01-31-2013 05:36 AM - edited 03-07-2019 11:25 AM
I need to create some VVLANs. I cannot find the reccommended size of the subnet. I want to use a /24 or a /23. I can find best practices for all sorts of stuff except VLAN size. Any thoughts?
01-31-2013 05:40 AM
Hello Mike,
a /24 IP subnet is fine for most applications.
For better security it would be a good idea to put the voice vlan and voice related IP subnets in a dedicated VRF so that is separated by data traffic.
Hope to help
Giuseppe
01-31-2013 06:23 AM
Is there any disadvantages to using a /23 over a /24. Besides a bigger broadcast domain. But i cant imagine phones create much broadcast traffic. And seperate VRFs makes sense.
01-31-2013 09:50 AM
DisclaimerThe Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
Liability Disclaimer
In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
Posting
A VoIP WLAN (wireless) subnet? For wireless, subnet sizing might differ from wired LANs as different media considerations apply.
For wired, you're correct, VoIP only hosts tend to be a little easier on the network than data hosts. As such, it's generally okay to go with a larger subnet, i.e. a /23 might be fine.
One "gotcha" though, often VoIP phone hosts share the same physical port as a data host. Even when they use a dedicated VoIP VLAN on the edge port, the port is physically sending data broadcast packets down the port. In shared port environments, you generally don't want to increase the size of the VoIP subnet as you might with ports dedicated to just VoIP.
PS:
Giuseppe is correct, placing VoIP subnets into their own VRF may improve VoIP security, but it also raises complexity. You might want to carefully consider how secure you want your VoIP devices to be and the related cost to achieve. A "half way" approach might be segregation of data and VoIP into different VLANs and subnets (all in the same routing topology, though).
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide