Why does RTM flood the network with Windows Internet Name System (WINS) requests?
A. RTM does not do this; the underlying Windows NT system is what causes this to happen. Windows NT tries to respond to requests for name resolution by RTM using its resolver. The UDP 137 traffic results when the Windows NT operating system receives a Hostname Resolution request. Windows NT uses Domain Name System (DNS) and WINS for host name resolution. Refer to the Microsoft Knowledge Base article Q119493 NetBIOS over TCP/IP Name Resolution and WINS for an explanation in further detail. Apparently, Microsoft does not allow the UDP 137 traffic resulting from IP to hostname resolution to be disabled. Instead, they recommend that the traffic be filtered. In RTM, the name resolution function can be disabled in $NSHOME\bin\serverprivate.properties with the line dns.disable=true.
Related Questions
- How do I assign Domain Naming System (DNS) and Windows Internet Naming Service (WINS) server IP addresses for PPP connections from ACS using RADIUS?
- How do I assign Domain Naming System (DNS) and Windows Internet Naming Service (WINS) server IP addresses for PPP connections from ACS using TACACS+?
- Why does RTM flood the network with Windows Internet Name System (WINS) requests?