Penguin
Blame: nmblookup(1)
EditPageHistoryDiffInfoLikePages
Annotated edit history of nmblookup(1) version 1, including all changes. View license author blame.
Rev Author # Line
1 perry 1 NMBLOOKUP
2 !!!NMBLOOKUP
3 NAME
4 SYNOPSIS
5 DESCRIPTION
6 OPTIONS
7 EXAMPLES
8 VERSION
9 SEE ALSO
10 AUTHOR
11 ----
12 !!NAME
13
14
15 nmblookup - NetBIOS over TCP/IP client used to lookup NetBIOS names
16 !!SYNOPSIS
17
18
19 __nmblookup__ [[ __-M__ ] [[ __-R__ ] [[ __-S__ ] [[
20 __-r__ ] [[ __-A__ ] [[ __-h__ ] [[ __-B
21 __ ] [[ __-U
22 __ ] [[ __-d __ ] [[ __-s
23 __ ] [[ __-i
24 __ ] [[ __-T__ ] __name__
25 !!DESCRIPTION
26
27
28 This tool is part of the Sambasuite.
29
30
31 __nmblookup__ is used to query NetBIOS names and map them
32 to IP addresses in a network using NetBIOS over TCP/IP
33 queries. The options allow the name queries to be directed
34 at a particular IP broadcast area or to a particular
35 machine. All queries are done over UDP.
36 !!OPTIONS
37
38
39 __-M__
40
41
42 Searches for a master browser by looking up the NetBIOS name
43 ''name'' with a type of 0x1d. If ''name'' is
44 ''
45
46
47 __-R__
48
49
50 Set the recursion desired bit in the packet to do a
51 recursive lookup. This is used when sending a name query to
52 a machine running a WINS server and the user wishes to query
53 the names in the WINS server. If this bit is unset the
54 normal (broadcast responding) NetBIOS processing code on a
55 machine is used instead. See rfc1001, rfc1002 for
56 details.
57
58
59 __-S__
60
61
62 Once the name query has returned an IP address then do a
63 node status query as well. A node status query returns the
64 NetBIOS names registered by a host.
65
66
67 __-r__
68
69
70 Try and bind to UDP port 137 to send and receive UDP
71 datagrams. The reason for this option is a bug in Windows 95
72 where it ignores the source port of the requesting packet
73 and only replies to UDP port 137. Unfortunately, on most
74 UNIX systems root privilege is needed to bind to this port,
75 and in addition, if the nmbd(8) daemon is running on this
76 machine it also binds to this port.
77
78
79 __-A__
80
81
82 Interpret ''name'' as an IP Address and do a node status
83 query on this address.
84
85
86 __-h__
87
88
89 Print a help (usage) message.
90
91
92 __-B __
93
94
95 Send the query to the given broadcast address. Without this
96 option the default behavior of nmblookup is to send the
97 query to the broadcast address of the network interfaces as
98 either auto-detected or defined in the ''interfaces''
99 parameter of the ''smb.conf (5)'' file.
100
101
102 __-U __
103
104
105 Do a unicast query to the specified address or host
106 ''unicast address''. This option (along with the
107 ''-R'' option) is needed to query a WINS
108 server.
109
110
111 __-d __
112
113
114 debuglevel is an integer from 0 to 10.
115
116
117 The default value if this parameter is not specified is
118 zero.
119
120
121 The higher this value, the more detail will be logged about
122 the activities of __nmblookup__. At level 0, only
123 critical errors and serious warnings will be
124 logged.
125
126
127 Levels above 1 will generate considerable amounts of log
128 data, and should only be used when investigating a problem.
129 Levels above 3 are designed for use only by developers and
130 generate HUGE amounts of data, most of which is extremely
131 cryptic.
132
133
134 Note that specifying this parameter here will override the
135 ''log level''parameter in the ''smb.conf(5)''
136 file.
137
138
139 __-s __
140
141
142 This parameter specifies the pathname to the Samba
143 configuration file, smb.conf(5). This file controls all
144 aspects of the Samba setup on the machine.
145
146
147 __-i __
148
149
150 This specifies a NetBIOS scope that __nmblookup__ will
151 use to communicate with when generating NetBIOS names. For
152 details on the use of NetBIOS scopes, see rfc1001.txt and
153 rfc1002.txt. NetBIOS scopes are __very__ rarely used,
154 only set this parameter if you are the system administrator
155 in charge of all the NetBIOS systems you communicate
156 with.
157
158
159 __-T__
160
161
162 This causes any IP addresses found in the lookup to be
163 looked up via a reverse DNS lookup into a DNS name, and
164 printed out before each
165
166
167 __IP address .... NetBIOS name__
168
169
170 pair that is the normal output.
171
172
173 __name__
174
175
176 This is the NetBIOS name being queried. Depending upon the
177 previous options this may be a NetBIOS name or IP address.
178 If a NetBIOS name then the different name types may be
179 specified by appending '#
180 !!EXAMPLES
181
182
183 __nmblookup__ can be used to query a WINS server (in the
184 same way __nslookup__ is used to query DNS servers). To
185 query a WINS server, __nmblookup__ must be called like
186 this:
187
188
189 __nmblookup -U server -R 'name'__
190
191
192 For example, running :
193
194
195 __nmblookup -U samba.org -R 'IRIX#1B'__
196
197
198 would query the WINS server samba.org for the domain master
199 browser (1B name type) for the IRIX workgroup.
200 !!VERSION
201
202
203 This man page is correct for version 2.2 of the Samba
204 suite.
205 !!SEE ALSO
206
207
208 __nmbd(8)__, samba(7)
209 !!AUTHOR
210
211
212 The original Samba software and related utilities were
213 created by Andrew Tridgell. Samba is now developed by the
214 Samba Team as an Open Source project similar to the way the
215 Linux kernel is developed.
216
217
218 The original Samba man pages were written by Karl Auer. The
219 man page sources were converted to YODL format (another
220 excellent piece of Open Source software, available at
221 ftp://ftp.icce.rug.nl/pub/unix/
222 ----
This page is a man page (or other imported legacy content). We are unable to automatically determine the license status of this page.