How to Change Routing Tables with a Windows Command Prompt – From the CompTIA Network + Course

Home > Blogs > CompTIA > How to Change Routing Tables with a Windows Command Prompt – From the CompTIA Network + Course

How to Change Routing Tables with a Windows Command Prompt – From the CompTIA Network + Course

Like This Blog 0 Mark Jacob
Added by August 26, 2016

In this CompTIA Network + training video, instructor Mark Jacob demonstrates how to use a standard Windows Command Prompt to manipulate routing tables.


I want to show you something from what you will learn in the labs of this course such as manipulating routing tables. If you’re new to the environment you may be unaware that this can be done inside a Windows Command Prompt.

This is not directly taken from the CompTIA Network + class labs it’s a similar concept of what you will learn in the class.

Let’s get started:

To look at the routing table on a typical windows machine we’ll use “route-print


If you were to hit enter now while running either IPv4 or IPv6, it would generate a bunch of stuff and you would need to scroll back up to see what you wanted to look at.

Since we’re focusing on IPv4, I’ll add “ -4 “  to the command to limit it to show only IPv4 information.


You’ll notice here that I have a “quad zero” Route


This route points to the default gateway

If I had this box configured a s a DHCP Client and it received an IP Address from the DHCP Server, it will learn what it’s default gateway is and it’s going to configure this “quad-zero” route

What we want to do now is manipulate it. We’ll first find a target.

We’ll perform an ns lookup in order to do a name search.


We’ll look for


It returns and address of

We’ll use the mark feature to copy the address to Notepad so that we have it saved for future use.




Now what we’ll try create a rout in the routing table by using “route add” You’ll notice that the address starts with a 166


We’ll type and add a mask of


The next field is a default gateway and you’ll notice that from above, the default gateway is


Next we’ll hit enter.

We’ll once again type “route print – 4


And take a look at the results of what’s been added.


You’ll noticed that a rout has been added to at it’s in the table. In fact, Windows looks at its routing table from the bottom to the top. Therefore, it placed it in this position which is not very specific since it only matches to the first 8 bits.

Now we will modify it again by using “route add” and the first two octets and then add a mask of and we’ll continue to send it to the default gateway of

Now we’ll hit enter and we receive an “OK!” notification.


Next we’ll type “route print -4


And hit enter.


Notice that it now placed it lower on the list? This is because Windows examines the routing tables form toe bottom up while looking for a specific match.  Now the route we just create matches more specific to 16 bits instead of 8 therefore it’s now lower on the table.

This is an example of what you will learn in the CompTIA Network + Certification class at Interface Technical Training.

For instructor-led CompTIA Certification classes, see our course schedule.

Until next time.

Mark Jacob
Cisco and CompTIA Network + Instructor – Interface Technical Training
Phoenix, AZ

Videos You May Like

Creating Users and Managing Passwords in Microsoft Office 365

0 642 3

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Subnetting a TCP/IP Network using the Magic Box Method

0 1624 5

See our class schedule for complete Course Schedule Training. Classes are held in Phoenix, AZ and can be attended online from anywhere in the world with RemoteLive™. Instructor: Rick Trader  Video Transcription: One of the things that we might have to do in our corporate network is to take a class of IP addresses and then subnet that into … Continue reading Subnetting a TCP/IP Network using the Magic Box Method

Detailed Forensic Investigation of Malware Infections – April 21, 2015

4 608 5

How does an investigator hunt down and identify unknown malware? In this recording of our IT Security training webinar on April 21, 2015, Security expert Mike Danseglio (CISSP / CEH) performed several malware investigations on infected computers and identify symptoms, find root cause, and follow the leads to determine what’s happening. He demonstrated his preferred … Continue reading Detailed Forensic Investigation of Malware Infections – April 21, 2015

Write a Comment

Share your thoughts...

Please fill out the comment form below to post a reply.