Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people, just like you, are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
Solved

subnet question to ask.

Posted on 2011-09-03
3
290 Views
Last Modified: 2012-05-12
Hi,

A vendor of ours give us this network "68.232.128.0/19" to be whitelist on our network.

This is the same as asking us to allow 68.232.128.1 to 68.232.255.255, right?

Just want to clarify.  Thanks a lot.
0
Comment
Question by:nav2567
3 Comments
 
LVL 8

Accepted Solution

by:
pilson66 earned 500 total points
ID: 36478607
ipcalc 68.232.128.0/19
Address:   68.232.128.0         01000100.11101000.100 00000.00000000
Netmask:   255.255.224.0 = 19   11111111.11111111.111 00000.00000000
Wildcard:  0.0.31.255           00000000.00000000.000 11111.11111111
=>
Network:   68.232.128.0/19      01000100.11101000.100 00000.00000000
HostMin:   68.232.128.1         01000100.11101000.100 00000.00000001
HostMax:   68.232.159.254       01000100.11101000.100 11111.11111110
Broadcast: 68.232.159.255       01000100.11101000.100 11111.11111111
Hosts/Net: 8190                  Class A

Open in new window

0
 
LVL 35

Expert Comment

by:Ernie Beek
ID: 36478612
Nope, it`s 68.232.128.0 to 68.232.159.255
You can check that yourself at: http://www.subnet-calculator.com/cidr.php
0
 

Author Closing Comment

by:nav2567
ID: 36478673
Thank you very much ; )
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

The Cisco RV042 router is a popular small network interfacing device that is often used as an internet gateway. Network administrators need to get at the management interface to make settings, change passwords, etc. This access is generally done usi…
Getting hacked is no longer a matter or "if you get hacked" — the 2016 cyber threat landscape is now titled "when you get hacked." When it happens — will you be proactive, or reactive?
After creating this article (http://www.experts-exchange.com/articles/23699/Setup-Mikrotik-routers-with-OSPF.html), I decided to make a video (no audio) to show you how to configure the routers and run some trace routes and pings between the 7 sites…
As a trusted technology advisor to your customers you are likely getting the daily question of, ‘should I put this in the cloud?’ As customer demands for cloud services increases, companies will see a shift from traditional buying patterns to new…

840 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question