HP3000-L Archives

October 2002, Week 1

HP3000-L@RAVEN.UTC.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
Jeff Kell <[log in to unmask]>
Reply To:
Jeff Kell <[log in to unmask]>
Date:
Wed, 2 Oct 2002 23:56:09 -0400
Content-Type:
text/plain
Parts/Attachments:
text/plain (107 lines)
Tom Brandt wrote:
>
> At 02:55 PM 10/2/2002 -0400, Wirt Atmar wrote:

> >The HP3000's IP address should have an address more akin to 192.168.1.111 (as
> >should every device on the internal LAN), an address that lies within one of
> >the reserved private, non-routable IP address spaces that were meant to be
> >used over and over within every corporation -- and translated only into
> >real-world addresses by the NAT-based routers when their packets, like Elvis,
> >leave the building.
>
> I have seen several of my client's HP3000's configured with an IP address
> of 192.1.1.1, and I seem to recall seeing somewhere an NMMGR manual (on
> paper) which used 192.1.1.1 as an example of what to put into the IP
> address field when configuring the LAN. A lot of people, new to networking,
> simply used this address because they didn't know any better.
>
> The current NMMGR manuals on docs.hp.com use 192.191.191.009 as an example,
> which I am not sure is any better.

On "the real internet", the officially reserved address space (RFC1918)
is as follows:

   10.x.x.x      or 10/8 in CIDR notation
   172.16-31.x.y or 172.16/12
   192.168.x.y   or 192.168/16

The "all networks" 0.0.0.0 is deprecated and should not be used.
The "localhost" 127.0.0.0 (or 172/8) should not be used.
The "all broadcast" 255.255.255.255 should not be used.
The MickeySoft auto-registration block 169.254.0.0 should not be used.

Aww, heck, let's quote the not-yet-RFC-but-a-maturing-draft found at
http://www.ietf.org/internet-drafts/draft-iana-special-ipv4-05.txt :

3. Summary Table

   Address Block              Present Use                       Reference
   ----------------------------------------------------------------------
   0.0.0.0/8             "This" Network                 [RFC1700, page 4]
   10.0.0.0/8            Private-Use Networks                   [RFC1918]
   14.0.0.0/8            Public-Data Networks         [RFC1700, page 181]
   24.0.0.0/8            Cable Television Networks                    --
   39.0.0.0/8            Reserved but subject
                           to allocation                        [RFC1797]
   127.0.0.0/8           Loopback                       [RFC1700, page 5]
   128.0.0.0/16          Reserved but subject
                           to allocation                              --
   169.254.0.0/16        Link Local                                   --
   172.16.0.0/12         Private-Use Networks                   [RFC1918]
   191.255.0.0/16        Reserved but subject
                           to allocation                              --
   192.0.0.0/24          Reserved but subject
                           to allocation                              --
   192.0.2.0/24          Test-Net
   192.88.99.0/24        6to4 Relay Anycast                     [RFC3068]
   192.168.0.0/16        Private-Use Networks                   [RFC1918]
   198.18.0.0/15         Network Interconnect
                           Device Benchmark Testing             [RFC2544]
   223.255.255.0/24      Reserved but subject
                           to allocation                              --
   224.0.0.0/4           Multicast                              [RFC3171]
   240.0.0.0/4           Reserved for Future Use        [RFC1700, page 4]

If you have a Cisco router and want to prevent invalid addresses from
entering your network (e.g., spoofing) here is the current list of what
is technically called the "Bogon List":

access-list 100 deny ip 0.0.0.0 1.255.255.255 any
access-list 100 deny ip 2.0.0.0 0.255.255.255 any
access-list 100 deny ip 5.0.0.0 0.255.255.255 any
access-list 100 deny ip 7.0.0.0 0.255.255.255 any
access-list 100 deny ip 10.0.0.0 0.255.255.255 any
access-list 100 deny ip 23.0.0.0 0.255.255.255 any
access-list 100 deny ip 27.0.0.0 0.255.255.255 any
access-list 100 deny ip 31.0.0.0 0.255.255.255 any
access-list 100 deny ip 36.0.0.0 1.255.255.255 any
access-list 100 deny ip 39.0.0.0 0.255.255.255 any
access-list 100 deny ip 41.0.0.0 0.255.255.255 any
access-list 100 deny ip 42.0.0.0 0.255.255.255 any
access-list 100 deny ip 49.0.0.0 0.255.255.255 any
access-list 100 deny ip 50.0.0.0 0.255.255.255 any
access-list 100 deny ip 58.0.0.0 0.255.255.255 any
access-list 100 deny ip 59.0.0.0 0.255.255.255 any
access-list 100 deny ip 60.0.0.0 0.255.255.255 any
access-list 100 deny ip 70.0.0.0 1.255.255.255 any
access-list 100 deny ip 72.0.0.0 7.255.255.255 any
access-list 100 deny ip 82.0.0.0 1.255.255.255 any
access-list 100 deny ip 84.0.0.0 3.255.255.255 any
access-list 100 deny ip 88.0.0.0 7.255.255.255 any
access-list 100 deny ip 96.0.0.0 31.255.255.255 any
access-list 100 deny ip 169.254.0.0 0.0.255.255 any
access-list 100 deny ip 172.16.0.0 0.15.255.255 any
access-list 100 deny ip 192.0.2.0 0.0.0.255 any
access-list 100 deny ip 192.168.0.0 0.0.255.255 any
access-list 100 deny ip 197.0.0.0 0.255.255.255 any
access-list 100 deny ip 198.18.0.0 0.1.255.255 any
access-list 100 deny ip 201.0.0.0 0.255.255.255 any
access-list 100 deny ip 222.0.0.0 1.255.255.255 any
access-list 100 deny ip 223.0.0.0 0.255.255.255 any
access-list 100 deny ip 224.0.0.0 31.255.255.255 any

Jeff

* To join/leave the list, search archives, change list settings, *
* etc., please visit http://raven.utc.edu/archives/hp3000-l.html *

ATOM RSS1 RSS2