Sponsored Content
Full Discussion: DNS client nslookup
Top Forums UNIX for Advanced & Expert Users DNS client nslookup Post 302069059 by DogDay on Wednesday 22nd of March 2006 11:03:04 AM
Old 03-22-2006
Do you have a domain set on that workstation?
 

9 More Discussions You Might Find Interesting

1. Solaris

I am too young not to be able to resolve myself...nslookup problem (no DNS available)

I don't have DNS, and would like to resolve EVERYTHING through local /etc/hosts file. My first sunbox has the following configuration: # hostname mybox.home.com My host file is as follows: # cat /etc/hosts # # Internet host table # 127.0.0.1 localhost 192.25.x.x ... (6 Replies)
Discussion started by: mr_manny
6 Replies

2. Solaris

Solaris DNS Client For Microsoft DNS Server

hey guys, how to add soalris box as a microsoft DNS Client ? and how to register in the microsoft DNS ?? i managed to query from the DNS server after adding /etc/resolve.conf and editing /etc/nsswitch.conf but i need to register the soalris server (dns Client) into Microsoft DNS automatically.... (3 Replies)
Discussion started by: mduweik
3 Replies

3. Solaris

dns client not working

Hi All, I have configured linux server as local dns server (practice level). I have given the IP and hostname details in /etc/hosts -bash-3.00# cat /etc/hosts # # Internet host table # ::1 localhost 127.0.0.1 localhost 192.168.1.78 dummy.set.com loghost 192.168.1.57 cent.set.com #... (3 Replies)
Discussion started by: vaibhav.kanchan
3 Replies

4. Debian

PB : DNS Client don't ping internet

Hi, I have my router (192.168.1.1) connected to the internet. I have installed Debian on a server with Bind9 (192.168.1.254). The configurations files are : $ cat /etc/network/interfaces # The loopback network interface auto lo iface lo inet loopback # The primary network interface... (1 Reply)
Discussion started by: Thibault
1 Replies

5. IP Networking

How to Determine client's DNS server Ip

Is there a way for a server to determine client's DNS ip? I have an application that logs client's IP but in certain cases its desirable to know their DNS too (1 Reply)
Discussion started by: vickylife
1 Replies

6. Linux

How to add a client to DNS server

Hi all, What is the procedure to add a client to a DNS server. what are the settings and files need to be added/changed ? thanks in advance! (6 Replies)
Discussion started by: lramsb4u
6 Replies

7. Red Hat

Nslookup working but ping not working at windows client

Hi Team we have created a DNS server at RHEL6.2 environment in 10.20.203.x/24 network. Everything is going well on linux client as nslookup, ping by host etc in entire subnet. We are getting problem in windows client as nslookup working as well but not ping. all the firewall is disabled and... (5 Replies)
Discussion started by: boby.kumar
5 Replies

8. Solaris

DNS client - what exactly it is

Hi all, I always thought DNS server = provide DNS response (host to ip / ip to host) to DNS client (which send DNS resolve request). So in my solaris 10 box, i setup /etc/resolv/conf, /etc/nsswitch.conf (added in dns) etc. Yes, i am able to dig and nslookup. But.. am i a DNS client ? ... (5 Replies)
Discussion started by: javanoob
5 Replies

9. Solaris

DNS client added to DNS server but not working

Hi, We have built a new server (RHEL VM)and added that IP/hostname into dns zone configs file on DNS server (Solaris 10). Reloaded the configuration using and added nameserver into resolv.conf on client. But when I am trying nslookup, its not getting resolved. The nameserver is not able to... (8 Replies)
Discussion started by: snchaudhari2
8 Replies
HTNTLM(1)							   User Commands							 HTNTLM(1)

NAME
htntlm - read/write NTLM message SYNOPSIS
htntlm [OPTIONS] DESCRIPTION
htntlm is used to read, generate and inspect NTLM messages. OPTIONS
-v --version Print version number and exit -h --help Display usage information (this message) -r --read read a NTLM base64 encoded message -w --write write a NTLM base64 encoded message -i --info print in a readable manner -d --debug print debug information -t --type NTLM message type 1, 2 or 3 -D --domain Domain name -W --workstation Workstation name -E --server Workstation name -O --os-version OS Version major.minor.build -T --target Target name -N --dns-domain DNS domain name -S --dns-server DNS server name -a --target-info Target info as provided in NTLM type 2 message base64 encoded, need for NTLMv2 -U --user User name -P --password password -C --challenge Challenge in hex notation -c --client-challengeClient challenge in hex notation, default is a random -X --context Context in hex notation -K --session-key Session Key -R --response response type space separated: lm ntlm lm2 ntlm2 ntlm2-session -u --unicode transmit user, workstation, ... as unicode strings -f --flags Space separated NTLM flags neg-unicode: Indicates that Unicode strings are supported for use in security buffer data. neg-oem: Indicates that OEM strings are supported for use in security buffer data. req-target: Requests that the server's authentication realm be included in the Type 2 message. neg-sign: Specifies that authenticated communication between the client and server should carry a digital signature (message integrity). neg-seal: Specifies that authenticated communication between the client and server should be encrypted (message confidentiality). neg-datagram-style: Indicates that datagram authentication is being used. neg-lm-key: Indicates that the Lan Manager Session Key should be used for signing and sealing authenticated communications. neg-netware: This flag's usage has not been identified. neg-ntlm-key: Indicates that NTLM authentication is being used. neg-anonymous: Sent by the client in the Type 3 message to indicate that an anonymous context has been established. This also affects the response fields. neg-domain-supp: Sent by the client in the Type 1 message to indicate that the name of the domain in which the client workstation has membership is included in the message. This is used by the server to determine whether the client is eligible for local authentication. neg-workstation-supp: Sent by the client in the Type 1 message to indicate that the client workstation's name is included in the message. This is used by the server to determine whether the client is eligible for local authentication. neg-local-call: Sent by the server to indicate that the server and client are on the same machine. Implies that the client may use the established local credentials for authentication instead of calculating a response to the challenge. neg-always_sign: Indicates that authenticated communication between the client and server should be signed with a "dummy" signature. target-type-domain: Sent by the server in the Type 2 message to indicate that the target authentication realm is a domain. target-type-server: Sent by the server in the Type 2 message to indicate that the target authentication realm is a server. target-type-share: Sent by the server in the Type 2 message to indicate that the target authentication realm is a share. Presumably, this is for share-level authentication. Usage is unclear. neg-ntlm2-key: Indicates that the NTLM2 signing and sealing scheme should be used for protecting authenticated communications. Note that this refers to a particular session security scheme, and is not related to the use of NTLMv2 authentication. This flag can, however, have an effect on the response calculations req-init-res: This flag's usage has not been identified req-accept-res: This flag's usage has not been identified req-nonnt-session-key: This flag's usage has not been identified neg-target-info: Sent by the server in the Type 2 message to indicate that it is including a Target Information block in the message. The Target Information block is used in the calculation of the NTLMv2 response. neg-128: Indicates that 128-bit encryption is supported. neg-key-exchange: Indicates that the client will provide an encrypted master key in the "Session Key" field of the Type 3 message. neg-56: Indicates that 56-bit encryption is supported. AUTHOR
Written by Christian Liesch COPYRIGHT
Copyright (C) 2006 Free Software Foundation, Inc. This is free software; see the source for copying conditions. There is NO warranty; not even for MERCHANTABILITY or FITNESS FOR A PARTICU- LAR PURPOSE. htntlm 2.2.6 June 2012 HTNTLM(1)
All times are GMT -4. The time now is 10:41 PM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy