Produces site, topology, VLAN, and addressing documentation from a plain-English description of your network inventory and services.
Describe your network the way you'd whiteboard it for a colleague. Get back a documentation pack that would take a day to write by hand.
SKILL.md file.~/.claude/commands/ (macOS/Linux) or %USERPROFILE%\.claude\commands\ (Windows)./network-documenter in Claude Code. Start with whatever you know - sites, subnets, device list, or just "we have three offices and a data centre". The skill will prompt you through the gaps.# Network Documentation Pack: <organisation>
**Document version:** 1.0
**As-of date:** YYYY-MM-DD
**Author:** <name>
**Confidentiality:** Internal - Restricted
**Next review due:** YYYY-MM-DD
## 1. Executive Overview
> <One paragraph describing the network footprint in business language. Mention number of sites, approximate user count, critical dependencies, and most recent significant change.>
## 2. Sites
### Site 1 - <Name> (<role: HQ / Branch / DC / Co-lo>)
| Field | Value |
|---|---|
| Address | <street address> |
| Site code | <short code> |
| Users | ~<count> |
| Upstream link 1 | <carrier> <circuit ID> <speed> |
| Upstream link 2 | <carrier> <circuit ID> <speed> |
| Internal routing | <protocol + area/AS> |
| Local services | <DHCP / DNS / file / print> |
| Physical security | <badge / key / supervised> |
| Power | <UPS + generator / UPS only / none> |
| Cooling | <active / passive> |
| Site contact | <name, phone, role> |
**Role-specific notes:**
<Anything unusual - e.g. "this branch hosts the failover voice gateway", "this site is leased and will close in 2027">
### Site 2 - <Name> (<role>)
<same structure>
<repeat for each site>
## 3. Addressing Plan
### IPv4 supernets owned / in use
| Range | Purpose | Allocated to |
|---|---|---|
| 10.10.0.0/16 | HQ internal | Site 1 |
| 10.20.0.0/16 | Branch internal | Sites 2-N |
| 10.250.0.0/24 | Out-of-band management | All sites |
| <public block> | <purpose> | <site> |
### Reserved ranges
- <range> - reserved for <purpose> (do not assign)
### IPv6
- Status: in use / pilot / not deployed
- Allocation: <e.g. "PA /48 from carrier, slash 64 per VLAN">
### Growth headroom
- <Site>: <N available subnets, estimated runway in years>
## 4. VLANs
| VLAN ID | Name | Subnet | Gateway | DHCP | Security zone | Typical ports |
|---|---|---|---|---|---|---|
| 10 | MGMT | 10.10.10.0/24 | .1 | Static | Management | Uplinks only |
| 20 | USERS | 10.10.20.0/24 | .1 | Scope .50-.254 | User | Access |
| 30 | VOICE | 10.10.30.0/24 | .1 | Scope via CUCM | Voice | Access + voice VLAN |
| 40 | PRINTERS | 10.10.40.0/24 | .1 | Reserved | Restricted | Access |
| 50 | IOT | 10.10.50.0/24 | .1 | Scope | Isolated | Access |
| 99 | GUEST | 10.10.99.0/24 | .1 | Scope | DMZ | SSID only |
## 5. Device Inventory
| Hostname | Vendor / Model | Role | Site | Mgmt IP | OS version | Support contract |
|---|---|---|---|---|---|---|
| HQ-CORE-01 | Cisco Catalyst 9500 | Core L3 switch | Site 1 | 10.250.1.1 | 17.12.3 | SmartNet 24x7 to 2027-05 |
| HQ-FW-01 | Fortinet FG-100F | Edge firewall HA-A | Site 1 | 10.250.1.10 | 7.4.4 | FortiCare 24x7 to 2027-05 |
| <...> | <...> | <...> | <...> | <...> | <...> | <...> |
## 6. Topology Narrative
### North-south traffic (user to internet)
<Walk through: user laptop -> access switch (port + VLAN) -> distribution (layer 2 or layer 3 handoff?) -> core -> firewall -> WAN uplink -> ISP. Call out where policy applies (firewall rules, web filter, DLP, authentication).>
### East-west traffic (user to server)
<Where does the gateway live? Any inter-VLAN filtering? Are there zone boundaries (user -> server) with explicit ACLs or a firewall hairpin? Which services force a policy hop?>
### Site-to-site traffic
<MPLS / SD-WAN / VPN - which technology, which overlay, which underlay. How is failover handled?>
### Remote user traffic
<VPN / ZTNA - which product, who authenticates, what's the split tunnel policy, how is MFA enforced>
## 7. Services Map
| Service | Provider / Host | Location | Failover | Depends on |
|---|---|---|---|---|
| DNS (internal) | AD DS | HQ + Branch | Secondary at DR | AD auth |
| DNS (recursive) | Cloudflare | External | Automatic | Internet |
| NTP | Stratum 2 internal | HQ | Stratum 3 at each site | GPS clock / pool.ntp.org |
| RADIUS | ClearPass | HQ | Passive standby | AD |
| SIEM / syslog | <product> | DC | None (!) | Internal VPN |
| Monitoring | <product> | DC | Single instance | Internal VPN |
| <...> | | | | |
## 8. Diagram Brief
Feed this brief to a draw.io / Visio / network diagram tool. Include at least:
- **Logical topology** - layers, zones, trust boundaries. Not device positions.
- **Physical topology per site** - rack elevations and cable runs (separate document if large).
- **WAN / overlay topology** - sites + tunnels + carriers + circuit IDs.
- **Colour key** per security zone, consistent across all diagrams.
- **Legend** explaining every icon and line style used.
Suggested layers of diagram:
1. Edge / external view - what the internet sees.
2. Site overview - all sites and their links.
3. Per-site internal - a clean "typical site" diagram.
4. Service overlay - showing where services sit within the topology.
## 9. Change Control Notes
- **Items frozen for >3 years:** <e.g. site addresses, supernet allocation, core routing protocol choice>
- **Items likely to change this year:** <e.g. SD-WAN cutover, guest WiFi SSID rename, carrier contract renewal>
- **Known inconsistencies with this document:** <honesty section - documented gaps beat silent wrong answers>
## 10. Contacts & Ownership
| Domain | Owner | Escalation | Vendor case portal |
|---|---|---|---|
| Network (LAN/WAN) | <team> | <oncall> | <URL> |
| Firewall / security | | | |
| Wireless | | | |
| Voice | | | |
| Internet circuits | | | |
## 11. Appendix
- Linked physical site plans / floor plans: <URLs>
- Vendor support contract documents: <URLs>
- Previous documentation versions: <URLs>
- Known as-built drawings: <URLs>
User: "/network-documenter - we have 3 offices (London HQ, Manchester branch, Birmingham branch), a co-lo at Equinix LD8, about 450 total users, Cisco at HQ, mixed Aruba/Cisco at branches, SD-WAN over Fortinet connecting the sites, and we're going for Cyber Essentials Plus."
What the skill will do: