>Why do you think the network portion needs to be contiguous?

Just because some equipment at one time let you configure a non-contiguous mask 
does not make it correct configuration.  Please come up with any valid use case 
for a non-contiguous network (note NETWORK, not any other purpose) mask.

>Well, it does now. But that was not always the case.

It has ALWAYS been the only correct way to configure equipment and is a 
requirement under CIDR.  Here were your commonly used netmasks before CIDR/VLSM 
:

255.0.0.0
255.255.0.0
255.255.255.0

Which one is not contiguous?

>https://www.quora.com/Why-is-the-subnet-mask-255-255-255-64-invalid/answer/Patrick-W-Gilmore

In this example, the writer used it as a parlor trick to actually break a 
network.  That's why you don't do it and it was never a good configuration.  It 
just exploited a UI that did not validate the netmask.

>https://www.quora.com/Why-is-the-subnet-mask-255-255-255-64-invalid

In the second cited link, they are talking about using a non-contiguous mask in 
an access control function.  That is perfectly valid to do, it just is not a 
NETmask anymore.  By definition a netmask identifies the network portion of an 
address.  In the cited example they are defining a group of subnets to an ACL.

Steven Naslund
Chicago IL

>
>--
>TTFN,
>patrick

Reply via email to