Sorry, my netmasking was incorrect.

What I meant is that your subnets would need to be in the range above
10.0.255.255, which means 10.1.0.0/16 and above, which indeed does
include 10.128.0..0/9, but also includes a lot more subnets.

I'm not aware of a shorthand way to note that with CIDR.It would
likely be a set of /16s from 10.1/16 to 10.127/16, plus 10.128/9.

Kurt

On Wed, Feb 8, 2017 at 12:06 PM, Kurt Buff <[email protected]> wrote:
> So your subnets are in the 10.128.0.0/9 (10.128.0.1-10.255.255.254) range?
>
> Then yes, you should be fine.
>
> Kurt
>
> On Wed, Feb 8, 2017 at 11:28 AM, Charles F Sullivan
> <[email protected]> wrote:
>> Yes, so I'm set with that.
>>
>> For the on-prem site, there are no computers in the 10.0.0.0/16 subnet.
>> Another way to put it is that the subnet doesn't even actually exist in the
>> on-prem network. We have about twenty 10.x.x.x subnets on-prem and none have
>> a subnet mask of less than /16.
>>
>> Thanks.
>>
>> -----Original Message-----
>> From: [email protected] [mailto:[email protected]]
>> On Behalf Of Kurt Buff
>> Sent: Wednesday, February 8, 2017 1:25 PM
>> To: ntsysadm <[email protected]>
>> Subject: Re: [NTSysADM] Blocking AD Client Traffic to a Certain Site
>>
>> Sorry - just to be absolutely clear, my response is meant only to apply
>> computers with addresses in that 10.0.0.0/16 subnet. Machines in other
>> subnets would talk according to the other definitions in ADS&S.
>>
>>
>> Kurt
>>
>> On Wed, Feb 8, 2017 at 10:17 AM, Kurt Buff <[email protected]> wrote:
>>> Right.
>>>
>>> So if his off-prem site is 10.0.0.0/16, and his on-prem site is
>>> 10.0.0.0/8, then his on-prem computers in the 10.0.0.0/16 defined
>>> subnet(s) (i.e., from 10.0.0.1-10.0.255.254) will go off-prem, since
>>> the on-prem site definition is less specific than the off-prem
>>> definition.
>>>
>>> So, like i said, he needs to fix that, if he doesn't want his on-prem
>>> computers to talk to the off-prem DCs.
>>>
>>> amirite?
>>>
>>> Kurt
>>>
>>> On Wed, Feb 8, 2017 at 6:43 AM, Brian Desmond <[email protected]>
>>> wrote:
>>>> AD will match the most specific subnet so in this case the 10.0.0.0/16
>>>> subnet will match anyone who is  10.0.X.X. IP.
>>>>
>>>> Thanks,
>>>> Brian Desmond
>>>>
>>>> (w) 312.625.1438 | (c) 312.731.3132
>>>>
>>>> -----Original Message-----
>>>> From: [email protected]
>>>> [mailto:[email protected]] On Behalf Of Kurt Buff
>>>> Sent: Tuesday, February 7, 2017 6:55 PM
>>>> To: ntsysadm <[email protected]>
>>>> Subject: Re: [NTSysADM] Blocking AD Client Traffic to a Certain Site
>>>>
>>>> And there's your problem, if you didn't typo your response.
>>>>
>>>> 10.0.0.0/8 overlaps with (actually includes) 10.0.0.0/16
>>>>
>>>> That's why some clients will go to your second site (AWS) at random.
>>>>
>>>> You probably need to list out your subnets more carefully for your main
>>>> site.
>>>>
>>>> Kurt
>>>>
>>>> On Tue, Feb 7, 2017 at 11:33 AM, Charles F Sullivan
>>>> <[email protected]> wrote:
>>>>> I’ve only been able to do very limited testing.
>>>>>
>>>>>
>>>>>
>>>>> -          I had about 8 member servers in a site which were actually
>>>>> all in
>>>>> the same subnet as each of and the one DC we had for testing, let’s
>>>>> call the subnet 198.168.17.0/24. In that site I included the usual
>>>>> private ranges:
>>>>> 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8
>>>>>
>>>>> -          At AWS I had a subnet with one DC and just a couple of member
>>>>> servers in the 10.0.0.0/16 subnet, which was defined as the only AWS
>>>>> site.
>>>>>
>>>>> Note that the AWS subnet is a subset of one that I defined at the
>>>>> main site, but this absolutely is supported by MS and others have
>>>>> told me that this works for them. Despite all of this I did see one
>>>>> member server in the main site use the AWS DC after a reboot even
>>>>> though the local DC was clearly present and being used by the other
>>>>> member servers. So that means 1 out 8 member servers I had for
>>>>> testing crossed sites. This made me wonder how often it might happen
>>>>> in our production environment where there are thousands of member
>>>>> computers.
>>>>>
>>>>>
>>>>>
>>>>> I do have to say that I recently got to test this again, this time
>>>>> having 5 DCs at the main site and 2 at AWS. Again, I had just a
>>>>> handful of member servers and a workstation and this time I didn’t
>>>>> see any of them using an AWS DC. The AWS admin didn’t see his one
>>>>> member server use anything besides an AWS DC.
>>>>>
>>>>>
>>>>>
>>>>> From: [email protected]
>>>>> [mailto:[email protected]]
>>>>> On Behalf Of Michael B. Smith
>>>>> Sent: Tuesday, February 7, 2017 1:32 PM
>>>>> To: [email protected]
>>>>> Subject: RE: [NTSysADM] Blocking AD Client Traffic to a Certain Site
>>>>>
>>>>>
>>>>>
>>>>> Doesn’t make sense to me.
>>>>>
>>>>>
>>>>>
>>>>> The only reason you should have cross-site connections at this point
>>>>> is because you don’t have all of the relevant subnets defined in ADS&S.
>>>>>
>>>>>
>>>>>
>>>>> From: [email protected]
>>>>> [mailto:[email protected]]
>>>>> On Behalf Of Charles F Sullivan
>>>>> Sent: Tuesday, February 7, 2017 11:40 AM
>>>>> To: [email protected]
>>>>> Subject: [NTSysADM] Blocking AD Client Traffic to a Certain Site
>>>>>
>>>>>
>>>>>
>>>>> I’d like to get some ideas and opinions regarding this, especially
>>>>> if anyone has had a similar need…..
>>>>>
>>>>>
>>>>>
>>>>> Our AD topology to this point has been as simple as can be. Since
>>>>> just about everything on our extended network is connected at high
>>>>> speeds, we have never had to have more than one AD site. We are
>>>>> about to put a couple of DCs at AWS, which of course will require a
>>>>> second site to be defined. This will still be pretty
>>>>> straightforward. Everything but AWS will be on the one existing site and
>>>>> a second site will be added for the one subnet at AWS.
>>>>>
>>>>>
>>>>>
>>>>> I know that even with the two sites defined, some clients may at
>>>>> times use the remote site. This is what I have seen in testing, for
>>>>> whatever reason, but I don’t consider it to be a real problem
>>>>> because I assume it would not happen often. The problem is that our
>>>>> director wants absolutely no cross-site traffic except in the case of a
>>>>> disaster.
>>>>>
>>>>>
>>>>>
>>>>> It is being proposed that the firewall between the sites allow only
>>>>> AD traffic between the DCs themselves. AD clients would be stopped
>>>>> at the firewall. I’m not comfortable with that as a solution because
>>>>> I’m concerned that when clients do try to use DCs at the remote
>>>>> site, it will cause slowness if not failure. Does this seem like a
>>>>> bad idea for that or any other reason?
>>>>>
>>>>>
>>>>>
>>>>> I was thinking that maybe I could use weight and priority within SRV
>>>>> records so that the DCs at AWS would be weight=0 and priority=65535.
>>>>> If I did that, would the clients at AWS honor the site rules over
>>>>> the SRV records weight and priority? I’m guess that would be
>>>>> unpredictable, thus also not a good solution.
>>>>>
>>>>>
>>>>>
>>>>> Thanks in advance for any help.
>>>>>
>>>>>
>>>>>
>>>>>
>>>>>
>>>>> Charlie Sullivan
>>>>>
>>>>> Sr. Windows Systems Administrator
>>>>>
>>>>>
>>>>
>>>>
>>
>>


Reply via email to