>Why do you think the network portion needs to be contiguous?
Just because some equipment at one time let you configure a non-contiguous mask does not make it correct configuration. Please come up with any valid use case
for a non-contiguous network (note NETWORK, not any other purpose) mask.
>Well, it does now. But that was not always the case.
It has ALWAYS been the only correct way to configure equipment and is a requirement under CIDR. Here were your commonly used netmasks before CIDR/VLSM :
255.0.0.0
255.255.0.0
255.255.255.0
Which one is not contiguous?
>https://www.quora.com/Why-is-the-subnet-mask-255-255-255-64-invalid/answer/Patrick-W-Gilmore
In this example, the writer used it as a parlor trick to actually break a network. That’s why you don’t do it and it was never a good configuration. It just
exploited a UI that did not validate the netmask.
>https://www.quora.com/Why-is-the-subnet-mask-255-255-255-64-invalid
In the second cited link, they are talking about using a non-contiguous mask in an access control function. That is perfectly valid to do, it just is not a NETmask
anymore. By definition a netmask identifies the network portion of an address. In the cited example they are defining a group of subnets to an ACL.
Steven Naslund
Chicago IL
>
>--
>TTFN,
>patrick