How to Change Routing Tables with a Windows Command Prompt – From the CompTIA Network + Course

Home > Blogs > CompTIA > How to Change Routing Tables with a Windows Command Prompt – From the CompTIA Network + Course

How to Change Routing Tables with a Windows Command Prompt – From the CompTIA Network + Course

Like This Blog 0Mark Jacob
Added by August 26, 2016

In this CompTIA Network + training video, instructor Mark Jacob demonstrates how to use a standard Windows Command Prompt to manipulate routing tables.


I want to show you something from what you will learn in the labs of this course such as manipulating routing tables. If you’re new to the environment you may be unaware that this can be done inside a Windows Command Prompt.

This is not directly taken from the CompTIA Network + class labs it’s a similar concept of what you will learn in the class.

Let’s get started:

To look at the routing table on a typical windows machine we’ll use “route-print


If you were to hit enter now while running either IPv4 or IPv6, it would generate a bunch of stuff and you would need to scroll back up to see what you wanted to look at.

Since we’re focusing on IPv4, I’ll add “ -4 “  to the command to limit it to show only IPv4 information.


You’ll notice here that I have a “quad zero” Route


This route points to the default gateway

If I had this box configured a s a DHCP Client and it received an IP Address from the DHCP Server, it will learn what it’s default gateway is and it’s going to configure this “quad-zero” route

You may also like:  CompTIA Security+ SY0-501

What we want to do now is manipulate it. We’ll first find a target.

We’ll perform an ns lookup in order to do a name search.


We’ll look for


It returns and address of

We’ll use the mark feature to copy the address to Notepad so that we have it saved for future use.




Now what we’ll try create a rout in the routing table by using “route add” You’ll notice that the address starts with a 166


We’ll type and add a mask of


The next field is a default gateway and you’ll notice that from above, the default gateway is


Next we’ll hit enter.

We’ll once again type “route print – 4


And take a look at the results of what’s been added.


You’ll noticed that a rout has been added to at it’s in the table. In fact, Windows looks at its routing table from the bottom to the top. Therefore, it placed it in this position which is not very specific since it only matches to the first 8 bits.

You may also like:  How to Monitor Your Network – For Free

Now we will modify it again by using “route add” and the first two octets and then add a mask of and we’ll continue to send it to the default gateway of

Now we’ll hit enter and we receive an “OK!” notification.


Next we’ll type “route print -4


And hit enter.


Notice that it now placed it lower on the list? This is because Windows examines the routing tables form toe bottom up while looking for a specific match.  Now the route we just create matches more specific to 16 bits instead of 8 therefore it’s now lower on the table.

This is an example of what you will learn in the CompTIA Network + Certification class at Interface Technical Training.

For instructor-led CompTIA Certification classes, see our course schedule.

Until next time.

Mark Jacob
Cisco and CompTIA Network + Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Agile Methodology in Project Management

0 18 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Subnetting a TCP/IP Network using the Magic Box Method

0 61 0

In this session, we are going to look at how to subnet a Class B address into multiple network segments using what's called The Magic Box. Let's run through this real quick.

Detailed Forensic Investigation of Malware Infections – April 21, 2015

1 57 1

In this IT Security training video, Security expert Mike Danseglio (CISSP / CEH) will perform several malware investigations including rootkits, botnets, viruses, and browser toolbars.

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.