Top > Network Applications > Tools > Whatmask
The second mode executes Whatmask with any ip address within the
subnet, followed by a slash ('/'), followed by the subnet mask in any
format. This echoes back the netmask in the following formats: CIDR,
Netmask, Netmask (Hex) Wildcard Bits; the network address; the
broadcast address; the number of Usable IP Addresses; and the first
and last usable IP addresses.
Obtaining
|
|
Help List | http://sourceopen.com/ |
Developer List | http://sourceopen.com/ |
Bug List | http://sourceopen.com/ |
Maintainers |
|
Developers |
|
Interfaces | command line |
Source languages | C |
License verified by | Janet Casey <jcasey@gnu.org> on 2004-01-29 |
Entry compiled by | Janet Casey <jcasey@gnu.org> |
Categories
The copyright licensing notice below applies to this text. The software described in this text has its own copyright notice and license, which can usually be found in the distribution itself.
Copyright © 2000, 2001, 2002, 2003, 2004 Free Software Foundation, Inc.
Permission is granted to copy, distribute, and/or modify this document under the terms of the GNU Free Documentation License, Version 1.1 or any later version published by the Free Software Foundation; with no Invariant Sections, with no Front-Cover Texts, and with no Back-Cover Texts. A copy of this license is included in the file COPYING.DOC.
Please report any problems in this page to bug-directory@gnu.org, or find out how you can help fix them.
The FSF provides this directory as a service to the free software community. Please consider donating to the FSF to help support this project.