Home / Network Fundamentals / Understanding Wild Card Masks

Understanding Wild Card Masks

wildcard maskMany engineers (at one time myself too) believe they understand wild card masks. If you ask someone they will most likely tell you that a wild card mask is just the opposite or reverse of a subnet mask. Unfortunately this isn’t quite correct. Yes, at first glance a wild card mask “looks” like the reverse and in some ways it really is. But a wild card mask can do so much more. I hope to explain in this article what a wild card is and how we can use it more effectively.

As the name states, a wild card mask matches (wildly with a zero) everything in the network portion of an IP address. As we dive into how this works it will becomes a bit more clear exactly how a wild card mask works and how we can use it.


So there are two basic rules of a wild card mask.

  • 0-bit = match
  • 1-bit = ignore


What can wild card masks target?

  • A single host (or a single IP address)
  • An entire network (i.e, Class A, B, or C)
  • An entire subnet
  • A range of IP addresses

Got it so far? …Good.  But, what does this mean? How does it work?

Keep reading…

Targeting a Single Host

To target a single host with a wild card means that every bit within the IP address of the host must match. The bit that means we are matching is a zero (0-bit).  So a wild card mask for a host would be —

Targeting an Entire Network

To target an entire network means that every bit within the NETWORK portion of the IP address must match.  All others we can ignore.  So for a Class-C network (i.e., the wild card mask would be —

Targeting a Subnet

To target a particular subnet (not classful) we will still need to match on  every bit on the NETWORK portion, however now we need to find the proper bit boundary in the last octet used by our network.  So for example we need to find the wild card mask for the network   The easiest way to do this is to simply subtract the subnet mask ( from minus equals a wild card mask of —

Targeting a Range of IP Addresses

To target a range of IP address is where we begin to see how the wild card mask is different from just a reverse of a subnet mask.  The same rules apply 0-match, 1-ignore.  If we have a range of through we can match at the 23rd bit.  This would allow only the two networks to be targeted.  The wild card mask would be

Writing this out in binary helps. We know we want to match on the entire 1st and 2nd octets.  That part is easy – both are zero’s.  Its the third octet that is the trick. Lets break that third octect out in binary

192 168.0.  ---- binary  00000000
192.168.1.  ---- binary  00000001

If you look here the bit we want to match on is the 23rd bit. The subnet mask for a slash 23 is  We then subtract it from to get our wild card which is

Pretty cool huh?

Target all even Networks or all odd Networks

With what we’ve learned so far, you might be able to see the possibilities.  So now lets take this one last step further.  Lets target just all even networks. (definitely a CCIE lab scenario)

Let say we need to route all even networks in the block of space. Where can we match within the third octet that will allow us to do this.  Once again we need to break it out in binary to see it more clearly.

192 168.0. ---- binary 00000000
192.168.1. ---- binary 00000001
192.168.2. ---- binary 00000010
192.168.3. ---- binary 00000011
192.168.4. ---- binary 00000100
192.168.5. ---- binary 00000101
192.168.6. ---- binary 00000110
192.168.7. ---- binary 00000111

If look you can see the last bit of the third octet (bit 24) is a zero for every even network.  The value for this bit is 1. We can match on this last bit to target the even network by taking the inverse of 1 to get 254. (255-1).

The wild card mask for this would be



I’m sure your head is swimming about now, but I hope you can see the power of wild card masks and how they are different from subnet masks.

Do you have problems with wild card masks?  Do you have a cool way to figure out wild cards mask or a cool trick you can use wild card masks for?  Leave us a comment and let us know what you think?  It comments that brings websites like these to life.  I’d love to hear what you think.


About Joe

Senior Network Engineer, technology enthusiast, guitar and bass player. Joe Wilson is the creator of RouterFreak.com as well as other niche websites that can be found around on the Internets.

Check Also


What is Internet of Things (IoT) and how is it changing our lives?

Networks, as we know them, have changed over the past few years and there is …


  1. Tim,

    I don't understand this one. When I look at the bits, I see 0 0 0 1 1 0 1 in the 2nd octet, represents networks 10.26 and 10.27 a 1 would be a 254. Wouldn't this allow many more networks than you need?

    Here is another example of some connections we have. They have 2 subnets, again /25, that are vastly different.

    This line gives me the following subnets:

    The real big key is to use subnets/networks that are on CIDR nets, such as the If you had a single bit change, you would get the 2 subnets you are looking for.

    • I had to work this one out to be sure when trying to understand wildcard masks (the comment combined with the post made everything much clearer).

      Last octet is straightforward: .127 means must match on 25th bit (always a 0), meaning a /25 mask.

      2nd octet in binary, then wildcard in binary:

      octet: 0 0 0 1 1 0 1 0

      wildcard 0 0 0 0 0 0 0 1

      Force match on all the 0's means it must be:

      0 0 0 1 1 0 1 X, where X can be 1 or 0, so 26 or 27.

  2. i have a question. i have to configure a serial 0/0/1 ( a router with a correct wild card mask the correct answer is: network area 0 ….how did they come up with that

    • It a serial link between two routers and subnet (prefix) of /30 so you get subnet mask of You subtract


      Then you get

  3. It helped alot..perfect explanation with good reasoning.

  4. Thanx for the lesson,However Why subnet mask & wild card are two different concept instead of one…

  5. Hey Joe, subnet mask can't be *.*.250.0

  6. I CAN't get!!!!!

    • Hey Karen,
      Its okay… wild card masks can be tough. Without getting into the advanced ways to use wildcards let me explain a simple way to find the wildcard (also known as reverse)

      When I'm in a jam and need to figure out a wildcard mask fast and I know what the subnet mask is, all I do is subtract the mask from

      So for example… if the subnet mask is the wildcard can be figured out
      = 0 . 0 . 15 . 255

      I hope this helps!


  7. hey i am happy with the lesson but i think you should do more complex example for people to understand better. i really do enjoy the explanation and hope you do something about what i said. thanks

  8. Thanks for the great explanation. That's helped clear up a lot of my confusion. I also recommend the Boson Subnet calculator, this has a great wildcard mask checker that also allows for more complicated masks. http://preview.tinyurl.com/2vbfp4a

  9. Thanks a lot for you're explanation I was trying to learn the correct form to calculate the wildcards

  10. its awsome .i read from books and even i consult my seniors as well but could understand but from this website i could understand easily thank you so much.

    i appreciate..

  11. Thank you very much! It's clearly understood.

  12. I use wildcard in ACL entries all the time. We have conenctions that use four (4) /25 subnets. Fortunately for us, they are maskable with a bit of a wierd mask:

    This line gives/denies access to the following subnets:

    Access is now in a single line.

    Here is another example of some connections we have. They have 2 subnets, again /25, that are vastly different.

    This line gives me the following subnets:

    The real big key is to use subnets/networks that are on CIDR nets, such as the If you had a single bit change, you would get the 2 subnets you are looking for.


  13. Has anyone found a subnet calculator which supports this kind of wildcard calculation? All the ones I've tried error as they try and validate the subnetmask as CIDR.

  14. i read around 10 to 15 website to read the wildcard mask,but i am not understand any thing from there,but when i come your site and read the entire portion of wildcard mask,its a "awesome"

    i just make u a one request ,i just need the configuration or example of wildcard mask


Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.