ARP
Show and modify "Address Resolution Protocol" (ARP) to the Ethernet IP or token Ring Physical Address Translation Table. This command is only available after the TCP / IP protocol is installed.
ARP -A [inet_addr] [-n [if_addr]]]]
arp -d inet_addr [if_addr]
ARP -S INET_ADDR Ether_ADDR [if_addr]
parameter
-A
Display the current ARP item by querying TCP / IP. If INET_ADDR is specified, only the IP and physical address of the specified computer are displayed.
-g
The same as -a.
INET_ADDR
Specify an IP address in a dotted decimal tag.
NN
Displays the network interface ARP item specified by if_addr.
IF_addr
Specifies the IP address (if any) that needs to modify its address conversion table interface. If there is no existence, the first applicable interface will be used. -D
Delete the item specified by inet_addr.
-S
Add items to the ARP cache, associate the IP address INET_ADDR and physical address Ether_addr. The physical address is given by 6 hexadecimal bytes separated by a hyphen. Specify the IP address using a tether of the decimal tag. The item is permanent, that is, the timeout expiration will automatically remove from the cache.
ether_addr
Specify the physical address.
Finger
Display information about the user on the specified system running the finger service. Different variables are output according to the remote system. This command is only available after the TCP / IP protocol is installed.
Finger [-l] [user] @computer [...]
parameter
-L
Display information in a long list form. User
Specifies the user to obtain relevant information. Omit user parameters to display information about all users on the specified computer:
@computer
FTP
Transfer files to remote computers that are running the FTP service or send files from a remote computer that is running an FTP service (sometimes called daemon). FTP can interact with. Click the "FTP command" in the "Related Topic" list to obtain the available "FTP" subcommand description. This command is only available after the TCP / IP protocol is installed. FTP is a service. Once started, you will create a sub-environment in which the ftp command can be used, and you can return to the Windows 2000 command prompt by typing the quit subcommand. When the FTP sub-environment is run, it is represented by the FTP command prompt.
FTP [-V] [-N] [-i] [-d] [-g] [-ss: filename] [-a] [-w: windowsize] [Computer]
parameter
-V
Disable the remote server response.
NN
It is forbidden to log in to the initial connection.
-i
Turn off the interaction when transmitting multiple files.
-d
Enable debug, display all FTP commands passed between clients and servers.
-g
Disable file name groups, which allows the use of wildcard characters (* and?) In local files and pathnames. (See the glob command in the online "command reference".)
-s: filename
Specifies a text file containing the ftp command; these commands will automatically run when the FTP starts. Space is not allowed in this parameter. Use this switch instead of redirect (>).
-A
Use any local interface when bundled data connections.
-w: Windowsize
Alternatively the default size is 4096 transmission buffer.
Computer
Specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the line.
NBTSTAT
This diagnostic command uses NBT (TCP / IP NetBIOS) display protocol statistics and current TCP / IP connection. This command is only available after the TCP / IP protocol is installed.
NBTSTAT [-A Remotename] [-A IP address] [-c] [-n] [-r] [-r] [-s] [-S] [interval] parameter
-A Remotename
List its name table using the name of the remote computer.
-A ip address
Use the IP address of the remote computer to list the name table.
-C
Given the IP address of each name and list the contents of the NetBIOS name cache.
NN
List the local NetBIOS name. "Registered" indicates that the name has been registered in BNODE or WINS (other node type).
-R
Remove all names in the NetBIOS Name Cache to reload the LMHOSTS file.
-r
List the name resolution statistics of the Windows network name resolution. On the Windows 2000 computer configured to use WINS, this option returns the number of names to resolve and register by broadcast or WINS.
-S
Display client and server sessions, only listing remote computers through the IP address.
-S
Display client and server sessions. Try converting a remote computer IP address into the name of the host file.
Interval
Re-displays the selected statistics, suspend Interval seconds between each display. Press CTRL C to stop rescan statistics. If this parameter is omitted, NBTSTAT prints a current configuration information.
Netstat
Display protocol statistics and current TCP / IP network connections. This command can only be used after the TCP / IP protocol is installed.
NetStat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval]
parameter
-A
Display all connection and listening ports. Server connections are usually not displayed.
-e
Display Ethernet statistics. This parameter can be used in conjunction with the -s option.
NN
Display addresses and port numbers in digital format (instead of trying to find name).
-S
Displays statistics for each protocol. By default, statistics on TCP, UDP, ICMP, and IP are displayed. The -p option can be used to specify the default subset. -P protocol
Displays the connection to protocol specified by protocol; Protocol can be TCP or UDP. If you use the -s option to display the statistics of each protocol, Protocol can be TCP, UDP, ICMP, or IP.
-r
Display the contents of the routing table.
Interval
Re-displays the selected statistics, suspend Interval seconds between each display. Stop the statistics by Ctrl B stop. If this parameter is omitted, NetStat will print a current configuration information.
Ping
Verify the connection with the remote computer. This command can only be used after the TCP / IP protocol is installed.
Ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-V TOS] [-r count] [-s count] [[-j computer-list ] | [-K computer-list] [-w timeout] destination-list
parameter
-t
Ping specified computer until the interrupt.
-A
Resolve the address as the computer name.
-n count
Send count of the ECHO packet specified by COUNT. The default is 4.
-l Length
Send an Echo packet containing the amount of data specified by Length. The default is 32 bytes; the maximum is 65, 527.
-f
Send a "Do not segment" flag in the packet. The packet will not be segmented by the gateway on the route.
-i TTL
Set the "Survival Time" field to the value specified by TTL.
-V TOS
Set the Service Type field to the value specified by TOS.
-r count
Record the routing of the outgoing and returning packets in the Record Routing field. COUNT can specify at least 1 set, up to 9 computers.
-s count
Specifies the timestamp of the number of hops specified by count.
-j Computer-List
Routing the packet using the computer list specified using computer-list. A continuous computer can be separated by the intermediate gateway (routing sparse source) IP allowed to be 9. -k computer-list
Routing the packet using the computer list specified using computer-list. Continuous computers cannot be separated by intermediate gateway (routing strict source) IP allowed to 9.
-w Timeout
Specifies a timeshoot, unit is millisecond.
Destination-List
Specifies the remote computer to be ping.
RCP
Copy the file between the Windows 2000 computer and the system running the Remote Housing Port Monitor RSHD. The RCP command is a connection command that can also be used to replicate files between two running RSHDs from the Windows 2000 computers. The RSHD port monitor can be used on UNIX computers, but cannot be used on Windows 2000, so Windows 2000 computer can only be used as a system that issues a command. Remote computers must also provide RCP utilities by running RSHD.
RCP [-A | -B] [-h] [-r] Source1 Source2 ... Source2 ... Source1 Destination
parameter
-A
Specifies the ASCII transmission mode. This mode converts the carriage return / chamber to the carriage return on the outgoing file, and converts the lunar into the carriage return / wrap in the incoming file. This mode is the default transmission mode.
-b
Specifies the binary image transfer mode. No carriage return / commissioning conversion is performed.
-H
Transfer a source file that is marked as hidden attribute on a Windows 2000 computer. If there is no such option, the effect of specifying the hidden file on the RCP command line is not the same as the file.
-r
Cut all the subdirectory contents of the source to the target. Source and Destination must be a directory, although even if the source is not a directory, use -r can also work. But there will be no recursive.
Source and Destination
The format must be [Computer [.user]: FileName. If the [Computer [.user]:] section is ignored, the computer will assume a local computer. If the [.User] section is omitted, the currently logged in Windows 2000 username will be used. If a fully qualified computer name is used, in which [.user] must be included in [.User]. Otherwise, the last part of the computer name will be interpreted as a username. If multiple source files are specified, Destination must be a directory. If the file name is not headed by UNIX's forward slash (/) or the backslash (/) of the Windows 2000 system, it is assumed to be relative to the current working directory. In Windows 2000, this is a directory that issues a command. In the remote system, this is the login directory of the remote user. The period (.) Represents the current directory. Use escape characters (/, "or ') in remote paths to use wildcards in remote computers.
REXEC
Run the command on the remote computer running the REXEC service. Before executing the specified command, verify the username on the remote computer, only the command can only be used after the TCP / IP protocol is installed.
Rexec computer [-l username] [-n] Command
parameter
Computer Specifies the remote computer to run Command.
-l username Specifies the username on the remote computer.
-r
Redirect Rexec's input to NULL.
Command specifies the command to run.
Route
Control network routing table. This command can only be used after the TCP / IP protocol is installed.
Route [-f] [-p] [Command [Destination] [mask subnetmask] [Gateway] [metric costmetric]]
parameter
-f
Clear the routing table of all gateway entrances. If this parameter is used in combination with a command, the routing table will be cleared before the command is run.
-p
When this parameter is used with the Add command, the route will last for a long time between the system boot. By default, the system does not retain the route when restarted. When used with the Print command, display the registered persistent routing list. Ignore all other commands that always affect the respective persistent routes.
Command
Specify one of the following commands.
Command Purpose Print Print Routing Add Add Route Delete Delete Routing Change Change Now Route Destination
Specifies the computer that sends a Command.
Mask Subnetmask
Specifies the subnet mask associated with the route entry. If not specified, 255.255.255.255 will be used.
Gateway specifies the gateway.
A network database file called Networks and a computer name database file named Hosts references the symbol names used by Destination or Gateway. If the command is Print or delete, the target, and gateways can also use wildcards, and the gateway parameters can be omitted.
Metric Costmetric
The number of integer hops (from 1 to 9999) is used to calculate the fastest, most reliable and / or cheapest route.
RSH
Run the command on the remote computer running the RSH service. This command can only be used after the TCP / IP protocol is installed.
RSH computer [-l username] [-n] Command
parameter
Computer
Specifies the remote computer running Command.
-l username
Specifies the username used on the remote computer. If omitted, use the login username.
NN
Redirect the input RSH to NULL.
Command
Specifies the command to run.
TFTP
Transfer files to remote computers that are running TFTP services or transfer files from a remote computer that is running a TFTP service. This command can only be used after the TCP / IP protocol is installed.
TFTP [-i] computer [get | put] Source [destination]
parameter
-i
Specify binary image transfer mode (also known as "eight bytes"). In binary image mode, the file is one byte to move by one byte. Use this mode when transferred binary files.
If the -i is omitted, the file will be transmitted in ASCII mode. This is the default transmission mode. This mode converts the EOL character to UNIX's carriage return and a host computer's carriage return / wrap. This mode should be used when sending a text file. If the file transfer is successful, the data transfer rate will be displayed. Computer
Specify local or remote computers.
PUT
Transfer file Destination on your local computer to files Source on your remote computer.
get
Transfer file Destination on your remote computer to a file source on your local computer.
If you transfer file file-two on your local computer to file file-one on a remote computer, specify PUT. If you transfer file File-Two on a remote computer to file file-one on a remote computer, specify GET.
Because the TFTP protocol does not support user authentication, the user must log in, and the file must be written on the remote computer.
Source
Specifies the file to be transmitted. If the local file is specified -, the remote file is printed on stdout (if obtained), or read from stdin.
Destination
Specifies the location to transfer files. If Destination is omitted, it will assume that the same name is in the Source.
Tracert
This diagnostic utility will send an Internet Control Message Protocol (ICMP) that contains different survival time (TTL) values to the target to determine the route to the target. To deliver at least 1, the TTL is a valid hop count before the TTL of the forwarding packet is forwarded. When the TTL on the packet arrives at 0, the router should send the "ICMP timeout" message back source. Tracert first sends a TTL to 1 echo packet and increment TTL at a subsequent delivery process, until the target response or TTL reaches the maximum value, thereby determining the route. Routing determines the route by checking the "ICMP timeout" message sent back to the intermediate router. However, some routers quietly down through packets that contain expired TTL values, and Tracert can't see. Tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name
parameter
/ d
Specifies that the address is not resolved as the computer name.
-h maximum_hops
Specifies the maximum number of hop points for search targets.
-j Computer-List
Specifies the sparse source routing along Computer-List.
-w Timeout
Every time you answer the number of microseconds to be specified by Timeout.
Target_name
Target computer name.