Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET Coming Soon: GET:IT Endpoint Management 1-Day Conference on September 28th at 9:30 AM ET

Server 2012 DHCP – Best way to separate IPs by subnet

Home Forums Microsoft Networking and Management Services DHCP Server 2012 DHCP – Best way to separate IPs by subnet

Viewing 1 post (of 1 total)
  • Author
    Posts

  • gmklabisch
    Member
    #166314

    I currently have have one Scope with an IP range of 192.168.0.1-192.168.1.255 with a subnet mask of 255.255.254.0 as someone suggested to me for the private school I support as a volunteer. I would like to force all non-school supplied equipment (I-phones, Ipads, etc.) to get their IP from the 192.168.1.1-192.168.1.255 range. I don’t have a strong network background, so I’m looking for help. I read about using a DHCP policy, but it was not as clear as I need. One way I read about was segregating by MAC address and I could identify MAC prefixes that we use, but again I’m not clear on how to implement if this is the correct approach. I use Reservations for all our printers, access points, server, etc. in the 192.160.0.1-192.168.0.255 range and this is the range I want all the school supplied equipment to obtain their IP address from. Since I’m a network neophyte, I need some very specific examples. I looked at super scopes, but am not sure if this is the right approach. Finally, I want to make sure if for whatever reason a school supplied laptop got an address in the 192.168.1.x range that they could still access the server and the printers in the 192.168.0.x range. Thanks in advance for any assistance you can provide!!

Viewing 1 post (of 1 total)

You must be logged in to reply to this topic.

Live Webinar: Active Directory Security: What Needs Immediate Priority!Live on Tuesday, October 12th at 1 PM ET

Attacks on Active Directory are at an all-time high. Companies that are not taking heed are being punished, both monetarily and with loss of production.

In this webinar, you will learn:

  • How to prioritize vulnerability management
  • What attackers are leveraging to breach organizations
  • Where Active Directory security needs immediate attention
  • Overall strategy to secure your environment and keep it secured

Sponsored by: