I am using a strongSwan IPSec gateway for Windows 7 and Server 2008 based clients on the same subnet. The Windows VPN client requires a virtual ip address to be assigned by the IPsec gateway. What I ...
Today, the standard methods for moving the network/host address boundary are variable-length subnet masking (VLSM) for host addressing and routing inside a routing domain, and classless interdomain ...
Have you learned to think and dream in hex yet? That is what you are going to have to look forward to as we transition to using IPv6. Because we will be working in hexadecimal numbers we may need a ...
Subnetting and creating subnet masks is often outsourced to consultants, but doing it yourself can be both challenging and rewarding. In the IT world, specifically in networking, there aren’t many ...
If your company network is having problems and you need to troubleshoot it, you also need to know some basic information about the computers on the network. Internet Protocol is the underlying ...
The last editionof this column discussed subnet masks and the nature of IP addressing. In this and the following column, we will begin discussing what subnetting means and how to do it. First, though, ...
If they duplicated the subnet, the firewall shouldn't have accepted it. If it did, then it was likely bridging two subnets. If the ISP legitimately wanted to use that RFC1918 subnet, this would still ...
Supernetting was created as a way to solve the problem of routing tables growing beyond our current ability to manage the exhaustion of Class B network address space. Much like one area code ...
If computers in an open network talk freely with one another and two computers start talking at the same time, you have a “data collision.” Collisions may be arbitrated via Carrier Sense Multiple ...