|
DIG HOSTNAME('10.17.6.33') REVERSE(*YES) IPVSN(*IPV4ONLY) SHORT(*YES) IDENTIFY(*YES) TOSTMF('/rob/digout') dspf '/rob/digout' ....+....1....+....2....+....3....+....4....+ ************Beginning of data************** ************End of Data******************** I, personally, don't see a lot of use in that. I tried it by client name and by IP address. No, I do not have a host table entry for it and NSLOOKUP works. If I try something in our DMZ versus something on the same subnet it works ....+....1....+....2....+....3....+....4....+....5 ************Beginning of data************** gdweb3.dekko.com. from server 10.10.4.250 in 1 ms. ************End of Data******************** It didn't work too well for nra.org, nor the address returned by pinging nra.org. But NSLOOKUP seemed to work. I do see a lot of pressure to use DIG versus NSLOOKUP. Rob Berendt
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2025 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.