Note: Ipv4 and IPv6 PTR zones for private ranges
From
Also,
More details here.
Host (RFC 5735)
Link Local (RFC 3927) and (RFC 5735) - Used for connectivity links. This makes it ideal for HA connections on firewalls and for on-prem to cloud connections.
Private IPv4 ((RFC 1918) and (RFC 5735)
Carrier-Grade NAT (RFC 6598)
IEFT Protocol Assignments (RFC 5736) and (RFC 5735)
Documentation (RFC 5737)
Other
Bogon
http://www.team-cymru.org/Services/Bogons/fullbogons-ipv4.txt
IPv4 addresses that should not be routed across the Internet (including RFC1918 private IP addresses). Either reserved IP address space or unassigned and may be used for malicious purposes. More information: https://www.team-cymru.com/bogon-reference-bgp
http://www.team-cymru.org/Services/Bogons/fullbogons-ipv6.txt
IPv6 addresses that should not be routed across the Internet. Either reserved IP address space or unassigned and may be used for malicious purposes. More information: https://www.team-cymru.com/bogon-reference-bgp
169.254.169.254 Provides DNS169.254.169.254 Provides vairous meta data169.254.169.253 Provides DNS169.254.169.123 provides a Stratum-3 NTP time sourceYou cannot assign the following CIDR blocks to an interface, because they are reserved for AWS system use:
169.254.0.0/30169.254.1.0/30169.254.2.0/30169.254.3.0/30169.254.4.0/30169.254.5.0/30169.254.169.252/30
You must begin with the 169.254.x.4/30 range.
Also, you will find that for any subnet in AWS, if you take the subnet identifier and increase the number by two, the resulting IP will be a DNS resolver available in that subnet.
In AWS, Network ACLs do not provide control of traffic to Amazon reserved addresses (first four addresses of a subnet) nor of link local networks (169.254.0.0/16), which are used for VPN tunnels.