Watch this. This command can only be used after the TCP/IP protocol is installed.
Arp -a [inet address] [-N [if address]]
Arp -d inet address
arp -s inet_addr ether_addr
parameter
-a displays the current ARP entry by asking TCP/IP. If inet_addr is specified, only the specified calculation is displayed.
IP and physical address of the computer.
-g is the same as-a.
Inet_addr specifies the IP address in dotted decimal notation.
-N displays the network interface ARP entry specified by if_addr.
If_addr specifies the IP address (if any) of the interface of the address translation table that needs to be modified. If it does not exist, the first one will be used.
Applicable interface.
-d Deletes the item specified by inet_addr.
-s adds an entry in the ARP cache to associate the IP address inet_addr with the physical address ether_addr. thing
The logical address is given by 6 hexadecimal bytes separated by hyphens. Specify IP using dotted decimal notation.
Address. Items are permanent, that is, items are automatically deleted from the cache after the timeout expires.
Ether_addr specifies the physical address.
-
Finger displays user information on the specified system running the Finger service. According to different changes of remote system output
Quantity. This command is available only after the TCP/IP protocol is installed.
Finger [-l][ User] @ Computer [...]
parameter
-l displays information in a long list format.
User specifies the user whose information you need. Omit the user parameter to display information about all users on the specified computer:
@ Computer
-
Ftp transfers files between remote computers running FTP services.
Transfer files (sometimes called daemons). Ftp can be used interactively. Click in the list of related topics.
"ftp command" for a description of the available "ftp" subcommands. This command is only available if the TCP/IP protocol is installed.
It won't be available until later. Ftp is a service. Once it is started, it will create a subring where ftp commands can be used.
In this context, you can return to the Windows 2000 command prompt from the sub-environment by typing the quit subcommand. while
When the ftp sub-environment is running, it is indicated by the ftp command prompt.
Ftp [-v] [-n] [-i] [-d] [-g] [-s: file name ][-a][-w:windowsize][ computer]
parameter
-v Suppresses the display of remote server responses.
-n Disable automatic login to the initial connection.
-I turn off interactive prompts when transferring multiple files.
-d Enables debugging and displays all ftp commands passed between the client and the server.
-g Disables file name groups, which allows wildcards (* and? )。 (see.
Glob command in online command reference. )
-s: filename specifies a text file containing ftp commands; When ftp is started, these commands will run automatically. In this parameter
Spaces are not allowed. Use this switch instead of redirection (>.
-a Use any local interface when binding data connections.
-w:windowsize replaces the transmission buffer with the default size of 4096.
Computer specifies the computer name or IP address connected to the remote computer. If specified, the computer must be at the top of the row.
The latter parameter.
-
Nbtstat This diagnostic command uses NBT (NetBIOS over TCP/IP) to display protocol statistics and current TCP/IP connections.
Answer the phone. This command is available only after the TCP/IP protocol is installed.
Nbtstat[- remote name ][-IP address] [-c] [-n] [-r] [-r] [-s] [-s] [interval]
parameter
Remotename Lists the names of remote computers by name.
-IP Address Use the IP address of the remote computer and list the names.
-c gives the IP address of each name and lists the contents of the NetBIOS name cache.
-n lists the local NetBIOS name. "registered" means that the name has been broadcast (Bnode) or WINS (which?
Other node types).
-R Reload the Lmhosts file after clearing all the names in the NetBIOS name cache.
-r Lists name resolution statistics for Windows network name resolution. When Windows is configured with WINS.
On a 2000 computer, this option returns the number of names to be resolved and registered through broadcast or WINS.
-S displays client and server sessions and lists remote computers by IP address only.
-s displays client and server sessions. Try to convert the IP address of the remote computer to the name using the host file.
Weigh.
Interval redisplays the selected statistics, pausing for the number of seconds between each display. Press CTRL+C to stop the restart.
Show statistics. If this parameter is omitted, nbtstat will print the current configuration information once.
-
Netstat displays protocol statistics and current TCP/IP network connections. This command is available only after the TCP/IP protocol is installed.
To use it.
Netstat [-a] [-e] [-n] [-s] [-p protocol ][-r][ interval]
parameter
-a shows all connections and listening ports. Server connections are not usually displayed.
-e Displays Ethernet statistics. This parameter can be used in combination with the -s option.
-n Displays the address and port number in numeric format (instead of trying to find the name).
-s displays statistics for each protocol. By default, statistics of TCP, UDP, ICMP and IP are displayed. -p selection
Item can be used to specify the default subset.
-p protocol displays the connection of the protocol specified by the protocol; The protocol can be tcp or udp. If this has anything to do with-
The s option is used together to display statistics of each protocol, which can be tcp, udp, icmp or ip.
-r displays the contents of the routing table.
Interval redisplays the selected statistics, pausing for the number of seconds between each display. Press CTRL+B to stop the restart.
Show statistics. If this parameter is omitted, netstat will print the current configuration information once.
-
Ping verifies the connection to the remote computer. This command can only be used after the TCP/IP protocol is installed.
Ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [[-j computer list] | [-k computer list ]] [-w timeout] destination list.
parameter
-t Ping the specified computer until it is interrupted.
-a resolves the address to the computer name.
-n count sends the number of echo packets specified by count. The default value is 4.
-l length sends an ECHO packet containing the amount of data specified by length. The default value is 32 bytes; The maximum value is
65,527。
-f Send a "No Fragment" flag in the packet. The packet will not be segmented by the gateway on the route.
-i ttl sets the time-to-live field to the value specified by ttl.
-v tos sets the service type field to the value specified by tos.
-r count records the route of outgoing and returning packets in the Record Route field. Count can specify at least 1 units.
Nine computers at most.
-s count specifies the timestamp of the hop count specified by count.
-j computer-list uses the computer list specified by computer-list to route packets. Continuous computers can be neutralized.
The maximum number of IPS allowed between gateways (routing sparse sources) is 9.
-k computer-list uses the computer list specified by computer-list to route packets. Continuous computers cannot be neutralized.
The maximum number of IPS allowed for gateway separation (routing strict source) is 9.
-w timeout specifies the timeout interval in milliseconds.
Destination-list specifies the remote computer to ping.
-
Rcp is replicated between Windows 2000 computers and systems running Remote Shell Port Monitor rshd.
Pieces. The rcp command is a connection command and can also be issued from a Windows 2000 computer.
Used for other transfers, copying files between two computers running rshd. The rshd port monitor may
Used on UNIX computers, but not on Windows 2000, so Windows 2000
Computers can only participate as a system that issues commands. Remote computers must also be provided by running rshd.
Rcp utility.
RCP [-a |-b] [-h] [-r] source1source2 ... source target.
parameter
-a specifies ASCII transmission mode. This mode converts carriage return/line feed characters in the output file into carriage return characters, and the
Convert line breaks to carriage returns/convert line breaks to files. This mode is the default transmission mode.
-b specifies the binary image transmission mode. No carriage return/line feed conversion is performed.
-h Transfer source files marked as hidden properties on a Windows 2000 computer. If you don't have this option, please check in the
Specifying a hidden file on the rcp command line has the same effect as if the file does not exist.
-r recursively copies all subdirectory contents of the source to the target. Both source and target must be targets.
Record, although even if the source is not a directory, using -r can work. But there will be no recursion.
Source and destination
The format must be [Computer [. User]:] File name. If the computer. User]:] section, the computer will be assumed to be the local computer. If. User] section, the currently logged-in Windows 2000 user name will be used. If you use a separator contain a period (.), you must include [. User]. Otherwise, the last part of the computer name will be interpreted as the user name. If multiple source files are specified, the destination must be a directory.
If the file name does not start with a forward slash (/) of UNIX or a backward slash (\) of Windows 2000 system, it is assumed to be relative to the current working directory. In Windows 2000, this is the directory where the command was issued. In a remote system, this is the login directory of the remote user. Period (. ) represents the current directory. Use escape characters (\ "or') in the remote path to use wildcards in the remote computer.
-
REXEC runs commands on a remote computer running the Rexec service. The Rexec command checks before executing the specified command.
Certificate of user name on remote computer, this command can only be used after installing TCP/IP protocol.
Rexec computer [-l user name] [-n] command
parameter
Computer Specifies the remote computer on which to run the command.
-l username specifies the user name on the remote computer.
-n redirects rexec's input to NULL.
Command specifies the command to run.
-
Route controls the network routing table. This command can only be used after the TCP/IP protocol is installed.
Route [-f] [-p][ Command [Destination] [Mask Subnet Mask] [Gateway] [Measure Cost Metrics]]
parameter
-f Clear the routing table of all gateway portals. If this parameter is used with the command, the routing table will run.
Clear before command.
-p This parameter, when used with the add command, will keep the route unchanged between system bootstrappers. System default value
In this case, when the system restarts, the route will not be retained. When used with the print command, displays registered.
Permanent routing table of. Ignore all other commands that always affect the corresponding persistent route.
Command specifies one of the following commands.
Command the destination to print the print route.
Add add route
Delete delete route
Change Change the existing route.
Target specifies the computer that sent the command.
Mask subnetmask specifies the subnet mask associated with this routing entry. If not specified, will be used.
255.255.255.255。
Gateway specifies the gateway.
Network database file named Networks and computer database file named Hosts refer to all symbolic names used by destinations or gateways. If the command is print or delete, the target and gateway can also use wildcards or omit gateway parameters.
Metric costmetric allocates integer hops (from 1 to 9999) in the fastest, most reliable and/or cheapest way.
Used when routing.
-
Rsh
Run this command on the remote computer running the RSH service. This command can only be used after the TCP/IP protocol is installed.
Rsh computer [-l user name] [-n] command
parameter
Computer specifies the remote computer to run the command.
-l username specifies the user name used on the remote computer. If omitted, the logged-in user name is used.
-n redirects the input of rsh to NULL.
Command specifies the command to run.
__________________________________________________________________________________
Tftp transfers files back and forth between remote computers running TFTP services.
Program computer transfers files. This command can only be used after the TCP/IP protocol is installed.
Tftp [-i] computer [get | put] source [target]
parameter
-i specifies the binary image transmission mode (also called "octal"). In binary image mode, file 1
Move word for word. Use this mode when transferring binary files.
If -i is omitted, the file will be transferred in ASCII mode. This is the default transmission mode. This mode converts EOL characters into carriage returns for UNIX and carriage returns/line feeds for personal computers. This mode should be used when transferring text files. If the file transfer is successful, the data transfer rate will be displayed.
Computer specifies a local or remote computer.
Put transfers the file target on the local computer to the file source on the remote computer.
Get transfers the file target on the remote computer to the file source on the local computer.
If you transfer file 2 on the local computer to file 1 on the remote computer, please specify put. If the file file-two on the remote computer is transferred to the file file-one on the remote computer, please specify get. Because tftp protocol does not support user authentication, the user must log in and the file must be writable on the remote computer.
Source specifies the file to be transferred. If the local file is specified as-,the remote file will be printed on stdout.
If it is obtained, it is read from stdin.
The destination specifies the location where the file will be sent. If destination is omitted, it is assumed that it has the same name as source.
________________________________________________________________________________
Tracert This diagnostic utility will contain Internet control message protocols with different time-to-live (TTL) values.
An (ICMP) echo packet is sent to the destination to determine the route to the destination. Forward data packet
At least 1 is decremented before TTL, and every router on the path is necessary, so TTL is an effective hop count.
Count. When the TTL of the packet reaches 0, the router should send back the message "ICMP has timed out" to the source system.
System. Tracert first sends an echo packet with TTL of 1, and then sends TTL in each subsequent sending process.
Increment 1 until the target response or TTL reaches the maximum value, thus determining the route. The process route passed the intermediate inspection.
The router sends back the message "ICMP Timeout" to determine the route. However, some routers download it quietly.
Packets that contain expired TTL values that tracert cannot see.
Tracert [-d] [-h Maximum Hops] [-j Computer List] [-w Timeout] Target Name
parameter
/d The specified address will not be resolved to the computer name.
-h maximum_hops specifies the maximum number of hops for the search target.
-j computer-list specifies a sparse source route along the computer list.
-w timeout waits for the number of microseconds specified by timeout for each answer.
The name of the target computer.
Network Command Collection II
Many Windows NT network commands begin with net. These net commands have some common properties:
By typing net/? All available network commands can be referenced.
By typing the net help command on the command line, you can get the syntax help of the net command. For example, to get a net acco
For help with the unts command, type net help accounts.
All net commands accept the options /yes and /no (abbreviated as /y and /n). /y automatically answers "Yes" to any interactive prompts generated by this command, /n answers "No". For example, the internet stop server will generally confirm whether to end all services according to the server service prompt, and the internet stop server /y will automatically answer "Yes" and close the server service.
Net account
Update the user account database and change the passwords and login requirements of all accounts. You must run the network login service on the computer where the account parameters are changed.
Network account [/forcelogoff: {minutes | no}] [/minpwlen: length] [/maxpwage: {days |]
Unlimited}] [/minpwage: days] [/uniquepw: number] [/domain]
Network account [/synchronization] [/domain]
parameter
not have
Type net accounts without parameters, and the current password setting, login time limit and domain information will be displayed.
/forcelogoff:{minutes | no}
Set the waiting time before ending the session between the user and the server when the user account or valid login time expires. The no option prohibits forced logout. The default setting of this parameter isNo. After specifying /forcelogoff:minutes, Windows NT will warn users before forcing them to log off from the network for minutes. If there are still open files, Windows NT will warn the user. If the minutes are less than two minutes, Windows NT will warn the user to log off from the network immediately.
/minpwlen: length
Sets the minimum number of characters for a user account password. The allowed range is 0- 14, and the default value is 6.
/maxpwage:{days | unlimited}
Set the maximum number of days that the user account password is valid. Unlimited does not set the maximum number of days. The number of days for the /maxpwage option must be greater than /minpwage. The allowable range is 1-49 and 7 10 days (unlimited). The default value is 90 days.
/minpwage: days
Set the minimum number of days that users must keep their original passwords. A value of 0 does not set a minimum time. The allowable range is 0-49,710 days, and the default value is 0 days.
/uniquepw:number
When users are asked to change their passwords, they have to go through $ number times to reuse the same passwords. The allowable range is 0-8. The default value is 5.
/domain
Perform this operation on the primary domain controller of the current domain. Otherwise, the operation is only performed on the local computer.
This parameter is only used for Windows NT workstation computers in Windows NT Server domain. By default, Windows NT Server computers perform operations on the primary domain controller.
/sync
When used on the primary domain controller, this command synchronizes all backup domain controllers in the domain. When used to back up a domain controller, this command only synchronizes the backup domain controller with the primary domain controller. This command only applies to computers that are members of the Windows NT server domain.
network computer
Add or remove computers from the domain database. This command is only available on computers running Windows NT Server.
net computer \ computer name {/add |/del }
parameter
\ Computer name
Specify computers to be added to or removed from the domain.
/add
Adds the specified computer to the domain.
/del
Deletes the specified computer from the domain.
Network configuration
Displays the currently running configurable services, or displays and changes the settings of the services.
Network Configuration [Services [Options]]
parameter
not have
Typing net config without parameters will display a list of configurable services.
service
A service (server or workstation) configured through the net config command.
select
Specific options for the service. For complete syntax, see Network Configuration Server or Network Configuration Workstation.
Network configuration server
Display or change the service settings of the server when the service is running.
net config server[/auto disconnect:time][/SRV comment:" text "][/hidden:{ yes | n
o}]
parameter
not have
Type net config server without parameters, and the current configuration of the server service will be displayed.
/automatic disconnection: time
Sets the maximum time that a user session is idle before disconnecting. You can specify-1, which means that the connection will never be disconnected. The allowable range is-1-65535 minutes, and the default value is 15 minutes.
/srvcomment:"text "
Add comments to the server, which can be displayed on the screen through the net view command. Comments can be up to 48 characters, and the text should be enclosed in quotation marks.
/hidden:{ Yes | No}
Specifies whether the computer name of the server appears in the server list. Note that the implied server does not change the permissions of the server. The default is no.
Network configuration workstation
When the service is running, display or change the settings of various services of the workstation.
Network configuration workstation [/charcount: bytes] [/chartime: msec] [/charwait: sec]
parameter
not have
Typing net config workstation without parameters will display the current configuration of the local computer.
/charcount: bytes
Specifies the amount of data that Windows NT collects before sending data to a communication device. If you set the /charttime: msec parameter at the same time, Windows NT will run according to the option that meets the condition first. The allowable range is 0-65535 bytes, and the default value is 16 bytes.
/charttime: milliseconds
Specifies the time when Windows NT collects data before sending it to the communication device. If you set the /charcount:bytes parameter at the same time, Windows NT will run according to the option that meets the condition first. The allowable range is 0-65535000 milliseconds, and the default value is 250 milliseconds.
/charwait: seconds
Set the time that Windows NT waits for the communication device to be available. The allowable range is 0-65535 seconds, and the default value is 3600 seconds.
Network continuation
Re-activate the suspended service.
Network continuation service
parameter
service
Services that can continue to run include: macintosh file server (this service is limited to Windows NT server), FTP publishing service, LPDSVC, Netlogon, Network DDE, Network DDDSDM, Nt lm security support provider, remoteboot (this service is limited to Windows NT server), remote access server, schedule, server, simple tcp/ip service and workstation.
Network file
Displays the number of all open * * * file names and locked files on the server. This command can also close individual files and unlock them.
Net file [id [/close]]
parameter
not have
Type net file without parameters to get a list of open files on the server.
Identification (identification)
File identification number.
/off
Close the open file and release the locked record. Please type the following command on the server that * * * shares files.
Network group
Add, display, or change global groups in a Windows NT Server domain. This command is only available in the Windows NT server domain.
net group[group name[/comment:" text "]][/domain]
net group group name {/add[/comment:" text "]|/delete }[/domain]
Netgroup Group Name User Name [...] {/add | /delete} [/domain]
parameter
not have
Type net group without parameters to display the server name and the group name of the server.
Group name
Groups to add, expand, or delete. Just provide the group name to view the list of users in the group.
/Comment: "Text"
Add comments to a new or existing group. A comment can be up to 48 characters, and the text of the comment is enclosed in quotation marks.
/domain
Perform the operation in the primary domain controller of the current domain, otherwise perform the operation on the local computer.
This parameter is only used for Windows NT workstation computers that are members of the Windows NT server domain. By default, the Windows NT Server computer runs in the primary domain controller.
User name [...]
The list shows one or more users to be added to or removed from the group. Use spaces to separate multiple user name entries.
/add
Add a group or add a user name to a group. You must use this command to create accounts for users added to the group.
/delete
Delete a group or delete a user name from a group.
Network help
Provides a list of network commands and help topics, or provides help for specific commands or topics. Available network commands are listed in the command window referenced by the command under N. ..
Net help[ command]
Net command {/help |/? }
parameter
not have
Type net help without parameters to display a list of commands and help topics for which help is available.
order
For commands that need help, do not use net as part of the command.
/help
Provides options for how to display help text.
/?
Displays the correct syntax for the command.
Net Helpmsg
Provides help on Windows NT error messages.
Net helpmsg message #
parameter
Message number
The four-digit code of the Windows NT message that needs help.
Network local group
Add, display or change local groups.
net local group[group name[/comment:" text "]][/domain]
net local group group name {/add[/comment:" text "]|/delete }[/domain]
Network local group name [...] {/add | /delete} [/domain]
parameter
not have
Typing net localgroup without parameters will display the server name and the computer's local group name.
Group name
The name of the local group to add, expand, or delete. Only provide groupname to view the global groups in the user list or local group.
/Comment: "Text"
Add comments to a new or existing group. The maximum length of comment text is 48 characters, and it is enclosed in quotation marks.
/domain
Perform the operation in the primary domain controller of the current domain, otherwise, only perform the operation on the local computer.
This parameter applies only to Windows NT workstation computers in the Windows NT server domain. By default, the Windows NT Server computer runs in the primary domain controller.
Name [...]
List one or more user names or group names to be added to or removed from the local group, and separate multiple user names or group names with spaces. It can be a local user, a user from other domains or a global group, but it cannot be other local groups. If you are a user from another domain, you should add the domain name (for example, SALESRALPHR) before the user name.
/add
Add the global group name or user name to the local group. Before using this command to add users or global groups to local groups, you must
You must create an account for it.
/delete
Delete the group name or user name from the local group.
screen name
Add or delete email names (sometimes called body double), or display a list of names of emails received by your computer. To use the net name command, the Messenger service must be running on your computer.
Screen name [name [/add | /delete]]
parameter
not have
Typing a network name without parameters will list the currently used names.
name
Specifies the name of the received message. The maximum length of a name is 15 characters.
/add
Add the name to the computer. /add is optional, and typing screen name is the same as typing screen name /add.
/delete
Delete this name from the computer.
Net pause
Pause a running service.
Network suspension service
parameter
service
Refers to the following services: macintosh file server (Windows NT server only), ftp publishing service, lpdsvc, net logon, network dde, network DDDSDM, Nt lm security support provider, remoteboot (Windows NT server only), remote access server, schedule, server, simple tcp/ip service or workstation.
Network printing
Displays or controls print jobs and print queues.
Network Print \ Computer Name Share Name
Net print[\ computer name] job # [/hold | /release | /delete]
parameter
Computer name
* * * Name of the computer that enjoys the printer queue.
Shared name
Print queue name. When computername and sharename are included, separate them with a backslash ().
Job number
The identification number assigned to the print job in the printer queue. Computers with one or more printer queues assign a unique identification number to each print job. If the job number is used in the printer queue, it cannot be assigned to other jobs or jobs in other printer queues.
/keep
When using job#, let the print job wait in the printer queue. The print job stays in the printer queue, and other print jobs cannot enter until the job is released.
/release
Release the reserved print job.
/delete
Delete a print job from the printer queue.
Network transmission
Send messages to other users, computers or email names on the network. To receive messages, the Messenger service must be running.
Net sends {name | *|/domain [:name] |/user} message.
parameter
name
accept