04-05-2024 07:01 PM - edited 04-07-2024 05:13 AM
Assume Wifi infrastructure user and management port use the same class A
10.128.0.0/9 <- user use or management use if most secured?
10.192.0.0/10 <- user use or management use if most secured?
10.0.0.0/25
10.0.0.0/26
10.0.0.0/8
which should be and should not be used for user IP address and management port IP address?
if more secured , does it mean user can only use more specific IP address and more narrow and smaller set of IP address subnet?
04-05-2024 07:39 PM
@Maivakov hi, my personal advice is, there is nothing called most secured IP range. all IPs are scannable if you allowed access. use ACL, Firewalls, VLANs to isolate your network according to trust level. use zero trust model.
04-05-2024 08:19 PM
There is no such thing as a "secured IP address scheme".
Even air-gapped network get compromised.
04-06-2024 03:53 AM
But, which assignment of choices of IP address scheme can give more difficulty to invaders ?
04-06-2024 04:04 AM
Security doesn't come from a certain IP addressing scheme like @Kasun Bandara and @Leo Laohoo pointed out. It really comes from the policies you have in place, like the password policy, and from the hardware and software tools you use enforce the security policies and also report on security events.
04-06-2024 07:58 PM - edited 04-06-2024 09:18 PM
@Maivakov wrote:
But, which assignment of choices of IP address scheme can give more difficulty to invaders ?
(Obviously someone did not read my response.)
Oh, my sweet summer child. You know nothing about the cold.
I'm going to have to be very brutal: Whoever gave the statement "what is the most secure IP address" has provided a trick question to test someone's "mettle".
Even a standalone machine, a machine without an IP address, can get compromised.
04-07-2024 01:18 AM - edited 04-07-2024 04:00 AM
@Maivakov I think you're missing the point of all the replies - there is no IP range that is "more secure" than another range.
There are a bunch of arguments you could make to try to argue that one way or another but they're all ultimately rubbish (smoke and mirrors) because they make no difference at all to a determined intruder. It goes without saying that your management and users should be in separate VLANs and on separate subnets, but which subnet you use makes little difference. Ideally management should be completely out of band and completely inaccessible to WiFi users. You can use features like "DHCP required" to ensure wireless users only get IPs from the WiFi subnet and unicast RPF on the next hop (default gateway) router to absolutely exclude IP spoofing from those users. That should be combined with every other security feature (including ACLs and firewalls and the other things mentioned above) to achieve what's known as defence in depth. This means you don't rely on any single feature or protection mechanism, you assume any of them can be compromised, so you use all you have available so that even if one or some are compromised the rest continue to provide protection at every level possible. That's how you make it "more difficult" for an intruder.
04-07-2024 05:15 AM
I am not penetration tester, I am confused that there are no routing between two different subnet, how come this possible?
which network course teach air gapped network can also be invaded ?
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide