1. The most basic, most commonly used, PING 192.168.10.88 -T, parameter-T is waiting for users to interrupt test
2. View DNS, IP, Mac, etc. A.WIN98: Winipcfgb.win2000 or above: IPConfig / All
C. JSLOOKUP: See DNSC: /> NSLOOKUPDEFAULT Server: ns.hesjptt.net .cnaddress: 202.99.160.68> Server 202.99.41.2, DNS is changed to 41.2> pop.pcpop.comserver: ns.hesjptt.net. Cnaddress: 202.99.160.68
Non-Authoritative Answer: name: pop.pcpop.comAddress: 202.99.160.212
3. Network letter makes NET send computer name / IP | * (broadcast) to transfer content, pay attention to stop the letter to stop the letter across the network segment, you can also start the messenger service in the panel - service modification of Net Start Messenger
4. Detect each other computer name, the group, domain, and the current username ping -a ip -t, only the NetBIOS name nbtstat -a 192.168.10.146 is more comprehensive
5.NetStat -a Show all port netstat -s -e, all ports open, and more about displaying your network information, including TCP, UDP, ICMP, and IP statistics, etc.
6. Detect the ARP binding (dynamic and static) list, display all connected to my computer, display the other party IP and MAC address ARP -A
7. Bundle IP and MAC address in the proxy server, solve the network of the IP: ARP -S 192.168.10.59 00-50-FF-6C-08-75 to solve the network card IP and MAC address binding: ARP -D NIC IP
8. Hide your computer NET Config Server / Hidden: YesNet Config Server / Hidden: yesNet config server / hidden: yesNet config server / hidden: yes
9. Several net commands A. Displays the current Workgroup Server List Net View, when you use this command without an option, it displays a list of computers on the current domain or network. For example: view shared resources on this IP, you can c: /> net view 192.168.10.8 at 192.168.10 shared resource resource resource resource shared name Type Types -------------------------------------------------- ---------------------- The website service Disk command successfully completed.
B. View user account list net userc on your computer. View network link NET USE, for example: Net Use z: //192.168.10.8/Movie maps this IP's MOVIE shared directory to a local Z disk
D. Record link NET session, for example: C: /> NET session computer username customer type open free time -------------------------- -------------------------------------------------- - // 192.168.10.110 Rome Windows 2000 2195 0 00:03:12
//192.168.10.51 Rome Windows 2000 2195 0 00:00:39 command successfully completed.
10. Route Track Command A.Tracert Pop.pcpop.comb.pathping pop.pcpop.com In addition to displaying routing, a 325S analysis is provided, calculating the% 11 of the lost package. About a few commands on sharing security A. View your machine Shared resource NET Shareb. Manually deleted shared net Share C $ / DNET Share D $ / DNET Share IPC $ / DNET Share Admin $ / D pay attention to a space. C. Add a sharing: C: / Net Share mymovie = E: / Downloads / Movie / Users: 1MyMovie shared success. At the same time, the number of limited link users is 1 person.
12. Set static IPA in DOS. Set static ipcmdnetshnetsh> intinterface> ipinterface ip> set add "Local link" Static IP address Mask Gatewayb. View IP Settings Interface IP> Show Addressarp Display and Modify "Address Resolution Protocol (ARP)" Projects in the cache. One or more tables are included in the ARP cache that stores the IP address and its resolved Ethernet or token ring physical address. Each Ethernet or token ring network adapter installed on a computer has its own separate table. If you use without parameters, the ARP command will display the help information.
Syntax ARP [-A [inetaddr] [-n ifceaddr]] [-g [inetaddr] [-n ifceaddr]] [-D inetaddr
[IFaceaddr]] [-s inetaddr etheraddr [iFaceaddr]]
Parameters -a [inetaddr] [-n ifceaddr] displays the current ARP cache table for all interfaces. To display the ARP cache item of the specified IP address, use it
The ARP -A of the inetaddr parameter, which is the INetAddr represents the specified IP address. To display the ARP cache table for the specified interface, use the -n ifceaddr parameter, which the IFACEADDR represents the IP address assigned to the specified interface. -N parameter is case sensitive. -g [inetaddr] [-n ifceaddr] is the same as -A. -d inetaddr [ifceaddr] deletes the specified IP address item, which is the INetAddr represents the IP address. For a specified interface, you want to delete an item in the table, use the ifAceAddr parameter, where the IFACEADDR represents the IP address assigned to the interface. To delete all items, use an asterisk (*) wildcard instead of inetaddr. -s inetaddr etheraddr [ifceaddr] Add IP address inetaddr to the static item of the physical address EtherAddr to the ARP cache. To add a static ARP cache item to the specified interface, use the ifAceAddr parameter, where the IFACEAddr represents the IP address assigned to the interface. /? Display help at the command prompt. Note The IP address of Inetdr and IFACEADDR is represented by a decimal number of decisions with a dot. The physical address EtherAddr consists of six bytes, which are represented by hexadecimal notes and is separated by a linker (for example, 00-AA-00-4F-2A-9C). The items added by the -s parameter belong to a static item, which will not timeout in the ARP cache. These items will be deleted if the TCP / IP protocol is terminated. To create a permanent static ARP cache item, use the appropriate ARP command in the batch file and run the batch file when starting through the Plan Task Program. This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To display an ARP cache table for all interfaces, type: ARP -A
For interfaces that the assigned IP address is 10.0.0.99, you want to display its ARP cache table, you can type:
ARP -A-N 10.0.0.99
To add a static ARP cache item parsing the IP address 10.0.0.80 into a physical address 00-AA-00-4F-2A-9C, you can type:
ARP -S 10.0.0.80 00-AA-00-4F-2A-9CRSH runs commands on remote computers running RSH services. Windows XP and Windows 2000 do not provide RSH services. Windows 2000 Server Resource Kit provides RSH services called RSHSVC.exe. Use RSH display without parameters to display help.
Syntax RSH [Host] [-l username] [-n] [Command]
Parameter Host Specifies a remote computer that runs Command. -l username Specifies the username used on remote computers. In the case of omitting, the name of the current login user is used. -n Redirects the input of the RSH to the NULL device. This prevents the display of the local computer command result. Command specifies the command to run. /? Display help at the command prompt. Note The standard operation RSH command copies the standard input to the remote command, copies the standard output of the remote Command to its standard output, and copy the standard error of the remote Command to its standard error. RSH usually terminates when the remote command is terminated.
Use the redirect symbol to cause the redirection to occur on the remote computer, to take redirect symbols (for example, ">>") in quotation marks. If you do not use quotation marks, redirect will occur on the local computer. For example, the following command attached to the remote file "remotefile" in the local file "LocalFile":
RSH OtherComputer Cat Remotefile >> LocalFile The following command is attached to the remote file in OtherRemotefile:
RSH OtherComputer Cat Remotefile ">>" OtherRemotefile
When using RSH, the domain's primary domain controller must be used to confirm the username or RSH command failed.
.rhosts file. Rhosts file usually licenses network access of UNIX systems. The.rhosts file lists the computer name and associated login name that can access the remote computer. When you run the RCP, REXEC, or RSH commands on the remote computer of the .rhosts file, you don't have to provide login and password information for remote computers.
The .rhosts file is a text file that each behavior is an entry. The entry is composed of local computer names, local usernames, and all annotations related to this entry. Each entry is separated by a tab or space, and the note is taken with a symbol (#). E.g:
Host7 #this computer is in room 31a
.rhosts file must be in the user home directory of the remote computer. For more information on remote computers .Rhosts file specific execution, see the documentation for the remote system.
This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To perform a Telcon command on a remote computer VAX1 in a name admin1, type:
RSH VAX1 -L Admin1 TelcontFTP Transports files to run a normal file transfer protocol (TFTP) service or DAEMON remote computer (especially running a Unix computer) or remote computer from the running ordinary file transfer protocol (TFTP) service or Daemon (especially Run the Unix computer) transfer file.
Syntax TFTP [-i] [Host] [{Get | Put}] [Source] [DESTINATION]
Parameter -i Specify binary image transfer mode (also known as octal mode). In binary image mode, the file is transmitted in one byte. Use this mode when transferred binary files. If the -i is omitted, the file will be transmitted in ASCII mode. This is the default transmission mode. This mode converts the tail (EOL) character to the appropriate format of the specified computer. Use this mode when sending a text file. If the file transfer is successful, the data transfer rate will be displayed. Host Specifies local or remote computers. PUT passes the Destination file on the local computer to the Source file on the remote computer. Because the TFTP protocol does not support user authentication, the user must log in to the remote computer, and the file must be written on the remote computer. GET transmits the Destination file on the remote computer to the Source file on the local computer. Source Specifies the files to be transferred. Destination Specifies the location of transferring files. If Destination is omitted, it will assume that it is the same name in the Source. /? Display help at the command prompt. Note Use the GET Parameters If you transfer file Fileton on your local computer to file fileOne on your remote computer, specify your PUT. If you transfer file FileTwo on a remote computer to file fileOne on a remote computer, specify GET.
Windows XP or Windows 2000 does not provide general purpose TFTP servers. The TFTP server service provided by Windows 2000 provides remote boot feature for Windows XP and Windows 2000 client computers. This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To transfer file users.txt from the local computer to users19.txt on remote computer VAX1, type: TFTP VAX1 PUT Uses.txt users19.txt
NBTSTAT displays the NetBIOS statistics based on TCP / IP (NetBT) protocol, NetBIOS name table, and NetBIOS name cache based on the local computer and remote computer. NBTSTAT can refresh the NetBIOS name cache and registration of Windows
Internet Name Service (WINS) name. Use NBTSTAT display help with parameters.
Syntax NBTSTAT [-A Remotename] [-A ipaddress] [-c] [-n] [-r] [-r] [-r] [-S] [-s] [interval]
Parameters - A Remotename Displays the NetBIOS Name Table of the Remote Computer, where RemoteName is the NetBIOS computer name of the remote computer. The NetBIOS Name Table is a list of NetBIOS names used by the application running on the computer.
-A ipaddress Displays the NetBIOS name table of the remote computer, which is specified by the IP address of the remote computer (separated by a decimal point). -c Displays the NetBIOS name cache content, NetBIOS name table, and each address thereof. -n Displays the NetBIOS name table of the local computer. The status in the registered indicates that the name is registered by the broadcast or WINS server. -r Displays the NetBIOS name resolution statistics. On the Windows XP computer configured to use WINS, this parameter will return the name number that has been parsed and registered by broadcast and WINS. -R Clear the contents of the NetBIOS name cache and reload from the LMHOSTS file with a #pre tag. -Rr Release and refresh the NetBIOS name of the local computer registered by WINS. -s Displays the NetBIOS client and server session and try to convert the target IP address to the name. -S Displays the NetBIOS Customer and Server Session, listed remote computers only via the IP address. Interval Re-displays the selected statistics, you can interrupt the number of seconds specified in Interval between each display. Press CTRL C to stop rescan statistics. If this parameter is omitted, NetStat will only display a current configuration information. /? Display help at the command prompt. Note NBTSTAT command line parameters are case sensitive. The following table lists the column headings generated by NBTSTAT. The title indicates the number of bytes that INPUT. The number of bytes sent in Output. IN / OUT This connection is from a computer (outgoing) or other computer to the local computer (incoming). The LIFT Name The time the cache item is saved before being cleared. Local Name Local NetBIOS name is associated with a connection. Remote Host is related to a remote computer related name or IP address. <03> Transforms the last byte of the hexadecimal NetBIOS name. Each NetBIOS name is 16 characters long. Since the last byte usually has special significance, because the same name (only the last byte) may appear several times on a computer. For example, <20> is a space in ASCII text. TYPE name type. The name can be a single name or a group name. Whether the NetBIOS service ("Registered") is running on the Status remote computer, or whether the same computer name has been registered ("conflict"). State NetBIOS connection status. The following table lists the possible NetBIOS connection status. Status Description The connection session has been established. The endpoint of associated connections has been created and associated with the IP address. INVASTATION The endpoint is available to the inner direction. The idle end point has been opened without receiving connections. The connection session is in the connection phase. At this stage, the mapping of the name to the IP address of the selected target is being parsed. Accepting an inbound session is currently being accepted and will be connected in a short term. Reconnect the session will try to reconnect (if the first connection failed). The outbound session is in the connection phase. This phase is creating a TCP connection. Inbound inbound sessions in the connection period. Disconnecting the session is disconnecting. The interrupts have been interrupted and the local computer has been disconnected and waited for the confirmation of the remote system.
This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To display the NetBIOS Name table of the NetBIOS computer named Corp07, type:
NBTSTAT -A CORP07
To display the NetBIOS name table of a remote computer that allocated IP addresses 10.0.0.99, type:
NBTSTAT -A 10.0.0.99
To display the NetBIOS name table of the local computer, type:
NBTSTAT-N
To display the contents of the local computer NetBIOS name cache, type: nbtstat -c
To clear the NetBIOS name cache and reload the item with tag #pre in the local LMHOSTS file, type:
NBTSTAT -R
To release the NetBIOS name registered through the WINS server and re-register it, type:
NBTSTAT -RR
To display NetBIOS session statistics every 5 seconds, type:
NBTSTAT -S 5NETSTAT Displays the active TCP connection, computer listening port, Ethernet statistics, IP routing table, IPv4 statistics (for IP, ICMP, TCP, and UDP protocols), and IPv6 statistics (for IPv6, ICMPv6, pass through IPv6 TCP and UDP protocols through IPv6). If you do not use a parameter, NetStat displays the active TCP connection.
Syntax NetStat [-a] [-e] [-n] [-o] [-P protocol] [-r] [-s] [interval]
Parameters -a Displays all active TCP connections and TCPs and UDP ports listening. -e Displays Ethernet statistics, such as sending and receiving bytes, number of packets. This parameter can be used in conjunction with -s. -n Displays the active TCP connection, but only the address and port number are expressed in digital form, but do not attempt to determine the name. -o Displays the active TCP connection and includes process ID (PID) of each connection. A PID-based application can be found on the Process tab in the Windows Task Manager. This parameter can be used in conjunction with -a, -n and -p. -p protocol Displays the connection of protocol specified by Protocol. In this case, Protocol can be TCP, UDP, TCPv6 or UDPv6. If the parameter displays statistics by the protocol with -s, Protocol can be TCP, UDP, ICMP, IP, TCPv6, UDPv6, ICMPv6 or IPv6. -s Displays statistics by protocol. By default, statistics for TCP, UDP, ICMP, and IP protocols are displayed. If you have an IPv6 protocol for Windows XP, statistics on the TCP, IPv6, and IPv6 protocols on IPv6 are displayed. The protocol set can be specified using the -p parameter. -r Displays the content of the IP routing table. This parameter is equivalent to the ROUTE PRINT command. Interval Re-displays a selected information every interval second. Press CTRL C to stop rescan statistics. If this parameter is omitted, NetStat will only print a selected information. /? Display help at the command prompt. Note The parameters used with this command must be prefixed as a short oblique line (/) as a short oblique line (/). NetStat provides the following statistics: Name of the Proto protocol (TCP or UDP).
Local Address's IP address of the local computer and the port number being used. If the -n parameter is not specified, the local computer name corresponding to the name of the IP address and the port is displayed. If the port is not established, the port is displayed in an asterisk (*).
Foreign Address Connect the IP address and port number of the remote computer of the slot. If the -n parameter is not specified, the name corresponding to the IP address and port is displayed. If the port is not established, the port is displayed in an asterisk (*).
(State) Indicates the status of the TCP connection. Possible status is as follows:
Close_wait
Closed
Established
FIN_WAIT_1
FIN_WAIT_2
Last_ack
Listen
SYN_RECEIVED
SYN_SEND
TIMED_WAIT
For information on TCP connection status, see RFC 793.
This command is only available when an internet protocol (TCP / IP) protocol is installed as components of the network adapter property in the network connection. Example To display the statistics of Ethernet statistics and all protocols, type the following command:
Netstat -e -s
To display only statistics of TCP and UDP protocols, type the following command:
Netstat -s -p TCP UDP
To display an active TCP connection and process ID every 5 seconds, type the following command:
NBTSTAT -O 5
To display the active TCP connection and process ID in digital form, type the following command:
NBTSTAT -N -ORUNAS allows users to run the specified tools and programs with other permissions instead of the privileges provided by the user.
Syntax Runas [{/ Profile | / NOPROFILE}] [/ env] [/ netonly] [/ smartcard] [/ showtrustlevels] [/ trustlevel] / user: useeraccountname Program
Parameter / Profile loads the user's configuration file. / profile is the default value. / no profile / noprofile Specifies the configuration file that does not load the user. This makes the application more quickly, but it will also cause errors in some applications. / ENV Specifies the currently used network environment instead of the user's local environment. / Netonly Indicates that the specified user information is only used for remote access. / smartcard / smartcard indicates whether the credentials are provided by the smart card. / showtrustlevels lists / trustlevel switch. / Trustlevel specifies the authorization level where the application is running. Use / Showtrustlevels to view available trust levels.
/ user: useerAccountname Specifies the name of the user account that runs the program under. The format of the user account should be User @ domain or domain / user. Program Specifies programs or commands to run in the account specified in / user. /? Display help at the command prompt. Note Administrators can perform daily, non-administrative tasks using a permission-restricted account, using a larger account only when performing a specific management task. To complete such tasks without logging in, you can log in with a general account, then use the runas command to run tools that require greater permissions. See "Related Topics" for use using the RunAs command. Although Runs is usually used by Administrator accounts, it is not limited to the Administrator account. Any user with multiple accounts can use the backup credentials, use the RunAs running program, MMC console or "Control Panel" item. If you want to use the Administrator account on your computer, for / user :, Type one of the following parameters: / user: administratoralaccountname @ computername
/ user: computername / administratraccountname
If you want to use this command as a domain administrator, type one of the following parameters: / user: administratraccountname @ domainname
/ User: domainname / administratraccountname
The runas command allows you to run programs (* .exe), saved MMC console (* .msc), programs and "Save MMC Console shortcuts and" Control Panel "items. As a member of another group (eg, "Users" or "Power Users" group logs in to the computer, you can run as an administrator. You can use the runaS command to launch any programs, MMC controllers, or "Control Panel" items. As long as the appropriate user account and password information are provided, the user account has the ability to log in to the computer, and the program, the MMC console, the "Control Panel" item can be used in the system and the user account can be used. RunaS command allows you to manage other domains Server (computer running tool and server to be managed in different domain). If you try to use RunAs from the Network Location Launch Program, the MMC Console, or the Control Panel item, it may fail because the credentials used to connect to the network share are different from the credentials used to start programs. The latter's credentials may not be able to access the same network share. Some items, such as the "printer" folder and desktop items, open by Windows 2000, and cannot start using the runas command. If the runaS command fails, it may be invalid if the user account that is not running the RunAs service or use. To check the status of the RunAs service, click Services and Applications in Computer Management, and then click Services. To test the user account, try using this account to log in to the appropriate domain. Example To start a Windows 2000 command prompt line instance on a local computer, type: runas / user: localmachinename / administrator cmd system prompt, type the administrator password.
To launch a Computer Management management unit instance using a domain administrator account called CompanyDomain / DomainAdmin, type:
RunaS / User: CompanyDomain / domainadmin "MMC% Windir% / System32 / CompMgmt.msc" When prompted, type the account password.
To start the Domain Administrator Account User in domain named domain.microsoft.com, type:
RunaS /user:user@domain.microsoft.com "NotePad my_file.txt" When prompted, type the account password.
To launch a command prompt, save the MMC console, control panel item, or an instance of the program to manage other locations, type:
RunaS / Netonly / User: domain / username "command" Domain / username must be a user with a sufficient authority management server. Type your account password when prompted.
Route displays and modifies the entry in the local IP routing table. Use ROUTE without parameters to display help.
Syntax Route [-f] [-p] [command [destination] [mask netmask] [Gateway] [metric metric]] [if interface]]
Parameters -f Clear All the main routes (the network mask is 255.255.255.255), the loopback network route (the target is 127.0.0.0, the network mask is 255.255.255.0) or multicast routing (target 224.0. 0.0. The routing of the network mask is 240.0.0.0. If it is used in conjunction with one of the commands (such as Add, Change or Delete), the table will be cleared before running the command. When using the add command, the specified route is added to the registry and initializes the IP routing table when starting the TCP / IP protocol. By default, the added routing will not be saved when the TCP / IP protocol is started. When used with the print command, a permanent routing list is displayed. All other commands ignore this parameter. Permanent routing is stored in the registry is HKEY_LOCAL_MACHINE / SYSTEM / CURRENTCONTROLSET / Services / TCPIP / Parameters / PersistentRoutes. Command specifies the command to run. The following table lists a valid command. Command Purpose Add Add Routing Change Changed Routing DELETE Delete Routing Print Print Routing
Destination Specifies the network destination address of the route. The target address can be an IP network address (where the host address bit of the network address is set to 0), and the host route is an IP address, and for the default route is 0.0.0.0. Mask SubnetMask specifies the net mask (also known as subnet mask) associated with the network destination address. The subnet mask can be an appropriate subnet mask for the IP network address, and the host route is 255.255.255.255, and for the default route is 0.0.0.0. If ignored, use the subnet mask 255.255.255.255. Defining the relationship between the route due to the target address and the subnet mask, the target address cannot be more detailed than the subnet mask therefor. In other words, if one of the subnet mask is 0, the corresponding bit in the target address cannot be set to 1. GATEWAY specifies the top or next hop IP address that exceeds the reachable address set defined by the network objectivity and the subnet mask. For subnet routing locally, the gateway address is an IP address assigned to the connected subnet interface. For remote routes that can be used through one or more routers, the gateway address is a direct access to the adjacent router, which can be directly reached. Metric Metric For routing the integer value of the required hop number (range is 1 ~ 9999), it is used to select the most matching route to the target address in the forwarding package in multiple routing in the routing table. The selected route has the least hop number. The number of hops can reflect the number of hops, the speed of the path, path reliability, path throughput, and management properties. If interface specifies the interface index of the interface that the target can arrive. Use the route print command to display a list of interfaces and their corresponding interface indexes. Decimal or hexadecimal values can be used for interface indexes. For hexadecimal values, add 0x in front of the hexadecimal number. When IF parameters are ignored, the interface is determined by the gateway address. /? Display help at the command prompt. Note The value of the number of hops in the routing table is large because the TCP / IP is allowed to automatically determine the routing number of routing in the routing table in the IP address, subnet mask, and default gateway according to each LAN interface. The default start-up automatic determination interface hop number determines the speed of each interface, adjusts the number of route hop points for each interface, so the route created by the fastest interface has the lowest hop number. To delete a large number of points, disable the number of automatic identified interface hops in the advanced properties of the TCP / IP protocol connected to each LAN. If there is an appropriate entry in the local network file in the SystemRoot / System32 / DRIVERS / ETC folder, the name can be used for DESTINATION. As long as the name can be used to decompose such a standard hostname parsing with the "Domain Name System" (DNS) to resolve the IP address, it can be used for GATEWAY, DNS query using the local host under the Systemroot / System32 / Drivers / etc folder. File and NetBIOS name resolution. If it is a print or delete command, you can ignore the Gateway parameter, use wildcard to represent the target and gateway. The value of Destination can be a wildcard specified by an asterisk (*). If the specified target contains an asterisk (*) or question mark (?), It is considered to be a wildcard, only printed or delete the matching target route. The asterisk represents any character sequence and the question mark represents any character. For example, 10. *. 1, 192.168. *, 127. * and * 224 * are all effective use of asterisk wildcard. The combination of invalid targets and subnet masks (net masks) values will be displayed "Route: Bad Gateway Address"
Netmask "error message. One or more bits in the target are set to 1, and this error occurs when the corresponding bit in the subnet mask is set to 0. You can use the binary representation to indicate the target and subnet mask to check this. Substrate. The subnet mask represented by binary includes a series of 0 to represent a series of 0 portions of the target network address portion. View the target to determine the host address part of the target (by subnet mask Definitions) Some bits are set to 1. Only Windows NT 4.0, Windows 2000, Windows Millennium Edition and Windows XP's Route command supports the -p parameter .Windows 95 or Windows 98's Route command does not support this parameter. Only when Internet Protocol (TCP / IP) When the protocol is installed as a component of the network adapter property in the network connection. This command is to display the full content of the IP routing table. Type: route print
To display the route started in the IP routing table, type:
Route Print 10. *
To add the default gate address of 192.168.12.1, type:
Route add 0.0.0.0 mask 0.0.0.0 192.168.12.1
To add the target 10.41.0.0, the subnet mask is 255.255.0.0, the next hop address is 10.27.0.1, type:
Route Add 10.41.0.0 Mask 255.255.0.0 10.27.0.1
To add a target 10.41.0.0, the subnet mask is 255.255.0.0, the next hop address is 10.27.0.1 permanent route, type:
Route -P Add 10.41.0.0 Mask 255.255.0.0 10.27.0.1
To add a target 10.41.0.0, the subnet mask is 255.255.0.0, the next hop address is 10.27.0.1, the number of hops is 7, type:
Route Add 10.41.0.0 Mask 255.255.0.0 10.27.0.1 Metric 7
To add the target 10.41.0.0, the subnet mask is 255.255.0.0, the next hop address is 10.27.0.1, the interface index is 0x3, type:
Route Add 10.41.0.0 Mask 255.255.0.0 10.27.0.1 IF 0x3
To delete the target is 10.41.0.0, the subnet mask is 255.255.0.0, type:
Route delete 10.41.0.0 mask 255.255.0.0
To delete all the routes starting with 10., type:
Route delete 10. *
To turn the target 10.41.0.0, the next hop address of the routing of the subnet mask is 255.255.0.0 is changed from 10.27.0.1 to 10.27.0.25, please type:
Route Change 10.41.0.0 Mask 255.255.0.0 10.27.0.25