communicate with the VM? In fact, we just need to configure a static route to the remote host on the VM. Here is an example where the IP address of the remote host is 192.168.33.250. Now let's add a static route to the VM, as follows: Route add-net 192.168.33.0/24 GW 192.168.0.1 Dev eth1 This command means that all packets that need to be sent to the 192.168.33.0/24 network are forwarded through the 192.168.0.1 Gateway and are forwarded through the ETH1 network card. Of course, if we want to r
-width:0px "border=" 0 "alt=" clip_image013 "src=" http://s3.51cto.com/wyfs02/M00/8B/AB/ Wkiom1ht-jmgvetlaadkstjrtrc986.png "width=" 537 "height="/> For CentOS, if you do not have the traceroute command installed, you can install it using the following command: Yum-y Install Traceroute With this, we can easily see that the first route from the VM to the remote host 192.168.33.250 is 192.168.0.1, which exactly matches the static route we just configured. Next we switch to the remote host, the rem
The following actions are done in the Command Prompt window.Known IP, how to get the computer nameMethod (1):Use Ping-i IP AddressFor example, the known address is 192.168.1.168.Then use Ping-i 192.168.1.168 if you can ping the computer. You can get the name of the computerMethod (2):Use Nbtstat-a plus IP to check the host name of each otherFor example Nbtstat-a 192.168.1.168Known computer name, how to get the IP address of the computerMethod (1):Use the ping computer nameFor example, the comput
of the bandwidth of the extranet.
The above figure shows the intranet each host's connection number, the up and down row real-time speed, the total flow and so on, may order these data, simply clicks the above title, can carry on from big to small or the big sort, facilitates the network management to find who occupies the most bandwidth.
Ping and tracert tools
The significance of the ping here is to exclude the internal ne
to use the port number and public network IP address to access the external network, the advantage is that when the intranet has a small number of public network IP can also allow enough to host the Internet.
(2) route selectionBefore routing, routers need to run routing algorithms to obtain routing information.About the routing algorithm can refer to my blog: routing algorithmAfter the operation of the routing algorithm, the router will have the corresponding routing table, the local host also
, you can use the nbtstat command to further get the information of the other side, which adds to our invasion of the Pau.
Three, Netstat
This is a command to view the status of the network, easy to operate powerful.
-A View all open ports of the local machine, you can effectively detect and prevent trojans, you can know the service of the machine and other information, such as Figure 4.
Here you can see that the local machine is open to FTP services, Telnet services, mail services, Web
?
In fact, we simply need to configure a static route to the remote host on the VM.
Let's share an example where the IP address of the remote host is 192.168.33.250.
Now we're going to add a static route to the VM, as follows:
Route add-net 192.168.33.0/24 GW 192.168.0.1 Dev eth1
The order means that all packets that need to be sent to the 192.168.33.0/24 network segment are forwarded through the 192.168.0.1 Gateway and forwarded through the ETH1 network card.
Of course, if we want to re
User
Lpq.exe gt; Displays status of a remote LPD queue shows the status of the remote LPD print queue,
Display print tasks sent to a unix-based server
Lpr.exe gt; Send a print job to a network printer. redirect Print tasks to print in the network
Machine. Typically used by a UNIX client printer to send a print task to an NT printer server that is connected to a print device.
Lsass.exe gt; LSA executable and server DLLs run LSA and server Dll
Lserver.exe gt; Specifies the new DNS dom
server has given you the right to write, if you can, oh, how to use it is not more said, we will be free to play.
Delete deletes files on a remote FTP server. This must also ensure that you have permission to write.
Bye exits the current connection.
Quit ditto.
Vii. tracert command
Trace routing information, which can be used to identify all the ways in which data is transmitted from the local machine to the target host, which is helpful in un
offline speed measurement tool to see if it is normal.
Speed tool Download link address: Http://pstatic.xunlei.com/tool/tool-speed-1.0.rar
2, close anti-virus software and firewall, there are 360, thunder other programs (QQ can not be closed), and then unzip,
3, after the decompression, open "Thunderbolt Offline Repair Tool 1.2". Then click on the bottom right "empty offline hosts" and then click on the bottom left "start detection" such as (Figure 3)
4, if the telecommunications netwo
* 0.0.0.0/0 [90/21024000] via 172.16.1.2, 00:01:50, serial2/0
--default route to the Internet
The internal router of Hebei Normal University learns the default route to the Internet and the static route to the Software Institute through the eigrp of the boundary router Router1 notice.
(5) View the routing table on the ROUTER6.
Router6#show IP route
Gateway of last resort are 10.0.1.1 to network 0.0.0.0
10.0.0.0/24 is subnetted, 4 subnets
C 10.0.1.0 is directly connected, serial2/0
R 10.0
As you know, ping and tracert programs can determine the target host type, the main use of ping is to detect whether the target host is connected. Tracert leverages the TTL value in the header of ICMP packets and IP packets to prevent packets from constantly cycling over the IP Internet.
Many intruders will first ping your machine, and if you see a TTL value of 128, think your system is Windows nt/2000; if
server os/2?
Osk.exe > on screen Keyboard keyboard?
Packager.exe > Windows Packager Manager Object Packager?
Pathping.exe > combination of pings and tracert programs that contain pings and tracert?
Pax.exe > is a POSIX program and path names used as arguments must be specif?
IED in POSIX format. Use "//c/users/default" instead of "C:usersdefault."?
Start the Portable Archive Interchange (PAX) utility
As you know, you can use the Ping and Tracert programs to determine the target host type. The main use of Ping is to check whether the target host can be connected. Tracert uses the TTL value in the ICMP and IP packet headers to prevent data packets from continuously repeating over the IP Internet. Many intruders first Ping your host. If the TTL value is 128, they think that your system is Windows NT/2000;
data through the TCP/IP protocol) are set correctly, whether the operation is normal, and whether the network is smooth. However, successful ping does not mean that the TCP/IP configuration is correct. You may need to perform a large number of packet exchanges between the local host and the remote host to ensure that the TCP/IP configuration is correct. The ping Command can run in the MS-DOS window in the following format:
Ping URL
For example, ping 127.0.0.1
Check vro setting method 2. ipcon
This article uses the GOOGLE tracking example to demonstrate how to perform the CMD operation and shows the tracking path. The following article provides detailed operation steps.
CMD command tracert xxx.xxx.com
For example, Google
C: \> tracert www.google.com
Tracing route to www.l.google.com [64.233.189.104]
Over a maximum of 30 hops:
1 11 MS 20 MS 19 MS 183.2.60.1
2 11 MS 14 MS 14 MS 121.32.149.249
3 12
, and network application
Most elasticsearch network topologies are created in the network topology. You can also add a subset of elasticsearch network configuration table data.
3. Collect ES network configuration information
Common commands:
1) ping host/ip-address to send and receive ICMP responses and verify network connectivity
2) arp-a; view the MAC-IP ing table for modifying ES (same subnet)
3) telnet host/ip-address; log on to elasticsearch or a specific TCP port.
Windows platform command
situation.Add : manually adding routes or routing with the following example:?
route ADD 157.0.0.0 MASK 255.0.0.0 157.55.80.1 METRIC 3 IF 2destination^ (目标地址) ^mask ^gateway metric^ ^Interface^ (接口)
Change : only used to modify the gateway and/or metric. Examples are as follows:?
route CHANGE 157.0.0.0 MASK 255.0.0.0 157.55.80.5 METRIC 2 IF 2
Delete : deletes the route. Examples are as follows:?
route DELETE 157.0.0.0
status meaning
CLOSED does not use this socket
LISTEN socket is listening for inbound connection
SYN_SENT socket is trying to establish a connection
SYN_RECEIVED is in the initial synchronization state of the connection.
The ESTABLISHED connection has been ESTABLISHED.
CLOSE_WAIT remote socket closed: waiting to close this socket
The FIN_WAIT_1 socket is closed and the connection is being closed.
The CLOSING socket is closed, the remote socket is closed, and the close confirmation is temporaril
address. Vrouters or firewall devices on these private network boundaries must block or convert (to a public address) such addresses. Default route: the default route is to forward data packets to the default route when no available path is found in the route table. The default IPv4 route address is 0.0.0.0. This address retains all the addresses from 0.0.0.0 to 0.20.255.255. Loop (send) Address: the address that the host uses to communicate with itself is the loop address. The IPv4 loopback ad
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.