networking:ipv4
Differences
This shows you the differences between two versions of the page.
| Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
| networking:ipv4 [2025/05/26 08:30] – bstafford | networking:ipv4 [2025/08/05 16:08] (current) – bstafford | ||
|---|---|---|---|
| Line 1: | Line 1: | ||
| ====== IPv4 ====== | ====== IPv4 ====== | ||
| - | Host | ||
| - | * 127.0.0.0/8 | ||
| - | Link Local | + | Note: [[infoblox_threat_defense: |
| + | |||
| + | |||
| + | From | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[https:// | ||
| + | * [[http:// | ||
| + | * [[http:// | ||
| + | |||
| + | Also, | ||
| + | * 172.17.0.0/ | ||
| + | * 10.88.0.0/ | ||
| + | |||
| + | More details [[https:// | ||
| + | |||
| + | Host ([[https:// | ||
| + | * 127.0.0.0/8 - host loopback address | ||
| + | |||
| + | Link Local ([[https:// | ||
| * 169.254.0.0/ | * 169.254.0.0/ | ||
| - | RFC1918 | + | Private IPv4 (([[https:// |
| * 10.0.0.0/8 | * 10.0.0.0/8 | ||
| * 172.16.0.0/ | * 172.16.0.0/ | ||
| * 192.168.0.0/ | * 192.168.0.0/ | ||
| + | |||
| + | Carrier-Grade NAT ([[https:// | ||
| + | * 100.64.0.0/ | ||
| + | |||
| + | IEFT Protocol Assignments ([[https:// | ||
| + | * 192.0.0.0/ | ||
| Documentation ([[https:// | Documentation ([[https:// | ||
| - | * 192.0.2.0/ | + | * 192.0.2.0/ |
| - | * 198.51.100.0/ | + | * 198.51.100.0/ |
| - | * 203.0.113.0/ | + | * 203.0.113.0/ |
| - | * 233.252.0.0/ | + | * 233.252.0.0/ |
| - | * 198.18.0.0/ | + | * 198.18.0.0/ |
| Other | Other | ||
| - | * 224.0.0.0/4 Multicast | + | |
| - | * 192.88.99.0/ | + | |
| - | * 192.0.0.0/24 IETF Protocol Assignments | + | * 192.88.99.0/ |
| + | * 240.0.0.0/4 Reserved for future use. and ([[https:// | ||
| + | * 255.255.255.255/ | ||
| Bogon | Bogon | ||
| * Team Cymru Bogons IPv4 - < | * Team Cymru Bogons IPv4 - < | ||
| - | IPv4 addresses that should not be routed across the Internet (including RFC1918 private IP addresses). Either reserved IP address space or unassigned and may be used for malicious purposes. More information: | + | IPv4 addresses that should not be routed across the Internet (including RFC1918 private IP addresses). Either reserved IP address space or unassigned and may be used for malicious purposes. More information: |
| * Team Cymru Bogons IPv6 - < | * Team Cymru Bogons IPv6 - < | ||
| - | IPv6 addresses that should not be routed across the Internet. Either reserved IP address space or unassigned and may be used for malicious purposes. More information: | + | IPv6 addresses that should not be routed across the Internet. Either reserved IP address space or unassigned and may be used for malicious purposes. More information: |
| + | |||
| + | |||
| + | ===== GCP ===== | ||
| + | * '' | ||
| + | |||
| + | ===== AWS ===== | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | You cannot assign the following CIDR blocks to an interface, because they are reserved for AWS | ||
| + | system use: | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | * '' | ||
| + | |||
| + | You must begin with the '' | ||
| + | |||
| + | Also, you will find that for any subnet in AWS, if you take the subnet identifier and increase the number by two, the resulting IP will be a DNS resolver available in that subnet. | ||
| + | |||
| + | In AWS, Network ACLs do not provide control of traffic to Amazon reserved addresses (first four addresses of a subnet) nor of link local networks (169.254.0.0/ | ||
networking/ipv4.1748248248.txt.gz · Last modified: by bstafford
