Book now with code EOY2025
new2net wrote: » Hey I have 2 IP Address Questions: (1) I just noticed my ISP assigned my Linksys home router a 255.255.254.0 maks with a Class A address. I am on cable. Does this mean that there are 510 other hosts on my network? I can't see the logic behind this...
new2net wrote: » (2) If a company buys a Class B Address from an ISP, such as 130.10.0.0/16. That means the company has that address to use internally. So at the company's site, the Fa0 interface of the router would be 130.10.0.1, and all the hosts would be assigned accordingly. But what address would sit between the ISP and the company? Would it have to come from the 130.10.0.0 block? I think this might relate to VLSM somehow... Thank you in advance.
tim100 wrote: » ISP Router (192.168.5.1/30) <---> Your Router's F0/1 (192.168.5.2/30) --- Your Router's F0/0 (130.10.1.1/24) (If you subnet) Then your ISP would route the 130.10.0.0/16 network to 192.168.5.2
new2net wrote: » Thank you...so they will actually use a private IP (between the ISP and your router)?
tim100 wrote: » That was just an example. It wouldn't be from the private IP address space.
SysAdmin4066 wrote: » There would really be no need for any company to buy a class b range, unless you were a smaller ISP that is selling the addresses. Any other reason would be unwise, as using public addresses for desktops would put them into the internet routing table, which would allow them to be accesses externally possibly. Bad idea, needless costs, all things that business should typically let happen lol.
SysAdmin4066 wrote: » Our provider at work is another county agency. All of the "external addresses" are RFC 1918 addresses of the same subnet. Semantics basically though, as regardless, 1918 addresses arent in the internet route table. So it doesnt matter, at some point, there has to be a corresponding globally unique address. Basically you would only BUY addresses that are external for external use. If you needed a class B range you would subnet the private range you want to use to fit your needs. For example, the 10.0.0.0 network supports up to 16,777,216 hosts theoretically. Internally, the RFC 1918 addresses would suffice. You would only need global addresses when the device needs to be directly accessed by the outside world, and even then, NAT/PAT could be used. There would really be no need for any company to buy a class b range, unless you were a smaller ISP that is selling the addresses. Any other reason would be unwise, as using public addresses for desktops would put them into the internet routing table, which would allow them to be accesses externally possibly. Bad idea, needless costs, all things that business should typically let happen lol.
Forsaken_GA wrote: » As far as not putting things like desktops on public IP's.... hogwash. You seem to be implying that NAT provides some sort of security. It doesn't. Being on a public IP does not inherently place you in more danger. NAT'd machines still need things like anti-virus, malware scanners, and a firewall, either based on the host, or somewhere on the network in front of them. NAT is a hack, and while it does break direct connectivity (which has other annoying implications), just because I can't directly initiate a connection to your machine doesn't mean I can't exploit it. NAT does give you some degree of protection from having your network enumerated, but it's primary use is to extend the life of the ip4 address space. And I'm of the opinion that's maybe not such a good thing.
SysAdmin4066 wrote: » So what do you do if you change ISPs? Do you change your entire internal addressing? Or are you guys talking about using public addresses you dont actually own? Here's the scoop; Although NAT routers are not generally purchased for their security benefits, NAT routers CAN inherently function as very effective hardware firewalls. As a hardware firewall they prevent "unsolicited", unexpected, unwanted, and potentially annoying or dangerous traffic from the public Internet from passing through the router and entering the user's private LAN network. With multiple "internal" computers on the LAN behind the router, the router must know which internal computer should receive each incoming packet of data. Since ALL incoming packets of data have the same IP address (the single IP address of the router), the only way the router knows which computer should receive the incoming packet is if one of the internal computers on the private LAN FIRST sent data packets out to the source of the returning packets. I suppose if you also use NAT with your internal public addresses, you would reap the same benefits, but the problem of having to change addresses if you change ISPs is still there. That is unless you are using public addresses you dont actually own. Which in that case, why use public addressing at all? Can someone enlighten me on what the benefits of using public addressing internally are?
SysAdmin4066 wrote: » So what do you do if you change ISPs? Do you change your entire internal addressing?
SysAdmin4066 wrote: » So what do you do if you change ISPs? Do you change your entire internal addressing? Or are you guys talking about using public addresses you dont actually own?
Although NAT routers are not generally purchased for their security benefits, NAT routers CAN inherently function as very effective hardware firewalls. As a hardware firewall they prevent "unsolicited", unexpected, unwanted, and potentially annoying or dangerous traffic from the public Internet from passing through the router and entering the user's private LAN network.
With multiple "internal" computers on the LAN behind the router, the router must know which internal computer should receive each incoming packet of data. Since ALL incoming packets of data have the same IP address (the single IP address of the router), the only way the router knows which computer should receive the incoming packet is if one of the internal computers on the private LAN FIRST sent data packets out to the source of the returning packets.
SysAdmin4066 wrote: » And my argument about costs is also valid. Why purchase address space, when you dont have to? What is the benefit of not using NAT and just using public addressing?
SysAdmin4066 wrote: » Why purchase an address space when you can use private addressing internally? Give me a scenario of what your company does with public addressing so that I better understand.
Forsaken_GA wrote: » I don't think my company would appreciate it very much if I revealed details about the guts of our network on a public forum, so this is a request I'll decline. You'll have to do your own research.
Forsaken_GA wrote: » That's not necessarily true. I know for a fact that there are live implementations in the colo world where the colo provider just drops the wire in the customers cabinet, the customer hooks it up to their router, and the /30 between the two links is an RFC1918 address
Forsaken_GA wrote: » Once the traffic makes it inside your AS, it's fine to use RFC1918 space for your internal routing links, the requesting system doesn't care about any of that. If you're at 1.1.1.1 and trying to reach 2.2.2.2, and there's some 10 net links in between in my network, your end doesn't care - my internal routers know how to reach 2.2.2.2, and how to return that traffic to 1.1.1.1, so it's all good
SysAdmin4066 wrote: » Obviously without the specific information. You still havent told me WHY you would buy all public IP addressing. Seems grossly unneccessary, regardless of there being no benefit to NAT as you say. So, I'm trying to understand why you would do this, what the benefit of this would be? And if you were a consultant building this same network from scratch, would you have done the same thing?
tim100 wrote: » This is true but it is not common practice. If there will never be a VPN connection to that edge router or if you do not ever need to access the router from remote via SSH for management then yes you could use RFC1918 addressing.
SysAdmin4066 wrote: » So Tim, in your opinion, or in practice, do you use public addressing schemes internally when building from scratch?
SysAdmin4066 wrote: » What benefits do you see from using public addressing if so?
Forsaken_GA wrote: » In the particular case I'm thinking of, the customer had their own /24, which the colo provider was announcing for them. Then the colo provider just routed the /24 over the privately addressed /30. The customer could ssh into their router by using their /24's gateway IP as the destination. As a rule, they didn't, since they didn't want the router directly accessible, instead they would ssh into a server behind their router, and then use that server to access the router. Likewise, their VPN server was behind the router.
tim100 wrote: » In this type of scenario yes. It really depends on the customer's and/or ISPs preference and type of configuration etc... Many ISPs do use a /30 out of public IP space. If a customer decides to go with the "poor man's firewall/VPN" configuration with CBAC, NAT, Crypto Maps and what not on the router using an IOS firewall feature set or better with a zillion lines worth of configs then it will be a /30. I would highly advise against this type of configuration but it does exist and I have redesigned networks from this type of configuration but the /30 connection still remained.
tim100 wrote: » No. I see no reason to waste routable address space. None really. But of course there are autonomous systems that are using public addresses though. Alot of these autonomous systems are the ones that have been around for a very long time. When IPv4 addresses were not even near exhaustion. The old timers so to speak. If you are designing a network from the ground up nowadays it would be wise to use private addressing for internal links.
SysAdmin4066 wrote: » As for your comments regarding my education, I have a BS and an MS in IT, and so many certs I lose track of them. All earned with blood, sweat, and tears, literally and figuratively (purple heart from wounds suffered in combat in afghanistan on patrol). I've done network administration/infantry patrol with the greatest bunch of Warriors God has ever commissioned (USMC, urggh!) on the battlefields of Afghanistan, to systems administration in the civilian gov sector, with an emphasis on security policy (directory services). I've worked as a consultant both independantly and with a var as well as with private entities. All told, i've been in IT since 2000, and i'm 27 years young. I have paid my dues, served my country, and even learned a thing or two between here and there. So, how should I take your comment?
Use code EOY2025 to receive $250 off your 2025 certification boot camp!