Dos some very useful network commands _php Tutorial

Source: Internet
Author: User
Tags ftp commands name database
DOS common network-related commands interpret ARP display and modify the IP or Token Ring Physical address translation table used by the Address Resolution Protocol (ARP) to Ethernet. This command is available only after the TCP/IP protocol is installed. arp-a [INET_ADDR] [-N][if_addr]] arp-d inet_addr [if_addr] arp-s inet_addr ether_addr [if_addr] parameter-A by asking TCP/IP to display the current ARP entry. If INET_ADDR is specified, only the IP and physical addresses of the specified computer are displayed. -G is the same as-a. INET_ADDR Specifies the IP address with dotted decimal notation. -N Displays the network interface ARP entry specified by IF_ADDR. IF_ADDR Specifies the IP address (if any) whose Address Translation table interface needs to be modified. If it does not exist, the first applicable interface will be used. -D Deletes the item specified by INET_ADDR. -S adds an entry in the ARP cache, associating the IP address inet_addr with the physical address ether_addr. The physical address is given by the 6 hexadecimal bytes separated by a hyphen. Specifies an IP address using dotted decimal notation. The item is permanent, that is, the latter is automatically removed from the cache when the timeout expires. ETHER_ADDR specifies the physical address. Finger displays information about the user on the specified system running the Finger service. Output different variables according to the remote system. This command is available only after the TCP/IP protocol is installed. Finger [-l] [user] @computer [...] parameter-l displays information in long list format. User specifies the users who want to obtain relevant information. Omit the user parameter to display information for all users on the specified computer: @computer FTP to transfer files to a remote computer that is running the FTP service or to transfer files from a remote computer that is running the FTP service (sometimes referred to as daemon). FTP can be used interactively. Click FTP command in the related Topics list for a description of the available FTP subcommands. This command is available only after the TCP/IP protocol is installed. FTP is a service that, once started, creates a child environment in which you can use the FTP command, which you can return from a child environment to a Windows 2000 command prompt by typing the QUIT subcommand. When the FTP child environment is running, it is represented by an FTP command prompt. FTP [-v] [-n] [-I.] [-d][-G] [-s:filename] [-A] [-w:windowsize] [Computer] parameter-v suppresses the remote server response. -N Disables automatic logon to the initial connection. -I turn off interactive prompts when transferring multiple files. -D enables debugging, displaying all FTP commands that are passed between the client and the server. -G Disables the file name group, which allows wildcard character (* and?) to be used in local files and path names. (See the Glob command in the Online Command reference.) -S:FILENAME Specifies the text file that contains the FTP command, and the commands will run automatically when FTP is started. No spaces are allowed in this parameter. Use this switch instead of redirection (>). -A uses any local interface when bundling data connections. -w:windowsize overrides the default size of 4096 for the transfer buffer. computer specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the row. Nbtstat the Diagnostic command uses NBT (NetBIOS on TCP/IP) to display protocol statistics and current TCP/IP connections. This command is available only after the TCP/IP protocol is installed. nbtstat [-a remotename] [-a IP address] [-c] [-n] [-R] [-R] [-S] [-S] [interval] parameter-a remotename list its name table with the name of the remote computer. -A IP address uses the IP addresses of the remote computer and lists the name tables. -C gives the IP address of each name and lists the contents of the NetBIOS name cache. -N Lists the local NetBIOS name. Registered indicates that the name has been registered by broadcast (BNode) or WINS (other node type). -R to remove all names in the NetBIOS name cache, reload the Lmhosts file. -r lists name resolution statistics for Windows Network name resolution. On a Windows 2000 computer that is configured to use WINS, this option returns the number of names to resolve and register by broadcast or WINS. -S displays the client and server sessions and lists the remote computers by IP address only. -S displays the client and server sessions. Attempt to convert the IP address of the remote computer to the name of the use host file. Interval re-displays the selected statistics, pausing interval seconds between each display. Press CTRL + C to stop displaying the statistics again. If omittedThis parameter, nbtstat prints the current configuration information once. NETSTAT displays protocol statistics and the current TCP/IP network connection. This command is only available if the TCP/IP protocol is installed. netstat [-a] [-e] [-n] [-S] [-P Protocol] [-R] [interval] parameter-a displays all connections and listening ports. Server connections are usually not displayed. -e Displays Ethernet statistics. This parameter can be used in conjunction with the-s option. -N Displays the address and port number in a numeric format (instead of trying to find the name). -S displays statistics for each protocol. By default, statistics are displayed for TCP, UDP, ICMP, and IP. The-p option can be used to specify a default subset. -P protocol Displays the connection of the Protocol specified by protocol; Protocol can be TCP or UDP. If you use the-S option to display statistics for each protocol, the protocol can be TCP, UDP, ICMP, or IP. -R Displays the contents of the routing table. Interval re-displays the selected statistics, pausing interval seconds between each display. Press Ctrl+b to stop displaying the statistics again. If this argument is omitted, netstat prints the current configuration information once. Ping verifies the connection to the remote computer. This command is only available if the TCP/IP protocol is installed. ping [-t] [-a] [-N Count] [-l length] [-f] [-i TTL] [-v TOS] [-R Count] [-s count] [][-j computer-list] | [-K Computer-list]] [-w timeout] destination-list parameter-t Ping the specified computer until it is interrupted. -a resolves the address to a computer name. -N Count sends the number of ECHO packets specified by count. The default value is 4. -L length sends an ECHO packet containing the amount of data specified by length. The default is 32 bytes; The maximum value is 65,527. -F sends the "do not Fragment" flag in the packet. The packet is not fragmented by the gateway on the route. -I TTL sets the time to live field to the value specified by the TTL. -V TOS Sets the service Type field to the value specified by the TOS. -R count records the routing of outgoing and returned packets in the Record routing field. Count can specify a minimum of 1 units, up to 9Computer. -S count specifies the timestamp of the metric specified by count. -J computer-list routes packets using the list of computers specified by Computer-list. The maximum number of consecutive computers that can be separated by an intermediary gateway (Route sparse source) IP is 9. -K computer-list routes packets using the list of computers specified by Computer-list. Continuous computers cannot be separated by an intermediary gateway (strict routing source) the maximum number of IPs allowed is 9. -W timeout Specifies the time-out interval, in milliseconds. DESTINATION-LIST specifies the remote computer to ping. RCP copies files between the Windows 2000 computer and the system running the remote shell Port monitor rshd. The RCP command is a connection command that, when issued from a Windows 2000 computer, can also be used for other transports to copy files between two computers running rshd. The rshd port monitor can be used on UNIX computers and cannot be used on Windows 2000, so Windows 2000 computers can only participate as systems that issue commands. The remote computer must also provide the RCP utility by running rshd. rcp [-a |-b] [-h] [-r] Source1 source2 ... sourcen destination parameter-a specifies the ASCII transfer mode. This mode converts a carriage return/newline character to a carriage return on an outgoing file and converts a newline character to a carriage return/newline character in the incoming file. This mode is the default transfer mode. -b Specifies the binary image transfer mode. No carriage return/line feed conversion is performed. -H transmits a source file marked as hidden on a Windows 2000 computer. Without this option, specifying a hidden file on the RCP command line does not have the same effect as a file. -R copies the contents of all subdirectories of the source recursively to the destination. Both source and destination must be directories, even though the source is not a directory, and using-R can work. But there will be no recursion. The source and destination formats must be [Computer][.user]:]filename. If the [Computer][.user]:] section is omitted, the computer is assumed to be the local computer. If the [. User] section is omitted, the currently logged on Windows 2000 user name is used. If you use a fully qualified computer name that contains a period (.) delimiter, you mustcontains [. user]. Otherwise, the last part of the computer name is interpreted as a user name. If more than one source file is specified, the destination must be a directory. If the file name does not begin with the UNIX forward slash (/) or the backslash () of the Windows 2000 system, it is assumed to be relative to the current working directory. In Windows 2000, this is the directory where commands are issued. In the remote system, this is the logon directory for the remote user. a period (.) indicates the current directory. Use the escape character (, "or) in the remote path to use wildcards on the remote computer. Rexec Run the command on the remote computer that is running the Rexec service. The rexec command verifies the user name on the remote computer before executing the specified command, which can only be used if the TCP/IP protocol is installed. rexec Computer [-l username] [-n] Command parameter computer specifies the remote computer on which to run the command. -l username Specifies the user name on the remote computer. -n redirects the input of the rexec to NULL. command to specify the commands to run. Route Control network routing table. This command is only available if the TCP/IP protocol is installed. Route [-F] [-p] [command][destination] [mask SubnetMask] [gateway] [metric costmetric]] parameter-F clears the routing table for all gateway portals. If this parameter is used in combination with a command, the routing table is cleared before the command is run. -P This parameter, when used with the add command, causes the route to persist between the system bootstrapper. By default, routes are not preserved when the system restarts. When used with the Print command, displays a list of registered persistent routes. Ignore all other commands that always affect the corresponding persistent route. command to specify one of the following commands. Command purpose Print route add route delete Delete route change existing route destination Specifies the computer that sent the command. Mask SubnetMask Specifies the subnet mask associated with the route entry. If not specified, 255.255.255.255 will be used. Gateway to specify gateways. Both the network database file named Networks and the computer name database file named Hosts refer to the symbol names used by all destination or gateway. If lifeOrder is print or delete, the destination and gateway can also use wildcards, or omit gateway parameters. Metric Costmetric assigns integer hops (from 1 to 9999) to use when calculating the fastest, most reliable, and/or cheapest routes. RSH runs the command on the remote computer running the RSH service. This command is only available if the TCP/IP protocol is installed. RSH Computer [-l username] [-n] Command parameter computer specifies the remote computer where the command is run. -l username Specifies the user name that is used on the remote computer. If omitted, the login is used

http://www.bkjia.com/PHPjc/532215.html www.bkjia.com true http://www.bkjia.com/PHPjc/532215.html techarticle DOS Common network-related commands interpret ARP display and modify the IP or Token Ring Physical address translation table used by the Address Resolution Protocol (ARP) to Ethernet. The command is only installed on the ...

  • Contact Us

    The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

    If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

    A Free Trial That Lets You Build Big!

    Start building with 50+ products and up to 12 months usage for Elastic Compute Service

    • Sales Support

      1 on 1 presale consultation

    • After-Sales Support

      24/7 Technical Support 6 Free Tickets per Quarter Faster Response

    • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.