Go Premium for a chance to win a PS4. Enter to Win

x
?
Solved

IP ADRESS

Posted on 2008-10-05
6
Medium Priority
?
280 Views
Last Modified: 2012-05-05
IS 129.9 series public IP , is there any problem of assigning this IP for a network which has 800 computers and an internet proxy .
0
Comment
Question by:techp
6 Comments
 
LVL 143

Accepted Solution

by:
Guy Hengel [angelIII / a3] earned 600 total points
ID: 22645920
129.9 is a public IP address range, you should use any of these:

Class	Networks
A	10.0.0.0 through 10.255.255.255
B	172.16.0.0 through 172.31.0.0
C	192.168.0.0 through 192.168.255.0

Open in new window

0
 

Author Comment

by:techp
ID: 22645931

  so when i configure a network of 800 computers , i should not use 129.9 series
  if i use what is the problem , how it will effect
  or if i use 192.168 series then what is advanatage
  can you explain in detail
0
 
LVL 7

Assisted Solution

by:tharstern
tharstern earned 600 total points
ID: 22645968
Basically any website or external address that normally resolves to a 129.9 etc address would be directed internally instead if you used it. Thats why its not best practise to use these.


0
Technology Partners: We Want Your Opinion!

We value your feedback.

Take our survey and automatically be enter to win anyone of the following:
Yeti Cooler, Amazon eGift Card, and Movie eGift Card!

 
LVL 5

Assisted Solution

by:libin_v
libin_v earned 150 total points
ID: 22646016
0
 

Author Comment

by:techp
ID: 22646024


 so external web ip with 129.9.x.x not going to resolve by a internal network of 129.9 series . so network should be private series of 10.0.0.0 series or 192.168 series . correct ?
0
 
LVL 8

Assisted Solution

by:MrJemson
MrJemson earned 150 total points
ID: 22646305
Correct.
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

The use of stolen credentials is a hot commodity this year allowing threat actors to move laterally within the network in order to avoid breach detection.
In this article, WatchGuard's Director of Security Strategy and Research Teri Radichel, takes a look at insider threats, the risk they can pose to your organization, and the best ways to defend against them.
There's a multitude of different network monitoring solutions out there, and you're probably wondering what makes NetCrunch so special. It's completely agentless, but does let you create an agent, if you desire. It offers powerful scalability …
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…
Suggested Courses

783 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question