Alright, I'm being a bit OCD on this, but...

If you're going to use the 10.0.0.0/16 subnet off-prem, and want to
set the broadest catchall you can for on-prem for the rest of the
10.0.0/8 range, this is the most compact way I see of setting up your
on-site subnets:

10.1.0.0/16
10.2.0.0/15
10.4.0.0/14
10.8.0.0/13
10.16.0.0/12
10.32.0.0/11
10.64.0.0/10
10.128.0.0/9

This should cover all of the 10.0.0.0/8 subnets, EXCEPT for 10.0.0./16.

Kurt

On Wed, Feb 8, 2017 at 12:31 PM, Kurt Buff <[email protected]> wrote:
> Sorry, my netmasking was incorrect.
>
> What I meant is that your subnets would need to be in the range above
> 10.0.255.255, which means 10.1.0.0/16 and above, which indeed does
> include 10.128.0..0/9, but also includes a lot more subnets.
>
> I'm not aware of a shorthand way to note that with CIDR.It would
> likely be a set of /16s from 10.1/16 to 10.127/16, plus 10.128/9.
>
> Kurt
>
> On Wed, Feb 8, 2017 at 12:06 PM, Kurt Buff <[email protected]> wrote:
>> So your subnets are in the 10.128.0.0/9 (10.128.0.1-10.255.255.254) range?
>>
>> Then yes, you should be fine.
>>
>> Kurt
>>
>> On Wed, Feb 8, 2017 at 11:28 AM, Charles F Sullivan
>> <[email protected]> wrote:
>>> Yes, so I'm set with that.
>>>
>>> For the on-prem site, there are no computers in the 10.0.0.0/16 subnet.
>>> Another way to put it is that the subnet doesn't even actually exist in the
>>> on-prem network. We have about twenty 10.x.x.x subnets on-prem and none have
>>> a subnet mask of less than /16.
>>>
>>> Thanks.
>>>
>>> -----Original Message-----
>>> From: [email protected] [mailto:[email protected]]
>>> On Behalf Of Kurt Buff
>>> Sent: Wednesday, February 8, 2017 1:25 PM
>>> To: ntsysadm <[email protected]>
>>> Subject: Re: [NTSysADM] Blocking AD Client Traffic to a Certain Site
>>>
>>> Sorry - just to be absolutely clear, my response is meant only to apply
>>> computers with addresses in that 10.0.0.0/16 subnet. Machines in other
>>> subnets would talk according to the other definitions in ADS&S.
>>>
>>>
>>> Kurt
>>>
>>> On Wed, Feb 8, 2017 at 10:17 AM, Kurt Buff <[email protected]> wrote:
>>>> Right.
>>>>
>>>> So if his off-prem site is 10.0.0.0/16, and his on-prem site is
>>>> 10.0.0.0/8, then his on-prem computers in the 10.0.0.0/16 defined
>>>> subnet(s) (i.e., from 10.0.0.1-10.0.255.254) will go off-prem, since
>>>> the on-prem site definition is less specific than the off-prem
>>>> definition.
>>>>
>>>> So, like i said, he needs to fix that, if he doesn't want his on-prem
>>>> computers to talk to the off-prem DCs.
>>>>
>>>> amirite?
>>>>
>>>> Kurt
>>>>
>>>> On Wed, Feb 8, 2017 at 6:43 AM, Brian Desmond <[email protected]>
>>>> wrote:
>>>>> AD will match the most specific subnet so in this case the 10.0.0.0/16
>>>>> subnet will match anyone who is  10.0.X.X. IP.
>>>>>
>>>>> Thanks,
>>>>> Brian Desmond
>>>>>
>>>>> (w) 312.625.1438 | (c) 312.731.3132
>>>>>
>>>>> -----Original Message-----
>>>>> From: [email protected]
>>>>> [mailto:[email protected]] On Behalf Of Kurt Buff
>>>>> Sent: Tuesday, February 7, 2017 6:55 PM
>>>>> To: ntsysadm <[email protected]>
>>>>> Subject: Re: [NTSysADM] Blocking AD Client Traffic to a Certain Site
>>>>>
>>>>> And there's your problem, if you didn't typo your response.
>>>>>
>>>>> 10.0.0.0/8 overlaps with (actually includes) 10.0.0.0/16
>>>>>
>>>>> That's why some clients will go to your second site (AWS) at random.
>>>>>
>>>>> You probably need to list out your subnets more carefully for your main
>>>>> site.
>>>>>
>>>>> Kurt
>>>>>
>>>>> On Tue, Feb 7, 2017 at 11:33 AM, Charles F Sullivan
>>>>> <[email protected]> wrote:
>>>>>> I’ve only been able to do very limited testing.
>>>>>>
>>>>>>
>>>>>>
>>>>>> -          I had about 8 member servers in a site which were actually
>>>>>> all in
>>>>>> the same subnet as each of and the one DC we had for testing, let’s
>>>>>> call the subnet 198.168.17.0/24. In that site I included the usual
>>>>>> private ranges:
>>>>>> 192.168.0.0/16, 172.16.0.0/12 and 10.0.0.0/8
>>>>>>
>>>>>> -          At AWS I had a subnet with one DC and just a couple of member
>>>>>> servers in the 10.0.0.0/16 subnet, which was defined as the only AWS
>>>>>> site.
>>>>>>
>>>>>> Note that the AWS subnet is a subset of one that I defined at the
>>>>>> main site, but this absolutely is supported by MS and others have
>>>>>> told me that this works for them. Despite all of this I did see one
>>>>>> member server in the main site use the AWS DC after a reboot even
>>>>>> though the local DC was clearly present and being used by the other
>>>>>> member servers. So that means 1 out 8 member servers I had for
>>>>>> testing crossed sites. This made me wonder how often it might happen
>>>>>> in our production environment where there are thousands of member
>>>>>> computers.
>>>>>>
>>>>>>
>>>>>>
>>>>>> I do have to say that I recently got to test this again, this time
>>>>>> having 5 DCs at the main site and 2 at AWS. Again, I had just a
>>>>>> handful of member servers and a workstation and this time I didn’t
>>>>>> see any of them using an AWS DC. The AWS admin didn’t see his one
>>>>>> member server use anything besides an AWS DC.
>>>>>>
>>>>>>
>>>>>>
>>>>>> From: [email protected]
>>>>>> [mailto:[email protected]]
>>>>>> On Behalf Of Michael B. Smith
>>>>>> Sent: Tuesday, February 7, 2017 1:32 PM
>>>>>> To: [email protected]
>>>>>> Subject: RE: [NTSysADM] Blocking AD Client Traffic to a Certain Site
>>>>>>
>>>>>>
>>>>>>
>>>>>> Doesn’t make sense to me.
>>>>>>
>>>>>>
>>>>>>
>>>>>> The only reason you should have cross-site connections at this point
>>>>>> is because you don’t have all of the relevant subnets defined in ADS&S.
>>>>>>
>>>>>>
>>>>>>
>>>>>> From: [email protected]
>>>>>> [mailto:[email protected]]
>>>>>> On Behalf Of Charles F Sullivan
>>>>>> Sent: Tuesday, February 7, 2017 11:40 AM
>>>>>> To: [email protected]
>>>>>> Subject: [NTSysADM] Blocking AD Client Traffic to a Certain Site
>>>>>>
>>>>>>
>>>>>>
>>>>>> I’d like to get some ideas and opinions regarding this, especially
>>>>>> if anyone has had a similar need…..
>>>>>>
>>>>>>
>>>>>>
>>>>>> Our AD topology to this point has been as simple as can be. Since
>>>>>> just about everything on our extended network is connected at high
>>>>>> speeds, we have never had to have more than one AD site. We are
>>>>>> about to put a couple of DCs at AWS, which of course will require a
>>>>>> second site to be defined. This will still be pretty
>>>>>> straightforward. Everything but AWS will be on the one existing site and
>>>>>> a second site will be added for the one subnet at AWS.
>>>>>>
>>>>>>
>>>>>>
>>>>>> I know that even with the two sites defined, some clients may at
>>>>>> times use the remote site. This is what I have seen in testing, for
>>>>>> whatever reason, but I don’t consider it to be a real problem
>>>>>> because I assume it would not happen often. The problem is that our
>>>>>> director wants absolutely no cross-site traffic except in the case of a
>>>>>> disaster.
>>>>>>
>>>>>>
>>>>>>
>>>>>> It is being proposed that the firewall between the sites allow only
>>>>>> AD traffic between the DCs themselves. AD clients would be stopped
>>>>>> at the firewall. I’m not comfortable with that as a solution because
>>>>>> I’m concerned that when clients do try to use DCs at the remote
>>>>>> site, it will cause slowness if not failure. Does this seem like a
>>>>>> bad idea for that or any other reason?
>>>>>>
>>>>>>
>>>>>>
>>>>>> I was thinking that maybe I could use weight and priority within SRV
>>>>>> records so that the DCs at AWS would be weight=0 and priority=65535.
>>>>>> If I did that, would the clients at AWS honor the site rules over
>>>>>> the SRV records weight and priority? I’m guess that would be
>>>>>> unpredictable, thus also not a good solution.
>>>>>>
>>>>>>
>>>>>>
>>>>>> Thanks in advance for any help.
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>>
>>>>>> Charlie Sullivan
>>>>>>
>>>>>> Sr. Windows Systems Administrator
>>>>>>
>>>>>>
>>>>>
>>>>>
>>>
>>>


Reply via email to