Skip to content
Vol. 1 · Ed. 2026
CyberGlossary
Entry № 1113

Subnet

What is Subnet?

SubnetA contiguous range of IP addresses that share a common prefix, defining a single broadcast domain and routing boundary on a network.


A subnet (subnetwork) groups IP addresses that share the most significant bits of their address into a single layer-3 network. The split between network and host bits is given by a subnet mask or, in CIDR, a prefix length such as /24. Hosts in the same subnet communicate directly via ARP or IPv6 Neighbor Discovery; traffic to other subnets is forwarded through a router. Subnetting supports efficient address allocation, isolates broadcast traffic, and underpins network segmentation. In security architectures it forms the boundary for VLANs, ACLs, firewall rules, and microsegmentation. Misconfigured subnets - too large, overlapping, or routed across trust zones - are a recurring source of lateral-movement risk.

Examples

  1. 01

    The /24 subnet 10.1.20.0/24 contains 256 addresses, with 10.1.20.255 reserved as broadcast.

  2. 02

    Production servers live in 10.1.10.0/24 while build agents are isolated in 10.1.30.0/24.

Frequently asked questions

What is Subnet?

A contiguous range of IP addresses that share a common prefix, defining a single broadcast domain and routing boundary on a network. It belongs to the Network Security category of cybersecurity.

What does Subnet mean?

A contiguous range of IP addresses that share a common prefix, defining a single broadcast domain and routing boundary on a network.

How does Subnet work?

A subnet (subnetwork) groups IP addresses that share the most significant bits of their address into a single layer-3 network. The split between network and host bits is given by a subnet mask or, in CIDR, a prefix length such as /24. Hosts in the same subnet communicate directly via ARP or IPv6 Neighbor Discovery; traffic to other subnets is forwarded through a router. Subnetting supports efficient address allocation, isolates broadcast traffic, and underpins network segmentation. In security architectures it forms the boundary for VLANs, ACLs, firewall rules, and microsegmentation. Misconfigured subnets - too large, overlapping, or routed across trust zones - are a recurring source of lateral-movement risk.

How do you defend against Subnet?

Defences for Subnet typically combine technical controls and operational practices, as detailed in the full definition above.

What are other names for Subnet?

Common alternative names include: Subnetwork, IP subnet.

Related terms

See also