We'd like to remind Forumites to please avoid political debate on the Forum... Read More »
We're aware that some users are experiencing technical issues which the team are working to resolve. See the Community Noticeboard for more info. Thank you for your patience.
📨 Have you signed up to the Forum's new Email Digest yet? Get a selection of trending threads sent straight to your inbox daily, weekly or monthly!
IP address blocked by MSE
Options
Comments
-
onomatopoeia99 wrote: »Having a public IPv4 address does not mean that it is not behind a firewall
.
Errm - yes it does - that's exactly what it means0 -
This morning I am getting plagued by Captchas on this site (MSE), and they(cloudfare) are trying to point me to add PrivacyPass add-on for Firefox/Chrome ... as if :eek:..
- Access your data for all websites
- Access browser tabs
- Access browser activity during navigation
4.8kWp 12x400W Longhi 9.6 kWh battery Giv-hy 5.0 Inverter, WSW facing Essex . Aint no sunshine ☀️ Octopus gas fixed dec 24 @ 5.74 tracker again+ Octopus Intelligent Flux leccy0 -
Errm - yes it does - that's exactly what it means4.8kWp 12x400W Longhi 9.6 kWh battery Giv-hy 5.0 Inverter, WSW facing Essex . Aint no sunshine ☀️ Octopus gas fixed dec 24 @ 5.74 tracker again+ Octopus Intelligent Flux leccy0
-
debitcardmayhem wrote: »No it doesn't, the printer is not necessarily directly connected to the internet.
BUT, if you set up the public IP address directly on your device, then there can't be any firewall, simply because a public IP address is unique, if it goes to device A it can't go to device B at the same time.
To clarify further, many HP printers have something like this in their web interface:
http://IP_OF_PRINTER/hp/device/this.LCDispatcher
Do a Google search with the 'hp/device/this.LCDispatcher' string and see how many printers you get with a public IP address assigned to them.0 -
debitcardmayhem wrote: »No it doesn't, the printer is not necessarily directly connected to the internet.
So if its behind a firewall then it will be accessed via the firewall IP with a port forward, not its own public IP
Come on Debit - put your thinking cap on - you cant have a public IP inside a subnet on your network .. It doesnt work like that !0 -
BUT, if you set up the public IP address directly on your device, then there can't be any firewall, simply because a public IP address is unique, if it goes to device A it can't go to device B at the same time.So if its behind a firewall then it will be accessed via the firewall IP with a port forward, not its own public IP!
Neither of these are true. You could either have a firewall on the printer, or use a firewall on the subnets gateway that performs filtering without providing NAT.0 -
Neither of these are true. You could either have a firewall on the printer, or use a firewall on the subnets gateway that performs filtering without providing NAT.
If you set up a public IP address on your printer, then your printer will have DIRECT ACCESS to the internet (and vice-versa). If the printer has an integrated firewall (??) or can make decaf lattes, doesn't concern me. The fact is that you have a printer which is directly facing the internet (which is something that, 99% of the cases is useless, a security flaw and unnecessary).
Firewall on the subnets gateway? If I understand what you mean, then what's got the public IP address is the gateway, NOT the printer.0 -
Neither of these are true. You could either have a firewall on the printer, or use a firewall on the subnets gateway that performs filtering without providing NAT.
^^ OK so some printers have a very basic firewall built in that can restrict access to certain IP addresses but that is being really pedantic as it is one in the same device ..
As for your other comment, what subnet's gateway would that be ??
You have access to internet infrastructure do you ?
You have clearly either misunderstood - or have no clue of what you are talking about
edited to include original quote0 -
It seems to work OK on my network
I run a few servers at home for which I've purchased a /29 block of addresses, for this example lets call it 1.1.1.0/29. This gives me 8 different addresses (1.1.1.0-7), 6 of which are usable (.0 and .7 are reserved for the subnet ID and broadcast addresses respectively).
As the 1.1.1.1 machine which I use as the gateway for the rest of the subnet is the only one physically connected to a WAN connection then all inbound traffic hitting machines .{2-6} has to pass through it, meaning it can perform firewall functions for the rest of the subnet.
As I say, it's worked for me blocking inbound requests to my public IP's for years now.0 -
It seems to work OK on my network
I run a few servers at home for which I've purchased a /29 block of addresses, for this example lets call it 1.1.1.0/29. This gives me 8 different addresses (1.1.1.0-7), 6 of which are usable (.0 and .7 are reserved for the subnet ID and broadcast addresses respectively).
As the 1.1.1.1 machine which I use as the gateway for the rest of the subnet is the only one physically connected to a WAN connection then all inbound traffic hitting machines .{2-6} has to pass through it, meaning it can perform firewall functions for the rest of the subnet.
As I say, it's worked for me blocking inbound requests to my public IP's for years now.
You can get a similar set up with one IP only, if you move one device to the DMZ. All the connections to your (public) IP address will go to that device, but that's not because that device is using your public IP, rather the firewall is forwarding all the traffic to that (internal) address.0
This discussion has been closed.
Confirm your email address to Create Threads and Reply

Categories
- All Categories
- 350.9K Banking & Borrowing
- 253.1K Reduce Debt & Boost Income
- 453.5K Spending & Discounts
- 243.9K Work, Benefits & Business
- 598.7K Mortgages, Homes & Bills
- 176.9K Life & Family
- 257.2K Travel & Transport
- 1.5M Hobbies & Leisure
- 16.1K Discuss & Feedback
- 37.6K Read-Only Boards