SDL Episode30

From Paul's Security Weekly
Jump to: navigation, search

Secure Digital Life #30

Recorded September 12, 2017 in Rhode Island!

Episode Audio

Coming Soon!


  • Doug White
    Cybersecurity professor, President of Secure Technology, and Security Weekly network host.
  • Russell Beauchemin
    Cybersecurity & Network Security Program Advisor and Director of Instructional Support & Learning Innovation at Roger Williams University.
  • VLSM

    VLSM: The final insult

    Talk about why subnetting happened and how supernetting came about. Network Segmentation and controlling broadcast domain size

    Enumerate means to compute all the networks and broadcast addresses with a given mask.

    Example Problem 1:

    • Given the network and the subnet mask, enumerate the network.

    Example Problem 2:

    • Given the network /24, what is a better subnet mask that will allow for 4 networks? How many hosts will be allowed per network?

    Example Problem 3:

    • Given the network /24, what is a subnet mask that will allow for 35 hosts per network? How many networks would be possible?

    Example Problem 4:

    • Given the network, are and in the same broadcast domain?


    • Cisco Magic Number approach to subnetting

    • Whole bunch of tools and things