Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Sorting out common network-related commands under DOS

2025-03-31 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Development >

Share

Shulou(Shulou.com)06/03 Report--

This article introduces the relevant knowledge of "sorting out common network-related commands under DOS". In the operation of actual cases, many people will encounter such a dilemma, so let the editor lead you to learn how to deal with these situations. I hope you can read it carefully and be able to achieve something!

Arp

Displays and modifies the IP or token Ring physical address translation table to Ethernet used by address Resolution Protocol (ARP). This command is available only after the TCP/IP protocol is installed.

Arp-a [inet_addr] [- N [if_addr]]

Arp-d inet_addr [if_addr]

Arp-s inet_addr ether_addr [if_addr]

Parameters.

-a

Displays the current ARP entry by asking TCP/IP. If inet_addr is specified, only the IP and physical address of the specified computer are displayed.

-g

Same as-a.

Inet_addr

Specify the IP address with a dotted decimal mark.

-N

Displays the ARP entry for the network interface specified by if_addr.

If_addr

Specify the IP address, if any, whose address translation table interface needs to be modified. If it does not exist, the first applicable interface is used.

-d

Deletes the item specified by inet_addr.

S

Add an entry to the ARP cache to associate the IP address inet_addr with the physical address ether_addr. The physical address is given by six hexadecimal bytes separated by a hyphen. Use dotted decimal tags to specify the IP address. The item is permanent, that is, it is automatically deleted from the cache after the timeout expires.

Ether_addr

Specify the physical address.

Finger

Displays information about the user on the specified system running the Finger service. Output different variables according to the remote system. This command is available only after the TCP/IP protocol is installed.

Finger [- l] [user] @ computer [...]

Parameters.

-l

Displays information in a long list format.

User

Specify the user to get the relevant information. Omit the user parameter to display information for all users on the specified computer:

@ computer

Ftp

Transfer files to or from a remote computer that is running the FTP service (sometimes called daemon). Ftp can be used interactively. Click ftp commands in the related topics list for a description of the available ftp subcommands. This command is available only after the TCP/IP protocol is installed. Ftp is a service that, once started, creates a subenvironment in which you can use the ftp command, and you can return to the Windows 2000 command prompt from the subenvironment by typing the quit subcommand.

When the ftp subenvironment is running, it is represented by the ftp command prompt.

Ftp [- v] [- n] [- I] [- d] [- g] [- s:filename] [- a] [- w:windowsize] [computer]

Parameters.

-v

Suppresses the display of remote server responses.

-n

Disable automatic login to the initial connection.

-I

Turn off interactive prompts when multiple files are transferred.

-d

Enables debugging and displays all ftp commands passed between the client and the server.

-g

Disables the filename group, which allows the use of wildcard characters (* and?) in local files and pathnames. (see the glob command in the online Command reference. )

-s: filename

Specify the text file that contains the ftp commands; when ftp starts, these commands run automatically. Spaces are not allowed in this parameter. Use this switch instead of redirection (>).

-a

Use any local interface when bundling a data connection.

-w:windowsize

Replaces the transfer buffer with a default size of 4096.

Computer

Specify the computer name or IP address to connect to the remote computer. If specified, the computer must be the last parameter of the line.

Nbtstat

This diagnostic command uses NBT (NetBIOS on TCP/IP) to display protocol statistics and current TCP/IP connections. This command is available only after the TCP/IP protocol is installed.

Nbtstat [- a remotename] [- An IP address] [- c] [- n] [- R] [- r] [- S] [- s] [interval]

Parameters.

-a remotename

Lists the name table of the remote computer using its name.

-An IP address

Use the IP address of the remote computer and list the names.

-c

Give the IP address of each name and list the contents of the NetBIOS name cache.

-n

Lists the local NetBIOS name. Registered indicates that the name has been registered by broadcast (Bnode) or WINS (other node types).

-R

After clearing all names from the NetBIOS name cache, reload the Lmhosts file.

-r

Lists name resolution statistics for Windows network name resolution. On Windows 2000 computers configured to use WINS, this option returns the number of names to be resolved and registered by broadcast or WINS.

-S

Displays client and server sessions, listing remote computers by IP address only.

S

Displays client and server sessions. Try to convert the IP address of the remote computer to a name that uses the host file.

Interval

Redisplays the selected statistics, pausing interval seconds between each display. Press CTRL+C to stop redisplaying statistics. If this parameter is omitted, nbtstat prints the current configuration information once.

Netstat

Displays protocol statistics and current TCP/IP network connections. This command can only be used if the TCP/IP protocol is installed.

Netstat [- a] [- e] [- n] [- s] [- p protocol] [- r] [interval]

Parameters.

-a

Displays all connection and listening ports. Server connections are usually not displayed.

-e

Displays Ethernet statistics. This parameter can be used in conjunction with the-s option.

-n

Displays the address and port number in numeric format (instead of trying to find the name).

S

Displays statistics for each protocol. By default, statistics for TCP, UDP, ICMP, and IP are displayed. The-p option can be used to specify the default subset.

-p protocol

Displays the connection to the protocol specified by protocol; the protocol can be tcp or udp. If used with the-s option to display statistics for each protocol, protocol can be tcp, udp, icmp, or ip.

-r

Displays the contents of the routing table.

Interval

Redisplays the selected statistics, pausing interval seconds between each display. Press CTRL+B to stop redisplaying statistics. If this parameter is omitted, netstat prints the current configuration information once.

Ping

Verify the connection to the remote computer. This command can only be used if the TCP/IP protocol is installed.

Ping [- t] [- a] [- n count] [- l length] [- f] [- I ttl] [- v tos] [- r count] [- s count] [[- j computer-list] | [- k computer-list]] [- w timeout] destination-list

Parameters.

-t

The computer specified by Ping until interrupted.

-a

Resolve the address to the computer name.

-n count

Sends the number of ECHO packets specified by count. The default value is 4.

-l length

Sends an ECHO packet containing the amount of data specified by length. The default is 32 bytes; the maximum is 65527.

-f

Send the "do not segment" flag in the packet. The packet is not segmented by the gateway on the route.

-I ttl

Set the time to Live field to the value specified by ttl.

-v tos

Set the Service Type field to the value specified by tos.

-r count

Record the routes of outgoing and return packets in the record Route field. Count can specify at least 1 computer and up to 1 computer.

Specify the remote computer to ping.

Rcp

Copy files between the Windows 2000 computer and the system running the remote shell port monitor rshd. The rcp command is a connection command that can also be used for other transfers to copy files between two computers running rshd when issued from a Windows 2000 computer. The rshd port monitor can be used on UNIX computers, but not on Windows 2000, so Windows 2000 computers can only participate as the system that issues commands. The remote computer must also provide the rcp utility by running rshd.

Rcp [- a |-b] [- h] [- r] source1 source2... SourceN destination

Parameters.

-a

Specifies the ASCII transfer mode. This mode converts carriage return / newline characters to carriage returns on outgoing files and to carriage return / newline characters in incoming files. This mode is the default transport mode.

-b

Specifies the binary image transfer mode. Carriage return / newline conversion was not performed.

-h

Transfer source files marked as hidden attributes on your Windows 2000 computer. Without this option, specifying a hidden file on the rcp command line has the same effect as if the file does not exist.

-r

Recursively copies the contents of all subdirectories of the source to the destination. Both source and destination must be directories, although using-r works even if the source is not a directory. But there will be no recursion.

Source and destination

The format must be [computer [.user]:] filename. If you omit the [computer [.user]:] section, the computer is assumed to be the local computer. If the [.user] section is omitted, the Windows 2000 username currently logged in will be used. If a fully qualified computer name is used, it contains a period (.) Delimiter, you must include [.user]. Otherwise, the last part of the computer name is interpreted as the user name. If more than one source file is specified, the destination must be a directory.

If the file name does not start with the forward slash (/) of UNIX or the backslash (\) of Windows 2000 systems, it is assumed to be relative to the current working directory. In Windows 2000, this is the directory where commands are issued. On a remote system, this is the login directory of the remote user. Period (.) Represents the current directory. Use escape characters (\, "or') in the remote path to use wildcards on the remote computer.

Rexec

Run the command on a remote computer running the REXEC service. The rexec command validates the user name on the remote computer before executing the specified command, and cannot be used until the TCP/IP protocol is installed.

Rexec computer [- l username] [- n] command

Parameters.

Computer

Specify the remote computer on which to run command.

-l username

Specifies the user name on the remote computer.

-r

Redirect the input from rexec to NULL.

Command

Specify the command to run.

Route

Controls the network routing table. This command can only be used if the TCP/IP protocol is installed.

Route [- f] [- p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]]

Parameters.

-f

Clear the routing table for all gateway entrances. If this parameter is used in combination with a command, the routing table is cleared before running the command.

-p

This parameter, when used with the add command, persists the route between system bootstrappers. By default, routes are not retained when the system reboots. Displays a list of registered persistent routes when used with the print command. Ignore all other commands that always affect the corresponding persistent route.

Command

Specify one of the following commands.

Purpose of command

Print print Route

Add add Route

Delete delete route

Change changes an existing route

Destination

Specify the computer on which to send the command.

Mask subnetmask

Specifies the subnet mask associated with the route entry. If not specified, 255.255.255.255 is used.

Gateway

Specify the gateway.

The symbolic names used by all destination or gateway are referenced in both the network database file named Networks and the computer name database file named Hosts. If the command is print or delete, the destination and gateway can also use wildcards or omit gateway parameters.

Metric costmetric

Assign integer hops (from 1 to 9999) to use when calculating the fastest, most reliable, and / or cheapest routes.

Rsh

Run the command on a remote computer running the RSH service. This command can only be used if the TCP/IP protocol is installed.

Rsh computer [- l username] [- n] command

Parameters.

Computer

Specifies the remote computer running command.

-l username

Specifies the user name to use on the remote computer. If omitted, the user name of the login is used.

-n

Redirect the input from rsh to NULL.

Command

Specify the command to run.

Tftp

Transfer files to or from a remote computer that is running the TFTP service. This command can only be used if the TCP/IP protocol is installed.

Tftp [- I] computer [get | put] source [destination]

Parameters.

-I

Specifies the binary image transfer mode (also known as octet). In binary image mode, the file is moved byte by byte. Use this mode when transferring binaries.

If-I is omitted, the file will be transferred in ASCII mode. This is the default transport mode. This mode converts EOL characters to carriage returns for UNIX and carriage returns / line feeds for personal computers. This mode should be used when transferring text files. If the file transfer is successful, the data transfer rate is displayed.

Computer

Specify a local or remote computer.

Put

Transfer the file destination on the local computer to the file source on the remote computer.

Get

Transfer the file destination on the remote computer to the file source on the local computer.

If you transfer the file file-two on the local computer to the file file-one on the remote computer, specify put. If you transfer the file file-two on the remote computer to the file file-one on the remote computer, specify get.

Because the tftp protocol does not support user authentication, the user must log in and the file must be writable on the remote computer.

Source

Specifies the file to be transferred. If the local file is specified as -, the remote file is printed on stdout (if obtained) or read from stdin (if placed).

Destination

Specifies the location to which the file is transferred. If destination is omitted, the same name as source is assumed.

Tracert

The diagnostic utility sends Internet Control message Protocol (ICMP) echo packets with different time-to-live (TTL) values to the destination to determine the route to reach the destination. To decrement at least 1 before forwarding the TTL on the packet, each router on the path is required, so TTL is a valid hop count. When the TTL on the packet reaches 0, the router should send the message "ICMP timed out" back to the source system. Tracert first sends an echo packet with a TTL of 1, and increments the TTL by 1 in each subsequent transmission until the destination response or TTL reaches the maximum value to determine the route. The route determines the route by examining the "ICMP timed out" message sent back by the intermediate router. However, some routers quietly upload packets containing expired TTL values that tracert cannot see.

Tracert [- d] [- h maximum_hops] [- j computer-list] [- w timeout] target_name

Parameters.

/ d

Specifies that the address is not resolved to the computer name.

-h maximum_hops

Specifies the maximum number of hops for the search target.

-j computer-list

Specifies a sparse source route along the computer-list.

-w timeout

The number of microseconds to wait for each reply specified by timeout.

Target_name

The name of the target computer.

In addition, there are IPCONFIG,DNR and other commands, which will not be introduced here.

This is the end of the content of "sorting out common network-related commands under DOS". Thank you for your reading. If you want to know more about the industry, you can follow the website, the editor will output more high-quality practical articles for you!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Development

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report