Партнерка на США и Канаду по недвижимости, выплаты в крипто
- 30% recurring commission
- Выплаты в USDT
- Вывод каждую неделю
- Комиссия до 5 лет за каждого referral
net name techsupport /add
or
net name techsupport
NET SEND COMMAND
The net send command works in conjunction with the Messenger service and enables you to send messages on the network to users, computers, and messaging names. Only users connected to the network and running the Messenger service will receive them. The syntax for net send is
net send destination message
The message parameter contains the message that will be delivered, which should be in quotes if it contains special characters, such as a slash. A message can hold up to 128 characters.
The values for the destination parameter are described in Table A.42. This parameter is required and must contain one of these values.
NETWORKING COMMANDS
In this section, we review some of the networking commands and procedures on Windows 2000 and Windows Server 2003, and we discuss how to connect to a system via modem and determine and set the system's host name.
Each net command is identified here but its detailed description may actually appear in another section. When this is the case, we refer you to that section.
arp Command
The arp (Address Resolution Protocol) command displays and changes the IP to an Ethernet (or Token Ring) physical address translation table. The syntax for arp is
arp –option inet_addr eth_addr [if_addr]
The inet_addr is the Internet address; the eth_addr is the Ethernet address; and the if_addr is the address translation table to be modified for the Internet address of the network interface. See Table A.43 for options.
Table A.43. arp Options | |
Option | Description |
/-a | Displays all ARP entries in the current protocol data. When the inet_addr is specified, the specific IP and physical address are displayed. |
/-g | Performs the same function as –a. |
/-N | Displays the specified if_addr network interface. |
/-d | Deletes the inet_addr host. All hosts can be deleted by using the wildcard with inet_addr. |
/-s | Associates the Internet address with the physical address (presented as 6 hexadecimal bytes separated by hyphens). |
HyperTerminal
The HyperTerminal application is bundled with Windows Server 2003 and enables a user to dial out to another computer via modem. It is accessed by selecting Start
Programs
Accessories
HyperTerminal.
Take the following steps to set up and connect to a remote location:
1. In the Connect Description window, enter the name of the connection you wish to make, such as "Microsoft BBS."
2. Click OK to display the Connect To window. Enter the appropriate information in the Country Code, Area Code, Phone #, and Connect Using text boxes to identify the number you wish to call using which modem installed on the system.
3. After entering the phone number and modifying any other field, the Connect To window displays (Figure A.7). Change the phone number as well as the configuration of the local modem, including baud rate, data bits, and parity via the Modify button.
Figure A.7. The Connect To Window

4. Click Dialing Properties to define the location from which to dial; include dialing prefixes to access an outside line or to turn off call waiting.
5. Click Dial to display the status of the modem, such as disconnected.
6. Click Dial Now to initiate the connection process.
To transfer files between systems, select Transfer from the menu bar; then Send File to send a file or Receive File to receive one. Within each of these options, the transfer protocol can be selected. To terminate a session, select the Disconnect icon from the toolbar or select Call
Disconnect from the menu bar.
ftp and tftp Commands
The file transfer protocol, ftp, command enables a user to transfer files between systems that have ftp installed and running. See Table A.44 for options list. Its syntax is
ftp [options] [hostname]
The hostname is the name or IP address of the remote system. When given, the ftp command establishes a connection with that system. Otherwise, it goes into command mode waiting for the user to enter a command. A list of the available ftp commands can be retrieved by entering help at this point. Given the number of commands available, we do not discuss them here but recommend that you refer to Windows Server 2003 Help.
Table A.44. ftp Command Options | ||
Option | Qualifier | Description |
-d | Turns on the debugging option, which displays all ftp commands that are passed between the systems. | |
-g | Turns off file name "globbing," which means that wildcard characters are not expanded. | |
-I | Turns off interactive prompting, which means that ftp will automatically execute a given command for all file names entered. | |
-n | Does not allow auto-logon when the initial connection is made. Instead, the user must log on to the remote system. | |
-s | :filename | The file name qualifier is the name of a file that contains ftp commands that are executed immediately upon connection. Do not include spaces in this parameter. |
-v | Does not display responses from the remote system. | |
-w | :size | Changes the size of the transfer buffer to size. The default is 4096. |
The trivial file transfer protocol (tftp) is a nonsecure version of ftp. Its use is generally not recommended, and it should not be enabled.
hostname Command
The host name is the name of a device that is on the network, which can be the computer name. In Windows Server 2003 it can be displayed from the command prompt by entering hostname. To identify the computer's full name and domain, click Control Panel, select System Properties, and select the Network Identification tab.
ipconfig Command
TCP/IP network configuration values are displayed by an ipconfig diagnostic command. They are the DNS suffix, IP address, subnet mask, and default gateway. When the /all option is used, much additional information is output, including the host name, node type, adapter physical address, and more. The syntax used is
ipconfig [/all] [/renew] [/release]
The ipconfig command is of great value when running DHCP because it permits the identification of DHCP-configured TCP/IP values. The /renew option reaffirms the current DHCP values. The /release option disables the related TCP/IP configuration values.
ipxroute Command
The ipBxroute command permits the viewing and modification of routing-table data employed by the IPX protocol, which uses options different from those for source routing. The ipxroute syntax for IPX is
ipxroute servers [type=x]
ipxroute stats [/show] [/clear]
ipxroute table
The syntax for source routing is
ipxroute board=n
ipxroute config
nbtstat Command
The nbtstat command is a diagnostic tool that displays current TCP/IP data and connections using NetBIOS over TCP/IP (NBT). See Table A.45 for an options list. The syntax is
nbtstat [- a remotename] [-A IP address] [-c] [-n] [-R] [-r] [-S] [-s] [interval]
Table A.45. nbtstat Options | ||
Option | Qualifier | Description |
-a | remotename | Lists the remote computer's name table. |
-A | IP address | Lists the remote computer's address. |
-c | Lists the NetBIOS cache including the IP addresses. | |
-n | Lists the NetBIOS registration by type. | |
-R | Loads the lmhost file after deleting the NetBIOS cache. | |
-r | Lists WINS name-resolution statistics. | |
-S | Lists client and server connections. For remote computers, these are listed by IP address. | |
-s | Lists client and server connections and converts IP addresses to names. |
netstat Command
The netstat command displays protocol statistics and current TCP/IP connection information. See Table A.46 for an options list. The syntax is
netstat [options]
Without options, the output includes
· Proto— the protocol used by the connection, such as TCP/IP.
· Local Address— either the IP address or host name of the local system as well as the connection's port number displayed as name:port. An asterisk displays in the port field if it hasn't been established yet.
· Foreign Address— displays either the IP address or the host name of the remote system as well as the port number, displayed as name:port.
· State— the state of the TCP/IP connection. Some examples are CLOSED, ESTABLISHED, and LAST_ACK.
Table stat Command Options | ||
Option | Qualifier | Description |
-a | Displays the status of all connections and listening ports. | |
-e | Displays Ethernet statistics. | |
interval | Displays statistics after each interval, where interval is the number of seconds between capturing statistics. To terminate the display, press CTRL+C. This option should be the last one on the command line. | |
-n | Displays addresses numerically—for example, the IP address instead of the host name. | |
-p | protocol | Displays the connections for the protocol given. Acceptable values are tcp and udp. If the - s option is also used, icmp or ip are also acceptable values. |
-r | Displays the network routing tables. | |
-s | Displays protocol statistics for tcp, ucp, icmp, and ip. To reduce the number of protocols displayed, use this in conjunction with the - p option. |
nslookup Command
The nslookup command provides data from the Domain Name System (DNS) server(s) both interactively and noninteractively. It also supports more than a dozen subcommands. With nslookup, the IP address of a host can be identified or a reverse lookup performed. The syntax is
nlslookup [-subcommand] [IP address]
ping Command
The ping command is used to test and verify network connections by sending ICMP (Internet Control Message Protocol) data packets to a remote computer and waiting for a default, four packets are transmitted and validated when received. See Table A.47 for an options list. The syntax of this command is
ping [options] hostname(s)
The host name(s) is the remote computer whose network connections you wish to test. It may contain either the host name itself or the IP address.
Table A.47. ping Command Options | ||
Option | Qualifier | Description |
-a | Converts numerical addresses to their corresponding host names. | |
-f | Includes a flag in the data packet that instructs the gateways not to fragment the data. | |
-i | time | Sets the Time to Live field in the echo request packet to time, where time can be a value from 0 to 255. |
-j | list | Routes the data packets through up to 9 host names contained in list. This option allows loose source routing, which means that intermediate gateways may separate consecutive hosts. - j cannot be used in conjunction with the - k option. |
-k | list | Routes the data packets through up to 9 host names contained in list. This option allows strict source routing, which means that intermediate gateways may not separate consecutive hosts. - k cannot be used in conjunction with the - j option. |
-l | length | Sends echo packets containing the amount of data specified by length. The default is 32 bytes; the maximum is 65,527. |
-n | count | Defines the number of packets (count) transmitted before terminating the ping command. Zero is the default, where ping keeps running until receiving an interrupt signal. |
-r | count | Sends the echo request directly to the host, bypassing routing tables. |
-t | Only for multicast addresses, sets the Time-to-Live (TTL) field in the echo request packet (datagram), where TTL is a value from 0 to 255. The Time-to-Live field defines the maximum number of systems through which the packet can be sent. For example, a TTL of 0 limits the datagram to the local system. A TTL of 1 (the default) limits the transmission to systems directly connected to the default interface address (or the address specified by the - i option). | |
-v | type | Displays other packets received in addition to the echo request packets. |
-w | time | Defines the timeout interval in milliseconds. |
pathping Command
The pathping tool combines ping and tracert plus additional information. The statistics it provides allow network router or link problems to be identified. The pathping command forwards packets to routers and then computes the results based on returned packets for each network hop. See Table A.48 for an options list. Its syntax is
[View full width]
pathping [-n] [-h maximum_hops] [-g host-list] [-p period] [-q num_queries] [-w timeout]
target_name
Table A.48. pathping Command Options | ||
Option | Qualifer | Description |
-n | Does not resolve host names. | |
-m | maximum_hops | Sets the maximum number of hops. |
-g | Lists hosts within the intermediate gateways. | |
-p | period | Specifies the milliseconds to wait between pings; default is 250. |
-n | num_queries | Specifies the number of queries to each computer; default is 100. |
-w | timeout | Specifies the milliseconds to wait for a response; the default is 3000 (or 3 seconds). |
rcp Command
The rcp command copies files between networked machines, including UNIX systems. It must be initiated by Windows Server 2003, and other systems must be running rshd, the remote shell daemon, and have the RCP utility installed. See Table A.49 for a list of options. The syntax for this command is
rcp [options] host. user:srcfile(s) host. user:dest-file
The host. user:srcfile(s) parameter is the name of the file to be copied to another system. It breaks down as follows:
· host— the name of the source computer system. It is required only if the source system is different from the system from which the command was executed, or if a specific user name must be entered. The host can be either the host name or the IP address.
· user— the logon name of the user whose files are being copied. It is required when the host is entered as an IP address and when copying files that belong to another user.
· srcfile— the name of the file being copied. It may contain the entire path, if necessary, to locate the file if it is not in the current directory or in the user's logon directory when host. user is used.
Table A.49. rcp Command Options | |
Option | Description |
-a | Copies files in ASCII mode. This is the default. |
-b | Copies files in binary mode. |
-h | Copies files that have the Hidden attribute default, these files are not copied even if they are specifically requested. |
-r | Copies the contents of a directory and its subdirectories. This is considered a recursive copy. Both the source-file and the dest-file should be directories. |
The parameter host. user:dest-file is the name of the destination file or directory to which the file is copied. If more that one srcfile is listed, dest-file must be a directory. The host. user portion identifies the remote system as well as the logon name of the destination system. If the host. user:dest-file parameter is omitted, the local system is considered the default.
For the rcp command to be successful with UNIX systems, the. rhosts file must exist in the user's home directory on the remote computer. This file contains the host name of the local system as well as the user's name. It is recommended that the host name of the local system also be included in the remote system's /etc/hosts or /etc/hosts. equiv file.
route Command
The route command is used to manage and manipulate network routing tables under TCP/IP environments. See Table A.50 for an options list. Its syntax is
route [-f] [-p] [command [destination] [mask subnetmask] [gateway] [metric costmetric]]
The - f parameter option clears all gateway routing tables. The - p parameter option is employed in conjunction with the add command to create a persistent route across boots of the system. (By default, routes are not preserved between system boots.)
Other parameters used with the route command are
· destination— determines the computer from which to send command.
· mask subnetmask— identifies a subnet mask to be associated with this route entry; the default is 255.255.255.255.
· gateway— identifies the gateway.
· metric costmetric— specifies an integer cost metric (from 1 to 9999) used in calculating the fastest, most reliable, and/or least expensive routes.
Table A.50. route Commands | |
Command | Description |
Add | Adds a route. |
Prints a route. | |
Delete | Deletes a route. |
Change | Changes the current route. |
Table A.51. rsh Command Options | ||
Option | Qualifier | Description |
-l | user | Logon to the remote computer uses the name represented by user. When not used, logon is the user executing the rsh command. |
-n | Redirects the input to NULL. |
rsh Command
When the Remote Shell Service is running, the rsh command permits a user to execute commands on a remote system. See Table A.51 for an options list. The syntax is
rsh hostname [options] command
The hostname parameter is the name of the system on which you wish to run a command. The command parameter contains the command to be run on the remote system.
When the RSHutility is run from a Windows Server 2003, the primary domain controller must be available to validate the name of the user currently logged on. Also, to access a remote UNIX system, an .rhosts file should exist in the user's home directory. This file contains both the host names and the logon names of computers and users who have access to this remote system.
Telnet
Using telnet enables a user to connect to and communicate with another system using that system's own protocol. To access telnet within Windows 2000 and Windows Server 2003, select Start
Programs
Accessories
telnet. To connect to a remote system:
1. Select Connect from the menu bar.
2. Select Remote System.
3. In the Connect window, select or enter the Host Name, Port, and TermType (terminal emulation type).
4. Click Connect.
From the Terminal menu, select Preferences to define default preferences such as cursor type, terminal emulation, and fonts.
From the command prompt, simply type telnet to launch the telnet window; however, it is important to understand that this is a telnet client only. To accept telnet sessions from other systems, you must install the telnet Server, which is included on the Windows Server 2003 Resource Kit.
Net Commands
Windows Server 2003 provides a series of commands, known as net commands, that may be executed from the prompt or within batch files. Many of them can be performed through the graphical interface, but users sometimes prefer to use the command-line interface instead.
All of the net commands are identified here with at least a brief description. When necessary, we have indicated the section where a more detailed definition may be found.
The common options available for all net commands are described in Table A.52.
Table mon net Command Options | |
Option | Description |
/no | Automatically responds to any prompt the net command issues with a "no." An alternative format is /n. |
/yes | Automatically responds to any prompt the net command issues with a "yes." An alternative format is /n. |
net accounts Command
The net accounts command allows authorized users to update the user accounts database. In addition, it facilitates modifications to the password and logon requirements for all users. For net accounts to execute properly, the Net Logon service must be running on the system that contains the accounts you wish to change. See Table A.53 for an options list. The syntax is
net accounts [options]
When net accounts is run without options, the current settings for password, logon limitations, and domain information are displayed.
Table accounts Command Options | ||
Option | Qualifier | Description |
/forcelogoff | :minutes | Defines the number of minutes a user has before the system automatically logs him off after the expiration of either the account or logon time. The variable minutes can be numeric or the value "no." The value "no" is the default and does not allow a forced logoff. When a numeric value is entered for minutes, a warning is sent to the user. |
/minpwlen | :length | Defines the minimum password length for a user account password. Acceptable values are 0 through 14, with 6 being the default. |
maxpwage | :days | Defines the maximum number of days that a password is valid. Acceptable values for days are 1 through 49, 710, and "unlimited," which means that the password does not expire. The value used here must be greater than that defined for the /minpwage option. |
/minpwage | :days | Defines the minimum number of days that must pass before a user can change his password. Acceptable values are 0 through 49 and 710, with 0 as the default, which means that no limitations are set. |
/uniquepw | :number | Defines the number of password changes that must occur before a password can be reused. Acceptable values are 0 through 8, with 5 as the default. |
/domain | Updates the user accounts database based on the parameters given for the primary domain controller of the current domain. Omitting this parameter updates the database on the current system. | |
/sync | Can only be used with the /domain option. It synchronizes the user account database. When executed from the primary domain controller, all backup domain controllers are synchronized. When executed from a backup domain controller, the backup is synchronized with the primary. |
NET ACCOUNTS COMMAND EXAMPLES
To synchronize the user account databases on all member servers, enter
|
Из за большого объема этот материал размещен на нескольких страницах:
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 |


