Mind you this will fail on SMB devices. Unless you create the hash on the same version SMB device. THere are some Secure Knowledge articles about this and you have to piece them together to get the proper picture so you know what works and what does not work.
As a practical hint. If you roll out a number of SMB devices make sure you have one or two to tinker with yourself as admin as there are practical limitations you rather find out in the lab then in the field.
<< We make miracles happen while you wait. The impossible jobs take just a wee bit longer. >>