Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Z] Acceptable Use Policy (AUP) access MAC addresses access control lists (ACLs) ACLs (access control lists acquisitions address space 2nd 3rd adding subnets addresses 128-bit 16-bit subnetting 2nd 3rd 4th 20-bit 24-bit 24-bit networks creating subnets 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th 15th 16th anycast base 16 notations 2nd 3rd blocks made-up preserving 2nd 3rd 4th 5th 6th 7th 8th stolen broadcasting CIDR supernetting 2nd 3rd 4th 5th 6th 7th 8th CIDR. [See CIDR] Class B Date of Doom 2nd 3rd 4th 5th foreign support 2nd 3rd 4th global GLOP 2nd 3rd hijacking host inefficiencies of FLSMs IP 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th assigning hierarchies 2nd 3rd 4th 5th 6th 7th 8th 9th 10th multicasting 2nd 3rd 4th 5th 6th 7th translating MAC addresses 2nd 3rd 4th 5th 6th 7th vulnerabilties 2nd 3rd 4th IPv6 architecture 2nd 3rd comparing to IPv4 of 2nd migration tools 2nd 3rd 4th 5th 6th 7th types of 2nd 3rd 4th 5th 6th 7th 8th 9th 10th limited-scope MAC managing 2nd 3rd acquiring 2nd 3rd Balkanizing 2nd 3rd 4th 5th 6th 7th enterprise WANs 2nd 3rd 4th 5th hostmasters 2nd 3rd 4th inheriting 2nd Internet hosting centers 2nd 3rd ISP 2nd 3rd 4th 5th 6th planning 2nd 3rd 4th 5th 6th 7th sequential assignment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th symmetrical gaps 2nd 3rd 4th tactics 2nd mapping multicast 2nd 3rd NAT. [See NAT] nonreportable nonroutable private spaces 2nd 3rd 4th 5th rationing reserved 2nd security lending 2nd 3rd open networking 2nd 3rd 4th 5th 6th 7th 8th 9th RFC 2267 2nd 3rd 4th 5th spoofing subnets inefficiencies of FLSMs subnetting 2nd 3rd 4th 5th 6th 7th 8th 9th 10th subsets NAT translation tables unused 2nd 3rd addresses. [See also URL] addressing class-based hosts IP FLSM inefficiencies 2nd 3rd 4th 5th 6th IPv4 2nd third tiers 2nd administration addresses 2nd Balkanizing 2nd 3rd 4th 5th 6th 7th planning 2nd 3rd 4th 5th 6th 7th sequential assignment 2nd 3rd 4th 5th 6th 7th 8th 9th 10th symmetrical gaps 2nd 3rd 4th tactics 2nd groups multicast 2nd 3rd advantages open standards 2nd 3rd aggregatability CIDR 2nd 3rd 4th optimizing aggregatable global unicast addresses 2nd aggregation CIDR SLA allocation blocks Class A IP address spaces Class B IP address spaces Class C IP address spaces Class D IP address spaces hierarchies enterprise WANs 2nd 3rd 4th hostmaster roles IP addresses IP addressing 2nd 3rd 4th 5th 6th 7th 8th American National Standards Institute (ANSI) ANSI (American National Standards Institute) any-to-any communications. [See also communications] anycast addresses applications working groups applying VLSM 2nd 3rd 4th 5th 6th 7th approval pocesses IETF 2nd 3rd approval processes 2nd 3rd architecture addresses IPv6 2nd 3rd CIDR 2nd 3rd 4th DNS 2nd unicast addresses 2nd 3rd 4th 5th 6th 7th 8th 9th 10th 11th 12th 13th 14th ARP MAC addresses translating 2nd 3rd 4th 5th 6th assignment address spaces from inventories anycast addresses IP addresses multicast addresses 2nd 3rd assignments hostmaster roles IP addresses 2nd 3rd 4th 5th 6th 7th 8th 9th 10th oversized blocks attacks 2nd 3rd 4th 5th DDoS DoS defenses 2nd IP addresses 2nd 3rd 4th 5th man-in-the-middle networks address lending 2nd 3rd open networking 2nd 3rd 4th 5th 6th 7th 8th 9th RFC 2267 2nd 3rd 4th 5th smurf 2nd AUP (Acceptable Use Policy) automatically configured tunnels |