>Why do you think the network portion needs to be contiguous?

 

Just because some equipment at one time let you configure a non-contiguous mask does not make it correct configuration.  Please come up with any valid use case for a non-contiguous network (note NETWORK, not any other purpose) mask.

 

>Well, it does now. But that was not always the case.

 

It has ALWAYS been the only correct way to configure equipment and is a requirement under CIDR.  Here were your commonly used netmasks before CIDR/VLSM :

 

255.0.0.0

255.255.0.0

255.255.255.0

 

Which one is not contiguous?

 

>https://www.quora.com/Why-is-the-subnet-mask-255-255-255-64-invalid/answer/Patrick-W-Gilmore

 

In this example, the writer used it as a parlor trick to actually break a network.  That’s why you don’t do it and it was never a good configuration.  It just exploited a UI that did not validate the netmask.

 

>https://www.quora.com/Why-is-the-subnet-mask-255-255-255-64-invalid

 

In the second cited link, they are talking about using a non-contiguous mask in an access control function.  That is perfectly valid to do, it just is not a NETmask anymore.  By definition a netmask identifies the network portion of an address.  In the cited example they are defining a group of subnets to an ACL.

 

Steven Naslund

Chicago IL

 

> 

>-- 
>TTFN,
>patrick