Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (No Skin)
  • No Skin
Collapse
Code Project
  1. Home
  2. The Lounge
  3. The KISS principal really applies to networks...

The KISS principal really applies to networks...

Scheduled Pinned Locked Moved The Lounge
sysadminalgorithmsjsonworkspace
23 Posts 7 Posters 0 Views 1 Watching
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • S Shuqian Ying

    I have missed the security problems in the above reply, it is modified. Please read it again.

    D Offline
    D Offline
    dandy72
    wrote on last edited by
    #21

    Gotcha. It makes sense. If my router allowed a rule to be defined as such, would it be possible to explicitly block 192.168.1.[0-255]? Not that it sounds like the best idea in the world. I'm warming up to the idea of using 172.* instead of 192.168.*. There should be *no* way for the networks to see each other if they're working off of entirely different subnets.

    S 1 Reply Last reply
    0
    • D dandy72

      Edumacate me: Wouldn't 172.16.x.x/16 and 192.168.0.0/16 allow for the same number of endpoints (65534), given that /16 essentially means a subnet mask of 255.255.0.0? I think I need to brush up on my subnet literature.

      S Offline
      S Offline
      Shuqian Ying
      wrote on last edited by
      #22

      Right, they are the same, namely 256*256-2 (2 excluded are special ip addresses ends with 0 or 255).

      1 Reply Last reply
      0
      • D dandy72

        Gotcha. It makes sense. If my router allowed a rule to be defined as such, would it be possible to explicitly block 192.168.1.[0-255]? Not that it sounds like the best idea in the world. I'm warming up to the idea of using 172.* instead of 192.168.*. There should be *no* way for the networks to see each other if they're working off of entirely different subnets.

        S Offline
        S Offline
        Shuqian Ying
        wrote on last edited by
        #23

        It's likely that the firewalls in most routers are not that sophisticate that they can detect and exclude a subset of ip addresses from within a given set of the same in building default forwarding rules.

        1 Reply Last reply
        0
        Reply
        • Reply as topic
        Log in to reply
        • Oldest to Newest
        • Newest to Oldest
        • Most Votes


        • Login

        • Don't have an account? Register

        • Login or register to search.
        • First post
          Last post
        0
        • Categories
        • Recent
        • Tags
        • Popular
        • World
        • Users
        • Groups