Want to protect your cyber security and still get fast solutions? Ask a secure question today.Go Premium

x
  • Status: Solved
  • Priority: Medium
  • Security: Public
  • Views: 642
  • Last Modified:

What does an IP ending in 0 signify?

When I tried to tell a norton firewall to allow traffic from the local network range, from 192.168.1.1 thru 192.168.1.149, it said, "IP already allowed".

I looked on the "allowed List".  The firewall's "network wizard" had already allowed this:  192.168.1.0

What does this mean? I don't think I've seen an IP ending in 0 before (sorry). Does the "0" signify a range from "1 thru 254"?  

If so -- does that apply in any of the 4 octets?
0
dgrrr
Asked:
dgrrr
1 Solution
 
Guy Hengel [angelIII / a3]Billing EngineerCommented:
a 0 at the end is like a wild-card, allowing all ip addresses in that range 1-254
0
 
r_naren22atyahooCommented:
angelIII is rite, adding to it

it is also called as network address

example
192.168.1.0 (this address is for whole network staring from 192.168.1 192.168.1.254)
255.255.255.0

in the same way for
192.168.0.0 is the network address for
255.255.0.0

regards
naren
0
 
thajuonlineCommented:
"The firewall's "network wizard" had already allowed this:  192.168.1.0"


this means that u'r firewall will allow all the address it the range 192.168.1.1 to 192.168.1.254

thanks
0
 
The--CaptainCommented:
A .0 address is meaningless without a corresponding subnet mask or CIDR notation - if your have a subnet wider than /24, an addressable host with an IP ending in .0 certainly exists.

That being said, I agree that the .0 address likely refers to the entire corresponding /24 subnet, since firewall manufacturers love to make their devices/software interpret the IP spec as creatively as possible, and their configuration interfaces are as brain-dead as possible...  

Regardless, it should be noted that the accepted answer is not correct for all cases.

Cheers,
-Jon
0

Featured Post

The Lifecycle Approach to Managing Security Policy

Managing application connectivity and security policies can be achieved more effectively when following a framework that automates repeatable processes and ensures that the right activities are performed in the right order.

Tackle projects and never again get stuck behind a technical roadblock.
Join Now