Specifications

CHAPTER 7 Networking
253
Address Use on a Host-Only Network
Address Use on a NAT Network
Avoiding IP Packet Leakage in a Host-Only Network
By design, each host-only network should be confined to the host machine on which
it is set up. That is, no packets sent by virtual machines on this network should leak out
to a physical network attached to the host. Packet leakage can occur only if a machine
actively forwards packets. It is possible for the host machine or any virtual machine
running on the host-only network to be configured in a way that permits packet
leakage.
Windows Hosts
Systems using server versions of Windows 2000 are capable of forwarding IP packets
that are not addressed to them. By default, however, these systems come with IP
packet forwarding disabled.
If you find packets leaking out of a host-only network on a Windows 2000 host
computer, check to see if forwarding has been enabled on the host machine. If it is
enabled, disable it.
Choose Start > Programs > Administrative Tools > Routing and Remote Access. An
icon on the left is labeled with the host name. If a green dot appears over the icon, IP
Range Address use Example
<net>.1 Host machine 192.168.0.1
<net>.2–<net>.127 Static addresses 192.168.0.2–192.168.0.127
<net>.128–<net>.253 DHCP-assigned 192.168.0.128–192.168.0.253
<net>.254 DHCP server 192.168.0.254
<net>.255 Broadcasting 192.168.0.255
Range Address use Example
<net>.1 Host machine 192.168.0.1
<net>.2 NAT device 192.168.0.2
<net>.3–<net>.127 Static addresses 192.168.0.3–192.168.0.127
<net>.128–<net>.253 DHCP-assigned 192.168.0.128–192.168.0.253
<net>.254 DHCP server 192.168.0.254
<net>.255 Broadcasting 192.168.0.255