Subnetting Exercises

Exercise A

Step 1. Host Requirement

A /24 network provides 256 total IP addresses (254 usable for hosts, after reserving the network and broadcast addresses). With 400 sensors, 254 usable addresses are not enough.

To support at least 400 hosts you need a subnet that offers at least 400 + 2 (network and broadcast) = 402 addresses. The next standard subnet size that meets this requirement is a /23, which provides 512 addresses (510 usable).

Step 2. Choosing the New Network

Since the original assignment is 10.1.1.0/24, one common approach is to “borrow” an extra bit from the host portion to widen the subnet:

Step 3. Local Multicast Support

Local multicast traffic (for example, for group communications among IoT sensors) is handled separately from unicast addressing. In many networks, multicast groups use reserved ranges (like 224.0.0.0/24 for link-local control or administratively scoped ranges such as 239.0.0.0/8).

Summary for Exercise A:

Exercise B

Step 1. Determine Subnet Sizes
  1. Phones:
    • Requirement: 40 hosts
    • A /26 subnet provides 2^(32-26) = 64 addresses (62 usable), which is more than enough for 40 devices.
  2. Users:
    • Requirement: 100 hosts
    • A /25 subnet provides 2^(32-25) = 128 addresses (126 usable), which meets the requirement.
Step 2. Allocate the Subnets within 10.5.10.0/24

One way to divide the 256-address block is:

Summary for Exercise B:

Exercise C

Step 1. Determine the Required Subnet Sizes
  1. Phones (Unified Communications):
    • Requirement: 50 devices
    • Needed addresses: 50 + 2 = 52
    • Block size: The next power-of-two is 64 addresses → /26 (64 total; 62 usable)
  2. Developers:
    • Requirement: 20 devices
    • Needed addresses: 20 + 2 = 22
    • Block size: Next power-of-two is 32 addresses → /27 (32 total; 30 usable)
  3. Human Resources:
    • Requirement: 5 devices
    • Needed addresses: 5 + 2 = 7
    • Block size: Next power-of-two is 8 addresses → /29 (8 total; 6 usable)
  4. Accounting:
    • Requirement: 5 devices
    • Needed addresses: 5 + 2 = 7
    • Block size:/29 (8 total; 6 usable)
  5. Users:
    • Although no number is given, we must “separate unified communications from users.” After allocating the above groups, the remaining addresses can be used for users.
    • Total addresses in /24: 256
    • Allocated so far: Phones (64) + Developers (32) + HR (8) + Accounting (8) = 112
    • Remaining: 256 − 112 = 144 addresses
    • Because subnets must be sized as a power-of-two, we choose a contiguous block that fits within the /24. A /25 provides 128 addresses (126 usable), which is the largest standard block that fits without “borrowing” from the rest of the /24. This leaves a small extra block (16 addresses) that can be reserved for future use.

Step 2. Subnet Allocation via VLSM

One effective approach is to divide the /24 into two main portions:

  1. Users Subnet:

    • Allocation: 10.0.0.0/25
    • Range: 10.0.0.0 – 10.0.0.127
    • Total addresses: 128 (usable: 126)
    • This subnet serves the general users (non‐unified communications).
  2. Unified Communications & Departments:

    • Remaining block: 10.0.0.128/25
    • Range: 10.0.0.128 – 10.0.0.255 (128 addresses total)

    Now, subdivide the 10.0.0.128/25 block into the following subnets:

    • Phones:
      • Allocation: 10.0.0.128/26
      • Range: 10.0.0.128 – 10.0.0.191
      • Total addresses: 64 (usable: 62)
      • Sufficient for 50 phones.
    • Developers:
      • Allocation: 10.0.0.192/27
      • Range: 10.0.0.192 – 10.0.0.223
      • Total addresses: 32 (usable: 30)
      • Sufficient for 20 devices.
    • Human Resources:
      • Allocation: 10.0.0.224/29
      • Range: 10.0.0.224 – 10.0.0.231
      • Total addresses: 8 (usable: 6)
      • Sufficient for 5 devices.
    • Accounting:
      • Allocation: 10.0.0.232/29
      • Range: 10.0.0.232 – 10.0.0.239
      • Total addresses: 8 (usable: 6)
      • Sufficient for 5 devices.
    • Spare:
      • After these allocations, the remaining addresses in the 10.0.0.128/25 block run from 10.0.0.240 to 10.0.0.255, totaling 16 addresses (a /28). This block can be reserved for future growth.

Step 3. Final Summary of the Allocation

Final Comments

Exercise D

Pasted image 20250303154759.png|425

To consolidate 10.16.0.0/16 and 10.17.0.0/16 into one routing table entry, you need to find a summary route that covers both ranges.

  1. Identify the Ranges:
    • 10.16.0.0/16: Covers 10.16.0.0 to 10.16.255.255.
    • 10.17.0.0/16: Covers 10.17.0.0 to 10.17.255.255.
  2. Check for Contiguity:
    • The two subnets are contiguous since 10.17.0.0 immediately follows 10.16.255.255.
  3. Determine the Summary Prefix:
    • Two contiguous /16 networks can be summarized as a /15.
    • A /15 network provides 2^(32-15) = 2^17 = 131072 addresses, which exactly covers the two /16 networks (each /16 has 65536 addresses).
  4. Calculate the Summary Address:
    • The summary address is the first address of the lower block: 10.16.0.0.
    • With a /15 mask (255.254.0.0), the summary route covers from 10.16.0.0 to 10.17.255.255.

Exercise E

Step 1. Determine the Subnet Mask

Step 2. Identify the Network Address

Given the IP 192.168.5.5/28:


Step 3. Determine the Usable Host Range

Final Answers

Exercise F (Firewall on a stick)

Pasted image 20250304160220.png|375

Because this is a “firewall on a stick” configuration, one physical (or trunked) firewall interface carries all VLANs as separate subinterfaces, and routing/filtering is performed between these logical interfaces.

Step 1. Sizing the Subnets

For the 20 Isolated Servers

For an individual host that is isolated (with only one device in the subnet plus a gateway), you typically need only 2 usable addresses. The smallest IPv4 subnet that provides 2 usable IP addresses is a /30.

Example Allocation:

Pasted image 20250304160958.png|450

For the 4 Application Clusters

Each cluster can have up to 6 systems. To support 6 hosts, you need a subnet that provides at least 6 + 2 = 8 addresses. The smallest subnet that does this is a /29.

Example Allocation:
After the 20 isolated server subnets (which use addresses 0–79), the next available address is 80. You could assign:


Step 2. Reviewing the Address Usage

Step 3. Implementing “Firewall on a Stick”

In a firewall on a stick design, you use a single physical interface on the firewall that is configured as a trunk. Each VLAN (with its assigned subnet) is defined as a subinterface. For example:

Each subinterface is assigned its respective IP address (typically the first usable address serves as the gateway), and the firewall is configured with policies that restrict traffic between these VLANs. This “stick” design is effective for DMZ segmentation because it uses a single physical link while still isolating broadcast domains and controlling inter-VLAN traffic.


Final Summary

Pasted image 20250304161144.png|325