h_hh_ll                                              
** 2/21/26   Networking        
      h_hh_ll        
                                                 
   
  Home
  h_hh_ll Powershell tracert -d 192.168.0.67
  Linux route -p add 192.168.0.67 mask 255.255.255.255 192.168.0.1 metric 1 if 20 ipconfig
  Windows 1 powercfg /batteryreport tracert -d 192.168.0.67 ipconfig /all
  Notes 2 powercfg /energy powercfg /batteryreport
  Template 3 powercfg /energy powercfg /energy
    4 ip Get-NetIPInterface -AddressFamily IPv4 | Sort-Object InterfaceMetric assoc
    12 echo %LocalAppData% Set-NetIPInterface -InterfaceAlias "Ethernet" -InterfaceMetric 1 po
    13 env Set-NetIPInterface -InterfaceAlias "Tailscale" -InterfaceMetric 100 .\PointOfService\
    14 cd %LocalAppData%\Microsoft\Windows\Themes Get-NetIPInterface -AddressFamily IPv4 | Sort-Object InterfaceMetric powercfg /energy
    15 net use L: \\192.168.0.67\Logs Disable-NetAdapter -Name "Ethernet" ip
    16 net use L: \\t30\Logs Enable-NetAdapter -Name "Ethernet" ipconfig /all
    17 net use L: \\t30\Logs /user: mdh mdh Get-NetIPInterface -AddressFamily IPv4 | Sort-Object InterfaceMetric cls
    18 net use L: \\t30\Logs /user:mdh mdh ipconfig /all
    19 net use route -p add 192.168.0.0 mask 255.255.255.0 192.168.0.1 metric 1 if 20 ./Device/Vendor/MSFT/Policy/Config/LanmanWorkstation/EnableInsecureGuestLogons
    20 net use L: \\t30\Logs /user:mdh mdh route add 192.168.0.37 mask 255.255.255.255 192.168.0.1 metric 1 if 20 net view
    21 net use Get-NetIPInterface | Sort-Object InterfaceMetric ipconfig /flushdns
    22 net use L: \\t30\Logs /user:mdh mdh netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes
    23 net use w: \\t30\www /user:mdh mdh arp -d * Get-NetFirewallRule -DisplayGroup "Network Discovery" -Enabled True -Action Allow -Direction Inbound
    24 net use net use
    25 net use h: \\t30\hom /user:mdh mdh route print -4 net use w:\\192.168.0.67\www
    26 net use h: \\t30\home /user:mdh mdh net use L:\\192.168.0.67\Logs
    27 net use echo %LocalAppData%
    28 net use h: \\t30\home /user:mdh mdh env
    29 net use x: \\t30\home /user:mdh mdh cd %LocalAppData%\Microsoft\Windows\Themes
    30 ipc net use L: \\192.168.0.67\Logs
    31 hdhomerun_config FFFFFFFF get help net use L: \\t30\Logs
    32 hdhomerun_config discover net use L: \\t30\Logs /user: mdh mdh
    33 hdhomerun_config 192.168.0.105 get help net use L: \\t30\Logs /user:mdh mdh
    34 netstat net use
    35 hdhomerun_config discover net use L: \\t30\Logs /user:mdh mdh
    36 hdhomerun_config discover net use
    37 cd "C:\Program Files\Silicondust\HDHomeRun" net use L: \\t30\Logs /user:mdh mdh
    38 .\hdhomerun_config discover net use w: \\t30\www /user:mdh mdh
    39 cd "C:\Program Files\Silicondust\HDHomeRun" net use
    40 .\hdhomerun_config discover net use h: \\t30\hom /user:mdh mdh
    41 .\hdhomerun_config FFFFFFFF set /tuner0/channel none net use h: \\t30\home /user:mdh mdh
    42 get-executionpolicy net use
    43 get-executionpolicy -List net use h: \\t30\home /user:mdh mdh
    44 adb net use x: \\t30\home /user:mdh mdh
    45 adb connect 192.168.0.178:5555 vboxmanage list vms
    46 adb devices cd "c:\program files\oracle\virtualbox"
    47 get-localuser vboxmanage list vms
    48 ip ipconfig /all
    49 ta ip
    50 tailscale ping 100.124.156.18 ipc
    51 ping 100.124.156.18 ipconfig /all
    52 ta echo %LocalAppData%
    53 tailscale status cd
    54 stop-computer -Force cd %LocalAppData%\
    55 Get-NetIPInterface | Sort-Object InterfaceMetric cd \%LocalAppData%\Microsoft\Windows\Themes
    56 net stop Tailscale i
    57 sc config Tailscale start= auto ipconfig /all
    58 net start Tailscale cls
    59 route -f ipconfig /all
    60 tailscale set --accept-routes=false hdhomerun_config FFFFFFFF get help
    61 Get-NetConnectionProfile cd \Program Files
    62 Set-NetConnectionProfile -InterfaceAlias Tailscale -NetworkCategory Private cd
    63 Test-NetConnection -ComputerName 192.168.0.17 -Port 80 cd "c:\program files"
    64 route delete 192.168.0.17 cd Silicondust
    65 arp -d 192.168.0.17 cd HDHomeRun
    66 Get-NetConnectionProfile dir
    67 Test-NetConnection -ComputerName 192.168.0.67 -Port 445 hdhomerun_config discover
    68 Get-NetRoute -DestinationPrefix 192.168.0.0/24 | Sort-Object RouteMetric hdhomerun_config 192.168.0.105 get help
    69 Get-NetRoute | Where-Object { $_.DestinationPrefix -like "192.168.0.67*" } ipconfig /all
    70 netstat -rn | findstr "192.168.0.67" cls
    71 Get-NetIPInterface | Select-Object ifIndex, InterfaceAlias, InterfaceMetric | Sort-Object InterfaceMetric ipconfig /all
    72 Set-NetIPInterface -InterfaceIndex 5 -InterfaceMetric 100 cls
    73 Set-NetIPInterface -InterfaceIndex 20 -InterfaceMetric 10 ipconfig /all
    74 Test-NetConnection -ComputerName 192.168.0.67 -Port 445 cls
    75 Get-NetConnectionProfile ipconfig /all
    76 net use * /delete /y netstat
    77 net stop workstation /y ipal
    78 net start workstation ipconfig /all
    79 net use py
    80 net use N: /delete /y hdhomerun_config discover
    81 net stop workstation /y cd C:\Program Files\Silicondust\HDHomeRun
    82 net start workstation cd "C:\Program Files\Silicondust\HDHomeRun"
    83 net use * /delete /y hdhomerun_config discover
    84 net stop workstation /y cd "C:\Program Files\Silicondust\HDHomeRun"
    85 net start workstation .\hdhomerun_config discover
    86 net use \\192.168.0.67 /delete /y cd "C:\Program Files\Silicondust\HDHomeRun"
    87 net stop workstation /y .\hdhomerun_config discover
    88 net start workstation .\hdhomerun_config FFFFFFFF set /tuner0/channel none
    89 explorer \\100.94.241.101\www .\hdhomerun_config FFFFFFFF key $KEY set /tuner0/lockkey none
    90 explorer \\192.168.0.67\www .\hdhomerun_config FFFFFFFF set /tuner0/lockkey none
    91 netsh interface ip delete arpcache .\hdhomerun_config FFFFFFFF key $KEY set /tuner0/lockkey none
    92 Get-NetIPInterface | Sort-Object InterfaceMetric .\hdhomerun_config FFFFFFFF /sys/debug
    93 Set-NetIPInterface -InterfaceAlias "Ethernet" -InterfaceMetric 1 .\hdhomerun_config FFFFFFFF get /sys/debug
    94 route print -4 .\hdhomerun_config FFFFFFFF set /sys/restart self
    95 Get-NetIPInterface -AddressFamily IPv4 get-executionpolicy
    96 Get-NetConnectionProfile get-executionpolicy -List
    97 Get-NetIPInterface -AddressFamily IPv4 | Sort-Object InterfaceMetric echo %AADATA%
    98 Set-NetIPInterface -InterfaceAlias "Ethernet" -InterfaceMetric 1 echo %APPDATA%
    99 Set-NetIPInterface -InterfaceAlias "Tailscale" -InterfaceMetric 100 ipconfig /all
    100 Get-NetIPInterface -AddressFamily IPv4 | Sort-Object InterfaceMetric path
    101 Disable-NetAdapter -Name "Ethernet" echo %PATH%
    102 Enable-NetAdapter -Name "Ethernet" echo PATH
    103 Get-NetIPInterface -AddressFamily IPv4 echot %PATH%
    104 route -p add 192.168.0.0 mask 255.255.255.0 192.168.0.1 metric 1 if 20 echo %PATH%
    105 tracert -d 192.168.0.67 adb
    106 arp -d * adb connect 192.168.0.178:5555
    107 tracert -d 192.168.0.37 adb devices
    108 ping 192.168.0.37 ls
    109 Get-NetIPInterface -AddressFamily IPv4 net user
    110 route add 192.168.0.37 mask 255.255.255.255 192.168.0.1 metric 1 if 20 get-localuser
    111 tracert -d 192.168.0.37 ip
    112 ping 192.168.0.37 ip address
    113 ping 192.168.0.107 ipconfig /all
    114 history tailscale ping 100.124.156.18
    ta
    5 net view tailscale ping 100.124.156.18
    6 ipconfig /flushdns ping 100.124.156.18
    7 netsh advfirewall firewall set rule group="Network Discovery" new enable=Yes ta
    8 Get-NetFirewallRule -DisplayGroup "Network Discovery" -Enabled True -Action Allow -Direction Inbound tailscale ping 100.124.156.18
    9 net use tailscale status
    10 net use w:\\192.168.0.67\www ipconfig /all
    11 net use L:\\192.168.0.67\Logs stop-computer -Force
    ipconfig /all
    115 Get-Content (Get-PSReadLineOption).HistorySavePath ping 100.109.48.42
    116 Get-Content (Get-PSReadLineOption).HistorySavePath > c:\history.txt ping 192.168.0.187
    I can sucessfully ping to another pc on my LAN but pinging with a tailscale IP to that PC fails.
    ping 192.168.0.187
    ping 100.109.48.42
    ping 100.71.6.64
    ping 192.168.0.183
    ping 192.168.0.37
    ping 192.168.0.67
    Get-NetIPInterface | Sort-Object InterfaceMetric
    net stop Tailscale
    sc config Tailscale start= auto
    net start Tailscale
    route -f
    tailscale set --accept-routes=false
    Get-NetConnectionProfile
    Set-NetConnectionProfile -InterfaceAlias Tailscale -NetworkCategory Private
    Test-NetConnection -ComputerName 192.168.0.17 -Port 80
    route delete 192.168.0.17
    arp -d 192.168.0.17
    Get-NetConnectionProfile
    Test-NetConnection -ComputerName 192.168.0.67 -Port 445
    Get-NetRoute -DestinationPrefix 192.168.0.0/24 | Sort-Object RouteMetric
    Get-NetRoute | Where-Object { $_.DestinationPrefix -like "192.168.0.67*" }
    netstat -rn | findstr "192.168.0.67"
    Get-NetIPInterface | Select-Object ifIndex, InterfaceAlias, InterfaceMetric | Sort-Object InterfaceMetric
    Set-NetIPInterface -InterfaceIndex 5 -InterfaceMetric 100
    Set-NetIPInterface -InterfaceIndex 20 -InterfaceMetric 10
    Test-NetConnection -ComputerName 192.168.0.67 -Port 445
    Get-NetConnectionProfile
    ping Sources    can access destinations    on port and protocol    Comment    General access rules action menu`
    All users and devices `
All users and devices `
All ports and protocols `
`
192.168.0.0/24 `
192.168.3.0/24 `
All ports and protocols `
`
192.168.3.0/24 `
192.168.0.0/24 `
All ports and protocols 
ping Sourcescan access destinationson port and protocolCommentGeneral access rules action menu
All users and devices 
All ports and protocols 
192.168.0.0/24 
192.168.3.0/24 
All ports and protocols 
192.168.3.0/24 
192.168.0.0/24 
ping 100.112.157.107
ping 192.168.0.67
net use * /delete /y
net stop workstation /y
net start workstation
net use
net use N: /delete /y
net stop workstation /y
net start workstation
net use * /delete /y
net stop workstation /y
net start workstation
net use \\192.168.0.67 /delete /y
net stop workstation /y
net start workstation
explorer \\100.94.241.101\www
explorer \\192.168.0.67\www
ping
ping 192.168.0.67
ping 100.94.241.101
ipconfig /all
ping 100.94.241.101
ping 192.168.0.67
ping 192.168.0.68
ping 100.112.157.107
ping 192.168.0.17
ping 100.73.216.67
netsh interface ip delete arpcache
Get-NetIPInterface | Sort-Object InterfaceMetric
Set-NetIPInterface -InterfaceAlias "Ethernet" -InterfaceMetric 1
route print -4
Get-NetIPInterface -AddressFamily IPv4
Get-NetConnectionProfile
Get-NetIPInterface -AddressFamily IPv4 | Sort-Object InterfaceMetric
Set-NetIPInterface -InterfaceAlias "Ethernet" -InterfaceMetric 1
Set-NetIPInterface -InterfaceAlias "Tailscale" -InterfaceMetric 100
Get-NetIPInterface -AddressFamily IPv4 | Sort-Object InterfaceMetric
Disable-NetAdapter -Name "Ethernet"
Enable-NetAdapter -Name "Ethernet"
Get-NetIPInterface -AddressFamily IPv4
route -p add 192.168.0.0 mask 255.255.255.0 192.168.0.1 metric 1 if 20
tracert -d 192.168.0.67
winget search --id Microsoft.PowerShell
winget install --id Microsoft.PowerShell --source winget
version
ping 100.124.156.18
ping 192.168.0.37
ping 100.81.99.59
ping 192.168.0.37
arp -d *
tracert -d 192.168.0.37
ping 192.168.0.37
Get-NetIPInterface -AddressFamily IPv4
route add 192.168.0.37 mask 255.255.255.255 192.168.0.1 metric 1 if 20
tracert -d 192.168.0.37
ping 192.168.0.37
ping 192.168.0.107
history
Get-history
PSReadLineOption).HistorySavePath
Get-Content (Get-PSReadLineOption).HistorySavePath
Get-Content (Get-PSReadLineOption).HistorySavePath > c:\history.txt
notepad $PROFILE
notepad $PROFILE
. $PROFILE
h
history
notepad $PROFILE
h
Get-Content (Get-PSReadLineOption).HistorySavePath | Out-GridView