JelmerR.VernooijR. The Samba Team
jelmer@samba.org
'> &person.jelmer;'> GeraldCarter(Jerry) Samba Team
jerry@samba.org
'> &person.jerry;'> JeremyAllison Samba Team
jra@samba.org
'> JohnTerpstraH. Samba Team
jht@samba.org
'> &person.jht;'> AndrewTridgell Samba Team
tridge@samba.org
'> JimMcDonough IBM
jmcd@us.ibm.com
'> &person.jmcd;'> VolkerLendecke Samba Team
Volker.Lendecke@SerNet.DE
'> DavidBannon Samba Team
dbannon@samba.org
'> RafalSzczesniak Samba Team
mimir@samba.org
'> DavidLechnyr Unofficial HOWTO
david@lechnyr.com
'> EricRoseme HP Oplocks Usage Recommendations Whitepaper
eric.roseme@hp.com
'> -d|--debug=debuglevel debuglevel is an integer from 0 to 10. The default value if this parameter is not specified is zero. The higher this value, the more detail will be logged to the log files about the activities of the server. At level 0, only critical errors and serious warnings will be logged. Level 1 is a reasonable level for day to day running - it generates a small amount of information about operations carried out. Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic. Note that specifying this parameter here will override the log level parameter in the &smb.conf; file. '> -s <configuration file> The file specified contains the configuration details required by the server. The information in this file includes server-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide. See &smb.conf; for more information. The default configuration file name is determined at compile time. '> -V Prints the version number for smbd. '> -l|--logfile=logbasename File name for log/debug files. The extension ".client" will be appended. The log file is never removed by the client. '> -R <name resolve order> This option is used to determine what naming services and in what order to resolve host names to IP addresses. The option takes a space-separated string of different name resolution options. The options are: "lmhosts", "host", "wins" and "bcast". They cause names to be resolved as follows : lmhosts: Lookup an IP address in the Samba lmhosts file. If the line in lmhosts has no name type attached to the NetBIOS name (see the lmhosts 5 for details) then any name type matches for lookup. host: Do a standard host name to IP address resolution, using the system /etc/hosts, NIS, or DNS lookups. This method of name resolution is operating system dependent, for instance on IRIX or Solaris this may be controlled by the /etc/nsswitch.conf file). Note that this method is only used if the NetBIOS name type being queried is the 0x20 (server) name type, otherwise it is ignored. wins: Query a name with the IP address listed in the wins server parameter. If no WINS server has been specified this method will be ignored. bcast: Do a broadcast on each of the known local interfaces listed in the interfaces parameter. This is the least reliable of the name resolution methods as it depends on the target host being on a locally connected subnet. If this parameter is not set then the name resolve order defined in the &smb.conf; file parameter (name resolve order) will be used. The default order is lmhosts, host, wins, bcast. Without this parameter or any entry in the name resolve order parameter of the &smb.conf; file, the name resolution methods will be attempted in this order. '> -n <primary NetBIOS name> This option allows you to override the NetBIOS name that Samba uses for itself. This is identical to setting the netbios name parameter in the &smb.conf; file. However, a command line setting will take precedence over settings in &smb.conf;. '> -i <scope> This specifies a NetBIOS scope that nmblookup will use to communicate with when generating NetBIOS names. For details on the use of NetBIOS scopes, see rfc1001.txt and rfc1002.txt. NetBIOS scopes are very rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with. '> -W|--workgroup=domain Set the SMB domain of the username. This overrides the default domain which is the domain defined in smb.conf. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM). '> -O socket options TCP socket options to set on the client socket. See the socket options parameter in the &smb.conf; manual page for the list of valid options. '> -N If specified, this parameter suppresses the normal password prompt from the client to the user. This is useful when accessing a service that does not require a password. Unless a password is specified on the command line or this parameter is specified, the client will request a password. '> -U|--user=username[&pct;password] Sets the SMB username or username and password. If &pct;password is not specified, the user will be prompted. The client will first check the USER environment variable, then the LOGNAME variable and if either exists, the string is uppercased. If these environmental variables are not found, the username GUEST is used. A third option is to use a credentials file which contains the plaintext of the username and password. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables. If this method is used, make certain that the permissions on the file restrict access from unwanted users. See the -A for more details. Be cautious about including passwords in scripts. Also, on many systems the command line of a running process may be seen via the ps command. To be safe always allow rpcclient to prompt for a password and type it in directly. '> -A|--authfile=filename This option allows you to specify a file from which to read the username and password used in the connection. The format of the file is username = <value> password = <value> domain = <value> Make certain that the permissions on the file restrict access from unwanted users. '> -k Try to authenticate with kerberos. Only useful in an Active Directory environment. '> -h|--help Print a summary of command line options. '> smbd'> nmbd'> testparm'> smb.conf'> smbclient'> winbindd'> net'> Currently NOT implemented."> root# "> $ "> C:\> ">