- 1 Vapor IO Brings OpenDCRE to General Availability
- 2 VMware Takes the Wraps Off vRealize Automation and vRealize Business
- 3 Microsoft Previews Hyper-V Containers for Windows Server 2016
- 4 Mirantis Led FUEL Project Gets Installed Under OpenStack Big Tent
- 5 Red Hat Enterprise Linux 7.2 Adds Security, DR Features
Learn Windows XP Professional: Troubleshooting TCP/IP - Part 1 (Page 4) Page 4
ROUTE - You can use
the route command line tool to display the current IP
routing table and add or delete IP routes. Commands:
[-p] [command] [destination] [MASK netmask] [gateway]
[METRIC metric] [IF interface]
All symbolic names used for destination are looked up in the network database file NETWORKS. The symbolic names for gateway are looked up in the host name database file HOSTS.
If the command is PRINT or DELETE, destination or gateway can be a wildcard (wildcard is specified as a star '*'), or the gateway argument may be omitted.
If Dest contains a * or ?, it is treated as a shell pattern, and only matching destination routes are printed. The '*' matches any string, and '?' matches any one char. Examples: 157.*.1, 157.*, 127.*, *224*.
Invalid MASK generates an error; that is, when (DEST & MASK) != DEST.
route ADD 126.96.36.199 MASK 188.8.131.52 184.108.40.206 IF 1
The route addition failed: The specified mask parameter is
invalid. (Destination & Mask) != Destination.
route ADD 220.127.116.11 MASK 255.0.0.0 18.104.22.168 METRIC 3 IF 2
destination^ ^mask ^gateway metric^ ^Interface
If IF is not given, it tries to find the best interface for a given gateway.
route PRINT 112* .... Only prints those matching 112*
route CHANGE 22.214.171.124 MASK 255.0.0.0 126.96.36.199 METRIC 2 IF 2
CHANGE is used to modify gateway and/or metric only.
HOSTNAME - Hostname is used to show the local computer's host name for authentication by the Remote Copy Protocol (RCP), Remote Shell (RSH), and Remote Execution (REXEC) tools.
ROUTE - You can use the route command line tool to display the current IP routing table and add or delete IP routes.
TRACERT - Tracert is sometimes used to verify that IP addressing has been correctly configured on a client. It will basically show the route taken to reach a remote system.
Usage: tracert [-d] [-h
maximum_hops] [-j host-list] [-w timeout] target_name
- -d - Do not resolve addresses to hostnames.
- -h maximum_hops - Maximum number of hops to search for target.
- -j host-list - Loose source route along host-list.
- -w timeout - Wait timeout milliseconds for each reply.