In environments such as Microsoft Network client and Windows 9x dos windows in DOS, there are a number of network commands that are useful but not included in the DOS-with commands. So, what are the orders? Here are some of the commands that are commonly used in them.
Arp
Displays and modifies an Ethernet-IP or Token-ring Physical address translation table used by the Address Resolution Protocol (ARP). This command is available only after you have installed the TCP/IP protocol.
arp-a [INET_ADDR] [-N [if_addr]]
Arp-d inet_addr [if_addr]
Arp-s inet_addr ether_addr [if_addr]
Parameters
-A
Displays the current ARP entry by asking TCP/IP. If INET_ADDR is specified, only the IP and physical address of the specified computer is displayed.
-G
Same as-a.
Inet_addr
Specifies the IP address in dotted decimal notation.
-N
Displays the network interface ARP entries specified by if_addr.
If_addr
Specifies the IP address, if any, that needs to be modified for its address Translation table interface. If it does not exist, the first applicable interface will be used.
-D
Deletes the item specified by INET_ADDR.
-S
Add an entry in the ARP cache to associate the IP address inet_addr with the physical address ether_addr. The physical address is given by 6 hexadecimal bytes separated by hyphens. Specifies an IP address with a dotted decimal token. Item is permanent, that is, the bottom is automatically removed from the cache at time-out expiration.
Ether_addr
Specifies the physical address.
Finger
Displays information about the user on the specified system running the Finger service. Different variables are output depending on the remote system. This command is available only after you have installed the TCP/IP protocol.
Finger [-l] [user] @computer [...]
Parameters
-L
Displays information in a long column table format.
User
Specifies the user to obtain relevant information. Omit the user parameter to display information for all users on the specified computer:
@computer
Ftp
Transfer files to a remote computer that is running the FTP service or to a remote computer that is running the FTP service (sometimes called daemon). FTP can be used interactively. Click FTP command in the related Topics list to obtain a description of the available FTP subcommand. This command is available only after you have installed the TCP/IP protocol. FTP is a service that, once started, will create a child environment in which FTP commands can be used, and you can return to the Windows 2000 command prompt by typing the QUIT subcommand from the child environment.
When the FTP child environment is running, it is represented by the FTP command prompt.
FTP [-v] [-n] [-i] [-d] [-g] [-s:filename] [-a] [-w:windowsize] [computer]
Parameters
-V
Suppresses the display of remote server responses.
-N
Disables automatic logon to the initial connection.
-I.
Turn off interactive prompts when multiple file transfers.
-D
Enables debugging, displaying all FTP commands passed between the client and the server.
-G
Disables the file name group, which allows wildcards (* and?) to be used in local files and path names. (See the Glob command in the Online Command reference.) )
-s:filename
Specifies the text file that contains the FTP command, which will run automatically when FTP is started. No spaces are allowed in this parameter. Use this switch instead of redirection (>).
-A
Use any local interface when bundling data connections.
-w:windowsize
Replaces a transfer buffer with a default size of 4096.
Computer
Specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the row.
Nbtstat
This diagnostic command uses NBT (NetBIOS on TCP/IP) to display protocol statistics and current TCP/IP connections. This command is available only after you have installed the TCP/IP protocol.
nbtstat [-a remotename] [-a IP address] [-c] [-n] [-R] [-r] [s] [-S] [interval]
Parameters
-A RemoteName
Lists its name table using the name of the remote computer.
-A IP address
Use the IP address of the remote computer and list the name table.
-C
Given the IP address of each name, the contents of the NetBIOS name cache are listed.
-N
Lists the local NetBIOS names. Registered indicates that the name has been registered for broadcast (BNODE) or WINS (other node types).
-R
After clearing all the names in the NetBIOS name cache, reload the Lmhosts file.
-R
Lists name resolution statistics for Windows Network name resolution. On Windows 2000 computers that are configured to use WINS, this option returns the number of names to resolve and register by broadcast or WINS.
-S
Displays client and server sessions, which list only remote computers by IP address.
-S
Displays client and server sessions. Attempt to convert the IP address of the remote computer to the name of the use host file.
Interval
Displays the selected statistics again, pausing interval seconds between each display. Press CTRL + C to stop the statistics from being displayed again. If this argument is omitted, nbtstat prints the current configuration information.
Netstat
Displays protocol statistics and current TCP/IP network connections. This command is only available if the TCP/IP protocol is installed.
netstat [-a] [E] [-n] [-S] [P protocol] [-R] [interval]
Parameters
-A
Displays all connection and listening ports. Server connections are not usually displayed.
-E
Displays Ethernet statistics. This parameter can be used in conjunction with the-s option.
-N
Displays addresses and port numbers in numeric format (instead of trying to find names).
-S
Displays statistics for each protocol. By default, statistics for TCP, UDP, ICMP, and IP are displayed. The-p option can be used to specify a default subset.
-P Protocol
Displays the connection to the protocol specified by protocol; Protocol can be TCP or UDP. If you use the-S option to display statistics for each protocol, protocol can be TCP, UDP, ICMP, or IP.
-R
Displays the contents of the routing table.
Interval
Displays the selected statistics again, pausing interval seconds between each display. Press Ctrl+b to stop the statistics from being displayed again. If this argument is omitted, Netstat will print the current configuration information.
Ping
Verify the connection to the remote computer. This command is only available if the TCP/IP protocol is installed.
ping [-t] [-a] [-N Count] [-l-length] [-f] [-i TTL] [-v TOS] [R Count] [s count] [[-j computer-list] | [k Computer-list]] [-w timeout] Destination-list
Parameters
-T
Ping the specified computer until it is interrupted.
-A
Resolves the address to the computer name.
-N Count
Sends the number of ECHO packets specified by count. The default value is 4.
-L Length
Sends an ECHO packet that contains the amount of data specified by length. The default is 32 bytes; The maximum value is 65,527.
-F
Sends a "Do not fragment" flag in a packet. The packet will not be segmented by the gateway on the route.
-I. TTL
Sets the live Time field to the value specified by the TTL.
-V TOS
Set the service Type field to the value specified by TOS.
-R Count
Record the routing of outgoing and returned packets in the Record route field. Count can specify at least 1 units, up to a maximum number of computers.
Specifies the remote computer to ping.
Rcp
Copy files between Windows 2000 computers and systems running Remote shell Port monitor rshd. The RCP command is a connection command that, when issued from a Windows 2000 computer, can also be used for other transmissions to copy files between two computers running rshd. The rshd port monitor can be used on UNIX computers and cannot be used on Windows 2000, so Windows 2000 computers can only participate as a system that emits commands. The remote computer must also provide an RCP utility by running rshd.
rcp [a | b] [h] [r] Source1 source2 ... sourcen destination
Parameters
-A
Specifies the ASCII transfer mode. This mode converts a carriage return/newline character to a carriage return on an outgoing file and converts a newline character to a carriage return/newline character in the incoming file. This mode is the default transport mode.
-B
Specifies the binary image transfer mode. Carriage return/line feed conversion is not performed.
-H
Transmits a source file marked as a hidden attribute on a Windows 2000 computer. Without this option, specifying a hidden file on the RCP command line has the same effect as if the file does not exist.
-R
Recursively copies all subdirectory contents of the source to the destination. Source and destination must all be directories, although using-r can work even if the source is not a directory. But there will be no recursion.
Source and destination
The format must be [Computer[.user]:]filename. If the [Computer[.user]:] section is omitted, the computer is assumed to be the local computer. If the [. User] section is omitted, the currently logged on Windows 2000 user name is used. If you use a fully qualified computer name that contains a period (.) separator, you must include [. User]. Otherwise, the last part of the computer name is interpreted as the user name. If more than one source file is specified, the destination must be a directory.
If the file name does not start with a forward slash (/) on UNIX or a backslash (\) of the Windows 2000 system, it is assumed to be relative to the current working directory. In Windows 2000, this is the directory where the commands are issued. On the remote system, this is the remote user's login directory. The period (.) represents the current directory. Use the escape character (\, "or") in the remote path to use the wildcard character on the remote computer.
Rexec
Run the command on the remote computer that is running the REXEC service. The rexec command verifies the user name on the remote computer before executing the specified command, which can only be used if the TCP/IP protocol is installed.
rexec Computer [-l username] [-n] Command
Parameters
Computer
Specifies the remote computer on which to run the command.
-l username
Specifies the user name on the remote computer.
-R
Redirects the rexec input to NULL.
Command
Specifies the command to run.
Route
Controls the network routing table. This command is only available if the TCP/IP protocol is installed.
Route [F] [P] [command [destination] [Mask SubnetMask] [gateway] [metric costmetric]]
Parameters
-F
Clears the routing table for all gateway portals. If this parameter is used in combination with a command, the routing table is cleared before the command is run.
-P
This parameter, when used with the add command, causes the route to persist between system boot programs. By default, the route is not preserved when the system restarts. When used with the Print command, displays a list of registered persistent routes. Ignores all other commands that always affect the corresponding persistent route.
Command
Specify one of the following commands.
Command purpose
Print printing route
Add route
Delete Remove route
Change changes existing routes
Destination
Specifies the computer on which the command is sent.
Mask SubnetMask
Specifies the subnet mask associated with the route entry. If not specified, the 255.255.255.255 is used.
Gateway
Specifies the gateway.
Both the network database file named Networks and the name Hosts computer name database file refer to the symbolic names used by all destination or gateway. If the command is print or delete, the target and gateway can also use wildcard characters, or you can omit gateway parameters.
Metric Costmetric
Assign an integer metric (from 1 to 9999) to be used when calculating the fastest, most reliable, and/or cheapest route.
Rsh
Run the command on the remote computer that is running the RSH service. This command is only available if the TCP/IP protocol is installed.
RSH Computer [-l username] [-n] Command
Parameters
Computer
Specifies the remote computer on which the command is run.
-l username
Specifies the user name to use on the remote computer. If omitted, the logged-on user name is used.
-N
Redirects the rsh input to NULL.
Command
Specifies the command to run.
Tftp
Transfer files to a remote computer that is running the TFTP service or to a remote computer that is running the TFTP service. This command is only available if the TCP/IP protocol is installed.
TFTP [-i] computer [get | put] source [destination]
Parameters
-I.
Specifies the binary image transfer mode (also known as "eight-bit byte"). In binary image mode, a file is moved verbatim by byte after byte. This mode is used when transferring binaries.
If I is omitted, the file is routed in ASCII mode. This is the default delivery mode. This mode converts the EOL character to a carriage return for UNIX and a return/newline character for a personal computer. You should use this mode when transferring text files. If the file transfer succeeds, the data transfer rate is displayed.
Computer
Specifies a local or remote computer.
Put
Transfer the file destination on the local computer to the file source on the remote computer.
Get
Transfer the file destination on the remote computer to the file source on the local computer.
If you transfer the file file-two on the local computer to the file file-one on the remote computer, specify put. If you transfer file file-two on a remote computer to a file file-one on a remote computer, specify get.
Because the TFTP protocol does not support user authentication, the user must log on and the file must be writable on the remote computer.
Source
Specifies the file to be routed. If the local file is specified as-, the remote file is printed (if acquired) on the stdout, or read from stdin (if placed).
Destination
Specifies the location in which to transfer the file. If destination is omitted, it is assumed to have the same name as source.
Tracert
The diagnostic utility sends Internet Control Message Protocol (ICMP) echo packets that contain different time to live (TTL) values to the destination to determine which route to use to reach the destination. To decline at least 1 before forwarding the TTL on the packet, each router on the required path, so the TTL is a valid hop count. When the TTL on the packet arrives 0 o'clock, the router should send the "ICMP timed out" message back to the source system. Tracert sends an echo packet with a TTL of 1 and then increments the TTL by 1 in each subsequent send process until the target response or TTL reaches its maximum value to determine the route. Routing determines the route by checking the "ICMP timed out" message sent back by the intermediate router. However, some routers silently pass packets that contain expired TTL values, and tracert cannot see them.
tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] Target_name
Parameters
/d
Specifies that the address is not resolved to the computer name.
-H Maximum_hops
Specifies the maximum number of hops for a search target.
-j computer-list
Specifies a sparse source route along the computer-list.
-W Timeout
Wait timeout the specified number of microseconds per reply.
Target_name
The name of the target computer.
In addition, there are IPCONFIG,DNR and other orders, here will not be introduced.
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.