Skip to content
CIDR Allocations

CIDR Allocations

The public CIDR block 2001:678:dc0::/48 is used for announcing public routes via BGP. This block is announced with the ASN 201421.

Strategy

Allocations are made with nibble boundaries, meaning that each hex digit in the address represents a specific layer of the network hierarchy. This allows for efficient routing and management of the address space, as well as flexibility in subnetting and network design.

Capacity Breakdown

LevelPrefix LengthCapacityBits Used
Site/562568 bits (2 hex digits)
Purpose/60164 bits (1 hex digit)
Subnet/6465,5364 bits (1 hex digit)

Total Calculation: 256 Sites * 16 Groups * 16 Subnets = 65,536 total /64 subnets.

The final allocations follow the pattern 2001:678:dc0:SSPG:::

  • SS = Site (00 to FF)
  • P = Purpose (0 to F)
  • G = Group (0 to F)

If VLANs are used, the last two hex digits of the subnet can be used to encode the VLAN ID, allowing for up to 256 VLANs per purpose per site.

Allocations

Sites

SiteCIDR Block
Core Infrastructure2001:678:dc0:01PG::/56
VIE2001:678:dc0:02PG::/56
MUC2001:678:dc0:03PG::/56
BHS (OVH)2001:678:dc0:04PG::/56

Purposes

PurposeCIDR BlockDescription
Infrastructure2001:678:dc0:SS00::/60Routers, Switches, Firewalls, IPMI, etc.
Servers2001:678:dc0:SS10::/60Bare-metal servers, VMs, Containers, etc.
Trusted Core2001:678:dc0:SS20::/60Secure devices that are highly trusted outside of other categories
Internal Services2001:678:dc0:SSD0::/60Any service reachable from the Intranet
DMZ Services2001:678:dc0:SSE0::/60Any service reachable from the Internet
Sandbox2001:678:dc0:SSF0::/60Sandbox and lab environments

Subnets

This section can change frequently based on the needs of the network and the specific use cases for each site and purpose. The subnets highlighted here are the standard allocations, but additional or different subnets may be allocated as needed.

Group 0: Infrastructure

SubnetCIDR BlockDescription
Management2001:678:dc0:SS00::/64Network gear, like routers and switches

Group 1: Servers

SubnetCIDR BlockDescription
Hypervisors2001:678:dc0:SS10::/64Proxmox and other hybervisors
Kubernetes2001:678:dc0:SS11::/64Kubernetes nodes
Containers/Pods2001:678:dc0:SS12::/64Containers/Kubernetes pod networks

Group 2: Trusted Core

Currently, no allocations have been made for this category.

Group 3: Internal Services

Internal services may use these CIDR blocks or an internal ULA block, depending on requirements.

SubnetCIDR BlockDescription
Network2001:678:dc0:SSD0::/64Netwok-related services
Storage2001:678:dc0:SSD1::/64File shares, shared storages, etc.
Ingress / Proxy2001:678:dc0:SSD2::/64Ingress controllers, reverse proxies, etc.
IoT2001:678:dc0:SSD3::/64IoT-related services
Applications2001:678:dc0:SSDE::/64Any other internal application or service
Sandbox2001:678:dc0:SSDF::/64Sandbox and lab services not hosted in the sandbox group

Group 4: DMZ Services

SubnetCIDR BlockDescription
Network2001:678:dc0:SSE0::/64Netwok-related services
Ingress / Proxy2001:678:dc0:SSE1::/64Ingress controllers, reverse proxies, etc.
Applications2001:678:dc0:SSEE::/64Any other public-facing application or service
Sandbox2001:678:dc0:SSEF::/64Sandbox and lab services not hosted in the sandbox group

Group 5: Sandbox

Allocations are made randomly depending on the specific needs of the sandbox environment.

Special Allocations

IdentifierCIDR Block / AddressDescription
BGP Router2001:678:dc0:SS00::1/56BGP router addresses within the site