Skip to content

Latest commit

 

History

History

Week9_Networking

Folders and files

NameName
Last commit message
Last commit date

parent directory

..
 
 
 
 
 
 
 
 
 
 

Networking 💻 ☁️

Contents
Part I

Part II

Network PDF
Setting up a VPC on AWS

Part I

What is a network?

  • Consists of two or more computers that are linked in order to share resources (e.g printers and CDs), exchange files, or allow electronic communications.
  • These computers on a network can be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
  • There are two common types of networks:

What is an IP?

  • Stands for internet protocol, is the internet's principal set of rules for communications.
  • IP is part of an internet protocol suite, which also includes Transmission Control Protocol (TCP)
  • The IP governs rules for packetising, addressing, transmitting, routing and receiving data over networks.
  • An IP address has two parts - one part identifies the host, such as a computer or other device. The other part identifies the network it belongs to. TCP/IP uses a subnet mask to separate them.
    1. The Network ID
    1. The Host ID

Understanding IP addresses

  • Address used to uniquely identify a device on an IP network.
  • An address is made up of 32 binary bits, which can be divisible into a network portion and host portion with the help of a subnet mask.
  • 32 binary bits are broken into four octets (1 octet = 8 bits).
  • Each octet is converted to decimal and separated by a dot.
  • The value in each octet ranges from 0 to 255 or 00000000 - 11111111 binary.

What is IPv4?

  • The fourth version of the internet protocol
  • Uses 32-bit IP address (each number between each dot, is a byte. One byte as 8 bits)
  • IPv4 was invented in the 1970s as the first major version of internet protocol.

What is the maximum IP in IPv4?

  • With 32 bits the max number of IP addresses is 2 to the power of 32 and contains 4,294,967,296 IPv4 addresses
  • There are 588,514,304 reserved addresses therefore, there are 3,706,452,992 public addresses.

IP and Binary - Demo Convert 1 IP into binary

  • Binary is a base-2 number system, made up of two numbers: 0 and 1
  • Computers interpret IP addresses in binary.
  • Computers think in binary, meaning everything is described using two values or states: on or off, true or false, yes or no, 1 or 0.

An IP address provide a numeric identify to an interface. The address is used with a subnet mask. Without a subnet mask, an IP address is an ambiguous address and without IP address a subnet mask is just a number. Both addresses are 32 bits in length. These bits are divided in four parts. The calculation direction is Left to Right

Example IP address: 192.168.0.1

192

Position value Comparison Value in Binary
128 128 < 192 1
64 128+64 = 192 == 192 1
32 192+32 = 224 > 192 0
16 224 + 16 = 240 > 192 0
8 240 + 8 = 248 > 192 0
4 248 + 4 = 252 > 192 0
2 252 + 2 = 255 > 192 0
1 255 + 1> 192 0

Which gives:

11000000.10101000.00000000.00000001

IPv4 vs IPv6

  • IPv4 is 32-Bit
  • IPv6 is 128-Bit
  • All 4.29 billion IP addresses have now been assigned, leading to the address shortage issues we face today.
  • Number of IPv6 addresses is 1028 times larger than the number of IPv4 addresses IPv6 hexadecimal better suited to mobile networks
  • Problem of only having 4B IPs:

LAN

  • Local Area Network.
  • A computer network that interconnects within a limited area such as a residence, school, laboratory, university campus or office building.
  • Examples of LAN tech: Ethernet, Token Ring, Fibber, Distributed Data Interconnect (FDDI)

WAN

  • Wide Area Network.
  • A telecommunications network that extends over a large geographical area for the purpose of computer networking.
  • A WAN can cover country, continent or even a whole world.
  • The internet is the world's largest WAN.
  • Examples of WAN tech: Asynchronous Transfer Mode (ATM), Integrated Services Digital Network (ISDN)

TCP/IP

Extracted from avast

  • Computers communicate with each other through TCP/IP.
  • TCP/IP is typically built into computers and is largely automated
  • Stands for Transmission Control Protocol/Internet Protocol
  • They are a set of rules that allow computers to communicate on a network such as the Internet.
  • Humans use social protocols to know how to behave and communicate with other people, technologies also set communication rules, e.g. the telegraph using Morse code or a CB radio using codes like "10-4."
  • Communication was more complicated when people started to exchange information between its owns computers but didn't enable communication with other vendors' computers.
  • The agreed-upon standard was needed that permitted computers from all vendors to communicate with each other (TCP/IP)

IP is the part that obtains the address to which data is sent TCP is responsible for data delivery once that IP address has been found The IP address is like the phone number assigned to your smartphone. TCP is all the technology that makes the phone ring, and that enables you to talk to someone on another phone. They are different from one another, but they are also meaningless without one another.

Subnet

What is a Subnet?

  • A subnetwork or subnet is a subdivision of an IP network.
  • A smaller network inside a large network.
  • Subnetting makes network routing much more efficient e.g a large network might want to have smaller networks inside of it... such as one department (e.g accounting) of a business.
  • Subnetting allows a network administrator break a network into 'subnets', allowing them to connect more people to the network without getting more IP addresses.
  • A subnet can be configured as a VPN-only subnet by routing traffic via virtual private gateway.
  • Subnet allows us to configure different security groups around our instances.

Subnetting

  • Process of splitting a CIDR block into smaller CIDR blocks within the same range by using different subnet masks.
  • Subnetting enables you to create smaller networks using a smaller CIDR range from your larger network IP address space.
  • For example if you had a CIDR block range of:
10.0.0.0/16 

This is a large IP range to have as a single network as it allows for up to 65,534 hosts (256 * 256 * 256).
To make better use of this range and to create smaller networks allowing segmentation within your network you could subnet the CIDR block into smaller CIDR ranges using a different subnet mask, such as /17 for each subnet.

  • Creating subnets is about creating commonalities.
  • 201.105.7.34/24 is in the same network as 201.105.7.1/24.
  • The suffix /24 signals that only the first 24 bits of the network component are counted.
  • To do this, they have to be the same, if both addresses are to belong to the same network.
  • The remaining bits (everything after 201.105.7.) are reserved for the host part.
  • The number of bits that you see right after the slash (/) in CIDR format indicates the number of digits (from left to right) that belong to the power supply of the IP address.

What is a Subnet mask?

  • A 32-bit (8 by 4) combination used to describe which portion of an address refers to the subnet and which part refers to the host
  • A byte = 8 bits
  • Class A, B, and C networks have default masks, also known as natural masks:
  • For each class, different numbers of octets (four numerical blocks of IP addresses) are used to identify the networks.
  • The remaining octets determine the number of hosts in a network.
Class A: 255.0.0.0
Class B: 255.255.0.0
Class C: 255.255.255.0

CIDR

  • Classless Inter-Domain Routing
  • CIDR is based on the idea of subnet masks. A mask is placed over an IP address and creates a sub network: a network that is subordinate to the internet.
  • The subnet mask signals to the router which part of the IP address is assigned to the hosts and which determines the network.

An IP address on Class A network that has not been subnetted would have an address/mask pair similar to 8.20.15.1 255.0.0.0

Converted IP addresses:

8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000

This helps identify the network and the host ID. The address bits which have corresponding mask bits set to 1 represent network ID. The mask bits set to 0 represent node ID.

8.20.15.1 = 00001000.00010100.00001111.00000001
255.0.0.0 = 11111111.00000000.00000000.00000000
            -----------------------------------
             net id |      host id    

Net ID identifies which network you're on
Host ID is a device that has an address on the network.

There are four things that have to exist for a network to be a network.

  1. Network address 192.168.0.0
  2. Subnet Mask 255.255.255.0
  3. Hosts 192.168.0.1 - 192.168.0.254
  4. Broadcast address 192.168.0.255

Submask - Identifies how many addresses you can have on your network at the same time. A second IP that tells you where to match IPs to be in the same network Computer A 192.65.63.1 Computer B 190.65.30.1 Submask If 255.0.0.0 Then not on same network If 0.225.0.0 Then on same network

Max number 255

255.255.255.255 entire availability 256 * 256 * 256 * 256 = approx 4B

What is an interface?

  • A network connection

Class Networks

When planning for IP addressing on your network, you have to determine which network class is appropriate for your network.

  • Networks are categorised by class:
  • Classes A, B, C, and D

N-Tier Architecture

Aka Multi-tier architecture or multilayered architecture. N-Tier architecture is a client-server architecture in which presentation, application processing and data management functions are physically separated. They provide a model by which developers can create flexible and reusable applications. A typical n-tier application includes a presentation tier, a middle tier, and a data tier.

  • Layer 1: Presentation Logic Typically hosted on front-end Web servers. User interface.
  • Layer 2: Business Logic Hosted on mid-tier application or general-purpose servers
  • Layer 3: Database Management - Hosted on back-end database servers
  • 3-tier means Presentation Layer + Component Layer + Data access layer
  • N-tier is when additional layers are added beyond these, usually for additional modularity, configurability.

n-tier-diagram

Layer 1 The presentation tier

  • User interface
  • The go-between for the data tier and the user, passing on the user's different actions to the logic tier
  • CSS, Javascript, HTML
  • If you need to log in, the presentation tier will show you boxes for username, password, and the submit button.
  • When you submit the form, this will be passed on to the logic tier.

Layer 2 The Logic Tier

  • The logic tier will have the JSP, Java Servlets, Ruby, PHP and other programs.
  • This is run on a web server.
  • Business logic - like validation of data, calculations, CRUD operations
  • This tier makes communication faster and easier between the client and data layer
  • Defines the workflow activity that is necessary to complete a task.

Layer 3 The Data Tier

  • This is the database, such as MySQL, NoSQL or PostgreSQL database
  • These run on a separate database server

How does this differ from MVC framework?

  • N-tier architecture has a middle layer or a logic tier, which facilitates all communications between the different tiers.
  • In an MVC framework, the interaction is triangular. Instead of going through the logic tier, it is the control layer that accesses the model and view layers, which the model layer accesses the view layer.
  • The control layer makes a model using the requirements and then pushes that model into the view layer.

N-tier design:

Client <-> Middle <-> Data

MVC Pattern

     Middle
     ^    |
     |    v
Client <- Data
  • In the n-tier, communication between layers is bi-directional meaning it always passes through the Middle Tier
  • In MVC, each layer is updated by the one at the left and, in turn, updates the one at the right -where 'eft' and 'right' are merely illustrative.

Benefits of N-Tier Architecture

  • Separating application components into separate tiers increases the maintainability and scalability of the application.
  • Each N-tier architectures typically implemented as IaaS, with each tier running on separate set of VMs.
  • It does this by enabling easier adoption of new technologies that can be applied to a single tier without the requirement to redesign the whole solution
  • N-tier applications typically store sensitive information in the middle-tier, which maintains isolation from the presentation tier.
  • Secure: You can secure each of the tiers separately using different methods
  • Scalable: You can add more resources without affecting the other tiers.
  • Flexible: You can expand each tier in any manner that your requirements dictate.
  • Portability: Easy to move between cloud and on premises.
  • Having more than one VMs provides resiliency in case on VM fails.
  • Load balancers used to distribute requests across the VMS in a tier.

Monolith Architecture

  • A traditional model for software in which the structure is a single and indivisible unit. A monolith has one code base with multiple modules.

Disadvantages of Monolith architecture

  • A large code base can be harder to understand
  • IDE (integrated development environment) can become overloaded, and size may also slow down startup time.
  • Every element is closely related and dependent on the others, so it is difficult to change to a new or advanced technology, language, or framework
  • Updating can be a challenge
  • Problems with scalability, because each element has different resource requirements
  • Difficult to manage network security in a large system.
  • Monolithic design prevents independent deployment of features.

N-Tier Architecture Description

  1. Each tiers consists of two or more VMs
  2. Multiple VMs provide resiliency in case one VM fails.
  3. Load balancers used to distribute requests across the VMs in a tier.
  4. Each tier is placed inside its own subnet, meaning internal IP address falls within same address range.
  5. This makes it easy to apply network security group rules and route tables to individual tiers.
  6. Web and business tiers are stateless, meaning VM can handle any request for that tier.
  7. Network security groups restrict access to each tier. E.g. the database tier only allows access from the business tier.
  8. Note Tiers are the boundary of scalability, reliability, and security.

VPCs

Extracted from Prasad Vara

What is a VPC?

  • A virtual private cloud (VPC) is your own private data center within the AWS infrastructure.
  • It is your own isolated segment of the AWS Cloud
  • By default, when creating VPC, only your AWS account has access to it.
  • There are millions of VPN but they do not have access to your VPC, vice versa.
  • Since this is your network, you can decide to slice it up any way you prefer.

Why use a VPC?

  • Allows you to start deploying resources e.g compute resources, database, network infrastructure
  • By default, you are allowed five VPCs per region per AWS account.
  • To create a VPC, you give it a name and define an IP address range that the VPC can use.
  • This is done in the form of a CIDR block (Classless Inter-Domain Routing)
  • VPC isolated segment of the AWS public cloud which allows you to provision and deploy resources in a safe and secure manner.

For example, you can decide that your VPC network will be 192.168.0.0/15 which can accommodate 65,536 (256 * 256) different IP addresses and 256 different subnets.

What is inside a common 2 tier VPC?

  1. Web Tier
  2. Database Tier

How does it relate to networks?

  • When creating a VPC, you want to create subnets in your VPC.
  • Subnets are like containers within your VPC that segment off a slice of the CIDR block you define in your VPC (Classless Inter-Domain Routing)
  • Subnets give different access rules and places resources in different containers where those rules should apply.
  • E.g you would not have a big open window in your bathroom, much like you would not put a database with secretive information in a public subnet allowing any and all network traffic. You would want to put that database in a private subnet.
  • Subnetting enforces a greater level of security.
  • Logical grouping of similar resources also helps you to maintain an ease of management across yoru infrastructure.
  • Creating subnets allow you to create a logical network division between your resources e.g. subnet for database instances, subnet for application servers, a subnet for web infrastructure.

Enforcing security with subnets

  • By having multiple Subnets with similar resources grouped togethers, it allows for greater security management.
  • You can create private subnets by implementing network level virtual firewalls, called network access control lists, or NACLs, making it possible to filter traffic on specific ports from both an ingress and egress point at the Subnet level.

VPC_with_public_private_subnet

https://stackoverflow.com/questions/45164355/what-is-vpc-subnet-in-aws

VPNs

  • Virtual Private Network.
  • A VPN can allow users to exchange data efficiently across shared or public networks, as though they are directly linked to the private network

IGWs

  • An Internet Gateway is a managed component by AWS that is attached to your VPC and acts as a gateway between your VPC and the outside world.
  • An IGW is a transparent component. It does not have an IP address of its own, and is not a component that you need to manage.
  • Note: For an EC2 instance to talk to the outside world, instances must be located on a subnet that has a route defined to the IGW, and there must be a public IP address (Elastic IP - a reserved public IP address)
  • This is mandatory to enable bi-directional communication between the outside world and the instances.
  • Serves as a bridge between our isolated VPC to the Internet by the IGW which is managed by AWS.
  • Before the public subnet can access the Internet, we need to add a route to the public subnet's route table.
  • Associated with every subnet when it is created will also be an associated route table.
  • You can have the same route table associated to multiple subnets.
  • You cannot associate more than one route table to a single subnet.

NACLs (Network Access Control Lists)

  • Protects subnet
  • Stateless
    • If instance in subnet sends request, the connection is not tracked, response is subject to NACL's inbound rules.
    • If traffic is allowed into subnet, the response is evaluated according to outbound rules
  • Virtual network-level firewalls that are associated to each and every subnet
  • Help control both ingress and egress (incoming, outbound) traffic moving in and out of your VPC and between your subnets.
  • For example, an inbound rule might deny incoming traffic from a range of IP addresses, outbound rule might allow all traffic to leave the subnet.
  • Optional but best solution is to use both resource types as virtual firewalls.

SG Security Groups EC2

  • Protects Instance
  • Stateful
    • They automatically allow return traffic, no matter what rules are specified
    • If instance sends out a request, connection is tracked and the response is accepted regardless of inbound rules.
    • If traffic is allowed into instance, the response is allow out regardless of explicit outbound rules
    • SGs don't need rules to evaluate traffic because once a request is permitted, response is automatically permissed.
  • Bastion and app server both in public subnet but different security groups, for example bastion server we only give access to our IP (22), app server we gave access to any IP address (port 80 and 443). In public NACL we granted internet to public subnet, however because our bastion server has a security group, traffic would not be allowed in.
  • When creating a VPC, AWS automatically creates a default security group for it.
  • Firewall at EC2 level.
  • Responsible for controlling the traffic in and out of your instances.
  • Inbound rules stateful, meaning in an EC2 instance in an SG with port 80, incoming traffic is allowed, regardless of any rules.
  • Outbound rules can respond to HTTP request but cannot initiate an HTTP request e.g to update server.

Both...

  • Use inbound and outbound rules to control traffic
  • Can be applied to more than one instance
  • Can be locked down to deny all traffic in either direction
  • Valid methods of securing resources in a VPC
  • Work together to promote network redundancy and prevent authorised activity.

AWS - Difference between Security Groups and Network ACLs

TL;DR Security group is firewall of EC2 instance, Network ACL is firewall of subnet

Subnet or EC2 instance?

  • SGs are tied to an instance whereas Network ACLs are tied to the subnet level
  • Instances in the subnet with an associated NACL will follow rules of NACL.
  • SGs have to be assigned explicitly to the instance, meaning any instances within the subnet group gets the rule applied.

nacl_vs_sg

  • Using SGs and NACLs together reduce attack surface of AWS application
  • E.g you might create a custom NACL to whitelist or allow SSH access for a single IP which you associate with your subnet
  • You also create a SG with a similar whitelist rule but if you accidentally make the SG rules too permissive, the NACL rules continue to permis access only from that friendly IP address.

Analogy: NACL is the UK Civil Defence/National Security and Intelligence, which applies high-level to stop bad things from entering the country. But SGs are like local law enforcement like local and state police.

  • When traffic enters, it is filtered by NACLs before filtered by SGs.
  • This mean traffic allowed by NACL can be allowed or denied by SG, traffic stopped by NACL never makes it any further.

If one fails, the remaining can protect.

Routing Table

  • A routing table or routing information base (RIB), is a data table stored in a router or a network host that lists the routes to particular network destinations.
  • A set of rules, often viewed in table format, that is used to determine where data packets travelling over an IP will be directed.
  • Also called the forwarding table.
  • Routing table directs internet from IGW to our subnets.
  • The place where routing information is stored
  • A routing table contains routing entries, which is a list of destinations (or a list of network prefixes or routes)
  • In AWS, traffic within VPC does not need to be routed.
  • A router takes care of this and the entries in this router are controlled by you through Route Tables.
  • When you want to access a resource outside of your VPC, - you route traffic through your IGW (for public instances) or through the NGW (for private instances).
  • The route tables are associated with each of your subnets to allow the flow of traffic according to the policies and options you have in place.
  • Each subnet in VPC must be associated with a route table, which controls routing for subnet.
  • Enables you to specify routing rules for inbound traffic that enters your VPC through the gateway.

What is a router?

  • Piece of network hardware that connects a local network to the internet.
  • A router forwards data packets between computer networks.
  • Routers perform the traffic direction functions on the Internet.
  • Data sent through the internet, such as a web page or email, is in the form of data packets.
  • A router is connected to two or more data lines from different IP networks.
  • A router directs incoming and outgoing internet traffic on that network in the fastest and most efficient way.
  • Route table can be associated with multiple subnets
  • A subnet may only be associated with one route table

Instance vs Subnet

  • Subnet is subdivision of VPC IP
  • Subnets are containers (public and private) within VPC, they segment off a slice of the CIDR block you define in your VPC.
  • Subnets give different access rules and place resources in different containers where those rules apply.
  • Instances sit within subnets, they are virtual servers.

SG vs NACL

  • Network Access Control List is an optional layer of security of your VPC.
  • NACL filter incoming and outgoing traffic into a subnet
  • Security Groups filter incoming traffic at instance level
Metric NACL SG
Job Filter incoming and outgoing traffic into a subnet Filter incoming traffic to instance
Location At subnet level At instance level
Rules in By default deny everything. Rules numbered. Should be broader than SG By default nothing allowed, you need to specify
Rules out By default deny everything. You need to specify what goes out. One subnet can only connect with a single ACL but a single ACL can have multiple subnets. By default allows everything out. No need to worry, it is stateful. Not your job.

Navigate HERE on setting up a VPC on AWS

Part II Networking and Security

What is bastion server AWS? 🏯

  • Also called a Jump Box
  • A bastion is a special purpose server instance that is designed to be the primary access point from the Internet and acts as a proxy to your other EC2 instances.
  • Use bastion to gain access to private subnets.
  • Bastion server sits in public subnet (another EC2 instance)
  • Acts as a proxy server and allows client machines to connect to the remote server.
  • A bastion host is a server
  • A bastion host provides access to a private network from an external network, such as the Internet.
  • Anything that provides perimeter access control security can be considered as the Bastion Host or Bastion Server.

Using a Bastion Server

  • After creating a VPC, the next important part of creating an infrastructure in the cloud is to provide a mechanism for secure connection and a communication channel to your VPC resources e.g providing an external IP address.
  • However, assigning an external IP address would cause various security risks.
  • When instances do not have external IP addresses, they can only be reached by some other instances on the network.
  • To allow access to these machines over an SSH connection, you use a Bastion Host.
  • A bastion host is the most convenient method is to provide an instance in your network to act as a trusted relay for inbound connections.

Bastion Server Architecture bastion_server_architecture

  • All your isolated instances have only internal IP addresses in your VPC.
  • The bastion host instance has an external IP address as well as an internal IP address.
  • If you need to access instances on the internal network that do not have an external IP address, you can connect to a Bastion host and then connect to your internal instances from that Bastion host.

Setting up a Bastion server here

What is a proxy?

  • A proxy server acts as a gateway between you and the internet
  • An intermediary server separating end users from the websites they browse.
  • An intermediary for requests from clients seeking resources from servers that provide those resources.
  • They potentially mask the true origin of the request to the resource server instead of the client connecting directly to a server.
  • Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests.

proxy_image

Benefits of proxies

  • Proxies serve as a method to simplify or control the complexity of the request, or provide additional benefits such as:
    • Load Balancing
    • Privacy
    • Security
  • They add structure and encapsulation to distributed systems.

An open proxy forward requests from and to anywhere on the Internet

Reverse Proxy Recap

  • A reverse proxy or surrogate is a proxy server that appears to clients to be an ordinary server.
  • Reverse proxies forward requests to one or more ordinary servers that handle the request.
  • The response from the proxy server is returned as if it came directly from original server, leaving client with no knowledge of original server.
  • They are installed in the neighbourhood of one or more web servers.

Benefits of reverse proxies

  • Load balancing: reverse proxies can distribute the load to several web servers, each web server serving its own application area.
  • Security: Proxy server is an additional layer of defense and can protect against some OS and Web Server specific attacks.
  • Content-filtering: A content-filtering web proxy server provides administrative control over the content that may be relayed in one or both commercial and non-commercial organisation (e.g schools).

Using a reverse proxy to circumvent proxies which filter using blacklists using services designed to proxy information from a non-blacklisted location

What is Secure Shell (SSH)?

  • A network protocol for operating network services securely over an unsecured network.
  • A method for secure remote login from one computer to another (VM)
  • SSH protocol uses encryption to secure the connection between a client and a server.

What is an ephemeral port?

  • Aka TCP port, a port (defined by the source) that is used to keep track of what traffic goes to what computer and application
  • When you make a TCP connection, a random source port number is chosen to represent your connection for the duration of the session.
  • That port number is called an ephemeral port, since it is short-lived and disappears.
  • They do same thing a TCP or UDP server port would do, which is to allow a server to respond to the client request.

What does Ingress and Egress mean in networking?

Extracted from Aviatrix

  • Egress: traffic that exits an entity or a network boundary
  • Ingress: traffic that enters the boundary of a network.
  • In the cloud, Egress still means traffic that is leaving from inside the private network out to public internet
  • In cloud, Ingress refers to unsolicited traffic sent from an address in public Internet to the private network - it is not a response to a request initiated by an inside system
  • Firewalls are designed to decline this request unless there is a specific rule and configuration that allows ingress connections.

What is an Elastic IP?

  • A permanent IP for your instance.
  • Public static IPv4 address which is reachable from the Internet.
  • When launching en EC2 instance within the VPC, you can receive a Public IP.
  • Once you stop that instance and restart the instance you get a new Public IP for the same instance.
  • To overcome this problem, we attach an Elastic IP to an instance which doesn't change after you stop/start the instance.
  • Useful if you regularly SSH into an instance but AWS want to discourage people from holding onto Elastic IPs that are not in use.