Security Basics mailing list archives

RE: CIDR Explanation


From: Bénoni MARTIN <Benoni.MARTIN () libertis ga>
Date: Tue, 21 Sep 2004 11:03:01 +0100

Hi !

Do not worry, it has been nearly the same for me :)
        - If you want to use it without having to understand very well, you can play with 
http://www.solarwinds.net/Tools/Free_tools/Subnet_Calc/. It's free and quite good !
        - If you want to understand ... Well for my part, I passed the CCNA exam and in their book (not free :) ) they 
explain quite good this topic.

HTH !

 

-----Message d'origine-----
De : ka55ad [mailto:ka55ad () gmail com] 
Envoyé : lundi 20 septembre 2004 14:39
À : security-basics () securityfocus com
Objet : CIDR Explanation

Hi List,

     I am hoping that somebody might be able to help me out or point me in the right direction. For the life of me I 
can't seem to get a good grasp on CIDR notation. I see a lot of CIDR addresses every day, but I have trouble figuring 
out the IP addresses on the fly. I am not a complete newbie - I am quite familiar with the OSI model, TCP handshakes, 
etc but this one area stumps me.

     I am particularly interested in it because I am going to be setting up a snort box soon as well as an IP chains 
firewall to segregate parts of the network. I would much rather use CIDR since it can be much quicker at times, but I 
don't want to use it right now due to my lack of knowledge which can cause security issues. Can anybody offer 
advice/help? Thanks.

---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes are guaranteed to be 12 students or less 
to facilitate one-on-one interaction with one of our expert instructors. Gain the in-demand skills of a certified 
computer examiner, learn to recover trace data left behind by fraud, theft, and cybercrime perpetrators. Discover the 
source of computer crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------




---------------------------------------------------------------------------
Computer Forensics Training at the InfoSec Institute. All of our class sizes
are guaranteed to be 12 students or less to facilitate one-on-one
interaction with one of our expert instructors. Gain the in-demand skills of
a certified computer examiner, learn to recover trace data left behind by
fraud, theft, and cybercrime perpetrators. Discover the source of computer
crime and abuse so that it never happens again.

http://www.infosecinstitute.com/courses/computer_forensics_training.html
----------------------------------------------------------------------------


Current thread: