Common ports and services
Well-known services that come up often during firewall review, ACL work, and flow verification.
| Port | Protocol | Service | Notes |
|---|
A browser-only toolkit for referencing, planning, troubleshooting, and verifying common network tasks. Everything runs locally in the page: subnet math, VLSM allocation, route summarization, config generation, validation, quick references, and config comparison. No probes are sent from the browser, so live tests like ping, SNMP, traceroute, and packet capture still need your terminal or platform tooling.
Searchable quick references for common ports, subnet masks, commands, and frequently used IPv4/IPv6 ranges.
Well-known services that come up often during firewall review, ACL work, and flow verification.
| Port | Protocol | Service | Notes |
|---|
Fast lookup for masks, wildcard masks, address counts, and usable host counts.
| Prefix | Mask | Wildcard | Total | Usable |
|---|
Quick operational commands grouped across common platforms for show, trace, and lookup workflows.
Ranges you repeatedly need for design review, filtering decisions, and sanity checks.
192.0.2.0/24, 198.51.100.0/24, and 203.0.113.0/24
are ideal for examples and runbooks because they are not routed on the public Internet.
Design and pre-change helpers for subnetting, summarization, allocation, and interface config generation.
Enter an IPv4 address plus prefix or mask to compute the full network boundary and host range.
Paste newline-separated CIDRs and collapse them into the smallest exact covering set.
Allocate largest-first subnets from a parent CIDR. Use one requirement per line: Name, hosts.
| Name | Need | Allocated | Mask | Usable | Host range |
|---|
Generate a starting interface template for Cisco IOS, Cisco NX-OS, or Junos.
Symptom-driven checklists to reduce missed layers and speed up structured triage.
Pick a symptom to get likely causes, first checks, command ideas, and verification targets.
A condensed path that keeps first response disciplined before diving into protocol-level detail.
Validate inputs, normalize values, and compare expected vs. actual config or inventory lines.
Paste one value and check whether it matches common network objects such as IPs, MACs, VLAN IDs, ASNs, and hostnames.
Compare two lists of lines to spot missing and extra statements regardless of order.