diff --git a/content/components/wireguard.md b/content/components/wireguard.md
index 81bf736257..f347f4c0ed 100644
--- a/content/components/wireguard.md
+++ b/content/components/wireguard.md
@@ -156,16 +156,16 @@ Incoming connections are not affected by `netmask`.
Let's explain with some examples:
-| address | netmask | allowed ips | working outgoing connections |
-| ------------ | ---------------------------- | ---------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------ |
-| 172.16.0.100 | *omitted* or 255.255.255.255 | *omitted* or any other value | **none**, no routes are created |
-| | 255.255.255.0 | *omitted* | only to `172.16.0.0/24` |
-| | | - 172.16.0.0/24 - 192.168.0.0/24 - *any other* | and any other network will be outside `172.16.0.0/24` |
-| | | - 192.168.0.0/24 | **none** because `192.168.0.0/24` is not part of `172.16.0.0/24` |
-| 10.44.0.100 | 255.0.0.0 | *omitted* | to `10.0.0.0/8` network |
-| | | - 10.44.0.0/16 - 10.10.0.0/16 | only to the networks in the allowed list because the netmask will route the whole `10.0.0.0/8` but wireguard allows only those two subnets |
-| any | 0.0.0.0 | *omitted* | **any** |
-| | | - 172.16.0.0/24 - 10.44.0.0/16 - 10.10.0.0/16 | to any network that is in the list of allowed IPs because the netmask will route any traffic but wireguard allows only its own list |
+| address | netmask | allowed ips | working outgoing connections |
+| ------------ | ---------------------------- | ----------------------------------------------------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------ |
+| 172.16.0.100 | *omitted* or 255.255.255.255 | *omitted* or any other value | **none**, no routes are created |
+| 172.16.0.100 | 255.255.255.0 | *omitted* | to `172.16.0.0/24` network |
+| 172.16.0.100 | 255.255.255.0 | `- 172.16.0.0/24`{{< break >}}`- 192.168.0.0/24`{{< break >}} *`- any other`* | only to `172.16.0.0/24` because `192.168.0.0/24` and any other network will be outside of `172.16.0.0/24` |
+| 172.16.0.100 | 255.255.255.0 | `- 192.168.0.0/24` | **none** because `192.168.0.0/24` is not part of `172.16.0.0/24` |
+| 10.44.0.100 | 255.0.0.0 | *omitted* | to `10.0.0.0/8` network |
+| 10.44.0.100 | 255.0.0.0 | `- 10.44.0.0/16`{{< break >}}`- 10.10.0.0/16` | only to the networks in the allowed list because the netmask will route the whole `10.0.0.0/8` but wireguard allows only those two subnets |
+| any | 0.0.0.0 | *omitted* | **any** |
+| any | 0.0.0.0 | `- 172.16.0.0/24`{{< break >}}`- 10.44.0.0/16`{{< break >}}`- 10.10.0.0/16` | to any network that is in the list of allowed IPs because the netmask will route any traffic but wireguard allows only its own list |
> [!NOTE]
> Setting the `netmask` to `0.0.0.0` has the effect of routing
diff --git a/themes/esphome-theme/layouts/shortcodes/break.html b/themes/esphome-theme/layouts/shortcodes/break.html
new file mode 100644
index 0000000000..037e6453b9
--- /dev/null
+++ b/themes/esphome-theme/layouts/shortcodes/break.html
@@ -0,0 +1,5 @@
+{{/*
+ Shortcode: break
+ Output: Inserts
+*/}}
+