Wildcard Masks vs Subnet Masks

Amol,networking

Introduction

As I was brushing my networking concepts, one concept that initially confused me was the use of wildcard masks. My journey into understanding their application and significance has been helped me understand them better and why they are used. Initially, I found myself comparing wildcard masks to subnet masks. Wondering why they wildcard masks were needed in the first place when subnet masks could achieve the same purpose. Subnet masks were clear-cut for me, dividing networks into identifiable segments. I soon learned wildcard masks seemed to play by different rules. They weren't about segmenting but more about flexibility and pattern recognition within a network.

Subnet Masks vs. Wildcard Masks

This (opens in a new tab) post really cleared things up for me. Subnet masks have always been straightforward: they help identify the network and host portions of an IP address. But when it came to wildcard masks, I learned they serve a unique purpose in dynamic contexts such as ACLs and routing protocols. They are about specifying which bits in an address should be examined and which should be ignored – an entirely different approach from subnet masks.

For example, in a subnet mask 255.255.255.0, the focus is on the network portion defined by the first three octets. Conversely, a wildcard mask like 0.0.0.255 in an ACL rule would indicate that the last octet can vary, allowing for a range of IP addresses to be matched.

Exploring Use Cases: Wildcard Masks in Action

The clarity came with practical examples. Let's say you're working with a network 192.168.10.0/24 and want to configure an ACL to permit traffic from even-numbered IP addresses. A wildcard mask like 0.0.0.254 would be the key, focusing on the last bit of the address. Letting the text I linked earlier explain it a bit:

Let say we need to route all even networks in the 192.168.0.0 block of space. Where can we match within the third octet that will allow us to do this. Once again we need to break it out in binary to see it more clearly.

192.168.1. ---- binary 00000001
192 168.0. ---- binary 00000000
192.168.2. ---- binary 00000010
192.168.3. ---- binary 00000011
192.168.4. ---- binary 00000100
192.168.5. ---- binary 00000101
192.168.6. ---- binary 00000110
192.168.7. ---- binary 00000111

If look you can see the last bit of the third octet (bit 24) is a zero for every even network. The value for this bit is 1. We can match on this last bit to target the even network by taking the inverse of 1 to get 254. (255-1).

The wild card mask for this would be 0.0.254.255.

In a real-world ACL configuration, it might be implemented as:

access-list 100 permit ip 192.168.10.0 0.0.0.254 any

This configuration highlights the precision and specificity wildcard masks bring to network management, something I had initially overlooked.

Conclusion

My deep dive into wildcard masks transformed my perspective on network configuration. It brought me clarity, underscoring the importance of understanding the nuances of networking tools. Wildcard masks, once a puzzling concept, are now an integral part of my toolkit for targeted network configuration.