at least it won't be an issue for dhcpd(8). From dhcpd.conf(5):
Quote:
|
|
|||
Quote:
The router(s) separating these subnets from their supplying DHCP servers will need to be configured to allow DHCP requests to traverse subnets since by definition, routers will not forward DHCP traffic. |
|
|||
You might be interested in the following which attempts to answer the question of balancing broadcast & multicast traffic:
http://www.google.com/url?sa=t&rct=j...48705608,d.cGE FWIW. Last edited by ocicat; 10th July 2013 at 05:30 PM. Reason: Corrected URL |
|
|||
Done. Thanks.
|
|
||||
Quote:
The IP shielding may eliminate some necessary NetBIOS functionality -- local name queries broadcast over UDP come to mind. I don't know much about Microsoft Networking but I assume a WINS server could provide the same capabilities. |
|
|||
According to RFC 3021 you can use a /31 on a point-to-point link
__________________
You don't need to be a genius to debug a pf.conf firewall ruleset, you just need the guts to run tcpdump |
|
||||
Just in case anyone wants to know, a /30 is the smallest IP subnet on a multi-point network. It has four IP addresses: a network address used for routing, two assignable IP addresses -- one for the connected device and one for the router, and a broadcast address. Smaller subnets are possible, in certain instances:
|
|
||||
That's one reason why I come here - impromptu lessons. Thanks, J65nko and jggimi for teaching me something new today!
Now, I better go home before my brain overflows.
__________________
That's nothing a couple o' pints wouldn't fix. Last edited by marcolino; 12th July 2013 at 01:07 PM. Reason: Emoticons |
|
||||
Testing, it seemed to be easy, just worked, and did not require any 802.1Q VLAN configurations at all.
The router just needs aliases assigned for each extra subnet, such as 10.1.1.1/30, 10.1.1.5/30, 10.1.1.9/30... and so on. The dhcpd.conf needs the network address of each subnet. Here, for example, is the configuration for a network with two /30s: 10.1.1.0, with the router at 10.1.1.1 and the device at 10.1.1.2, broadcast at 10.1.1.3. 10.1.1.4, with the router at 10.1.1.5 and the device at 10.1.1.6, broadcast at 10.1.1.7. Code:
shared-network LAN { subnet 10.1.1.0 netmask 255.255.255.252 { option routers 10.1.1.1; host one { hardware ethernet 00:00:00:00:00:01; fixed-address 10.1.1.2; } } subnet 10.1.1.4 netmask 255.255.255.252 { option routers 10.1.1.5; host two { hardware ethernet 00:00:00:00:00:02; fixed-address 10.1.1.6; } } } |
|
||||
Here's a routing table from host "two", which is using 10.1.1.6. You can see the network address 10.1.1.4, and the default gateway 10.1.1.5 (an alias address on the router):
Code:
Routing tables Internet: Destination Gateway Flags Refs Use Mtu Prio Iface default 10.1.1.5 UGS 0 7 - 8 em0 10.1.1.4/30 link#1 UC 1 0 - 4 em0 10.1.1.5 00:00:00:00:00:03 UHLc 1 0 - 4 em0 10.1.1.6 127.0.0.1 UGS 0 0 33192 8 lo0 127/8 127.0.0.1 UGRS 0 0 33192 8 lo0 127.0.0.1 127.0.0.1 UH 2 24 33192 4 lo0 224/4 127.0.0.1 URS 0 0 33192 8 lo0 |
|
||||
My configuration is documented (at least partially) here.
dhcpd wasn't that bad, and all of the inter-windows communications must take place via firewall rules on my OpenBSD firewall (quite convenient, IMHO). Since Windows doesn't have to bother with L2 (other than getting traffic to the gateway), I don't have to worry about ARP or any other silliness. My OpenBSD firewall has a fun routing table (ARP table is still the same size it was before, I believe), but other than that the Windows hosts believe they're the only hosts on their physical network. The only real complication is monitoring (iftop -NPi $interface doesn't show ALL NIC traffic (as you'd expect...you have to monitor per-vlan) =) Pretty neat, since I'd actually lost sleep worrying if my daughter would get her Win7 box infected and that lead to my wife's Win7 box getting infected as well. Now I just need a vlan-capable wireless router (my access point is running dd-wrt (won't run openwrt), but this build of dd-wrt for this exact model has to have ipv6, vlans, and a bunch of other stuff turned off to fit). Edit: didn't notice jggimi had quoted me with the embedded link to my LQ blog entry outlining this layout. Sorry for the double-link heh.
__________________
Linux/Network-Security Engineer by Profession. OpenBSD user by choice. Last edited by rocket357; 15th July 2013 at 12:18 AM. |
|
|