Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Private network

From Wikipedia, the free encyclopedia
(Redirected fromPrivate address)
Network using private IP addresses

InInternet networking, aprivate network is acomputer network that uses a privateaddress space ofIP addresses. These addresses are commonly used forlocal area networks (LANs) in residential, office, and enterprise environments. Both theIPv4 and theIPv6 specifications defineprivate IP address ranges.[1][2]

MostInternet service providers (ISPs) allocate only a single publiclyroutable IPv4 address to each residential customer, but many homes have more than onecomputer,smartphone, or other Internet-connected device. In this situation, anetwork address translator (NAT/PAT) gateway is usually used to provide Internet connectivity to multiple hosts. Private addresses are also commonly used incorporate networks which, for security reasons, are not connected directly to theInternet. Often aproxy,SOCKS gateway, or similar devices are used to provide restricted Internet access to network-internal users.

Private network addresses are not allocated to any specific organization. Anyone may use these addresses without approval fromregional or local Internet registries.Private IP address spaces were originally defined to assist in delayingIPv4 address exhaustion.IP packets originating from or addressed to a private IP address cannot be routed through the public Internet.

Private addresses are often seen as enhancingnetwork security for the internal network since use of private addresses internally makes it difficult for an external host to initiate a connection to an internal system.

Private IPv4 addresses

[edit]

TheInternet Engineering Task Force (IETF) has directed theInternet Assigned Numbers Authority (IANA) toreserve the following IPv4 address ranges for private networks:[1]: 4 

RFC 1918 nameIP address rangeNumber of addressesLargestCIDR block (subnet mask)Host ID sizeMask bitsClassful description[Note 1]
24-bit block10.0.0.0 – 10.255.255.2551677721610.0.0.0/8 (255.0.0.0)24 bits8 bitssingle class A network
20-bit block172.16.0.0 – 172.31.255.2551048576172.16.0.0/12 (255.240.0.0)20 bits12 bits16 contiguous class B networks
16-bit block192.168.0.0 – 192.168.255.25565536192.168.0.0/16 (255.255.0.0)16 bits16 bits256 contiguous class C networks

In practice, it is common to subdivide these ranges into smallersubnets.

Dedicated space for carrier-grade NAT deployment

[edit]
Main article:IPv4 shared address space

In April 2012, IANA allocated the100.64.0.0/10 block of IPv4 addresses specifically for use incarrier-grade NAT scenarios.[4]

IP address rangeNumber of addressesLargestCIDR block (subnet mask)Host ID sizeMask bits
100.64.0.0 – 100.127.255.2554194304100.64.0.0/10 (255.192.0.0)22 bits10 bits

This address block should not be used on private networks or on the public Internet. The size of the address block was selected to be large enough to uniquely number all customer access devices for all of a single operator'spoints of presence in a large metropolitan area such asTokyo.[4]

Private IPv6 addresses

[edit]
Main article:Unique local address

The concept of private networks has been extended in the next generation of theInternet Protocol,IPv6, and special address blocks are reserved.

The address blockfc00::/7 is reserved by IANA for unique local addresses (ULAs).[2] They areunicast addresses, but contain a 40-bit random number in the routing prefix to prevent collisions when two private networks are interconnected. Despite being inherentlylocal in usage, theIPv6 address scope of unique local addresses is global.

The first block defined isfd00::/8, designed for/48 routing blocks, in which users can create multiple subnets, as needed.

RFC 4193 BlockPrefix/LGlobal ID (random)Subnet IDNumber of addresses in subnet
48 bits16 bits64 bits
fd00::/8fdxx:xxxx:xxxxyyyy18446744073709551616

Examples:

Prefix/LGlobal ID (random)Subnet IDInterface IDAddressSubnet
fdxx:xxxx:xxxxyyyyzzzz:zzzz:zzzz:zzzzfdxx:xxxx:xxxx:yyyy:zzzz:zzzz:zzzz:zzzzfdxx:xxxx:xxxx:yyyy::/64
fd12:3456:789a00010000:0000:0000:0001fd12:3456:789a:1::1fd12:3456:789a:1::/64

A former standard proposed the use ofsite-local addresses in thefec0::/10 block, but because of scalability concerns and poor definition of what constitutes asite, its use has been deprecated since September 2004.[5]

Link-local addresses

[edit]
Main article:Link-local address

Another type of private networking uses the link-local address range. The validity of link-local addresses is limited to a single link; e.g. to all computers connected to aswitch, or to onewireless network. Hosts on different sides of anetwork bridge are also on the same link, whereas hosts on different sides of anetwork router are on different links.

IPv4

[edit]

InIPv4, the utility of link-local addresses is inzero-configuration networking whenDynamic Host Configuration Protocol (DHCP) services are not available and manual configuration by a network administrator is not desirable. The block169.254.0.0/16 was allocated for this purpose.[6][7] If a host on an IEEE 802 (Ethernet) network cannot obtain a network address via DHCP, an address from169.254.1.0 to169.254.254.255[Note 2] may be assignedpseudorandomly. The standard prescribes that address collisions must be handled gracefully.

IPv6

[edit]

InIPv6, the blockfe80::/10 is reserved for IP address autoconfiguration.[8]The implementation of these link-local addresses is mandatory, as various functions of the IPv6 protocol depend on them.[9]

Loopback interface

[edit]

A special case of private link-local addresses is theloopback interface. These addresses are private and link-local by definition since packets never leave the host device.

IPv4 reserves the entire class A address block127.0.0.0/8 for use as private loopback addresses. IPv6 reserves the single address::1.

Some are advocating reducing127.0.0.0/8 to127.0.0.0/16.[10]

Misrouting

[edit]

It is common for packets originating in private address spaces to be misrouted onto the Internet. Private networks often do not properly configureDNS services for addresses used internally and attemptreverse DNS lookups for these addresses, causing extra traffic to the Internetroot nameservers. TheAS112 project attempted to mitigate this load by providing specialblack holeanycast nameservers for private address ranges which only return negative result codes (not found) for these queries.

Organizational edge routers are usually configured to drop ingress IP traffic for these networks, which can occur either by misconfiguration or from malicious traffic using a spoofed source address. Less commonly, ISP edge routers drop such egress traffic from customers, which reduces the impact to the Internet of such misconfigured or malicious hosts on the customer's network.

Merging private networks

[edit]

Since the private IPv4 address space is relatively small, many private IPv4 networks unavoidably use the same address ranges. This can create a problem when merging such networks, as some addresses may be duplicated for multiple devices. In this case, networks or hosts must be renumbered, often a time-consuming task or a network address translator must be placed between the networks to translate or masquerade one of the address ranges.

IPv6 definesunique local addresses,[2] providing a very large private address space from which each organization can randomly or pseudo-randomly allocate a 40-bit prefix, each of which allows 65536 organizational subnets. With space for about one trillion (1012) prefixes, it is unlikely that two network prefixes in use by different organizations would be the same, provided each of them was selected randomly, as specified in the standard. When two such private IPv6 networks are connected or merged, the risk of an address conflict is therefore virtually absent.

RFC documents

[edit]
  • RFC 1918Address Allocation for Private Internets
  • RFC 2036Observations on the use of Components of the Class A Address Space within the Internet
  • RFC 7020The Internet Number Registry System
  • RFC 2101IPv4 Address Behaviour Today
  • RFC 2663IP Network Address Translator (NAT) Terminology and Considerations
  • RFC 3022Traditional IP Network Address Translator (Traditional NAT)
  • RFC 3330Special-Use IPv4 Addresses (superseded)
  • RFC 3879Deprecating Site Local Addresses
  • RFC 3927Dynamic Configuration of IPv4 Link-Local Addresses
  • RFC 4193Unique Local IPv6 Unicast Addresses
  • RFC 5735Special-Use IPv4 Addresses (superseded)
  • RFC 6598Reserved IPv4 Prefix for Shared Address Space
  • RFC 6890Special-Purpose IP Address Registries

See also

[edit]

Notes

[edit]
  1. ^Classful addressing is obsolete and has not been used in the Internet since the implementation ofClassless Inter-Domain Routing (CIDR), starting in 1993. For example, while10.0.0.0/8 was a single class A network, it is common for organizations to divide it into smaller/16 or/24 networks. Contrary to a common misconception, a/16subnet of a class A network is not referred to as a class B network. Likewise, a/24 subnet of a class A or B network is not referred to as a class C network. The class is determined by the first three bits of the prefix.[3]
  2. ^The first and last/24 subranges of the subnet (addresses169.254.0.0 through169.254.0.255 and169.254.255.0 through169.254.255.255) are reserved for future use.[7]: §2.1 

References

[edit]
  1. ^abY. Rekhter; B. Moskowitz; D. Karrenberg; G. J. de Groot; E. Lear (February 1996).Address Allocation for Private Internets. Network Working Group.doi:10.17487/RFC1918. BCP 5. RFC1918.Best Current Practice 5. ObsoletesRFC 1627 and1597. Updated byRFC 6761.
  2. ^abcR. Hinden; B. Haberman (October 2005).Unique Local IPv6 Unicast Addresses. Network Working Group.doi:10.17487/RFC4193.RFC4193.Proposed Standard.
  3. ^Forouzan, Behrouz (2013).Data Communications and Networking. New York: McGraw Hill. pp. 530–31.ISBN 978-0-07-337622-6.
  4. ^abJ. Weil; V. Kuarsingh; C. Donley; C. Liljenstolpe; M. Azinger (April 2012).IANA-Reserved IPv4 Prefix for Shared Address Space.Internet Engineering Task Force.doi:10.17487/RFC6598.ISSN 2070-1721. BCP 153. RFC6598.Best Current Practice 153. UpdatesRFC 5735.
  5. ^C. Huitema;B. Carpenter (September 2004).Deprecating Site Local Addresses. Network Working Group.doi:10.17487/RFC3879.RFC3879.Proposed Standard.
  6. ^M. Cotton; L. Vegoda; B. Haberman (April 2013). R. Bonica (ed.).Special-Purpose IP Address Registries.Internet Engineering Task Force.doi:10.17487/RFC6890.ISSN 2070-1721. BCP 153. RFC6890.Best Current Practice 153. ObsoletesRFC 4773,5156,5735 and5736. Updated byRFC 8190.
  7. ^abS. Cheshire; B. Aboba; E. Guttman (May 2005).Dynamic Configuration of IPv4 Link-Local Addresses. Network Working Group.doi:10.17487/RFC3927.RFC3927.Proposed Standard.
  8. ^R. Hinden;S. Deering (February 2006).IP Version 6 Addressing Architecture. Network Working Group.doi:10.17487/RFC4291.RFC4291.Draft Standard. ObsoletesRFC 3513. Updated byRFC 5952,6052,7136,7346,7371 and8064.
  9. ^S. Thomson; T. Narten; T. Jinmei (September 2007).IPv6 Stateless Address Autoconfiguration. Network Working Group.doi:10.17487/RFC4862.RFC4862.Draft Standard. ObsoletesRFC 2462. Updated byRFC 7527.
  10. ^I-D draft-schoen-intarea-unicast-127-06.
Retrieved from "https://en.wikipedia.org/w/index.php?title=Private_network&oldid=1273460890"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp