Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

dig command -- forcing over UDP

Posted on 2013-06-17
2
Medium Priority
?
4,150 Views
Last Modified: 2013-06-17
Hi guys,

According the dig command man page,  if I wanted to force the dig command over udp when querying name servers I would use this:

+[no]tcp
Use or do not use TCP when querying name servers. The default behavior is to use UDP unless an AXFR or IXFR query is requested, in which case a TCP connection is used.


Is this correct usage below:

dig +tcp @ns1.domain.com testdomain.com


If I try taking the instructions literally and using:

dig +[no]tcp @ns1.domain.com testdomain.com

it errors with:

Invalid option: +[no]tcp
Usage:  dig [@global-server] [domain] [q-type] [q-class] {q-opt}
        {global-d-opt} host [@local-server] {local-d-opt}
        [ host [@local-server] {local-d-opt} [...]]



The first command above gives me output but no indication of whether this actually used udp or tcp so that's why I'm not sure.



Thanks
0
Comment
Question by:serveradm
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 9

Accepted Solution

by:
gt2847c earned 2000 total points
ID: 39254383
The "[ ]" indicates optional item.  +notcp or +tcp

What you want is:

dig +notcp @ns1.domain.com testdomain.com
0
 

Author Closing Comment

by:serveradm
ID: 39254438
Thanks for clarifying that!
0

Featured Post

Put Machine Learning to Work--Protect Your Clients

Machine learning means Smarter Cybersecurity™ Solutions.
As technology continues to advance, managing and analyzing massive data sets just can’t be accomplished by humans alone. It requires huge amounts of memory and storage, as well as high-speed processing of the cloud.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Envision that you are chipping away at another e-business site with a team of pundit developers and designers. Everything seems, by all accounts, to be going easily.
This paper addresses the security of Sennheiser DECT Contact Center and Office (CC&O) headsets. It describes the DECT security chain comprised of “Pairing”, “Per Call Authentication” and “Encryption”, which are all part of the standard DECT protocol.
Here's a very brief overview of the methods PRTG Network Monitor (https://www.paessler.com/prtg) offers for monitoring bandwidth, to help you decide which methods you´d like to investigate in more detail.  The methods are covered in more detail in o…
NetCrunch network monitor is a highly extensive platform for network monitoring and alert generation. In this video you'll see a live demo of NetCrunch with most notable features explained in a walk-through manner. You'll also get to know the philos…

688 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question