Menu
Home Explore People Places Arts History Plants & Animals Science Life & Culture Technology
On this page
Private network
Network using private IP addresses

In Internet networking, a private network uses a private address space of IP addresses, commonly deployed in local area networks such as homes and offices. Both IPv4 and IPv6 define private ranges that are not routable on the Internet. Since ISPs typically provide only one public IP per customer, a network address translator (NAT) enables multiple devices to share Internet access. Private addresses enhance network security by preventing external hosts from initiating direct connections. These addresses require no approval from regional or local Internet registries and help alleviate IPv4 address exhaustion. They are widely used in corporate networks often with proxy servers to control Internet access internally.

We don't have any images related to Private network yet.
We don't have any YouTube videos related to Private network yet.
We don't have any PDF documents related to Private network yet.
We don't have any Books related to Private network yet.
We don't have any archived web articles related to Private network yet.

Private IPv4 addresses

The Internet Engineering Task Force (IETF) has directed the Internet Assigned Numbers Authority (IANA) to reserve the following IPv4 address ranges for private networks:3: 4 

RFC 1918 nameIP address rangeNumber of addressesLargest CIDR block (subnet mask)Host ID sizeMask bitsClassful description4
24-bit block10.0.0.0 – 10.255.255.2551677721610.0.0.0/8 (255.0.0.0)24 bits8 bitssingle class A network
20-bit block172.16.0.0 – 172.31.255.2551048576172.16.0.0/12 (255.240.0.0)20 bits12 bits16 contiguous class B networks
16-bit block192.168.0.0 – 192.168.255.25565536192.168.0.0/16 (255.255.0.0)16 bits16 bits256 contiguous class C networks

In practice, it is common to subdivide these ranges into smaller subnets.

Dedicated space for carrier-grade NAT deployment

Main article: IPv4 shared address space

In April 2012, IANA allocated the 100.64.0.0/10 block of IPv4 addresses specifically for use in carrier-grade NAT scenarios.5

IP address rangeNumber of addressesLargest CIDR block (subnet mask)Host ID sizeMask bits
100.64.0.0 – 100.127.255.2554194304100.64.0.0/10 (255.192.0.0)22 bits10 bits

This address block should not be used on private networks or on the public Internet. The size of the address block was selected to be large enough to uniquely number all customer access devices for all of a single operator's points of presence in a large metropolitan area such as Tokyo.6

Private IPv6 addresses

Main article: Unique local address

The concept of private networks has been extended in the next generation of the Internet Protocol, IPv6, and special address blocks are reserved.

The address block fc00::/7 is reserved by IANA for unique local addresses (ULAs).7 They are unicast addresses, but contain a 40-bit random number in the routing prefix to prevent collisions when two private networks are interconnected. Despite being inherently local in usage, the IPv6 address scope of unique local addresses is global.

The first block defined is fd00::/8, designed for /48 routing blocks, in which users can create multiple subnets, as needed.

RFC 4193 BlockPrefix/LGlobal ID (random)Subnet IDNumber of addresses in subnet
48 bits16 bits64 bits
fd00::/8fdxx:xxxx:xxxxyyyy18446744073709551616

Examples:

Prefix/LGlobal ID (random)Subnet IDInterface IDAddressSubnet
fdxx:xxxx:xxxxyyyyzzzz:zzzz:zzzz:zzzzfdxx:xxxx:xxxx:yyyy:zzzz:zzzz:zzzz:zzzzfdxx:xxxx:xxxx:yyyy::/64
fd12:3456:789a00010000:0000:0000:0001fd12:3456:789a:1::1fd12:3456:789a:1::/64

A former standard proposed the use of site-local addresses in the fec0::/10 block, but because of scalability concerns and poor definition of what constitutes a site, its use has been deprecated since September 2004.8

Main article: Link-local address

Another type of private networking uses the link-local address range. The validity of link-local addresses is limited to a single link; e.g. to all computers connected to a switch, or to one wireless network. Hosts on different sides of a network bridge are also on the same link, whereas hosts on different sides of a network router are on different links.

IPv4

In IPv4, the utility of link-local addresses is in zero-configuration networking when Dynamic Host Configuration Protocol (DHCP) services are not available and manual configuration by a network administrator is not desirable. The block 169.254.0.0/16 was allocated for this purpose.910 If a host on an IEEE 802 (Ethernet) network cannot obtain a network address via DHCP, an address from 169.254.1.0 to 169.254.254.25511 may be assigned pseudorandomly. The standard prescribes that address collisions must be handled gracefully.

IPv6

In IPv6, the block fe80::/10 is reserved for IP address autoconfiguration.12 The implementation of these link-local addresses is mandatory, as various functions of the IPv6 protocol depend on them.13

Loopback interface

A special case of private link-local addresses is the loopback interface. These addresses are private and link-local by definition since packets never leave the host device.

IPv4 reserves the entire class A address block 127.0.0.0/8 for use as private loopback addresses. IPv6 reserves the single address ::1.

Some are advocating reducing 127.0.0.0/8 to 127.0.0.0/16.14

Misrouting

It is common for packets originating in private address spaces to be misrouted onto the Internet. Private networks often do not properly configure DNS services for addresses used internally and attempt reverse DNS lookups for these addresses, causing extra traffic to the Internet root nameservers. The AS112 project attempted to mitigate this load by providing special black hole anycast nameservers for private address ranges which only return negative result codes (not found) for these queries.

Organizational edge routers are usually configured to drop ingress IP traffic for these networks, which can occur either by misconfiguration or from malicious traffic using a spoofed source address. Less commonly, ISP edge routers drop such egress traffic from customers, which reduces the impact to the Internet of such misconfigured or malicious hosts on the customer's network.

Merging private networks

Since the private IPv4 address space is relatively small, many private IPv4 networks unavoidably use the same address ranges. This can create a problem when merging such networks, as some addresses may be duplicated for multiple devices. In this case, networks or hosts must be renumbered, often a time-consuming task or a network address translator must be placed between the networks to translate or masquerade one of the address ranges.

IPv6 defines unique local addresses,15 providing a very large private address space from which each organization can randomly or pseudo-randomly allocate a 40-bit prefix, each of which allows 65536 organizational subnets. With space for about one trillion (1012) prefixes, it is unlikely that two network prefixes in use by different organizations would be the same, provided each of them was selected randomly, as specified in the standard. When two such private IPv6 networks are connected or merged, the risk of an address conflict is therefore virtually absent.

RFC documents

  • RFC 1918Address Allocation for Private Internets
  • RFC 2036Observations on the use of Components of the Class A Address Space within the Internet
  • RFC 7020The Internet Number Registry System
  • RFC 2101IPv4 Address Behaviour Today
  • RFC 2663IP Network Address Translator (NAT) Terminology and Considerations
  • RFC 3022Traditional IP Network Address Translator (Traditional NAT)
  • RFC 3330Special-Use IPv4 Addresses (superseded)
  • RFC 3879Deprecating Site Local Addresses
  • RFC 3927Dynamic Configuration of IPv4 Link-Local Addresses
  • RFC 4193Unique Local IPv6 Unicast Addresses
  • RFC 5735Special-Use IPv4 Addresses (superseded)
  • RFC 6598Reserved IPv4 Prefix for Shared Address Space
  • RFC 6890Special-Purpose IP Address Registries

See also

Notes

References

  1. Y. Rekhter; B. Moskowitz; D. Karrenberg; G. J. de Groot; E. Lear (February 1996). Address Allocation for Private Internets. Network Working Group. doi:10.17487/RFC1918. BCP 5. RFC 1918. Best Current Practice 5. Obsoletes RFC 1627 and 1597. Updated by RFC 6761. /wiki/Yakov_Rekhter

  2. R. Hinden; B. Haberman (October 2005). Unique Local IPv6 Unicast Addresses. Network Working Group. doi:10.17487/RFC4193. RFC 4193. Proposed Standard. https://datatracker.ietf.org/doc/html/rfc4193

  3. Y. Rekhter; B. Moskowitz; D. Karrenberg; G. J. de Groot; E. Lear (February 1996). Address Allocation for Private Internets. Network Working Group. doi:10.17487/RFC1918. BCP 5. RFC 1918. Best Current Practice 5. Obsoletes RFC 1627 and 1597. Updated by RFC 6761. /wiki/Yakov_Rekhter

  4. Classful addressing is obsolete and has not been used in the Internet since the implementation of Classless Inter-Domain Routing (CIDR), starting in 1993. For example, while 10.0.0.0/8 was a single class A network, it is common for organizations to divide it into smaller /16 or /24 networks. Contrary to a common misconception, a /16 subnet of a class A network is not referred to as a class B network. Likewise, a /24 subnet of a class A or B network is not referred to as a class C network. The class is determined by the first three bits of the prefix.[3] /wiki/Classful_addressing

  5. J. Weil; V. Kuarsingh; C. Donley; C. Liljenstolpe; M. Azinger (April 2012). IANA-Reserved IPv4 Prefix for Shared Address Space. Internet Engineering Task Force. doi:10.17487/RFC6598. ISSN 2070-1721. BCP 153. RFC 6598. Best Current Practice 153. Updates RFC 5735. https://datatracker.ietf.org/doc/html/rfc6598

  6. J. Weil; V. Kuarsingh; C. Donley; C. Liljenstolpe; M. Azinger (April 2012). IANA-Reserved IPv4 Prefix for Shared Address Space. Internet Engineering Task Force. doi:10.17487/RFC6598. ISSN 2070-1721. BCP 153. RFC 6598. Best Current Practice 153. Updates RFC 5735. https://datatracker.ietf.org/doc/html/rfc6598

  7. R. Hinden; B. Haberman (October 2005). Unique Local IPv6 Unicast Addresses. Network Working Group. doi:10.17487/RFC4193. RFC 4193. Proposed Standard. https://datatracker.ietf.org/doc/html/rfc4193

  8. C. Huitema; B. Carpenter (September 2004). Deprecating Site Local Addresses. Network Working Group. doi:10.17487/RFC3879. RFC 3879. Proposed Standard. /wiki/Christian_Huitema

  9. M. Cotton; L. Vegoda; B. Haberman (April 2013). R. Bonica (ed.). Special-Purpose IP Address Registries. Internet Engineering Task Force. doi:10.17487/RFC6890. ISSN 2070-1721. BCP 153. RFC 6890. Best Current Practice 153. Obsoletes RFC 4773, 5156, 5735 and 5736. Updated by RFC 8190. https://datatracker.ietf.org/doc/html/rfc6890

  10. S. Cheshire; B. Aboba; E. Guttman (May 2005). Dynamic Configuration of IPv4 Link-Local Addresses. Network Working Group. doi:10.17487/RFC3927. RFC 3927. Proposed Standard. /wiki/Stuart_Cheshire

  11. The first and last /24 subranges of the subnet (addresses 169.254.0.0 through 169.254.0.255 and 169.254.255.0 through 169.254.255.255) are reserved for future use.[7]: §2.1

  12. R. Hinden; S. Deering (February 2006). IP Version 6 Addressing Architecture. Network Working Group. doi:10.17487/RFC4291. RFC 4291. Draft Standard. Obsoletes RFC 3513. Updated by RFC 5952, 6052, 7136, 7346, 7371 and 8064. /wiki/Steve_Deering

  13. S. Thomson; T. Narten; T. Jinmei (September 2007). IPv6 Stateless Address Autoconfiguration. Network Working Group. doi:10.17487/RFC4862. RFC 4862. Draft Standard. Obsoletes RFC 2462. Updated by RFC 7527. https://datatracker.ietf.org/doc/html/rfc4862

  14. I-D draft-schoen-intarea-unicast-127-06. https://datatracker.ietf.org/doc/html/draft-schoen-intarea-unicast-127-06

  15. R. Hinden; B. Haberman (October 2005). Unique Local IPv6 Unicast Addresses. Network Working Group. doi:10.17487/RFC4193. RFC 4193. Proposed Standard. https://datatracker.ietf.org/doc/html/rfc4193