Unix/Linux Go Back    

OpenSolaris 2009.06 - man page for nmblookup (opensolaris section 1)

Linux & Unix Commands - Search Man Pages
Man Page or Keyword Search:   man
Select Man Page Set:       apropos Keyword Search (sections above)

NMBLOOKUP(1)				  User Commands 			     NMBLOOKUP(1)

       nmblookup - NetBIOS over TCP/IP client used to lookup NetBIOS names

       nmblookup [-M] [-R] [-S] [-r] [-A] [-h] [-B <broadcast address>] [-U <unicast address>]
	[-d <debug level>] [-s <smb config file>] [-i <NetBIOS scope>] [-T] [-f] {name}

       This tool is part of the samba(7) suite.

       nmblookup is used to query NetBIOS names and map them to IP addresses in a network using
       NetBIOS over TCP/IP queries. The options allow the name queries to be directed at a
       particular IP broadcast area or to a particular machine. All queries are done over UDP.

	   Searches for a master browser by looking up the NetBIOS name name with a type of 0x1d.
	    name is "-" then it does a lookup on the special name __MSBROWSE__. Please note that
	   in order to use the name "-", you need to make sure "-" isn't parsed as an argument,
	   e.g. use : nmblookup -M -- -.

	   Set the recursion desired bit in the packet to do a recursive lookup. This is used
	   when sending a name query to a machine running a WINS server and the user wishes to
	   query the names in the WINS server. If this bit is unset the normal (broadcast
	   responding) NetBIOS processing code on a machine is used instead. See RFC1001, RFC1002
	   for details.

	   Once the name query has returned an IP address then do a node status query as well. A
	   node status query returns the NetBIOS names registered by a host.

	   Try and bind to UDP port 137 to send and receive UDP datagrams. The reason for this
	   option is a bug in Windows 95 where it ignores the source port of the requesting
	   packet and only replies to UDP port 137. Unfortunately, on most UNIX systems root
	   privilege is needed to bind to this port, and in addition, if the nmbd(1M) daemon is
	   running on this machine it also binds to this port.

	   Interpret name as an IP Address and do a node status query on this address.

       -n <primary NetBIOS name>
	   This option allows you to override the NetBIOS name that Samba uses for itself. This
	   is identical to setting the netbios name parameter in the smb.conf file. However, a
	   command line setting will take precedence over settings in smb.conf.

       -i <scope>
	   This specifies a NetBIOS scope that nmblookup will use to communicate with when
	   generating NetBIOS names. For details on the use of NetBIOS scopes, see rfc1001.txt
	   and rfc1002.txt. NetBIOS scopes are very rarely used, only set this parameter if you
	   are the system administrator in charge of all the NetBIOS systems you communicate

	   Set the SMB domain of the username. This overrides the default domain which is the
	   domain defined in smb.conf. If the domain specified is the same as the servers NetBIOS
	   name, it causes the client to log on using the servers local SAM (as opposed to the
	   Domain SAM).

       -O socket options
	   TCP socket options to set on the client socket. See the socket options parameter in
	   the smb.conf manual page for the list of valid options.

	   Print a summary of command line options.

       -B <broadcast address>
	   Send the query to the given broadcast address. Without this option the default
	   behavior of nmblookup is to send the query to the broadcast address of the network
	   interfaces as either auto-detected or defined in the interfaces parameter of the
	   smb.conf(4) file.

       -U <unicast address>
	   Do a unicast query to the specified address or host unicast address. This option
	   (along with the -R option) is needed to query a WINS server.

	   level is an integer from 0 to 10. The default value if this parameter is not specified
	   is 0.

	   The higher this value, the more detail will be logged to the log files about the
	   activities of the server. At level 0, only critical errors and serious warnings will
	   be logged. Level 1 is a reasonable level for day-to-day running - it generates a small
	   amount of information about operations carried out.

	   Levels above 1 will generate considerable amounts of log data, and should only be used
	   when investigating a problem. Levels above 3 are designed for use only by developers
	   and generate HUGE amounts of log data, most of which is extremely cryptic.

	   Note that specifying this parameter here will override the log level parameter in the
	   smb.conf file.

	   Prints the program version number.

       -s <configuration file>
	   The file specified contains the configuration details required by the server. The
	   information in this file includes server-specific information such as what printcap
	   file to use, as well as descriptions of all the services that the server is to
	   provide. See smb.conf for more information. The default configuration file name is
	   determined at compile time.

	   Base directory name for log/debug files. The extension ".progname" will be appended
	   (e.g. log.smbclient, log.smbd, etc...). The log file is never removed by the client.

	   This causes any IP addresses found in the lookup to be looked up via a reverse DNS
	   lookup into a DNS name, and printed out before each

	   IP address .... NetBIOS name

	   pair that is the normal output.

	   Show which flags apply to the name that has been looked up. Possible answers are zero
	   or more of: Response, Authoritative, Truncated, Recursion_Desired,
	   Recursion_Available, Broadcast.

	   This is the NetBIOS name being queried. Depending upon the previous options this may
	   be a NetBIOS name or IP address. If a NetBIOS name then the different name types may
	   be specified by appending '#<type>' to the name. This name may also be '*', which will
	   return all registered names within a broadcast area.

       nmblookup can be used to query a WINS server (in the same way nslookup is used to query
       DNS servers). To query a WINS server, nmblookup must be called like this:

       nmblookup -U server -R 'name'

       For example, running :

       nmblookup -U samba.org -R 'IRIX#1B'

       would query the WINS server samba.org for the domain master browser (1B name type) for the
       IRIX workgroup.

       This man page is correct for version 3.0 of the Samba suite.

       nmbd(1M), samba(7), and smb.conf(4).

       The original Samba software and related utilities were created by Andrew Tridgell. Samba
       is now developed by the Samba Team as an Open Source project similar to the way the Linux
       kernel is developed.

       The original Samba man pages were written by Karl Auer. The man page sources were
       converted to YODL format (another excellent piece of Open Source software, available at
       ftp://ftp.icce.rug.nl/pub/unix/) and updated for the Samba 2.0 release by Jeremy Allison.
       The conversion to DocBook for Samba 2.2 was done by Gerald Carter. The conversion to
       DocBook XML 4.2 for Samba 3.0 was done by Alexander Bokovoy.

       See attributes(5) for descriptions of the following attributes:

       |Availability	    | SUNWsmbar, SUNWsmbau |
       |Interface Stability | External		   |
       Source for Samba is available on http://opensolaris.org.

       Samba(7) delivers the set of four SMF(5) services as can be seen from the following

	    $ svcs samba wins winbind swat
	   disabled	  Apr_21   svc:/network/samba:default
	   disabled	  Apr_21   svc:/network/winbind:default
	   disabled	  Apr_21   svc:/network/wins:default
	   disabled	  Apr_21   svc:/network/swat:default

       where the services are:

	   runs the smbd daemon managing the CIFS sessions

	   runs the nmbd daemon enabling the browsing (WINS)

	   runs the winbindd daemon making the domain idmap

	   Samba Web Administration Tool is a service providing access to browser-based Samba
	   administration interface and on-line documentation.	The service runs on software
	   loopback network interface on port 901/tcp, i.e. opening "http://localhost:901/" in
	   browser will access the SWAT service on local machine.

       Please note: SWAT uses HTTP Basic Authentication scheme where user name and passwords are
       sent over the network in clear text. In the SWAT case the user name is root. Transferring
       such sensitive data is advisable only on the software loopback network interface or over
       secure networks.

Samba 3.0				    01/19/2009				     NMBLOOKUP(1)
Unix & Linux Commands & Man Pages : ©2000 - 2018 Unix and Linux Forums

All times are GMT -4. The time now is 05:30 PM.