ARP: Display and modify "Address Resolution Protocol" (ARP) to the Ethernet IP or token Ring Physical Address Translation
table. This command can only be used after the TCP / IP protocol is installed.
ARP -A [inet_addr] [-n [if_addr]]]]
arp -d inet_addr [if_addr]
ARP -S INET_ADDR Ether_ADDR [if_addr]
parameter
-a Displays the current ARP item by querying TCP / IP. If INET_ADDR is specified, only the specified calculation is displayed.
The IP and physical address of the machine.
-g is the same as -A.
INET_ADDR specifies the IP address in a dotted decimal tag.
-N Displays the network interface ARP item specified by if_addr.
if_addr specifies the IP address (if any if any) you need to modify its address conversion table interface. If there is no existence,
A applicable interface.
-d Delete items specified by inet_addr.
-s Add items in the ARP cache to associate the IP address INET_ADDR and physical address Ether_addr. Matter
The address is given by 6 hexadecimal bytes separated by a hyphen. Specify IP with a point of decimal tag
address. The item is permanent, that is, the timeout expiration will automatically remove from the cache.
Ether_ADDR Specifies the physical address.
--------------------------------------------
Finger Displays information about the user on the specified system running the finger service. Different changes according to the remote system output
the amount. This command is only available after the TCP / IP protocol is installed.
Finger [-l] [user] @computer [...]
parameter
-l Displays information in a long list form.
User Specifies the user to get related information. Omit user parameters to display information about all users on the specified computer:
@computer
--------------------------------------------
FTP transmits files to remote computers that are running FTP or remote computers that are running FTP services
Transfer files (sometimes called daemon). FTP can interact with. Click on the "Related Topic" list
"FTP Command" to obtain the available "FTP" sub-command description. This command is only installed in the TCP / IP protocol
It is only available. FTP is a service. Once started, it will create a sub-ring that can use the ftp command.
To return to the Windows 2000 command prompt from the child environment by typing the quit subcommand. when
The FTP sub-environment is running by the FTP command prompt.
FTP [-V] [-N] [-i] [-d] [-g] [-ss: filename] [-a] [-w: windowsize] [Computer]
parameter
-v prohibits displaying a remote server response.
-n prohibits automatically logging in to an initial connection.
-i multiple file transfer When the interaction tips are turned off.
-d Enable debug, display all FTP commands passed between clients and servers.
-g Disable file name, which allows usage of wildcard characters (* and?) in local files and path names. (See
The glob command in the "Command Reference" online. )
-s: filename Specifies a text file containing the ftp command; these commands will automatically run when the FTP starts. This parameter
Space is not allowed. Use this switch instead of redirection (>
.
-A Use any local interface when bundled data connections.
-w: Windowsize replaces the default size of 4096 transmission buffer.
Computer Specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the most
The latter parameter.
--------------------------------------------
NBTSTAT This diagnostic command uses NBT (NetBIOS on TCP / IP) and the current TCP / IP connection. This command is only available after the TCP / IP protocol is installed.
NBTSTAT [-A Remotename] [-A ip address] [-c] [-n] [-r] [-r] [-s] [-s] [interval]
parameter
-A Remotename lists its name table using the name of the remote computer.
-A IP Address uses a remote computer's IP address to list a name table.
-c gives the IP address of each name and lists the contents of the NetBIOS name cache.
-n lists the local NetBIOS name. "Registered" indicates that the name has been broadcast (BNODE) or WINS
His node type) registration.
-R Remove all names in the NetBIOS Name Cache to reload the LMHOSTS file.
-r lists the name resolution statistics of the Windows network name resolution. In configuring Windows using WINS
On the 2000 computer, this option returns the number of names to resolve and register by broadcast or WINS.
-S Displays the client and server session, listed remote computers only via the IP address.
-s Displays the client and server session. Try to convert remote computer IP addresses into names using host files
"Said.
Interval Re-displays the selected statistics, and suspend Interval seconds between each display. Press Ctrl C to stop re-
Display statistics. If this parameter is omitted, NBTSTAT prints a current configuration information.
--------------------------------------------
NetStat Displays protocol statistics and current TCP / IP network connections. This command is only after the TCP / IP protocol is installed.
Can be used.
NetStat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval]
parameter
-a Displays all connection and listening ports. Server connections are usually not displayed.
-e Displays Ethernet statistics. This parameter can be used in conjunction with the -s option.
-n Displays the address and port number in digital format (instead of trying to find the name).
-s Displays statistics for each protocol. By default, statistics on TCP, UDP, ICMP, and IP are displayed. -P selection
The item can be used to specify the default subset.
-p protocol Displays the connection of protocols specified by Protocol; Protocol can be TCP or UDP. If with
The S option uses the statistics of each protocol together, and Protocol can be TCP, UDP, ICMP, or IP.
-r Displays the contents of the routing table.
Interval re-displays the selected statistics and suspend Interval seconds between each display. Stop reply by Ctrl B
Display statistics. If this parameter is omitted, NetStat will print a current configuration information.
--------------------------------------------
Ping verifies the connection to a remote computer. This command can only be used after the TCP / IP protocol is installed.
Ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-V TOS] [-r count] [-s count] [[-j computer-list ] | [-K computer-list] [-w timeout] destination-list
parameter
-t ping specifies the computer until the interrupt.
-a resolves the address as a computer name.
-n count Sends count of the ECHO packet specified by COUNT. The default is 4.
-l Length Sends an Echo packet containing the amount of data specified by Length. The default is 32 bytes; the maximum is
65,527.
-f Send "Do not segment" flag in the packet. The packet will not be segmented by the gateway on the route.
-i TTL sets the "Survival Time" field to the value specified by TTL. -V TOS sets the Service Type field to the value specified by TOS.
-r Count Records the route from the "Record Routing" field. COUNT can specify at least 1 set,
Up to 9 computers.
-s count Specifies the timestamp of the number of hops specified by count.
-j Computer-List uses computer-list to route packets. Continuous computers can be in
The maximum number of networks allowed by the gateway separation (routing sparse source) IP is 9.
-k computer-list Routing packets using Computer-List specified by computer-list. Continuous computers cannot be in
The gateway separation (routing strict source) IP allowed maximum number is 9.
-w Timeout specifies a time division, in milliseconds.
Destination-list Specifies a remote computer to be ping.
------------------------------------------
RCP replication between Windows 2000 computers and running remote enclosure port monitor RSHD systems
Part. The RCP command is a connection command that can also be sent from the Windows 2000 computer.
Used to copy files between two computers running RSHD. RSHD port monitoring program
Use on UNIX computers, but cannot be used on Windows 2000, so Windows 2000
Computers can only be used as systems that make commands. Remote computers must also provide RSHD
RCP utility.
RCP [-A | -B] [-h] [-r] Source1 Source2 ... Source2 ... Source1 Destination
parameter
-a Specifies the ASCII transmission mode. This mode converts the carriage return / chamber to the carriage return in the outgoing file.
Convert the lunar in the file to the Enter / Railing. This mode is the default transmission mode.
-b Specifies the binary image transfer mode. No carriage return / commissioning conversion is performed.
-H Transfer Source files marked as hidden properties on a Windows 2000 computer. If there is no option,
The effect of specifying the hidden file on the RCP command line is the same as the file.
-r Cut all the subdirectories of the source to the target. Source and Destination must be
Record, although even if the source is not a directory, use -R can also work. But there will be no recursive.
Source and Destination
The format must be [Computer [.user]: FileName. If the [Computer [.user]:] section is ignored, the computer will assume a local computer. If the [.User] section is omitted, the currently logged in Windows 2000 username will be used. If a fully qualified computer name is used, in which [.user] must be included in [.User]. Otherwise, the last part of the computer name will be interpreted as a username. If multiple source files are specified, Destination must be a directory.
If the file name is not headed by UNIX's forward slash (/) or the backslash (/) of the Windows 2000 system, it is assumed to be relative to the current working directory. In Windows 2000, this is a directory that issues a command. In the remote system, this is the login directory of the remote user. The period (.) Represents the current directory. Use escape characters (/, "or ') in remote paths to use wildcards in remote computers.
-------------------------------------------
Rexec runs a command on a remote computer running the Rexec service. The REXEC command before performing the specified command,
The user name on the remote computer can only be used after the TCP / IP protocol is installed.
Rexec computer [-l username] [-n] command parameters
Computer Specifies the remote computer to run Command.
-l username Specifies the username on the remote computer.
-n redirects the input of Rexec to NULL.
Command specifies the command to run.
--------------------------------------------
Route control network routing table. This command can only be used after the TCP / IP protocol is installed.
Route [-f] [-p] [Command [Destination] [mask subnetmask] [Gateway] [metric costmetric]]
parameter
-f Clear the routing table of all gateway entrances. If this parameter is used in combination with a command, the routing table will run
Clear before command.
-P This parameter is used with the add command, the route will last for a long time between the system boot. default
In case, the system does not retain the route when the system is restarted. When used with the print command, the registered
Hard lasting routing list. Ignore all other commands that always affect the respective persistent routes.
Command specifies one of the following commands.
Command Purpose Print Print Road
Add add route
Delete delete routing
Change changed the existing deposit
Destination Specifies the computer that sends a Command.
Mask SubnetMask specifies the subnet mask associated with the route entry. If not specified, will be used
.
Gateway specifies the gateway.
A network database file called Networks and a computer name database file named Hosts references the symbol names used by Destination or Gateway. If the command is Print or delete, the target, and gateways can also use wildcards, and the gateway parameters can be omitted.
Metric CostMetric assigns the number of integer hops (from 1 to 9999) to calculate the fastest, most reliable and / or cheapest
Routing is used.
-------------------------------------------------- -------------------------------
RSH
Run the command on the remote computer running the RSH service. This command can only be used after the TCP / IP protocol is installed.
RSH computer [-l username] [-n] Command
parameter
Computer Specifies the remote computer running Command.
-l username Specifies the username used on remote computers. If omitted, use the login username.
-n redirects the input of the RSH to NULL.
Command specifies the command to run.
__________________________________________________________________________________________________________
TFTP Transfer files to remote computers running TFTP services or from running the TFTP service
Cheng computer transfer file. This command can only be used after the TCP / IP protocol is installed.
TFTP [-i] computer [get | put] Source [destination]
parameter
-i Specifies binary image transfer mode (also known as "eight bytes"). In binary image mode, file one
One byte is moved by one byte. Use this mode when transferred binary files.
If the -i is omitted, the file will be transmitted in ASCII mode. This is the default transmission mode. This mode converts the EOL character to UNIX's carriage return and a host computer's carriage return / wrap. This mode should be used when sending a text file. If the file transfer is successful, the data transfer rate will be displayed.
Computer Specifies local or remote computers.
PUT transmits the file Destination on the local computer to the file Source on the remote computer. GET transmits Destination on the remote computer to the file Source on the local computer.
If you transfer file file-two on your local computer to file file-one on a remote computer, specify PUT. If you transfer file File-Two on a remote computer to file file-one on a remote computer, specify GET. Because the TFTP protocol does not support user authentication, the user must log in, and the file must be written on the remote computer.
Source Specifies the files to be transferred. If the local file is specified as -, the remote file is printed on STDOUT.
(If obtained) or read from stdin.
Destination Specifies the location of transferring files. If Destination is omitted, it will assume that the same name is in the Source.
__________________________________________________________________________________________________________________
Tracert This diagnostic utility will contain Internet Control Message Protocols that contain different survival time (TTL) values
(ICMP) Election Packets Send to the target to determine the route used by the target. To forward the packet
Before the TTL, at least one, the required path, so TTL is a valid hopmeter
number. When the TTL on the packet arrives at 0, the router should send the "ICMP timeout" message to the source
System. Tracert first sends TTL to 1 echo packet, and will take TTL at the subsequent delivery process
Increment 1, until the target response or TTL reaches the maximum value, thereby determining the route. Routing through checking intermediate
The "ICMP Timeout" message sent back to the router to determine the route. However, some routers quietly down
Contains a packet of the expired TTL value, while Tracert can't see.
Tracert [-d] [-h maximum_hops] [-j computer-list] [-w timeout] target_name
parameter
/ D Specifies that the address is not resolved as the computer name.
-h maximum_hops Specifies the maximum number of hop points for search targets.
-j Computer-List Specifies the sparse source routing along Computer-List.
-w Timeout answers the number of microseconds to be specified by Timeout each time.
Target_name The name of the target computer.