Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Lucent pipline

Posted on 2003-11-10
4
Medium Priority
?
258 Views
Last Modified: 2010-04-11
Im configuring lucent pipline remote access router .
I want applied a filter for my connection to prevent some hosts from access out network but when I,m enter the host ip that will preventing 10.10.10.1 with mask 255.255.255.0 the router don,t accept this IP and give me this message when I tray to save  (address invalid for given mask . too mant bits) I need to know why the address is refused and how can I make a filteration.
0
Comment
Question by:amrrifky
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
4 Comments
 
LVL 7

Accepted Solution

by:
NicBrey earned 152 total points
ID: 9714318
10.0.0.0   is a class A address. You are using a class C subnet mask with it. The router is probably configured for classful routing/addressing only. I'm not familiar with the Lucent router and how to configure it, but there should be a command like the "ip classless" on a Cisco that will allow you to configure addresses like that.
0
 

Assisted Solution

by:jgt10
jgt10 earned 148 total points
ID: 11922734
The Lucent Pipeline is the Ascend Pipeline.

Since you are trying to filter out a single IP address the netmask is not the usual information to separate network from host, but to separate significant bits from bits to be ignored.  IN this case you want to use a netmask of 255.255.255.255, telling the pipeline that you want it to use ALL of the address bits in determining if a packet is to be permitted or denied.

JGT
0

Featured Post

Free Tool: Port Scanner

Check which ports are open to the outside world. Helps make sure that your firewall rules are working as intended.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

When it comes to security, there are always trade-offs between security and convenience/ease of administration. This article examines some of the main pros and cons of using key authentication vs password authentication for hosting an SFTP server.
This month, Experts Exchange’s free Course of the Month is focused on CompTIA IT Fundamentals.
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
Michael from AdRem Software explains how to view the most utilized and worst performing nodes in your network, by accessing the Top Charts view in NetCrunch network monitor (https://www.adremsoft.com/). Top Charts is a view in which you can set seve…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question