SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 1 of 22
Do not duplicate or redistribute in any form
SUBNETTING SCENARIO’S
This white paper provides several in-depth scenario’s dealing with a very confusing topic,
subnetting. Many networking engineers need extra practice to completely understand the
intricacies involved. These scenarios address this need by providing you with multiple
situations that will require a reasoned approach to solving them. Detailed explanations are
provided with the actual formulas and how they were achieved.
Table of Contents
Subnetting Scenario’s------------------------------------------------------------------- 1
Introduction to IP Addressing ----------------------------------------------------------- 3
IP Addressing -----------------------------------------------------------------------------------------------------------------------------------3
Class "A" Addresses -----------------------------------------------------------------------------------------------------------------------3
Class "B" Addresses -----------------------------------------------------------------------------------------------------------------------3
Class "C" Addresses -----------------------------------------------------------------------------------------------------------------------3
Exponent Review-------------------------------------------------------------------------------------------------------------------------------4
Subnetting Review-----------------------------------------------------------------------------------------------------------------------------4
Subnetting Scenarios & Questions ------------------------------------------------------- 5
Scenario #1: IP Allocation in a MAN-----------------------------------------------------------------------------------------------------5
Answer:----------------------------------------------------------------------------------------------------------------------------------------6
Explanation:----------------------------------------------------------------------------------------------------------------------------------6
Scenario #2: Subnets & Hosts Availability----------------------------------------------------------------------------------------------8
Answer:----------------------------------------------------------------------------------------------------------------------------------------9
Explanation:----------------------------------------------------------------------------------------------------------------------------------9
Scenario #3: Address Allocation--------------------------------------------------------------------------------------------------------- 10
Answer:-------------------------------------------------------------------------------------------------------------------------------------- 11
Explanation:-------------------------------------------------------------------------------------------------------------------------------- 11
Scenario #4: What does a NetMask allow?-------------------------------------------------------------------------------------------- 12
Answer:-------------------------------------------------------------------------------------------------------------------------------------- 13
Explanation:-------------------------------------------------------------------------------------------------------------------------------- 13
Scenario #5: Writing a subnet mask----------------------------------------------------------------------------------------------------- 14
Answer:-------------------------------------------------------------------------------------------------------------------------------------- 15
Explanation:-------------------------------------------------------------------------------------------------------------------------------- 15
Subnetting Review Questions ------------------------------------------------------------------------------------------------------------ 16
Question 1 ---------------------------------------------------------------------------------------------------------------------------------- 16
Question 2 ---------------------------------------------------------------------------------------------------------------------------------- 16
Question 3 ---------------------------------------------------------------------------------------------------------------------------------- 16
Question 4 ---------------------------------------------------------------------------------------------------------------------------------- 16
Access List Subnet Masks --------------------------------------------------------------18
Access List Scenarios ------------------------------------------------------------------19
Scenario #1: Permitting & Denying An Entire Subnet----------------------------------------------------------------------------- 19
Answer:-------------------------------------------------------------------------------------------------------------------------------------- 19
Explanation:-------------------------------------------------------------------------------------------------------------------------------- 19
Scenario #2: Blocking a range of subnets --------------------------------------------------------------------------------------------- 19
Answer:-------------------------------------------------------------------------------------------------------------------------------------- 19
Explanation:-------------------------------------------------------------------------------------------------------------------------------- 19
Scenario #3: Filtering Specific Subnets ------------------------------------------------------------------------------------------------ 20
Configuration Parameters:-------------------------------------------------------------------------------------------------------------- 20
Explanation:-------------------------------------------------------------------------------------------------------------------------------- 20
Advanced Topic:-------------------------------------------------------------------------------------------------------------------------- 22
Additional Subnetting Resources -------------------------------------------------------------------------------------------------------- 22
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 2 of 22
Do not duplicate or redistribute in any form
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 3 of 22
Do not duplicate or redistribute in any form
INTRODUCTION TO IP ADDRESSING
IP Addressing
N = network
H = host
S = subnet
Class "A" Addresses
A class "A" address can be represented in several different ways using different numbering
systems as shown below:
Decimal N.H.H.H
Hexadecimal NN.HH.HH.HH
Binary NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
The first network "N" bit from the left must be equal to 0 for a class "A" address. This is
represented as follows in binary:
0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Some examples of a Class "A" address are written as follows:
Decimal 50.4.194.10
Hexadecimal 32.04.C2.0A
Binary 00110010.0000010.11000010.00001010
Class "B" Addresses
A Class "B" address can be represented in several different ways using different numbering
systems as shown below:
Decimal N.N.H.H
Hexadecimal NN.NN.HH.HH
Binary NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH
The first two network "N" bits from the left must be 10 for a Class "B" address. This is
represented as follows in binary:
10NNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Some examples of a Class "B" address are written as follows:
Decimal 132.25.5.1
Hexadecimal 84.19.05.01
Binary 10000100.00011001.00000101.00000001
Class "C" Addresses
A class "C" address can be represented in several different ways using different numbering
systems as shown below:
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 4 of 22
Do not duplicate or redistribute in any form
Decimal N.N.N.H
Hexadecimal NN.NN.NN.HH
Binary NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
The first three network "N" bit from the left must be equal to 110 for a class "C" address.
This is represented as follows in binary:
110NNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Some examples of a Class "C" address are written as follows:
Decimal 196.77.42.254
Hexadecimal C4.4D.2A.FE
Binary 11000100.01001101.00101010.11111110
Exponent Review
AB
= the value "A" is raised to the power as indicated by "B".
Thus A * A * A … (Repeated "B" times). Please note that by default A0
= 1.
EXPONENT EXAMPLES
20
= 1 50
= 1
21
= 2 151
= 15
22
= 2 * 2 = 4 82
= 8 * 8 = 64
23
= 2 * 2 * 2 = 8 105
= 10 * 10 * 10 * 10 * 10 = 100,000
24
= 2 * 2 * 2 * 2 = 16
Subnetting Review
When it comes to networking the use of subnetting is vital in determining the
proper allocation of ip addresses.
1) Divide the network into smaller pieces called subnetworks
2) Use address bits from the host portion of an ip address range in
order to address the subnetworks
3) Adjust the subnet mask to show many host bits are being "used" to
address the subnetwork
Binary address = NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Binary mask with 8 bit subnet = 11111111.11111111.00000000.00000000
-----------------------------------
Result = NNNNNNNN.SSSSSSSSS.HHHHHHHH.HHHHHHHH
8 bits are being "stolen" from the
host part of the address in order to
create subnet addresses
To obtain only the network and subnetwork address, perform a logical
"AND" between the address and the subnet mask as follows:
Binary address = NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 5 of 22
Do not duplicate or redistribute in any form
Binary mask with 8 bit subnet = 11111111.11111111.00000000.00000000
-----------------------------------
Result of the logical "AND" = NNNNNNNN.SSSSSSSS.00000000.00000000
Only the network and subnet portion of address
remains
SUBNETTING SCENARIOS & QUESTIONS
This section will provide you a series of subnetting scenarios and questions
Scenario #1: IP Allocation in a MAN
You are tasked by your supervisor with assigning IP addresses for your new MAN
(Metropolitan Area Network), which consists of 8 different buildings, each building will have
255 workstations. Your supervisor tells you to only use as much of the 164.10.0.0 network
as you need. Your supervisor will assign the IP addresses to the serial interfaces using a
different network. You will need to determine the following four items for each of the eight
buildings:
A) Subnet masks
B) Network addresses
C) Broadcast address for each subnet
D) Valid host ranges on each subnet
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 6 of 22
Do not duplicate or redistribute in any form
Answer:
A) 255.255.254.0
B) 164.10.2.0
164.10.4.0
164.10.6.0
164.10.8.0
164.10.10.0
164.10.12.0
164.10.14.0
164.10.16.0
C) 164.10.3.255
164.10.5.255
164.10.7.255
164.10.9.255
164.10.11.255
164.10.13.255
164.10.15.255
164.10.17.255
D) 164.10.2.1 - 164.10.3.254
164.10.4.1 - 164.10.5.254
164.10.6.1 - 164.10.7.254
164.10.8.1 - 164.10.9.254
164.10.10.1 - 164.10.11.254
164.10.12.1 - 164.10.13.254
164.10.14.1 - 164.10.15.254
164.10.16.1 - 164.10.17.254
Explanation:
A) We need to have 255 workstations on each LAN. A 255.255.255.0 netmask will allow us
only 254 valid hosts on a LAN, reserving one IP address for the network address and
one for the broadcast address. Therefore, we should "borrow" one bit from the previous
octet. 164.10.0.0 is a class "B" subnet because the first 2 bits of 164 are written in
binary as "10". The default number of subnet bits on a class "B" network is 16. With
this mask we are using a total of 23 masked subnet bits("1"s), with 9 bits
unmasked("0"s). We have 7 additional masked subnet bits (23 - 16 = 7). 2^7 - 2 =
126. We have 126 subnets available. We have a total of 9 unmasked subnet bits. 2^9
- 2 = 510. We have a total of 512 host IP addresses available for each subnet. To
double-check your math, add the default subnet bits with the additional subnet bits and
the unmasked subnet bits together to get 32 (16 + 7 + 9 = 32).
There is another way to figure this out: We know that we need 255 workstation
addresses, and 1 subnet network address and 1 subnet broadcast address. This is a total
of 257. What is the lowest power of 2 that gives us a number greater than 257? The
answer is 9. Therefore, we need 9 unmasked bits. We know we need 8 subnets. 8 + 2
(for network and broadcast) gives 10. What is the lowest power of 2 that gives us a
number greater than 10? The answer is 5 (2^5 = 16). 16 - 5 = 9. We need 9
additional masked bits. Since we had a default subnet mask of 16 bits, and we know
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 7 of 22
Do not duplicate or redistribute in any form
that the total length of a subnet mask is 32 bits, the two answers we come up with
MUST equal 16, which is the difference between 32 and the default subnet mask.
& The trick to either method is knowing what the default network mask is.
B) What happened to 164.10.0.0? While this may work on some routers, this is not a
"standard" configuration. We are able to do this on a Cisco router with the addition of
the "ip subnet-zero" command, but it is still not a standard usage. Therefore, the first
standard subnet is 164.10.2.0. Since each subnet contains a total of 514 addresses
(2^9 = 512), the subnet must increment in sets of 512. If the first subnet is
164.10.2.0, the next must be 168.10.4.0. Let's work it out the long way: 164.10.2.0 +
255 = 164.10.2.255. Also, 164.10.2.255 + 1 = 164.10.3.0. Next, 164.10.3.0 + 255 =
164.10.3.255, and 164.10.3.255 + 1 = 164.10.4.0. Finally, 255+1+255+1 = 512.
Therefore, 164.10.2.0 + 512 = 164.10.4.0.
C) Broadcast addresses are so simple to figure out it will amaze you. Simply take the
address of the next subnet and subtract 1. This equates to all "1"s in the area of the
subnet mask that contain the unmasked bits:
164.10.3.255 = 10100100.00001010.00000011.11111111
255.255.254.0= 11111111.11111111.11111110.00000000
In the 3rd octet of the subnet mask, notice where the masked bits change to unmasked
bits. If all of the bits of the IP address that are over unmasked bits are ""1"s, this is a
broadcast address. A network address would have all "0"s over the unmasked bits.
D) To find the valid IP hosts, simply use the network address and add 1. This is the first
valid host address. Take the broadcast address and subtract 1. This is the last valid
host address.
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 8 of 22
Do not duplicate or redistribute in any form
Scenario #2: Subnets & Hosts Availability
You have subnetted the 172.30.10.0 network with a mask of 255.255.255.192. How many
usable subnets will you have and how many hosts are available on each subnet? (pick two)
A) 64 hosts
B) 62 hosts
C) 192 hosts
D) 2 subnets
E) 3 subnets
F) 4 subnets
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 9 of 22
Do not duplicate or redistribute in any form
Answer:
B and D – 62 Hosts & 2 Subnets
Explanation:
Why do we have 62 hosts per subnet? A subnet mask of 192 has two additional bits
masked and six bits unmasked.
The formula for calculating available hosts is (2^number of unmasked bits) - 2 thus for
answer B we would calculate the following:
Thus for answer B: (2^6) – 2 = (64) – 2 = 62
The formula for calculating the number of available subnets is (2^number of additionally
masked bits) - 2
Thus for answer D: (2^2)-2 = (4) – 2 = 2
But, what happened to the two hosts we subtracted from each subnet? The first available
address is reserved for the network and the last is reserved for broadcast. In the same
way, the first subnet (172.30.10.0 – 172.30.10.63) is reserved for the network, and the last
subnet (172.30.10.192 – 172.30.10.255) is reserved for the broadcast. While it is possible
to use the 172.30.10.0 – 172.30.10.63 subnet on some routers, the RFCs covering
subnetting do not recommend doing this.
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 10 of 22
Do not duplicate or redistribute in any form
Scenario #3: Address Allocation
You are asked to figure out how many host addresses you need for your network. Which
item(s) do you need to take into account?
A) The subnet broadcast address
B) The subnet network address
C) Each computer in the building
D) Each WAN connection
E) Each network interface connection
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 11 of 22
Do not duplicate or redistribute in any form
Answer:
A, B, and E.
Explanation:
You will need both a network and broadcast address as well as one address for each
network interface connection. Remember that the total number of connections includes the
Ethernet interface on each router and switch connected to this Local Area Network. In order
for the router to forward packets from the Ethernet interface to a remote location, the
Ethernet interface MUST have a valid IP address on the Local Area Network. We will need
to count all of the devices connected to the network and add one host for the network
address and another host for the broadcast address for the network.
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 12 of 22
Do not duplicate or redistribute in any form
Scenario #4: What does a NetMask allow?
You are told that your client has a subnet mask of 255.255.255.248. How many hosts and
subnets does this client have available?
A) 16 subnets and 14 hosts
B) 30 subnets and 16 hosts
C) 8190 subnets and 8 hosts
D) 8190 subnets and 6 hosts
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 13 of 22
Do not duplicate or redistribute in any form
Answer:
D is the correct answer. How do we know the correct answer is letter D?
Explanation:
Remember our powers of two: 2, 4, 8, 16, 32, 64, 128, 256, 1024, 2048, 4096, and 8192.
Let’s look at the hosts first. Our choices are 14, 16, 8, and 6. The first step in explaining
this is to determine which of these numbers is two less than a power of two? Answers A and
D fulfill this requirement. Our subnets from answers A and D are 16 and 8190. Again, we
ask which of these numbers is two less than a power of two? Answer D fulfills this
requirement. Notice that we didn’t even need to know the IP address of the network, we
simply worked off of the formulas previously given.
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 14 of 22
Do not duplicate or redistribute in any form
Scenario #5: Writing a subnet mask
On a Class B network with a 10 bit subnet mask, how would you write the subnet mask?
A) 255.255.255.192
B) 255.192.0.0
C) 255.255.192.0
D) 255.255.255.255
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 15 of 22
Do not duplicate or redistribute in any form
Answer:
A is the correct answer for this scenario.
Explanation:
When you are told what class the network is, assume that the question means ADDITIONAL
subnet bits beyond what is the default based upon the class of the network unless you are
told that this is the total number of subnet bits. A Class A network has a default subnet
mask of 255.0.0.0, or 8 bits. A class B network’s default subnet mask is 255.255.0.0, or 16
bits. A Class C network has a default subnet mask of 255.255.255.0, or 24 bits. The
question stated that you had a Class B network. Therefore, you have a default subnet mask
of 255.255.0.0, or 16 bits. Adding ten bits will give you 255.255.255.192, or 26 bits.
Subnets masks are also represented by a decimal number indicating how many bits are
used in the mask. Example, the notation 131.108.1.0/24 is equivalent to a mask of
255.255.255.0. Cisco routers can be modified to display the subnets mask in three ways:
R1#term ip netmask-format ?
bit-count Display netmask as number of significant bits example
131.108.1.1/24 (default)
decimal Display netmask in dotted decimal example 131.108.1.1
255.255.255.0
hexadecimal Display netmask in hexadecimal example 131.108.1.1
0xFFFFFF00
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 16 of 22
Do not duplicate or redistribute in any form
Subnetting Review Questions
Lets take a minute to do some questions as a review to what you have learned so far.
Question 1
How many hosts/networks are available in using a netmask of 255.255.254.0?
A. 255
B. 254
C. 510
D. 2048
E. 512
Answer: C
The numbers of bits available for hosts are 9. Hence 29
-2 = 510 host addresses. Two
addresses are reserved for broadcasts.
Question 2
What mask will allow at most 14 hosts?
A. /30
B. /24
C. /20
D. /28
E. /29
Answer: D
The slash donation simply states how many bits are used in the subnet mask. For example
/28 means 255.255.255.240 (28 consecutive 1’s followed by 4 bits for host address). This
mask allows at most 14 hosts as 24
-2=14 hosts.
Question 3
Having been assigned a Class C network block, what would be the extended network prefix
to allow 22 host on each subnet?
A. /28
B. /24
C. /27
D. /32
Answer: C
To accommodate 22 hosts per subnet, a minimum of 5 bits are required and hence the
extended network prefix of /27 i.e. 255.255.255.224. The maximum number of hosts on a
subnet would be 25
-2 = 30 hosts and hence meeting our requirements.
Question 4
Having been assigned 172.16.0.0/16 network block. You are asked to establish 12 subnets.
What would be the mask that allows the creation of 12 subnets?
A. /16
B. /18
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 17 of 22
Do not duplicate or redistribute in any form
C. /24
D. /20
Answer: D
The number of subnets can be in blocks of powers of two i.e. 2 (21
), 4 (22
), etc. Hence to
have 12 subnets, we define a block of 16 (24
). Four bits are required and hence the mask of
/20.
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 18 of 22
Do not duplicate or redistribute in any form
ACCESS LIST SUBNET MASKS
Access Control Lists are meant to provide filtering capabilities. As the packets pass through
the router they are analyzed and filtered by help of Access Control Lists (ACLs). ACLs can be
configured for all routed protocols (IP, AppleTalk, DecNet, etc.). By help of this filtering
mechanism of ACLs, traffic to and from a particular network can be prevented or allowed.
The router examines each and every packet and based upon the ACLs, the packet is either
forwarded or blocked.
Although ACLs are used for many reasons the prime reason is to provide basic level security
to the network. ACLs are generally used on gateway routers to act as a "wall" between the
Internal and the External network. One can use access lists on a router connecting two
parts of the same network. For e.g: The management would not like anybody and
everybody in the company to access the finance network.
Below are the types of access lists:
⇒ Standard Access Lists
⇒ Static Extended Access Lists
⇒ Lock and Key Security (Dynamic Access Lists)
⇒ Reflexive Access Lists (This allows IP packets to be filtered based on upper-layer
session information)
Access Lists should be defined for every protocol that one wants to filter. Every Access List
is assigned a unique number or name and the packet filtering criteria is defined. The single
access list can have multiple filtering criteria. For e.g: Access to only mail server is allowed
from the outside network and that too for port 25 of the server.
By default there is an implicit deny ALL at end of every Access List. Hence, any packet that
does not matches the criteria specified, the packet will be dropped. One has to be careful
while defining the criteria of ACLs. The packet is matched against each criteria statement in
the order the statements were created and is processed. Because of this it is quite possible
a particular kind of traffic that should have been allowed to pass through the router is
blocked.
The access lists can be defined either on the inbound or the outbound interface of the
router. The access lists criteria must be logged and a continuos check on the logs must be
kept.
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 19 of 22
Do not duplicate or redistribute in any form
ACCESS LIST SCENARIOS
The following information is provided to assist you in understanding Access Lists and their
design as well as implementation.
Scenario #1: Permitting & Denying An Entire Subnet
Your supervisor has given you two subnets i.e. 10.10.10.0 with subnet mask 255.255.255.0
and 172.21.10.0 with subnet mask 255.255.255.248. You have been asked to permit traffic
from the 10.10.10.0 network and to deny access to your internal network from the
172.21.10.0 network. No other traffic needs to be permitted. Define the access list to do the
above said.
Answer:
Access-list 100 permit 10.10.10.0 0.0.0.255
Explanation:
Access List masks are inverse of the normal mask. The way we calculate the wildcard mask
is as follows:
255.255.255.255
- 255.255.255.0
0.0.0.255
If you are still wondering that we have not denied access to the 172.21.10.0 then
remember that there is a implicit deny at the end of every access list and hence the
172.21.10.0 network will not be able to access our network. We have used an extended
access list. The better option would be to specify that everything is being denied access by
using the command "access-list 100 deny any any log". This will deny any traffic and log the
denials to the system logging server.
Scenario #2: Blocking a range of subnets
You have been asked by your supervisor to permit the 172.20.16.0 - 172.20.31.255 range
which has a subnet mask of 255.255.240.0. Define an access list to do the above said.
Answer:
Access-list 101 permit 172.20.16.0 0.0.15.255
Explanation:
To find the wildcard mask, take the higher minus the lower i.e.
172.20.31.255
- 172.20.16.0
0.0.15.255
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 20 of 22
Do not duplicate or redistribute in any form
To further explain how it works.
0 = Check (C)
1 = Don't Care (D)
0.0.15.255
CCCCCCCC.CCCCCCCC.CCCCDDDD.DDDDDDDD
This means that the first 20 bits will be checked and the last 12 will be ignored. You'll notice
that any network from 172.20.16.0 - 172.20.31.0 will match Network 0 for the first 20 bits,
after the first 20 bits, we don't care if they match or not.
11111111.11111111.1111|0000.00000000 255.255.240.0
10101100.00010100.0001|0000.00000000 172.20.16.0
10101100.00010100.0001|0001.00000000 172.20.17.0
10101100.00010100.0001|0010.00000000 172.20.18.0
...
10101100.00010100.00011111.00000000 172.20.31.0
10101100.00010100.00100000.00000000 172.20.32.0
Notice how this network does not match 172.20.16.0 for the first 20 bits? Therefore this
network doesn't match and does not satisfy the access list.
Scenario #3: Filtering Specific Subnets
Configure the appropriate Access Control List (ACL) to permit or deny the following
networks on the inbound interface of a Cisco 2520's first low speed interface.
Deny network 204.199.104.X
Deny network 164.199.104.X
Permit network 204.199.108.X
Permit network 164.199.108.X
Configuration Parameters:
⇒ Permit all other networks that are in the range 140.140.X.Y where X is the even
numbered subnets only.
⇒ Permit all other IP subnets.
⇒ You must also minimize the configuration as much as possible!
Explanation:
You are asked to configure simple access-lists. This appears to be easy until we get the last
requirement:
"Minimize the configurations as much as possible."
How do we minimize networks with Access lists? We first need to look at the networks and
look at them in binary format to see any differences or similarities. Let’s first look at the
first two networks:
204.199.104.X
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 21 of 22
Do not duplicate or redistribute in any form
164.199.104.X
At first glance the only similarities appears to be the second and third octet until we look at
the first 8 bits in binary.
& In the CCIE lab you have access to the windows calculator
Thus the first octet appears as follows when viewed in binary:
204 = 11001100
164 = 10001100
Looking at these we see that only the second bit position is different hence we can apply our
wildcard mask to make sure the other 7 bits match and we do not care about the second bit
as it could be 0 or 1.
We will calculate the mask as follows:
11001100
10001100
----------------
01000000 ---> 64
The do care (match) bits are set to 0 and the don’t care (ignore) bits are set to 1. Hence the
mask in decimal is 64. We can now apply the required configuration in one line to block the
networks 204.199.104.X and 164.199.104.X as follows:
Access-list 1 deny ip 140.199.104.0 64.0.0.0
You must now apply the same technique to the second pair of networks, 204.199.108.X and
160.199.108.X differ by one bit in the first byte hence the mask is once again 64.0.0.0.
To permit all networks that are 140.140.X.Y where X is even requires a little more
mathematical knowledge than you would normally use in the real world. But remember that
even numbers are always divisible by 2 or in binary this means that the last bit is always set
to zero. This sample table will demonstrate what we mean.
Decimal Binary
1 00000001 Odd
2 00000010 Even
3 00000011 Odd
4 00000100 Even, etc...
So what wildcard mask will deny all networks unless they are even? Well any mask that
must match the last bit as being 0. That is we don’t care what the first seven bits are but
the last bit must be set to zero which is the case with all even numbers. Hence the mask is
11111110 or 254.
So to complete the third part of the question our configuration is:
Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 22 of 22
Do not duplicate or redistribute in any form
Access 1 permit ip 140.140.2.0 0.0.254.255
To permit all other IP traffic we need to add the line:
Access 1 permit ip any
By default all other networks are denied. Lastly we need to apply the access-list to the
inbound interface on a Cisco 2520 first low speed interface as instructed. A Cisco 2520 has
four serial ports of which the first two are high speed and the last two are low speed so we
need to apply it to interface Serial2.
R1(config)#int s 2
R1(config-if)#ip access-group 1 in
R1(config-if)#exit
Advanced Topic:
Verify networks statements match and denies as instructed. Could you of used an extended
IP access list. How would you deny all odd networks? How could you view logs against this
access list?
Additional Subnetting Resources
IP Subnet Calculation & Design Online Documentation
http://www.cisco.com/techtools/ip_addr_help.html
This is a great tutorial to get you started called “Understanding IP
Addressing”.
http://www.3com.com/nsc/501302s.html
& As always NetCerts welcomes your feedback regarding this white
paper and encourage our fellow virtual community members to
contribute to our site so all can benefit. If you are
interested please contact us at: webmaster@netcerts.com

Mais conteúdo relacionado

Mais procurados

AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attackRaj Sikarwar
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Tuan Yang
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service modelsPrateek Soni
 
Resource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingResource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingMasoumeh_tajvidi
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11Tech_MX
 
Load balancing in cloud
Load balancing in cloudLoad balancing in cloud
Load balancing in cloudSouvik Maji
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualizationDr.Neeraj Kumar Pandey
 
Lecture 4 principles of parallel algorithm design updated
Lecture 4   principles of parallel algorithm design updatedLecture 4   principles of parallel algorithm design updated
Lecture 4 principles of parallel algorithm design updatedVajira Thambawita
 
Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Bhavik Vashi
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Majid Hajibaba
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocolsBE Smârt
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networksrajatmal4
 
WEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALA
WEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALAWEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALA
WEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALASaikiran Panjala
 
Load Balancing in Cloud
Load Balancing in CloudLoad Balancing in Cloud
Load Balancing in CloudMphasis
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactionsNilu Desai
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computingAhmed Nour
 
Physical organization of parallel platforms
Physical organization of parallel platformsPhysical organization of parallel platforms
Physical organization of parallel platformsSyed Zaid Irshad
 
What is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesWhat is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesDigitalThinkerHelp
 

Mais procurados (20)

Network operating system
Network operating systemNetwork operating system
Network operating system
 
AODV protocol and Black Hole attack
AODV protocol and Black Hole attackAODV protocol and Black Hole attack
AODV protocol and Black Hole attack
 
Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)Understanding the Windows Server Administration Fundamentals (Part-1)
Understanding the Windows Server Administration Fundamentals (Part-1)
 
Cloud computing and service models
Cloud computing and service modelsCloud computing and service models
Cloud computing and service models
 
Resource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computingResource provisioning optimization in cloud computing
Resource provisioning optimization in cloud computing
 
Client computing evolution ppt11
Client computing evolution ppt11Client computing evolution ppt11
Client computing evolution ppt11
 
Load balancing in cloud
Load balancing in cloudLoad balancing in cloud
Load balancing in cloud
 
cloud computing:Types of virtualization
cloud computing:Types of virtualizationcloud computing:Types of virtualization
cloud computing:Types of virtualization
 
Lecture 4 principles of parallel algorithm design updated
Lecture 4   principles of parallel algorithm design updatedLecture 4   principles of parallel algorithm design updated
Lecture 4 principles of parallel algorithm design updated
 
Parallel processing (simd and mimd)
Parallel processing (simd and mimd)Parallel processing (simd and mimd)
Parallel processing (simd and mimd)
 
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
Cloud Computing Principles and Paradigms: 4 the enterprise cloud computing pa...
 
transport layer protocols
transport layer protocolstransport layer protocols
transport layer protocols
 
Cloud Deployments Models
Cloud Deployments ModelsCloud Deployments Models
Cloud Deployments Models
 
Wireless Sensor Networks
Wireless Sensor NetworksWireless Sensor Networks
Wireless Sensor Networks
 
WEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALA
WEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALAWEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALA
WEB SERVICES ON MOBILE PLATFORM BY SAIKIRAN PANJALA
 
Load Balancing in Cloud
Load Balancing in CloudLoad Balancing in Cloud
Load Balancing in Cloud
 
management of distributed transactions
management of distributed transactionsmanagement of distributed transactions
management of distributed transactions
 
Privacy in cloud computing
Privacy in cloud computingPrivacy in cloud computing
Privacy in cloud computing
 
Physical organization of parallel platforms
Physical organization of parallel platformsPhysical organization of parallel platforms
Physical organization of parallel platforms
 
What is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with ExamplesWhat is Router: Functions, Uses | Types of Routers with Examples
What is Router: Functions, Uses | Types of Routers with Examples
 

Destaque

CCNA wireless 640 722 Survival Note
CCNA wireless 640 722 Survival NoteCCNA wireless 640 722 Survival Note
CCNA wireless 640 722 Survival NoteIlham
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primaveraDsunte Wilson
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And AnswersCCNAResources
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer) Arz Sy
 

Destaque (6)

CCNA wireless 640 722 Survival Note
CCNA wireless 640 722 Survival NoteCCNA wireless 640 722 Survival Note
CCNA wireless 640 722 Survival Note
 
Introduction to oracle primavera
Introduction to oracle primaveraIntroduction to oracle primavera
Introduction to oracle primavera
 
Router commands
Router commandsRouter commands
Router commands
 
1000 Ccna Questions And Answers
1000 Ccna Questions And Answers1000 Ccna Questions And Answers
1000 Ccna Questions And Answers
 
Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2Alphorm.com Formation Cisco ICND2
Alphorm.com Formation Cisco ICND2
 
Lab practice 1 configuring basic routing and switching (with answer)
Lab practice 1   configuring basic routing and switching (with answer) Lab practice 1   configuring basic routing and switching (with answer)
Lab practice 1 configuring basic routing and switching (with answer)
 

Semelhante a Subnetting scenarios

A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjaysanjay kushwaha
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAnhMai173354
 
Uccn1003 -may2010_-_mid_term_01_-_part2of2
Uccn1003  -may2010_-_mid_term_01_-_part2of2Uccn1003  -may2010_-_mid_term_01_-_part2of2
Uccn1003 -may2010_-_mid_term_01_-_part2of2Shu Shin
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and SubnettingAtakan ATAK
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccnarobertoxe
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTESofian .
 
Gsp 215 Future Our Mission/newtonhelp.com
Gsp 215 Future Our Mission/newtonhelp.comGsp 215 Future Our Mission/newtonhelp.com
Gsp 215 Future Our Mission/newtonhelp.comamaranthbeg8
 
GSP 215 Become Exceptional/newtonhelp.com
GSP 215 Become Exceptional/newtonhelp.comGSP 215 Become Exceptional/newtonhelp.com
GSP 215 Become Exceptional/newtonhelp.combellflower148
 
GSP 215 Perfect Education/newtonhelp.com
GSP 215 Perfect Education/newtonhelp.comGSP 215 Perfect Education/newtonhelp.com
GSP 215 Perfect Education/newtonhelp.combellflower169
 
GSP 215 Doing by learn/newtonhelp.com
GSP 215 Doing by learn/newtonhelp.comGSP 215 Doing by learn/newtonhelp.com
GSP 215 Doing by learn/newtonhelp.combellflower126
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork LayerZahouAmel1
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...ZahouAmel1
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from JuniperNam Nguyen
 

Semelhante a Subnetting scenarios (20)

Lecture 03 networking
Lecture 03 networkingLecture 03 networking
Lecture 03 networking
 
Subnitting
SubnittingSubnitting
Subnitting
 
A seminar on subnetting by sanjay
A seminar on subnetting by sanjayA seminar on subnetting by sanjay
A seminar on subnetting by sanjay
 
Assignment subnetting part1 - solutions
Assignment subnetting part1 - solutionsAssignment subnetting part1 - solutions
Assignment subnetting part1 - solutions
 
Mod6
Mod6Mod6
Mod6
 
Uccn1003 -may2010_-_mid_term_01_-_part2of2
Uccn1003  -may2010_-_mid_term_01_-_part2of2Uccn1003  -may2010_-_mid_term_01_-_part2of2
Uccn1003 -may2010_-_mid_term_01_-_part2of2
 
IP Addressing and Subnetting
IP Addressing and SubnettingIP Addressing and Subnetting
IP Addressing and Subnetting
 
subnet.ppt
subnet.pptsubnet.ppt
subnet.ppt
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
Chapter3ccna
Chapter3ccnaChapter3ccna
Chapter3ccna
 
IP Concept in LTE
IP Concept in LTEIP Concept in LTE
IP Concept in LTE
 
Gsp 215 Future Our Mission/newtonhelp.com
Gsp 215 Future Our Mission/newtonhelp.comGsp 215 Future Our Mission/newtonhelp.com
Gsp 215 Future Our Mission/newtonhelp.com
 
GSP 215 Become Exceptional/newtonhelp.com
GSP 215 Become Exceptional/newtonhelp.comGSP 215 Become Exceptional/newtonhelp.com
GSP 215 Become Exceptional/newtonhelp.com
 
GSP 215 Perfect Education/newtonhelp.com
GSP 215 Perfect Education/newtonhelp.comGSP 215 Perfect Education/newtonhelp.com
GSP 215 Perfect Education/newtonhelp.com
 
GSP 215 Doing by learn/newtonhelp.com
GSP 215 Doing by learn/newtonhelp.comGSP 215 Doing by learn/newtonhelp.com
GSP 215 Doing by learn/newtonhelp.com
 
Subnet calculation Tutorial
Subnet calculation TutorialSubnet calculation Tutorial
Subnet calculation Tutorial
 
7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer7-Lect_7 .pptxNetwork LayerNetwork Layer
7-Lect_7 .pptxNetwork LayerNetwork Layer
 
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
7-Lect_7 .pptxNetwork Layer. Addressing Subnetting Mask (default and subnet) ...
 
Subnetting
SubnettingSubnetting
Subnetting
 
Junos routing overview from Juniper
Junos routing overview from JuniperJunos routing overview from Juniper
Junos routing overview from Juniper
 

Último

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room servicediscovermytutordmt
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 

Último (20)

Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
9548086042 for call girls in Indira Nagar with room service
9548086042  for call girls in Indira Nagar  with room service9548086042  for call girls in Indira Nagar  with room service
9548086042 for call girls in Indira Nagar with room service
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 

Subnetting scenarios

  • 1. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 1 of 22 Do not duplicate or redistribute in any form SUBNETTING SCENARIO’S This white paper provides several in-depth scenario’s dealing with a very confusing topic, subnetting. Many networking engineers need extra practice to completely understand the intricacies involved. These scenarios address this need by providing you with multiple situations that will require a reasoned approach to solving them. Detailed explanations are provided with the actual formulas and how they were achieved. Table of Contents Subnetting Scenario’s------------------------------------------------------------------- 1 Introduction to IP Addressing ----------------------------------------------------------- 3 IP Addressing -----------------------------------------------------------------------------------------------------------------------------------3 Class "A" Addresses -----------------------------------------------------------------------------------------------------------------------3 Class "B" Addresses -----------------------------------------------------------------------------------------------------------------------3 Class "C" Addresses -----------------------------------------------------------------------------------------------------------------------3 Exponent Review-------------------------------------------------------------------------------------------------------------------------------4 Subnetting Review-----------------------------------------------------------------------------------------------------------------------------4 Subnetting Scenarios & Questions ------------------------------------------------------- 5 Scenario #1: IP Allocation in a MAN-----------------------------------------------------------------------------------------------------5 Answer:----------------------------------------------------------------------------------------------------------------------------------------6 Explanation:----------------------------------------------------------------------------------------------------------------------------------6 Scenario #2: Subnets & Hosts Availability----------------------------------------------------------------------------------------------8 Answer:----------------------------------------------------------------------------------------------------------------------------------------9 Explanation:----------------------------------------------------------------------------------------------------------------------------------9 Scenario #3: Address Allocation--------------------------------------------------------------------------------------------------------- 10 Answer:-------------------------------------------------------------------------------------------------------------------------------------- 11 Explanation:-------------------------------------------------------------------------------------------------------------------------------- 11 Scenario #4: What does a NetMask allow?-------------------------------------------------------------------------------------------- 12 Answer:-------------------------------------------------------------------------------------------------------------------------------------- 13 Explanation:-------------------------------------------------------------------------------------------------------------------------------- 13 Scenario #5: Writing a subnet mask----------------------------------------------------------------------------------------------------- 14 Answer:-------------------------------------------------------------------------------------------------------------------------------------- 15 Explanation:-------------------------------------------------------------------------------------------------------------------------------- 15 Subnetting Review Questions ------------------------------------------------------------------------------------------------------------ 16 Question 1 ---------------------------------------------------------------------------------------------------------------------------------- 16 Question 2 ---------------------------------------------------------------------------------------------------------------------------------- 16 Question 3 ---------------------------------------------------------------------------------------------------------------------------------- 16 Question 4 ---------------------------------------------------------------------------------------------------------------------------------- 16 Access List Subnet Masks --------------------------------------------------------------18 Access List Scenarios ------------------------------------------------------------------19 Scenario #1: Permitting & Denying An Entire Subnet----------------------------------------------------------------------------- 19 Answer:-------------------------------------------------------------------------------------------------------------------------------------- 19 Explanation:-------------------------------------------------------------------------------------------------------------------------------- 19 Scenario #2: Blocking a range of subnets --------------------------------------------------------------------------------------------- 19 Answer:-------------------------------------------------------------------------------------------------------------------------------------- 19 Explanation:-------------------------------------------------------------------------------------------------------------------------------- 19 Scenario #3: Filtering Specific Subnets ------------------------------------------------------------------------------------------------ 20 Configuration Parameters:-------------------------------------------------------------------------------------------------------------- 20 Explanation:-------------------------------------------------------------------------------------------------------------------------------- 20 Advanced Topic:-------------------------------------------------------------------------------------------------------------------------- 22 Additional Subnetting Resources -------------------------------------------------------------------------------------------------------- 22
  • 2. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 2 of 22 Do not duplicate or redistribute in any form
  • 3. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 3 of 22 Do not duplicate or redistribute in any form INTRODUCTION TO IP ADDRESSING IP Addressing N = network H = host S = subnet Class "A" Addresses A class "A" address can be represented in several different ways using different numbering systems as shown below: Decimal N.H.H.H Hexadecimal NN.HH.HH.HH Binary NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH The first network "N" bit from the left must be equal to 0 for a class "A" address. This is represented as follows in binary: 0NNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH Some examples of a Class "A" address are written as follows: Decimal 50.4.194.10 Hexadecimal 32.04.C2.0A Binary 00110010.0000010.11000010.00001010 Class "B" Addresses A Class "B" address can be represented in several different ways using different numbering systems as shown below: Decimal N.N.H.H Hexadecimal NN.NN.HH.HH Binary NNNNNNNN.NNNNNNNN.HHHHHHHH.HHHHHHHH The first two network "N" bits from the left must be 10 for a Class "B" address. This is represented as follows in binary: 10NNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH Some examples of a Class "B" address are written as follows: Decimal 132.25.5.1 Hexadecimal 84.19.05.01 Binary 10000100.00011001.00000101.00000001 Class "C" Addresses A class "C" address can be represented in several different ways using different numbering systems as shown below:
  • 4. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 4 of 22 Do not duplicate or redistribute in any form Decimal N.N.N.H Hexadecimal NN.NN.NN.HH Binary NNNNNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH The first three network "N" bit from the left must be equal to 110 for a class "C" address. This is represented as follows in binary: 110NNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH Some examples of a Class "C" address are written as follows: Decimal 196.77.42.254 Hexadecimal C4.4D.2A.FE Binary 11000100.01001101.00101010.11111110 Exponent Review AB = the value "A" is raised to the power as indicated by "B". Thus A * A * A … (Repeated "B" times). Please note that by default A0 = 1. EXPONENT EXAMPLES 20 = 1 50 = 1 21 = 2 151 = 15 22 = 2 * 2 = 4 82 = 8 * 8 = 64 23 = 2 * 2 * 2 = 8 105 = 10 * 10 * 10 * 10 * 10 = 100,000 24 = 2 * 2 * 2 * 2 = 16 Subnetting Review When it comes to networking the use of subnetting is vital in determining the proper allocation of ip addresses. 1) Divide the network into smaller pieces called subnetworks 2) Use address bits from the host portion of an ip address range in order to address the subnetworks 3) Adjust the subnet mask to show many host bits are being "used" to address the subnetwork Binary address = NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH Binary mask with 8 bit subnet = 11111111.11111111.00000000.00000000 ----------------------------------- Result = NNNNNNNN.SSSSSSSSS.HHHHHHHH.HHHHHHHH 8 bits are being "stolen" from the host part of the address in order to create subnet addresses To obtain only the network and subnetwork address, perform a logical "AND" between the address and the subnet mask as follows: Binary address = NNNNNNNN.HHHHHHHH.HHHHHHHH.HHHHHHHH
  • 5. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 5 of 22 Do not duplicate or redistribute in any form Binary mask with 8 bit subnet = 11111111.11111111.00000000.00000000 ----------------------------------- Result of the logical "AND" = NNNNNNNN.SSSSSSSS.00000000.00000000 Only the network and subnet portion of address remains SUBNETTING SCENARIOS & QUESTIONS This section will provide you a series of subnetting scenarios and questions Scenario #1: IP Allocation in a MAN You are tasked by your supervisor with assigning IP addresses for your new MAN (Metropolitan Area Network), which consists of 8 different buildings, each building will have 255 workstations. Your supervisor tells you to only use as much of the 164.10.0.0 network as you need. Your supervisor will assign the IP addresses to the serial interfaces using a different network. You will need to determine the following four items for each of the eight buildings: A) Subnet masks B) Network addresses C) Broadcast address for each subnet D) Valid host ranges on each subnet
  • 6. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 6 of 22 Do not duplicate or redistribute in any form Answer: A) 255.255.254.0 B) 164.10.2.0 164.10.4.0 164.10.6.0 164.10.8.0 164.10.10.0 164.10.12.0 164.10.14.0 164.10.16.0 C) 164.10.3.255 164.10.5.255 164.10.7.255 164.10.9.255 164.10.11.255 164.10.13.255 164.10.15.255 164.10.17.255 D) 164.10.2.1 - 164.10.3.254 164.10.4.1 - 164.10.5.254 164.10.6.1 - 164.10.7.254 164.10.8.1 - 164.10.9.254 164.10.10.1 - 164.10.11.254 164.10.12.1 - 164.10.13.254 164.10.14.1 - 164.10.15.254 164.10.16.1 - 164.10.17.254 Explanation: A) We need to have 255 workstations on each LAN. A 255.255.255.0 netmask will allow us only 254 valid hosts on a LAN, reserving one IP address for the network address and one for the broadcast address. Therefore, we should "borrow" one bit from the previous octet. 164.10.0.0 is a class "B" subnet because the first 2 bits of 164 are written in binary as "10". The default number of subnet bits on a class "B" network is 16. With this mask we are using a total of 23 masked subnet bits("1"s), with 9 bits unmasked("0"s). We have 7 additional masked subnet bits (23 - 16 = 7). 2^7 - 2 = 126. We have 126 subnets available. We have a total of 9 unmasked subnet bits. 2^9 - 2 = 510. We have a total of 512 host IP addresses available for each subnet. To double-check your math, add the default subnet bits with the additional subnet bits and the unmasked subnet bits together to get 32 (16 + 7 + 9 = 32). There is another way to figure this out: We know that we need 255 workstation addresses, and 1 subnet network address and 1 subnet broadcast address. This is a total of 257. What is the lowest power of 2 that gives us a number greater than 257? The answer is 9. Therefore, we need 9 unmasked bits. We know we need 8 subnets. 8 + 2 (for network and broadcast) gives 10. What is the lowest power of 2 that gives us a number greater than 10? The answer is 5 (2^5 = 16). 16 - 5 = 9. We need 9 additional masked bits. Since we had a default subnet mask of 16 bits, and we know
  • 7. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 7 of 22 Do not duplicate or redistribute in any form that the total length of a subnet mask is 32 bits, the two answers we come up with MUST equal 16, which is the difference between 32 and the default subnet mask. & The trick to either method is knowing what the default network mask is. B) What happened to 164.10.0.0? While this may work on some routers, this is not a "standard" configuration. We are able to do this on a Cisco router with the addition of the "ip subnet-zero" command, but it is still not a standard usage. Therefore, the first standard subnet is 164.10.2.0. Since each subnet contains a total of 514 addresses (2^9 = 512), the subnet must increment in sets of 512. If the first subnet is 164.10.2.0, the next must be 168.10.4.0. Let's work it out the long way: 164.10.2.0 + 255 = 164.10.2.255. Also, 164.10.2.255 + 1 = 164.10.3.0. Next, 164.10.3.0 + 255 = 164.10.3.255, and 164.10.3.255 + 1 = 164.10.4.0. Finally, 255+1+255+1 = 512. Therefore, 164.10.2.0 + 512 = 164.10.4.0. C) Broadcast addresses are so simple to figure out it will amaze you. Simply take the address of the next subnet and subtract 1. This equates to all "1"s in the area of the subnet mask that contain the unmasked bits: 164.10.3.255 = 10100100.00001010.00000011.11111111 255.255.254.0= 11111111.11111111.11111110.00000000 In the 3rd octet of the subnet mask, notice where the masked bits change to unmasked bits. If all of the bits of the IP address that are over unmasked bits are ""1"s, this is a broadcast address. A network address would have all "0"s over the unmasked bits. D) To find the valid IP hosts, simply use the network address and add 1. This is the first valid host address. Take the broadcast address and subtract 1. This is the last valid host address.
  • 8. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 8 of 22 Do not duplicate or redistribute in any form Scenario #2: Subnets & Hosts Availability You have subnetted the 172.30.10.0 network with a mask of 255.255.255.192. How many usable subnets will you have and how many hosts are available on each subnet? (pick two) A) 64 hosts B) 62 hosts C) 192 hosts D) 2 subnets E) 3 subnets F) 4 subnets
  • 9. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 9 of 22 Do not duplicate or redistribute in any form Answer: B and D – 62 Hosts & 2 Subnets Explanation: Why do we have 62 hosts per subnet? A subnet mask of 192 has two additional bits masked and six bits unmasked. The formula for calculating available hosts is (2^number of unmasked bits) - 2 thus for answer B we would calculate the following: Thus for answer B: (2^6) – 2 = (64) – 2 = 62 The formula for calculating the number of available subnets is (2^number of additionally masked bits) - 2 Thus for answer D: (2^2)-2 = (4) – 2 = 2 But, what happened to the two hosts we subtracted from each subnet? The first available address is reserved for the network and the last is reserved for broadcast. In the same way, the first subnet (172.30.10.0 – 172.30.10.63) is reserved for the network, and the last subnet (172.30.10.192 – 172.30.10.255) is reserved for the broadcast. While it is possible to use the 172.30.10.0 – 172.30.10.63 subnet on some routers, the RFCs covering subnetting do not recommend doing this.
  • 10. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 10 of 22 Do not duplicate or redistribute in any form Scenario #3: Address Allocation You are asked to figure out how many host addresses you need for your network. Which item(s) do you need to take into account? A) The subnet broadcast address B) The subnet network address C) Each computer in the building D) Each WAN connection E) Each network interface connection
  • 11. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 11 of 22 Do not duplicate or redistribute in any form Answer: A, B, and E. Explanation: You will need both a network and broadcast address as well as one address for each network interface connection. Remember that the total number of connections includes the Ethernet interface on each router and switch connected to this Local Area Network. In order for the router to forward packets from the Ethernet interface to a remote location, the Ethernet interface MUST have a valid IP address on the Local Area Network. We will need to count all of the devices connected to the network and add one host for the network address and another host for the broadcast address for the network.
  • 12. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 12 of 22 Do not duplicate or redistribute in any form Scenario #4: What does a NetMask allow? You are told that your client has a subnet mask of 255.255.255.248. How many hosts and subnets does this client have available? A) 16 subnets and 14 hosts B) 30 subnets and 16 hosts C) 8190 subnets and 8 hosts D) 8190 subnets and 6 hosts
  • 13. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 13 of 22 Do not duplicate or redistribute in any form Answer: D is the correct answer. How do we know the correct answer is letter D? Explanation: Remember our powers of two: 2, 4, 8, 16, 32, 64, 128, 256, 1024, 2048, 4096, and 8192. Let’s look at the hosts first. Our choices are 14, 16, 8, and 6. The first step in explaining this is to determine which of these numbers is two less than a power of two? Answers A and D fulfill this requirement. Our subnets from answers A and D are 16 and 8190. Again, we ask which of these numbers is two less than a power of two? Answer D fulfills this requirement. Notice that we didn’t even need to know the IP address of the network, we simply worked off of the formulas previously given.
  • 14. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 14 of 22 Do not duplicate or redistribute in any form Scenario #5: Writing a subnet mask On a Class B network with a 10 bit subnet mask, how would you write the subnet mask? A) 255.255.255.192 B) 255.192.0.0 C) 255.255.192.0 D) 255.255.255.255
  • 15. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 15 of 22 Do not duplicate or redistribute in any form Answer: A is the correct answer for this scenario. Explanation: When you are told what class the network is, assume that the question means ADDITIONAL subnet bits beyond what is the default based upon the class of the network unless you are told that this is the total number of subnet bits. A Class A network has a default subnet mask of 255.0.0.0, or 8 bits. A class B network’s default subnet mask is 255.255.0.0, or 16 bits. A Class C network has a default subnet mask of 255.255.255.0, or 24 bits. The question stated that you had a Class B network. Therefore, you have a default subnet mask of 255.255.0.0, or 16 bits. Adding ten bits will give you 255.255.255.192, or 26 bits. Subnets masks are also represented by a decimal number indicating how many bits are used in the mask. Example, the notation 131.108.1.0/24 is equivalent to a mask of 255.255.255.0. Cisco routers can be modified to display the subnets mask in three ways: R1#term ip netmask-format ? bit-count Display netmask as number of significant bits example 131.108.1.1/24 (default) decimal Display netmask in dotted decimal example 131.108.1.1 255.255.255.0 hexadecimal Display netmask in hexadecimal example 131.108.1.1 0xFFFFFF00
  • 16. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 16 of 22 Do not duplicate or redistribute in any form Subnetting Review Questions Lets take a minute to do some questions as a review to what you have learned so far. Question 1 How many hosts/networks are available in using a netmask of 255.255.254.0? A. 255 B. 254 C. 510 D. 2048 E. 512 Answer: C The numbers of bits available for hosts are 9. Hence 29 -2 = 510 host addresses. Two addresses are reserved for broadcasts. Question 2 What mask will allow at most 14 hosts? A. /30 B. /24 C. /20 D. /28 E. /29 Answer: D The slash donation simply states how many bits are used in the subnet mask. For example /28 means 255.255.255.240 (28 consecutive 1’s followed by 4 bits for host address). This mask allows at most 14 hosts as 24 -2=14 hosts. Question 3 Having been assigned a Class C network block, what would be the extended network prefix to allow 22 host on each subnet? A. /28 B. /24 C. /27 D. /32 Answer: C To accommodate 22 hosts per subnet, a minimum of 5 bits are required and hence the extended network prefix of /27 i.e. 255.255.255.224. The maximum number of hosts on a subnet would be 25 -2 = 30 hosts and hence meeting our requirements. Question 4 Having been assigned 172.16.0.0/16 network block. You are asked to establish 12 subnets. What would be the mask that allows the creation of 12 subnets? A. /16 B. /18
  • 17. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 17 of 22 Do not duplicate or redistribute in any form C. /24 D. /20 Answer: D The number of subnets can be in blocks of powers of two i.e. 2 (21 ), 4 (22 ), etc. Hence to have 12 subnets, we define a block of 16 (24 ). Four bits are required and hence the mask of /20.
  • 18. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 18 of 22 Do not duplicate or redistribute in any form ACCESS LIST SUBNET MASKS Access Control Lists are meant to provide filtering capabilities. As the packets pass through the router they are analyzed and filtered by help of Access Control Lists (ACLs). ACLs can be configured for all routed protocols (IP, AppleTalk, DecNet, etc.). By help of this filtering mechanism of ACLs, traffic to and from a particular network can be prevented or allowed. The router examines each and every packet and based upon the ACLs, the packet is either forwarded or blocked. Although ACLs are used for many reasons the prime reason is to provide basic level security to the network. ACLs are generally used on gateway routers to act as a "wall" between the Internal and the External network. One can use access lists on a router connecting two parts of the same network. For e.g: The management would not like anybody and everybody in the company to access the finance network. Below are the types of access lists: ⇒ Standard Access Lists ⇒ Static Extended Access Lists ⇒ Lock and Key Security (Dynamic Access Lists) ⇒ Reflexive Access Lists (This allows IP packets to be filtered based on upper-layer session information) Access Lists should be defined for every protocol that one wants to filter. Every Access List is assigned a unique number or name and the packet filtering criteria is defined. The single access list can have multiple filtering criteria. For e.g: Access to only mail server is allowed from the outside network and that too for port 25 of the server. By default there is an implicit deny ALL at end of every Access List. Hence, any packet that does not matches the criteria specified, the packet will be dropped. One has to be careful while defining the criteria of ACLs. The packet is matched against each criteria statement in the order the statements were created and is processed. Because of this it is quite possible a particular kind of traffic that should have been allowed to pass through the router is blocked. The access lists can be defined either on the inbound or the outbound interface of the router. The access lists criteria must be logged and a continuos check on the logs must be kept.
  • 19. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 19 of 22 Do not duplicate or redistribute in any form ACCESS LIST SCENARIOS The following information is provided to assist you in understanding Access Lists and their design as well as implementation. Scenario #1: Permitting & Denying An Entire Subnet Your supervisor has given you two subnets i.e. 10.10.10.0 with subnet mask 255.255.255.0 and 172.21.10.0 with subnet mask 255.255.255.248. You have been asked to permit traffic from the 10.10.10.0 network and to deny access to your internal network from the 172.21.10.0 network. No other traffic needs to be permitted. Define the access list to do the above said. Answer: Access-list 100 permit 10.10.10.0 0.0.0.255 Explanation: Access List masks are inverse of the normal mask. The way we calculate the wildcard mask is as follows: 255.255.255.255 - 255.255.255.0 0.0.0.255 If you are still wondering that we have not denied access to the 172.21.10.0 then remember that there is a implicit deny at the end of every access list and hence the 172.21.10.0 network will not be able to access our network. We have used an extended access list. The better option would be to specify that everything is being denied access by using the command "access-list 100 deny any any log". This will deny any traffic and log the denials to the system logging server. Scenario #2: Blocking a range of subnets You have been asked by your supervisor to permit the 172.20.16.0 - 172.20.31.255 range which has a subnet mask of 255.255.240.0. Define an access list to do the above said. Answer: Access-list 101 permit 172.20.16.0 0.0.15.255 Explanation: To find the wildcard mask, take the higher minus the lower i.e. 172.20.31.255 - 172.20.16.0 0.0.15.255
  • 20. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 20 of 22 Do not duplicate or redistribute in any form To further explain how it works. 0 = Check (C) 1 = Don't Care (D) 0.0.15.255 CCCCCCCC.CCCCCCCC.CCCCDDDD.DDDDDDDD This means that the first 20 bits will be checked and the last 12 will be ignored. You'll notice that any network from 172.20.16.0 - 172.20.31.0 will match Network 0 for the first 20 bits, after the first 20 bits, we don't care if they match or not. 11111111.11111111.1111|0000.00000000 255.255.240.0 10101100.00010100.0001|0000.00000000 172.20.16.0 10101100.00010100.0001|0001.00000000 172.20.17.0 10101100.00010100.0001|0010.00000000 172.20.18.0 ... 10101100.00010100.00011111.00000000 172.20.31.0 10101100.00010100.00100000.00000000 172.20.32.0 Notice how this network does not match 172.20.16.0 for the first 20 bits? Therefore this network doesn't match and does not satisfy the access list. Scenario #3: Filtering Specific Subnets Configure the appropriate Access Control List (ACL) to permit or deny the following networks on the inbound interface of a Cisco 2520's first low speed interface. Deny network 204.199.104.X Deny network 164.199.104.X Permit network 204.199.108.X Permit network 164.199.108.X Configuration Parameters: ⇒ Permit all other networks that are in the range 140.140.X.Y where X is the even numbered subnets only. ⇒ Permit all other IP subnets. ⇒ You must also minimize the configuration as much as possible! Explanation: You are asked to configure simple access-lists. This appears to be easy until we get the last requirement: "Minimize the configurations as much as possible." How do we minimize networks with Access lists? We first need to look at the networks and look at them in binary format to see any differences or similarities. Let’s first look at the first two networks: 204.199.104.X
  • 21. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 21 of 22 Do not duplicate or redistribute in any form 164.199.104.X At first glance the only similarities appears to be the second and third octet until we look at the first 8 bits in binary. & In the CCIE lab you have access to the windows calculator Thus the first octet appears as follows when viewed in binary: 204 = 11001100 164 = 10001100 Looking at these we see that only the second bit position is different hence we can apply our wildcard mask to make sure the other 7 bits match and we do not care about the second bit as it could be 0 or 1. We will calculate the mask as follows: 11001100 10001100 ---------------- 01000000 ---> 64 The do care (match) bits are set to 0 and the don’t care (ignore) bits are set to 1. Hence the mask in decimal is 64. We can now apply the required configuration in one line to block the networks 204.199.104.X and 164.199.104.X as follows: Access-list 1 deny ip 140.199.104.0 64.0.0.0 You must now apply the same technique to the second pair of networks, 204.199.108.X and 160.199.108.X differ by one bit in the first byte hence the mask is once again 64.0.0.0. To permit all networks that are 140.140.X.Y where X is even requires a little more mathematical knowledge than you would normally use in the real world. But remember that even numbers are always divisible by 2 or in binary this means that the last bit is always set to zero. This sample table will demonstrate what we mean. Decimal Binary 1 00000001 Odd 2 00000010 Even 3 00000011 Odd 4 00000100 Even, etc... So what wildcard mask will deny all networks unless they are even? Well any mask that must match the last bit as being 0. That is we don’t care what the first seven bits are but the last bit must be set to zero which is the case with all even numbers. Hence the mask is 11111110 or 254. So to complete the third part of the question our configuration is:
  • 22. Copyright © 1998-99 NetCerts, Inc. All rights reserved. Page 22 of 22 Do not duplicate or redistribute in any form Access 1 permit ip 140.140.2.0 0.0.254.255 To permit all other IP traffic we need to add the line: Access 1 permit ip any By default all other networks are denied. Lastly we need to apply the access-list to the inbound interface on a Cisco 2520 first low speed interface as instructed. A Cisco 2520 has four serial ports of which the first two are high speed and the last two are low speed so we need to apply it to interface Serial2. R1(config)#int s 2 R1(config-if)#ip access-group 1 in R1(config-if)#exit Advanced Topic: Verify networks statements match and denies as instructed. Could you of used an extended IP access list. How would you deny all odd networks? How could you view logs against this access list? Additional Subnetting Resources IP Subnet Calculation & Design Online Documentation http://www.cisco.com/techtools/ip_addr_help.html This is a great tutorial to get you started called “Understanding IP Addressing”. http://www.3com.com/nsc/501302s.html & As always NetCerts welcomes your feedback regarding this white paper and encourage our fellow virtual community members to contribute to our site so all can benefit. If you are interested please contact us at: webmaster@netcerts.com