Changeset 988 for vendor/current/docs/manpages/rpcclient.1
- Timestamp:
- Nov 24, 2016, 1:14:11 PM (9 years ago)
- File:
-
- 1 edited
Legend:
- Unmodified
- Added
- Removed
-
vendor/current/docs/manpages/rpcclient.1
r860 r988 2 2 .\" Title: rpcclient 3 3 .\" Author: [see the "AUTHOR" section] 4 .\" Generator: DocBook XSL Stylesheets v1.7 6.1 <http://docbook.sf.net/>5 .\" Date: 0 9/18/20134 .\" Generator: DocBook XSL Stylesheets v1.78.1 <http://docbook.sf.net/> 5 .\" Date: 05/02/2016 6 6 .\" Manual: User Commands 7 .\" Source: Samba 3.67 .\" Source: Samba 4.4 8 8 .\" Language: English 9 9 .\" 10 .TH "RPCCLIENT" "1" "0 9/18/2013" "Samba 3\&.6" "User Commands"10 .TH "RPCCLIENT" "1" "05/02/2016" "Samba 4\&.4" "User Commands" 11 11 .\" ----------------------------------------------------------------- 12 12 .\" * Define some portability stuff … … 32 32 .SH "SYNOPSIS" 33 33 .HP \w'\ 'u 34 rpcclient [\-A\ authfile] [\-c\ <command\ string>] [\-d\ debuglevel] [\- h] [\-l\ logdir] [\-N] [\-s\ <smb\ config\ file>] [\-U\ username[%password]] [\-W\ workgroup] [\-I\ destinationIP] {server}34 rpcclient [\-A\ authfile] [\-c\ <command\ string>] [\-d\ debuglevel] [\-l\ logdir] [\-N] [\-s\ <smb\ config\ file>] [\-U\ username[%password]] [\-W\ workgroup] [\-I\ destinationIP] {server} 35 35 .SH "DESCRIPTION" 36 36 .PP … … 72 72 This number is the TCP port number that will be used when making connections to the server\&. The standard (well\-known) TCP port number for an SMB/CIFS server is 139, which is the default\&. 73 73 .RE 74 .PP75 \-d|\-\-debuglevel=level76 .RS 477 \fIlevel\fR78 is an integer from 0 to 10\&. The default value if this parameter is not specified is 0\&.79 .sp80 The higher this value, the more detail will be logged to the log files about the activities of the server\&. At level 0, only critical errors and serious warnings will be logged\&. Level 1 is a reasonable level for day\-to\-day running \- it generates a small amount of information about operations carried out\&.81 .sp82 Levels above 1 will generate considerable amounts of log data, and should only be used when investigating a problem\&. Levels above 3 are designed for use only by developers and generate HUGE amounts of log data, most of which is extremely cryptic\&.83 .sp84 Note that specifying this parameter here will override the85 \m[blue]\fBlog level\fR\m[]86 parameter in the87 smb\&.conf88 file\&.89 .RE90 .PP91 \-V|\-\-version92 .RS 493 Prints the program version number\&.94 .RE95 .PP96 \-s|\-\-configfile <configuration file>97 .RS 498 The file specified contains the configuration details required by the server\&. The information in this file includes server\-specific information such as what printcap file to use, as well as descriptions of all the services that the server is to provide\&. See99 smb\&.conf100 for more information\&. The default configuration file name is determined at compile time\&.101 .RE102 .PP103 \-l|\-\-log\-basename=logdirectory104 .RS 4105 Base directory name for log/debug files\&. The extension106 \fB"\&.progname"\fR107 will be appended (e\&.g\&. log\&.smbclient, log\&.smbd, etc\&.\&.\&.)\&. The log file is never removed by the client\&.108 .RE109 .PP110 \-N|\-\-no\-pass111 .RS 4112 If specified, this parameter suppresses the normal password prompt from the client to the user\&. This is useful when accessing a service that does not require a password\&.113 .sp114 Unless a password is specified on the command line or this parameter is specified, the client will request a password\&.115 .sp116 If a password is specified on the command line and this option is also defined the password on the command line will be silently ingnored and no password will be used\&.117 .RE118 .PP119 \-k|\-\-kerberos120 .RS 4121 Try to authenticate with kerberos\&. Only useful in an Active Directory environment\&.122 .RE123 .PP124 \-C|\-\-use\-ccache125 .RS 4126 Try to use the credentials cached by winbind\&.127 .RE128 .PP129 \-A|\-\-authentication\-file=filename130 .RS 4131 This option allows you to specify a file from which to read the username and password used in the connection\&. The format of the file is132 .sp133 .if n \{\134 .RS 4135 .\}136 .nf137 username = <value>138 password = <value>139 domain = <value>140 .fi141 .if n \{\142 .RE143 .\}144 .sp145 Make certain that the permissions on the file restrict access from unwanted users\&.146 .RE147 .PP148 \-U|\-\-user=username[%password]149 .RS 4150 Sets the SMB username or username and password\&.151 .sp152 If %password is not specified, the user will be prompted\&. The client will first check the153 \fBUSER\fR154 environment variable, then the155 \fBLOGNAME\fR156 variable and if either exists, the string is uppercased\&. If these environmental variables are not found, the username157 \fBGUEST\fR158 is used\&.159 .sp160 A third option is to use a credentials file which contains the plaintext of the username and password\&. This option is mainly provided for scripts where the admin does not wish to pass the credentials on the command line or via environment variables\&. If this method is used, make certain that the permissions on the file restrict access from unwanted users\&. See the161 \fI\-A\fR162 for more details\&.163 .sp164 Be cautious about including passwords in scripts\&. Also, on many systems the command line of a running process may be seen via the165 ps166 command\&. To be safe always allow167 rpcclient168 to prompt for a password and type it in directly\&.169 .RE170 .PP171 \-n|\-\-netbiosname <primary NetBIOS name>172 .RS 4173 This option allows you to override the NetBIOS name that Samba uses for itself\&. This is identical to setting the174 \m[blue]\fBnetbios name\fR\m[]175 parameter in the176 smb\&.conf177 file\&. However, a command line setting will take precedence over settings in178 smb\&.conf\&.179 .RE180 .PP181 \-i|\-\-scope <scope>182 .RS 4183 This specifies a NetBIOS scope that184 nmblookup185 will use to communicate with when generating NetBIOS names\&. For details on the use of NetBIOS scopes, see rfc1001\&.txt and rfc1002\&.txt\&. NetBIOS scopes are186 \fIvery\fR187 rarely used, only set this parameter if you are the system administrator in charge of all the NetBIOS systems you communicate with\&.188 .RE189 .PP190 \-W|\-\-workgroup=domain191 .RS 4192 Set the SMB domain of the username\&. This overrides the default domain which is the domain defined in smb\&.conf\&. If the domain specified is the same as the servers NetBIOS name, it causes the client to log on using the servers local SAM (as opposed to the Domain SAM)\&.193 .RE194 .PP195 \-O|\-\-socket\-options socket options196 .RS 4197 TCP socket options to set on the client socket\&. See the socket options parameter in the198 smb\&.conf199 manual page for the list of valid options\&.200 .RE201 .PP202 \-h|\-\-help203 .RS 4204 Print a summary of command line options\&.205 .RE206 74 .SH "COMMANDS" 207 75 .SS "LSARPC" … … 222 90 .RE 223 91 .PP 224 enumtrust s92 enumtrust 225 93 .RS 4 226 94 Enumerate trusted domains … … 333 201 .RE 334 202 .PP 203 netshareenumall 204 .RS 4 205 Enumerate all shares 206 .RE 207 .PP 208 netsharegetinfo 209 .RS 4 210 Get Share Info 211 .RE 212 .PP 213 netsharesetinfo 214 .RS 4 215 Set Share Info 216 .RE 217 .PP 218 netsharesetdfsflags 219 .RS 4 220 Set DFS flags 221 .RE 222 .PP 335 223 netfileenum 336 224 .RS 4 … … 341 229 .RS 4 342 230 Fetch remote time of day 231 .RE 232 .PP 233 netnamevalidate 234 .RS 4 235 Validate sharename 236 .RE 237 .PP 238 netfilegetsec 239 .RS 4 240 Get File security 241 .RE 242 .PP 243 netsessdel 244 .RS 4 245 Delete Session 246 .RE 247 .PP 248 netsessenum 249 .RS 4 250 Enumerate Sessions 251 .RE 252 .PP 253 netdiskenum 254 .RS 4 255 Enumerate Disks 256 .RE 257 .PP 258 netconnenum 259 .RS 4 260 Enumerate Connections 261 .RE 262 .PP 263 netshareadd 264 .RS 4 265 Add share 266 .RE 267 .PP 268 netsharedel 269 .RS 4 270 Delete share 343 271 .RE 344 272 .SS "SAMR" … … 445 373 .\} 446 374 .nf 447 Long Printer Name:\e375 Long Driver Name:\e 448 376 Driver File Name:\e 449 377 Data File Name:\e … … 480 408 .RE 481 409 .PP 482 deldriverex <driver> [architecture] [version] 483 .RS 4 484 Delete the specified printer driver including driver files\&. You can limit this action to a specific architecture and a specific version\&. If no architecure is given, all driver files of that driver will be deleted\&. 410 deldriverex <driver> [architecture] [version] [flags] 411 .RS 4 412 Delete the specified printer driver and optionally files associated with the driver\&. You can limit this action to a specific architecture and a specific version\&. If no architecture is given, all driver files of that driver will be deleted\&. 413 \fIflags\fR 414 correspond to numeric DPD_* values, i\&.e\&. a value of 3 requests (DPD_DELETE_UNUSED_FILES | DPD_DELETE_SPECIFIC_VERSION)\&. 485 415 .RE 486 416 .PP … … 640 570 Sam Logon 641 571 .RE 572 .SS "FSRVP" 573 .PP 574 fss_is_path_sup <share> 575 .RS 4 576 Check whether a share supports shadow\-copy requests 577 .RE 578 .PP 579 fss_get_sup_version 580 .RS 4 581 Get supported FSRVP version from server 582 .RE 583 .PP 584 fss_create_expose <context> <[ro|rw]> <share1> [share2] \&.\&.\&. [shareN] 585 .RS 4 586 Request shadow\-copy creation and exposure as a new share 587 .RE 588 .PP 589 fss_delete <base_share> <shadow_copy_set_id> <shadow_copy_id> 590 .RS 4 591 Request shadow\-copy share deletion 592 .RE 593 .PP 594 fss_has_shadow_copy <base_share> 595 .RS 4 596 Check for an associated share shadow\-copy 597 .RE 598 .PP 599 fss_get_mapping <base_share> <shadow_copy_set_id> <shadow_copy_id> 600 .RS 4 601 Get shadow\-copy share mapping information 602 .RE 603 .PP 604 fss_recovery_complete <shadow_copy_set_id> 605 .RS 4 606 Flag read\-write shadow\-copy as recovery complete, allowing further shadow\-copy requests 607 .RE 642 608 .SS "GENERAL COMMANDS" 643 609 .PP
Note:
See TracChangeset
for help on using the changeset viewer.