jibtech wrote: » 3. This is the big one, to me. You introduce a level of confusion to those who have to maintain the network now, and in the future. The design is going against the common practices used across the industry. New support staff will have to unlearn what they know, and it will always be something that has to be remembered. It also would make me question other network design decisions, as this is enough of a deviation to warrant concern. .
EANx wrote: » My biggest fear in that situation would be all the ways leaking could occur. For instance, if your organization allows the use of VPNs for people to connect, those VPNs have to be appropriately configured so that the home user doesn't serve as a pipe bypassing the enterprise firewalls. A big benefit to using a ten-dot is that ISPs know not to route it, by using other registered addresses, it means you have to be especially vigilant. I would hope you have a robust configuration and change management process, if you don't, you're at greater risk of a sloppy config not being noticed.
jibtech wrote: » To this point, how much confidence would you have in the robustness of the configuration and change management process, given the known deviation from best practices? Given something of this scope was done outside of good practice, I would be concerned about the rest, as well.
Welly_59 wrote: » I also had similar recently. New client that was onboarded was using a public range for its internal network. Flagged it up but the powers that be didn't care enough to force them to change
ImYourOnlyDJ wrote: » I've also seen companies use the APIPA range (169.254.x.x) internally. It supposedly was to make it more secure since it would have been harder to guess or something.