bind杂记(3)

bind高级

回顾

配置成缓存名称服务器

[root@www ~]# vim /etc/named.conf

//

options {
        //listen-on port 53 { 10.201.106.129; };
        /* listen-on-v6 port 53 { ::1; }; */
        directory       "/var/named";
        dump-file       "/var/named/data/cache_dump.db";
        statistics-file "/var/named/data/named_stats.txt";
        memstatistics-file "/var/named/data/named_mem_stats.txt";
        //allow-query     { any; };
        recursion yes;

        /*dnssec-enable yes;
        dnssec-validation yes;
        dnssec-lookaside auto;

         Path to ISC DLV key 
        bindkeys-file "/etc/named.iscdlv.key";

        managed-keys-directory "/var/named/dynamic";
        */
};

查看DNS的TCP和UDP端口是否开启

[root@www ~]# ss -tuln | grep :53
udp    UNCONN     0      0         10.201.106.129:53                    *:*     
udp    UNCONN     0      0              127.0.0.1:53                    *:*     
tcp    LISTEN     0      3         10.201.106.129:53                    *:*     
tcp    LISTEN     0      3              127.0.0.1:53                    *:*     
tcp    LISTEN     0      128                   :::53835                :::*     

定义正向和反向区域文件

vim /etc/named.rfc1912.conf
zone "magedu.com" IN {
        type master;
        file "magedu.com.zone";
};

zone "106.201.10.in-addr.arpa" IN {
        type master;
        file "10.201.106.zone";
};

重载服务
[root@www ~]# rndc reload
server reload successful

[root@www ~]# rndc reload
server reload successful
[root@www ~]# rndc status
version: 9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6
CPUs found: 1
worker threads: 1
number of zones: 21
debug level: 0
xfers running: 0
xfers deferred: 0
soa queries in progress: 0
query logging is OFF
recursive clients: 0/0/1000
tcp clients: 0/100
server is up and running

[root@www ~]# tail /var/log/messages
Aug  3 13:39:42 qq named[19186]: error (network unreachable) resolving './DNSKEY/IN': 2001:503:c27::2:30#53
Aug  3 13:39:42 qq named[19186]: error (network unreachable) resolving './DNSKEY/IN': 2001:7fe::53#53
Aug  3 13:39:53 qq named[19186]: received control channel command 'reload'
Aug  3 13:39:53 qq named[19186]: loading configuration from '/etc/named.conf'
Aug  3 13:39:53 qq named[19186]: using default UDP/IPv4 port range: [1024, 65535]
Aug  3 13:39:53 qq named[19186]: using default UDP/IPv6 port range: [1024, 65535]
Aug  3 13:39:53 qq named[19186]: sizing zone task pool based on 8 zones
Aug  3 13:39:54 qq named[19186]: Warning: 'empty-zones-enable/disable-empty-zone' not set: disabling RFC 1918 empty zones
Aug  3 13:39:54 qq named[19186]: reloading configuration succeeded
Aug  3 13:39:54 qq named[19186]: reloading zones succeeded

创建正向区域解析库文件

[root@www named]# vim zz.com.zone 

$TTL 1D
$ORIGIN zz.com.
@       IN      SOA     ns1.zz.com. admin.zz.com. (
                        2016042501
                        1H
                        5M
                        3D
                        1D )
        IN      NS      ns1
        IN      NS      ns2
ns1     IN      A       10.201.106.129
ns2     IN      A       10.201.106.128
www     IN      A       10.201.106.129
*       IN      A       10.201.106.129

[root@www named]# named-checkzone "zz.com" /var/named/zz.com.zone 
zone zz.com/IN: loaded serial 2016042501
OK

更改区域记录文件权限

[root@www named]# chmod 640 zz.com.zone 
[root@www named]# chown :named zz.com.zone 
[root@www named]# ll zz.com.zone 
-rw-r----- 1 root named 217 Aug  3 14:09 zz.com.zone

重新加载named

[root@www named]# rndc reload
server reload successful
[root@www named]# tail /var/log/messages
Aug  3 14:14:07 qq named[19186]: received control channel command 'reload'
Aug  3 14:14:07 qq named[19186]: loading configuration from '/etc/named.conf'
Aug  3 14:14:07 qq named[19186]: using default UDP/IPv4 port range: [1024, 65535]
Aug  3 14:14:07 qq named[19186]: using default UDP/IPv6 port range: [1024, 65535]
Aug  3 14:14:07 qq named[19186]: sizing zone task pool based on 9 zones
Aug  3 14:14:07 qq named[19186]: Warning: 'empty-zones-enable/disable-empty-zone' not set: disabling RFC 1918 empty zones
Aug  3 14:14:07 qq named[19186]: reloading configuration succeeded
Aug  3 14:14:07 qq named[19186]: zone zz.com/IN: loaded serial 2016042501
Aug  3 14:14:07 qq named[19186]: reloading zones succeeded
Aug  3 14:14:07 qq named[19186]: zone zz.com/IN: sending notifies (serial 2016042501)

记录测试

[root@www named]# dig -t A www.zz.com @10.201.106.129

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6 <<>> -t A www.zz.com @10.201.106.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3270
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;www.zz.com.            IN  A

;; ANSWER SECTION:
www.zz.com.     86400   IN  A   10.201.106.129

;; AUTHORITY SECTION:
zz.com.         86400   IN  NS  ns2.zz.com.
zz.com.         86400   IN  NS  ns1.zz.com.

泛域名解析
[root@www named]# dig -t A ftp.zz.com @10.201.106.129

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6 <<>> -t A ftp.zz.com @10.201.106.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 4797
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;ftp.zz.com.            IN  A

;; ANSWER SECTION:
ftp.zz.com.     86400   IN  A   10.201.106.129

;; AUTHORITY SECTION:
zz.com.         86400   IN  NS  ns2.zz.com.
zz.com.         86400   IN  NS  ns1.zz.com.

子域授权

在区域解析库创建子域

[root@www named]# vim zz.com.zone 

$TTL 1D
$ORIGIN zz.com.
@       IN      SOA     ns1.zz.com. admin.zz.com. (
                        2016042501
                        1H
                        5M
                        3D
                        1D )
        IN      NS      ns1
        IN      NS      ns2
ns1     IN      A       10.201.106.129
ns2     IN      A       10.201.106.128
www     IN      A       10.201.106.129
*       IN      A       10.201.106.129

ops     IN      NS      ns1.ops         ##子域定义
ops     IN      NS      ns2.ops         ##子域定义
ns1.ops IN      A       10.201.106.128  ##子域定义
ns2.ops IN      A       10.201.106.131  ##子域定义

重载后区域数不会发生改变

[root@www named]# 
[root@www named]# rndc status
version: 9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6
CPUs found: 1
worker threads: 1
number of zones: 22
debug level: 0
xfers running: 0
xfers deferred: 0
soa queries in progress: 0
query logging is OFF
recursive clients: 0/0/1000
tcp clients: 0/100
server is up and running
[root@www named]# 
[root@www named]# rndc reload
server reload successful
[root@www named]# 
[root@www named]# rndc status
version: 9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6
CPUs found: 1
worker threads: 1
number of zones: 22
debug level: 0
xfers running: 0
xfers deferred: 0
soa queries in progress: 0
query logging is OFF
recursive clients: 0/0/1000
tcp clients: 0/100
server is up and running
[root@www named]# 

配置子域服务器

也是将子域服务器配置成缓存服务器,/etc/named.conf

定义子域区域

[root@zz ~]# vim /etc/named.rfc1912.zones 
 55 zone "ops.zz.com" IN {
 56         type master;
 57         file "ops.zz.com";
 58 };

重载后已经增加了一个区域

[root@zz ~]# rndc status
version: 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6
CPUs found: 1
worker threads: 1
number of zones: 21
debug level: 0
xfers running: 0
xfers deferred: 0
soa queries in progress: 0
query logging is OFF
recursive clients: 0/0/1000
tcp clients: 0/100
server is up and running
[root@zz ~]# 
[root@zz ~]# rndc reload
server reload successful
[root@zz ~]# rndc status
version: 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6
CPUs found: 1
worker threads: 1
number of zones: 22
debug level: 0
xfers running: 0
xfers deferred: 0
soa queries in progress: 0
query logging is OFF
recursive clients: 0/0/1000
tcp clients: 0/100
server is up and running
[root@zz ~]# 

编辑子正向域区域解析库文件

[root@zz named]# vim ops.zz.com.zone

  1 $TTl 1d
  2 $ORIGIN ops.zz.com.
  3 @       IN      SOA     ns1.ops.zz.com. admin.ops.zz.com. (
  4                         2015042501
  5                         1H
  6                         10M
  7                         3D
  8                         1D )
  9         IN      NS      ns1
 10         IN      NS      ns2
 11 ns1     IN      A       10.201.106.128
 12 ns2     IN      A       10.201.106.131
 13 www     IN      A       10.201.106.200
 14 *       IN      A       10.201.106.200

[root@zz named]# named-checkzone "ops.zz.com" /var/named/ops.zz.com.zone 
zone ops.zz.com/IN: loaded serial 2015042501
OK
[root@zz named]# vim ops.zz.com.zone

[root@zz named]# tail /var/log/messages
Jul 29 18:39:35 zz named[2524]: loading configuration from '/etc/named.conf'
Jul 29 18:39:35 zz named[2524]: using default UDP/IPv4 port range: [1024, 65535]
Jul 29 18:39:35 zz named[2524]: using default UDP/IPv6 port range: [1024, 65535]
Jul 29 18:39:35 zz named[2524]: sizing zone task pool based on 9 zones
Jul 29 18:39:36 zz named[2524]: Warning: 'empty-zones-enable/disable-empty-zone' not set: disabling RFC 1918 empty zones
Jul 29 18:39:36 zz named[2524]: zone ops.zz.com/IN: (master) removed
Jul 29 18:39:36 zz named[2524]: reloading configuration succeeded
Jul 29 18:39:36 zz named[2524]: zone ops.zz.com/IN: loaded serial 2015042501
Jul 29 18:39:36 zz named[2524]: reloading zones succeeded
Jul 29 18:39:36 zz named[2524]: zone ops.zz.com/IN: sending notifies (serial 2015042501)

修改权限
[root@zz named]# chgrp named ops.zz.com.zone 
[root@zz named]# ll ops.zz.com.zone 
-rw-r-----. 1 root named 232 Jul 29 21:29 ops.zz.com.zone
[root@zz named]# 

[root@zz named]# dig -t NS ops.zz.com @10.201.106.128

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t NS ops.zz.com @10.201.106.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 12464
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 0, ADDITIONAL: 2

;; QUESTION SECTION:
;ops.zz.com.            IN  NS

;; ANSWER SECTION:
ops.zz.com.     86400   IN  NS  ns2.ops.zz.com.
ops.zz.com.     86400   IN  NS  ns1.ops.zz.com.

测试子域服务器解析

[root@zz named]# dig -t A www.ops.zz.com @10.201.106.128

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.ops.zz.com @10.201.106.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 17382
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;www.ops.zz.com.            IN  A

;; ANSWER SECTION:
www.ops.zz.com.     86400   IN  A   10.201.106.200

;; AUTHORITY SECTION:
ops.zz.com.     86400   IN  NS  ns1.ops.zz.com.
ops.zz.com.     86400   IN  NS  ns2.ops.zz.com.

父域测试子域

[root@www named]# dig -t NS ops.zz.com @10.201.106.129 +norecurse

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6 <<>> -t NS ops.zz.com @10.201.106.129 +norecurse
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 42676
;; flags: qr ra; QUERY: 1, ANSWER: 0, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;ops.zz.com. IN NS

;; AUTHORITY SECTION:
ops.zz.com. 86400 IN NS ns1.ops.zz.com.
ops.zz.com. 86400 IN NS ns2.ops.zz.com.

;; ADDITIONAL SECTION:
ns1.ops.zz.com. 86400 IN A 10.201.106.128
ns2.ops.zz.com. 86400 IN A 10.201.106.131

解决问题:

定义转发域

父域配置(全局转发)

vim /etc/name.conf
options {
        listen-on port 53 { 10.201.106.128;127.0.0.1; };
        //listen-on-v6 port 53 { ::1; };
        directory       "/var/named";
        dump-file       "/var/named/data/cache_dump.db";
        statistics-file "/var/named/data/named_stats.txt";
        memstatistics-file "/var/named/data/named_mem_stats.txt";
        allow-query     { any; };
        recursion yes;
        forward first;                  ***
        forwarder { 10.201.106.2; };    ***

子域(区域转发),配置子域对zz.com的解析都转发给主服务器解析;

vim /etc/named.rfc1912.conf

zone "zz.com" IN {
        type forward;
        forward only;
        forwarders { 10.201.106.129; };
};

测试:在子域解析父域的域名
[root@zz ~]# dig -t A www.magedu.com @10.201.106.128

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.magedu.com @10.201.106.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 39821
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 2, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;www.magedu.com.            IN  A

;; ANSWER SECTION:
www.magedu.com.     86400   IN  A   10.201.106.129
www.magedu.com.     86400   IN  A   10.201.106.128

测试:在父域测试子域的域名
[root@qq ~]# dig -t A ns1.ops.zz.com @10.201.106.129

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6 <<>> -t A ns1.ops.zz.com @10.201.106.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 13781
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 1

;; QUESTION SECTION:
;ns1.ops.zz.com.            IN  A

;; ANSWER SECTION:
ns1.ops.zz.com.     86400   IN  A   10.201.106.128

将子域的转发区域测试,将不能解析父域 ###、

将转发域注释掉(/etc/named.rfc1912.conf)
[root@zz ~]# dig -t A www.zz.com @10.201.106.128

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.zz.com @10.201.106.128
;; global options: +cmd
;; Got answer:
查看防火墙是否打开
[root@zz ~]# iptables -L -n
Chain INPUT (policy ACCEPT)
target     prot opt source               destination         

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination         

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination         
[root@zz ~]# 

清空缓存
rndc flsuh

区域解析优先级大于全局解析

当子域服务器同时配置区域和全局解析配置时,解析内网的域名时找父域服务器,解析外网的域名时找外网DNS服务器;

配置:
全局解析配置:
[root@zz ~]# vim /etc/named.conf
forward first;
forwarders { 10.201.106.2; };
区域解析配置:
[root@zz ~]# vim /etc/named.rfc1912.zones 

zone "zz.com" IN {
        type forward;
        forward only;
        forwarders { 10.201.106.129; };
};

测试验证:
[root@zz ~]# dig -t A www.baidu.com @10.201.106.128

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.baidu.com @10.201.106.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 27032
;; flags: qr rd ra; QUERY: 1, ANSWER: 3, AUTHORITY: 13, ADDITIONAL: 10

;; QUESTION SECTION:
;www.baidu.com.         IN  A

;; ANSWER SECTION:
www.baidu.com.      5   IN  CNAME   www.a.shifen.com.
www.a.shifen.com.   5   IN  A   111.13.100.91
www.a.shifen.com.   5   IN  A   111.13.100.92

;; AUTHORITY SECTION:
.           5   IN  NS  e.root-servers.net.
.           5   IN  NS  f.root-servers.net.
.           5   IN  NS  h.root-servers.net.
.           5   IN  NS  g.root-servers.net.
.           5   IN  NS  d.root-servers.net.
.           5   IN  NS  i.root-servers.net.
.           5   IN  NS  c.root-servers.net.
.           5   IN  NS  l.root-servers.net.
.           5   IN  NS  a.root-servers.net.
.           5   IN  NS  j.root-servers.net.
.           5   IN  NS  k.root-servers.net.
.           5   IN  NS  b.root-servers.net.
.           5   IN  NS  m.root-servers.net.

;; ADDITIONAL SECTION:
h.root-servers.net. 5   IN  A   198.97.190.53
j.root-servers.net. 5   IN  A   192.58.128.30
j.root-servers.net. 5   IN  AAAA    2001:503:c27::2:30
e.root-servers.net. 5   IN  A   192.203.230.10
a.root-servers.net. 5   IN  A   198.41.0.4
a.root-servers.net. 5   IN  AAAA    2001:503:ba3e::2:30
k.root-servers.net. 5   IN  A   193.0.14.129
k.root-servers.net. 5   IN  AAAA    2001:7fd::1
d.root-servers.net. 5   IN  A   199.7.91.13
d.root-servers.net. 5   IN  AAAA    2001:500:2d::d

;; Query time: 12 msec
;; SERVER: 10.201.106.128#53(10.201.106.128)
;; WHEN: Fri Jul 29 23:41:15 2016
;; MSG SIZE  rcvd: 509

[root@zz ~]# dig -t A www.zz.com @10.201.106.128

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.zz.com @10.201.106.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 6758
;; flags: qr rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;www.zz.com.            IN  A

;; ANSWER SECTION:
www.zz.com.     85785   IN  A   10.201.106.129

;; AUTHORITY SECTION:
zz.com.         85770   IN  NS  ns1.zz.com.
zz.com.         85770   IN  NS  ns2.zz.com.

;; ADDITIONAL SECTION:
ns2.zz.com.     85770   IN  A   10.201.106.128
ns1.zz.com.     85770   IN  A   10.201.106.129

;; Query time: 1 msec
;; SERVER: 10.201.106.128#53(10.201.106.128)
;; WHEN: Fri Jul 29 23:41:27 2016
;; MSG SIZE  rcvd: 112
如果失败失败,可以看下named.conf里的一些安全配置改为no,两边服务器的安全配置都需要一模一样,不能一边项关闭,一边项注释;

bind的基础安全配置

acl的定义

[root@qq ~]# vim /etc/named.conf

acl slaves {
    10.201.106.129;
    127.0.0.1
};

只需要特定主机查询主域服务器的解析困

如果不在白名单,就算是自己服务器的其它IP也无法查询
/etc/named.rfc1912.conf
zone "zz.com" IN {
        type master;
        file "zz.com.zone";
        allow-query { 10.201.106.129; };

};

换成any,任意主机都可以查询;
zone "zz.com" IN {
    type master;
    file "zz.com.zone";
    allow-query { any; };

};
子域发起查询主域名
[root@zz ~]# dig -t A www.zz.com @10.201.106.129

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t A www.zz.com @10.201.106.129
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NOERROR, id: 3007
;; flags: qr aa rd ra; QUERY: 1, ANSWER: 1, AUTHORITY: 2, ADDITIONAL: 2

;; QUESTION SECTION:
;www.zz.com.            IN  A

;; ANSWER SECTION:
www.zz.com.     86400   IN  A   10.201.106.129

;; AUTHORITY SECTION:
zz.com.         86400   IN  NS  ns1.zz.com.
zz.com.         86400   IN  NS  ns2.zz.com.

只需许主域本机区域传送

未配置前子域可以从主域区域传送:
[root@zz ~]# dig -t AXFR zz.com @10.201.106.129

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t AXFR zz.com @10.201.106.129
;; global options: +cmd
zz.com.         86400   IN  SOA ns1.zz.com. admin.zz.com. 2016042501 3600 300 259200 86400
zz.com.         86400   IN  NS  ns1.zz.com.
zz.com.         86400   IN  NS  ns2.zz.com.
*.zz.com.       86400   IN  A   10.201.106.129
ns1.zz.com.     86400   IN  A   10.201.106.129
ns2.zz.com.     86400   IN  A   10.201.106.128
ops.zz.com.     86400   IN  NS  ns1.ops.zz.com.
ns1.ops.zz.com.     86400   IN  A   10.201.106.128
www.zz.com.     86400   IN  A   10.201.106.129
zz.com.         86400   IN  SOA ns1.zz.com. admin.zz.c

主机配置/etc/named.rfc1912.conf进行限制
zone "zz.com" IN {
        type master;
        file "zz.com.zone";
        allow-query { any; };
        allow-transfer { 10.201.106.129; };

};

子域再测试,不能再传送了:
[root@zz ~]# dig -t AXFR zz.com @10.201.106.129

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.47.rc1.el6 <<>> -t AXFR zz.com @10.201.106.129
;; global options: +cmd
; Transfer failed.

主域可以正常传送区域
[root@qq ~]# dig -t AXFR zz.com @10.201.106.129

; <<>> DiG 9.8.2rc1-RedHat-9.8.2-0.30.rc1.el6 <<>> -t AXFR zz.com @10.201.106.129
;; global options: +cmd
zz.com.         86400   IN  SOA ns1.zz.com. admin.zz.com. 2016042501 3600 300 259200 86400
zz.com.         86400   IN  NS  ns1.zz.com.
zz.com.         86400   IN  NS  ns2.zz.com.
*.zz.com.       86400   IN  A   10.201.106.129
ns1.zz.com.     86400   IN  A   10.201.106.129
ns2.zz.com.     86400   IN  A   10.201.106.128
ops.zz.com.     86400   IN  NS  ns1.ops.zz.com.
ns1.ops.zz.com.     86400   IN  A   10.201.106.128
www.zz.com.     86400   IN  A   10.201.106.129
zz.com.         86400   IN  SOA ns1.zz.com. admin.zz.com. 2016042501 3600 300 259200 86400
;; Query time: 2 msec
;; SERVER: 10.201.106.129#53(10.201.106.129)
;; WHEN: Wed Aug  3 20:33:43 2016
;; XFR size: 10 records (messages 1, bytes 246)

允许哪些主机递归

/etc/named.confg
allow-recursion { ip; };

禁止更新区域数据库中的内容

zone "zz.com" IN {
        type master;
        file "zz.com.zone";
        allow-update { none; };

};

转载于:https://blog.51cto.com/zhongle21/2091441

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值