Explanation of commonly used network-related commands under DOS Arp displays and modifies the IP or Token Ring physical address translation table to Ethernet used by "Address Resolution Protocol" (ARP). This command is only available if the TCP/IP protocol is installed. arp -a [inet_addr] [-N ][if_addr]] arp -d inet_addr [if_addr] arp -s inet_addr ether_addr [if_addr] Parameters -a Display the current ARP entries by interrogating TCP/IP. If inet_addr is specified, only the IP and physical address of the specified computer are displayed. -g Same as -a. inet_addr specifies the IP address in dotted decimal notation. -N Displays the network interface ARP entries specified by if_addr. if_addr specifies the IP address (if any) of the interface whose address translation table needs to be modified. If not present, the first applicable interface will be used. -d Removes the entry specified by inet_addr. -s adds an entry in the ARP cache that associates the IP address inet_addr with the physical address ether_addr. The physical address is given as 6 hexadecimal bytes separated by hyphens. Specify the IP address using dotted decimal notation. Items are persistent, i.e. they are automatically removed from the cache after the timeout expires. ether_addr specifies the physical address. Finger displays information about the user on the specified system running the Finger service. Different variables are output depending on the remote system. This command is only available if the TCP/IP protocol is installed. finger [-l] [user]@computer[...] Parameter -l Display information in long list format. user specifies the user to obtain relevant information from. Omit the user parameter to display information for all users on the specified computer: @computer Ftp Transfers files to or from a remote computer that is running an FTP service (sometimes called a daemon). Ftp can be used interactively. Click "ftp Command" in the Related Topics list for a description of the available "ftp" subcommands. This command is only available if the TCP/IP protocol is installed. Ftp is a service that, once started, creates a subenvironment in which the ftp command can be used. You can return to the Windows 2000 command prompt from the subenvironment by typing the quit subcommand. When the ftp subenvironment is running, it is represented by the ftp command prompt. ftp [-v] [-n] [-i] [-d] [-g] [-s:filename] [-a] [-w:windowsize] [computer] Parameter -v Suppresses display of remote server responses. -n disables automatic login to the initial connection. -i Turn off interactive prompts when transferring multiple files. -d enables debugging, displaying all ftp commands passed between the client and server. -g disables filename groups, which allow wildcard characters (* and ?) in local file and path names. (See the glob command in the online Command Reference.) -s: filename Specifies a text file containing ftp commands; these commands are automatically run when ftp starts. No spaces are allowed in this parameter. Use this switch instead of redirect (>). -a Use any local interface when bundling data connections. -w:windowsize Overrides the default transmit buffer size of 4096. computer specifies the computer name or IP address to connect to the remote computer. If specified, the computer must be the last argument on the line. Nbtstat This diagnostic command displays protocol statistics and current TCP/IP connections using NBT (NetBIOS over TCP/IP). This command is only available if the TCP/IP protocol is installed. nbtstat [-a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval] Parameters -a remotename List using the name of the remote computer Its name table. -A IP address Use the IP address of the remote computer and list the name table. -c gives the IP address of each name and lists the contents of the NetBIOS name cache. -n List local NetBIOS names. "Registered" indicates that the name has been registered by broadcast (Bnode) or WINS (other node types). -R Reloads the Lmhosts file after clearing all names in the NetBIOS name cache. -r Lists name resolution statistics for Windows network name resolution. On Windows 2000 computers configured to use WINS, this option returns the number of names to resolve and register via broadcast or WINS. -S displays client and server sessions, listing remote computers by IP address only. -s displays client and server sessions. Try converting the remote computer IP address to a name using the hosts file. interval redisplays the selected statistics, pausing interval seconds between each display. Press CTRL+C to stop redisplaying statistics. If this parameter is omitted, nbtstat prints the current configuration information once. Netstat displays protocol statistics and current TCP/IP network connections. This command can only be used if the TCP/IP protocol is installed. netstat [-a] [-e] [-n] [-s] [-p protocol] [-r] [interval] Parameters -a Displays all connections and listening ports. Server connections usually don't show up. -e displays Ethernet statistics. This parameter can be used in conjunction with the -s option. -n Display addresses and port numbers in numeric format (instead of trying to look up names). -s displays statistics for each protocol. By default, statistics for TCP, UDP, ICMP, and IP are displayed. The -p option can be used to specify a default subset. -p protocol Displays connections for the protocol specified by protocol; protocol can be tcp or udp. If used with the -s option to display statistics for each protocol, protocol can be tcp, udp, icmp, or ip. -r displays the contents of the routing table.interval redisplays the selected statistics, pausing interval seconds between each display. Press CTRL+B to stop redisplaying statistics. If this parameter is omitted, netstat will print the current configuration information once. Ping verifies the connection to the remote computer. This command can only be used if the TCP/IP protocol is installed. ping [-t] [-a] [-n count] [-l length] [-f] [-i ttl] [-v tos] [-r count] [-s count] [][-j computer- list] | [-k computer-list]] [-w timeout] destination-list parameter -t Ping the specified computer until interrupted. -a resolves addresses to computer names. -n count Send the number of ECHO packets specified by count. The default value is 4. -l length Sends an ECHO packet containing the amount of data specified by length. Default is 32 bytes; maximum value is 65,527. -f Send the "do not fragment" flag in the packet. The packet will not be fragmented by the gateway on the route. -i ttl Sets the Time to Live field to the value specified by ttl. -v tos Sets the Service Type field to the value specified by tos. -r count Records the routes for outgoing and return packets in the Record Route field. count can specify a minimum of 1 and a maximum of 9 computers. -s count specifies timestamps for the number of hops specified by count. -j computer-list Route packets using the computer list specified by computer-list. Consecutive computers can be separated by intermediate gateways (routing sparse sources). The maximum number of IPs allowed is 9. -k computer-list Route packets using the computer list specified by computer-list. Contiguous computers cannot be separated by intermediate gateways (Route Strict Source) The maximum number of IPs allowed is 9. -w timeout specifies the timeout interval in milliseconds. destination-list specifies the remote computers to ping. Rcp copies files between a Windows 2000 computer and a system running the remote shell port monitor program rshd. The rcp command is a connect command that, when issued from a Windows 2000 computer, can also be used for other transfers to copy files between two computers running rshd. The rshd port monitor program can be used on UNIX computers but not on Windows 2000, so the Windows 2000 computer can only participate as the system issuing commands. The remote computer must also provide the rcp utility by running rshd. rcp [-a | -b] [-h] [-r] source1 source2 ... sourceN destination Parameter -a Specifies the ASCII transmission mode. This mode converts carriage return/line feed characters to carriage returns on outgoing files and line feeds to carriage returns/line feeds on incoming files. This mode is the default transmission mode. -b specifies binary image transfer mode. No carriage return/linefeed conversion is performed. -h Transfers source files marked with the hidden attribute on Windows 2000 computers. Without this option, specifying a hidden file on the rcp command line has the same effect as if the file did not exist. -r Recursively copies the contents of all subdirectories of the source to the target. Both source and destination must be directories, although using -r will work even if the source is not a directory. But there will be no recursion. The source and destination format must be [computer][.user]:]filename. If the [computer][.user]:] part is omitted, the computer is assumed to be the local computer. If the [.user] part is omitted, the currently logged-in Windows 2000 username will be used. If a fully qualified computer name is used that contains a period (.) delimiter, [.user] must be included. Otherwise, the last part of the computer name is interpreted as the user name. If multiple source files are specified, destination must be a directory. If the file name does not begin with a forward slash (/) on UNIX or a backslash () on Windows 2000 systems, it is assumed to be relative to the current working directory. In Windows 2000, this is the directory from which the command is issued. On a remote system, this is the remote user's login directory. A period (.) indicates the current directory. Use escape characters (, " or ) in the remote path to use wildcard characters on the remote computer. Rexec Runs the command on the remote computer running the REXEC service. The rexec command verifies the user name on the remote computer before executing the specified command. This command can only be used if the TCP/IP protocol is installed. rexec computer [-l username] [-n] command parameter computer specifies the remote computer to run the command -l username specifies the username on the remote computer. Input to rexec is redirected to NULL. command specifies the command to run. Route Controls the network routing table. route [-f] [-p] [command ][destination. ] [mask subnetmask] [gateway] [metric costmetric]] The -f parameter clears the routing table for all gateway entries. If this parameter is used in combination with a command, the routing table will be cleared before running the command. -p This parameter is used with the add command. When used together, makes routes persist across system bootloaders. By default, routes are not retained across system reboots. When used with the print command, displays the list of registered persistent routes and ignores all others. Command for persistent routing. Command specifies one of the following commands. Print print route add delete route change existing route destination specify the computer that sends the command. mask subnetmask specifies the subnet mask associated with the route entry.If not specified, 255.255.255.255 will be used. gateway specifies the gateway. All symbolic names used by destination or gateway are referenced in the network database file named Networks and the computer name database file named Hosts. If the command is print or delete, wildcards can also be used for the target and gateway, and the gateway parameter can be omitted. metric costmetric assigns an integer metric number (from 1 to 9999) to use when calculating the fastest, most reliable, and/or cheapest route. Rsh runs commands on the remote computer running the RSH service. This command can only be used if the TCP/IP protocol is installed. rsh computer [-l username] [-n] command parameter computer specifies the remote computer running command. -l username specifies the username used on the remote computer. If omitted, login is used